default search action
Rima Al Ali
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j4]Rima Al Ali, Lubomír Bulej, Jan Kofron, Tomás Bures:
A guide to design uncertainty-aware self-adaptive components in Cyber-Physical Systems. Future Gener. Comput. Syst. 128: 466-489 (2022) - [j3]Ankica Barisic, Ivan Ruchkin, Dusan Savic, Mustafa Abshir Mohamed, Rima Al Ali, Letitia W. Li, Hana Mkaouar, Raheleh Eslampanah, Moharram Challenger, Dominique Blouin, Oksana Nikiforova, Antonio Cicchetti:
Multi-paradigm modeling for cyber-physical systems: A systematic mapping review. J. Syst. Softw. 183: 111081 (2022) - 2021
- [j2]Tomás Bures, Petr Hnetynka, Frantisek Plásil, Dominik Skoda, Jan Kofron, Rima Al Ali, Ilias Gerostathopoulos:
Targeting uncertainty in smart CPS by confidence-based logic. J. Syst. Softw. 181: 111065 (2021) - 2020
- [j1]Rima Al Ali, Tomás Bures, Petr Hnetynka, Jan Matejek, Frantisek Plásil, Jirí Vinárek:
Toward autonomically composable and context-dependent access control specification through ensembles. Int. J. Softw. Tools Technol. Transf. 22(4): 511-522 (2020)
2010 – 2019
- 2019
- [c10]Rima Al Ali, Petr Hnetynka, Jiri Havlik, Vlastimil Krivka, Robert Heinrich, Stephan Seifermann, Maximilian Walter, Adrian Juan Verdejo:
Dynamic security rules for legacy systems. ECSA (Companion) 2019: 277-284 - 2018
- [c9]Petr Hnetynka, Petr Kubát, Rima Al Ali, Ilias Gerostathopoulos, Danylo Khalyeyev:
Guaranteed latency applications in edge-cloud environment. ECSA (Companion) 2018: 43:1-43:4 - [c8]Rima Al Ali, Robert Heinrich, Petr Hnetynka, Adrian Juan Verdejo, Stephan Seifermann, Maximilian Walter:
Modeling of dynamic trust contracts for industry 4.0 systems. ECSA (Companion) 2018: 45:1-45:4 - [c7]Rima Al Ali, Tomás Bures, Petr Hnetynka, Filip Krijt, Frantisek Plásil, Jirí Vinárek:
Dynamic Security Specification Through Autonomic Component Ensembles. ISoLA (3) 2018: 172-185 - 2017
- [c6]Rima Al Ali:
Industrial Use Cases of Cyber Physical Systems in EU Projects: Preliminary Study. FedCSIS (Position Papers) 2017: 187-193 - [c5]Oksana Nikiforova, Nisrine El Marzouki, Konstantins Gusarovs, Hans Vangheluwe, Tomás Bures, Rima Al Ali, Mauro Iacono, Priscill Orue-Esquivel, Florin Leon:
The Two-Hemisphere Modelling Approach to the Composition of Cyber-Physical Systems. ICSOFT 2017: 286-293 - 2016
- [c4]Tomás Bures, Petr Hnetynka, Jan Kofron, Rima Al Ali, Dominik Skoda:
Statistical Approach to Architecture Modes in Smart Cyber Physical Systems. WICSA 2016: 168-177 - 2014
- [c3]Rima Al Ali, Tomás Bures, Ilias Gerostathopoulos, Petr Hnetynka, Jaroslav Keznikl, Michal Kit, Frantisek Plásil:
DEECo: an ecosystem for cyber-physical systems. ICSE Companion 2014: 610-611 - [c2]Rima Al Ali, Tomás Bures, Ilias Gerostathopoulos, Jaroslav Keznikl, Frantisek Plásil:
Architecture Adaptation Based on Belief Inaccuracy Estimation. WICSA 2014: 87-90 - [c1]Rima Al Ali, Ilias Gerostathopoulos, Inti Y. Gonzalez-Herrera, Adrian Juan Verdejo, Michal Kit, Bholanathsingh Surajbali:
An Architecture-Based Approach for Compute-Intensive Pervasive Systems in Dynamic Environments. HotTopiCS@ICPE 2014: 3:1-3:6 - [i1]Tomás Bures, Ilias Gerostathopoulos, Rima Al Ali:
DEECo: Software Engineering for Smart CPS. ERCIM News 2014(97) (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 20:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint