Ali Mili
Ali Mili
NJIT
Verified email at themilis.net
TitleCited byYear
Reusing software: Issues and research directions
H Mili, F Mili, A Mili
IEEE transactions on Software Engineering 21 (6), 528-562, 1995
9221995
Storing and retrieving software components: A refinement based system
R Mili, A Mili, RT Mittermeir
IEEE Transactions on Software Engineering 23 (7), 445-460, 1997
3391997
Reuse-based software engineering: techniques, organization, and controls
H Mili, A Mili, S Yacoub, E Addy
Wiley-Interscience, 2001
3302001
A survey of software reuse libraries
A Mili, R Mili, RT Mittermeir
Annals of Software Engineering 5 (1), 349-414, 1998
2551998
Architectural-level risk analysis using UML
K Goseva-Popstojanova, A Hassan, A Guedem, W Abdelmoez, ...
IEEE transactions on software engineering 29 (10), 946-960, 2003
1922003
On the lattice of specifications: Applications to a specification methodology
N Boudriga, F Elloumi, A Mili
Formal Aspects of Computing 4 (6), 544-571, 1992
1141992
A cybersecurity model in cloud computing environments
LBA Rabai, M Jouini, AB Aissa, A Mili
Journal of King Saud University-Computer and Information Sciences 25 (1), 63-75, 2013
1042013
Error propagation in software architectures
W Abdelmoez, DM Nassar, M Shereshevsky, N Gradetsky, R Gunnalan, ...
10th International Symposium on Software Metrics, 2004. Proceedings., 384-393, 2004
952004
Toward an engineering discipline of software reuse
A Mili, S Yacoub, E Addy, H Mili
IEEE software 16 (5), 22-31, 1999
701999
An integrated cost model for software reuse
A Mili, SF Chmiel, R Gottumukkala, L Zhang
Proceedings of the 2000 International Conference on Software Engineering …, 2000
652000
An empirical study of programming language trends
Y Chen, R Dios, A Mili, L Wu, K Wang
IEEE software 22 (3), 72-79, 2005
632005
A relational approach to the design of deterministic programs
A Mili
Acta Informatica 20 (4), 315-328, 1983
571983
Quantifying security threats and their potential impacts: a case study
AB Aissa, RK Abercrombie, FT Sheldon, A Mili
Innovations in Systems and Software Engineering 6 (4), 269-281, 2010
542010
Embedding a demonic semilattice in a relation algebra
J Desharnais, N Belkhiter, SBM Sghaier, F Tchier, A Jaoua, A Mili, ...
Theoretical Computer Science 149 (2), 333-360, 1995
541995
Integration of sequential scenarios
J Desharnais, M Frappier, R Khédri, A Mili
IEEE Transactions on Software Engineering 24 (9), 695-708, 1998
501998
Relational heuristics for the design of deterministic programs
A Mili, J Desharnais, F Mili
Acta Informatica 24 (3), 239-276, 1987
501987
Characterizing a software component
S Yacoub, H Ammar, A Mili
International Workshop on Component-Based Software Engineering 298, 1999
481999
Defining and applying measures of distance between specifications
LL Jilani, J Desharnais, A Mili
IEEE Transactions on Software Engineering 27 (8), 673-703, 2001
472001
Towards quantitative measures of Information Security: A Cloud Computing case study
M Jouini, AB Aissa, LBA Rabai, A Mili
International Journal of Cyber-Security and Digital Forensics 1 (3), 265-279, 2012
432012
A relational calculus for program construction by parts
M Frappier, A Mili, J Desharnais
Science of Computer Programming 26 (1-3), 237-254, 1996
39*1996
The system can't perform the operation now. Try again later.
Articles 1–20