Search For:

Displaying 1-34 out of 34 total
Compatibility and Replaceability Analysis of Timed Web Services Protocols
Found in: Computer and Electrical Engineering, International Conference on
By Emad Elabd,Emmanuel Coquery,Mohand-Said Hacid
Issue Date:December 2009
pp. 15-19
Nowadays, most enterprises use web services as a framework for facilitating application-to-application interaction within and across them. Describing behaviour of web services is becoming more and more important. This behaviour can be described by timed bu...
 
Data Integration in Presence of Authorization Policies
Found in: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Mehdi Haddad,Mohand-Said Hacid,Robert Laurini
Issue Date:June 2012
pp. 92-99
Information is more and more stored over distributed sources. A simple access to information in these sources requires a single access point. Data integration methods are designed to provide this kind of access by allowing to specify a mediator between the...
 
Message Correlation and Web Service Protocol Mining from Inaccurate Logs
Found in: Web Services, IEEE International Conference on
By Kreshnik Musaraj, Tetsuya Yoshida, Florian Daniel, Mohand-Said Hacid, Fabio Casati, Boualem Benatallah
Issue Date:July 2010
pp. 259-266
Business process management, service-oriented architectures and software back-engineering heavily rely on the fundamental processes of mining of processes and web service business protocols from log files. Model extraction and mining aim at the (re)discove...
 
Fuzzy Conceptual Graphs for Handling Uncertainty in Semantic Video Retrieval
Found in: Multimedia, International Symposium on
By Ahmed Azough, Alexandre Delteil, Mohand-Said Hacid, Fabien De Marchi
Issue Date:December 2009
pp. 324-329
Uncertainty is one of the major challenges related to the semantic gap in multimedia data description and retrieval. It is due not only to errors and imprecisions in content classification but also to the extended range of user queries. In this paper, an e...
 
Supporting Web Service Protocol Changes by Propagation
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Ahmed Azough, Emmanuel Coquery, Mohand-Said Hacid
Issue Date:September 2009
pp. 438-441
Very often, enterprises are subject to changes. These changes require adaptations regarding business process, security components, database access, etc. In this paper we present a comprehensive (basic) approach for the controlled evolution of Web service b...
 
Business Compliance Governance in Service-Oriented Architectures
Found in: Advanced Information Networking and Applications, International Conference on
By Florian Daniel, Fabio Casati, Vincenzo D'Andrea, Emmanuel Mulo, Uwe Zdun, Schahram Dustdar, Steve Strauch, David Schumm, Frank Leymann, Samir Sebahi, Fabien de Marchi, Mohand-Said Hacid
Issue Date:May 2009
pp. 113-120
Governing business compliance with regulations, laws, best practices, contracts, and the like is not an easy task, and so far there are only limited software products available that help a company to express compliance rules and to analyze its compliance s...
 
Description and Discovery of Complex Events in Video Surveillance
Found in: Semantic Media Adaptation and Personalization, International Workshop on
By Ahmed Azough, Alexandre Delteil, Fabien De Marchi, Mohand Said Hacid
Issue Date:December 2008
pp. 27-32
Behavior understanding and semantic interpretation of dynamic visual scenes have attracted a lot of attention in computer vision research community. Although the use of surveillance cameras has proliferated, the understanding of activities still remains co...
 
A Representation Language for Multimedia Web Semantic
Found in: Semantic Media Adaptation and Personalization, International Workshop on
By Ahmed Azough, Alexandre Delteil, Mohand-Said Hacid, Fabien de Marchi
Issue Date:December 2007
pp. 38-43
While the extraction of low level multimedia features has been largely studied, the automatic extraction of high level descriptions is still an open research field. More- over, as semantic web languages, which are based on De- scription Logics, are conceiv...
 
Managing Trust in Active XML
Found in: Services Computing, IEEE International Conference on
By Etienne Canaud, Salima Benbernou, Mohand-Saïd Hacid
Issue Date:September 2004
pp. 41-48
Active XML [The Active XML Team, http://www-rocq.inria.fr/gemo/gemo/projects/axml/] combines XML Data and service calls to allow a simple and powerful Web services implementation. Security in Active XML is currently handled by matching the structure of the...
 
Detection of Conflicting Compliance Rules
Found in: Enterprise Distributed Object Computing Conference Workshops, IEEE International
By Francois Hantry,Mohand-Said Hacid,Romuald Thion
Issue Date:September 2011
pp. 419-428
Web-based dynamic systems and pressured business environments need more than ever formal methods to analyze evolving compliance rules. Providing adequate tools to tackle the problem of debugging conflicting temporal compliance rules is an ongoing research ...
 
Timed Web Services Analysis after Removing Complex Implicit Transitions
Found in: Web Services, IEEE International Conference on
By Emad Elabd,Emmanuel Coquery,Mohand-Said Hacid
Issue Date:July 2011
pp. 153-160
Time is an important parameter in modeling and analyzing Web services. A Web service can be presented by its behavior which can be described by a business protocol representing the possible sequences of message exchanges. Automated analyses of timed Web se...
 
Combining Configuration and Query Rewriting for Web Service Composition
Found in: Web Services, IEEE International Conference on
By Amin Mesmoudi,Michaël Mrissa,Mohand-Saïd Hacid
Issue Date:July 2011
pp. 113-120
In this paper, we investigate the combination of configuration and query rewriting for semantic Web service composition. Given a user query and a set of service descriptions, we rely on query rewriting to find services that implement the functionalities ex...
 
Checking Compatibility and Replaceability in Web Services Business Protocols with Access Control
Found in: Web Services, IEEE International Conference on
By Emad Elabd, Emmanuel Coquery, Mohand-Said Hacid
Issue Date:July 2010
pp. 409-416
Recently, most enterprises adapt Web services technologies for designing and building complex inter-enterprise business applications. These applications are built by the coordination between set of Web services. Therefore, checking the compatibility betwee...
 
A view-based Monitoring for Privacy-aware Web services
Found in: Data Engineering, International Conference on
By Hassina Meziane, Salima Benbernou, Aouda K. Zerdali, Mohand-Said. Hacid, Mike Papazoglou
Issue Date:March 2010
pp. 1129-1132
The demonstration addresses the problem of monitoring the compliance of privacy agreement that spells out a consumer's privacy rights and how their private information must be handled by the service provider. We present a Privacy Agreement Monitoring syste...
 
An Ontological Interface for Software Developers to Select Security Patterns
Found in: Database and Expert Systems Applications, International Workshop on
By Paul El Khoury, Amine Mokhtari, Emmanuel Coquery, Mohand-Said Hacid
Issue Date:September 2008
pp. 297-301
In the software development lifecycle, security expertise is one common missing quality that needs to be addressed on a stronger footing, by taking advantage of the scaling effect of security patterns. Security patterns capture security experts' knowledge ...
 
Privacy-Aware Web Service Protocol Replaceability
Found in: Web Services, IEEE International Conference on
By Nawal Guermouche, Salima Benbernou, Emmanuel Coquery, Mohand-Said Hacid
Issue Date:July 2007
pp. 1048-1055
Business protocols are becoming a necessary part ofWeb services description [4]. The work presented in [4] investigates mechanisms for analyzing the compatibility and the substitution (i.e., replaceability) of Web services based on their functional propert...
 
A Privacy Agreement Model forWeb Services
Found in: Services Computing, IEEE International Conference on
By Salima Benbernou, Hassina Meziane, Yin Hua Li, Mohand-Said Hacid
Issue Date:July 2007
pp. 196-203
Web services are among the applications involving closely the customers? private informations. In order to take into account the privacy concerns of the individuals, organizations (e.gWeb services) provide privacy policies as promises describing how they w...
 
Some remarks on self-tuning logical database design
Found in: Data Engineering Workshops, 22nd International Conference on
By Fabien De Marchi, Mohand-Said Hacid, Jean-Marc Petit
Issue Date:April 2005
pp. 1219
<p>Whereas self-tuning physical database design has received a lot of attention recently, self-tuning logical database design seems to be under-studied.</p> <p>Roughly speaking, database administrators (DBA) have to maintain on a daily ba...
 
Resolution and Constraint Propagation for Semantic Web Services Discovery
Found in: Research Issues in Data Engineering, International Workshop on
By Salima Benbernou, Etienne Canaud, Mohand-Said Hacid, Farouk Toumani
Issue Date:March 2004
pp. 23-30
The purpose of semantic web services discovery is to use semantic knowledge to .nd services that can be composed to form an admissible answer to a query. In this paper we consider the advantage of adopting a knowledge-based approach to web services discove...
 
Peering and Querying e-Catalog Communities
Found in: Data Engineering, International Conference on
By Boualem Benatallah, Mohand-Said Hacid, Hye-young Paik, Christophe Rey, Farouk Toumani
Issue Date:April 2004
pp. 846
No summary available.
   
Quality of Service Specification in Video Databases
Found in: IEEE Multimedia
By Elisa Bertino, Tiziana Catarci, Ahmed K. Elmagarmid, Mohand-Saïd Hacid
Issue Date:October 2003
pp. 71-81
<p>Multimedia database systems require not only that correct results are delivered with acceptable delay, but also that they're delivered in real time with acceptable quality. A constraint-based rule language can serve as the foundation for providing...
 
A Knowledge Representation and Reasoning Support for Modeling and Querying Video Data
Found in: Tools with Artificial Intelligence, IEEE International Conference on
By Edoardo Ardizzone, Mohand-Said Hacid
Issue Date:November 1999
pp. 167
This paper describes a knowledge-based approach for modeling and retrieving video data. Selected objects of interest in a video sequence are described and stored in a database. This database forms the object layer. On top of this layer, we define the schem...
 
A Semantic Modeling Approach for Video Retrieval by Content
Found in: Multimedia Computing and Systems, International Conference on
By Edoardo Ardizzone, Mohand-Said Hacid
Issue Date:June 1999
pp. 158
A knowledge-based approach to model and retrieve video data by content is developed. Selected objects of interest in a video sequence are described and stored in a database. This database forms the object layer. On top of this layer, we define the schema l...
 
A Database Approach for Modeling and Querying Video Data
Found in: Data Engineering, International Conference on
By Cyril Decleir, Jacques Kouloumdjian, Mohand-Said Hacid
Issue Date:March 1999
pp. 6
Indexing video data is essential for providing content based access. In this paper, we consider how database technology can offer an integrated framework for modeling and querying video data. As many concerns in video (e.g., modeling and querying) are also...
 
Dynamic Web Services Personalization
Found in: E-Commerce Technology, IEEE International Conference on, and Enterprise Computing, E-Commerce, and E-Services, IEEE International Conference on
By Yacine Sam, Omar Boucelma, Mohand-Said Hacid
Issue Date:June 2006
pp. 86
In order to fulfill current customers requirements, companies and services providers need to supply a large panel of their products and services. This situation has led recently to the Mass Customizing Paradigm, meaning that products and services should be...
 
A Database Approach for Modeling and Querying Video Data
Found in: IEEE Transactions on Knowledge and Data Engineering
By Mohand-Saïd Hacid, Cyril Decleir, Jacques Kouloumdjian
Issue Date:September 2000
pp. 729-750
<p><b>Abstract</b>—Indexing video data is essential for providing content-based access. In this paper, we consider how database technology can offer an integrated framework for modeling and querying video data. As many concerns in video (...
 
Modeling and Querying Video Databases
Found in: EUROMICRO Conference
By Cyril Decleir, Mohand-Saïd Hacid, Jacques Kouloumdjian
Issue Date:August 1998
pp. 20492
Indexing video data is essential for providing content based access. This paper develops a data model and a rule-based query language for video content based indexing and retrieval. The data model is based on the notion of generalized strata, which can be ...
 
Generalizing email messages digests
Found in: Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems (CHI EA '11)
By Jean-Marc Petit, Mohand-Said Hacid, Romain Vuillemot
Issue Date:May 2011
pp. 1933-1938
An email digest is a message that results from the combination of other messages. Mailing list management systems implement digests to let subscribers reduce their email messages frequency. In this paper we address the issue of generalizing this digest tec...
     
Effectively and efficiently selecting access control rules on materialized views over relational databases
Found in: Proceedings of the Fourteenth International Database Engineering & Applications Symposium (IDEAS '10)
By Alfredo Cuzzocrea, Mohand-Said Hacid, Nicola Grillo
Issue Date:August 2010
pp. 225-235
A novel framework for effectively and efficiently selecting fine-grained access control rules from a target relational database to the set of materialized views defined on such a database is presented and experimentally assessed in this paper, along with t...
     
Consistency checking of role assignments in inter-organizational collaboration
Found in: Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS (SPRINGL '08)
By Emmanuel Coquery, Mohand-Said Hacid, Paul El Khoury
Issue Date:November 2008
pp. 653-654
The establishment of globalization is driving inter- organizational collaboration towards a necessity. We cannot expect total conformity between organizations nor homogeneous security settings. Nevertheless, each organization, with its own security policie...
     
Mining images on semantics via statistical learning
Found in: Proceeding of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining (KDD '05)
By Hangzai Luo, Jianping Fan, Mohand-Said Hacid
Issue Date:August 2005
pp. 22-31
In this paper, we have proposed a novel framework to enable hierarchical image classification via statistical learning. By integrating the concept hierarchy for semantic image concept organization, a hierarchical mixture model is proposed to enable multi-l...
     
Semantic retrieval of multimedia data
Found in: Proceedings of the 2nd ACM international workshop on Multimedia databases (MMDB '04)
By Athena Vakali, Mohand-Said Hacid, Salima Benbernou, Samira Hammiche
Issue Date:November 2004
pp. 36-44
This paper deals with the problem of finding multimedia data that fulfill the requirements of user queries. We assume both the user query and the multimedia data are expressed by MPEG-7 standard. The MPEG-7 formalism lacks the semantics and reasoning suppo...
     
ClassMiner: mining medical video for scalable skimming and summarization
Found in: Proceedings of the tenth ACM international conference on Multimedia (MULTIMEDIA '02)
By Ahmed K. Elmagarmid, Jianping Fan, Mohand-Said Hacid, Xingquan Zhu
Issue Date:December 2002
pp. 79-80
Real-time distribution of continuous media on demand is a natural step in the evoluation of internet services. Here, we briefly present an interactive talks-on-demand service currently integrated in a digital newspaper. Low cost, high availability and high...
     
A hierarchical access control model for video database systems
Found in: ACM Transactions on Information Systems (TOIS)
By Ahmed K. Elmagarmid, Elena Ferrari, Elisa Bertino, Jianping Fan, Mohand-Said Hacid, Xingquan Zhu
Issue Date:January 1992
pp. 155-191
Content-based video database access control is becoming very important, but it depends on the progresses of the following related research issues: (a) efficient video analysis for supporting semantic visual concept representation; (b) effective video datab...
     
 1