Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sonia Ben Mokhtar is active.

Publication


Featured researches published by Sonia Ben Mokhtar.


Journal of Systems and Software | 2008

EASY: Efficient semAntic Service discoverY in pervasive computing environments with QoS and context support

Sonia Ben Mokhtar; Davy Preuveneers; Nikolaos Georgantas; Valérie Issarny; Yolande Berbers

Pervasive computing environments are populated with networked software and hardware resources providing various functionalities that are abstracted, thanks to the Service Oriented Architecture paradigm, as services. Within these environments, service discovery enabled by service discovery protocols (SDPs) is a critical functionality for establishing ad hoc associations between service providers and service requesters. Furthermore, the dynamics, the openness and the user-centric vision aimed at by the pervasive computing paradigm call for solutions that enable rich, semantic, context- and QoS-aware service discovery. Although the semantic Web paradigm envisions to achieve such support, current solutions are hardly deployable in the pervasive environment due to the costly underlying semantic reasoning with ontologies. In this article, we present EASY to support efficient, semantic, context- and QoS-aware service discovery on top of existing SDPs. EASY provides EASY-L, a language for semantic specification of functional and non-functional service properties, as well as EASY-M, a corresponding set of conformance relations. Furthermore, EASY provides solutions to efficiently assess conformance between service capabilities. These solutions are based on an efficient encoding technique, as well as on an efficient organization of service repositories (caches), which enables both fast service advertising and discovery. Experimental results show that the deployment of EASY on top of an existing SDP, namely Ariadne, enhancing it only with slight changes to EASY-Ariadne, enables rich semantic, context- and QoS-aware service discovery, which furthermore performs better than the classical, rigid, syntactic matching, and improves the scalability of Ariadne.


Journal of Systems and Software | 2007

COCOA: COnversation-based service COmposition in pervAsive computing environments with QoS support

Sonia Ben Mokhtar; Nikolaos Georgantas; Val ´ erie Issarny

Pervasive computing environments are populated with networked services, i.e., autonomous software entities, providing a number of functionalities. One of the most challenging objectives to be achieved within these environments is to assist users in realizing tasks that integrate on the fly functionalities of the networked services opportunely according to the current pervasive environment. Towards this purpose, we present COCOA, a solution for COnversation-based service COmposition in pervAsive computing environments with QoS support. COCOA provides COCOA-L, an OWL-S based language for the semantic, QoS-aware specification of services and tasks, which further allows the specification of services and tasks conversations. Moreover, COCOA provides two mechanisms: COCOA-SD for the QoS-aware semantic service discovery and COCOA-CI for the QoS-aware integration of service conversations towards the realization of the user tasks conversation. The distinctive feature of COCOA is the ability of integrating on the fly the conversations of networked services to realize the conversation of the user task, by further meeting the QoS requirements of user tasks. Thereby, COCOA allows the dynamic realization of user tasks according to the specifics of the pervasive computing environment in terms of available services and by enforcing valid service consumption.


Lecture Notes in Computer Science | 2005

Context-aware service composition in pervasive computing environments

Sonia Ben Mokhtar; Damien Fournier; Nikolaos Georgantas; Valérie Issarny

A major challenge in pervasive computing environments is to provide users with complex, context-sensitive applications, dynamically composed from networked services. In this paper, we present an approach to the dynamic, context-aware composition of services to perform user tasks, i.e., software applications abstractly described on the users handheld device. Both networked services and user tasks are modeled as semantic Web services in OWL-S extended with context information. The distinctive feature of our solution is the ability to compose Web services that expose complex behaviors (conversations) to realize a user task that itself has a complex behavior. Furthermore, the context-related requirements of the task are met by aggregating the context-sensitive behaviors of the individual services.


working ieee/ifip conference on software architecture | 2005

The Amigo Service Architecture for the Open Networked Home Environment

Nikolaos Georgantas; Sonia Ben Mokhtar; Yérom-David Bromberg; Valérie Issarny; Jarmo Kalaoja; Julia Kantarovitch; Anne Gerodolle; Ron Mevissen

The Amigo project aims to develop a networked home system enabling the ambient intelligence / pervasive computing vision by effectively integrating devices and their hosted services in today’s home. The Amigo system architecture poses limited technology-specific restrictions, supporting interoperability among heterogeneous services.


Lecture Notes in Computer Science | 2005

Ad hoc composition of user tasks in pervasive computing environments

Sonia Ben Mokhtar; Nikolaos Georgantas; Valérie Issarny

Due to the large success of wireless networks and portable devices, the pervasive computing paradigm is becoming a reality. One of the most challenging objectives to be achieved in pervasive computing environments is to allow a user to perform a task by composing on the fly the environment’s service and resource components. However, existing approaches commonly assume that networked components have been developed to integrate in terms of interfaces and conversations, which restricts the user’s ability to fully exploit the diversity of the pervasive computing components. In order to overcome this constraint, we propose a solution for ad hoc composition of pervasive computing components, based on the Web services and Semantic Web paradigms. The main feature of our solution is the ability to integrate on the fly a number of Web services’ conversation fragments to reconstruct a conversation enabling the target user task.


automated software engineering | 2005

QoS-aware dynamic service composition in ambient intelligence environments

Sonia Ben Mokhtar; Jinshan Liu; Nikolaos Georgantas; Valérie Issarny

Due to the large success of wireless networks and handheld devices, the ambient intelligence (AmI) paradigm is becoming a reality. One of the most challenging objectives to achieve in AmI environments is to enable a user to perform a task by composing on the fly networked services available at a specific time and place. Towards this goal, we propose a solution based on semantic Web services, and we show how service capabilities described as conversations can be integrated to perform a user task that is also described as a conversation, further meeting the QoS requirements of the user task. Experimental results show that the runtime overhead of our algorithm is reasonable, and further, that QoS-awareness improves its performance.


international conference on distributed computing systems | 2013

RBFT: Redundant Byzantine Fault Tolerance

Pierre-Louis Aublin; Sonia Ben Mokhtar; Vivien Quéma

Byzantine Fault Tolerant state machine replication (BFT) protocols are replication protocols that tolerate arbitrary faults of a fraction of the replicas. Although significant efforts have been recently made, existing BFT protocols do not provide acceptable performance when faults occur. As we show in this paper, this comes from the fact that all existing BFT protocols targeting high throughput use a special replica, called the primary, which indicates to other replicas the order in which requests should be processed. This primary can be smartly malicious and degrade the performance of the system without being detected by correct replicas. In this paper, we propose a new approach, called RBFT for Redundant-BFT: we execute multiple instances of the same BFT protocol, each with a primary replica executing on a different machine. All the instances order the requests, but only the requests ordered by one of the instances, called the master instance, are actually executed. The performance of the different instances is closely monitored, in order to check that the master instance provides adequate performance. If that is not the case, the primary replica of the master instance is considered malicious and replaced. We implemented RBFT and compared its performance to that of other existing robust protocols. Our evaluation shows that RBFT achieves similar performance as the most robust protocols when there is no failure and that, under faults, its maximum performance degradation is about 3%, whereas it is at least equal to 78% for existing protocols.


International Journal of Information Management | 2013

An investigation on the unwillingness of nodes to participate in mobile delay tolerant network routing

Jingwei Miao; Omar Hasan; Sonia Ben Mokhtar; Lionel Brunie; Kangbin Yim

Abstract Message routing in mobile delay tolerant networks inherently relies on the cooperation between nodes. In most existing routing protocols, the participation of nodes in the routing process is taken as granted. However, in reality, nodes can be unwilling to participate. We first show in this paper the impact of the unwillingness of nodes to participate in existing routing protocols through a set of experiments. Results show that in the presence of even a small proportion of nodes that do not forward messages, performance is heavily degraded. We then analyze two major reasons of the unwillingness of nodes to participate, i.e., their rational behavior (also called selfishness) and their wariness of disclosing private mobility information. Our main contribution in this paper is to survey the existing related research works that overcome these two issues. We provide a classification of the existing approaches for protocols that deal with selfish behavior. We then conduct experiments to compare the performance of these strategies for preventing different types of selfish behaviors. For protocols that preserve the privacy of users, we classify the existing approaches and provide an analytical comparison of their security guarantees.


fundamental approaches to software engineering | 2008

Distributed behavioural adaptation for the automatic composition of semantic services

Tarek Melliti; Pascal Poizat; Sonia Ben Mokhtar

Services are developed separately and without knowledge of all possible use contexts. They often mismatch or do not correspond exactly to the end-user needs, making direct composition without mediation impossible. In such a case, software adaptation can support composition by producing semi-automatically new software pieces called adaptors. Adaptation proposals have addressed the signature and behavioural service interface levels. Yet, taking also into account the semantic level is mandatory to enable the fully-automatic retrieval of adaptors from service interfaces. We propose a new adaptation technique that, compared to related work, supports both behavioural and semantic service interface levels, works system-wide, and generates automatically distributed adaptors.


ambient intelligence | 2010

Middleware Architecture for Ambient Intelligence in the Networked Home

Nikolaos Georgantas; Valérie Issarny; Sonia Ben Mokhtar; Yérom-David Bromberg; Sébastien Bianco; Graham Thomson; Pierre-Guillaume Raverdy; Aitor Urbieta; Roberto Speicys Cardoso

With computing and communication capabilities now embedded in most physical objects of the surrounding environment and most users carrying wireless computing devices, the Ambient Intelligence (AmI) / pervasive computing vision [28] pioneered by Mark Weiser [32] is becoming a reality. Devices carried by nomadic users can seamlessly network with a variety of devices, both stationary and mobile, both nearby and remote, providing a wide range of functional capabilities, from base sensing and actuating to rich applications (e.g., smart spaces). This then allows the dynamic deployment of pervasive applications, which dynamically compose functional capabilities accessible in the pervasive network at the given time and place of an application request.

Collaboration


Dive into the Sonia Ben Mokhtar's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sara Bouchenak

Institut national des sciences Appliquées de Lyon

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Vivien Quéma

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar

Licia Capra

University College London

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Bogdan Robu

Centre national de la recherche scientifique

View shared research outputs
Researchain Logo
Decentralizing Knowledge