Hanêne Ben-Abdallah

Hanêne Ben-Abdallah
Higher Colleges of Technology

Professor

About

272
Publications
81,176
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,927
Citations
Introduction
Hanêne Ben-Abdallah currently works at the Higher Colleges of Technology, UAE. Hanêne does research in Software and Business Process Engineering.
Additional affiliations
September 2013 - August 2018
King Abdulaziz University
Position
  • Professor (Full)
September 1997 - August 2013
University of Sfax
Position
  • Professor (Full)
July 1996 - July 1997
University of Waterloo
Position
  • PostDoc Position
Education
September 1991 - August 1996
September 1989 - May 1991
September 1985 - June 1989

Publications

Publications (272)
Conference Paper
Density-based clustering algorithms have recently gained in popularity in data mining because of their ability to discover clusters of any shape. For these algorithms, clusters are considered to be high-density regions separated from one another by hollow or low-density regions. The choice among the existing density-based classification algorithms...
Chapter
The necessity of aligning an enterprise’s Information System (IS) model to its Business Process (BP) model is incontestable. However, the main difficulty of establishing/maintaining BP-IS models alignment stems from the dissimilarities in the knowledge of the information system developers and the business process experts. To face these predicaments...
Article
Full-text available
Most of the computer vision applications for human activity recognition exploit the fact that body features calculated from a 3D skeleton increase robustness across persons and can lead to higher performance. However, their success in activity recognition, including falls, depends on the correspondence between the human activities and the used join...
Article
The emergence and quick adoption of social media, exemplified with Web 2.0 applications like Facebook and Instagram, have led to a new form of Business Processes (BP) called Social Business Process (SBP). An SBP encompasses aspects from both the business world and the social world. Contrarily to the business aspects, which can be captured using exi...
Article
Goal-oriented approaches in data warehouse development projects still face two main issues. First, analysts often lack domain knowledge required during goal decomposition. This may lead to identifying erroneous requirements that most likely propagate to the remaining project phases, potentially leading to the project failure. Second, the identifica...
Article
Full-text available
One of the ultimate challenges in change impact analysis is traceability modeling between several software artifacts in the software life cycle. This paper proposes a traceability approach that relates requirements and design artifacts modeled in UML. Our method faces two essential challenges: the semantic ambiguities of requirement artifacts that...
Chapter
Full-text available
Besides its application in the software development lifecycle, COSMIC Functional Size Measurement (FSM) is investigated as a means to measure the size of business processes (BP). This paper proposes a comprehensive COSMIC FSM-based framework to verify the conformity of the business process design and run-time models with their aligned information s...
Article
Full-text available
Despite their adoption in many applications, density-based clustering algorithms perform inefficiently when dealing with data with varied density, imbricated and/or adjacent clusters. Clusters of lower density may be classified as outliers, and adjacent and imbricated clusters with varied density may be aggregated. To handle this inefficiency, the...
Article
Containers are a new service model that empowers cloud computing by o�ering horizontally scalable systems while bypassing highperformance challenges of traditional hypervisors. In the business process management context, Containers-as-a-Service can be used to outsource business processes to the cloud and allow an enterprise to bundle its processes...
Article
Social business processes support enterprises tap into the opportunities of Web 2.0. To ensure an efficient support, this paper presents an approach for identifying an enterprise's business processes that could be converted into social. Indeed, not all processes are eligible for this conversion. The approach is built upon the concept of enterprise...
Article
Context: Managing requirements change is a central issue in the software development industry. In fact, inappropriate decisions about a change request may jeopardize the project development progress by going over budget/time or delivering a software with functional requirements that do not fully meet the user’s needs. Hence, a change decision suppo...
Article
Todays enterprises seek innovative ways that would help them to demystify the social relations that exist between them and their stakeholders. To this end, these enterprises have been looking into integrating Web 2.0 into their Business Processes (BP) to develop Social Business Processes (SBP). Evidently, an enterprise cannot socialise all its BPs...
Article
Full-text available
The design phase of a data warehousing project remains difficult for both decision makers and requirements analysts. In this paper, we tackle this difficulty through two contributions. First, we propose a natural language based and goal-oriented template for requirements specification that includes all concepts of the decision-making process. The u...
Article
Purpose: The quality of a Business Process (BP) model is vital for the successful accomplishment of all its lifecycle phases. Indeed, a high-quality BP model makes its implementation, execution, and evaluation easier. In the literature, the improvement of BP model quality has been dealt with using several techniques. For instance, modeling guidelin...
Article
Configurable processes are increasingly being adopted by enterprises that seek experience sharing and best practice adoption. A configurable process is a customizable model that specifies how different enterprises perform similar processes. At the modeling level, a configurable process model provides for flexible business process (BP) reuse by (de)...
Article
Full-text available
The widespread usage of various types of computer devices with different platform characteristics created a need for new methods and tools to support the development of context-aware applications capable of dynamically adapting themselves to context changes. In this paper, we present a new model-based approach that addresses the development of cont...
Article
Full-text available
In this paper, we propose a Focused Crawler for Cloud service Discovery (FC4DC). Its service oriented architecture ensures an easier modification for rapid updating and better performance. Furthermore, the proposed crawler guarantees saving the search time and a better exploitation of the provider offerings thanks to a dedicated Cloud service descr...
Chapter
In this paper, we present Watchful-Eye, a 3D skeleton-based system to monitor a physically disabled person using a cane as a mobility aid. Watchful-Eye detects fall occurrences using skeleton tracking with a Microsoft Kinect camera. Compared to existing systems, it has the merit of detecting various types of fall under multiple scenarios and postur...
Chapter
Modeling is the first stage in a Business Process’s (BP) lifecycle. A high-quality BP model is vital to the successful implementation, execution, and monitoring stages. Different works have evaluated BP models from a quality perspective. These works either used formal verification or a set of quality metrics. This paper adopts quality metric and ta...
Article
This research paper presents a new approach that constitutes a first step towards programming using language-independent requirements. To leverage the needed programming effort, our approach takes requirements in the form of language-independent use case scenarios. Then, it generates the inputs of a code generator which, in turn, produces the corre...
Conference Paper
In the 21st century, the majority of enterprises are considering ways to change/restructure their business process models (BPM) to adapt with the environmental changes in the context of development/improvement. This will allow for the removal of unnecessary, the merging of existing and the option of adding new activities. These changes regularly re...
Chapter
A Software Product Line (SPL) is a set of systems that share a group of manageable features and satisfy the specific needs of a particular domain. The features of an SPL can be used in variable combinations to derive product variants in the SPL domain. Because SPLs promote product development through reuse, it is vital to have a means to measure th...
Article
Full-text available
This paper deals with the Knapsack Problem with conflicts, also known as the Disjunctively Constrained Knapsack Problem. The conflicts are represented by a graph whose vertices are the items such that adjacent items cannot be packed in the knapsack simultaneously. We consider a classical formulation for the problem, study the polytope associated wi...
Article
The effectiveness of reuse in the development of software prompted researchers to look for reuse techniques for business process modelling. Indeed, a variety of reusable business artefact types has been proposed during the last decade. Among the recently proposed reuse artefact types, semantic business process patterns (SB2Ps) offer process pattern...
Conference Paper
To help developing continuous improvement in Information and Communication Technology, new software applications are required with functionality and characteristics different from the traditional one. Thus, measurement procedures need to be tailored to this new computing context. In fact, the software functional size is one of the important project...
Article
Full-text available
Purpose Restructuring a business process (BP) model may enhance the BP performance and improve its understandability. So-far proposed restructuring methods use either refactoring which focuses on structural aspects, social network discovery which uses semantic information to guide the affiliation process during its analysis, or social network redis...
Conference Paper
Full-text available
Cloud computing has been recently empowered with a new service offering called Containers-as-a-Service (CaaS). This offers horizontally scalable, deployable systems and it bypasses high-performance challenges of traditional hypervisors when deploying applications. This paper assists in using CaaS for business process outsourcing to the cloud–an eme...
Article
Full-text available
Today's computing development is being characterized by the rapid development of high speed networks and the increase in computing power. Computing is not any more limited to the supercomputers, PCs and laptops but also smart phones and tablets which are available for billions of users offering high computing performances at low cost and interconne...
Article
Full-text available
Load balancing functionalities are crucial for best Grid performance and utilization. Accordingly,this paper presents a new meta-scheduling method called TunSys. It is inspired from the natural phenomenon of heat propagation and thermal equilibrium. TunSys is based on a Grid polyhedron model with a spherical like structure used to ensure load balan...
Conference Paper
The lack of a system that assists in the business process out-sourcing to the cloud hinders the widespread adoption of this emerging computing paradigm. To the best of our knowledge, there is no system that has tackled the business process outsourcing to the cloud issues such as selecting the activities to outsource and the cloud services to suppor...
Article
The design phase of a data warehousing project remains difficult for both decision-makers and requirements analysts. In this paper, we tackle this difficulty through two contributions. First, we propose a natural language based and goal-oriented template for requirements specification that includes all concepts of the decision-making process. The u...
Article
Highly motivated by the advantages of cloud computing, enterprises are considering outsourcing their business processes to the cloud to reduce their cost, increase their flexibility, and enhance their performance. The purpose of this paper is to propose a comprehensive end-to-end framework for business process outsourcing to the cloud, that conside...
Article
In this paper, we deal with the development of dynamically reconfigurable embedded systems in terms of the production of execution schedules of system tasks (feasible configuration) under hard real-time constraints. Indeed, several real-time embedded systems must be dynamically reconfigured to account for hardware/software faults and/or maintain ac...
Conference Paper
Paying attention to authenticity, as a security requirement, in the early phases of the software life-cycle (such as requirement and-or design) can save project cost, time, and effort. However, in the ISO 25010 quality model which describes quality sub-characteristics, authenticity measures are not explicitly described, neither are they documented...
Chapter
Capitalizing on Web 2.0 to improve communication and knowledge sharing among stakeholders, a new form of Business Processes (BP), called Social Business Processes (SBP), has emerged. This chapter provides a social business process meta-model called SBP2M that enriches an existing business process meta-model with social aspect. It also proposes a do...
Conference Paper
Similar to software products, the quality of a Business Process model is vital to the success of all the phases of its lifecycle. Indeed, a high quality BP model paves the way to the successful implementation, execution and performance of the business process. In the literature, the quality of a BP model has been assessed through either the applica...
Article
Software as a Service (SaaS) is increasingly being adopted as a provision model where applications are hosted in a Cloud computing environment. To offer a SaaS with flexible functions at a low cost, the concept of composite SaaS was introduced as a combination of Cloud and Web services. Operating in a dynamic and volatile environment like the Cloud...
Article
Full-text available
In this work, we propose ENVISION an assistance system for safe navigation of visually impaired smartphone users. The proposed system generates an intelligent decision to manage the navigation of visually impaired people based on the fusion of GPS technology directions and a new obstacle detection method. It copes with many challenges related to su...
Conference Paper
Recommendation systems provide suggestions for items that are potentially interesting for a user in a given context. The provided recommendations are extracted generally from a huge amount of data collected from several sources of information. Thus a recommendation system requires firstly a pre-treatment step to prepare the data and secondly the ap...
Conference Paper
UML diagrams became a common part of software requirement documentation, implementation, etc. In particular, the Use Case Diagram (UCD) is considered as the de-facto standard for modelling the user requirements at an early phase of the Software Development Life Cycle (SDLC). Each use case can be detailed by an Activity Diagram (UAD). Because Functi...
Conference Paper
A Social Business Process (SBP) is the result of blending social computing (a.k.a. Web 2.0) with business process (BP). Despite the bene�ts of SBP to enterprises, several limitations continue to undermine them. In this paper, we address two speci�c limitations, namely the di�culty of capturing SBP's requirements and the lack of a de�nition for SBP....
Article
As the complexity of software increases, the choice of the appropriate software architecture becomes a critical task. This paper provides a guideline for selecting the appropriate software architecture based on pertinent ISO 25010 quality characteristics. The guideline was established through an analytical survey of 113 papers published from 2010 t...
Article
Given the inevitable software evolution, change impact analysis (CIA) is a vital activity in the software development life cycle. Existing CIA methods either focus on one model produced during one development phase or ignore the semantic dependencies among the various models produced throughout the development phases. The herein proposed CIA method...
Conference Paper
Visual impairments suffer many difficulties when they navigate from one place to another in their daily life. The biggest problem is obstacle detection. In this work, we propose a new smartphone-based method for obstacle detection. We aim to detect static and dynamic obstacles in unknown environments while offering maximum flexibility to the user a...
Article
Context: Because functional changes are inevitable throughout the software life-cycle, it is essential to assess and evaluate whether a Functional Change (FC) can be handled within the estimated project budget and time. Thus, a well-defined change measure and control process is vital for the success of the development project. In fact, the size mea...
Conference Paper
Because of software requirements play a critical role in software development projects, measuring the non-functional requirements as well as functional requirements is therefore not to be trifled with. Software security as a non-functional requirement is one of the most important quality characteristic that is recently added in the ISO 25010 qualit...
Article
Full-text available
Composite software as a service (SaaS)-based SOA offers opportunities for enterprises to offer value-added services. The cornerstone for such a business is service level agreements between Cloud customers and Cloud providers. In spite of the hype surrounding composite SaaS, standardized methods that enable a reliable management of service level agr...
Article
A biometric identification system is an automatic pattern recognition system that identifies a person through their specific physiological and/or behavioral characteristics. Unimodal biometric system often suffers from some limitations due to noise in sensed data, intra-class variation, inter-class similarities, spoof attacks, etc. Multi-biometric...
Article
Given a set of items, each with a profit and a weight and a conflict graph describing incompatibilities between items, the Disjunctively Constrained Knapsack Problem is to select the maximum profit set of compatible items while satisfying the knapsack capacity constraint. We develop a probabilistic tabu search heuristic with multiple neighborhood s...
Article
Feature models (FMs) are widely used to describe software product lines (SPL). They specify common and variation points in the domain of the SPL. Because of their wide domain coverage, FM development requires extensive domain analysis and important domain expertise that is often hard to acquire. These development requirements motivated us to propos...
Conference Paper
The lack of a framework that provides for business process outsourcing to the cloud hinders the widespread adoption of this emerging computing environment. Unlike the multiple decision methods related to outsourcing classical applications in a cloud environment, there is no standard dealing with the outsourcing of business processes starting from t...