default search action
Chérifa Boucetta
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Adel Mounir Sareh Said, Michel Marot, Chérifa Boucetta, Hossam Afifi, Hassine Moungla, Gatien Roujanski:
Reinforcement learning vs rule-based dynamic movement strategies in UAV assisted networks. Veh. Commun. 48: 100788 (2024) - [c25]Laurent Hussenet, Chérifa Boucetta, Michel Herbin:
Spanning Thread: A Multidimensional Classification Method for Efficient Data Center Management. I4CS 2024: 219-234 - 2023
- [c24]Chérifa Boucetta, Laurent Hussenet, Michel Herbin:
Improved Euclidean Distance in the K Nearest Neighbors Method. I4CS 2023: 315-324 - [c23]Chérifa Boucetta, Frédéric Lassabe, Oumaya Baala:
Enhancing Data Collection in Vehicular Network Through Clustering Optimization. IWCMC 2023: 1070-1075 - 2022
- [c22]Adel Mounir Sareh Said, Mohammed Laroui, Chérifa Boucetta, Hossam Afifi, Hassine Moungla:
Optimal Mobile IRS Deployment with Reinforcement Learning Encoder Decoders. GLOBECOM 2022: 1966-1971 - [c21]Aicha Dridi, Mohammed Laroui, Chérifa Boucetta, Hossam Afifi, Hassine Moungla:
Reinforcement Learning Vs ILP Optimization in IoT support of Drone assisted Cellular Networks. ICC 2022: 4589-4594 - [c20]Chérifa Boucetta, Laurent Hussenet, Michel Herbin:
Practical Method for Multidimensional Data Ranking - Application for Virtual Machine Migration. I4CS 2022: 267-277 - [c19]Laurent Hussenet, Chérifa Boucetta:
A green-aware optimization strategy for virtual machine migration in cloud data centers. IWCMC 2022: 1082-1087 - 2021
- [j3]Chérifa Boucetta, Boubakr Nour, Michel Sortais, Hassine Moungla:
A Latin rectangles-based TSCH scheduling and interference mitigation design. Comput. Networks 197: 108275 (2021) - [j2]Aicha Dridi, Chérifa Boucetta, Seif Eddine Hammami, Hossam Afifi, Hassine Moungla:
STAD: Spatio-Temporal Anomaly Detection Mechanism for Mobile Network Management. IEEE Trans. Netw. Serv. Manag. 18(1): 894-906 (2021) - [c18]Aicha Dridi, Chérifa Boucetta, Hassine Moungla, Hossam Afifi:
Deep Recurrent Learning versus Q-Learning for Energy Management Systems in Next Generation Network. GLOBECOM 2021: 1-6 - [c17]Chérifa Boucetta, Boubakr Nour, Albéric Cusin, Hassine Moungla:
QoS in IoT Networks based on Link Quality Prediction. ICC 2021: 1-6 - [c16]Aicha Dridi, Hossam Afifi, Hassine Moungla, Chérifa Boucetta:
Transfer Learning for Classification and Prediction of Time Series for Next Generation Networks. ICC 2021: 1-6 - 2020
- [c15]Chérifa Boucetta, Aicha Dridi, Hossam Afifi, Ahmed E. Kamal, Hassine Moungla:
Heuristic Optimization Algorithms for QoS Management in UAV Assisted Cellular Networks. GLOBECOM 2020: 1-6 - [c14]Chérifa Boucetta, Olivier Flauzac, Bachar Salim Haggar, Abdel-Nassir Mahamat Nassour, Florent Nolot:
Deployment of Electricity-theft Detection Infrastructure in Chadian Smart Grid Networks. PEMWN 2020: 1-6 - [c13]Chérifa Boucetta, Olivier Flauzac, Bachar Salim Haggar, Abdel-Nassir Mahamat Nassour, Florent Nolot:
Smart Grid Networks enabled Electricity-Theft Detection and Fault Tolerance. WINCOM 2020: 1-6
2010 – 2019
- 2019
- [c12]Chérifa Boucetta, Boubakr Nour, Hassine Moungla, Laaziz Lahlou:
An IoT Scheduling and Interference Mitigation Scheme in TSCH Using Latin Rectangles. GLOBECOM 2019: 1-6 - [c11]Chérifa Boucetta, Oumaya Baala, Kahina Ait Ali, Alexandre Caminada:
Performance of topology-based data routing with regard to radio connectivity in VANET. IWCMC 2019: 609-614 - [c10]Chérifa Boucetta, Boubakr Nour, Seif Eddine Hammami, Hassine Moungla, Hossam Afifi:
Adaptive Range-based Anomaly Detection in Drone-assisted Cellular Networks. IWCMC 2019: 1239-1244 - [c9]Chérifa Boucetta, Aicha Dridi, Hassine Moungla, Hossam Afifi, Ahmed E. Kamal:
Optimizing Drone Deployment for Cellular Communication Coverage During Crowded Events. MILCOM 2019: 622-627 - [c8]Aicha Dridi, Chérifa Boucetta, Abubakar Yau Alhassan, Hassine Moungla, Hossam Afifi, Houda Labiod:
Deep Learning Approaches for Electrical Vehicular Mobility Management: Invited Paper. WINCOM 2019: 1-6 - 2018
- [c7]Oumaya Baala, Chérifa Boucetta, Kahina Ait Ali, Alexandre Caminada:
More Insights Into Communication Issues in the Internet of Vehicles. I-SPAN 2018: 38-45 - 2016
- [j1]Chérifa Boucetta, Hanen Idoudi, Leïla Azouz Saïdane, Halima Elbiaze:
Tree-based modelling of redundancy and paths in wireless sensor networks. Int. J. Inf. Commun. Technol. 8(2/3): 212-234 (2016) - [c6]Chérifa Boucetta, Hanen Idoudi, Leïla Azouz Saïdane:
Hierarchical Cuckoo Search-based routing in Wireless Sensor Networks. ISCC 2016: 996-998 - 2015
- [c5]Chérifa Boucetta, Hanen Idoudi, Leïla Azouz Saïdane:
Ant Colony Optimization based hierarchical data dissemination in WSN. IWCMC 2015: 782-787 - [c4]Chérifa Boucetta, Hanen Idoudi, Leïla Azouz Saïdane:
Adaptive Scheduling with Fault Tolerance for Wireless Sensor Networks. VTC Spring 2015: 1-5 - 2014
- [c3]Chérifa Boucetta, Hanen Idoudi, Leïla Azouz Saïdane:
PASC: Power aware scheduled clustering in wireless sensor networks. ISWCS 2014: 873-877 - 2012
- [c2]Chérifa Boucetta, Hanen Idoudi, Leïla Azouz Saïdane:
Hierarchical modeling of redundancy and paths in wireless sensor networks. ICCIT 2012: 243-247 - 2010
- [c1]Chérifa Boucetta, Mohamed Ali Kâafar, Marine Minier:
How Secure are Secure Localization Protocols in WSNs? S-CUBE 2010: 164-178
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-19 21:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint