default search action
12th AICCSA 2015: Marrakech, Morocco
- 12th IEEE/ACS International Conference of Computer Systems and Applications, AICCSA 2015, Marrakech, Morocco, November 17-20, 2015. IEEE Computer Society 2015, ISBN 978-1-5090-0478-2
- Mohamed A. Nassar, Layla A. A. El-Sayed:
Efficient interleaved modular multiplication based on sign detection. 1-5 - Milton S. S. Junior, Nelson S. Rosa, Fernando Antônio Aires Lins:
xLONGWisE: An environment to support the execution of Long Running Workflows. 1-8 - Aafaf Ouaddah, Hajar Mousannif, Abdellah Ait Ouahman:
Access control models in IoT: The road ahead. 1-2 - Meryem Boufim, Hafid Barka:
Building holistic social media strategy refering to social intelligence and digital maturity. 1-8 - Ali Ahmed, Saadat M. Alhashmi:
A metric for Literature-Based Discovery methodology evaluation. 1-5 - Salam Ismail Rasheed Khanji, Asad Masood Khattak, Hakim Hacid:
Database auditing and forensics: Exploration and evaluation. 1-6 - Mohamed Hachem Kermani, Zizette Boufaïda:
A modeling of a multi-agent system for the protein synthesis. 1-7 - Messaouda Fareh, Hadjer Guellati, Chaima Elfarrouji:
Refinement and reuse of ontologies semantic mapping. 1-4 - Chaima Bejaoui, Alexandre Guitton, Abdennaceur Kachouri:
Improved election of cluster heads in LEACH. 1-4 - Jameela Al Otaibi, Samir Elloumi, Ali Jaoua, Abdelaali Hassaïne:
Using conceptual reasoning for inconsistencies detection in Islamic advisory opinion (Fatwas). 1-5 - Imane Bouij-Pasquier, Abdellah Ait Ouahman, Anas Abou El Kalam, Mina Ouabiba de Montfort:
SmartOrBAC security and privacy in the Internet of Things. 1-8 - Mohamed El Yafrani, Belaïd Ahiod:
Cosolver2B: An efficient local search heuristic for the Travelling Thief Problem. 1-5 - Aura Conci, Andre Luiz Brazil, Simone Bacellar Leal Ferreira, Trueman MacHenry:
AES cryptography in color image steganography by genetic algorithms. 1-8 - Fatma Ben Taher, Nader Ben Amor, Mohamed Jallouli:
An extended Eye Movement Tracker system for an electric wheelchair movement control. 1-7 - Mohammad Alomari, Alan D. Fekete:
Serializable use of Read Committed isolation level. 1-8 - Parameth Voraseyanont, Mathupayas Thongmak:
The influence of 4Ps and system quality on perceived quality after mobile instant messaging usage. 1-4 - Roqyiah M. Abdeen, Ahmed Afifi, Ashraf B. Elsisi:
Improved Arabic handwriting word segmentation approach using Random Forests. 1-8 - Amira Jouirou, Abir Baâzaoui, Walid Barhoumi, Ezzeddine Zagrouba:
Curvelet-based locality sensitive hashing for mammogram retrieval in large-scale datasets. 1-8 - Afafe Annich, Abdellatif El Abderrahmani, Khalid Satori:
Freehand sketch based 3D reconstruction using constraints. 1-2 - Aouatef Rouahi, Kais Ben Salah, Khaled Ghédira:
Belief Constraint Satisfaction Problems. 1-4 - Jihen Maâzoun, Nadia Bouassida, Hanêne Ben-Abdallah:
SPL-UML: Software product lines design language. 1-4 - Aymen Ghilen, Mostafa Azizi, Ridha Bouallegue:
Integration of a quantum protocol for mutual authentication and secret key distribution within 802.11i standard. 1-7 - Hisham A. Kholidy, Abdelkarim Erradi:
A cost-aware model for risk mitigation in Cloud computing systems. 1-7 - Imen Gaied, Farah Jemili, Ouajdi Korbaa:
Intrusion detection based on Neuro-Fuzzy classification. 1-8 - Maged Fakirah, Mohammed A. Shehab, Yaser Jararweh, Mahmoud Al-Ayyoub:
Accelerating Needleman-Wunsch global alignment algorithm with GPUs. 1-5 - Aladine Chetouani:
A Reduced Reference Image Quality assessment for Multiply Distorted Images. 1-4 - Sofiane Boukelkoul, Ramdane Maamri:
Optimal model transformation of BPMN to DEVS. 1-8 - Said Talbi, Lotfi Zaouche:
Enhanced Unequal Clustering Algorithm for Wireless Sensor Networks. 1-4 - Aimad Karkouch, Hassan Al Moatassime, Hajar Mousannif, Thomas Noël:
Data quality enhancement in Internet of Things environment. 1-8 - Taha Ait Tchakoucht, Mostafa Ezziyyani, Mohammed Jbilou, Mikaël Salaün:
Behavioral appraoch for intrusion detection. 1-5 - Rachid Lamrani, El Hassan Abdelwahed:
Learning through play in pervasive context: A survey. 1-8 - Farah Aït-Salaht, Hind Castel:
Bounding aggregations on bulk arrivals for performance analysis of clouds. 1-8 - Mounir Lahlou Kassi, Abdelaziz Berrado, Loubna Benabbou, K. Benabdelkader:
Towards a new framework for clustering in a mixed data space: Case of gasoline service stations segmentation in Morocco. 1-6 - Monia Ben Brahim, Tarak Chaari, Mohamed Jmaiel:
XPath translation to enhance the semantic matching of fine-grained Web service security policies. 1-8 - Mohamed Hamidi, Mohamed El Haziti, Hocine Cherifi, Driss Aboutajdine:
A blind robust image watermarking approach exploiting the DFT magnitude. 1-6 - Aymen Ghilen, Mostafa Azizi, Ridha Bouallegue:
Integration of a quantum authenticated key distribution scheme in the EAP-TLS protocol. 1-5 - Malek Jebabli, Hocine Cherifi, Chantal Cherifi, Atef Hamouda:
User and group networks on YouTube: A comparative analysis. 1-8 - Sanaa Kaddoura:
Information matrix: Fighting back using a matrix. 1-6 - Hicham Gueddah, Abdellah Yousfi, Mostafa Belkasmi:
The filtered combination of the weighted edit distance and the Jaro-Winkler distance to improve spellchecking Arabic texts. 1-6 - Aymen Ghilen, Mostafa Azizi, Ridha Bouallegue:
Integration and formal security analysis of a quantum key distribution scheme within CHAP protocol. 1-7 - Fabio Leal, Martin A. Musicante:
Using SLA to guide database transition to NoSQL on the cloud: A systematic mapping study. 1-8 - Iman M. A. Helal, Ahmed Awad, Ali El Bastawissi:
Runtime deduction of case ID for unlabeled business process execution events. 1-8 - Bouchra El Idrissi, Salah Baïna, Karim Baïna:
Supporting collaborative work on ontology learning from Relational Databases. 1-6 - Ayoub Karine, Noureddine Lasmar, Alexandre Baussard, Mohammed El Hassouni:
Sonar image segmentation based on statistical modeling of wavelet subbands. 1-5 - Hamdi Ellouzi, Hela Ltifi, Mounir Ben Ayed:
New Multi-Agent architecture of visual Intelligent Decision Support Systems application in the medical field. 1-8 - Saliha Mallem, Amina Zemmache, Chafia Yahiaoui:
A new Authentication and Key Agreement protocol for SIP in IMS. 1-7 - Youssef Azdoud, Aouatif Amine, Nawal Alioua, Mohammed Rziza:
Pre collision detection system for pedestrian safety based on HOL. 1-2 - Rania Chakroun, Leila Beltaïfa Zouari, Mondher Frikha, Ahmed Ben Hamida:
A novel approach based on Support Vector Machines for automatic speaker identification. 1-5 - Hanen Chihi, Walid Chainbi, Khaled Ghédira:
Cloud computing architecture and migration strategy for universities and higher education. 1-8 - Malek Ben Salem, Emna Bouazizi, Rafik Bouaziz:
Multi-versions data and epsilon-serializability for QoS enhancement in distributed RTDBMS. 1-6 - Mhamed Sayyouri, Abdeslam Hmimid, Hicham Karmouni, Hassan Qjidaa, Abdellah Rezzouk:
Image classification using separable invariant moments of Krawtchouk-Tchebichef. 1-6 - Ismail El Bazi, Nabil Laachfoubi:
A comparative study of Named Entity Recognition for Arabic using ensemble learning approaches. 1-6 - Haifa Harrouch, Mourad Kaddes, Majed Abdouli, Rafik Bouaziz, Claude Duvallet:
DASH-DMS: To improve streaming video over HTTP. 1-8 - Rima Grati, Khouloud Boukadi, Hanêne Ben-Abdallah:
Overview of IaaS monitoring tools. 1-7 - Érick Oliveira Rodrigues, José Viterbo, Aura Conci, Trueman MacHenry:
A context-aware middleware for medical image based reports. 1-4 - Hiba Ramadan, Hamid Tairi:
Collaborative Xmeans-EM clustering for automatic detection and segmentation of moving objects in video. 1-2 - Sultan Aljahdali, Alaa F. Sheta, Narayan C. Debnath:
Estimating software effort and function point using regression, Support Vector Machine and Artificial Neural Networks models. 1-8 - Seungwoo Jeon, Bonghee Hong, Hyeongsoon Im:
Analysis of the effect of weather determinants on lodging demands using big data processing. 1-8 - Imen Ouled Dlala, Saïd Jabbour, Lakhdar Sais, Yakoub Salhi, Boutheina Ben Yaghlane:
Parallel SAT based closed frequent itemsets enumeration. 1-8 - Landry T. Yelome, Samuel Ouya, Samba Ndiaye, Sidi Mohamed Farssi:
Contribution to SMS management over 4G network in distance education context. 1-6 - Rihab Bouchlaghem, Aymen Elkhelifi, Rim Faiz:
SVM based approach for opinion classification in Arabic written tweets. 1-4 - Imen Tounsi, Mohamed Hadj Kacem, Ahmed Hadj Kacem, Khalil Drira:
A formal approach for SOA design patterns composition. 1-8 - Ilyes Rebai, Yassine Ben Ayed, Walid Mahdi:
Deep architecture using Multi-Kernel Learning and multi-classifier methods. 1-6 - Sara Hbali, Mohammed Sadgal, Abdelaziz El Fazziki:
Using invariant feature descriptors for an efficient image retrieval. 1-4 - Mustapha Hemis, Bachir Boudraa, Thouraya Merazi-Meksen:
Bat inspired optimization approach for audio watermarking algorithm. 1-7 - Amine Boulemtafes, Abderrezak Rachedi, Nadjib Badache:
A study of mobility support in wearable health monitoring systems: Design framework. 1-8 - Mounira Belmabrouk, Mounir Marrakchi:
Optimal parallel scheduling for resolution a triangular system with availability constraints. 1-7 - Abdessamad Malaoui:
Low cost pedagogic device for practical works using embedded system. 1-8 - Márcio A. Macêdo, Daniel A. S. Carvalho, Martin A. Musicante, Alberto Pardo, Umberto Souza da Costa:
An abstract machine for integrating heterogeneous web applications. 1-8 - Abdelhamid Benaini, Achraf Berrajaa, El Mostafa Daoudi:
GPU implementation of the multi depot Vehicle Routing Problem. 1-7 - Iman Ben Abdelkrim, Amine Baïna, Mostafa Bellafkih:
Coalition-based access control models for critical infrastructures. 1-6 - Issa Qabajeh, Francisco Chiclana, Fadi A. Thabtah:
A classification rules mining method based on dynamic rules' frequency. 1-7 - Anass El Aouni, Khalid Minaoui, Ayoub Tamim, Khalid Daoudi, Hussein M. Yahia, Abderrahman Atillah, Driss Aboutajdine:
Detection of Moroccan coastal upwelling using sea surface chlorophyll concentration. 1-4 - Hanen Abbes, Soumaya Boukettaya, Faïez Gargouri:
Learning ontology from Big Data through MongoDB database. 1-7 - Mouna Ktari, Mohamed Amine Haddar, Ahmed Hadj Kacem, Mohamed Mosbah:
Proving distributed algorithms for mobile agents: Examples of spanning tree computation in dynamic networks. 1-7 - Mohamed Ben Aouicha, Mohamed Ali Hadj Taieb:
G2WS: Gloss-based WordNet and Wiktionary semantic Similarity measure. 1-7 - Mustapha Boushaba, Abdelhakim Hafid, Abdelilah Maach, Driss El Ghanami:
SGRL-Selective Gateway and Reinforcement Learning-based routing for WMN. 1-8 - Sanae El Mimouni, Mohamed Bouhdadi:
Formal modeling of the Simple Text Oriented Messaging Protocol using Event-B method. 1-4 - Jeongmin Kim, Kwang Ryel Ryu:
Mining traffic accident data by subgroup discovery using combinatorial targets. 1-6 - Mouhamadou Gaye, Mamadou Bousso, Ousmane Sall, Moussa Lo:
Measuring inconsistency ontological changes based on communities in ontology. 1-4 - Nesma M. Zaki, Ahmed Awad, Ehab Ezat:
Extracting accurate performance indicators from execution logs using process models. 1-8 - Raihana Mokhlissi, Dounia Lotfi, Mohamed El Marraki:
Spanning tree based method for a social network analysis. 1-8 - Marcelo Figueiredo Terenciani, Geraldo Barbosa Landre, Débora Maria Barroso Paiva, Maria Istela Cagnin:
A plug-in for Eclipse towards supporting business process lines documentation. 1-8 - Riad Boussetoua, Hammadi Bennoui, Allaoua Chaoui, Khaled Khalfaoui, Elhillali Kerkouche:
An automatic approach to transform BPMN models to Pi-Calculus. 1-8 - Donia Khemakhem Krid, Naouel Ben Salem Grati, Riadh Robbana:
A new model for Online Social Networks case of Facebook. 1-6 - Cleverson Ledur, Dalvan Griebler, Isabel Harb Manssour, Luiz Gustavo Fernandes:
Towards a Domain-Specific Language for geospatial data visualization maps with Big Data sets. 1-8 - Matyas Jani:
Fast content independent playlist generation for streaming media. 1-6 - Omar Elharrouss, Driss Moujahid, Soukaina Elidrissi Elkaitouni, Hamid Tairi:
Moving objects detection based on thresholding operations for video surveillance systems. 1-5 - Hend Fourati, Hanen Idoudi, Thierry Val, Adrien van den Bossche, Leïla Azouz Saïdane:
Performance evaluation of IEEE 802.15.6 CSMA/CA-based CANet WBAN. 1-7 - Hicham G. Elmongui, Hader Morsy, Riham Mansour:
Inference models for Twitter user's home location prediction. 1-8 - Khalloufi Issam, El Beqqali Omar:
Real-time Data Prefetching in Mobile Computing. 1-2 - S. Hellam, Y. Oulahrir, F. El Mounchid, Abdelalim Sadiq, S. Mbarki:
An efficient method for Objects indexing in three dimensions. 1-8 - Faizan Ur Rehman, Ahmed Lbath, Bilal Sadiq, Md. Abdur Rahman, Abdullah Murad, Imad Afyouni, Akhlaq Ahmad, Saleh M. Basalamah:
A constraint-aware optimized path recommender in a crowdsourced environment. 1-8 - Mohamed Moussaoui, Montaceur Zaghdoud, Jalel Akaichi:
A survey of uncertainty handling in frequent subgraph mining algorithms. 1-8 - Bilal Al Baalbaki, Jesus Pacheco, Cihan Tunc, Salim Hariri, Youssif B. Al-Nashif:
Anomaly Behavior Analysis System for ZigBee in smart buildings. 1-4 - Atef Nouri, Wided Lejouad Chaari, Khaled Ghédira:
RPI.Idiom: A high-level language for first-class agent interaction protocols. 1-8 - Hanin B. Abubaker, Khaled Salah, Hassan Al-Muhairi, Ahmed Bentiba:
Cloud-based Arabic reCAPTCHA service: Design and architecture. 1-6 - Mouna Rekik, Khouloud Boukadi, Hanêne Ben-Abdallah:
Business process outsourcing to the Cloud: What activity to outsource? 1-7 - Faten Fakhfakh, Mohamed Tounsi, Ahmed Hadj Kacem, Mohamed Mosbah:
A formal pattern for dynamic networks through evolving graphs. 1-4 - Nouha Dammak, Yassine Benayed:
Indexing and classifiying video genres using Support Vector Machines. 1-5 - Frédéric Lehmann, Dina Chaal, Abdelouahid Lyhyaoui:
Proposition of a Bayesian model for the propagation of the information in a wireless sensor network. 1-8 - Lamia Berkani:
SSCF: A semantic and social-based collaborative filtering approach. 1-4 - Kaoutar Farnane, Khalid Minaoui, Awatif Rouijel, Driss Aboutajdine:
Analysis of the ambiguity function for phase-coded waveforms. 1-4 - Kholoud Alsmearat, Mohammed A. Shehab, Mahmoud Al-Ayyoub, Riyad Al-Shalabi, Ghassan Kanaan:
Emotion analysis of Arabic articles and its impact on identifying the author's gender. 1-6 - Noureddine Chabini, Said Belkouch:
Area and delay aware approaches for realizing multi-operand addition on FPGAs using two-operand adders. 1-4 - Berardino Carnevale, Francesco Falaschi, Diego Pacini, Gianluca Dini, Luca Fanucci:
A hardware accelerator for the IEEE 802.1X-2010 key hierarchy in automotive applications. 1-6 - Fatima-Zahra Berriche, Besma Zeddini, Hubert Kadima, Alain Rivière:
Combining Case-Based Reasoning and Process Mining to improve collaborative decision-making in products design. 1-7 - Samir Anter, Ahmed Zellou, Ali Idri:
Nk-schemas. 1-6 - Youssef Bourass, Hamid Zouaki, Abdelkhalak Bahri:
New learning approach for computer-aided diagnostic. 1-9 - Yassine Banouar, Saad Reddad, Codé Diop, Christophe Chassot, Abdellah Zyane:
Monitoring solution for autonomic Middleware-level QoS management within IoT systems. 1-8 - C. Laissaoui, Noureddine Idboufker, Raja Elassali, K. El Baamrani:
A measurement of the response times of various OpenFlow/SDN controllers with CBench. 1-2 - Hafed Zarzour, Lamia Berrezzek, Hafida Ghomrani, Tarek Abid, Mokhtar Sellami:
Consistency awareness in a distributed collaborative system for semantic stores. 1-8 - Imane Taghablout, Fadoua Ataa-Allah, Mohamed El Marraki:
Amazigh verb in the Universal Networking Language. 1-4 - Paulo Afonso Parreira, Rosângela Aparecida Dellosso Penteado:
Domain ontologies in the context of Requirements Engineering. 1-8 - Imane Hilal, Nadia Afifi, Mohamed Ouzzif, Hicham Belhaddaoui:
Considering dependability requirements in the context of Decision Support Systems. 1-8 - Emna Ben Mohamed, Hela Ltifi, Mounir Ben Ayed:
Using Bloom's taxonomy to enhance interactive concentric circles representation. 1-8 - Abderrahmen Guermazi, Abdelfettah Belghith, Mohamed Abid:
Multi-hop routing for distributed clustering protocols in wide wireless sensor networks. 1-6 - Lamiae Dounas, Raúl Mazo, Camille Salinesi, Omar El Beqqali:
Continuous monitoring of adaptive e-learning systems requirements. 1-8 - Jihane Lakhrouit, Karim Baïna:
Evaluating enterprise architecture complexity using fuzzy AHP approach: Application to university information system. 1-7 - Boutaina Satouri, C. Bekkali, Khalid Satori, Abdellatif El Abderrahmani, Hamid Tairi:
Affine Reconstruction based on the Projective Reconstruction and Homography at Infinity. 1-8 - Bouchra El Idrissi, Salah Baïna, Karim Baïna:
Bringing flexibility to ontology learning from relational databases. 1-8 - Youssef Ait Khouya, Faouzi Ghorbel, Noureddine Alaa:
Brachiopods classification based on fusion of global and local complete and stable descriptors. 1-6 - Sara Ahajjam, Mohamed El Haddad, Hassan Badir:
LeadersRank: Towards a new approach for community detection in social networks. 1-8 - Bassim Chabibi, Adil Anwar, Mahmoud Nassar:
Towards an alignment of SysML and simulation tools. 1-6 - Samia Benabdellah Chaouni, Mounia Fredj, Salma Mouline:
A Rules-based system for model composition. 1-8 - Asmaa Elkandoussi, Hanan El Bakkali, Narimane Elhilali:
Toward resolving access control policy conflict in inter-organizational workflows. 1-4 - Imen Bouaziz Mezghanni, Faïez Gargouri:
Towards an Arabic legal ontology based on documents properties extraction. 1-8 - Abderrazak Iazzi, Rachid Oulad Haj Thami, Mohammed Rziza:
A novel approach to improve background subtraction method for fall detection system. 1-2 - Mostafa El Mallahi, Abderrahim Mesbah, Hassan Qjidaa, Aissam Berrahou, Khalid Zenkouar, Hakim el Fadili:
Volumetric image reconstruction by 3D Hahn moments. 1-8 - Samuel Ouya, Ahmath Bamba Mbacke, Gervais Mendy, Pape Waly Diouf, Kalidou Sy:
Social network integration to e-learning environment. 1-4 - Tarik Fissaa, Hatim Guermah, Hatim Hafiddi, Mahmoud Nassar:
Towards a semantic approach for discovering context aware services. 1-4 - Amal Zouhri, Ismail Boumhidi:
Decentralized H∞ control of interconnected systems with time-delays. 1-6 - Asmae Benali, Bouchra El Asri, Houda Kriouile:
Cloud environment assignment: A context-aware and Dynamic Software Product Lines-based approach. 1-8 - Amira Boukhdhir, Oussama Lachiheb, Mohamed Salah Gouider:
An improved mapReduce design of kmeans for clustering very large datasets. 1-6 - El Mostafa Daoudi, Abdelmajid Dargham, Aicha Kerfali, Mohammed Khatiri:
Reducing the inter processor migrations of the DP-WRAP scheduling. 1-6 - Riadh Belkebir, Ahmed Guessoum:
TALAA-ASC: A sentence compression corpus for Arabic. 1-8 - Fatima Zohra Ennaji, Abdelaziz El Fazziki, Mohammed Sadgal, Djamal Benslimane:
Social intelligence framework: Extracting and analyzing opinions for social CRM. 1-7 - Nabil Baklouti, Bilel Gargouri, Mohamed Jmaiel:
Towards patterns-based Linguistic Web Service composition. 1-6 - El-Tigani B. Abdelsatir, Narayan C. Debnath, Hisham Abushama:
A multilayered scheme for transparent audio data hiding. 1-6 - Hind Saddiki, Karim Bouzoubaa, Violetta Cavalli-Sforza:
Text readability for Arabic as a foreign language. 1-8 - Sara Najam, Hajar Mousannif, Mohamed Ouzzif:
Building a structured collaboration system from XML specification. 1-8 - Bushra AlBelooshi, Khaled Salah, Thomas Martin, Ernesto Damiani:
Inspection and deconfliction of published virtual machine templates' remnant data for improved assurance in public Clouds. 1-4 - Oumayma Banouar, Said Raghay:
Comparative study of the systems of semantic integration of information: A survey. 1-8 - Saoussen Rekhis, Nadia Bouassida:
Domain-specific design pattern instanciation. 1-6 - Kheireddine Abainia, Siham Ouamour, Halim Sayoud:
Neural Text Categorizer for topic identification of noisy Arabic Texts. 1-8 - Rachid Ait Daoud, Abdellah Amine, Belaid Bouikhalene, Rachid Lbibb:
Combining RFM model and clustering techniques for customer value analysis of a company selling online. 1-6 - Marwa Amara, Khaled Ghédira, Kamel Zidi, Salah Zidi:
A comparative study of multi-class support vector machine methods for Arabic characters recognition. 1-6 - Hasna Elkhannoubi, Mustapha Belaïssaoui:
Fundamental pillars for an effective cybersecurity strategy. 1-2 - Adil Maarouf, Bouchra El Qacimy, Abderrahim Marzouk, Abdelkrim Haqiq:
A novel penalty model for managing and applying penalties in Cloud Computing. 1-6 - Mohamed Moussaoui, Montaceur Zaghdoud, Jalel Akaichi:
Structural-semantic approach for approximate frequent subgraph mining. 1-8 - Yassine Bounagui, Hatim Hafiddi, Abdellatif Mezrioui:
Requirements definition for a holistic approach of cloud computing governance. 1-8 - Rihab Maaloul, Lamia Chaari, Bernard Cousin:
Energy-aware forwarding strategy for Metro Ethernet networks. 1-7 - Rachid Selt, Yacine Challal, Nadjia Benblidia:
Internet of things context-aware privacy architecture. 1-2 - Hassan El Alami, Abdellah Najid:
CFFL: Cluster formation using fuzzy logic for wireless sensor networks. 1-6 - Fatima Kabli, Reda Mohamed Hamou, Abdelmalek Amine:
Towards a molecules production from DNA sequences based on clustering by 3D cellular automata approach and n-grams technique. 1-7 - Essma Selab, Ahmed Guessoum:
A statistical approach for the induction of a grammar of Arabic. 1-8 - Mohamed Mahmoud El Benany, Omar El Beqqali:
SOA based e-government interoperability. 1-2 - Narayan C. Debnath, Mario Peralta, Carlos Salgado, Lorena Baigorria, German Montejano, Daniel Riesco:
Metrics and performance indicators to evaluate workflow processes on the cloud. 1-6 - Mohamed Nabil, Abdelmajid Hajami, Abdelkrim Haqiq:
Improvement of route lifetime of LAR protocol for VANET in highway scenario. 1-8 - Nabil Alami, Mohammed Meknassi, Saïd El Alaoui Ouatik, Noureddine Ennahnahi:
Arabic text summarization based on graph theory. 1-8 - Ali Sahnoun, Ramdane Maamri:
Petri net modeling dynamic context of container for risk management. 1-8 - Rodrigo da Rosa Righi, Roberto de Quadros Gomes, Vinicius Facco Rodrigues, Cristiano André da Costa, Antônio Marcos Alberti:
MigBSP++: Improving process rescheduling on Bulk-Synchronous Parallel applications. 1-8 - Abdeljebar Mansour, Mohamed Sadik, Essaid Sabir:
Multi-factor authentication based on multimodal biometrics (MFA-MB) for Cloud Computing. 1-4 - Youness Chawki, Khalid El Asnaoui, Mohammed Ouanan, Brahim Aksasse:
CBIR using the 2-D ESPRIT method: Application to Coil_100 database. 1-8 - Aimad Hakkoum, Said Raghay:
Advanced search in the Qur'an using semantic modeling. 1-4 - Takeru Kuroiwa, Noriyuki Kushiro:
Testing environment for embedded software product lines. 1-7 - Son N. Han, Quyet H. Cao, Bahram Alinia, Noël Crespi:
Design, implementation, and evaluation of 6LoWPAN for home and building automation in the Internet of Things. 1-8 - Ola Salman, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
An architecture for the Internet of Things with decentralized data and centralized control. 1-8 - Hajer Boujezza, Modher Al-mufti, Hella Kaffel Ben Ayed, Leïla Azouz Saïdane:
A taxonomy of identities management systems in IOT. 1-8 - Khadijah S. Bahwaireth, Lo'ai Tawalbeh, Anas Basalamah, Yaser Jararweh, Mohammad Tawalbeh:
Efficient techniques for energy optimization in Mobile Cloud Computing. 1-8 - Umut Kizgindere, Süleyman Eken, Ahmet Sayar:
MapReduce based scalable range query architecture for big spatial data. 1-4 - Yaser Jararweh, Ala Darabseh, Mahmoud Al-Ayyoub, Abdelkader Bousselham, Elhadj Benkhelifa:
Software Defined based smart grid architecture. 1-7 - Bacem Mbarek, Aref Meddeb, Wafa Ben Jaballah, Mohamed Mosbah:
A secure authentication mechanism for resource constrained devices. 1-7 - Marwan Alakhras, Mourad Oussalah, Mousa I. Hussein:
ANFIS: General description for modeling dynamic objects. 1-8 - Mostefai Abdelkader, Ricardo Pérez-Castillo, Malki Mimoun:
Using text mining to locate concepts in execution traces. 1-6 - Carlos Eduardo Monteiro, Luis Carlos Trevelin:
Studies of computing techniques for performing face recognition with a focus in the crowds: A distributed architecture based on cloud computing. 1-5 - Abd El-Hameed G. El-Barbary, Layla A. A. El-Sayed, Hussein H. Aly, Mohamed Nazih ElDerini:
A cloudlet architecture using mobile devices. 1-8 - Mohamed Musallam Khasib Al Rawahi, Smitha Sunil Kumaran Nair:
Detecting skimming devices in ATM through image processing. 1-5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.