default search action
Hamid Harroud
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [e1]Fatna Belqasmi, Hamid Harroud, Max Agueh, Rachida Dssouli, Faouzi Kamoun:
Emerging Technologies for Developing Countries - First International EAI Conference, AFRICATEK 2017, Marrakech, Morocco, March 27-28, 2017 Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 206, Springer 2018, ISBN 978-3-319-67836-8 [contents] - 2016
- [j6]Khadija Akherfi, Hamid Harroud, Michael Gerndt:
A Mobile Cloud Middleware to Support Mobility and Cloud Interoperability. Int. J. Adapt. Resilient Auton. Syst. 7(1): 41-58 (2016) - 2015
- [j5]Mehdia Ajana El-Khaddar, Mhammed Chraibi, Hamid Harroud, Mohammed Boulmalf, Mohammed Elkoutbi, Abdelilah Maach:
A policy-based middleware for context-aware pervasive computing. Int. J. Pervasive Comput. Commun. 11(1): 43-68 (2015) - [c25]Youness Takhma, Tajjeeddine Rachidi, Hamid Harroud, Mohamed Riduan Abid, Nasser Assem:
Third-party source code compliance using early static code analysis. CTS 2015: 132-139 - 2014
- [c24]Mhammed Chraibi, Mehdia Ajana El-Khaddar, Hamid Harroud, Abdelilah Maach, Mohammed Elkoutbi:
Policy Based Security Middleware as a Service. FiCloud 2014: 322-327 - [c23]Khadija Akherfi, Hamid Harroud, Michael Gerndt:
A mobile cloud middleware to support mobility and cloud interoperability. ICMCS 2014: 1189-1194 - 2013
- [c22]Hind Saddiki, L. Bahri, Hamid Harroud:
Adaptive service provision in mobile enivronments. AICCSA 2013: 1-6 - [c21]Mhammed Chraibi, Hamid Harroud, Abdelilah Maach:
Classification of Security Issues and Solutions in Cloud Environments. iiWAS 2013: 560 - 2012
- [c20]Mehdia Ajana El-Khaddar, Hamid Harroud, Mohammed Boulmalf, Mohammed Elkoutbi, Ahmed Habbani:
Emerging wireless technologies in e-health trends, challenges, and framework design issues. ICMCS 2012: 440-445 - [c19]Mohammed Boulmalf, Ahmed Belgana, Tayeb Sadiki, Sara Hussein, Tarik Aouam, Hamid Harroud:
A lightweight middleware for an e-health WSN based system using Android technology. ICMCS 2012: 551-556 - [c18]Hind Saddiki, Hamid Harroud:
An agent-based negotiation model for user-adaptive service provision. ICMCS 2012: 973-978 - [c17]Yousra Chtouki, Hamid Harroud, Mohammed Khalidi, Samir Bennani:
The impact of YouTube videos on the student's learning. ITHET 2012: 1-4 - 2011
- [j4]Mehdia E. Ajana, Hamid Harroud, Mohammed Boulmalf, Mohammed Elkoutbi:
FlexRFID Middleware in the Supply Chain: Strategic Values and Challenges. Int. J. Mob. Comput. Multim. Commun. 3(2): 19-32 (2011) - [c16]Yassine Jiber, Hamid Harroud, Ahmed Karmouch:
Precision agriculture monitoring framework based on WSN. IWCMC 2011: 2015-2020 - [c15]Mhammed Chraibi, Hamid Harroud, Ahmed Karmouch:
Policy-based security management in mobile environments. MoMM 2011: 293-296 - 2010
- [c14]Mariam Ouanaim, Hamid Harroud, Aziz Berrado, Mohammed Boulmalf:
Dynamic user profiling approach for services discovery in mobile environments. IWCMC 2010: 550-554
2000 – 2009
- 2009
- [j3]Tarik Aouam, Mohammed Boulmalf, Hamid Harroud:
A quality of service based planning for IEEE802.11g networks. Int. J. Auton. Adapt. Commun. Syst. 2(2): 128-142 (2009) - [c13]Mohammed Boulmalf, Jawad Abrache, Tarik Aouam, Hamid Harroud:
Traffic analysis for GSM networks. AICCSA 2009: 498-503 - [c12]Y. Bouzid, Hamid Harroud, Mohammed Boulmalf, Ahmed Karmouch:
Context-based services discovery in mobile environments. ICT 2009: 13-18 - [c11]Mehdia E. Ajana, Mohammed Boulmalf, Hamid Harroud, Habib Hamam:
A Policy Based Event Management Middleware for Implementing RFID Applications. WiMob 2009: 406-410 - [c10]Y. Bouzid, Hamid Harroud, Aziz Berrado, Mohammed Boulmalf, Ahmed Karmouch:
A Context-aware Platform to Support Mobile Users with Personalized Services. WINSYS 2009: 153-158 - 2007
- [j2]Mohamed Ahmed, Hamid Harroud, Roger Impey, Ahmed Karmouch:
Agent-based multimedia presentation and adaptation service. Multim. Tools Appl. 34(3): 299-315 (2007) - [c9]Nancy Samaan, Hamid Harroud, Ahmed Karmouch:
PACMAN: A Policy-Based Architecture for Context Management in Ambient Networks. CCNC 2007: 497-502 - 2006
- [c8]Hamid Harroud, Ahmed Karmouch:
Implicit Context-Sensitive Mobile Computing Using Semantic Policies. Autonomic Networking 2006: 188-200 - [r1]Hamid Harroud, Dineshbalu Balakrishnan, Ahmed Karmouch:
Mobile Ad Hoc Communication Issues. The Handbook of Mobile Middleware 2006: 75-101 - 2005
- [c7]Hamid Harroud, Ahmed Karmouch:
A Policy Based Context-Aware Agent Framework to Support Users Mobility. AICT/SAPIR/ELETE 2005: 177-182 - 2004
- [c6]Hamid Harroud, Mohamed Khedr, Ahmed Karmouch:
Building Policy-Based Context Aware Applications for Mobile Environments. MATA 2004: 48-61 - 2003
- [j1]Hamid Harroud, Mohamed Ahmed, Ahmed Karmouch:
Policy-Driven Personalized Multimedia Services for Mobile Users. IEEE Trans. Mob. Comput. 2(1): 16-24 (2003) - 2002
- [c5]Hamid Harroud, Ahmed Karmouch:
Context Customization of Virtual Teams Multimedia Collaborative Services. IMSA 2002: 16-20 - [c4]Mohamed Ahmed, Hamid Harroud, Roger Impey, Ahmed Karmouch:
Designing Multimedia Service Agents for Mobile Users. MATA 2002: 119-127 - 2001
- [c3]Hamid Harroud, Mohamed Ahmed, Ahmed Karmouch:
Agent-Based Personalized Services for Mobile Users over a VPN. ICEIS (2) 2001: 1110-1117 - [c2]Mouhsine Lakhdissi, Hamid Harroud, Ahmed Karmouch, Clifford Grossner:
A Policy Management System for Mobile Agent-Based Services. MATA 2001: 114-123 - [c1]Hamid Harroud, Mouhsine Lakhdissi, Ahmed Karmouch, Clifford Grossner:
Policy-Based Management for Multimedia Collaborative Services. MMNS 2001: 285-198
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint