default search action
Search dblp for Publications
export results for "toc:db/journals/jides/jides2.bht:"
@article{DBLP:journals/jides/AlayaZLM15, author = {Bechir Alaya and Salah Zidi and Lamri Laouamer and Tarek Moulahi}, title = {Effect of selective replication strategy and dynamic admission control to QoS management in video on demand systems}, journal = {J. Innov. Digit. Ecosyst.}, volume = {2}, number = {1-2}, pages = {45--54}, year = {2015}, url = {https://doi.org/10.1016/j.jides.2015.11.002}, doi = {10.1016/J.JIDES.2015.11.002}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jides/AlayaZLM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jides/GhadiLM15, author = {Musab Ghadi and Lamri Laouamer and Tarek Moulahi}, title = {Enhancing digital image integrity by exploiting {JPEG} bitstream attributes}, journal = {J. Innov. Digit. Ecosyst.}, volume = {2}, number = {1-2}, pages = {20--31}, year = {2015}, url = {https://doi.org/10.1016/j.jides.2015.10.003}, doi = {10.1016/J.JIDES.2015.10.003}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jides/GhadiLM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jides/GhazelYE15, author = {Mohamed Ghazel and Jing Yang and El{-}Miloudi El{-}Koursi}, title = {A pattern-based method for refining and formalizing informal specifications in critical control systems}, journal = {J. Innov. Digit. Ecosyst.}, volume = {2}, number = {1-2}, pages = {32--44}, year = {2015}, url = {https://doi.org/10.1016/j.jides.2015.11.001}, doi = {10.1016/J.JIDES.2015.11.001}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jides/GhazelYE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jides/LaouamerANP15, author = {Lamri Laouamer and Muath AlShaikh and Laurent Nana and Anca Christine Pascu}, title = {Robust watermarking scheme and tamper detection based on threshold versus intensity}, journal = {J. Innov. Digit. Ecosyst.}, volume = {2}, number = {1-2}, pages = {1--12}, year = {2015}, url = {https://doi.org/10.1016/j.jides.2015.10.001}, doi = {10.1016/J.JIDES.2015.10.001}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jides/LaouamerANP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jides/MakhloufAGR15, author = {Derdour Makhlouf and Adel Alti and Mohamed Gasmi and Philippe Roose}, title = {Security architecture metamodel for Model Driven security}, journal = {J. Innov. Digit. Ecosyst.}, volume = {2}, number = {1-2}, pages = {55--70}, year = {2015}, url = {https://doi.org/10.1016/j.jides.2015.12.001}, doi = {10.1016/J.JIDES.2015.12.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jides/MakhloufAGR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jides/SellamiA15, author = {Lamaa Sellami and Kamel Abderrahim}, title = {Classification and statistical learning for detecting of switching time for switched linear systems}, journal = {J. Innov. Digit. Ecosyst.}, volume = {2}, number = {1-2}, pages = {13--19}, year = {2015}, url = {https://doi.org/10.1016/j.jides.2015.10.002}, doi = {10.1016/J.JIDES.2015.10.002}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jides/SellamiA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.