Useful Links

Workshop Programme

MONDAY, September 29th

8:15 Registration

9:15 Opening session

9:30 Invited talk (session chair: Kamel Barkaoui)


Saddek Bensalem : Compositional Verification of Timed Systems (pdf)

10:30 Break

11:00 Modelling and Verification 1 (session chair: Bruno Monsuez)   


Taha Abdelmoutaleb Cherfia, Faïza Belala and Kamel Barkaoui:
Towards Formal Modeling and Verification of Context-Aware Systems

Hamza Sahli, Faiza Belala and Chafia Bouanaka
Model-Checking Cloud Systems Using BigMC

Hichem Debbi
Diagnosis of Probabilistic Models using Causality and Regression

12:30 Lunch

14:30 Invited talk (session chair: Hassane Alla)


Carla Seatzu: Fault diagnosis of discrete event systems using Petri nets (pdf)

15:30 Break

16:00 Dependability analysis (session chair: Djamil Aïssani)   


Mohamed Ghazel and Florent Peres:
A µ-Calculus Framework for the Diagnosability of Discrete Event Systems

Souilah Hocine, Baadache Abderrahmane and Bouallouche-Medjkoune Louiza:
Coping with Spoofed PS-Poll Based DoS Attack in IEEE

Rebouh Nadjette:
Failure Detector-Ring Paxos Based Atomic Broadcast Algorithm

TUESDAY, September 30th

09:30 Invited talk (session chair: Louiza Medjkoune)


Bernd Heidergott: Towards a Statistical System Analysis (pdf)

10:30 Break

11:00 Performance evaluation(session chair: Mailka Boukala-Iooulalen)   


Yazid Mohand, Sahki Nassim, Bouallouche-Medjkoune Louiza and Aïssani Djamil:
Analytical Modeling of the IEEE 802.11e EDCA Network

Zouweyna Mordji, Mourad Amad and Djamil AÏssani:
A Derived Queueing Network Model for Structured P2P Architectures

Mouloud Atmani, Djamil Aïssani and Yassine Hadjadj-Aoul:
Applying data fragmentation in IEEE 802.15.4: modeling and analysis under

12:30 Lunch

14:30 Modelling and Verification 2 (session chair: Faïza Belala)   


Outman El Hichami, Mohammed Al Achhab, Ismail Berrada and Badr Eddine El Mohajir:
Visual specification language and automatic checking of business process

Miloud Bennama and Thouraya Bouabana-Tebibel:
Mapping OCL constraints into CTL-like logic and SML for UML validation

15:30 Break and Poster Presentations


Karim Dahmani and Mahjoub Langar:
Enforcing Security Policies on Choreographed Services using Rewriting Techniques

El Hassene Ait Mokhtar, Radouane Laggoune and Alaa Chateauneuf:
Bayesian networks for the evaluation of complex systems' availability

Aldjia Nait Abdesselam, Radouane Kara and Jean Jacques Loiseau:
Observer design and feedback controller synthesis with observer in idempotent semiring

Kahlessenane Fares, Bouallouche-Medjkoune Louiza and AÏssani Djamil:
Cross-layer energy-aware protocol for wireless sensor networks

Samira Yessad, Louiza Bouallouche-Medjkoune and Djamil Aissani:
Comparison of Routing Protocols in Wireless Sensor Networks

Kamal Mehaoued, Larbi Sekhri and Malika Bourenane:
Fairness Improvement of MAC in Wireless Ad Hoc Networks

17:30 Closing session