Follow
Slim Bechikh
Slim Bechikh
Full Professor of Computing, University of Carthage, 𝗜𝗘𝗘𝗘 𝗦𝗲𝗻𝗶𝗼𝗿 𝗠𝗲𝗺𝗯𝗲𝗿
Verified email at fsegn.rnu.tn - Homepage
Title
Cited by
Cited by
Year
The r-dominance: a new dominance relation for interactive evolutionary multicriteria decision making
LB Said, S Bechikh, K Ghédira
IEEE transactions on Evolutionary Computation 14 (5), 801-818, 2010
3462010
Many-objective software remodularization using NSGA-III
W Mkaouer, M Kessentini, A Shaout, P Koligheu, S Bechikh, K Deb, ...
ACM Transactions on Software Engineering and Methodology (TOSEM) 24 (3), 1-45, 2015
3172015
A new decomposition-based NSGA-II for many-objective optimization
M Elarbi, S Bechikh, A Gupta, LB Said, YS Ong
IEEE transactions on systems, man, and cybernetics: systems 48 (7), 1191-1210, 2017
2762017
Dynamic multi-objective optimization using evolutionary algorithms: a survey
R Azzouz, S Bechikh, L Ben Said
Recent advances in evolutionary multi-objective optimization, 31-70, 2017
1572017
A cooperative parallel search-based software engineering approach for code-smells detection
W Kessentini, M Kessentini, H Sahraoui, S Bechikh, A Ouni
IEEE Transactions on Software Engineering 40 (9), 841-861, 2014
1572014
Preference incorporation in evolutionary multiobjective optimization: A survey of the state-of-the-art
S Bechikh, M Kessentini, LB Said, K Ghédira
Advances in computers 98, 141-207, 2015
1512015
A dynamic multi-objective evolutionary algorithm using a change severity-based adaptive population management strategy
R Azzouz, S Bechikh, LB Said
Soft Computing 21, 885-906, 2017
1502017
Recommendation system for software refactoring using innovization and interactive dynamic optimization
MW Mkaouer, M Kessentini, S Bechikh, K Deb, M Ó Cinnéide
Proceedings of the 29th ACM/IEEE international conference on Automated …, 2014
1372014
High dimensional search-based software engineering: finding tradeoffs among 15 objectives for automating software refactoring using NSGA-III
MW Mkaouer, M Kessentini, S Bechikh, K Deb, M Ó Cinnéide
Proceedings of the 2014 Annual Conference on Genetic and Evolutionary …, 2014
1262014
Code-smell detection as a bilevel problem
D Sahin, M Kessentini, S Bechikh, K Deb
ACM Transactions on Software Engineering and Methodology (TOSEM) 24 (1), 1-44, 2014
1252014
Searching for knee regions of the Pareto front using mobile reference points
S Bechikh, L Ben Said, K Ghédira
Soft Computing 15, 1807-1823, 2011
1112011
On the use of many quality attributes for software refactoring: a many-objective search-based software engineering approach
MW Mkaouer, M Kessentini, S Bechikh, M Ó Cinnéide, K Deb
Empirical Software Engineering 21, 2503-2545, 2016
1002016
Many-objective optimization using evolutionary algorithms: A survey
S Bechikh, M Elarbi, L Ben Said
Recent advances in evolutionary multi-objective optimization, 105-137, 2017
962017
An efficient chemical reaction optimization algorithm for multiobjective optimization
S Bechikh, A Chaabani, LB Said
IEEE transactions on cybernetics 45 (10), 2051-2064, 2014
862014
Competitive coevolutionary code-smells detection
M Boussaa, W Kessentini, M Kessentini, S Bechikh, S Ben Chikha
Search Based Software Engineering: 5th International Symposium, SSBSE 2013 …, 2013
812013
On the use of machine learning and search-based software engineering for ill-defined fitness function: a case study on software refactoring
B Amal, M Kessentini, S Bechikh, J Dea, LB Said
Search-Based Software Engineering: 6th International Symposium, SSBSE 2014 …, 2014
742014
Prioritizing code-smells correction tasks using chemical reaction optimization
A Ouni, M Kessentini, S Bechikh, H Sahraoui
Software Quality Journal 23, 323-361, 2015
732015
A multi-objective hybrid filter-wrapper evolutionary approach for feature selection
M Hammami, S Bechikh, CC Hung, L Ben Said
Memetic Computing 11, 193-208, 2019
692019
Multi-objective optimization with dynamic constraints and objectives: new challenges for evolutionary algorithms
R Azzouz, S Bechikh, L Ben Said
Proceedings of the 2015 annual conference on genetic and evolutionary …, 2015
672015
On the use of artificial malicious patterns for android malware detection
M Jerbi, ZC Dagdia, S Bechikh, LB Said
Computers & Security 92, 101743, 2020
662020
The system can't perform the operation now. Try again later.
Articles 1–20