default search action
Hamdi Yahyaoui
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j37]Hamdi Yahyaoui, Hosam M. F. AboElFotoh, Yanjun Shu:
A partial order framework for incomplete data clustering. Appl. Intell. 53(7): 7439-7454 (2023) - [j36]Hamdi Yahyaoui, Hosam M. F. AboElFotoh, Yanjun Shu:
A multilevel adaptive reduction technique for time series. Neurocomputing 555: 126657 (2023) - 2022
- [j35]Mohamed Adnan Landolsi, Hamdi Yahyaoui, Mohamed A. Koura:
Efficient Mobile Location Tracking and Data Reduction for Proximity Detection Applications. IEEE Access 10: 134172-134182 (2022) - [j34]Hamdi Yahyaoui, Zakaria Maamar, Mohammed Al-Khafajiy, Hamid Al-Hamadi:
Trust-based management in IoT federations. Future Gener. Comput. Syst. 136: 182-192 (2022) - 2021
- [j33]Khalid Sultan, Jamal Bentahar, Hamdi Yahyaoui, Rabeb Mizouni:
Model checking agent-based communities against uncertain group commitments and knowledge. Expert Syst. Appl. 177: 114792 (2021) - [c34]Hamdi Yahyaoui, Mohammed Almulla, Eiman Boujarwah:
Measuring Semantic Similarity between Services Using Hypergraphs. iiWAS 2021: 205-211 - 2020
- [j32]Mohamed Mejri, Hamdi Yahyaoui, Azzam Mourad, Mohamad Chehab:
A rewriting system for the assessment of XACML policies relationship. Comput. Secur. 97: 101957 (2020) - [j31]Hamdi Yahyaoui, Hala S. Own, Ahmed Agwa, Zakaria Maamar:
A novel scalable representative-based forecasting approach of service quality. Computing 102(11): 2471-2500 (2020)
2010 – 2019
- 2019
- [j30]Hamdi Yahyaoui, Reem Al-Daihani:
A novel trend based SAX reduction technique for time series. Expert Syst. Appl. 130: 113-123 (2019) - 2018
- [j29]Hamdi Yahyaoui, Hala S. Own:
Unsupervised clustering of service performance behaviors. Inf. Sci. 422: 558-571 (2018) - 2017
- [j28]Mohamed Mejri, Hamdi Yahyaoui:
Formal specification and integration of distributed security policies. Comput. Lang. Syst. Struct. 49: 1-35 (2017) - [j27]Jumana El-Qurna, Hamdi Yahyaoui, Mohammed Almulla:
A new framework for the verification of service trust behaviors. Knowl. Based Syst. 121: 7-22 (2017) - 2016
- [j26]Wei Wan, Jamal Bentahar, Hamdi Yahyaoui, Abdessamad Ben Hamza:
Verifying concurrent probabilistic systems using probabilistic-epistemic logic specifications. Appl. Intell. 45(3): 747-776 (2016) - [j25]Azzam Mourad, Hanine Tout, Chamseddine Talhi, Hadi Otrok, Hamdi Yahyaoui:
From model-driven specification to design-level set-based analysis of XACML policies. Comput. Electr. Eng. 52: 65-79 (2016) - [j24]Hamdi Yahyaoui, Aisha Al-Mutairi:
A feature-based trust sequence classification algorithm. Inf. Sci. 328: 455-484 (2016) - [j23]Aisha Al-Mutairi, Hamdi Yahyaoui, Hazem M. Raafat:
Lattice-based ranking for service trust behaviors. Knowl. Based Syst. 102: 20-38 (2016) - [i1]Mohamed Mejri, Hamdi Yahyaoui:
A Rewriting System for the Assessment of XACML Policies Similarity. CoRR abs/1605.05887 (2016) - 2015
- [j22]Hamdi Yahyaoui, Hala S. Own, Zaki Malik:
Modeling and classification of service behaviors. Expert Syst. Appl. 42(21): 7610-7619 (2015) - [j21]Hala S. Own, Hamdi Yahyaoui:
Rough set based classification of real world Web services. Inf. Syst. Frontiers 17(6): 1301-1311 (2015) - [j20]Mohammed Almulla, Hamdi Yahyaoui, Kawthar Al-Matori:
A new fuzzy hybrid technique for ranking real world Web services. Knowl. Based Syst. 77: 1-15 (2015) - [c33]Zakaria Maamar, Hamdi Yahyaoui, Azzam Mourad, Mohamed Sellami:
Analyzing Social Web Services' Capabilities. WETICE 2015: 122-127 - 2014
- [j19]Hamdi Yahyaoui, Mohammed Almulla, Hala S. Own:
A novel non-functional matchmaking approach between fuzzy user queries and real world web services based on rough sets. Future Gener. Comput. Syst. 35: 27-38 (2014) - [c32]Hamdi Yahyaoui, Mohammed Almulla, Zakaria Maamar:
A Fuzzy Model for Selecting Social Web Services. WISE (2) 2014: 32-46 - 2013
- [j18]Jamal Bentahar, Hamdi Yahyaoui, Melissa Kova, Zakaria Maamar:
Symbolic model checking composite Web services using operational and control behaviors. Expert Syst. Appl. 40(2): 508-522 (2013) - [j17]Hamdi Yahyaoui, Zakaria Maamar, Erbin Lim, Philippe Thiran:
Towards a community-based, social network-driven framework for Web services management. Future Gener. Comput. Syst. 29(6): 1363-1377 (2013) - [j16]Hamdi Yahyaoui, Sami Zhioua:
Bootstrapping trust of Web services based on trust patterns and Hidden Markov Models. Knowl. Inf. Syst. 37(2): 389-416 (2013) - 2012
- [j15]Azzam Mourad, Sara Ayoubi, Hamdi Yahyaoui, Hadi Otrok:
A novel aspect-oriented BPEL framework for the dynamic enforcement of web services security. Int. J. Web Grid Serv. 8(4): 361-385 (2012) - [j14]Ali A. Kanso, Hamdi Yahyaoui, Mohammed Almulla:
Keyed hash function based on a chaotic map. Inf. Sci. 186(1): 249-264 (2012) - [j13]Hamdi Yahyaoui:
A trust-based game theoretical model for Web services collaboration. Knowl. Based Syst. 27: 162-169 (2012) - [j12]Hamdi Yahyaoui, Azzam Mourad, Mohammed Almulla, Lina Yao, Quan Z. Sheng:
A synergy between context-aware policies and AOP to achieve highly adaptable Web services. Serv. Oriented Comput. Appl. 6(4): 379-392 (2012) - [c31]Hanine Tout, Azzam Mourad, Hamdi Yahyaoui, Chamseddine Talhi, Hadi Otrok:
Towards a BPEL model-driven approach for Web services security. PST 2012: 120-127 - [c30]Mohammed Almulla, Hamdi Yahyaoui, Kawthar Almatori:
Visualization of Real-World Web Services Based on Fuzzy Logic. SERVICES 2012: 330-335 - 2011
- [c29]Azzam Mourad, Hadi Otrok, Hamdi Yahyaoui, Lama Baajour:
Toward an abstract language on top of XACML for web services security. ICITST 2011: 254-259 - [c28]Hamdi Yahyaoui, Sami Zhioua:
Bootstrapping Trust of Web Services through Behavior Observation. ICWE 2011: 319-330 - [c27]Mohammed Almulla, Kawthar Almatori, Hamdi Yahyaoui:
A QoS-Based Fuzzy Model for Ranking Real World Web Services. ICWS 2011: 203-210 - [c26]Zakaria Maamar, Noura Faci, Leandro Krug Wives, Hamdi Yahyaoui, Hakim Hacid:
Towards a Method for Engineering Social Web Services. ME 2011: 153-167 - [c25]Zakaria Maamar, Hamdi Yahyaoui, Erbin Lim, Philippe Thiran:
Social Engineering of Communities of Web Services. SAINT 2011: 100-109 - [c24]Hamdi Yahyaoui, L. Wang, Azzam Mourad, Mohammed Almulla, Quan Z. Sheng:
Towards context-adaptable Web service policies. ANT/MobiWIS 2011: 610-617 - 2010
- [j11]Hamdi Yahyaoui, Zakaria Maamar, Khouloud Boukadi:
A framework to coordinate web services in composition scenarios. Int. J. Web Grid Serv. 6(2): 95-123 (2010) - [j10]Quan Z. Sheng, Zakaria Maamar, Hamdi Yahyaoui, Jamal Bentahar, Khouloud Boukadi:
Separating Operational and Control Behaviors: A New Approach to Web Services Modeling. IEEE Internet Comput. 14(3): 68-76 (2010) - [c23]Hamdi Yahyaoui, Mohammed Almulla:
Context-based specification of Web service policies using WSPL. ICDIM 2010: 496-501 - [c22]Hamdi Yahyaoui:
Trust Assessment for Web Services Collaboration. ICWS 2010: 315-320 - [c21]Azzam Mourad, Sara Ayoubi, Hamdi Yahyaoui, Hadi Otrok:
New approach for the dynamic enforcement of Web services security. PST 2010: 189-196
2000 – 2009
- 2009
- [j9]Hadi Otrok, Benwen Zhu, Hamdi Yahyaoui, Prabir Bhattacharya:
An Intrusion Detection Game Theoretical Model. Inf. Secur. J. A Glob. Perspect. 18(5): 199-212 (2009) - [c20]Zakaria Maamar, Quan Z. Sheng, Hamdi Yahyaoui, Jamal Bentahar, Khouloud Boukadi:
A New Approach to Model Web Services' Behaviors Based on Synchronization. AINA Workshops 2009: 43-49 - [c19]Zakaria Maamar, Quan Z. Sheng, Hamdi Yahyaoui, Khouloud Boukadi, Xitong Li:
On the Synchronization of Web Services Interactions. AINA 2009: 644-651 - [c18]Hamdi Yahyaoui:
A Reputation-Based Game for Tasks Allocation. ICEIS 2009: 728-736 - [c17]Hamdi Yahyaoui, Zakaria Maamar, Jamal Bentahar, Khouloud Boukadi:
Web Services Synchronization in Composition Scenarios. MALLOW 2009 - [c16]Melissa Kova, Jamal Bentahar, Zakaria Maamar, Hamdi Yahyaoui:
A Formal Verification Approach of Conversations in Composite Web Services Using NuSMV. SoMeT 2009: 245-261 - 2008
- [j8]Zakaria Maamar, Quan Z. Sheng, Djamal Benslimane, Hamdi Yahyaoui:
Web Services Interactions: Analysis, Modeling, and Management. Int. J. Softw. Eng. Knowl. Eng. 18(2): 179-198 (2008) - [c15]Said Elnaffar, Zakaria Maamar, Hamdi Yahyaoui, Jamal Bentahar, Philippe Thiran:
Reputation of Communities of Web Services - Preliminary Investigation. AINA Workshops 2008: 1603-1608 - [c14]Ibrahim Kamel, Hamdi Yahyaoui:
Identifying malicious peers in MANETs. ICECS 2008: 898-901 - [c13]Hamdi Yahyaoui, Zakaria Maamar, Jamal Bentahar, Nabil Sahli, Said Elnaffar, Philippe Thiran:
On the reputation of communities of web services. NOTERE 2008: 4:1-4:8 - 2007
- [j7]Zakaria Maamar, Hamdi Yahyaoui, Qusay H. Mahmoud:
Dynamic management of UDDI registries in a wireless environment of web services: Concepts, architecture, operation, and deployment. J. Intell. Inf. Syst. 28(2): 105-131 (2007) - [c12]Zakaria Maamar, Quan Z. Sheng, Hamdi Yahyaoui, Djamal Benslimane, Fenglin Liu:
On Checking the Compatibility of Web Services' Policies. PDCAT 2007: 125-130 - [c11]Hamdi Yahyaoui, Mourad Debbabi, Nadia Tawbi:
A Denotational Semantic Model for Validating JVML/CLDC Optimizations under Isabelle/HOL. QSIC 2007: 348-355 - 2006
- [j6]Mourad Debbabi, Abdelouahed Gherbi, Azzam Mourad, Hamdi Yahyaoui:
A selective dynamic compiler for embedded Java virtual machines targeting ARM processors. Sci. Comput. Program. 59(1-2): 38-63 (2006) - 2005
- [j5]Mourad Debbabi, Azzam Mourad, Chamseddine Talhi, Hamdi Yahyaoui:
Accelerating embedded Java for mobile devices. IEEE Commun. Mag. 43(9): 80-85 (2005) - [j4]Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Hamdi Yahyaoui, Sami Zhioua, Nadia Tawbi:
E-Bunny: A Dynamic Compiler for Embedded Java Virtual Machines. J. Object Technol. 4(1): 83-108 (2005) - [j3]Zakaria Maamar, Soraya Kouadri Mostéfaoui, Hamdi Yahyaoui:
Toward an Agent-Based and Context-Oriented Approach for Web Services Composition. IEEE Trans. Knowl. Data Eng. 17(5): 686-697 (2005) - [c10]Zakaria Maamar, Irfan Younas, Djamal Benslimane, Chirine Ghedira, Hamdi Yahyaoui:
On Self-Coordinating Web Services Using Similarity and Neural Networks. EEE 2005: 171-176 - [c9]Zakaria Maamar, Djamal Benslimane, Chirine Ghedira, Qusay H. Mahmoud, Hamdi Yahyaoui:
Tuple spaces for self-coordination of web services. SAC 2005: 1656-1660 - 2004
- [j2]Zakaria Maamar, Hamdi Yahyaoui, Wathiq Mansoor:
Design and Development of an M-Commerce Environment: The E-CWE Project. J. Organ. Comput. Electron. Commer. 14(4): 285-303 (2004) - [c8]Zakaria Maamar, Soraya Kouadri Mostéfaoui, Hamdi Yahyaoui, Willem-Jan van den Heuvel:
Towards an Agent-Based and Context-Oriented Approach to Compose Web Services. ICEIS (4) 2004: 214-221 - [c7]Zakaria Maamar, Hamdi Yahyaoui, Qusay H. Mahmoud, Soraya Kouadri Mostéfaoui, Wathiq Mansoor:
Messengers for the Dynamic Management of Distributed UDDI Registries. MobiQuitous 2004: 346-355 - [c6]Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Nadia Tawbi, Hamdi Yahyaoui, Sami Zhioua:
A dynamic compiler for embedded Java virtual machines. PPPJ 2004: 100-106 - [c5]Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Hamdi Yahyaoui, Sami Zhioua:
a synergy between efficient interpretation and fast selective dynamic compilation for the acceleration of embedded Java virtual machines. PPPJ 2004: 107-113 - [c4]Zakaria Maamar, Soraya Kouadri Mostéfaoui, Hamdi Yahyaoui:
A Web services composition approach based on software agents and context. SAC 2004: 1619-1623 - [c3]Zakaria Maamar, Hamdi Yahyaoui, Qusay H. Mahmoud, Fahim Akhter:
Dynamic Management of UDDI Registries in a Wireless Environment of Web Services. WWIC 2004: 284-294 - 2003
- [c2]Mourad Debbabi, M. M. Erhioui, Lamia Ketari, Nadia Tawbi, Hamdi Yahyaoui, Sami Zhioua:
Method Call Acceleration in Embedded Java Virtual Machines. International Conference on Computational Science 2003: 750-759 - 2001
- [j1]Zakaria Maamar, Hamdi Yahyaoui, Wathiq Mansoor, Willem-Jan van den Heuvel:
Software agents and wireless E-commerce. SIGecom Exch. 2(3): 10-17 (2001) - [c1]Zakaria Maamar, Wathiq Mansoor, Hamdi Yahyaoui:
E-Commerce through Wireless Devices. WETICE 2001: 31-36
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-28 23:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint