Ali Mili

Orcid: 0000-0002-6578-5510

Affiliations:
  • New Jersey Institute of Technology, Newark, USA


According to our database1, Ali Mili authored at least 189 papers between 1981 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
On the persistent rumors of the programmer's imminent demise.
Softw. Syst. Model., December, 2023

Toward a theory of program repair.
Acta Informatica, September, 2023

Invariant Relations: A Bridge from Programs to Equations.
CoRR, 2023

Assume(), Capture(), Verify(), Establish(): A Vocabulary for Static Program Analysis.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

Semantic Coverage: Measuring Test Suite Effectiveness.
Proceedings of the 18th International Conference on Software Technologies, 2023

2022
Quantifying the Effectiveness of Mutant Sets.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

Three Forms of Mutant Subsumption: Basic, Strict and Broad.
Proceedings of the Software Technologies - 17th International Conference, 2022

Generalized Mutant Subsumption.
Proceedings of the 17th International Conference on Software Technologies, 2022

Computing Program Functions.
Proceedings of the 10th IEEE/ACM International Conference on Formal Methods in Software Engineering, 2022

2021
The ratio of equivalent mutants: A key to analyzing mutation equivalence.
J. Syst. Softw., 2021

Differentiators and detectors.
Inf. Process. Lett., 2021

The Bane of Generate-and-Validate Program Repair: Too Much Generation, Too Little Validation.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2021

Mutation Subsumption as Relative Incorrectness.
Proceedings of the Quality of Information and Communications Technology, 2021

Assume, Capture, Verify, Establish: Ingredients for Scalable Software Analysis.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

Quantifying Faultiness: What Does It Mean to Have N Faults?
Proceedings of the 9th IEEE/ACM International Conference on Formal Methods in Software Engineering, 2021

2020
Correctness enhancement: a pervasive software engineering paradigm.
Int. J. Crit. Comput. Based Syst., 2020

A Semantic Definition of Faults and Its Implications.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

2019
Stryker: Scaling Specification-Based Program Repair by Pruning Infeasible Mutants with SAT.
CoRR, 2019

Fault Density, Fault Depth and Fault Multiplicity: The Reward of Discernment.
Proceedings of the 19th IEEE International Conference on Software Quality, 2019

Program Repair at Arbitrary Fault Depth.
Proceedings of the 12th IEEE Conference on Software Testing, Validation and Verification, 2019

Estimating the Number of Equivalent Mutants.
Proceedings of the 2019 IEEE International Conference on Software Testing, 2019

Quantitative Analysis of Mutant Equivalence.
Proceedings of the Software Technologies - 14th International Conference, 2019

Quantitative Metrics for Mutation Testing.
Proceedings of the 14th International Conference on Software Technologies, 2019

2018
Convergence: Integrating termination and abort-freedom.
J. Log. Algebraic Methods Program., 2018

Programming Without Refining.
Proceedings of the Proceedings 18th Refinement Workshop, 2018

Impact of Mutation Operators on the Ratio of Equivalent Mutants.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2018

Impact of Mutation Operators on Mutant Equivalence.
Proceedings of the 13th International Conference on Software Technologies, 2018

Using Semantic Metrics to Predict Mutation Equivalence.
Proceedings of the Software Technologies - 13th International Conference, 2018

2017
Projecting programs on specifications: Definition and implications.
Sci. Comput. Program., 2017

What is a fault? and why does it matter?
Innov. Syst. Softw. Eng., 2017

Estimating the Survival Rate of Mutants.
Proceedings of the 12th International Conference on Software Technologies, 2017

A Generic Algorithm for Program Repair.
Proceedings of the 5th IEEE/ACM International FME Workshop on Formal Methods in Software Engineering, 2017

2016
Program Repair by Stepwise Correctness Enhancement.
Proceedings of the Proceedings First Workshop on Pre- and Post-Deployment Verification Techniques, 2016

Relative Correctness: A Bridge Between Proving and Testing.
Proceedings of the 10th Workshop on Verification and Evaluation of Computer and Communication System, 2016

Software Evolution by Correctness Enhancement.
Proceedings of the 28th International Conference on Software Engineering and Knowledge Engineering, 2016

Debugging without Testing.
Proceedings of the 2016 IEEE International Conference on Software Testing, 2016

2015
Programming Language Use in US Academia and Industry.
Informatics Educ., 2015

Program Derivation by Correctness Enhacements.
Proceedings of the Proceedings 17th International Workshop on Refinement, 2015

Putting engineering into software engineering: Upholding software engineering principles in the classroom.
Comput. Hum. Behav., 2015

Correctness and Relative Correctness.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

Computing Attributes of Software Architectures - A Static Method and Its Validation.
Proceedings of the ENASE 2015, 2015

Relational Mathematics for Relative Correctness.
Proceedings of the Relational and Algebraic Methods in Computer Science, 2015

2014
Semantic metrics for software products.
Innov. Syst. Softw. Eng., 2014

Verifying while loops with invariant relations.
Int. J. Crit. Comput. Based Syst., 2014

Automated Quantitative Attributes Prediction from Architectural Description Language.
Proceedings of the ICSOFT-PT 2014, 2014

Quantifying availability in SCADA environments using the cyber security metric MFC.
Proceedings of the Cyber and Information Security Research Conference, 2014

Quantifying the impact of unavailability in cyber-physical environments.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Cyber Security, 2014

On Faults and Faulty Programs.
Proceedings of the Relational and Algebraic Methods in Computer Science, 2014

2013
Invariant assertions, invariant relations, and invariant functions.
Sci. Comput. Program., 2013

Invariant functions and invariant relations: An alternative to invariant assertions.
J. Symb. Comput., 2013

A cybersecurity model in cloud computing environments.
J. King Saud Univ. Comput. Inf. Sci., 2013

Mean Failure Cost as a Measurable Value and Evidence of Cybersecurity: E-Learning Case Study.
Int. J. Secur. Softw. Eng., 2013

Parallel Bounded Verification of Alloy Models by TranScoping.
Proceedings of the Verified Software: Theories, Tools, Experiments, 2013

ACME+ for Software Architecture Analysis.
Proceedings of the ICSOFT 2013, 2013

Risk Assessment Methodology Based on the NISTIR 7628 Guidelines.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

ACME+: An ADL for Quantitative Analysis of Quality Attributes.
Proceedings of the Evaluation of Novel Approaches to Software Engineering, 2013

Architecture Level Prediction of Software Quality Attributes.
Proceedings of the ENASE 2013, 2013

Failure impact analysis of key management in AMI using cybernomic situational assessment (CSA).
Proceedings of the Cyber Security and Information Intelligence, 2013

2012
A versatile concept for the analysis of loops.
J. Log. Algebraic Methods Program., 2012

Invariant relations, invariant functions, and loop functions.
Innov. Syst. Softw. Eng., 2012

Defining and computing a value based cyber-security measure.
Inf. Syst. E Bus. Manag., 2012

An economic model of security threats for cloud computing systems.
Proceedings of the 2012 International Conference on Cyber Security, 2012

2011
Reasoning About Quantitative Architectural Attributes (Invited Paper).
J. Softw., 2011

A quantitative model for software engineering trends.
Inf. Sci., 2011

Computing Preconditions and Postconditions of While Loops.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2011 - 8th International Colloquium, Johannesburg, South Africa, August 31, 2011

Validating Cyber Security Requirements: A Case Study.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

2010
Reflexive transitive invariant relations: A basis for computing loop functions.
J. Symb. Comput., 2010

Quantifying security threats and their potential impacts: a case study.
Innov. Syst. Softw. Eng., 2010

Using invariant functions and invariant relations to compute loop functions.
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, 2010

Software requirements for a system to compute mean failure cost.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

Modeling stakeholder/value dependency through mean failure cost.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

A Comparative Study of Invariant Assertions, Invariant Relations, and Invariant Functions.
Proceedings of the Second International Workshop on Invariant Generation, 2010

Towards an automated tool for computing loop functions.
Proceedings of the 8th ACS/IEEE International Conference on Computer Systems and Applications, 2010

A model for analyzing architectural attributes.
Proceedings of the 8th ACS/IEEE International Conference on Computer Systems and Applications, 2010

2009
Mathematics for reasoning about loop functions.
Sci. Comput. Program., 2009

Modeling the Evolution of Software Engineering Trends - A Bottom Up Approach.
Proceedings of the ICSOFT 2009, 2009

Methodology for Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

Challenging the Mean Time to Failure: Measuring Dependability as a Mean Failure Cost.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

Quantifying security threats and their impact.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

Managing complex IT security processes with value based measures.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009

Relational Methods in the Analysis of While Loops: Observations of Versatility.
Proceedings of the Relations and Kleene Algebra in Computer Science, 2009

2008
Harnessing a Refinement Theory to Compute Loop Functions.
Proceedings of the 2nd International Workshop on Harnessing Theories for Tool Support in Software, 2008

An Algorithm for Computing Loop Functions.
Proceedings of the Twentieth International Conference on Software Engineering & Knowledge Engineering (SEKE'2008), 2008

Synopsis of Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission Value.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

Evaluating security controls based on key performance indicators and stakeholder mission.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008

2007
Modeling the evolution of operating systems: An empirical study.
J. Syst. Softw., 2007

A Refinement Based Framework for Computing Loop Behavior.
Proceedings of the 31st Annual IEEE / NASA Software Engineering Workshop (SEW-31 2007), 2007

Monitoring software technology evolution, one trend at a time.
Proceedings of the 16th International Conference on Software Engineering and Data Engineering (SEDE-2007), 2007

A Product Line of Software Reuse Cost Models.
Proceedings of the ICSOFT 2007, 2007

Towards an Engineering Discipline of Computational Society.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

A Semantic Recognizer Infrastructure for Computing Loop Behavior.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

Measuring Reliability as a Mean Failure Cost.
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007

2006
Modeling security as a dependability attribute: a refinement-based approach.
Innov. Syst. Softw. Eng., 2006

Using Change Propagation Probabilities to Assess Quality Attributes of Software Architectures 1.
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006

Modeling Redundancy: Quantitative and Qualitative Models.
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006

2005
An Empirical Study of Programming Language Trends.
IEEE Softw., 2005

Relational characterizations of system fault tolerance.
Sci. Comput. Program., 2005

Recoverability preservation: a measure of last resort.
Innov. Syst. Softw. Eng., 2005

Change Propagation for Assessing Design Quality of Software Architectures.
Proceedings of the Fifth Working IEEE / IFIP Conference on Software Architecture (WICSA 2005), 2005

Perspectives on Redundancy: Applications to Software Certification.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Quantifying software architectures: an analysis of change propagation probabilities.
Proceedings of the 2005 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2005), 2005

2004
Error Propagation In Software Architectures.
Proceedings of the 10th IEEE International Software Metrics Symposium (METRICS 2004), 2004

Software Architectures Change Propagation Tool (SACPT).
Proceedings of the 20th International Conference on Software Maintenance (ICSM 2004), 2004

Towards the Verification and Validation of Online Learning Systems: General Framework and Applications.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

Assessing and Quantifying Attributes of Product Line Architectures.
Proceedings of the 2nd International Conference Computing, 2004

2003
Architectural-Level Risk Analysis Using UML.
IEEE Trans. Software Eng., 2003

2002
Software Engineering Technology Watch.
IEEE Softw., 2002

Guest editorial.
J. Syst. Softw., 2002

Software engineering technology watch.
Inf. Sci., 2002

2001
Defining and Applying Measures of Distance Between Specifications.
IEEE Trans. Software Eng., 2001

An Application of Relational Algebra: Specification of a Fault Tolerant Flight Control System.
Proceedings of the First International Workshop on Relational Methods in Software, 2001

Managing Software Reuse Economics: An Integrated ROI-based Model.
Ann. Softw. Eng., 2001

Re-Engineering Fault Tolerance Requirements: A Case Study in Specifying Fault Tolerant Flight Control Systems.
Proceedings of the 5th IEEE International Symposium on Requirements Engineering (RE 2001), 2001

Software Engineering Research Agendas Panel (SERA): What Can't We Do, But Need to Learn How to Do?
Proceedings of the 23rd International Conference on Software Engineering, 2001

Information Theoretic Metrics for Software Architectures.
Proceedings of the 25th International Computer Software and Applications Conference (COMPSAC 2001), 2001

2000
Semantic distance between specifications.
Theor. Comput. Sci., 2000

A calculus of program adaptation and its applications.
Sci. Comput. Program., 2000

A comparative analysis of hardware and software fault tolerance: Impact on software reliability engineering.
Ann. Softw. Eng., 2000

A hierarchy of COTS certification criteria.
Proceedings of the Software Product Lines; Experiences and Research Directions, 2000

Constructional Design Patterns as Reusable Components.
Proceedings of the Software Reuse: Advances in Software Reusability, 2000

Tracking, predicting and assessing software reuse costs: an automated tool.
Proceedings of the 22nd International Conference on on Software Engineering, 2000

An integrated cost model for software reuse.
Proceedings of the 22nd International Conference on on Software Engineering, 2000

Views: A Framework for Feature-based Development and Distribution of OO Applications.
Proceedings of the 33rd Annual Hawaii International Conference on System Sciences (HICSS-33), 2000

Lattice Based Distances.
Proceedings of the Participants Copies of Fifth International Seminar on Relational Methods in Computer Science, 2000

1999
A Case Study in Software Reuse.
Softw. Qual. J., 1999

Toward an Engineering Discipline of Software Reuse.
IEEE Softw., 1999

Desert Island Column: The Long Story of a Short Theorem.
Autom. Softw. Eng., 1999

View Programming for Decentralized Development of OO Programs.
Proceedings of the TOOLS 1999: 30th International Conference on Technology of Object-Oriented Languages and Systems, Delivering Quality Software, 1999

Combining Fault Avoidance, Fault Removal and Fault Tolerance: An Integrated Model.
Proceedings of the 14th IEEE International Conference on Automated Software Engineering, 1999

Science and Engineering for Software Development: A Recognition of Harlan D. Mills' Legacy.
Proceedings of the 1999 International Conference on Software Engineering, 1999

1998
Integration of Sequential Scenarios.
IEEE Trans. Software Eng., 1998

Unifying Program Construction and Modification.
Log. J. IGPL, 1998

A Survey of software Reuse Libraries.
Ann. Softw. Eng., 1998

Mathematical Foundations for Program Transformations.
Proceedings of the Logic Programming Synthesis and Transformation, 1998

Towards a uniform relational semantics for tabular expressions.
Proceedings of the Participants Copies for Relational Methods in Logic, 1998

Capturing pointer semantics and scoping rules.
Proceedings of the Participants Copies for Relational Methods in Logic, 1998

1997
Storing and Retrieving Software Conponents: A Refinement Based System.
IEEE Trans. Software Eng., 1997

A Calculus of Program Modifications.
Proceedings of the 1997 ACM SIGSOFT Symposium on Symposium on Software Reusability, 1997

Retrieving Software Components that Minimize Adaptation Effort.
Proceedings of the 1997 International Conference on Automated Software Engineering, 1997

Detecting Feature Interactions on Relational Specifications.
Proceedings of the Feature Interactions in Telecommunications Networks IV, 1997

An Undergraduate Option in Software Engineering: Analysis and Rationale.
Proceedings of the Tenth Conference on Software Engineering Education and Training, 1997

Defining and detecting feature interactions.
Proceedings of the Algorithmic Languages and Calculi, 1997

Algorithms = RelationaI Algebra + Ordering Relations.
Proceedings of the Participants Copies of Third International Seminar on the Use of Relational Methods in Computer Science, 1997

Measures of Distances to Perform Approximate Retrieval.
Proceedings of the Participants Copies of Third International Seminar on the Use of Relational Methods in Computer Science, 1997

Refinement and Demonic Semantics.
Proceedings of the Relational Methods in Computer Science., 1997

1996
A Relational Calculus for Program Construction by Parts.
Sci. Comput. Program., 1996

Guest editor's corner.
J. Syst. Softw., 1996

1995
Reusing Software: Issues and Research Directions.
IEEE Trans. Software Eng., 1995

Embedding a Demonic Semilattice in a Relational Algebra.
Theor. Comput. Sci., 1995

Behavorial Specifications in Object-Oriented Programming.
J. Object Oriented Program., 1995

Program Construction by Parts.
Proceedings of the Mathematics of Program Construction, 1995

1994
Teaching a first course on data structures: a software engineering approach.
Proceedings of the 25th SIGCSE Technical Symposium on Computer Science Education, 1994

A process for verification based inspections.
Proceedings of the SEKE'94, 1994

Storing and Retrieving Software Components: A Refinement Based System.
Proceedings of the 16th International Conference on Software Engineering, 1994

1993
A Relation Division Operator: The Conjugate Kernel.
Theor. Comput. Sci., 1993

On the Mathematics of Sequential Decompositions.
Sci. Comput. Program., 1993

Relation-based semantics for concurrency.
Inf. Sci., 1993

1992
Semantic-Based Software Retrieval to Support Rapid Prototyping.
Struct. Program., 1992

Heuristics for Constructing While Loops.
Sci. Comput. Program., 1992

On the Lattice of Specifications: Applications to a Specification Methodology.
Formal Aspects Comput., 1992

A Relational Model for the Specification of Data Types.
Comput. Lang., 1992

Computers in the Classroom: A National Proposal.
Proceedings of the Education and Society, 1992

1991
Regularity of Relations: A Measure of Uniformity.
Theor. Comput. Sci., 1991

Controllable factors for programmer productivity: A statistical study.
J. Syst. Softw., 1991

An empirical study of software maintenance.
Proceedings of the Conference on Software Maintenance, 1991

1990
The use of executable assertions for error detection and damage assessment.
J. Syst. Softw., 1990

A foreword to the special issue of the journal of systems and software on the Role of languages in programming (the Tenth Tunisian-French Seminar of Computer Science).
J. Syst. Softw., 1990

Software maintenance management in Tunisia: A statistical study.
Proceedings of the Conference on Software Maintenance, 1990

A Database of Software Components: An Algebraic Structure and Its Implementation.
Proceedings of the International Conference on Database and Expert Systems Applications, 1990

1988
On the Analysis of Iterative and Recursive Programs.
Aust. Comput. J., 1988

1987
On the use of executable assertions in structured programs.
J. Syst. Softw., 1987

Relational Heuristics for the Design of Deterministic Programs.
Acta Informatica, 1987

1986
Specification Methodology: An Integrated Relational Approach.
Softw. Pract. Exp., 1986

Formal Models of Stepwise Refinement of Programs.
ACM Comput. Surv., 1986

1985
Towards a Theory of Forward Error Recovery.
IEEE Trans. Software Eng., 1985

Workshop on Models and Languages for Software Specification and Design.
Computer, 1985

Strongest Invariant Functions: Their Use in the Systematic Analysis of While Statements.
Acta Informatica, 1985

Une perspective relationnelle de la programmation. (Relational perspective of programming science).
, 1985

1984
Some thoughts on teaching first year programming.
Proceedings of the 15th SIGCSE Technical Symposium on Computer Science Education, 1984

A System for Classifying Program Verification Methods: Assigning Meanings to Program Verification Methods.
Proceedings of the Proceedings, 1984

1983
Representation and manipulation of information systems: A simplified approach.
J. Syst. Softw., 1983

Verifying Programs by Induction on Their Data Structure: General Format and Applications.
Inf. Process. Lett., 1983

A Relational Approach to the Design of Deterministic Programs.
Acta Informatica, 1983

A case for teaching program verification: Its importance in the CS curriculum.
Proceedings of the 14th SIGCSE Technical Symposium on Computer Science Education, 1983

The Bottom up Analysis of While Statements: Strongest Invariant Functions.
Proceedings of the Information Processing 83, 1983

1982
Self-Stabilizing Programs: The Fault-Tolerant Capability of Self-Checking Programs.
IEEE Trans. Computers, 1982

Designing software without backtracking: the part of dream and the part of reality.
ACM SIGSOFT Softw. Eng. Notes, 1982

A Closer Look at Iteration: The Self Stabilizing Capability of Loops.
Proceedings of the Proceedings, 1982

1981
Self-Checking Programs: An Axiomatic Approach to the Validation of Programs by the Use of Assertions
PhD thesis, 1981


  Loading...