default search action
Mohamed Mezghiche
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j17]Mohamed Tahar Bennai, Zahia Guessoum, Smaine Mazouzi, Stéphane Cormier, Mohamed Mezghiche:
Multi-agent medical image segmentation: A survey. Comput. Methods Programs Biomed. 232: 107444 (2023) - 2020
- [j16]Mohamed Tahar Bennai, Zahia Guessoum, Smaine Mazouzi, Stéphane Cormier, Mohamed Mezghiche:
A stochastic multi-agent approach for medical-image segmentation: Application to tumor segmentation in brain MR images. Artif. Intell. Medicine 110: 101980 (2020) - [j15]Mohamed Tahar Bennai, Smaine Mazouzi, Zahia Guessoum, Mohamed Mezghiche, Stéphane Cormier:
A Cooperative Approach Based on Local Detection of Similarities and Discontinuities for Brain MR Images Segmentation. J. Medical Syst. 44(9): 145 (2020) - [j14]Samiya Hamadouche, Jean-Louis Lanet, Mohamed Mezghiche:
Hiding a fault enabled virus through code construction. J. Comput. Virol. Hacking Tech. 16(2): 103-124 (2020)
2010 – 2019
- 2019
- [j13]Razika Lounas, Mohamed Mezghiche, Jean-Louis Lanet:
Formal methods in dynamic software updating: a survey. Int. J. Crit. Comput. Based Syst. 9(1/2): 76-114 (2019) - [j12]Abdelhak Mesbah, Jean-Louis Lanet, Mohamed Mezghiche:
Reverse engineering Java Card and vulnerability exploitation: a shortcut to ROM. Int. J. Inf. Sec. 18(1): 85-100 (2019) - [j11]Ibtihel Baddari, Mohamed Amine Riahla, Mohamed Mezghiche:
A New AOMDV Lifetime Prolonging Routing Algorithm for Ad-Hoc Networks. Int. J. Interdiscip. Telecommun. Netw. 11(4): 48-62 (2019) - 2018
- [j10]Yahiaoui Chahrazed, Jean-Louis Lanet, Mohamed Mezghiche, Karim Tamine:
Machine learning techniques to predict sensitive patterns to fault attack in the Java Card application. J. Exp. Theor. Artif. Intell. 30(1): 101-127 (2018) - [c21]Cheikh Salmi, Mohamed Chaabani, Mohamed Mezghiche:
A Formalized Procedure for Database Horizontal Fragmentation in Isabelle/HOL Proof Assistant. MEDI 2018: 346-353 - 2017
- [j9]Abdelhak Mesbah, Jean-Louis Lanet, Mohamed Mezghiche:
Reverse engineering a Java Card memory management algorithm. Comput. Secur. 66: 97-114 (2017) - [j8]Razika Lounas, Mohamed Mezghiche, Jean-Louis Lanet:
A formal verification of dynamic updating in a Java-based embedded system. Int. J. Crit. Comput. Based Syst. 7(4): 303-340 (2017) - [c20]Sarah Chabane, Rabéa Ameur-Boulifa, Mohamed Mezghiche:
Rethinking of I/O-automata composition. FDL 2017: 1-7 - [c19]Mohamed Tahar Bennai, Zahia Guessoum, Smaine Mazouzi, Stéphane Cormier, Mohamed Mezghiche:
Towards a Generic Multi-agent Approach for Medical Image Segmentation. PRIMA 2017: 198-211 - 2016
- [c18]Abdelhak Mesbah, Leo Regnaud, Jean-Louis Lanet, Mohamed Mezghiche:
The Hell Forgery - Self Modifying Codes Shoot Again. CARDIS 2016: 105-121 - [c17]Razika Lounas, Nisrine Jafri, Axel Legay, Mohamed Mezghiche, Jean-Louis Lanet:
A Formal Verification of Safe Update Point Detection in Dynamic Software Updating. CRiSIS 2016: 31-45 - 2015
- [j7]M'hamed Mataoui, Mohamed Mezghiche:
A distance based approach for link analysis in XML information retrieval. Comput. Syst. Sci. Eng. 30(3) (2015) - [c16]Razika Lounas, Mohamed Mezghiche, Jean-Louis Lanet:
An Approach for Formal Verification of Updated Java Bytecode Programs. VECoS 2015: 51-64 - 2014
- [j6]Selma Djeddai, Martin Strecker, Mohamed Mezghiche:
Integrating a Formal Development for DSLs into Meta-Modeling. J. Data Semant. 3(3): 143-155 (2014) - [c15]M'hamed Mataoui, Mohamed Mezghiche, Faouzi Sebbak, Farid Benhammadi:
Evidential-Link-based Approach for Re-ranking XML Retrieval Results. DATA 2014: 64-71 - [c14]Samia Berchiche-Fellag, Mohamed Mezghiche:
Searching XML Element Using Terms Propagation Method. ISMIS 2014: 395-404 - [c13]Mohamed Amine Riahla, Karim Tamine, A. Mifdal, Mohamed Mezghiche:
A Mobile Multi Agent System for Routing in Adhoc Network. PECCS 2014: 31-39 - 2012
- [j5]Ali Aïtelhadj, Mohand Boughanem, Mohamed Mezghiche, Fatiha Souam:
Using structural similarity for clustering XML documents. Knowl. Inf. Syst. 32(1): 109-139 (2012) - [c12]Selma Djeddai, Mohamed Mezghiche, Martin Strecker:
Combining Verification and MDE Illustrated by a Formal Java Development. ICTERI (Revised Selected Papers) 2012: 131-148 - [c11]Selma Djeddai, Mohamed Mezghiche, Martin Strecker:
A Case Study in Combining Formal Verification and Model-Driven Engineering. ICTERI 2012: 275-289 - [c10]Selma Djeddai, Martin Strecker, Mohamed Mezghiche:
Integrating a Formal Development for DSLs into Meta-modeling. MEDI 2012: 55-66 - [c9]Mohamed Chaabani, Mohamed Mezghiche, Martin Strecker:
Formal verification of a proof procedure for the description logic ALC. SCSS 2012: 51-61 - [c8]Razika Lounas, Mohamed Mezghiche, Jean-Louis Lanet:
Towards a General Framework for Formal Reasoning about Java Bytecode Transformation. SCSS 2012: 63-73 - 2011
- [c7]Ghenima Bourkache, Mohamed Mezghiche, Karim Tamine:
A Distributed Intrusion Detection Model Based on a Society of Intelligent Mobile Agents for Ad Hoc Network. ARES 2011: 569-572 - [c6]Soumia Aggoune, Rabah Imache, Abdelaziz Khadraoui, Mohamed Mezghiche:
Evaluative Framewok for the Measurement of Egovernment Information Systems Agility. CIIA 2011 - [c5]Soumia Aggoune, Rabah Imache, Abdelaziz Khadraoui, Mohamed Mezghiche:
Evaluation of e-Government Information Systems Agility in the Perspective of Sustainability. EGOVIS 2011: 315-329 - 2010
- [c4]Soumia Aggoune, Rabah Imache, Mohamed Mezghiche, Abdelaziz Khadraoui:
Investigation of e-Government Information Systems Agility . KMIS 2010: 311-314
2000 – 2009
- 2009
- [c3]Ali Aïtelhadj, Mohamed Mezghiche, Fatiha Souam:
RI structurée, RI et XML, RI précise. CORIA 2009: 301-317 - [c2]M'hamed Mataoui, Mohamed Mezghiche:
Prise en compte des liens pour améliorer la recherche d'information structurée. CORIA 2009: 363-372 - 2003
- [c1]Rabéa Boulifa, Mohamed Mezghiche:
Another Implementation Technique for Functional Programming Languages. JFLA 2003: 37-48
1990 – 1999
- 1997
- [j4]Mohamed Mezghiche:
c-beta-Machine with lambda-beta-Reduction. Theor. Comput. Sci. 189(1-2): 221-228 (1997) - 1991
- [j3]Mohamed Mezghiche:
Weak Completeness of Type Assignment in lambda-Calculus Models: A Generalization of Hindley's Result. Theor. Comput. Sci. 87(1): 203-208 (1991)
1980 – 1989
- 1989
- [j2]Mohamed Mezghiche:
On Pseudo-c-beta-Normal Form in Combinatory Logic. Theor. Comput. Sci. 66(3): 323-331 (1989) - 1984
- [j1]Mohamed Mezghiche:
Une Nouvelle C beta-Réduction dans la Logique Combinatoire. Theor. Comput. Sci. 31: 151-163 (1984)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint