Cherif Foudil

Orcid: 0000-0003-1539-835X

According to our database1, Cherif Foudil authored at least 29 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A reputation assessment model for trustful service recommendation.
Comput. Stand. Interfaces, 2023

2022
Toward Emerging Cubic-Spline Patterns With a Mobile Robotics Swarm System.
IEEE Trans. Cogn. Dev. Syst., 2022

2020
Motions Planning for Virtual Character.
Computación y Sistemas, 2020

Improving robots swarm aggregation performance through the Minkowski distance function.
Proceedings of the 6th International Conference on Mechatronics and Robotics Engineering, 2020

2019
A simulation model of pedestrian wayfinding behaviour in familiar environments.
Int. J. Comput. Appl. Technol., 2019

Flexible and Efficient Topological Approaches for a Reliable Robots Swarm Aggregation.
IEEE Access, 2019

2018
Estimating the reputation of newcomer web services using a regression-Based method.
J. Syst. Softw., 2018

Self-organization in aggregating robot swarms: A DW-KNN topological approach.
Biosyst., 2018

2017
RFID Authentication Protocols Based on Error-Correcting Codes: A Survey.
Wirel. Pers. Commun., 2017

Monitoring a robot swarm using a data-driven fault detection approach.
Robotics Auton. Syst., 2017

A measurement-based fault detection approach applied to monitor robots swarm.
Proceedings of the 6th International Conference on Systems and Control, 2017

2016
Integrating quality requirements in engineering web service orchestrations.
J. Syst. Softw., 2016

A Virtual Viscoelastic Based Aggregation Model for Self-organization of Swarm Robots System.
Proceedings of the Towards Autonomous Robotic Systems - 17th Annual Conference, 2016

2015
A process to identify relevant substitutes for healing failed WS-* orchestrations.
J. Syst. Softw., 2015

Improved RFID Authentication Protocol Based on Randomized McEliece Cryptosystem.
Int. J. Netw. Secur., 2015

Regression-Based Bootstrapping of Web Service Reputation Measurement.
Proceedings of the 2015 IEEE International Conference on Web Services, 2015

Weaknesses in Two RFID Authentication Protocols.
Proceedings of the Codes, Cryptology, and Information Security, 2015

2014
Processing the Evolution of Quality Requirements of Web Service Orchestrations: A Pattern-Based Approach.
Proceedings of the 2014 IEEE/IFIP Conference on Software Architecture, 2014

Quality-Driven Design of Web Service Business Processes.
Proceedings of the 2014 IEEE 23rd International WETICE Conference, 2014

Cooperative co-evolution of configuration and control for modular robots.
Proceedings of the 4th International Conference on Multimedia Computing and Systems, 2014

2013
Automatic Generation of SPL Structurally Valid Products Using Graph Transformations Approach.
Proceedings of the Modeling Approaches and Algorithms for Advanced Computer Applications, 2013

Algebraic Replay Attacks on Authentication in RFID Protocols.
Proceedings of the Advances in Security of Information and Communication Networks, 2013

2012
Formal Specification of Software Product Lines: A Graph Transformation Based Approach.
J. Softw., 2012

An Authentication Protocol Based on Combined RFID-Biometric System RFID-Biometric System
CoRR, 2012

Multi-layered framework for crowd microscopic simulation.
Proceedings of the 2012 International Conference on Multimedia Computing and Systems, 2012

A Practical Approach to the Measurement of Similarity between WSDL-basedWeb Services.
Proceedings of the 6ème Conférence francophone sur les Architectures Logicielles, 2012

2011
Conception et Vérification d'un Protocole d'Authentification de Systéme Combiné RFID-Biométrique.
Proceedings of the Third International Conference on Computer Science and its Applications (CIIA'11), 2011

2010
Crowd simulation influenced by agent's socio-psychological state
CoRR, 2010

2009
Path finding and Collision Avoidance in Crowd Simulation.
J. Comput. Inf. Technol., 2009


  Loading...