default search action
13th AICCSA 2016: Agadir, Morocco
- 13th IEEE/ACS International Conference of Computer Systems and Applications, AICCSA 2016, Agadir, Morocco, November 29 - December 2, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-4320-0
- Salwa Souissi, Mounir Ben Ayed:
GENUS: An ETL tool treating the Big Data Variety. 1-8 - Zaki Brahmi, Sahar Mili, Rihab Derouiche:
Data placement strategy for massive data applications based on FCA approach. 1-8 - Badr Ait Hammou, Ayoub Ait Lahcen, Driss Aboutajdine:
A new recommendation algorithm for reducing dimensionality and improving accuracy. 1-6 - Maroua Bahri, Zied Elouedi:
Clustering data stream under a belief function framework. 1-8 - Azzeddine Dahbi, Siham Jabri, Youssef Balouki, Taoufiq Gadi:
A new method for ranking association rules with multiple criteria based on dominance relation. 1-7 - Sayda Elmi, Allel Hadjali, Mohamed Anis Bach Tobji, Boutheina Ben Yaghlane:
Imperfect top-k skyline query with confidence level. 1-8 - Mounira Chkiwa, Anis Jedidi, Faïez Gargouri:
Abstracts generation as information retrieval results. 1-7 - Hassanin M. Al-Barhamtoshy, Maher Khemakhem, Kamal Mansur Jambi, F. Essa, Anas M. Fattouh, A. Al-Ghamdi:
Universal metadata repository for document analysis and recognition. 1-6 - Ashraf Elnagar:
Investigation on sentiment analysis for Arabic reviews. 1-7 - Hisham Al-Mubaid, Mohamed Shenify, Sultan Aljahdali:
Assessing gene-disease relationship with multifunctional genes using GO. 1-6 - Mohamed Azmi, Abdelaziz Berrado:
Class-association rules pruning using regularization. 1-7 - Abir Gorrab, Ferihane Kboubi, Henda Ben Ghézala, Bénédicte Le Grand:
Towards a dynamic and polarity-aware social user profile modeling. 1-7 - Imen Moalla, Ahlem Nabli, Lotfi Bouzguenda, Mohamed Hammami:
Data warehouse design from social media for opinion analysis: The case of Facebook and Twitter. 1-8 - Júlio Henrique Rocha, Cláudio E. C. Campelo, Cláudio de Souza Baptista, Gabriel Joseph Ramos Rafael:
The geo-social relevance ranking: A method based on geographic information and social media data. 1-8 - Ayman El-Kilany, Neamat El Tazi, Ehab Ezzat:
Semi-supervised outlier detection via bipartite graph clustering. 1-6 - Zaki Brahmi, Faten Ben Hassen:
Communication-aware VM consolidation based on formal concept analysis. 1-8 - Amr Elmasry, Ayman Khalafallah, Moustafa Meshry:
A scalable maximum-clique algorithm using Apache Spark. 1-8 - Zohra Amekraz, Moulay Youssef:
Prediction of Amazon spot price based on chaos theory using ANFIS model. 1-6 - Takwa Mohsni, Zaki Brahmi, Mohamed Mohsen Gammoudi:
Data-intensive service composition in Cloud Computing: State-of-the-art. 1-7 - Fatima AlQayedi, Khaled Salah, M. Jamal Zemerly:
Adaptive Cloud Resource Allocation scheme to minimize SLO response time violation. 1-5 - Ryma Mahfoudhi, Sami Achour, Zaher Mahjoub:
Parallel triangular matrix system solving on CPU-GPU system. 1-6 - Abdelhamid Benaini, Achraf Berrajaa, Jaouad Boukachour, Mustapha Oudani:
Parallel genetic algorithm for the uncapacited single allocation hub location problem on GPU. 1-8 - Clícia Pinto, Marcos Barreto, Murilo Boratto:
Auto-tuning TRSM with an asynchronous task assignment model on multicore, multi-GPU and coprocessor systems. 1-8 - Mohamed Abouzahir, Abdelhafid Elouardi, Samir Bouaziz, Omar Hammami, Ismail Ali:
High-level synthesis for FPGA design based-SLAM application. 1-8 - Abdelkarim Erradi, Hisham A. Kholidy:
An efficient hybrid prediction approach for predicting cloud consumer resource needs. 1-8 - Mohcine Bouksim, Fatima Rafii Zakani, Khadija Arhid, Taoufiq Gadi, Mohamed Aboulfatah:
Evaluation of 3D mesh segmentation using a weighted version of the Ochiai index. 1-7 - Aladine Chetouani:
Toward a universal learning-based image quality metric with reference for stereoscopic images. 1-5 - Jinsen Zhang, Changwen Zheng, Yu Liu:
Advanced physical optical model for simulating rainbows. 1-8 - Elena Ranguelova:
A Salient Region Detector for structured images. 1-8 - Houssem Turki, Mohamed Ben Halima, Adel M. Alimi:
Text detection in natural scene images using two masks filtering. 1-6 - Fatma Ben Said, Adel M. Alimi:
OFSF-BC: Online feature selection framework for binary classification. 1-8 - Kaoru Uchida:
Efficient image search system with multi-scale database using profile-based pre-selection and coarse matching. 1-8 - Hind Oulhaj, Mohammed Rziza, Aouatif Amine, Rachid Jennane, Mohammed El Hassouni:
Texture classification using relative phase and Gaussian mixture models in the complex wavelet domain. 1-7 - Ayoub Karine, Abdelmalek Toumi, Ali Khenchaf, Mohammed El Hassouni:
A non-Gaussian statistical modeling of SIFT and DT-CWT for radar target recognition. 1-5 - Imad Mohamed Ouloul, Karim Afdel, Abdallah Amghar:
Age estimation using local matched filter binary pattern. 1-5 - Safaa Azzakhnini, Lahoucine Ballihi, Driss Aboutajdine:
Machine perception in gender recognition using RGB-D sensors. 1-5 - Salma Ksibi, Mahmoud Mejdoub, Chokri Ben Amar:
Person re-identification based on combined Gaussian weighted Fisher vectors. 1-8 - Imen Lassoued, Ezzeddine Zagrouba, Youssef Chahir:
A new approach of action recognition based on Motion Stable Shape (MSS) features. 1-8 - Ayoub Ellahyani, Mohamed El Ansari:
Complementary features for traffic sign detection and recognition. 1-6 - Ameni Sassi, Chokri Ben Amar, Serge Miguet:
Skyline-based approach for natural scene identification. 1-8 - Ali Idri, Laila Cheikhi:
A survey of secondary studies in software process improvement. 1-8 - Hela Marouane, Achraf Makni, Rafik Bouaziz, Claude Duvallet, Bruno Sadeg:
Defining a UML profile for the consistency of design patterns. 1-8 - Ilham Kadi, Ali Idri, Sofia Ouhbi:
Quality evaluation of cardiac decision support systems using ISO 25010 standard. 1-8 - Samia Hafez, Mustafa ElNainay, Mohammed Abougabal, Saleh ElShehaby:
Potential-fault cache-based regression test selection. 1-8 - Akil Elkamel, Mariem Gzara, Hanêne Ben-Abdallah:
An UML class recommender system for software design. 1-8 - Ismail Assayad, Lamia Eljadiri, Abdelouahed Zakari, Tarik Nahhal:
The "Behavior, interaction and priority" framework applied to SystemC-based embedded systems. 1-6 - Ahmed Amine Aliane, Hassina Aliane, M. Ziane, Nacéra Bensaou:
A genetic algorithm feature selection based approach for Arabic Sentiment Classification. 1-6 - Ngoc-Tho Huynh, Maria-Teresa Segarra, Antoine Beugnard:
Ensuring consistent dynamic adaptation: An approach from design to runtime. 1-8 - Fatma Dammak, Leila Baccour, Adel M. Alimi:
Interval valued intuitionistic fuzzy weight techniques for TOPSIS method. 1-7 - Saad Yasser Chadli, Ali Idri, José Luis Fernández-Alemán, Joaquín Nicolás Ros, Ambrosio Toval:
Identifying risks of software project management in Global Software Development: An integrative framework. 1-7 - Ayman A. Zayyan, Mohamed Elmahdy, Husniza Binti Husni, Shahrul Azmi Yousf:
Crosslingual automatic diacritization for Egyptian Colloquial Dialect. 1-6 - Nadia B. M. Karmani, Hsan Soussou, Adel M. Alimi:
Intelligent Tunisian Arabic morphological analyzer. 1-8 - Driss Namly, Yasser Regragui, Karim Bouzoubaa:
Interoperable Arabic language resources building and exploitation in SAFAR platform. 1-7 - Wafia Adouane, Nasredine Semmar, Richard Johansson:
Romanized Arabic and Berber detection using prediction by partial matching and dictionary methods. 1-7 - Rahhal Errattahi, Asmaa El Hannani, Hassan Ouahmane, Thomas Hain:
Automatic speech recognition errors detection using supervised learning techniques. 1-6 - Fatih Saglam, Hayri Sever, Burkay Genç:
Developing Turkish sentiment lexicon for sentiment analysis using online news media. 1-5 - Aboubakr Aqle, Fahad Islam, Eman Rezk, Ali Jaoua:
Mobile app conceptual browser: Online marketplaces information extraction. 1-8 - Amira Hamdi, Mohamed Slimane, Nicolas Monmarché, Adel M. Alimi:
FlyAntClass: Intelligent move for ant based clustering algorithm. 1-8 - Sabrine Malek, Wady Naanaa:
A new polynomial cluster deletion subproblem. 1-8 - Cabral Lima, Renan Lobo, Adriano Joaquim de Oliveira Cruz, Bianca Pereira, Valk Castellani:
An new model for robot navigation based on AprioriAll algorithm. 1-7 - Emna Hlel, Salma Jamoussi, Abdelmajid Ben Hamadou:
Bayesian network for discovering the interests of authors. 1-6 - Matthieu Mastio, Mahdi Zargayouna, Gérard Scémama, Omer F. Rana:
Patterns to distribute mobility simulations. 1-6 - Sara Rhazlane, Hassan Badir, Nouria Harbi, Nadia Kabachi:
Intelligent multi agent system based solution for data protection in the cloud. 1-7 - Houssem Mansouri, Al-Sakib Khan Pathan:
An efficient minimum-process non-intrusive snapshot algorithm for vehicular ad hoc networks. 1-6 - Abdellatif Serhani, Najib Naja, Abdellah Jamali:
QLAR: A Q-learning based adaptive routing for MANETs. 1-7 - Mohamed Elgharbawy, Andreas Schwarzhaupt, Gerrit Scheike, Michael Frey, Frank Gauterin:
A generic architecture of ADAS sensor fault injection for virtual tests. 1-7 - Sara Khairi, Mostafa Bellafkih, Brahim Raouyane:
Towards a dynamic QoS management in IMS transport layer via SDN. 1-8 - Wiem Housseyni, Olfa Mosbahi, Mohamed Khalgui, Maryline Chetto:
Real-time scheduling of sporadic tasks in energy harvesting distributed reconfigurable embedded systems. 1-8 - Ahmed Aboud, Haifa Touati:
Geographic interest forwarding in NDN-based wireless sensor networks. 1-8 - Slaheddine Chelbi, Claude Duvallet, Majed Abdouli, Rafik Bouaziz:
Event-driven wireless sensor networks based on consensus. 1-6 - Samira Chouikhi, Inès El Korbi, Yacine Ghamri-Doudane, Leïla Azouz Saïdane:
A novel simultaneous failure recovery technique for large scale wireless sensor networks. 1-6 - Hend Fourati, Hanen Idoudi, Leïla Azouz Saïdane:
A novel IEEE 802.15.6 CSMA/CA service differentiation. 1-7 - Craig Thomson, Isam Wadhaj, Imed Romdhani, Ahmed Yassin Al-Dubai:
Performance evaluation of RPL metrics in environments with strained transmission ranges. 1-8 - Fatma Somaa, Inès El Korbi, Leïla Azouz Saïdane:
Mobility support over RPL using sensor nodes speed classification. 1-6 - Salma Dammak, Faiza Ghozzi Jedidi, Faïez Gargouri:
A GQVM approach to secure WeBhouse ETL processes development. 1-8 - Mariem Belhor, Farah Jemili:
Intrusion detection based on genetic fuzzy classification system. 1-8 - Oumaima Ben Abderrahim, Mohamed Houcine Elhedhili, Leïla Saïdane:
DTMS-IoT: A Dirichlet-based trust management system mitigating on-off attacks and dishonest recommendations for the Internet of Things. 1-8 - Zhiwen Pan, Jesus Pacheco, Salim Hariri:
Anomaly behavior analysis for building automation systems. 1-8 - Loukmen Regainia, Sébastien Salva, Cedric Ecuhcurs:
A classification methodology for security patterns to help fix software weaknesses. 1-8 - Asma Hamed, Hella Kaffel Ben Ayed:
Privacy risk assessment and users' awareness for mobile apps permissions. 1-8 - Sonia Kotel, Fatma Sbiaa, Zeghid Medien, Mohsen Machhout, Adel Baganne, Rached Tourki:
Performance evaluation and design considerations of lightweight block cipher for low-cost embedded devices. 1-7 - Jukka Ruohonen, Johannes Holvitie, Sami Hyrynsalmi, Ville Leppänen:
Exploring the clustering of software vulnerability disclosure notifications across software vendors. 1-8 - Pratik Satam, Douglas Kelly, Salim Hariri:
Anomaly behavior analysis of website vulnerability and security. 1-7 - Myriam Jaouadi, Lotfi Ben Romdhane:
DIN: An efficient algorithm for detecting influential nodes in social graphs using network structure and attributes. 1-8 - El Mehdi El Graoui, Nabila Zrira, Soufiana Mekouar, Imade Benelallam, El-Houssine Bouyakhf:
Outlier and anomalous behavior detection in social networks using constraint programming. 1-8 - Fatima Zohra Ennaji, Abdelaziz El Fazziki, Hasna El Alaouiel El Abdallaoui, Abderrahmane Sadiq, Mohammed Sadgal, Djamal Benslimane:
Multi-agent framework for social CRM: Extracting and analyzing opinions. 1-8 - Wala Rebhi, Nesrine Ben Yahia, Narjès Bellamine Ben Saoud:
Hybrid community detection approach in multilayer social network: Scientific collaboration recommendation case study. 1-8 - Bassim Chabibi, Adil Anwar, Mahmoud Nassar:
Metamodeling approach for creating an abstract representation of simulation tools concepts. 1-7 - Rim Zarrad, Narjes Doggaz, Ezzeddine Zagrouba:
Using heading hierarchy for non-taxonomic relation extraction. 1-7 - Afef Walha, Faiza Ghozzi, Faïez Gargouri:
A Lexicon approach to multidimensional analysis of tweets opinion. 1-8 - Nabil El Fezazi, Sadek Belamfedel Alaoui, Fatima El Haoussi, El Houssaine Tissir, Teresa Alvarez:
A dynamic anti-windup AQM for congestion control in internet. 1-6 - Cheyma Ben Njima, Youssef Gamha, Lotfi Ben Romdhane:
A probabilistic model for web service composition in uncertain mobile contexts. 1-7 - Abu Saleh Md. Mahfujur Rahman, Abdulmotaleb El-Saddik:
Promoting active participation of the learners in an authoring based learning movie system. 1-6 - Ali Aajli, Karim Afdel:
Generation of an adaptive e-learning domain model based on a fuzzy logic approach. 1-8 - Yunho Huh, Justan Klaus, Magda El Zarki:
iXercise: An immersive platform for exercise intervention for special needs populations. 1-7 - Valeria Farinazzo Martins, Thiago Lima, Paulo N. M. Sampaio, Marcelo de Paiva Guimarães:
Mobile application to support dyslexia diagnostic and reading practice. 1-6 - Marcelo de Paiva Guimarães, Vagner Scamati, Mário Popolin Neto, Valeria Farinazzo Martins, Diego Roberto Colombo Dias, José Remo Ferreira Brega:
A process-scheduling simulator based on virtual reality technology. 1-6 - Hamza Abed, Philippe Pernelle, Chokri Ben Amar, Thibault Carron:
Serious games for vocational training: A compared approach. 1-8 - Konrad Walser, Roman Hosang, Marco Meyer:
Development of a thematic and structural elements grid for e-government strategies: Case study of Swiss cantons. 1-7 - Abdulellah Alaboudi, Anthony S. Atkins, Bernadette Sharp, Mohammed Alzahrani, Ahmed Balkhair, Tamara Sunbul:
Perceptions and attitudes of clinical staff towards telemedicine acceptance in Saudi Arabia. 1-8 - Hui Li, Weihao Xie, Xingang Wang, Shousheng Liu, Yingying Gai, Lei Yang:
GPU implementation of multi-scale Retinex image enhancement algorithm. 1-5 - Fatima Zahra Salmam, Abdellah Madani, Mohamed Kissi:
New distances combination for facial expression recognition from image sequences. 1-6 - Houssem Lahiani, Monji Kherallah, Mahmoud Neji:
Hand pose estimation system based on Viola-Jones algorithm for Android devices. 1-6 - Redouan Lahmyed, Mohamed El Ansari:
Multisensors-based pedestrian detection system. 1-4 - Mohamed Elgharbawy, Bénédicte Bernier, Michael Frey, Frank Gauterin:
An agile verification framework for traffic sign classification algorithms in heavy vehicles. 1-8 - Ibrahim Guelzim, Amina Amkoui, Lahcen Koutti:
Matching of omnidirectional images based on the geodesic distance. 1-5 - Soumaya Argoubi, Karima Maâlaoui, Mohamed Houcine Elhdhili, Leïla Azouz Saïdane:
Priority-MAC: A priority based medium access control solution with QoS for WSN. 1-6 - William Agosto-Padilla, Alae Loukili, Anthony K. Tsetse, Alexander L. Wijesinha, Ramesh K. Karne:
802.11n wireless LAN performance for mobile devices. 1-6 - Mohamed Saleh, M. A. Abdou, Mohamed A. Aboul Hassan:
Assessing the use of IP network management protocols in smart grids. 1-6 - Kaoutar Ourouss, Najib Naja, Abdellah Jamali:
Efficiency analysis of MANETs routing based on a new double metric with mobility and density models. 1-8 - Salma Bradai, Sofien Khemakhem, Mohamed Jmaiel:
Energy/coverage quality trade-off based tasks allocation for opportunistic real time mobile crowdsensing. 1-8 - Hiba Ramadan, Hamid Tairi:
Moving object segmentation in video using spatiotemporal saliency and laplacian coordinates. 1-7 - Yosr Ben Youssef, Mériem Afif, Sami Tabbane:
Novel AHP-based QoE factors' selection approach. 1-6 - Eya Mezghani, Maha Charfeddine, Chokri Ben Amar, Henri Nicolas:
Multifeature speech/music discrimination based on mid-term level statistics and supervised classifiers. 1-8 - Rawia Frikha, Ridha Ejbali, Mourad Zaied:
Handling occlusion in Augmented Reality surgical training based instrument tracking. 1-5 - Saleh Alshomrani, Jamel Feki, Tarek Lefi, Omar Khrouf, Kaïs Khrouf:
CobWeb multidimensional model: From OLAP to tag cloud. 1-8 - Daniel Farias Batista Leite, Cláudio de Souza Baptista, Maxwell Guimarães de Oliveira, José Amilton Moura Acioli Filho, Tiago Eduardo da Silva:
ExpOLAP: Towards exploratory OLAP. 1-8 - Soumaya Cherichi, Rim Faiz:
Using big data values to enhance social event detection pattern. 1-8 - Abir Amami, Zied Elouedi, Allel Hadjali:
A clustering based approach for query relaxation in evidential databases. 1-8 - Anwar Kalghoum, Sonia Mettali Gammar, Leïla Azouz Saïdane:
Performance evaluation of interest traffic generation and forwarding strategy impact in ICN. 1-5 - Hanen Ahmadi, Federico Viani, Alessandro Polo, Ridha Bouallegue:
Improved target tracking using regression tree in wireless sensor networks. 1-6 - Nadine Boudargham, Jacques Bou Abdo, Jacques Demerjian, Christophe Guyeux, Abdallah Makhoul:
Investigating low level protocols for Wireless Body Sensor Networks. 1-6 - Majid Al-Ruithe, Siyakha Mthunzi, Elhadj Benkhelifa:
Data governance for security in IoT & cloud converged environments. 1-8 - Rania Boujelbene, Yousra Ben Jemaa, Mourad Zribi:
Toward an optimal B-spline wavelet transform for image compression. 1-8 - Abdelilah El Amraoui, Lhoussaine Masmoudi, Hamid Ez-Zahraouy, Youssef El Amraoui:
Quantum edge detection based on SHANNON entropy for medical images. 1-6 - Abdelhak Saouli, Mohamed Chaouki Babahenini:
High performance volumetric modelling from silhouette: GPU-image-based visual hull. 1-7 - Bruno Miguel Nogueira de Souza, Jacques Facon:
A fire color mapping-based segmentation: Fire pixel segmentation approach. 1-8 - Lacheheb Hadjer, Saliha Aouat:
A density clustering approach for CBIR system. 1-8 - El Moatez Billah Nagoudi, Ahmed Khorsi, Hadda Cherroun:
Efficient inverted index with n-gram sampling for string matching in Arabic documents. 1-7 - Olfa Dridi Mekni, Mohamed Ben Ahmed:
Construction of navigation map to retrieve semantically information from medical resources. 1-7 - Mohamed Amine El Majdouli, Saad Bougrine, Ismail Rbouh, Abdelhakim Ameur El Imrani:
A fireworks algorithm for single objective big optimization of signals. 1-7 - François-Xavier Talgorn, Farès Belhadj, Vincent Boyer:
Toward a generic approach to stylization. 1-8 - Abdessamad El Ansari, Anass Mansouri, Ali Ahaitouf:
An efficient VLSI architecture design for integer DCT in HEVC standard. 1-5 - Abdessamad El Ansari, Anass Mansouri, Ali Ahaitouf:
Comparative analysis of the HEVC decoder on two embedded processors using NEON technology. 1-4 - Yosr Ghozzi, Nesrine Baklouti, Adel M. Alimi:
A novel method for resemblance images using near fuzzy set. 1-8 - Mohamed Mahmoud El Benany, Omar El Beqqali:
Cross-organizational orchestrator for e-government interoperability. 1-6 - Wiam Zamrani, Esmail Ahouzi, Angel Lizana, Juan Campus, María Josefa Yzuel:
Towards the growth of optical security systems for image encryption by polarized light. 1-6 - Molka Dhieb, Mondher Frikha:
A multilevel thresholding algorithm for image segmentation based on particle swarm optimization. 1-7 - Hanan Anzid, Gaëtan Le Goïc, Aissam Bekkari, Alamin Mansouri, Driss Mammass:
Improving point matching on multimodal images using distance and orientation automatic filtering. 1-8 - Sanae Achsas, El Habib Nfaoui:
Intelligent layer for relational aggregated search based on deep neural networks. 1-2 - Mikhail I. Gofman, Sinjini Mitra, Nicholas Smith:
Hidden Markov Models for feature-level fusion of biometrics on mobile devices. 1-2 - Mohamedou Cheikh Tourad, Abdelmounaïm Abdali, Ahmad Outfarouin:
On a new index of Publish/Subscribe system in the context of Big Data. 1-2 - Ahmad Outfarouin, Abdelmounaïm Abdali, Mohamedou Cheikh Tourad:
Towards a new decisional needs formalization. 1-2 - Riad Bourbia, Lynda Dib, Ala-Eddine Benrazek:
An agent-based architecture for a distributed MIS. 1-2 - Gaëlle Laetitia Mouafo Mapikou, Atsa Etoundi Roger:
A process mining oriented approach to improve process models analysis in developing countries. 1-8 - Maha Azabou, Kaïs Khrouf, Jamel Feki, Chantal Soulé-Dupuy, Nathalie Vallès:
Analyzing textual documents with new OLAP operators. 1-8 - Hela Malouche, Youssef Ben Halima, Henda Ben Ghézala:
Enterprise information system migration to the cloud: Assessment phase. 1-6 - Sara Handouf, Sara Arabi, Essaid Sabir, Mohamed Sadik:
Telecommunication market share game: Inducing boundedly rational consumers via price misperception. 1-7 - Alae El Alami, Mohamed Bahaj:
Framework for a complete migration of relational databases to other types of databases(object oriented OO, object-relational OR, XML). 1-7 - Abdelaali Hassaïne, Zeineb Safi, Ali Jaoua:
Authenticity detection as a binary text categorization problem: Application to Hadith authentication. 1-7 - Marwa Massaâbi, Jalel Akaichi:
A fuzzy similarity measure for search results evaluation. 1-6 - Fernando de Lucca Siqueira, Patricia Della Méa Plentz, Edson Roberto de Pieri:
Semantic trajectory applied to the navigation of autonomous mobile robots. 1-8 - Hanen Abbes, Faïez Gargouri:
Structure based modular ontologies composition. 1-8 - Mohamed Frikha, Mohamed Mhiri, Mounir Zarai, Faïez Gargouri:
Using TMT ontology in trust based medical tourism recommender system. 1-8 - Cristóvão Lima Frinhani, Sérgio Antônio Andrade de Freitas, Mauricio Vidotti Fernandes, Edna Dias Canedo:
An automatic essay correction for an active learning environment. 1-6 - Fedia Hlioui, Nadia Aloui, Faïez Gargouri:
A survey on learner models in adaptive E-learning systems. 1-7 - Wiem Maalej, Philippe Pernelle, Chokri Ben Amar, Thibault Carron, Elodie Kredens:
Identification and modeling of the skills within MOOCs. 1-8 - Sahar Msaed, Philippe Pernelle, Chokri Ben Amar, Thibault Carron:
Service oriented approach for modeling and generic integration of complex resources in MOOCs. 1-8 - Mustapha Amrouch, Mouhcine Rabi, Driss Mammass:
An improved Arabic handwritten recognition system using embedded training based on HMMs. 1-5 - Nada Aouadi, Philippe Pernelle, Chokri Ben Amar, Thibault Carron, Stephane Talbot:
Models and mechanisms for implementing playful scenarios. 1-8 - Sahar Abdelhedi, Mouna Baklouti, Riad Bourguiba, Jaouhar Mouine:
Design and implementation of a fall detection system on a Zynq board. 1-7 - Faiza Loukil, Molka Rekik, Khouloud Boukadi:
AntiPattren-based cloud ontology evaluation. 1-8 - Taycir Bouasker, Mahjoub Langar, Riadh Robbana:
Novel time related quality of service criteria. 1-8 - Nirmal Kumbhare, Cihan Tunc, Salim Hariri, Ivan B. Djordjevic, Ali Akoglu, Howard Jay Siegel:
Just In Time Architecture (JITA) for dynamically composable data centers. 1-8 - Fabrício Quintanilha Baptista, Mário Popolin Neto, Diego Roberto Colombo Dias, Marcelo de Paiva Guimarães, José Remo Ferreira Brega:
3D content generation to moodle platform to support anatomy teaching and learning. 1-6 - Lahcen Koutti, Ilyas El Jaafari, Mohamed El Ansari:
Temporal consistent stereo matching approach for road applications. 1-6 - Soumoud Fkaier, Mohamed Romdhani, Mohamed Khalgui, Georg Frey:
Enabling reconfiguration of adaptive control systems using real-time context-aware framework. 1-8 - Lamia Ben Amor, Imene Lahyani, Mohamed Jmaiel:
Towards ODRAH: An ontology-based data reliability assessment in mobile health. 1-8 - Mariem Haoues, Asma Sellami, Hanêne Ben-Abdallah:
Predicting the functional change status in UML activity diagram from the use case diagram. 1-8 - Safa Guellouz, Adel Benzina, Mohamed Khalgui, Georg Frey:
Reconfigurable function blocks: Extension to the standard IEC 61499. 1-8 - Zineb Aarab, Rajaa Saidi, Moulay Driss Rahmani:
Event-driven modeling for context-aware information systems. 1-8 - Hanane Bais, Mustapha Machkour, Lahcen Koutti:
An independent-domain natural language interface for relational database: Case Arabic language. 1-7 - Seifeddine Mechti, Ayoub Abbassi, Lamia Hadrich Belguith, Rim Faiz:
An empirical method using features combination for Arabic native language identification. 1-5 - Faiza Walha, Abdelghani Bekrar, Sondès Chaabane, Taïcir Loukil:
A road rail PI hub allocation problem: Heuristic in static and dynamic case. 1-8 - Hanen Nasri, Wael Ouarda, Adel M. Alimi:
ReLiDSS: Novel lie detection system from speech signal. 1-8 - Sana Ibjaoun, Anas Abou El Kalam, Vincent Poirriez, Abdellah Ait Ouahman, Mina De Montfort:
Analysis and enhancements of an efficient biometric-based remote user authentication scheme using smart cards. 1-8 - Khalil Omar, Jorge Marx Gómez:
A selection model of ERP system in mobile ERP design science research: Case study: Mobile ERP usability. 1-8 - Firas Ben Kharrat, Aymen Elkhelifi, Rim Faiz:
Recommendation system based contextual analysis of Facebook comment. 1-6 - Hasna El Alaoui El Abdallaoui, Abdelaziz El Fazziki, Abderrahmane Sadiq, Fatima Zohra Ennaji, Mohammed Sadgal:
How can crowdsourcing help in crisis situations? Missing kids case study. 1-7 - Emna Ben Ayed, Christophe Kolski, Houcine Ezzedine:
Context-based evaluation of mobile knowledge management systems. 1-8 - Rahma Djiroun, Kamel Boukhalfa, Zaia Alimazighi, Faten Atigui, Sandro Bimonte:
A data cube design and construction methodology based on OLAP queries. 1-8 - Mahmoud Al-Ayyoub, Qussai Yaseen, Mohammed A. Shehab, Yaser Jararweh, Firas AlBalas, Elhadj Benkhelifa:
Exploiting GPUs to accelerate clustering algorithms. 1-6 - Faten Khalfallah, Chafik Aloulou, Lamia Hadrich Belguith:
HAD, a platform to create a historical dictionary. 1-6 - Olfa Layouni, Jalel Akaichi:
A conceptual UML profile for modeling fuzzy trajectory data: An ambulance use case. 1-6 - Markus Zeindl, Markus Seitz, Christian Facchi:
Correlation of change size to fault-proneness: A real life case study. 1-6 - Ashraf Elnagar, Omar Einea:
BRAD 1.0: Book reviews in Arabic dataset. 1-8 - Duaa Ekhtoom, Mahmoud Al-Ayyoub, Mohammed I. Al-Saleh, Mohammad A. Alsmirat, Ismail Hmeidi:
A compression-based technique to classify metamorphic malware. 1-6 - Abderrahim Ait Wakrime, Saïd Jabbour:
On repairing queries in cloud computing. 1-6 - Elhadj Benkhelifa, Dayan Abishek Fernando, Abdulaziz Alangari:
Customised performance benchmarking for novel multi-tenancy architecture. 1-6 - Rihab Boussada, Mohamed Elhoucine Elhdhili, Leïla Azouz Saïdane:
A survey on privacy: Terminology, mechanisms and attacks. 1-7 - Marco Conoscenti, Antonio Vetrò, Juan Carlos De Martin:
Blockchain for the Internet of Things: A systematic literature review. 1-6 - Sarra Naoui, Mohamed Elhoucine Elhdhili, Leïla Azouz Saïdane:
Security analysis of existing IoT key management protocols. 1-7 - Bacem Mbarek, Aref Meddeb, Wafa Ben Jaballah, Mohamed Mosbah:
A broadcast authentication scheme in IoT environments. 1-6 - Manel Mrabet, Yosra Ben Saied, Leïla Azouz Saïdane:
A hybrid trust management system for cloud environments. 1-6 - Majid H. Alsulami, Anthony S. Atkins, Russell J. Campion:
The use of smart watches to monitor heart rates in elderly people: A complementary approach. 1-6 - Fatima Abdalla Al-Alem, Mohammad A. Alsmirat, Mahmoud Al-Ayyoub:
On the road to the Internet of Biometric Things: A survey of fingerprint acquisition technologies and fingerprint databases. 1-6 - Shadi AlZu'bi, Mohammed A. Shehab, Mahmoud Al-Ayyoub, Elhadj Benkhelifa, Yaser Jararweh:
Parallel implementation of FCM-based volume segmentation of 3D images. 1-6 - Majed AlOtaibi, Lo'ai Ali Tawalbeh, Yaser Jararweh:
Integrated sensors system based on IoT and mobile cloud computing. 1-5 - Lo'ai Ali Tawalbeh, Turki F. Al-Somani:
More secure Internet of Things using robust encryption algorithms against side channel attacks. 1-6 - Marwa Masmoudi, Faiza Ghozzi:
Analyses of social WeBhouse integrating SNA metrics. 1-7 - Nicolás Emilio Díaz Ferreyra, Johanna Schäwel, Maritta Heisel, Christian Meske:
Addressing self-disclosure in social media: An instructional awareness approach. 1-6 - Jisun An, Haewoon Kwak, Bernard J. Jansen:
Validating social media data for automatic persona generation. 1-6 - Amina Amara, Rihem Ben Romdhane, Mohamed Ali Hadj Taieb, Mohamed Ben Aouicha:
Simulating the merge between user-centered graphs of social networks. 1-6 - Abdullateef Rabab'ah, Mahmoud Al-Ayyoub, Yaser Jararweh, Monther Aldwairi:
Authorship attribution of Arabic tweets. 1-6 - Ali Salem, Hanêne Ben-Abdallah:
Data warehousing design: Automatic verification of conformity and summarizability constraints. 1-6 - F. Essa, Kamal Mansur Jambi, Anas M. Fattouh, Hassanin M. Al-Barhamtoshy, Maher Khemakhem, A. Al-Ghamdi:
A fedearted E-learning cloud system based on mixed reality. 1-5 - Allie Whitman, Bernard J. Jansen:
Some commericial concerns of Amazon's community forums: The case of the Kindle. 1-6 - Mohammed Naji Al-Kabi, Areej A. Al-Qwaqenah, Amal H. Gigieh, Kholoud Alsmearat, Mahmoud Al-Ayyoub, Izzat Mahmoud Alsmadi:
Building a standard dataset for Arabie sentiment analysis: Identifying potential annotation pitfalls. 1-6 - Tarek Abid, Hafed Zarzour, Mohamed Ridda Laouar, Mohamed Tarek Khadir:
Towards a smart city ontology. 1-6 - Manel Elleuchi, Manel Boujelben, Mohamed Wassim Jmal, Mohamed Abid, Abdulfattah Mohammad Obeid, Mohammed S. BenSaleh:
Energy aware linear sensor placement scheme for water pipeline monitoring. 1-8 - Fadoua Nejjari, Laila Benhlima, Slimane Bah:
Event traffic detection using heterogenous wireless sensors network. 1-6 - Youness Riouali, Laila Benhlima, Slimane Bah:
Petri net extension for traffic road modelling. 1-6 - Adil Enaanai, Aziz Sdigui Doukkali, Ichrak Saif, Hicham Moutachaouik, Mustapha Hain:
The collaborative relevance in the distributed information retrieval. 1-6 - Abla Chaouni Benabdellah, Asmaa Benghabrit, Imane Bouhaddou, El Moukhtar Zemmouri:
Big data for supply chain management: Opportunities and challenges. 1-6 - Ichrak Mehrez, Olfa Hamdi-Larbi, Thomas Dufaud, Nahid Emad:
Towards an auto-tuning system design for optimal sparse compression format selection with user expertise. 1-6 - Moulay Smail Bouzakraoui, Abdelalim Sadiq, Nourddine Enneya:
Towards a framework for customer emotion detection. 1-6 - Ibtissam Slimani, Abdelmoghit Zaarane, Abdellatif Hamdoun:
Convolution algorithm for implementing 2D discrete wavelet transform on the FPGA. 1-3 - Abderrahmane Elyousfi, Hamza Hamout, Asma El Hachimi:
An efficient intra block size decision for H.264/AVC encoding optimization.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.