Mohamed Mezghiche

According to our database1, Mohamed Mezghiche authored at least 37 papers between 1984 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Multi-agent medical image segmentation: A survey.
Comput. Methods Programs Biomed., April, 2023

2020
Hiding a fault enabled virus through code construction.
J. Comput. Virol. Hacking Tech., 2020

A Cooperative Approach Based on Local Detection of Similarities and Discontinuities for Brain MR Images Segmentation.
J. Medical Syst., 2020

A stochastic multi-agent approach for medical-image segmentation: Application to tumor segmentation in brain MR images.
Artif. Intell. Medicine, 2020

2019
A New AOMDV Lifetime Prolonging Routing Algorithm for Ad-Hoc Networks.
Int. J. Interdiscip. Telecommun. Netw., 2019

Reverse engineering Java Card and vulnerability exploitation: a shortcut to ROM.
Int. J. Inf. Sec., 2019

Formal methods in dynamic software updating: a survey.
Int. J. Crit. Comput. Based Syst., 2019

2018
Machine learning techniques to predict sensitive patterns to fault attack in the Java Card application.
J. Exp. Theor. Artif. Intell., 2018

A Formalized Procedure for Database Horizontal Fragmentation in Isabelle/HOL Proof Assistant.
Proceedings of the Model and Data Engineering - 8th International Conference, 2018

2017
A formal verification of dynamic updating in a Java-based embedded system.
Int. J. Crit. Comput. Based Syst., 2017

Reverse engineering a Java Card memory management algorithm.
Comput. Secur., 2017

Towards a Generic Multi-agent Approach for Medical Image Segmentation.
Proceedings of the PRIMA 2017: Principles and Practice of Multi-Agent Systems - 20th International Conference, Nice, France, October 30, 2017

Rethinking of I/O-automata composition.
Proceedings of the 2017 Forum on Specification and Design Languages, 2017

2016
A Formal Verification of Safe Update Point Detection in Dynamic Software Updating.
Proceedings of the Risks and Security of Internet and Systems, 2016

The Hell Forgery - Self Modifying Codes Shoot Again.
Proceedings of the Smart Card Research and Advanced Applications, 2016

2015
A distance based approach for link analysis in XML information retrieval.
Comput. Syst. Sci. Eng., 2015

An Approach for Formal Verification of Updated Java Bytecode Programs.
Proceedings of the 9th Workshop on Verification and Evaluation of Computer and Communication Systems, 2015

2014
Integrating a Formal Development for DSLs into Meta-Modeling.
J. Data Semant., 2014

A Mobile Multi Agent System for Routing in Adhoc Network.
Proceedings of the PECCS 2014, 2014

Searching XML Element Using Terms Propagation Method.
Proceedings of the Foundations of Intelligent Systems - 21st International Symposium, 2014

Evidential-Link-based Approach for Re-ranking XML Retrieval Results.
Proceedings of the DATA 2014, 2014

2012
Using structural similarity for clustering XML documents.
Knowl. Inf. Syst., 2012

Towards a General Framework for Formal Reasoning about Java Bytecode Transformation.
Proceedings of the Proceedings Fourth International Symposium on Symbolic Computation in Software Science, 2012

Formal verification of a proof procedure for the description logic ALC.
Proceedings of the Proceedings Fourth International Symposium on Symbolic Computation in Software Science, 2012

Combining Verification and MDE Illustrated by a Formal Java Development.
Proceedings of the ICT in Education, Research, and Industrial Applications, 2012

A Case Study in Combining Formal Verification and Model-Driven Engineering.
Proceedings of the 8th International Conference on ICT in Education, 2012

2011
Evaluation of e-Government Information Systems Agility in the Perspective of Sustainability.
Proceedings of the Electronic Government and the Information Systems Perspective, 2011

Evaluative Framewok for the Measurement of Egovernment Information Systems Agility.
Proceedings of the Third International Conference on Computer Science and its Applications (CIIA'11), 2011

A Distributed Intrusion Detection Model Based on a Society of Intelligent Mobile Agents for Ad Hoc Network.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Investigation of e-Government Information Systems Agility .
Proceedings of the KMIS 2010, 2010

2009
Prise en compte des liens pour améliorer la recherche d'information structurée.
Proceedings of the COnférence en Recherche d'Infomations et Applications, 2009

RI structurée, RI et XML, RI précise.
Proceedings of the COnférence en Recherche d'Infomations et Applications, 2009

2003
Another Implementation Technique for Functional Programming Languages.
Proceedings of the Journées francophones des langages applicatifs (JFLA'03), 2003

1997
c-beta-Machine with lambda-beta-Reduction.
Theor. Comput. Sci., 1997

1991
Weak Completeness of Type Assignment in lambda-Calculus Models: A Generalization of Hindley's Result.
Theor. Comput. Sci., 1991

1989
On Pseudo-c-beta-Normal Form in Combinatory Logic.
Theor. Comput. Sci., 1989

1984
Une Nouvelle C beta-Réduction dans la Logique Combinatoire.
Theor. Comput. Sci., 1984


  Loading...