Leila Ben Ayed

Leila Ben Ayed
National School of Computer Science - University of la Manouba - Tunisia

Professor. Dr.- Engineer- Computer Science - National School of Computer Science - ENSI - LIPSIC Lab - FST - leila.benayed2023@gmail.com
Professor Computer Science https://www.youtube.com/@leilabenayed_TLA_Compilation https://orcid.org/0000-0002-6031-7216

About

211
Publications
20,460
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
969
Citations
Introduction
I am professor of Computer Science at University of la Manouba - National School of Computer Science - ENSI - Tunisia and membre of LIPSIC Laboratory, FST, University of Tunis el Manar. My recent activities are related to Formal Methods for Software Development - Medel Checking - Refinement - Theorem proving - Workflow applications - Distributed applications - Model Transformation. https://hal.inria.fr/inria-00098799 http://hvg.ece.concordia.ca/Research/METH/GKMP/index.html
Additional affiliations
May 2011 - present
National School of Computer Science
Position
  • Professor (Full)
Description
  • I Work on modeling, automatae and formal methods for reactive systems. In particular on models transformation, refinrment and requirement vérification.
September 2000 - May 2011
Faculty of Science of Tunis
Position
  • Professor (Assistant)
September 1996 - August 1997
ESPTT
Position
  • Contractual Assistant
Education
September 1994 - February 2000
Faculty of Science of Tunis & National Polytechnic Institute of Lorraire
Field of study
  • Computer Science
September 1988 - June 1994
Faculty of Science of Tunis
Field of study
  • Computer Science

Publications

Publications (211)
Article
Full-text available
This paper deals with the use of two verification approaches : theorem proving and model checking. We focus on the event B method by using its associated theorem proving tool (Click n Prove), and on the language TLA+ by using its model checker TLC. By considering the limitation of the event B method to invariance properties, we propose to apply the...
Article
Full-text available
This paper presents a new event-B based approach to reasoning about interaction protocols. We show how an event-B model can be structured from AUML protocol diagrams and then used to give a formal semantic to protocol diagrams which supports proofs of their correctness. More precisely, we give rules for the translation of protocol diagrams into eve...
Conference Paper
Full-text available
We propose a set of composition patterns based on UML activity diagrams that support the different forms of matching and integrating Grid service operations in a workflow. The workflows are built on an abstract level using UML activity diagram language and following an MDA composition approach. In addition, we propose a Domain Specific Language (DS...
Conference Paper
This paper focuses on how to model and compose workflow applications of Grid services without considering lower level description of the Grid environment. To reach this objective, we propose a model-driven approach (MDA) for developing workflow applications from existing Grid services. The workflows are built on an abstract level with semantic and...
Chapter
Full-text available
Recent decades have seen rapid advancement in the fields of networks and technology. Developing information security tools to detect novel threats has become crucial as a result of the proliferation of piracy and the compromise of several current systems. This work suggests a unique behavioral system called Behavior IDS-AI, which is built on artifi...
Chapter
Full-text available
Rapid progress in the world of technology and networks has occurred in recent decades. Piracy has proliferated, and many modern systems have been breached, therefore building information security solutions to identify new attacks has become critical. To address these concerns, this paper proposes a novel behavioral system for the detection of moder...
Article
Full-text available
The substantial involvement of Adaptive User Interfaces (AUI) in providing adaptive and accessible interactive systems has created the need to establish a multimodal framework based on scalable adaptation rules. This paper presents an Adaptive User Interface to Accessibility Context (AUIAC) framework that provides a generic adaptation approach acco...
Article
Full-text available
. We propose a generic approach for the adaptation of user interfaces to the accessibility context. This approach is based on the Model-Driven Engineering MDE. Thus, we adapt any kind of UI to the accessibility context based on a generic adaptation process. We are based on meta-model transformations parametrized with the context of acces�sibility....
Article
Full-text available
The substantial involvement of Adaptive User Interfaces (AUI) in providing adaptive and accessible interactive systems has created the need to establish a multimodal framework based on scalable adaptation rules. This paper presents an Adaptive User Interface to Accessibility Context (AUIAC) framework that provides a generic adaptation approach acco...
Data
Lesson Techniques de Compilation Analyses Lexicale, Syntaxique, Sémantique et Traduction en Code pour Machine Abstraite à Pile
Conference Paper
Rapid progress in the world of technology and networks has occurred in recent decades. Piracy has proliferated, and many modern systems have been breached, therefore building information security solutions to identify new attacks has become critical. To address these concerns , this paper proposes a novel behavioral system for the detection of mode...
Data
Formal Methods for the Specification and the Verification of Behavioral Properies :B (Theorem Proving) and PLTL and CTL Model Checking
Data
L'objectif de ce cours est d'introduire la spécification et la vérification formelle dans la démarche de développement d'un système informatique (Raffinement, Abstraction, modularité, preuve, vérification, méthodes formelles). ◼ Si les techniques de compilation permettent de contrôler les erreurs sémantiques statiques, alors la vérification formell...
Data
My participation in the The 1st International Conference on Artificial Intelligence: Theories and Applications (ICAITA22) November 2022
Data
Building automata from regular expression : illustration over an example
Data
We Introduce Formal Method for the Development of Safety and Critical Systems. - Thé B Method and Refinement Process (Required Properties are verified with Theorem Proving Technique- Semi-automatic), - An Automatic Approach for Behavioral Requirements Verification using Model Checking Technique (Semantic Technique). Student will be able to develop...
Data
Safety requirement for reactive systems
Chapter
This document is about Formal Methods for Reactive and Concurrent Systems
Data
This documents is about Formal Methods for Safety requirement Verification in reactive systems
Chapter
Full-text available
Business Process Modeling Notation (BPMN) has acquired increasing relevance in business process modeling. However, it suffers, as all semi-formal languages, from the lack of rigorous semantic which hinder its full adoption and makes impossible the verification of relevant properties. In this paper, a model-driven approach for the verification of BP...
Chapter
Full-text available
The present work proposed a semantic retrieval approach to treat the issues of semantic ambiguity of indexed terms, the uncertainty, and imprecision that is inherent in the information retrieval process. The proposed approach constitutes of three different phases. The query meaning was discovered in the first phase by formulating a set of candidate...
Conference Paper
Full-text available
Information retrieval (IR) systems are concerned of the processing of the textual content of the document, the query, and issues of system effectiveness. IR models are means to integrate many sources of evidence on documents to achieve an effective retrieval system. Unlike traditional parameters such as word frequency in documents, semantic informa...
Article
Full-text available
the big needs of disabled and normal users who want to receive the needed information using computational system at anytime and everywhere is now a necessity. The need for services architectures that is aware of the context that to build content adaptation applications that maximize the user satisfaction. The development of context-aware applicatio...
Conference Paper
Full-text available
the big needs of disabled and normal users who want to receive the needed information using computational system at anytime and everywhere is now a necessity. The need for services architectures that is aware of the context that to build content adaptation applications that maximize the user satisfaction. The development of context-aware applicatio...
Article
Full-text available
Accessibility of user interfaces based on meta -model transformation
Article
Full-text available
Nowadays, the traditional information retrieval (IR) is inadequate for the user who requires precise results. Hence, the importance of the semantic IR arises. It is very important to move from the level of ambiguous terms to that of well-specified concepts in the indexing phase to enrich the search process. To handle the problems of semantic ambigu...
Technical Report
Full-text available
The correctness of group key protocols in communication systems remains a great challenge because of dynamic characteristics of group key construction as we deal with an open number of group members. In this paper, we propose a solution to model group key protocols and to verify their required properties, in particular secrecy property, using the e...
Article
Full-text available
Group key security protocols play an important role in today's communication systems. Their verification, however, remains a great challenge because of the dynamic characteristics of group key construction and distribution protocols. Security properties that are well defined in normal two-party protocols have different meanings and different interp...
Conference Paper
Full-text available
The paper presents a formal development approach borrowing features from a specification method based on duration calculus CoD and verification method using the model checker UPPAAL. In this approach we translate CoD specification and required properties to be checked by UPPAAL, by introducing rules translating CoD formula to UPPAAL model which com...
Data
The paper presents a formal development approach borrowing features from a specification method based on duration calculus CoD and verification method using the model checker UPPAAL. In this approach we translate CoD specification and required properties to be checked by UPPAAL, by introducing rules translating CoD formula to UPPAAL model which com...
Research Proposal
Full-text available
The paper presents a formal development approach borrowing features from a specification method based on duration calculus CoD and verification method using the model checker UPPAAL. In this approach we translate CoD specification and required properties to be checked by UPPAAL, by introducing rules translating CoD formula to UPPAAL model which com...
Article
Full-text available
Information retrieval (IR) systems are concerned of the processing of the textual content of the document, the query, and issues of system effectiveness. IR models are means to integrate many sources of evidence on documents to achieve an effective retrieval system. Unlike traditional parameters such as word frequency in documents, semantic informa...
Conference Paper
Full-text available
In this paper, we present a real time interactive system for running flexible workflow applications. This system facilitates the execution of these applications in terms of time execution complexity as it is based on flexibility mechanism. These workflows are built on an abstract level, through BPMN models using flexibility patterns. We define two...
Conference Paper
Artificial Intelligence(AI) has proved its power and efficiency into different domains(industry, medicine, economic, etc), hoping for giving a chance for people with disabilities to change their life for the best. Basically, AI offers many advanced tools and machine learning algorithms that could support human capabilities, needs and preferences an...
Chapter
Full-text available
The e-assessment, as an important part of any e-learning system, faces the same challenges and problems such as problems related to portability, reusability, adaptability, integration and interoperability. Therefore, we need an approach aiming to generate a general process of the e-assessment. The present study consists of the development of a gene...
Chapter
Full-text available
In this paper, we present a refinement approach for business processes specified with Business Process Modeling Notation (BPMN). The Business process or workflow refinement approach is a step-wise modeling approach which is composed of a set of abstraction levels. Each refinement step corresponds to an abstract level of a BPMN model. For each refin...
Article
Full-text available
This paper presents a specific tool, called MAV-UML-AD allowing the specification and the verification of workflow models using UML Activity Diagrams(UML AD) and Event-B and Based on Institutions. The developed tool translates an activity diagram model into an equivalent Event-B specification according to a mathematical semantics. The transformatio...
Article
Full-text available
This paper presents a specific tool, called MAV-UML-AD, allowing the specification and the verification of workflow models using UML activity diagrams (UML ADs) and Event-B and based on institutions. The developed tool translates an activity diagram model into an equivalent Event-B specification according to a mathematical semantics. The transforma...
Article
Full-text available
For an effective and a useful solution for the accessibility of user interfaces (UIs), it is recommended to propose a generic approach as we notify the existence of different disability categories, various employed devices for UIs based on heterogeneous ubiquitous environments. This paper presents a generic approach for the adaptation of UIs to the...
Conference Paper
Full-text available
Human-Computer Interfaces play a key role in the design of Information System, as they link the system with its end-users, allowing information exchange and improving communication. Nowadays, applications increasingly become various and complex, they aim at multiple, heterogeneous and dynamic contexts of use examined according three facets: the end...
Article
Learner modeling is a crucial step in the learning personalization process. It allows taking into consideration the learner's profile to make the learning process more efficient. Most studies refer to an explicit method, namely questionnaire, to model learners. Questionnaires are time consuming and may not be motivating for learners. Thus, this pap...

Network

Cited By