default search action
22nd WETICE 2013: Hammamet, Tunisia
- Sumitra Reddy, Mohamed Jmaiel:
2013 Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, Hammamet, Tunisia, June 17-20, 2013. IEEE Computer Society 2013, ISBN 978-1-4799-0405-1 - Federico Bergenti
, Giacomo Cabri
, M. Brian Blake
, Usman Wajid:
ACEC Track Report. 1-2 - Nicola Bicocchi
, Alket Cecaj, Damiano Fontana, Marco Mamei, Andrea Sassi, Franco Zambonelli
:
Collective Awareness for Human-ICT Collaboration in Smart Cities. 3-8 - Mahdieh Shadi, Hamideh Afsarmanesh
, Mehdi Dastani:
Agent Behaviour Monitoring in Virtual Organizations. 9-14 - Yi Wei, M. Brian Blake
:
Decentralized Resource Coordination across Service Workflows in a Cloud Environment. 15-20 - Muhammad Z. C. Candra, Hong Linh Truong
, Schahram Dustdar
:
Modeling Elasticity Trade-Offs in Adaptive Mixed Systems. 21-26 - Zaki Brahmi
:
QoS-aware Automatic Web Service Composition based on Cooperative Agents. 27-32 - Abdellah Kouider El Ouahed, Mohamed Erradi, Hamid Azzoune:
A Discovery Service for Automatic Composition of Web Services Oriented-Agent. 33-35 - Wafa Mefteh, Frédéric Migeon, Marie-Pierre Gleizes, Faïez Gargouri
:
Simulation Based Design for Adaptive Multi-agent Systems: Extension to the ADELFE Methdology. 36-38 - Wafa Mefteh, Frédéric Migeon, Marie-Pierre Gleizes, Faïez Gargouri
:
S-DLCAM: A Self-Design and Learning Cooperative Agent Model for Adaptive Multi-agent Systems. 39-41 - Khalil Drira, Slim Kallel
, Ismael Bouassida Rodriguez:
AROSA Track Report. 42-43 - Ahmed Harbouche, Mohammed Erradi, Abdellatif Kobbane
:
A Flexible Wireless Body Sensor Network System for Health Monitoring. 44-49 - Amine Dhraief
, Mohamed Amine Ghorbali, Tarek Bouali, Abdelfettah Belghith
:
Mobility Management in the HIP-based M2M Overlay Network. 50-55 - Alberto Calixto Simon, Saúl E. Pomares Hernández
, Jose Roberto Perez Cruz
:
A Delayed Checkpoint Approach for Communication-Induced Checkpointing in Autonomic Computing. 56-61 - Mariachiara Puviani
, Carlo Pinciroli, Giacomo Cabri
, Letizia Leonardi
, Franco Zambonelli
:
Is Self-Expression Useful? Evaluation by a Case Study. 62-67 - Wafa Gabsi
, Rahma Bouaziz
, Bechir Zalila
:
Towards an Aspect Oriented Language Compliant with Real Time Constraints. 68-73 - Cédric Eichler
, Ghada Gharbi, Nawal Guermouche, Thierry Monteil, Patricia Stolf:
Graph-Based Formalism for Machine-to-Machine Self-Managed Communications. 74-79 - Michael Mrissa
, Mohamed Sellami
, Pierre De Vettor, Djamal Benslimane, Bruno Defude
:
A Decentralized Mediation-as-a-Service Architecture for Service Composition. 80-85 - Amir Hammami, Thierry Villemur, Tom Guérout:
Towards Context-Aware Deployment and Reconfiguration. 86-91 - Imen Ben Lahmar, Djamel Belaïd:
Developing Adapters for Structural Adaptation of Component-Based Applications. 92-97 - Wafa Gabsi
, Bechir Zalila
:
Fault Tolerance for Distributed Real Time Dynamically Reconfigurable Systems from Modeling to Implementation. 98-103 - Mohamed Tounsi
, Mohamed Mosbah
, Dominique Méry:
From Event-B Specifications to Programs for Distributed Algorithms. 104-109 - David S. Allison, Miriam A. M. Capretz, Saïd Tazi:
A Privacy Manager for Collaborative Working Environments. 110-116 - Patricia Stolf, Thierry Monteil:
CAGing Track Report. 117-118 - Tom Guérout, Mahdi Ben Alaya:
Autonomic Energy-Aware Tasks Scheduling. 119-124 - Ahmed Jemal, Riadh Ben Halima:
A QoS-driven Self-Adaptive Architecture for Wireless Sensor Networks. 125-130 - Rao Mikkilineni, Giovanni Morana:
CDCGM Track Report. 131-133 - Antonella Di Stefano, Giovanni Morana, Daniele Zito
:
Scalable and Configurable Monitoring System for Cloud Environments. 134-139 - Mohamed Mohamed, Djamel Belaïd, Samir Tata:
Self-Managed Micro-containers for Service-Based Applications in the Cloud. 140-145 - Rosario Giunta, Fabrizio Messina
, Giuseppe Pappalardo, Emiliano Tramontana:
Kaqudai: A Dependable Web Infrastructure Made Out of Existing Components. 146-151 - Massimiliano Rak
, Antonio Cuomo, Umberto Villano:
Cost/Performance Evaluation for Cloud Applications Using Simulation. 152-157 - Tiago S. Soares, Mario A. R. Dantas
, Douglas D. J. de Macedo
, Michael A. Bauer:
A Data Management in a Private Cloud Storage Environment Utilizing High Performance Distributed File Systems. 158-163 - Ilias K. Savvas
, M. Tahar Kechadi
:
CKDD Track Report. 164-165 - Burak Memis, Ibrahim Yakut
:
Privacy-Preserving Collaborative Filtering on Overlapped Ratings. 166-171 - Mohammad Hadi Soudkhah, Ryszard Janicki:
Weighted Features Classification with Pairwise Comparisons, Support Vector Machines and Feature Domain Overlapping. 172-177 - Matthias Steinbauer, Gabriele Kotsis
:
Platform for General-Purpose Distributed Data-Mining on Large Dynamic Graphs. 178-183 - Michele Angelaccio
, Berta Buttarazzi:
COPECH Track Report. 184-185 - Michela Basili
, Berta Buttarazzi, Kenji Oguni
:
Application of a Wireless Sensor Network Technology Based on GPS for Structural Health Monitoring. 186-189 - Romeo Giuliano
, Franco Mazzenga, Marco Petracca, Francesco Vatalaro
:
Application of Radio Frequency Identification for Museum Environment. 190-195 - Michele Angelaccio
, Alessandra Basili, Berta Buttarazzi:
Using Geo-business Intelligence and Social Integration for Smart Tourism Cultural Heritage Platforms. 196-199 - ZhangBing Zhou, Walid Gaaloul
, Jianwei Niu
:
CPS Track Report. 200-201 - Zahra Movahedi, Bruno Defude
:
A High-Level Service Composition Model for Building Applications on Sensor Networks. 202-207 - Rédouane Lbath:
CSP Track Report. 208 - Ibrahima Fall, Reda Bendraou
, Marie-Pierre Gervais, Xavier Blanc:
Towards a Full Specification and Use of Overlap Relationships between Work Products in MDE Software Processes. 209-217 - Yassine Jamoussi, Asma Kerkeni
:
A Negotiation Based Approach for Satisfying the Actor Requirements in Web Services Composition. 218-224 - Raoudha Chebil, Wided Lejouad Chaari
, Stefano A. Cerri, Khaled Ghédira:
A Causal Graph Based Method to Evaluate e-Collaboration Scenarios. 225-230 - Rahma Bouaziz, Slim Kallel
, Bernard Coulette:
An Engineering Process for Security Patterns Application in Component Based Models. 231-236 - Raoudha Kobbi, Wided Lejouad Chaari
:
An Agent-Based Model for Trust Management in Electronic Collaboration. 237-242 - Narjès Bellamine Ben Saoud
, François Charoy
, Chihab Hanachi, Serge Stinckwich:
CT2CM Track Report. 243-244 - Sameh Triki, Narjès Bellamine Ben Saoud
, Julie Dugdale, Chihab Hanachi:
Coupling Case Based Reasoning and Process Mining for a Web Based Crisis Management Decision Support System. 245-252 - M'hammed Ali Oulhaci, Erwan Tranvouez, Bernard Espinasse, Sébastien Fournier
:
Intelligent Tutoring Systems and Serious Game for Crisis Management: A Multi-agents Integration Architecture. 253-258 - Wassim Derguech, Souleiman Hasan
, Sami Bhiri
, Edward Curry
:
Organizing Capabilities Using Formal Concept Analysis. 260-265 - Raoudha Maraoui
, Eric Cariou, Bechir Ayeb:
A Model-Driven Engineering Approach for the Formal Verification of Composite Web Services. 266-271 - Afef Jmal Maâlej, Manel Hamza, Moez Krichen:
WSCLT: A Tool for WS-BPEL Compositions Load Testing. 272-277 - Mohamed Tahar Bhiri, Taoufik Sakka Rouis, Mourad Kmimech:
Checking Non-functional Properties of UML2.0 Components Assembly. 278-283 - Mourad Amziani, Tarek Melliti, Samir Tata:
Formal Modeling and Evaluation of Service-Based Business Process Elasticity in the Cloud. 284-291 - Antonella Santone, Valentina Intilangelo, Domenico Raucci:
Application of Equivalence Checking in a Loan Origination Process in Banking Industry. 292-297 - Saïd Tazi, Nawal Guermouche:
MADYNE Track Report. 298 - Salsabil Dhouib, Riadh Ben Halima:
Surveying Collaborative and Content Management Platforms for Enterprise. 299-304 - Ourania I. Markaki, Dimitrios Panopoulos, Panagiotis Kokkinakos, Sotirios Koussouris, Dimitris Askounis:
Towards Adopting Dynamic Manufacturing Networks for Future Manufacturing: Benefits and Risks of the IMAGINE DMN End-to-End Management Methodology. 305-310 - Riadh Ben Halima, Hatem Hadj Kacem
, Wajdi Louati:
PROMASC Track Report. 311-312 - Katarina Grolinger, Miriam A. M. Capretz, Emna Mezghani, Ernesto Exposito
:
Knowledge as a Service Framework for Disaster Data Management. 313-318 - Ines Houidi, Djamal Zeghlache
:
Exact Adaptive Virtual Network Embedding in Cloud Environments. 319-323 - Mouna Rekik, Khouloud Boukadi
, Hanêne Ben-Abdallah
:
A Decision Method for Business Process Outsourcing Based on Enterprise Context. 324-329 - Imen Tounsi, Mohamed Hadj Kacem, Ahmed Hadj Kacem:
An Approach for Modeling and Formalizing SOA Design Patterns. 330-335 - Maha Jebalia, Asma Ben Letaifa
, Mohamed Hamdi, Sami Tabbane:
A Comparative Study on Game Theoretic Approaches for Resource Allocation in Cloud Computing Architectures. 336-341 - Steffen Heinzl, Christoph Metz:
Toward a Cloud-Ready Dynamic Load Balancer Based on the Apache Web Server. 342-345 - Andrea Calvagna
, Emiliano Tramontana:
VSC Track Report. 346 - Andrea Calvagna
, Emiliano Tramontana:
Combinatorial Validation Testing of Java Card Byte Code Verifiers. 347-352 - Vincent Filou, Mohamed Mosbah, Mohamed Tounsi
:
Towards Proved Distributed Algorithms through Refinement, Composition and Local Computations. 353-358 - Giovanni Morana, Emiliano Tramontana, Daniele Zito
:
Detecting Attacks on Java Cards by Fingerprinting Applets. 359-364 - Maissa Elleuch, Osman Hasan
, Sofiène Tahar, Mohamed Abid:
Towards the Formal Performance Analysis of Wireless Sensor Networks. 365-370 - Agnieszka D. Bogobowicz, Ryszard Janicki:
On Pairwise Comparisons Based Internal and External Measures for Software Evaluation. 371-376 - Mariam Lahami
, Moez Krichen:
Test Isolation Policy for Safe Runtime Validation of Evolvable Software Systems. 377-382
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.