Hakim Belhaouari

Orcid: 0000-0003-4454-7756

According to our database1, Hakim Belhaouari authored at least 14 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Topological Data Structure: The Fast Marching Example.
Proceedings of the 18th International Joint Conference on Computer Vision, 2023

2022
Preserving consistency in geometric modeling with graph transformations.
Math. Struct. Comput. Sci., March, 2022

Topological consistency preservation with graph transformation schemes.
Sci. Comput. Program., 2022

Inferring topological operations on generalized maps: Application to subdivision schemes.
Graph. Vis. Comput., 2022

2020
Transparent Parallelization of Enrichment Operations in Geometric Modeling.
Proceedings of the 15th International Joint Conference on Computer Vision, 2020

2017
A Modular Approach Based On Graph Transformation To Simulate Tearing And Fractures On Various Mechanical Models.
J. WSCG, 2017

A General Physical-topological Framework using Rule-based Language for Physical Simulation.
Proceedings of the 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2017) - Volume 1: GRAPP, Porto, Portugal, February 27, 2017

Geometric Modeling: Consistency Preservation Using Two-Layered Variable Substitutions.
Proceedings of the Graph Transformation - 10th International Conference, 2017

2014
Jerboa: A Graph Transformation Library for Topology-Based Geometric Modeling.
Proceedings of the Graph Transformation - 7th International Conference, 2014

2012
A Design by Contract Approach to Verify Access Control Policies.
Proceedings of the 17th IEEE International Conference on Engineering of Complex Computer Systems, 2012

2011
Specification and Verification of Access Control Policies in EB3SEC: Work in Progress.
Proceedings of the Foundations and Practice of Security, 2011

2008
A Lightweight Container Architecture for Runtime Verification.
Proceedings of the Runtime Verification, 8th International Workshop, 2008

A Constraint Logic Programming Approach to Automated Testing.
Proceedings of the Logic Programming, 24th International Conference, 2008

Automated Generation of Test Cases from Contract-Oriented Specifications: A CSP-Based Approach.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008


  Loading...