Search Results - "Laval, Jannik"

Refine Results
  1. 1

    Information Extraction of Cybersecurity Concepts: An LSTM Approach by Gasmi, Houssem, Laval, Jannik, Bouras, Abdelaziz

    Published in Applied sciences (01-10-2019)
    “…Extracting cybersecurity entities and the relationships between them from online textual resources such as articles, bulletins, and blogs and converting these…”
    Get full text
    Journal Article
  2. 2

    Building a ROS-Based Testbed for Realistic Multi-Robot Simulation: Taking the Exploration as an Example by Yan, Zhi, Fabresse, Luc, Laval, Jannik, Bouraqadi, Noury

    Published in Robotics (Basel) (12-09-2017)
    “…While the robotics community agrees that the benchmarking is of high importance to objectively compare different solutions, there are only few and limited…”
    Get full text
    Journal Article
  3. 3

    Requirements engineering and enterprise architecture-based software discovery and reuse by Belfadel, Abdelhadi, Laval, Jannik, Bonner Cherifi, Chantal, Moalla, Nejib

    “…Organizations’ business processes need to be adapted in response to changing internal and external environments, which are becoming increasingly complex. We…”
    Get full text
    Journal Article
  4. 4

    Toward an Innovative Educational Method to Train Students to Agile Approaches in Higher Education: The A.L.P.E.S by Laval, Jannik, Fleury, Anthony, Karami, Abir B., Lebis, Alexis, Lozenguez, Guillaume, Pinot, Rémy, Vermeulen, Mathieu

    Published in Education sciences (01-06-2021)
    “…Introduced in 2013, the A.L.P.E.S. approach (AgiLe aPproaches in higher Education Studies) aims to apply agile practices to teaching. Agile approaches are…”
    Get full text
    Journal Article
  5. 5

    Legacy Software Restructuring: Analyzing a Concrete Case by Anquetil, N, Laval, J

    “…Software re-modularization is an old preoccupation of reverse engineering research. The advantages of a well structured or modularized system are well known…”
    Get full text
    Conference Proceeding
  6. 6
  7. 7

    Towards software reuse through an enterprise architecture-based software capability profile by Belfadel, Abdelhadi, Amdouni, Emna, Laval, Jannik, Cherifi, Chantal Bonner, Moalla, Nejib

    Published in Enterprise information systems (02-01-2022)
    “…Most of today's software development projects depend on the usage of existing solutions to save time and development costs. We target in this research work the…”
    Get full text
    Journal Article
  8. 8

    Data interoperability assessment, case of messaging‐based data exchanges by Laval, Jannik, Amokrane, Nawel, Thiam Niang, Boubou, Derras, Mustapha, Moalla, Néjib

    “…Data interoperability implies data exchanges among intra and inter enterprises collaborating with information systems (IS). The multiplicity of these exchanges…”
    Get full text
    Journal Article
  9. 9

    PhaDOP: A Pharo framework for implementing software product lines using Delta-Oriented Programming and model-based engineering by Niang, Boubou Thiam, Kahn, Giacomo, Ouzrout, Yacine, Derras, Mustapha, Laval, Jannik

    Published in Journal of computer languages (Online) (01-08-2024)
    “…Delta-Oriented Programming is a modular, and flexible paradigm for implementing a Software Product Line. Delta-Oriented Programming involves implementing a…”
    Get full text
    Journal Article
  10. 10

    PhaDOP: A Pharo Framework for Implementing Software Product Lines using Delta-Oriented Programming and Model-Based Engineering: PhaDOP Smalltalk-based Framework for MDE SPL DOP by Niang, Boubou Thiam, Kahn, Giacomo, Ouzrout, Yacine, Derras, Mustapha, Laval, Jannik

    Published in Journal of computer languages (Online) (04-06-2024)
    “…Delta-Oriented Programming is a modular, and flexible paradigm for implementing a Software Product Line. Delta-Oriented Programming involves implementing a…”
    Get full text
    Journal Article
  11. 11

    Resolving cyclic dependencies between packages with enriched dependency structural matrix by Laval, Jannik, Ducasse, Stéphane

    Published in Software, practice & experience (01-02-2014)
    “…SUMMARYDependency structural matrix (DSM) is an approach originally developed for process optimization. It has been successfully applied to identify software…”
    Get full text
    Journal Article
  12. 12

    Software quality metrics aggregation in industry by Mordal, Karine, Anquetil, Nicolas, Laval, Jannik, Serebrenik, Alexander, Vasilescu, Bogdan, Ducasse, Stéphane

    “…SUMMARY With the growing need for quality assessment of entire software systems in the industry, new issues are emerging. First, because most software quality…”
    Get full text
    Journal Article
  13. 13

    Metrics for performance benchmarking of multi-robot exploration by Zhi Yan, Fabresse, Luc, Laval, Jannik, Bouraqadi, Noury

    “…Performance benchmarking has become an important topic within robotics. It is indeed, a critical way to compare different solutions under different conditions…”
    Get full text
    Conference Proceeding
  14. 14

    Resolving cyclic dependencies between packages with enricheddependency structural matrix by Laval, Jannik, Ducasse, Stéphane

    Published in Software, practice & experience (01-02-2014)
    “…SUMMARY Dependency structural matrix (DSM) is an approach originally developed for process optimization. It has been successfully applied to identify software…”
    Get full text
    Journal Article
  15. 15

    A methodology for testing mobile autonomous robots by Laval, Jannik, Fabresse, Luc, Bouraqadi, Noury

    “…Mobile autonomous robots are progressively entering the mass market. Thus, manufacturers have to perform quality assurance tests on series of robots…”
    Get full text
    Conference Proceeding
  16. 16

    oZone: Layer identification in the presence of cyclic dependencies by Laval, Jannik, Anquetil, Nicolas, Bhatti, Usman, Ducasse, Stéphane

    Published in Science of computer programming (01-08-2013)
    “…A layered software architecture helps in understanding the role of software entities (e.g. packages or classes) in a system and, hence, the impact of changes…”
    Get full text
    Journal Article
  17. 17

    LSTM Recurrent Neural Networks for Cybersecurity Named Entity Recognition by Gasmi, Houssem, Laval, Jannik, Bouras, Abdelaziz

    Published 30-08-2024
    “…ICSEA 2018, Luigi Lavazza; Roy Oberhauser; Radek Koci, Oct 2018, Nice, France The automated and timely conversion of cybersecurity information from…”
    Get full text
    Journal Article
  18. 18

    Supporting simultaneous versions for software evolution assessment by Laval, Jannik, Denier, Simon, Ducasse, Stéphane, Falleri, Jean-Rémy

    Published in Science of computer programming (01-12-2011)
    “…When reengineering software systems, maintainers should be able to assess and compare multiple change scenarios for a given goal, so as to choose the most…”
    Get full text
    Journal Article
  19. 19

    Cold-start cybersecurity ontology population using information extraction with LSTM by Gasmi, Houssem, Laval, Jannik, Bouras, Abdelaziz

    “…In this paper, we discuss how Long Short Time Memory (LSTM) neural networks can be applied to cyber security knowledge base population. Assuming we have an…”
    Get full text
    Conference Proceeding
  20. 20

    Identifying Cycle Causes with Enriched Dependency Structural Matrix by Laval, J., Denier, S., Ducasse, S., Bergel, A.

    “…Dependency structure matrix (DSM) has been successfully applied to identify software dependencies among packages and subsystems. A number of algorithms were…”
    Get full text
    Conference Proceeding