default search action
Stéphane Maag
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i4]Changlong Ji, Stephane Maag, Richard Heusdens, Qiongxiu Li:
Re-Evaluating Privacy in Centralized and Decentralized Learning: An Information-Theoretical and Empirical Study. CoRR abs/2409.14261 (2024) - 2021
- [j12]Jose Alfredo Alvarez Aldana, Stephane Maag, Fatiha Zaïdi:
A formal consensus-based distributed monitoring approach for mobile IoT networks. Internet Things 13: 100352 (2021) - 2020
- [c69]Duyen Phuc Nguyen, Stephane Maag:
Codeless Web Testing using Selenium and Machine Learning. ICSOFT 2020: 51-60 - [c68]Duyen Phuc Nguyen, Stephane Maag:
A Machine Learning Based Methodology for Web Systems Codeless Testing with Selenium. ICSOFT (Selected Papers) 2020: 184-202
2010 – 2019
- 2019
- [c67]Sarah A. Dahab, Stéphane Maag:
Suggesting Software Measurement Plans with Unsupervised Learning Data Analysis. ENASE 2019: 189-197 - [c66]Sarah A. Dahab, Stephane Maag:
Automated Software Measurement Strategies Elaboration Using Unsupervised Learning Data Analysis. ENASE (Selected Papers) 2019: 341-363 - [c65]Rabéa Ameur-Boulifa, Ana R. Cavalli, Stephane Maag:
From Formal Test Objectives to TTCN-3 for Verifying ETCS Complex Software Control Systems. ICSOFT (Selected Papers) 2019: 156-178 - [c64]Rabéa Ameur-Boulifa, Ana R. Cavalli, Stephane Maag:
Verifying Complex Software Control Systems from Test Objectives: Application to the ETCS System. ICSOFT 2019: 397-406 - [c63]Thierno Birahime Sambe, Stephane Maag, Ana R. Cavalli:
A Methodology for Enterprise Resource Planning Automation Testing Application to the Open Source ERP-ODOO. ICSOFT 2019: 407-415 - 2018
- [c62]Jose Alfredo Alvarez Aldana, Stephane Maag, Fatiha Zaïdi:
MANETs Interoperability: Current Trends and Open Research. AINA Workshops 2018: 481-487 - [c61]Sarah A. Dahab, Juan Jose Hernandez Porras, Stephane Maag:
A Novel Formal Approach to Automatically Suggest Metrics in Software Measurement Plans. ENASE 2018: 283-290 - [c60]Sarah A. Dahab, Erika Silva, Stephane Maag, Ana Rosa Cavalli, Wissam Mallouli:
Enhancing Software Development Process Quality based on Metrics Correlation and Suggestion. ICSOFT 2018: 154-165 - [c59]Sarah A. Dahab, Stephane Maag, Wissam Mallouli, Ana R. Cavalli:
Smart Measurements and Analysis for Software Quality Enhancement. ICSOFT (Selected Papers) 2018: 194-219 - [c58]Erick Petersen, Marco Antonio To, Stephane Maag, Thierry Yamga:
An Unsupervised Rule Generation Approach for Online Complex Event Processing. NCA 2018: 1-8 - [i3]Jose Alvarez, Stéphane Maag, Fatiha Zaïdi:
MANETs monitoring with a distributed hybrid architecture. CoRR abs/1805.02717 (2018) - [i2]Jose Alvarez, Stephane Maag, Fatiha Zaïdi:
Monitoring Dynamic Mobile Ad-Hoc Networks: A Fully Distributed Hybrid Architecture. CoRR abs/1805.03513 (2018) - 2017
- [c57]Sarah A. Dahab, Stephane Maag, Xiaoping Che:
A Software Measurement Framework Guided by Support Vector Machines. AINA Workshops 2017: 397-402 - [c56]Jose Alvarez, Stephane Maag, Fatiha Zaïdi:
Monitoring Dynamic Mobile Ad-Hoc Networks: A Fully Distributed Hybrid Architecture. AINA 2017: 407-414 - [c55]Erick Petersen, Marco Antonio To, Stephane Maag:
A novel online CEP learning engine for MANET IDS. LATINCOM 2017: 1-6 - [i1]Jose Alvarez, Stephane Maag, Fatiha Zaïdi:
DHYMON: a Continuous Decentralized Hybrid Monitoring Architecture for MANETs. CoRR abs/1712.01676 (2017) - 2016
- [j11]Jorge López, Stéphane Maag, Gerardo Morales:
Behavior evaluation for trust management based on formal distributed network monitoring. World Wide Web 19(1): 21-39 (2016) - [c54]Thi Hien Le, Stephane Maag:
Ads Network Monitoring Integrating Realistic Urban Mobility Patterns. AINA Workshops 2016: 737-742 - [c53]Sarah A. Dahab, Stephane Maag, Alessandra Bagnato, Marcos Aurélio Almeida da Silva:
A Learning based approach for Green Software Measurements. MeGSuS@ESEM 2016: 13-22 - [c52]Erick Petersen, Marco Antonio To, Stephane Maag:
An online learning based approach for CEP rule generation. LATINCOM 2016: 1-6 - [c51]Jose Alvarez, Stéphane Maag, Fatiha Zaïdi:
MANETs monitoring with a distributed hybrid architecture. NCA 2016: 388-391 - 2015
- [j10]Xiaoping Che, Jorge López, Stéphane Maag, Gerardo Morales:
Testing trust properties using a formal distributed network monitoring approach. Ann. des Télécommunications 70(3-4): 95-105 (2015) - [j9]Xiaoping Che, Stephane Maag:
Formally testing the protocol performances. Int. J. Space Based Situated Comput. 5(2): 76-88 (2015) - [j8]Xiaoping Che, Stéphane Maag, Hwee-Xian Tan, Hwee-Pink Tan, Zhangbing Zhou:
A Passive Testing Approach for Protocols in Wireless Sensor Networks. Sensors 15(11): 29250-29272 (2015) - [c50]Jorge López, Stéphane Maag, Gerardo Morales:
TEAR: A Multi-purpose Formal Language Specification for TEsting at Runtime. ARES 2015: 727-734 - [c49]Marco Antonio To, Jose Alvarez, Marcos Cano, Stephane Maag:
Spanning Data Across Heterogeneous MANETs through Proactive Strip Interoperability. CIT/IUCC/DASC/PICom 2015: 116-124 - [c48]Jorge López, Stephane Maag, Cecilia Saint-Pierre, Javier Bustos-Jiménez, Ana R. Cavalli:
Process Mining for Trust Monitoring. AINA Workshops 2015: 605-610 - [c47]Alberto Marroquin, Douglas Gonzalez, Stephane Maag:
Testing distributed systems with test cases dependencies architecture. LATINCOM 2015: 1-6 - [c46]Oscar Rodas, Marco Antonio To, Jose Alvarez, Stephane Maag:
Protecting Wireless Mesh Networks through a distributed intrusion prevention framework. LATINCOM 2015: 1-6 - [c45]Marco Antonio To, Oscar Rodas, Preng Biba, Stéphane Maag:
A proactive approach for strip interoperability in wireless ad hoc routing protocols. LATINCOM 2015: 1-6 - [c44]Xiaoping Che, Stephane Maag, Huu Nghia Nguyen, Fatiha Zaïdi:
Guiding Testers' Hands in Monitoring Tools: Application of Testing Approaches on SIP. ICTSS 2015: 105-123 - [c43]Alberto Marroquin, Douglas Gonzalez, Stephane Maag:
A novel distributed testing approach based on test cases dependencies for communication protocols. RACS 2015: 497-504 - [c42]Jorge López, Stephane Maag:
Towards a Generic Trust Management Framework Using a Machine-Learning-Based Trust Model. TrustCom/BigDataSE/ISPA (1) 2015: 1343-1348 - [c41]Xiaoping Che, Stephane Maag, Hwee-Xian Tan, Hwee-Pink Tan:
Passively Testing Routing Protocols in Wireless Sensor Networks. UIC/ATC/ScalCom 2015: 270-277 - 2014
- [j7]Xiaoping Che, Stephane Maag:
Testing protocols in Internet of Things by a formal passive technique. Sci. China Inf. Sci. 57(3): 1-13 (2014) - [j6]Xiaoping Che, Stephane Maag:
Passive performance testing of network protocols. Comput. Commun. 51: 36-47 (2014) - [c40]Jorge López, Xiaoping Che, Stéphane Maag, Gerardo Morales:
A Distributed Monitoring Approach for Trust Assessment Based on Formal Testing. AINA Workshops 2014: 702-707 - [c39]Xiaoping Che, Jorge López, Stéphane Maag:
Online Testing: A Passive Approach for Protocols. ENASE (Selected Papers) 2014: 79-92 - [c38]Jorge López, Xiaoping Che, Stephane Maag:
An Online Passive Testing Approach for Communication Protocols. ENASE 2014: 136-143 - [c37]Marco Antonio To, Gerardo Morales, Stephane Maag:
Strip Interoperability for Wireless Ad Hoc Routing Protocols. NCA 2014: 32-36 - [c36]Xiaoping Che, Stéphane Maag, Jorge López, Ana R. Cavalli:
Testing Network Protocols: formally, at runtime and online. SEKE 2014: 90-93 - 2013
- [j5]Pramila Mouttappa, Stephane Maag, Ana R. Cavalli:
Using passive testing based on symbolic execution and slicing techniques: Application to the validation of communication protocols. Comput. Networks 57(15): 2992-3008 (2013) - [j4]Felipe Lalanne, Stephane Maag:
A Formal Data-Centric Approach for Passive Testing of Communication Protocols. IEEE/ACM Trans. Netw. 21(3): 788-801 (2013) - [c35]Xiaoping Che, Stéphane Maag:
Passive Testing on Performance Requirements of Network Protocols. AINA Workshops 2013: 1439-1444 - [c34]Pramila Mouttappa, Stephane Maag, Ana R. Cavalli:
Monitoring Based on IOSTS for Testing Functional and Security Properties: Application to an Automotive Case Study. COMPSAC 2013: 1-10 - [c33]Xiaoping Che, Stephane Maag:
A Formal Passive Performance Testing Approach for Distributed Communication Systems. ENASE 2013: 74-84 - [c32]Xiaoping Che, Stephane Maag:
Testing Distributed Communication Protocols by Formal Performance Monitoring. ENASE (Selected Papers) 2013: 110-125 - [c31]Xiaoping Che, Stéphane Maag:
A Passive Testing Approach for Protocols in Internet of Things. GreenCom/iThings/CPScom 2013: 678-684 - [c30]Felipe Lalanne, Stephane Maag:
DataMonitor - A formal approach for passively testing a MANET routing protocol. IWCMC 2013: 207-212 - [c29]Jorge López, Stephane Maag, Gerardo Morales:
A formal distributed network monitoring approach for enhancing trust management systems. MEDES 2013: 76-83 - 2012
- [c28]Xiaoping Che, Felipe Lalanne, Stephane Maag:
A Logic-based Passive Testing Approach for the Validation of Communicating Protocols. ENASE 2012: 53-64 - [c27]Xiaoping Che, Felipe Lalanne, Stephane Maag:
A Formal Monitoring Technique for SIP Conformance Testing. ENASE (Selected Papers) 2012: 79-94 - [c26]Pramila Mouttappa, Stéphane Maag, Ana R. Cavalli:
An IOSTS Based Passive Testing Approach for the Validation of Data-Centric Protocols. QSIC 2012: 49-58 - [c25]Felipe Lalanne, Ana R. Cavalli, Stephane Maag:
Quality of Experience as a Selection Criterion for Web Services. SITIS 2012: 519-526 - 2011
- [j3]Aline Carneiro Viana, Stephane Maag, Fatiha Zaïdi:
One step forward: Linking wireless self-organizing network validation techniques with formal testing approaches. ACM Comput. Surv. 43(2): 7:1-7:36 (2011) - [c24]Felipe Lalanne, Stephane Maag:
Protocol Data Parts Inclusion in a Formal Passive Testing Approach. AINA Workshops 2011: 569-573 - [c23]Maxim Zhigulin, Nina Yevtushenko, Stéphane Maag, Ana R. Cavalli:
FSM-Based Test Derivation Strategies for Systems with Time-Outs. QSIC 2011: 141-149 - 2010
- [j2]Rita Dorofeeva, Khaled El-Fakih, Stéphane Maag, Ana R. Cavalli, Nina Yevtushenko:
FSM-based conformance testing methods: A survey annotated with experimental evaluation. Inf. Softw. Technol. 52(12): 1286-1297 (2010) - [c22]Fatiha Zaïdi, Mounir Lallali, Stéphane Maag:
A component based testing technique for a MANET routing protocol. AICCSA 2010: 1-7 - [c21]Bakr Sarakbi, Stéphane Maag:
Partial Complete iBGP. ICC 2010: 1-5 - [c20]Gerardo Morales, Stéphane Maag, Ana R. Cavalli, Wissam Mallouli, Edgardo Montes de Oca, Bachar Wehbi:
Timed Extended Invariants for the Passive Testing of Web Services. ICWS 2010: 592-599 - [c19]Bakr Sarakbi, Stéphane Maag:
BGP Skeleton - An Alternative to iBGP Route Reflection. INFOCOM 2010: 301-305
2000 – 2009
- 2009
- [c18]César Andrés, Stéphane Maag, Ana R. Cavalli, Mercedes G. Merayo, Manuel Núñez:
Analysis of the OLSR Protocol by Using Formal Passive Testing. APSEC 2009: 152-159 - [c17]Felipe Lalanne, Stéphane Maag, Edgardo Montes de Oca, Ana R. Cavalli, Wissam Mallouli, Arnaud Gonguet:
An Automated Passive Testing Approach for the IMS PoC Service. ASE 2009: 535-539 - [c16]Felipe Lalanne, Stéphane Maag:
From the IMS PoC service monitoring to its formal conformance testing. Mobility Conference 2009 - [c15]Ana R. Cavalli, Stéphane Maag, Edgardo Montes de Oca, Fatiha Zaïdi:
A Formal Passive Testing Approach to test a MANET Routing Protocol. PerCom Workshops 2009: 1-6 - [c14]Ana R. Cavalli, Stéphane Maag, Edgardo Montes de Oca:
A passive conformance testing approach for a MANET routing protocol. SAC 2009: 207-211 - 2008
- [j1]Stéphane Maag, Cyril Grepet, Ana R. Cavalli:
A formal validation methodology for MANET routing protocols based on nodes' self similarity. Comput. Commun. 31(4): 827-841 (2008) - [c13]Stéphane Maag, Cyril Grepet:
A Node Self Similarity Approach for Interoperability Testing of Ad Hoc Routing Protocols. AINA Workshops 2008: 983-988 - [c12]Stéphane Maag, Cyril Grepet:
Interoperability testing of a MANET routing protocol using a node self-similarity approach. SAC 2008: 1908-1912 - 2007
- [c11]Cyril Grepet, Stéphane Maag:
A Testing Methodology for a MANET Routing Protocol Using a Node Self-Similarity Approach. PerCom Workshops 2007: 514-519 - [c10]Cyril Grepet, Stéphane Maag:
Nodes Self-similarity to Test Wireless Ad Hoc Routing Protocols. TestCom/FATES 2007: 123-137 - [c9]Ana R. Cavalli, Stéphane Maag, Gerardo Morales:
Regression and Performance Testing of an e-Learning Web Application: dotLRN. SITIS 2007: 369-376 - 2006
- [c8]Cyril Grepet, Stéphane Maag:
Conformance and Interoperability Testing of an Ad Hoc Routing Protocol. MDM 2006: 124 - [c7]Stéphane Maag, Fatiha Zaïdi:
Testing methodology for an ad hoc routing protocol. PM2HW2N 2006: 48-55 - [c6]Ana R. Cavalli, Stéphane Maag, Wissam Mallouli, Mikael Marche, Yves-Marie Quemener:
Application of Two Test Generation Tools to an Industrial Case Study. TestCom 2006: 134-148 - 2004
- [c5]Ana R. Cavalli, Cyril Grepet, Stéphane Maag, Vincent Tortajada:
A Validation Model for the DSR Protocol. ICDCS Workshops 2004: 768-773 - [c4]Ana R. Cavalli, Stéphane Maag, Sofia Papagiannaki, Georgios Verigakis, Fatiha Zaïdi:
A Testing Methodology for an Open Software E-learning Platform. EDUTECH 2004: 165-174 - [c3]Ana R. Cavalli, Stéphane Maag:
Automated test scenarios generation for an e-barter system. SAC 2004: 795-799 - [c2]Ana R. Cavalli, Stéphane Maag, Sofia Papagiannaki, Georgios Verigakis:
From UML models to automatic generated tests for the dotLRN e-learning platform. TACoS 2004: 133-144 - 2002
- [c1]Ana R. Cavalli, Stéphane Maag:
A New Algorithm for Service Interaction Detection. ICFEM 2002: 371-382
Coauthor Index
aka: Ana Rosa Cavalli
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint