=Paper=
{{Paper
|id=Vol-1256/preface
|storemode=property
|title=None
|pdfUrl=https://ceur-ws.org/Vol-1256/preface.pdf
|volume=Vol-1256
}}
==None==
Editors : Hassane Alla, GIPSA-Lab, Grenoble, France and Louiza Bouallouche-Medjkoune, LAMOS, University of Bejaïa Proceedings of the 8th International Workshop on Verification and Evaluation of Computer and Communication Systems VECoS’2014 These proceedings are published online by the editors as Volume 1256 at CEUR Workshop Proceedings ISSN xxxxxx http://ceur-ws.org/Vol-1256 Copyright ã 2014 for the individual papers is held by the papers’ authors. Copying is permitted only for private and academic purposes. This volume is published and copyrighted by its editors Preface These are the proceedings of the 8th International Workshop on Verification and Evaluation of Computer and Communication Systems (VECoS 2014) held in Bejaïa, Algeria, September 29–30, 2014. VECoS workshop was created by an Euro-Maghrebian network of researchers in computer science. Its first edition, VECoS 2007, took place in Algiers, VECoS 2008 in Leeds, VECoS 2009 in Rabat, VECoS 2010 in Paris, VECoS 2011 in Tunis, VECoS 2012 in Paris and VECoS 2013 in Florence (http://vecos-world.org). The aim of the VECoS workshop is to bring together researchers and practitioners, in the areas of verification, control, performance, quality of service, dependability evaluation and assessment, in order to discuss the state-of-the-art and the challenges in modern computer and communication systems in which functional and non-functional properties are strongly interrelated. Thus, the main motivation for VECoS is to encourage the cross-fertilization between the various formal verification and evaluation approaches, methods and techniques, and especially those developed for concurrent and distributed hardware/software systems. Beyond its technical and scientific goals, another main purpose of VECoS is to promote collaboration between participants in research and education in the area of computer science and engineering. We welcome contributions describing original research, practical experience reports and tool descriptions/demonstrations in the areas of verification, control, performance, quality of service and dependability evaluation. The program committee consists of: Djamil Aissani, LAMOS Bejaia University, Algeria Amar Aïssani, USTHB, Algiers, Algeria Yamine Ait Ameur, IRIT/ENSEEIHT Toulouse, France Otmane Ait Mohamed, Concordia University, Canada Hassane Alla, Univ Grenoble, France (co-chair) Kamel Barkaoui, CEDRIC Cnam Paris, France Faiza Belala, LIRE, UMC, Algeria Abdelfettah Belghith, ENSI, University of Manouba, Tunisia Belgacem Ben Hedia, LIST-CEA, France Saddek Bensalem, VERIMAG Grenoble, France Abdelmadjid Bouabdallah,Heudiasyc Lab, UTC, France Hanifa Boucheneb, École Polytechnique de Montréal, Canada Carla Ceatzu, University of Cagliari, Italy Tijani Chahed, Telecom SudParis, France Yufeng Chen, Xidian University, China Jean-Michel Couvreur, LIFO, Univ. Orléans, France Isabel Demongodin, LSIS Marseille, France Karim Djouani, LISSI, UPEC, France Mohamed Escheikh, SysCom, ENIT, Tunisia Alessandro Fantecchi, Unifi, Italy Jean-Marc Faure, LURPA ENS Cachan, France Francesco Flammini, Ansaldo STS, Italy Mohamed Ghazel, INRETS, Villeneuve d'Ascq, France Latéfa Ghomri, Tlemcen University, Algeria. Bernd Heidergott, VU Amsterdam University, the Netherlands Serge Haddad, LSV ENS Cachan, Paris, France Malika Ioulalen, USTHB Alger, Algeria Mohamed Jmaïel, ENSI, Sfax, Tunisia Jorge Julvez, University of Zaragoza., Spain Mohamed Kaaniche, LAAS, Toulouse, France Nikolaï Kartashov, Université de Kiev, Ukraine Fabrice Kordon, LIP6 UPMC, France Matthieu Lemerre, LIST-CEA, France Rahim Kacimi, IRIT, Toulouse, France Mourad Maouche, Philadephia University, Jordan Louiza Bouallouche-Medjkoune, LAMOS, Bejaia University, Algeria (co-chair) Abdelhamid Mellouk, LISSI, UPEC, France Bruno Monsuez, ENSTA Paris, France Mohamed Mosbah, LaBRI , Bordeaux, France Nihal Pekergin, LACL,UPEC, France, France Olivier Perrin, INRIA-LORIA, Nancy, France Denis Poitrenaud, LIP6 Univ. Paris 6, France, Riadh Robbana, INSAT, Tunis, Tunisia Zaïdi Sahnoun, Université Constantine 2, Algeria Larbi Sekhri, Univ. Oran es Senia, AlgérieAlice E. Smith, Auburn University, U.S.A. Natalia Sidorova, Technische universiteit Eindhoven, Nederlands Markus Siegle, Universität Munchen, Germany Thouraya Tebibel, ESI, Alger, Algeria Tayssir Touili, CNRS-LIAFA, France Farouk Toumani, LIMOS, Clermont-Ferrand II University, France Sadrine Vaton, Telecom Bretagne, Brest, France Karsten Wolf, Universitaet Rostock, Germany The invited speakers for VECos 2014 are: Saddek Bensalem from Verimag Lab, France, Bernd Heidergott from VU Amsterdam, the Netherlands and Carla Seatzu from University of Cagliari, Italy. We received 35 high-quality contributions. For each paper three to four reviews were made. The program committee has accepted 11 papers for full presentation. Furthermore the committee accepted 5 papers as posters. Without support of our academic and corporate sponsors, the enormous efforts of authors, reviewers, steering committee and the local organizational team this workshop wouldn’t provide such an interesting booklet. We do hope you enjoy this program and that you make the most of your stay in Bejaïa. Hassane Alla and Louiza Bouallouche-Medjkoune Bejaïa, September 2014 Contents VECoS’14 Proceedings Part I: Invited Talks - Saddek Bensalem: Compositional Verification of Timed Systems………………………………...............5 - Carla Seatzu: Fault diagnosis of discrete event systems using Petri nets……………………................12 - Bernd Heidergott: Towards a Statistical System Analysis……………………………………….............16 Part II: Regular Papers - Taha Abdelmoutaleb Cherfia, Faïza Belala and Kamel Barkaoui: Towards Formal Modeling and Verification of Context-Aware Systems…………………………………………………………………..........18 - Hamza Sahli, Faiza Belala and chafia bouanaka: Model-Checking Cloud Systems Using BigMC ..........25 - Hichem Debbi: Diagnosis of Probabilistic Models using Causality and Regression….............................34 - Mohamed Ghazel and Florent Peres: A µ-Calculus Framework for the Diagnosability of Discrete Event Systems…………………………………………………………………………………………………………...45 - Souilah Hocine, Baadache Abderrahmane and Bouallouche-Medjkoune Louiza: Coping with Spoofed PS- Poll Based DoS Attack in IEEE………………………………………………………………………………...57 - Rebouh Nadjette: Failure Detector-Ring Paxos Based Atomic Broadcast Algorithm ………………....63 - Yazid Mohand, Sahki Nassim, Bouallouche-Medjkoune Louiza Louiza and Aïssani Djamil: Analytical Modeling of the IEEE 802.11e EDCA Network………………………………………………………….........69 - Zouweyna Mordji, Mourad Amad and Djamil AÏssani: A Derived Queueing Network Model for Structured P2P Architectures………………………………………………………………………………......76 - Mouloud Atmani, , Djamil Aïssani and Yassine Hadjadj-Aoul: Applying data fragmentation in IEEE 802.15.4: modeling and analysis under ……………………………………………………………….......85 - Outman El Hichami, Mohammed Al Achhab, Ismail Berrada and Badr Eddine El Mohajir: Visual specification language and automatic checking of business process ………………………………........93 - Miloud Bennama and Thouraya Bouabana-Tebibel: Mapping OCL constraints into CTL-like logic and SML for UML validation………………………………………………………………………………….102 Part III: Posters Abstracts - El Hassen Ait Mokhtar, Radouane Kara and Alaa Chateauneuf : Bayesian networks for the evaluation of complex systems' availability………………………………………………………………………………….113 - Aldjia Nait Abdesselam, Radouane Kara and Jean Jacques Loiseau : Observer design and feedback controller synthesis with observer in idempotent semiring……………………………………………….....120 - Kahlessenane Fares, Bouallouche-Medjkoune Louiza and AÏssani Djamil : Cross-layer energy-aware protocol for wireless sensor networks…………………………………………………………………….......128 - Samira yessad, Louiza Bouallouche-Medjkoune and Djamil Aissani : Comparison of Routing Protocols in Wireless Sensor Networks………………………………………………………………………………..........135 - Kamal Mehaoued, Larbi Sekhri and Malika Bourenane: Fairness Improvement of MAC in Wireless Ad Hoc Networks……………………………………………………………………………………………….......143