
Leila Ben AyedNational School of Computer Science - University of la Manouba - Tunisia
Leila Ben Ayed
Professor. Dr.- Engineer- Computer Science - National School of Computer Science - ENSI - HANA Lab - leila.benayed2023@gmail.com
Professor Computer Science
https://www.youtube.com/@leilabenayed_TLA_Compilation
https://orcid.org/0000-0002-6031-7216
About
235
Publications
24,364
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,065
Citations
Introduction
I am professor of Computer Science at University of la Manouba - National School of Computer Science - ENSI - Tunisia and membre of LIPSIC Laboratory, FST, University of Tunis el Manar.
My recent activities are related to Formal Methods for Software Development - Medel Checking - Refinement - Theorem proving - Workflow applications - Distributed applications - Model Transformation.
https://hal.inria.fr/inria-00098799
http://hvg.ece.concordia.ca/Research/METH/GKMP/index.html
Additional affiliations
May 2011 - present
National School of Computer Science
Position
- Professor (Full)
Description
- I Work on modeling, automatae and formal methods for reactive systems. In particular on models transformation, refinrment and requirement vérification.
September 1996 - August 1997
ESPTT
Position
- Contractual Assistant
September 1994 - August 1996
Education
September 1994 - February 2000
Faculty of Science of Tunis & National Polytechnic Institute of Lorraire
Field of study
- Computer Science
September 1988 - June 1994
Faculty of Science of Tunis
Field of study
- Computer Science
Publications
Publications (235)
This paper deals with the use of two verification approaches : theorem proving and model checking. We focus on the event B method by using its associated theorem proving tool (Click n Prove), and on the language TLA+ by using its model checker TLC. By considering the limitation of the event B method to invariance properties, we propose to apply the...
This paper presents a new event-B based approach to reasoning about interaction protocols. We show how an event-B model can be structured from AUML protocol diagrams and then used to give a formal semantic to protocol diagrams which supports proofs of their correctness. More precisely, we give rules for the translation of protocol diagrams into eve...
We propose a set of composition patterns based on UML activity diagrams that support the different forms of matching and integrating
Grid service operations in a workflow. The workflows are built on an abstract level using UML activity diagram language and
following an MDA composition approach. In addition, we propose a Domain Specific Language (DS...
This paper focuses on how to model and compose workflow applications of Grid services without considering lower level description of the Grid environment. To reach this objective, we propose a model-driven approach (MDA) for developing workflow applications from existing Grid services. The workflows are built on an abstract level with semantic and...
In the growing Internet of Things (IoT) environment, ensuring that data connections are secure is paramount. This paper presents a small, innovative solution for storing color images to enhance the security of IoT networks. The proposed method exploits the power of parallel processing and uses a lightweight hybrid stream cipher cryptography (LHSCC)...
Contemporary computer architecture comprises multicomputer settings. Multiple computers provide the facility of high performance to implement multiple threads that are faster and concurrently with different processors that can execute tasks simultaneously. The challenges are as follows: cost and high performance. Certain firms have to provide fundi...
Technology and network industries have advanced quickly in recent decades. The expansion of piracy and the compromise of many existing systems has made it essential to develop information security solutions that can identify new threats. Norberto address these issues; this work proposes a system called IDS-AI that is based on artificial intelligenc...
In the aftermath of catastrophic natural catastrophes such as earthquakes, tsunamis, and explosions, providing immediate help to key areas can mean the difference between life and death for many individuals. To meet this critical demand, we created a hybrid transportation system that harnesses the power of vgg19 and traditional shortest path algori...
To better avoid injuries in sports, prevention strategies increasingly include modern techniques like machine learning that allow for an evaluation of injury risk. This article aims to assess the injury risk for 250 athletes. The risk indicators measured daily were the athletes' views of their physical and psychological conditions, which they self-...
To better avoid injuries in sports, prevention strategies increasingly include modern techniques like machine learning that allow
for an evaluation of injury risk. This article aims to assess the injury risk for 250 athletes. The risk indicators measured daily
were the athletes’ views of their physical and psychological conditions, which they sel...
In the aftermath of catastrophic natural catastrophes such as earthquakes, tsunamis, and explosions, providing immediate help to key areas can mean the difference between life and death for many individuals. To meet this critical demand, we created a hybrid transportation system that harnesses the power of vgg19 and traditional shortest path algori...
The process of creating new services by integrating existing ones is known as service composition. It is regarded as one of the most difficult tasks in a distributed and dynamic setting. In general, the composition process entails looking for existing services in a certain domain, selecting the suitable service, coordinating composition flow, and a...
The process of creating new services by integrating existing ones is known as service composition. It is regarded as one of the most difficult tasks in a distributed and dynamic setting. In general, the composition process entails looking for existing services in a certain domain, selecting the suitable service, coordinating composition flow, and a...
The process of creating new services by integrating existing ones is known as service composition. It is regarded as one of the most difficult tasks in a
distributed and dynamic setting. In general, the composition process entails looking for existing services in a certain domain, selecting the suitable service,
coordinating composition flow, and...
The process of creating new services by integrating existing ones is known as service composition. It is regarded as one of the most difficult tasks in a distributed and dynamic setting. In general, the composition process entails looking for existing services in a certain domain, selecting the suitable service, coordinating composition flow, and a...
Technology and network industries have advanced quickly in recent decades.The expansion of piracy and the compromise of many existing systems has made it essential to develop information security solutions that can identify new threats. In order to address these issues, this work proposes a system called IDS-AI that is based on artificial intellige...
The recent computational systems include multicomputer formations. Multiple computers allow many tasks to be processed faster and concurrently and the possibility of implementing the same functions on various processors simultaneously. The problem is that companies are required to pay thousands of dollars to construct data centers, locations, serve...
Sports injuries are becoming increasingly widespread, and professional player injuries are having a negative impact on the field of sports. Preventing sports injuries is becoming more popular. Numerous machine learning (ML) techniques have been used in different sports injury fields since the birth of ML. In order to deal with the issue of karate i...
The recent computational systems include multicomputer formations. Multiple computers allow many tasks to be processed faster and concurrently, and the possibility of implementing the same functions on various processors simultaneously. The problem is that companies are required to pay thousands of dollars to construct data centers, locations, serv...
Recent decades have seen rapid advancement in the fields of networks and technology. Developing information security tools to detect novel threats has become crucial as a result of the proliferation of piracy and the compromise of several current systems. This work suggests a unique behavioral system called Behavior IDS-AI, which is built on artifi...
Rapid progress in the world of technology and networks has occurred in recent decades. Piracy has proliferated, and many modern systems have been breached, therefore building information security solutions to identify new attacks has become critical. To address these concerns, this paper proposes a novel behavioral system for the detection of moder...
The substantial involvement of Adaptive User Interfaces (AUI) in providing adaptive and accessible interactive systems has created the need to establish a multimodal framework based on scalable adaptation rules. This paper presents an Adaptive User Interface to Accessibility Context (AUIAC) framework that provides a generic adaptation approach acco...
. We propose a generic approach for the adaptation of user
interfaces to the accessibility context. This approach is based on the
Model-Driven Engineering MDE. Thus, we adapt any kind of UI to the
accessibility context based on a generic adaptation process. We are based
on meta-model transformations parametrized with the context of acces�sibility....
The substantial involvement of Adaptive User Interfaces (AUI) in providing adaptive and accessible interactive systems has created the need to establish a multimodal framework based on scalable adaptation rules. This paper presents an Adaptive User Interface to Accessibility Context (AUIAC) framework that provides a generic adaptation approach acco...
Lesson Techniques de Compilation
Analyses Lexicale, Syntaxique, Sémantique et Traduction en Code pour Machine Abstraite à Pile
Rapid progress in the world of technology and networks has occurred in recent decades. Piracy has proliferated, and many modern systems have been breached, therefore building information security solutions to identify new attacks has become critical. To address these concerns , this paper proposes a novel behavioral system for the detection of mode...
Formal Methods for the Specification and the Verification of Behavioral Properies :B (Theorem Proving) and PLTL and CTL Model Checking
L'objectif de ce cours est d'introduire la spécification et la vérification formelle dans la démarche de développement d'un système informatique (Raffinement, Abstraction, modularité, preuve, vérification, méthodes formelles). ◼ Si les techniques de compilation permettent de contrôler les erreurs sémantiques statiques, alors la vérification formell...
My participation in the The 1st International Conference on Artificial Intelligence: Theories and Applications (ICAITA22)
November 2022
Building automata from regular expression : illustration over an example
We Introduce Formal Method for the Development of Safety and Critical Systems.
- Thé B Method and Refinement Process (Required Properties are verified with Theorem Proving Technique- Semi-automatic),
- An Automatic Approach for Behavioral Requirements Verification using Model Checking Technique (Semantic Technique).
Student will be able to develop...
This document is about Formal Methods for Reactive and Concurrent Systems
This documents is about Formal Methods for Safety requirement Verification in reactive systems
Business Process Modeling Notation (BPMN) has acquired increasing relevance in business process modeling. However, it suffers, as all semi-formal languages, from the lack of rigorous semantic which hinder its full adoption and makes impossible the verification of relevant properties. In this paper, a model-driven approach for the verification of BP...
The present work proposed a semantic retrieval approach to treat the issues of semantic ambiguity of indexed terms, the uncertainty, and imprecision that is inherent in the information retrieval process. The proposed approach constitutes of three different phases. The query meaning was discovered in the first phase by formulating a set of candidate...
Information retrieval (IR) systems are concerned of the processing of the textual content of the document, the query, and issues of system effectiveness. IR models are means to integrate many sources of evidence on documents to achieve an effective retrieval system. Unlike traditional parameters such as word frequency in documents, semantic informa...
the big needs of disabled and normal users who want to receive the needed information using computational system at anytime and everywhere is now a necessity. The need for services architectures that is aware of the context that to build content adaptation applications that maximize the user satisfaction. The development of context-aware applicatio...
the big needs of disabled and normal users who want to receive the needed information using computational system at anytime and everywhere is now a necessity. The need for services architectures that is aware of the context that to build content adaptation applications that maximize the user satisfaction. The development of context-aware applicatio...
Accessibility of user interfaces based on meta -model transformation
Nowadays, the traditional information retrieval (IR) is inadequate for the user who requires precise results. Hence, the importance of the semantic IR arises. It is very important to move from the level of ambiguous terms to that of well-specified concepts in the indexing phase to enrich the search process. To handle the problems of semantic ambigu...
The correctness of group key protocols in communication systems remains a great challenge because of dynamic characteristics of group key construction as we deal with an open number of group members. In this paper, we propose a solution to model group key protocols and to verify their required properties, in particular secrecy property, using the e...
Group key security protocols play an important role in today's communication systems. Their verification, however, remains a great challenge because of the dynamic characteristics of group key construction and distribution protocols. Security properties that are well defined in normal two-party protocols have different meanings and different interp...
The paper presents a formal development approach borrowing features from a specification method based on duration calculus CoD and verification method using the model checker UPPAAL. In this approach we translate CoD specification and required properties to be checked by UPPAAL, by introducing rules translating CoD formula to UPPAAL model which com...
The paper presents a formal development approach borrowing features from a specification method based on duration calculus CoD and verification method using the model checker UPPAAL. In this approach we translate CoD specification and required properties to be checked by UPPAAL, by introducing rules translating CoD formula to UPPAAL model which com...
The paper presents a formal development approach borrowing features from a specification method based on duration calculus CoD and verification method using the model checker UPPAAL. In this approach we translate CoD specification and required properties to be checked by UPPAAL, by introducing rules translating CoD formula to UPPAAL model which com...
Information retrieval (IR) systems are concerned of the processing of the textual content of the document, the query, and issues of system effectiveness. IR models are means to integrate many sources of evidence on documents to achieve an effective retrieval system. Unlike traditional parameters such as word frequency in documents, semantic informa...