default search action
Imed E. Bennour
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c12]Oumayma Kahouli, Mariem Hafsa, Hiba Hellara, Imed Eddine Bennour, Najoua Essoukri Ben Amara, Olfa Kanoun:
Improved Particle Swarm Optimization Algorithm for EIT Image Reconstruction. SSD 2023: 906-911 - 2021
- [j5]Imed Eddine Bennour:
Formal verification of timed synchronous dataflow graphs using Lustre. J. Log. Algebraic Methods Program. 121: 100678 (2021)
2010 – 2019
- 2019
- [j4]Imed Eddine Bennour, Monia Ettouil, Rim Zarrouk, Abderrazak Jemai:
Study of runtime performance for Java-multithread PSO on multicore machines. Int. J. Comput. Sci. Eng. 19(4): 483-493 (2019) - [j3]Rim Zarrouk, Imed Eddine Bennour, Abderrazek Jemai:
A two-level particle swarm optimization algorithm for the flexible job shop scheduling problem. Swarm Intell. 13(2): 145-168 (2019) - 2018
- [j2]Rim Zarrouk, Imed Eddine Bennour, Abderrazak Jemai:
Performance improvement of the particle swarm optimisation algorithm for the flexible job shop problem under machines breakdown. Int. J. Intell. Eng. Informatics 6(3/4): 396-416 (2018) - [c11]Rim Zarrouk, Imed E. Bennour, Abderrazek Jemai:
Simulation-Based Comparison of P-Metaheuristics for FJSP with and Without Fuzzy Processing Time. IEA/AIE 2018: 408-413 - 2017
- [c10]Rim Zarrouk, Imed Bennour, Abderrazak Jemai, Abdelghani Bekrar:
FJS Problem Under Machine Breakdowns. IEA/AIE (1) 2017: 124-130 - 2016
- [c9]Imed E. Bennour, Abderrazek Jemai:
Timed-SDF patterns for applications throughput analysis. IDT 2016: 187-192 - [c8]Imed E. Bennour:
SystemC TLM2-protocol consistency checker using Petri net. IDT 2016: 193-198 - [c7]Salaheddine Hamza Sfar, Rached Tourki, Imed E. Bennour:
Stepwise SystemC/TLM-2 models structuring and optimizations. IDT 2016: 199-204 - 2012
- [c6]Imed Bennour:
Petri nets framework for analyzing the communication behavior of TLM modules. DTIS 2012: 1-4 - 2010
- [i1]Dorsaf Sebai, Abderrazak Jemai, Imed Bennour:
Performance Analysis of Software to Hardware Task Migration in Codesign. CoRR abs/1002.1154 (2010)
2000 – 2009
- 2003
- [c5]Adel Baganne, Imed Bennour, Mehrez Elmarzougui, Riadh Gaiech, Eric Martin:
A Multi-Level Design Flow for Incorporating IP Cores: Case Study of 1D Wavelet IP Integration. DATE 2003: 20250-20255 - [c4]Adel Baganne, Imed Bennour, Mehrez Elmarzougui, Eric Martin:
A simulation based approach for incorporating virtual components IP cores into multimedia systems design. ICASSP (2) 2003: 525-528 - [c3]Adel Baganne, Imed Bennour, Mehrez Elmarzougui, Eric Martin:
A simulation based approach for incorporating virtual components IP cores into multimedia systems design. ICME 2003: 817-820
1990 – 1999
- 1998
- [c2]François R. Boyer, El Mostapha Aboulhamid, Yvon Savaria, Imed Eddine Bennour:
Optimal design of synchronous circuits using software pipelining techniques. ICCD 1998: 62-67 - 1996
- [j1]Imed Eddine Bennour, El Mostapha Aboulhamid:
Lower bounds on the iteration time and the initiation interval of functional pipelining and loop folding. Des. Autom. Embed. Syst. 1(4): 333-355 (1996) - 1993
- [c1]Jocelyn Cloutier, Imed Bennour:
Topological Characterization of Hwang's Optimal Steiner Trees. CCCG 1993: 157-162
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint