Author of the publication

Incremental development of UML specifications using operation refinements.

, , and . Innov. Syst. Softw. Eng., 4 (3): 259-266 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Incremental development of UML specifications using operation refinements., , and . Innov. Syst. Softw. Eng., 4 (3): 259-266 (2008)Fraud Detection Using Large-scale Imbalance Dataset., , and . Int. J. Artif. Intell. Tools, 31 (8): 2250037:1-2250037:23 (December 2022)Comparative Data Oversampling Techniques with Deep Learning Algorithms for Credit Card Fraud Detection., , and . ISDA (1), volume 646 of Lecture Notes in Networks and Systems, page 286-296. Springer, (2022)Prediction of COVID-19 Active Cases Using Polynomial Regression and ARIMA Models., , and . ISDA, volume 418 of Lecture Notes in Networks and Systems, page 1351-1362. Springer, (2021)Neural perceptual model to global-local vision for recognition of the logical structure of administrative documents.. CoRR, (2013)Incremental development of UML specifications using operation refinements, , and . Innovations in Systems and Software Engineering, 4 (3): 259--266 (October 2008)Modélisation événementielle pour la construction de diagrammes de classes., , and . Ingénierie des Systèmes d Inf., 13 (3): 131-155 (2008)Contribution à l'ingénierie des systèmes : Raffinement et Refactoring de spécifications UML. (Contribution to the Systems Engineering: Refinement and Refactoring of UML specifications).. University of Sfax, Tunisia, (2012)Machine Learning Models for Early Prediction of COVID-19 Infections Based on Clinical Signs., , , and . SN Comput. Sci., 5 (1): 158 (January 2024)Pattern-based model refactoring for the introduction association relationship., and . J. King Saud Univ. Comput. Inf. Sci., 27 (2): 170-180 (2015)