
Leila Ben AyedNational School of Computer Science - University of la Manouba - Tunisia
Leila Ben Ayed
Professor. Dr.- Engineer- Computer Science - National School of Computer Science - ENSI - LIPSIC Lab - FST - leila.benayed2023@gmail.com
Professor Computer Science
https://www.youtube.com/@leilabenayed_TLA_Compilation
https://orcid.org/0000-0002-6031-7216
About
211
Publications
20,460
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
969
Citations
Introduction
I am professor of Computer Science at University of la Manouba - National School of Computer Science - ENSI - Tunisia and membre of LIPSIC Laboratory, FST, University of Tunis el Manar.
My recent activities are related to Formal Methods for Software Development - Medel Checking - Refinement - Theorem proving - Workflow applications - Distributed applications - Model Transformation.
https://hal.inria.fr/inria-00098799
http://hvg.ece.concordia.ca/Research/METH/GKMP/index.html
Additional affiliations
May 2011 - present
National School of Computer Science
Position
- Professor (Full)
Description
- I Work on modeling, automatae and formal methods for reactive systems. In particular on models transformation, refinrment and requirement vérification.
September 2000 - May 2011
Faculty of Science of Tunis
Position
- Professor (Assistant)
September 1996 - August 1997
ESPTT
Position
- Contractual Assistant
Education
September 1994 - February 2000
Faculty of Science of Tunis & National Polytechnic Institute of Lorraire
Field of study
- Computer Science
September 1988 - June 1994
Faculty of Science of Tunis
Field of study
- Computer Science
Publications
Publications (211)
This paper deals with the use of two verification approaches : theorem proving and model checking. We focus on the event B method by using its associated theorem proving tool (Click n Prove), and on the language TLA+ by using its model checker TLC. By considering the limitation of the event B method to invariance properties, we propose to apply the...
This paper presents a new event-B based approach to reasoning about interaction protocols. We show how an event-B model can be structured from AUML protocol diagrams and then used to give a formal semantic to protocol diagrams which supports proofs of their correctness. More precisely, we give rules for the translation of protocol diagrams into eve...
We propose a set of composition patterns based on UML activity diagrams that support the different forms of matching and integrating
Grid service operations in a workflow. The workflows are built on an abstract level using UML activity diagram language and
following an MDA composition approach. In addition, we propose a Domain Specific Language (DS...
This paper focuses on how to model and compose workflow applications of Grid services without considering lower level description of the Grid environment. To reach this objective, we propose a model-driven approach (MDA) for developing workflow applications from existing Grid services. The workflows are built on an abstract level with semantic and...
Recent decades have seen rapid advancement in the fields of networks and technology. Developing information security tools to detect novel threats has become crucial as a result of the proliferation of piracy and the compromise of several current systems. This work suggests a unique behavioral system called Behavior IDS-AI, which is built on artifi...
Rapid progress in the world of technology and networks has occurred in recent decades. Piracy has proliferated, and many modern systems have been breached, therefore building information security solutions to identify new attacks has become critical. To address these concerns, this paper proposes a novel behavioral system for the detection of moder...
The substantial involvement of Adaptive User Interfaces (AUI) in providing adaptive and accessible interactive systems has created the need to establish a multimodal framework based on scalable adaptation rules. This paper presents an Adaptive User Interface to Accessibility Context (AUIAC) framework that provides a generic adaptation approach acco...
. We propose a generic approach for the adaptation of user
interfaces to the accessibility context. This approach is based on the
Model-Driven Engineering MDE. Thus, we adapt any kind of UI to the
accessibility context based on a generic adaptation process. We are based
on meta-model transformations parametrized with the context of acces�sibility....
The substantial involvement of Adaptive User Interfaces (AUI) in providing adaptive and accessible interactive systems has created the need to establish a multimodal framework based on scalable adaptation rules. This paper presents an Adaptive User Interface to Accessibility Context (AUIAC) framework that provides a generic adaptation approach acco...
Lesson Techniques de Compilation
Analyses Lexicale, Syntaxique, Sémantique et Traduction en Code pour Machine Abstraite à Pile
Rapid progress in the world of technology and networks has occurred in recent decades. Piracy has proliferated, and many modern systems have been breached, therefore building information security solutions to identify new attacks has become critical. To address these concerns , this paper proposes a novel behavioral system for the detection of mode...
Formal Methods for the Specification and the Verification of Behavioral Properies :B (Theorem Proving) and PLTL and CTL Model Checking
L'objectif de ce cours est d'introduire la spécification et la vérification formelle dans la démarche de développement d'un système informatique (Raffinement, Abstraction, modularité, preuve, vérification, méthodes formelles). ◼ Si les techniques de compilation permettent de contrôler les erreurs sémantiques statiques, alors la vérification formell...
My participation in the The 1st International Conference on Artificial Intelligence: Theories and Applications (ICAITA22)
November 2022
Building automata from regular expression : illustration over an example
We Introduce Formal Method for the Development of Safety and Critical Systems.
- Thé B Method and Refinement Process (Required Properties are verified with Theorem Proving Technique- Semi-automatic),
- An Automatic Approach for Behavioral Requirements Verification using Model Checking Technique (Semantic Technique).
Student will be able to develop...
This document is about Formal Methods for Reactive and Concurrent Systems
This documents is about Formal Methods for Safety requirement Verification in reactive systems
Business Process Modeling Notation (BPMN) has acquired increasing relevance in business process modeling. However, it suffers, as all semi-formal languages, from the lack of rigorous semantic which hinder its full adoption and makes impossible the verification of relevant properties. In this paper, a model-driven approach for the verification of BP...
The present work proposed a semantic retrieval approach to treat the issues of semantic ambiguity of indexed terms, the uncertainty, and imprecision that is inherent in the information retrieval process. The proposed approach constitutes of three different phases. The query meaning was discovered in the first phase by formulating a set of candidate...
Information retrieval (IR) systems are concerned of the processing of the textual content of the document, the query, and issues of system effectiveness. IR models are means to integrate many sources of evidence on documents to achieve an effective retrieval system. Unlike traditional parameters such as word frequency in documents, semantic informa...
the big needs of disabled and normal users who want to receive the needed information using computational system at anytime and everywhere is now a necessity. The need for services architectures that is aware of the context that to build content adaptation applications that maximize the user satisfaction. The development of context-aware applicatio...
the big needs of disabled and normal users who want to receive the needed information using computational system at anytime and everywhere is now a necessity. The need for services architectures that is aware of the context that to build content adaptation applications that maximize the user satisfaction. The development of context-aware applicatio...
Accessibility of user interfaces based on meta -model transformation
Nowadays, the traditional information retrieval (IR) is inadequate for the user who requires precise results. Hence, the importance of the semantic IR arises. It is very important to move from the level of ambiguous terms to that of well-specified concepts in the indexing phase to enrich the search process. To handle the problems of semantic ambigu...
The correctness of group key protocols in communication systems remains a great challenge because of dynamic characteristics of group key construction as we deal with an open number of group members. In this paper, we propose a solution to model group key protocols and to verify their required properties, in particular secrecy property, using the e...
Group key security protocols play an important role in today's communication systems. Their verification, however, remains a great challenge because of the dynamic characteristics of group key construction and distribution protocols. Security properties that are well defined in normal two-party protocols have different meanings and different interp...
The paper presents a formal development approach borrowing features from a specification method based on duration calculus CoD and verification method using the model checker UPPAAL. In this approach we translate CoD specification and required properties to be checked by UPPAAL, by introducing rules translating CoD formula to UPPAAL model which com...
The paper presents a formal development approach borrowing features from a specification method based on duration calculus CoD and verification method using the model checker UPPAAL. In this approach we translate CoD specification and required properties to be checked by UPPAAL, by introducing rules translating CoD formula to UPPAAL model which com...
The paper presents a formal development approach borrowing features from a specification method based on duration calculus CoD and verification method using the model checker UPPAAL. In this approach we translate CoD specification and required properties to be checked by UPPAAL, by introducing rules translating CoD formula to UPPAAL model which com...
Information retrieval (IR) systems are concerned of the processing of the textual content of the document, the query, and issues of system effectiveness. IR models are means to integrate many sources of evidence on documents to achieve an effective retrieval system. Unlike traditional parameters such as word frequency in documents, semantic informa...
In this paper, we present a real time interactive system for running flexible workflow applications. This system facilitates the execution of these applications in terms of time execution complexity as it is based on flexibility mechanism. These workflows are built on an abstract level, through BPMN models using flexibility patterns. We define two...
Artificial Intelligence(AI) has proved its power and
efficiency into different domains(industry, medicine, economic,
etc), hoping for giving a chance for people with disabilities
to change their life for the best. Basically, AI offers many
advanced tools and machine learning algorithms that could
support human capabilities, needs and preferences an...
The e-assessment, as an important part of any e-learning system, faces the same challenges and problems such as problems related to portability, reusability, adaptability, integration and interoperability. Therefore, we need an approach aiming to generate a general process of the e-assessment. The present study consists of the development of a gene...
In this paper, we present a refinement approach for business processes specified with Business Process Modeling Notation (BPMN). The Business process or workflow refinement approach is a step-wise modeling approach which is composed of a set of abstraction levels. Each refinement step corresponds to an abstract level of a BPMN model. For each refin...
This paper presents a specific tool, called MAV-UML-AD allowing the specification and the verification of workflow models using UML Activity Diagrams(UML AD) and Event-B and Based on Institutions. The developed tool translates an activity diagram model into an equivalent Event-B specification according to a mathematical semantics. The transformatio...
This paper presents a specific tool, called MAV-UML-AD, allowing the specification and the verification of workflow models using UML activity diagrams (UML ADs) and Event-B and based on institutions. The developed tool translates an activity diagram model into an equivalent Event-B specification according to a mathematical semantics. The transforma...
For an effective and a useful solution for the accessibility of user interfaces (UIs), it is recommended to propose a generic approach as we notify the existence of different disability categories, various employed devices for UIs based on heterogeneous ubiquitous environments. This paper presents a generic approach for the adaptation of UIs to the...
Human-Computer Interfaces play a key role in the design of Information System, as they link the system with its end-users, allowing information exchange and improving communication. Nowadays, applications increasingly become various and complex, they aim at multiple, heterogeneous and dynamic contexts of use examined according three facets: the end...
Learner modeling is a crucial step in the learning personalization process. It allows taking into consideration the learner's profile to make the learning process more efficient. Most studies refer to an explicit method, namely questionnaire, to model learners. Questionnaires are time consuming and may not be motivating for learners. Thus, this pap...