default search action
Abdelli Abdelkrim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Mohamed Riadh Kadri, Abdelkrim Abdelli, Jalel Ben-Othman, Lynda Mokdad:
Survey and classification of Dos and DDos attack detection and validation approaches for IoT environments. Internet Things 25: 101021 (2024) - [j25]Abdelkrim Abdelli:
Time distance-based computation of the DBM over-approximation of preemptive real-time systems. J. Log. Algebraic Methods Program. 136: 100927 (2024) - [c39]Mohamed Redha Bouakouk, Abdelli Abdelkrim, Lynda Mokdad, Jalel Ben-Othman:
AOF-RPL: Towards an MCDM Based Adaptive Objective Function in RPL. WINCOM 2024: 1-6 - 2022
- [j24]Abdelkrim Abdelli, Walid Serrai, Lynda Mokdad:
A novel and efficient index based web service discovery approach. Comput. Stand. Interfaces 80: 103586 (2022) - [j23]Meriem Achir, Abdelkrim Abdelli, Lynda Mokdad, Jalel Benothman:
Service discovery and selection in IoT: A survey and a taxonomy. J. Netw. Comput. Appl. 200: 103331 (2022) - [c38]Mohamed Redha Bouakouk, Abdelkrim Abdelli, Lynda Mokdad, Jalel Ben-Othman:
Dealing with complex routing requirements using an MCDM based approach. IWCMC 2022: 1256-1261 - [i3]Abdelkrim Abdelli:
Time distance based computation of the state space of preemptive real time systems. CoRR abs/2201.09784 (2022) - [i2]Mohamed Redha Bouakouk, Abdelkrim Abdelli, Lynda Mokdad, Jalel Ben-Othman:
Dealing with complex routing requirements using an MCDM based approach. CoRR abs/2204.01876 (2022) - [i1]Meriem Achir, Abdelkrim Abdelli, Lynda Mokdad:
Distributed architecture for resource description and discovery in the IoT. CoRR abs/2209.10973 (2022) - 2021
- [j22]Lynda Mokdad, Jean-Michel Fourneau, Abdelkrim Abdelli, Jalel Ben-Othman:
Performance evaluation of a solution for composite service selection problem with multiple consumers. Simul. Model. Pract. Theory 109: 102271 (2021) - [j21]Mohamed Lamine Laouira, Abdelkrim Abdelli, Jalel Ben-Othman, Hyunbum Kim:
An Efficient WSN Based Solution for Border Surveillance. IEEE Trans. Sustain. Comput. 6(1): 54-65 (2021) - [c37]Mohamed Redha Bouakouk, Abdelkrim Abdelli, Lynda Mokdad:
ODM-RPL: Optimized Dual MOP RPL. ISCC 2021: 1-6 - 2020
- [j20]Abdia Hamdani, Abdelkrim Abdelli:
Towards modelling and analyzing timed workflow systems with complex synchronizations. J. King Saud Univ. Comput. Inf. Sci. 32(4): 491-504 (2020) - [j19]Abdelkrim Abdelli, Lynda Mokdad, Youcef Hammal:
Dealing with value constraints in decision making using MCDM methods. J. Comput. Sci. 44: 101154 (2020) - [j18]Youcef Hammal, Khadidja Salah-Mansour, Abdelkrim Abdelli, Lynda Mokdad:
Formal techniques for consistency checking of orchestrations of semantic Web services. J. Comput. Sci. 44: 101165 (2020) - [c36]Mohamed Lamine Laouira, Abdelkrim Abdelli, Jalel Ben-Othman:
Wireless energy supply scheduling strategy in a combined border surveillance architecture. GLOBECOM 2020: 1-6 - [c35]Mohamed Redha Bouakouk, Abdelkrim Abdelli, Lynda Mokdad:
Survey on the Cloud-IoT paradigms: Taxonomy and architectures. ISCC 2020: 1-6 - [c34]Meriem Achir, Abdelkrim Abdelli, Lynda Mokdad:
A taxonomy of service discovery approaches in IoT. WINCOM 2020: 1-6
2010 – 2019
- 2019
- [j17]Walid Serrai, Abdelkrim Abdelli, Lynda Mokdad, Ashref Serrai:
How to deal with QoS value constraints in MCDM based Web service selection. Concurr. Comput. Pract. Exp. 31(24) (2019) - [c33]Mohamed Lamine Laouira, Abdelkrim Abdelli, Jalel Ben-Othman, Hyunbum Kim:
An Adaptive Activation Scheduling Strategy for a Border Surveillance Network. GLOBECOM 2019: 1-5 - [c32]Lynda Mokdad, Jean-Michel Fourneau, Abdelkrim Abdelli:
Performance Evaluation of the QoS Aware Web Service Composition with Communities of Consumers. GLOBECOM 2019: 1-6 - [c31]Youcef Hammal, Khadidja Salah-Mansour, Abdelkrim Abdelli, Lynda Mokdad:
Formal Approach for Compatibility Checking of Orchestrations of Composite Semantic Web Services. ISCC 2019: 1004-1009 - [c30]Abdelkrim Abdelli, Youcef Hammal, Lynda Mokdad:
ISOCOV: a new MCDM method to handle value constraints in Web service selection. ISCC 2019: 1022-1027 - 2018
- [j16]Abdelkrim Abdelli, Lynda Mokdad, Jalel Ben-Othman, Youcef Hammal:
Dealing with a non green behaviour in WSN. Simul. Model. Pract. Theory 84: 124-142 (2018) - [c29]Abdia Hamdani, Abdelkrim Abdelli:
Using the RTPN Model for the Modeling of Complex Workflow Systems. ICAASE 2018: 76-83 - [c28]Haroun Benkaouha, Abdelkrim Abdelli, Jalel Ben-Othman, Lynda Mokdad:
Failure Detection in MANETs based on geographical repartition of nodes. ISCC 2018: 1-6 - 2017
- [j15]Haroun Benkaouha, Nadjib Badache, Abdelli Abdelkrim, Lynda Mokdad, Jalel Ben-Othman:
A novel hybrid protocol of checkpointing and rollback recovery for flat MANETs. Int. J. Auton. Adapt. Commun. Syst. 10(1): 114-138 (2017) - [j14]Walid Serrai, Abdelkrim Abdelli, Lynda Mokdad, Youcef Hammal:
Towards an efficient and a more accurate web service selection using MCDM methods. J. Comput. Sci. 22: 253-267 (2017) - [c27]Abdia Hamdani, Abdelkrim Abdelli:
Time Petri net with rendezvous. CoDIT 2017: 126-131 - [c26]Walid Serrai, Abdelkrim Abdelli, Lynda Mokdad, Ashref Serrai:
Dealing with user constraints in MCDM based web service selection. ISCC 2017: 158-163 - [c25]Jean-Michel Fourneau, Lynda Mokdad, Jalel Ben-Othman, Abdelkrim Abdelli:
Admission Control Based on WRR in WiMAX Networks. WCNC 2017: 1-6 - [c24]Youcef Hammal, Manel Seddiki, Mahfoud Benchaïba, Abdelkrim Abdelli:
Formal Specification and Analysis of a Cross-Layer Overlay P2P Construction Protocol over MANETs. WCNC 2017: 1-6 - 2016
- [j13]Haroun Benkaouha, Abdelli Abdelkrim, Jalel Ben-Othman, Lynda Mokdad:
Towards an efficient failure detection in MANETs. Wirel. Commun. Mob. Comput. 16(17): 2939-2955 (2016) - [c23]Haroun Benkaouha, Abdelli Abdelkrim, Mohamed Guerroumi, Jalel Ben-Othman, Lynda Mokdad:
EAFD, a failure detector for clustered WSN. ICC 2016: 1-6 - [c22]Walid Serrai, Abdelli Abdelkrim, Lynda Mokdad, Youcef Hammal:
An efficient approach for Web service selection. ISCC 2016: 167-172 - [c21]Haroun Benkaouha, Abdelli Abdelkrim, Jalel Ben-Othman, Youcef Zaffoune, Lynda Mokdad:
Distributed implementation of a stable storage for MANET checkpointing protocols. IWCMC 2016: 672-677 - 2015
- [j12]Abdelli Abdelkrim:
Improving the State Space Computation of the Time Stream Petri Nets Model. Comput. J. 58(7): 1607-1627 (2015) - [j11]Youcef Hammal, Jalel Ben-Othman, Lynda Mokdad, Abdelkrim Abdelli:
Formal Modeling of Greedy Nodes in 802.15.4 WSN. ICT Express 1(1): 10-13 (2015) - [j10]Lynda Mokdad, Jalel Ben-Othman, Abdelli Abdelkrim:
Performance evaluation of composite Web services. EAI Endorsed Trans. Ind. Networks Intell. Syst. 2(4): e4 (2015) - [c20]Haroun Benkaouha, Abdelli Abdelkrim, Nadjib Badache, Jalel Ben-Othman, Lynda Mokdad:
Towards Improving Failure Detection in Mobile Ad Hoc Networks. GLOBECOM 2015: 1-6 - [c19]Lynda Mokdad, Youcef Hammal, Jalel Ben-Othman, Abdelli Abdelkrim:
Formal modeling and analysis of greedy behaviors in IEEE 802.11 protocols. ICC 2015: 3579-3584 - [c18]Mohamed Lamine Laouira, Abdelli Abdelkrim, Lynda Mokdad, Jalel Ben-Othman:
An efficient transmitting strategy for image fusion in WMSN. ICC 2015: 5325-5330 - [c17]Abdelli Abdelkrim, Walid Serrai, Lynda Mokdad, Youcef Hammal:
Time Petri Nets for performance evaluation of composite web services architectures. ISCC 2015: 122-127 - [c16]Haroun Benkaouha, Abdelli Abdelkrim, Nadjib Badache, Jalel Ben-Othman, Lynda Mokdad:
AFDAN: Accurate failure detection protocol for MANETs. IWCMC 2015: 733-738 - [p1]Abdelli Abdelkrim:
Towards a General Model to Handle Multi-enabledness in Time Petri Nets. Formalisms for Reuse and Systems Integration 2015: 103-131 - 2014
- [j9]Youcef Hammal, Jalel Ben-Othman, Lynda Mokdad, Abdelli Abdelkrim:
Formal modeling and verification of an enhanced variant of the IEEE 802.11 CSMA/CA protocol. J. Commun. Networks 16(4): 385-396 (2014) - [j8]Youcef Hammal, Quentin Monnet, Lynda Mokdad, Jalel Ben-Othman, Abdelli Abdelkrim:
Timed automata based modeling and veri?cation of denial of service attacks in wireless sensor networks. Stud. Inform. Univ. 12(1): 1-46 (2014) - [c15]Abdelli Abdelkrim, Lynda Mokdad:
Time Petri net based performance evaluation of traffic scheduling in WIMAX networks. GLOBECOM 2014: 368-373 - [c14]Haroun Benkaouha, Lynda Mokdad, Abdelli Abdelkrim:
SAN-based modeling of fault tolerant protocols for MANETs. ICC 2014: 336-341 - [c13]Abdelli Abdelkrim:
Age semantics based state space computation of time Petri nets. IRI 2014: 361-368 - [c12]Youcef Hammal, Jalel Ben-Othman, Lynda Mokdad, Abdelli Abdelkrim:
Formal modeling and checking of an enhanced variant of the IEEE 802.11 CSMA/CA protocol. ISCC 2014: 1-6 - [c11]Lynda Mokdad, Abdelli Abdelkrim, Jalel Ben-Othman:
Detection of Greedy Behavior in WSN Using IEEE 802.15 Protocol. MASCOTS 2014: 106-111 - 2013
- [c10]Haroun Benkaouha, Lynda Mokdad, Abdelli Abdelkrim:
2PACA: Two phases algorithm of checkpointing for Ad hoc mobile networks. IWCMC 2013: 1359-1364 - 2012
- [j7]Abdelli Abdelkrim:
Improving the Construction of the DBM Over Approximation of the State Space of Real-time Preemptive Systems. Acta Cybern. 20(3): 347-384 (2012) - [j6]Abdelli Abdelkrim:
Efficient computation of quantitative properties of real-time preemptive systems. Int. J. Crit. Comput. Based Syst. 3(3): 187-209 (2012) - 2011
- [j5]Abdelli Abdelkrim:
Improving the consistency verification and the quality of multimedia presentations. Int. J. Crit. Comput. Based Syst. 2(3/4): 221-245 (2011) - [j4]Abdelli Abdelkrim, Nadjib Badache:
Context-aware adaptation of multimedia documents for consistent presentations. Multim. Syst. 17(6): 465-486 (2011) - 2010
- [c9]Haroun Benkaouha, Abdelli Abdelkrim, Karima Bouyahia, Yasmina Kaloune:
FDAN: Failure Detection Protocol for Mobile Ad Hoc Networks. FGIT-FGCN (1) 2010: 85-94
2000 – 2009
- 2009
- [j3]Abdelli Abdelkrim:
Optimisation de la construction d'une approximation de l'espace d'état des systèmes préemptifs. Tech. Sci. Informatiques 28(9): 1143-1170 (2009) - [c8]Abdelkrim Abdelli:
Towards a Consistent Semantics for Unsafe Time Petri Nets. FGIT-ASEA 2009: 42-49 - 2008
- [j2]Abdelli Abdelkrim, Nadjib Badache:
Towards Building the State Class Graph of the TSPN Model. Fundam. Informaticae 86(4): 371-409 (2008) - [c7]Abdelli Abdelkrim, Dahbia Yahiatene:
Efficient computation of state space over approximation of preemptive real time systems. AICCSA 2008: 726-733 - [c6]Abdelli Abdelkrim:
Extending the Verification of Multimedia Presentation Consistency to Resource Requirements.. FGCN (1) 2008: 216-219 - 2007
- [b1]Abdelkrim Abdelli:
Validation d'un modèle basée sur les RdPT pour la spécification et l'analyse des systèmes temps réel complexes : Application aux systèmes multimédias. (Time Petri Net based model validation for the specification of complex real time systems : application to multimedia systems). University of Science and Technology Houari Boumediene, Algeria, 2007 - [j1]Abdelli Abdelkrim, Nadjib Badache:
Toward Specifying Multimedia Requirements Using a New Time Petri Net Model. J. Comput. Inf. Technol. 15(3): 195-213 (2007) - [c5]Abdelli Abdelkrim, Nadjib Badache:
Efficient Bandwidth and Buffer Management for Multimedia Data Download. FGCN (1) 2007: 424-429 - 2006
- [c4]Abdelli Abdelkrim, Nadjib Badache:
Synchronized Transitions Preemptive Time Petri Nets: A new model towards specifying multimedia requirements. AICCSA 2006: 17-24 - [c3]Abdelli Abdelkrim, Nadjib Badache:
A Proxy Pre-fetch Scheme for Consistent SMIL Presentation Delivery. AICCSA 2006: 968-975 - [c2]Abdelli Abdelkrim, Nadjib Badache:
A semantic based pre-fetch scheme for SMIL presentation proxy-delivery. MMM 2006 - 2004
- [c1]Abdelli Abdelkrim, M. Daoudi:
Towards SMIL Document Analysis Using an Algebraic Time Net. PCM (3) 2004: 273-281
Coauthor Index
aka: Jalel Benothman
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-26 01:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint