Centre d'Excellence en Technologies de l'Information et de la Communication

Publications in OpenAlex of which a co-author is affiliated to this organization

All publications | By field | By subfield

All publications [Next]
Title DOI
Generating High-Level Event-B System Models from KAOS Requirements Models
https://doi.org/10.1007/978-3-642-33442-9_23 From Open Source Software to Open Source Hardware
https://doi.org/10.23919/ecc.2019.8795704 Attack detection in a cluster divided consensus network
https://doi.org/10.1145/1082983.1082977 Adaptive replication of large-scale multi-agent systems
https://doi.org/10.1109/icsmc.2004.1398354 Robust tracking of nonlinear MIMO uncertain flat systems
https://doi.org/10.1016/j.jpdc.2012.01.003 Parallel Ant Colony Optimization on Graphics Processing Units
https://doi.org/10.1002/mma.3557 Exact traveling wave solutions to the fourth‐order dispersive nonlinear Schrödinger equation with dual‐power law nonlinearity
https://doi.org/10.1145/2641580.2641618 Reliability of User-Generated Data
https://doi.org/10.1007/978-3-319-22885-3_38 SUPER: Social-Based Business Process Management Framework
https://doi.org/10.1109/glocom.2016.7841500 A Framework for Validation of Cooperative Intelligent Transport Systems
https://doi.org/10.1097/rlu.0000000000001736 Infection of Ventricular Assist Device Detected and Monitored by 18F-FDG PET/CT
https://doi.org/10.1145/3183519.3183553 Helping SMEs to better develop software
A multi-agent approach for the edge detection in image processings
https://doi.org/10.1007/978-3-642-17694-4_30 Future Internet Monitoring Platform for Computing Clouds
https://doi.org/10.1007/978-3-642-40483-2_41 Augmenting Accessibility Guidelines with User Ability Rationales
https://doi.org/10.14236/jhi.v21i4.66 Mapping French terms in a Belgian guideline on heart failure tointernational classifications and nomenclatures: the devil is inthe detail
https://doi.org/10.1016/j.procir.2016.11.029 Monetary Quantification of Supply Risks of Manufacturing Enterprises - Discrete Event Simulation Based Approach
https://doi.org/10.1109/jsen.2017.2718734 Pedestrian Detection Strategy in Urban Area: Capacitance Probes and Pedestrians’ Signature
https://doi.org/10.1016/j.chaos.2020.110025 Generation of localized patterns in two-component condensates trapped in variable shape optical lattices
https://doi.org/10.1109/wetice49692.2020.00038 FADI - A Deployment Framework for Big Data Management and Analytics
https://doi.org/10.1140/epjd/s10053-020-00034-y Linear stability analysis and spatial solitons in the one-dimensional and the two-dimensional generalized nonlinear Schrödinger equation with third-order dispersion and $$\mathcal {PT}$$-symmetric potentials
https://doi.org/10.3182/20140824-6-za-1003.01499 Some Refinements on Stability Analysis and Stabilization of Second Order T-S Models Using Line-Integral Lyapunov Functions
https://doi.org/10.1109/icre.2003.1232781 FAUST: formal analysis using specification tools
https://doi.org/10.1007/978-3-319-25747-1_26 Goal-Oriented Requirement Engineering Support for Business Continuity Planning
https://doi.org/10.5220/0005752403130322 A Discrete Event Simulation Approach for Quantifying Risks in Manufacturing Processes
https://doi.org/10.1016/j.jpeds.2016.06.031 Usefulness of Hepatobiliary Scintigraphy in the Evaluation of Hepatic Cystic Lesions in Children
https://doi.org/10.1109/iscc.2016.7543711 An architecture for securing federated cloud networks with Service Function Chaining
https://doi.org/10.1109/re.2016.49 A Modular Requirements Engineering Framework for Web-Based Toolchain Integration
https://doi.org/10.1109/re.2016.60 Towards Modelling and Analysis of Spatial and Temporal Requirements
Homology Functionality for Grayscale Image Segmentation
https://doi.org/10.1002/gps.5512 Late‐onset and nonlate‐onset schizophrenia: A comparison of clinical characteristics in a multicenter study
https://doi.org/10.1097/md.0000000000024473 Early-phase pelvic bone SPECT
https://doi.org/10.1007/978-3-319-15618-7_8 Idea: Optimising Multi-Cloud Deployments with Security Controls as Constraints
https://doi.org/10.5220/0007687405270533 Towards Goal-oriented Analysis and Redesign of BPMN Models
https://doi.org/10.5220/0010603000002998 Goal and Threat Modelling for Driving Automotive Cybersecurity Risk Analysis Conforming to ISO/SAE 21434
https://doi.org/10.1007/978-3-540-70540-6_192 OLDES: Designing a Low-Cost, Easy-to-Use e-Care System Together with the Stakeholders
https://doi.org/10.4267/2042/24037 La norme comme instrument d'accès au savoir en ligne
https://doi.org/10.1109/isorc.2008.23 Model Based Development of Quality-Aware Software Services
From centralized to decentralized approach for optimal Controller of Discrete Manufacturing Systems
Logical Reasoning to Detect Weaknesses About SHA-1 and MD4/5
https://doi.org/10.1007/978-3-319-33313-7_6 Security Requirements in a Federated Cloud Networking Architecture
https://doi.org/10.1109/rew.2016.033 A Goal-Oriented Requirements Analysis for the Collection, Use and Exchange of Electronic Evidence across EU Countries
https://doi.org/10.5220/0006360504600470 Decision Making Support in the Scheduling of Chemotherapy Coping with Quality of Care, Resources and Ethical Constraints
https://doi.org/10.5220/0006462503720381 Improving Requirements Engineering through Goal-oriented Models and Tools: Feedback from a Large Industrial Deployment
https://doi.org/10.1016/j.ifacol.2017.08.273 Consistency Checking of Safety Constraints for Manufacturing Systems with Graph Analysis
https://doi.org/10.5220/0006657403200326 Dealing with Perceived Fairness when Planning Doctor Shifts in Hospitals
https://doi.org/10.1145/3194078.3194083 Building sustainable software for sustainable systems
https://doi.org/10.1007/s12061-019-09312-8 Urban and Peri-Urban Residential Rental Markets in Wallonia: Similar or Different?
https://doi.org/10.5220/0009972105370543 Towards Quantitative Trade-off Analysis in Goal Models with Multiple Obstacles using Constraint Programming
https://doi.org/10.1109/globecom42002.2020.9322076 C-ITS Communications based on BLE Messages
https://doi.org/10.1109/globecom42002.2020.9322243 Heuristic Optimization Algorithms for QoS Management in UAV Assisted Cellular Networks
A Model-Based Transformation Method to Design PLC-Based Control of Discrete Automated Manufacturing Systems
https://doi.org/10.1007/s42979-022-01235-5 Area Coverage Strategy in IoT Networks Based on Redeployment, Descriptive Statistics, Correlation and Regression Parameters
https://doi.org/10.1016/j.ifacol.2022.10.060 Data Model Classification for Interoperability in the Industry
https://doi.org/10.1007/978-3-319-11364-7_7 Supporting Business Process Exception Management by Dynamically Building Processes Using the BEM Framework
https://doi.org/10.1007/s12061-014-9127-x Simulating Residential Location Choice at Different Geographical Scales: The Case of Lyon
https://doi.org/10.5220/0005564004320437 A UML KPI Profile for Energy Aware Design and Monitoring of Cloud Services
https://doi.org/10.1109/ssd.2016.7473766 Analysis and implementation of nonlinear implicit differential-algebraic equations solver: Application to a photovoltaic power system
Le modèle IRM4S : le principe Influence/Rééaction pour la simulation de systèmes multi-agents.
https://doi.org/10.1007/978-3-642-54897-0 Artificial Intelligence for Knowledge Management
https://doi.org/10.1007/978-3-319-93031-2_9 Reasoning on Sequences in Constraint-Based Local Search Frameworks
https://doi.org/10.5220/0008119704060413 A Two-phased Risk Management Framework Targeting SMEs Project Portfolios
https://doi.org/10.1109/icat47117.2019.8938888 Blockchain Based Variability Management Solutions for Fog Native Open Source Software
https://doi.org/10.1109/icc40277.2020.9148859 Vehicular Context Cloud Networking for Intelligent Transport Systems
https://doi.org/10.1016/j.comptc.2020.112982 Insight into semiquantum torsional dynamics of triple well potential for real system of n-butane molecules
https://doi.org/10.5220/0010431408000808 Towards Formal Security Verification of Over-the-Air Update Protocol: Requirements, Survey and UpKit Case Study
https://doi.org/10.15439/2022f35 Elaboration of Financial Fraud Ontology
A Novel Aggregation Approach Based on Cooperative Agents and Self-Stabilizing Clustering for WSNs
https://doi.org/10.1145/3551661.3561367 A Data Mining-based Intrusion Detection System for Cyber Physical Power Systems
https://doi.org/10.1007/978-3-031-36183-8_3 Cyber-attack Proactive Defense Using Multivariate Time Series and Machine Learning with Fuzzy Inference-based Decision System
https://doi.org/10.1109/models-c59198.2023.00114 MBSE Tool Selection Process: Feedback from a Railway Case Study
https://doi.org/10.1007/s12083-024-01634-w Probabilistic intrusion detection based on an optimal strong K-barrier strategy in WSNs
https://doi.org/10.1007/978-3-642-10308-7_38 Video Relay Service for Signing Deaf - Lessons Learnt from a Pilot Study
Mesure des rythmes tissulaires de la microcirculation cranio-sacrée : de l’approche manuelle ostéopathique à l’expérimentation scientifique.
Publishing a Multilingual Medical Terminology According to Terminology Standards and Linked Data Principles.
https://doi.org/10.5220/0006350202440249 Extending Land Administration Domain Models with a Goal Perspective
https://doi.org/10.1007/978-3-319-92792-3_7 Towards an Energy-Aware Framework for Application Development and Execution in Heterogeneous Parallel Architectures
https://doi.org/10.1109/iv.2018.00029 A Multi-sensor Visualization Tool for Harvested Web Information: Insights on Data Quality
Handling imperfect spatiotemporal information from the conceptual modeling to database structures
https://doi.org/10.1109/globecom48099.2022.10001170 False Data Injection Attack Against Cyber-Physical Systems Protected by a Watermark
https://doi.org/10.11591/ijece.v15i2.pp2304-2313 A constrained convolutional neural network with attention mechanism for image manipulation detection
https://doi.org/10.1016/j.procs.2016.04.215 Using a Pervasive Computing Environment to Identify Secondary Effects of the Antarctic Ozone Hole
https://doi.org/10.1007/978-3-642-14282-6_12 Assuring Privacy of Medical Records in an Open Collaborative Environment - A Case Study of Walloon Region’s eHealth Platform
https://doi.org/10.1016/j.procs.2015.09.227 Security Enforcement for Multi-Cloud Platforms – The Case of PaaSage
https://doi.org/10.1109/lsp.2004.824053 Variation on Variation on Euclid's Algorithm
https://doi.org/10.1016/j.ifacol.2017.08.2324 Massive Railway Operating Data Visualization; a Tool for RATP Operating Expert
https://doi.org/10.5220/0007755104740480 Teaching Computer Programming to Post-millennial Kids: Overview of Goals, Activities and Supporting Tools
https://doi.org/10.4000/variations.720 Simulation sociale et simulacre structural
A PSO-Based Optimization of a Fuzzy-based MPPT Controller for a Photovoltaic Pumping System Used for Irrigation of Greenhouses
https://doi.org/10.5220/0009896107180725 Design and Application of a Reconfigurable Control to a Cyber-Physical System
https://doi.org/10.1145/3382025.3414985 Test them all, is it worth it?
https://doi.org/10.1007/s11665-015-1383-7 Micromechanics-Based Damage Analysis of Fracture in Ti5553 Alloy with Application to Bolted Sectors
https://doi.org/10.1145/3194133.3194154 A coordination mechanism to replicate large-scale multi-agent systems
https://doi.org/10.1007/978-3-030-63193-2 Informatics in Control, Automation and Robotics
https://doi.org/10.1007/978-3-319-55970-4 Artificial Intelligence for Knowledge Management
https://doi.org/10.1007/978-3-319-60947-8_1 Engineering Configuration Graphical User Interfaces from Variability Models
https://doi.org/10.1109/tcomm.2011.112311.080035 Supplementary Proof for "Equalization Algorithms in the Frequency Domain for Continuous Phase Modulations"
https://doi.org/10.5220/0004996001650170 A Formal Model for Forensic Storage Media Preparation Tools
https://doi.org/10.1109/smartcomp.2017.7947000 Deployment-Time Multi-Cloud Application Security
https://doi.org/10.1007/978-3-030-69367-1_5 Quality 4.0 - Transparent Product Quality Supervision in the Age of Industry 4.0