BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Travelled to:
1 × China
1 × Cyprus
1 × Finland
1 × Latvia
1 × Switzerland
1 × Taiwan
1 × The Netherlands
2 × France
2 × Germany
2 × Portugal
2 × United Kingdom
Collaborated with:
R.Laleau F.Gervais A.Mili J.Milhau J.Desharnais F.Diagne A.Mammar A.Savary J.Lanet P.Michelin R.Mili B.Fraikin M.Leuschel P.Batanado N.Evans H.Treharne R.B.Ayed R.Khédri L.L.Jilani L.B.A.Rabai D.R.Skuce M.E.Jiague P.Konopacki R.St.-Denis
Talks about:
verifi (4) model (4) base (4) properti (3) transact (2) function (2) attribut (2) synthes (2) process (2) generat (2)

Person: Marc Frappier

DBLP DBLP: Frappier:Marc

Contributed to:

SEFM 20152015
SEFM 20142014
IFM 20132013
SAC 20112011
ICEIS ISAS 20102010
IFM 20102010
IFM 20092009
KMIS 20092009
ICEIS ISAS 20062006
IFM 20052005
SEFM 20052005
SEFM 20042004
LOPSTR 19981998
ASE 19971997
ESEC/FSE 19971997
SEKE 19941994

Wrote 16 papers:

SEFM-2015-SavaryFLL #modelling #robust #testing #using
Model-Based Robustness Testing in Event-B Using Mutation (AS, MF, ML, JLL), pp. 132–147.
SEFM-2014-DiagneMF #verification
A Tool for Verifying Dynamic Properties in B (FD, AM, MF), pp. 290–295.
IFM-2013-SavaryFL #bytecode #detection #modelling #testing #using #verification
Detecting Vulnerabilities in Java-Card Bytecode Verifiers Using Model-Based Testing (AS, MF, JLL), pp. 223–237.
SAC-2011-MammarFD #approach #reachability #verification
A proof-based approach to verifying reachability properties (AM, MF, FD), pp. 1651–1657.
ICEIS-ISAS-2010-JiagueFGKLMS #functional #modelling #policy #security
Model-driven Engineering of Functional Security Policies (MEJ, MF, FG, PK, RL, JM, RSD), pp. 374–379.
IFM-2010-MilhauFGL
Systematic Translation Rules from astd to Event-B (JM, MF, FG, RL), pp. 245–259.
IFM-2009-MilhauFF #automation #error message #execution #fault #generative #process #symbolic computation
Automatic Generation of Error Messages for the Symbolic Execution of EB3 Process Expressions (JM, BF, MF), pp. 337–351.
KMIS-2009-MichelinF #formal method #modelling
Formal Modeling for Deploying Improvement and Innovation in Information Technology (PM, MF), pp. 318–323.
ICEIS-ISAS-2006-GervaisBFL #database #named #relational #transaction
EB3TG: A Tool Synthesizing Relational Database Transactions from EB3 Attribute Definitions (FG, PB, MF, RL), pp. 44–51.
IFM-2005-GervaisFL #specification
Synthesizing B Specifications from EB3 Attribute Definitions (FG, MF, RL), pp. 207–226.
SEFM-2005-GervaisFL #database #generative #recursion #relational #transaction
Generating Relational Database Transactions From Recursive Functions Defined on EB3 Traces (FG, MF, RL), pp. 117–126.
SEFM-2004-EvansTLF #how #information management #verification
How to Verify Dynamic Properties of Information Systems (NE, HT, RL, MF), pp. 416–425.
LOPSTR-1998-AyedDFM #program transformation
Mathematical Foundations for Program Transformations (RBA, JD, MF, AM), pp. 319–321.
ASE-1997-JilaniDFMM #adaptation #component
Retrieving Software Components that Minimize Adaptation Effort (LLJ, JD, MF, RM, AM), p. 255–?.
ESEC-FSE-1997-DesharnaisFKM #integration
Integration of Sequential Scenarios (JD, MF, RK, AM), pp. 310–326.
SEKE-1994-ArfaFMMS #process #verification
A process for verification based inspections (LBAR, MF, RM, AM, DRS), pp. 100–107.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.