<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Proceedings of the 8</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>GIPSA-Lab</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Grenoble</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>France</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Louiza Bouallouche-Medjkoune</institution>
        </aff>
      </contrib-group>
      <volume>1256</volume>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Editors :
These proceedings are published online by the editors as Volume 1256 at
Copyright ã 2014 for the individual papers is held by the papers’ authors. Copying
is permitted only for private and academic purposes. This volume is published and
copyrighted by its editors
These are the proceedings of the 8th International Workshop on Verification and Evaluation of
Computer and Communication Systems (VECoS 2014) held in Bejaïa, Algeria, September 29–30,
2014.</p>
      <p>VECoS workshop was created by an Euro-Maghrebian network of researchers in computer science. Its
first edition, VECoS 2007, took place in Algiers, VECoS 2008 in Leeds, VECoS 2009 in
Rabat, VECoS 2010 in Paris, VECoS 2011 in Tunis, VECoS 2012 in Paris and VECoS 2013 in
Florence (http://vecos-world.org).</p>
      <p>The aim of the VECoS workshop is to bring together researchers and practitioners, in the areas of
verification, control, performance, quality of service, dependability evaluation and assessment, in
order to discuss the state-of-the-art and the challenges in modern computer and communication
systems in which functional and non-functional properties are strongly interrelated. Thus, the main
motivation for VECoS is to encourage the cross-fertilization between the various formal verification
and evaluation approaches, methods and techniques, and especially those developed for concurrent
and distributed hardware/software systems.</p>
      <p>Beyond its technical and scientific goals, another main purpose of VECoS is to promote collaboration
between participants in research and education in the area of computer science and engineering. We
welcome contributions describing original research, practical experience reports and tool
descriptions/demonstrations in the areas of verification, control, performance, quality of service and
dependability evaluation.</p>
      <p>The program committee consists of:
program committee has accepted 11 papers for full presentation. Furthermore the committee accepted
5 papers as posters.</p>
      <p>Without support of our academic and corporate sponsors, the enormous efforts of authors, reviewers,
steering committee and the local organizational team this workshop wouldn’t provide such an
interesting booklet.</p>
      <p>We do hope you enjoy this program and that you make the most of your stay in Bejaïa.
VECoS’14 Proceedings</p>
    </sec>
    <sec id="sec-2">
      <title>Part I: Invited Talks</title>
      <p>- Saddek Bensalem: Compositional Verification of Timed Systems………………………………...............5
- Carla Seatzu: Fault diagnosis of discrete event systems using Petri nets……………………................12
- Bernd Heidergott: Towards a Statistical System Analysis……………………………………….............16</p>
    </sec>
    <sec id="sec-3">
      <title>Part II: Regular Papers</title>
      <p>- Taha Abdelmoutaleb Cherfia, Faïza Belala and Kamel Barkaoui: Towards Formal Modeling and
Verification of Context-Aware Systems…………………………………………………………………..........18
- Hamza Sahli, Faiza Belala and chafia bouanaka: Model-Checking Cloud Systems Using BigMC ..........25
- Hichem Debbi: Diagnosis of Probabilistic Models using Causality and Regression….............................34
- Mohamed Ghazel and Florent Peres: A µ-Calculus Framework for the Diagnosability of Discrete Event
Systems…………………………………………………………………………………………………………...45
- Souilah Hocine, Baadache Abderrahmane and Bouallouche-Medjkoune Louiza: Coping with Spoofed
PSPoll Based DoS Attack in IEEE………………………………………………………………………………...57
- Rebouh Nadjette: Failure Detector-Ring Paxos Based Atomic Broadcast Algorithm ………………....63
- Yazid Mohand, Sahki Nassim, Bouallouche-Medjkoune Louiza Louiza and Aïssani Djamil: Analytical
Modeling of the IEEE 802.11e EDCA Network………………………………………………………….........69
- Zouweyna Mordji, Mourad Amad and Djamil AÏssani: A Derived Queueing Network Model for
Structured P2P Architectures………………………………………………………………………………......76
- Mouloud Atmani, , Djamil Aïssani and Yassine Hadjadj-Aoul: Applying data fragmentation in IEEE
802.15.4: modeling and analysis under ……………………………………………………………….......85
- Outman El Hichami, Mohammed Al Achhab, Ismail Berrada and Badr Eddine El Mohajir: Visual
specification language and automatic checking of business process ………………………………........93
- Miloud Bennama and Thouraya Bouabana-Tebibel: Mapping OCL constraints into CTL-like logic and</p>
      <p>SML for UML validation………………………………………………………………………………….102
Part III: Posters Abstracts
- El Hassen Ait Mokhtar, Radouane Kara and Alaa Chateauneuf : Bayesian networks for the evaluation of
complex systems' availability………………………………………………………………………………….113
- Aldjia Nait Abdesselam, Radouane Kara and Jean Jacques Loiseau : Observer design and feedback
controller synthesis with observer in idempotent semiring……………………………………………….....120
- Kahlessenane Fares, Bouallouche-Medjkoune Louiza and AÏssani Djamil : Cross-layer energy-aware
protocol for wireless sensor networks…………………………………………………………………….......128
- Samira yessad, Louiza Bouallouche-Medjkoune and Djamil Aissani : Comparison of Routing Protocols in
Wireless Sensor Networks………………………………………………………………………………..........135
- Kamal Mehaoued, Larbi Sekhri and Malika Bourenane: Fairness Improvement of MAC in Wireless Ad
Hoc Networks……………………………………………………………………………………………….......143</p>
    </sec>
  </body>
  <back>
    <ref-list />
  </back>
</article>