Mohamed Faouzi Atig , Ahmed Bouajjani , Tayssir Touili
international conference on concurrency theory 356 -371
Nicholas Kidd , Peter Lammich , Tayssir Touili , Thomas Reps
international workshop on model checking software 125 -142
Akash Lal , Tayssir Touili , Nicholas Kidd , Thomas Reps
tools and algorithms for construction and analysis of systems 282 -298
Fu Song , Tayssir Touili
asian symposium on programming languages and systems 216 -235
Fu Song , Tayssir Touili
International Journal on Software Tools for Technology Transfer 16 ( 2) 147 -173
Ahmed Bouajjani , Tayssir Touili
International Journal on Software Tools for Technology Transfer 14 ( 2) 145 -165
Huu-Vu Nguyen , Tayssir Touili
symposium on applied computing 1393 -1400
Ahmed Bouajjani , Tayssir Touili
foundations of software technology and theoretical computer science 74 -87
Adrien Pommellet , Marcio Diaz , Tayssir Touili
Language and Automata Theory and Applications 447 -459
Tayssir Touili
theoretical aspects of software engineering 15 -22
Julien ďOrso , Tayssir Touili
ifip world computer congress wcc 213 -230
Khanh-Huu-The Dam , Tayssir Touili
formal methods in security engineering 714 -723
Marcio Diaz , Tayssir Touili
Automated Technology for Verification and Analysis 208 -224
Tayssir Touili
international colloquium on theoretical aspects of computing 5684 307 -321
Ahmed Bouajjani , Anca Muscholl , Tayssir Touili
Information & Computation 205 ( 2) 199 -224
Fu Song , Tayssir Touili
Software and Systems Modeling 15 ( 4) 961 -985
Sagar Chaki , Edmund Clarke , Orna Grumberg , Joël Ouaknine
integrated formal methods 53 -69
Khanh Huu The Dam , Tayssir Touili
availability, reliability and security
Ahmed Bouajjani , Tayssir Touili
Lecture Notes in Computer Science 484 -499
Khanh-Huu-The Dam , Tayssir Touili
international conference on malicious and unwanted software 1 -10