


default search action
12th AICCSA 2015: Marrakech, Morocco
- 12th IEEE/ACS International Conference of Computer Systems and Applications, AICCSA 2015, Marrakech, Morocco, November 17-20, 2015. IEEE Computer Society 2015, ISBN 978-1-5090-0478-2
- Mohamed A. Nassar, Layla A. A. El-Sayed:
Efficient interleaved modular multiplication based on sign detection. 1-5 - Milton S. S. Junior, Nelson S. Rosa
, Fernando Antônio Aires Lins:
xLONGWisE: An environment to support the execution of Long Running Workflows. 1-8 - Aafaf Ouaddah, Hajar Mousannif
, Abdellah Ait Ouahman:
Access control models in IoT: The road ahead. 1-2 - Meryem Boufim, Hafid Barka:
Building holistic social media strategy refering to social intelligence and digital maturity. 1-8 - Ali Ahmed
, Saadat M. Alhashmi
:
A metric for Literature-Based Discovery methodology evaluation. 1-5 - Salam Ismail Rasheed Khanji, Asad Masood Khattak, Hakim Hacid:
Database auditing and forensics: Exploration and evaluation. 1-6 - Mohamed Hachem Kermani
, Zizette Boufaïda:
A modeling of a multi-agent system for the protein synthesis. 1-7 - Messaouda Fareh
, Hadjer Guellati, Chaima Elfarrouji:
Refinement and reuse of ontologies semantic mapping. 1-4 - Chaima Bejaoui
, Alexandre Guitton, Abdennaceur Kachouri:
Improved election of cluster heads in LEACH. 1-4 - Jameela Al Otaibi, Samir Elloumi, Ali Jaoua
, Abdelaali Hassaïne:
Using conceptual reasoning for inconsistencies detection in Islamic advisory opinion (Fatwas). 1-5 - Imane Bouij-Pasquier, Abdellah Ait Ouahman, Anas Abou El Kalam
, Mina Ouabiba de Montfort:
SmartOrBAC security and privacy in the Internet of Things. 1-8 - Mohamed El Yafrani
, Belaïd Ahiod:
Cosolver2B: An efficient local search heuristic for the Travelling Thief Problem. 1-5 - Aura Conci
, Andre Luiz Brazil, Simone Bacellar Leal Ferreira, Trueman MacHenry:
AES cryptography in color image steganography by genetic algorithms. 1-8 - Fatma Ben Taher, Nader Ben Amor
, Mohamed Jallouli:
An extended Eye Movement Tracker system for an electric wheelchair movement control. 1-7 - Mohammad Alomari, Alan D. Fekete:
Serializable use of Read Committed isolation level. 1-8 - Parameth Voraseyanont, Mathupayas Thongmak
:
The influence of 4Ps and system quality on perceived quality after mobile instant messaging usage. 1-4 - Roqyiah M. Abdeen, Ahmed Afifi, Ashraf B. Elsisi:
Improved Arabic handwriting word segmentation approach using Random Forests. 1-8 - Amira Jouirou
, Abir Baâzaoui, Walid Barhoumi
, Ezzeddine Zagrouba
:
Curvelet-based locality sensitive hashing for mammogram retrieval in large-scale datasets. 1-8 - Afafe Annich
, Abdellatif El Abderrahmani, Khalid Satori
:
Freehand sketch based 3D reconstruction using constraints. 1-2 - Aouatef Rouahi, Kais Ben Salah, Khaled Ghédira:
Belief Constraint Satisfaction Problems. 1-4 - Jihen Maâzoun, Nadia Bouassida, Hanêne Ben-Abdallah
:
SPL-UML: Software product lines design language. 1-4 - Aymen Ghilen
, Mostafa Azizi, Ridha Bouallegue
:
Integration of a quantum protocol for mutual authentication and secret key distribution within 802.11i standard. 1-7 - Hisham A. Kholidy, Abdelkarim Erradi:
A cost-aware model for risk mitigation in Cloud computing systems. 1-7 - Imen Gaied, Farah Jemili
, Ouajdi Korbaa
:
Intrusion detection based on Neuro-Fuzzy classification. 1-8 - Maged Fakirah
, Mohammed A. Shehab
, Yaser Jararweh
, Mahmoud Al-Ayyoub:
Accelerating Needleman-Wunsch global alignment algorithm with GPUs. 1-5 - Aladine Chetouani:
A Reduced Reference Image Quality assessment for Multiply Distorted Images. 1-4 - Sofiane Boukelkoul
, Ramdane Maamri:
Optimal model transformation of BPMN to DEVS. 1-8 - Said Talbi, Lotfi Zaouche:
Enhanced Unequal Clustering Algorithm for Wireless Sensor Networks. 1-4 - Aimad Karkouch
, Hassan Al Moatassime, Hajar Mousannif
, Thomas Noël:
Data quality enhancement in Internet of Things environment. 1-8 - Taha Ait Tchakoucht, Mostafa Ezziyyani
, Mohammed Jbilou, Mikaël Salaün:
Behavioral appraoch for intrusion detection. 1-5 - Rachid Lamrani
, El Hassan Abdelwahed
:
Learning through play in pervasive context: A survey. 1-8 - Farah Aït-Salaht, Hind Castel:
Bounding aggregations on bulk arrivals for performance analysis of clouds. 1-8 - Mounir Lahlou Kassi, Abdelaziz Berrado
, Loubna Benabbou, K. Benabdelkader:
Towards a new framework for clustering in a mixed data space: Case of gasoline service stations segmentation in Morocco. 1-6 - Monia Ben Brahim, Tarak Chaari, Mohamed Jmaiel:
XPath translation to enhance the semantic matching of fine-grained Web service security policies. 1-8 - Mohamed Hamidi, Mohamed El Haziti, Hocine Cherifi
, Driss Aboutajdine:
A blind robust image watermarking approach exploiting the DFT magnitude. 1-6 - Aymen Ghilen
, Mostafa Azizi, Ridha Bouallegue
:
Integration of a quantum authenticated key distribution scheme in the EAP-TLS protocol. 1-5 - Malek Jebabli, Hocine Cherifi
, Chantal Cherifi
, Atef Hamouda:
User and group networks on YouTube: A comparative analysis. 1-8 - Sanaa Kaddoura
:
Information matrix: Fighting back using a matrix. 1-6 - Hicham Gueddah
, Abdellah Yousfi
, Mostafa Belkasmi
:
The filtered combination of the weighted edit distance and the Jaro-Winkler distance to improve spellchecking Arabic texts. 1-6 - Aymen Ghilen
, Mostafa Azizi, Ridha Bouallegue
:
Integration and formal security analysis of a quantum key distribution scheme within CHAP protocol. 1-7 - Fabio Leal, Martin A. Musicante
:
Using SLA to guide database transition to NoSQL on the cloud: A systematic mapping study. 1-8 - Iman M. A. Helal
, Ahmed Awad
, Ali El Bastawissi:
Runtime deduction of case ID for unlabeled business process execution events. 1-8 - Bouchra El Idrissi
, Salah Baïna, Karim Baïna
:
Supporting collaborative work on ontology learning from Relational Databases. 1-6 - Ayoub Karine, Noureddine Lasmar, Alexandre Baussard, Mohammed El Hassouni:
Sonar image segmentation based on statistical modeling of wavelet subbands. 1-5 - Hamdi Ellouzi, Hela Ltifi, Mounir Ben Ayed:
New Multi-Agent architecture of visual Intelligent Decision Support Systems application in the medical field. 1-8 - Saliha Mallem, Amina Zemmache, Chafia Yahiaoui:
A new Authentication and Key Agreement protocol for SIP in IMS. 1-7 - Youssef Azdoud, Aouatif Amine
, Nawal Alioua, Mohammed Rziza
:
Pre collision detection system for pedestrian safety based on HOL. 1-2 - Rania Chakroun, Leila Beltaïfa Zouari, Mondher Frikha
, Ahmed Ben Hamida:
A novel approach based on Support Vector Machines for automatic speaker identification. 1-5 - Hanen Chihi, Walid Chainbi
, Khaled Ghédira:
Cloud computing architecture and migration strategy for universities and higher education. 1-8 - Malek Ben Salem
, Emna Bouazizi
, Rafik Bouaziz
:
Multi-versions data and epsilon-serializability for QoS enhancement in distributed RTDBMS. 1-6 - Mhamed Sayyouri
, Abdeslam Hmimid, Hicham Karmouni
, Hassan Qjidaa
, Abdellah Rezzouk
:
Image classification using separable invariant moments of Krawtchouk-Tchebichef. 1-6 - Ismail El Bazi, Nabil Laachfoubi:
A comparative study of Named Entity Recognition for Arabic using ensemble learning approaches. 1-6 - Haifa Harrouch, Mourad Kaddes, Majed Abdouli
, Rafik Bouaziz
, Claude Duvallet:
DASH-DMS: To improve streaming video over HTTP. 1-8 - Rima Grati, Khouloud Boukadi
, Hanêne Ben-Abdallah
:
Overview of IaaS monitoring tools. 1-7 - Érick Oliveira Rodrigues
, José Viterbo
, Aura Conci
, Trueman MacHenry:
A context-aware middleware for medical image based reports. 1-4 - Hiba Ramadan
, Hamid Tairi
:
Collaborative Xmeans-EM clustering for automatic detection and segmentation of moving objects in video. 1-2 - Sultan Aljahdali, Alaa F. Sheta
, Narayan C. Debnath:
Estimating software effort and function point using regression, Support Vector Machine and Artificial Neural Networks models. 1-8 - Seungwoo Jeon, Bonghee Hong, Hyeongsoon Im:
Analysis of the effect of weather determinants on lodging demands using big data processing. 1-8 - Imen Ouled Dlala, Saïd Jabbour, Lakhdar Sais, Yakoub Salhi
, Boutheina Ben Yaghlane:
Parallel SAT based closed frequent itemsets enumeration. 1-8 - Landry T. Yelome, Samuel Ouya
, Samba Ndiaye, Sidi Mohamed Farssi:
Contribution to SMS management over 4G network in distance education context. 1-6 - Rihab Bouchlaghem, Aymen Elkhelifi, Rim Faiz:
SVM based approach for opinion classification in Arabic written tweets. 1-4 - Imen Tounsi, Mohamed Hadj Kacem, Ahmed Hadj Kacem, Khalil Drira:
A formal approach for SOA design patterns composition. 1-8 - Ilyes Rebai
, Yassine Ben Ayed, Walid Mahdi
:
Deep architecture using Multi-Kernel Learning and multi-classifier methods. 1-6 - Sara Hbali, Mohammed Sadgal
, Abdelaziz El Fazziki
:
Using invariant feature descriptors for an efficient image retrieval. 1-4 - Mustapha Hemis
, Bachir Boudraa
, Thouraya Merazi-Meksen:
Bat inspired optimization approach for audio watermarking algorithm. 1-7 - Amine Boulemtafes
, Abderrezak Rachedi
, Nadjib Badache:
A study of mobility support in wearable health monitoring systems: Design framework. 1-8 - Mounira Belmabrouk, Mounir Marrakchi:
Optimal parallel scheduling for resolution a triangular system with availability constraints. 1-7 - Abdessamad Malaoui:
Low cost pedagogic device for practical works using embedded system. 1-8 - Márcio A. Macêdo, Daniel A. S. Carvalho, Martin A. Musicante
, Alberto Pardo, Umberto Souza da Costa:
An abstract machine for integrating heterogeneous web applications. 1-8 - Abdelhamid Benaini, Achraf Berrajaa
, El Mostafa Daoudi:
GPU implementation of the multi depot Vehicle Routing Problem. 1-7 - Iman Ben Abdelkrim, Amine Baïna, Mostafa Bellafkih
:
Coalition-based access control models for critical infrastructures. 1-6 - Issa Qabajeh
, Francisco Chiclana
, Fadi A. Thabtah:
A classification rules mining method based on dynamic rules' frequency. 1-7 - Anass El Aouni
, Khalid Minaoui
, Ayoub Tamim, Khalid Daoudi, Hussein M. Yahia, Abderrahman Atillah, Driss Aboutajdine:
Detection of Moroccan coastal upwelling using sea surface chlorophyll concentration. 1-4 - Hanen Abbes
, Soumaya Boukettaya
, Faïez Gargouri
:
Learning ontology from Big Data through MongoDB database. 1-7 - Mouna Ktari, Mohamed Amine Haddar, Ahmed Hadj Kacem, Mohamed Mosbah
:
Proving distributed algorithms for mobile agents: Examples of spanning tree computation in dynamic networks. 1-7 - Mohamed Ben Aouicha
, Mohamed Ali Hadj Taieb
:
G2WS: Gloss-based WordNet and Wiktionary semantic Similarity measure. 1-7 - Mustapha Boushaba, Abdelhakim Hafid, Abdelilah Maach, Driss El Ghanami:
SGRL-Selective Gateway and Reinforcement Learning-based routing for WMN. 1-8 - Sanae El Mimouni
, Mohamed Bouhdadi:
Formal modeling of the Simple Text Oriented Messaging Protocol using Event-B method. 1-4 - Jeongmin Kim, Kwang Ryel Ryu:
Mining traffic accident data by subgroup discovery using combinatorial targets. 1-6 - Mouhamadou Gaye, Mamadou Bousso, Ousmane Sall
, Moussa Lo:
Measuring inconsistency ontological changes based on communities in ontology. 1-4 - Nesma M. Zaki, Ahmed Awad
, Ehab Ezat:
Extracting accurate performance indicators from execution logs using process models. 1-8 - Raihana Mokhlissi
, Dounia Lotfi
, Mohamed El Marraki:
Spanning tree based method for a social network analysis. 1-8 - Marcelo Figueiredo Terenciani, Geraldo Barbosa Landre, Débora Maria Barroso Paiva
, Maria Istela Cagnin:
A plug-in for Eclipse towards supporting business process lines documentation. 1-8 - Riad Boussetoua, Hammadi Bennoui, Allaoua Chaoui
, Khaled Khalfaoui
, Elhillali Kerkouche:
An automatic approach to transform BPMN models to Pi-Calculus. 1-8 - Donia Khemakhem Krid, Naouel Ben Salem Grati, Riadh Robbana:
A new model for Online Social Networks case of Facebook. 1-6 - Cleverson Ledur, Dalvan Griebler
, Isabel Harb Manssour, Luiz Gustavo Fernandes
:
Towards a Domain-Specific Language for geospatial data visualization maps with Big Data sets. 1-8 - Matyas Jani:
Fast content independent playlist generation for streaming media. 1-6 - Omar Elharrouss
, Driss Moujahid, Soukaina Elidrissi Elkaitouni, Hamid Tairi
:
Moving objects detection based on thresholding operations for video surveillance systems. 1-5 - Hend Fourati, Hanen Idoudi, Thierry Val, Adrien van den Bossche, Leïla Azouz Saïdane:
Performance evaluation of IEEE 802.15.6 CSMA/CA-based CANet WBAN. 1-7 - Hicham G. Elmongui, Hader Morsy, Riham Mansour:
Inference models for Twitter user's home location prediction. 1-8 - Khalloufi Issam, El Beqqali Omar:
Real-time Data Prefetching in Mobile Computing. 1-2 - S. Hellam, Y. Oulahrir, F. El Mounchid, Abdelalim Sadiq, S. Mbarki:
An efficient method for Objects indexing in three dimensions. 1-8 - Faizan Ur Rehman
, Ahmed Lbath, Bilal Sadiq, Md. Abdur Rahman
, Abdullah Murad, Imad Afyouni, Akhlaq Ahmad, Saleh M. Basalamah
:
A constraint-aware optimized path recommender in a crowdsourced environment. 1-8 - Mohamed Moussaoui
, Montaceur Zaghdoud, Jalel Akaichi
:
A survey of uncertainty handling in frequent subgraph mining algorithms. 1-8 - Bilal Al Baalbaki, Jesus Pacheco
, Cihan Tunc
, Salim Hariri, Youssif B. Al-Nashif:
Anomaly Behavior Analysis System for ZigBee in smart buildings. 1-4 - Atef Nouri, Wided Lejouad Chaari
, Khaled Ghédira:
RPI.Idiom: A high-level language for first-class agent interaction protocols. 1-8 - Hanin B. Abubaker, Khaled Salah
, Hassan Al-Muhairi, Ahmed Bentiba:
Cloud-based Arabic reCAPTCHA service: Design and architecture. 1-6 - Mouna Rekik, Khouloud Boukadi
, Hanêne Ben-Abdallah
:
Business process outsourcing to the Cloud: What activity to outsource? 1-7 - Faten Fakhfakh, Mohamed Tounsi
, Ahmed Hadj Kacem, Mohamed Mosbah
:
A formal pattern for dynamic networks through evolving graphs. 1-4 - Nouha Dammak, Yassine Benayed:
Indexing and classifiying video genres using Support Vector Machines. 1-5 - Frédéric Lehmann, Dina Chaal, Abdelouahid Lyhyaoui:
Proposition of a Bayesian model for the propagation of the information in a wireless sensor network. 1-8 - Lamia Berkani:
SSCF: A semantic and social-based collaborative filtering approach. 1-4 - Kaoutar Farnane
, Khalid Minaoui
, Awatif Rouijel, Driss Aboutajdine:
Analysis of the ambiguity function for phase-coded waveforms. 1-4 - Kholoud Alsmearat, Mohammed A. Shehab
, Mahmoud Al-Ayyoub, Riyad Al-Shalabi
, Ghassan Kanaan
:
Emotion analysis of Arabic articles and its impact on identifying the author's gender. 1-6 - Noureddine Chabini, Said Belkouch:
Area and delay aware approaches for realizing multi-operand addition on FPGAs using two-operand adders. 1-4 - Berardino Carnevale, Francesco Falaschi, Diego Pacini, Gianluca Dini, Luca Fanucci
:
A hardware accelerator for the IEEE 802.1X-2010 key hierarchy in automotive applications. 1-6 - Fatima-Zahra Berriche, Besma Zeddini
, Hubert Kadima, Alain Rivière:
Combining Case-Based Reasoning and Process Mining to improve collaborative decision-making in products design. 1-7 - Samir Anter
, Ahmed Zellou
, Ali Idri:
Nk-schemas. 1-6 - Youssef Bourass, Hamid Zouaki, Abdelkhalak Bahri:
New learning approach for computer-aided diagnostic. 1-9 - Yassine Banouar, Saad Reddad, Codé Diop, Christophe Chassot, Abdellah Zyane:
Monitoring solution for autonomic Middleware-level QoS management within IoT systems. 1-8 - C. Laissaoui, Noureddine Idboufker, Raja Elassali, K. El Baamrani:
A measurement of the response times of various OpenFlow/SDN controllers with CBench. 1-2 - Hafed Zarzour
, Lamia Berrezzek, Hafida Ghomrani, Tarek Abid, Mokhtar Sellami:
Consistency awareness in a distributed collaborative system for semantic stores. 1-8 - Imane Taghablout, Fadoua Ataa-Allah
, Mohamed El Marraki:
Amazigh verb in the Universal Networking Language. 1-4 - Paulo Afonso Parreira, Rosângela Aparecida Dellosso Penteado:
Domain ontologies in the context of Requirements Engineering. 1-8 - Imane Hilal
, Nadia Afifi
, Mohamed Ouzzif, Hicham Belhaddaoui:
Considering dependability requirements in the context of Decision Support Systems. 1-8 - Emna Ben Mohamed
, Hela Ltifi, Mounir Ben Ayed:
Using Bloom's taxonomy to enhance interactive concentric circles representation. 1-8 - Abderrahmen Guermazi, Abdelfettah Belghith
, Mohamed Abid:
Multi-hop routing for distributed clustering protocols in wide wireless sensor networks. 1-6 - Lamiae Dounas, Raúl Mazo, Camille Salinesi, Omar El Beqqali
:
Continuous monitoring of adaptive e-learning systems requirements. 1-8 - Jihane Lakhrouit, Karim Baïna
:
Evaluating enterprise architecture complexity using fuzzy AHP approach: Application to university information system. 1-7 - Boutaina Satouri, C. Bekkali, Khalid Satori
, Abdellatif El Abderrahmani, Hamid Tairi
:
Affine Reconstruction based on the Projective Reconstruction and Homography at Infinity. 1-8 - Bouchra El Idrissi
, Salah Baïna, Karim Baïna
:
Bringing flexibility to ontology learning from relational databases. 1-8 - Youssef Ait Khouya, Faouzi Ghorbel
, Noureddine Alaa:
Brachiopods classification based on fusion of global and local complete and stable descriptors. 1-6 - Sara Ahajjam, Mohamed El Haddad, Hassan Badir
:
LeadersRank: Towards a new approach for community detection in social networks. 1-8 - Bassim Chabibi, Adil Anwar, Mahmoud Nassar
:
Towards an alignment of SysML and simulation tools. 1-6 - Samia Benabdellah Chaouni, Mounia Fredj, Salma Mouline
:
A Rules-based system for model composition. 1-8 - Asmaa Elkandoussi
, Hanan El Bakkali, Narimane Elhilali
:
Toward resolving access control policy conflict in inter-organizational workflows. 1-4 - Imen Bouaziz Mezghanni, Faïez Gargouri
:
Towards an Arabic legal ontology based on documents properties extraction. 1-8 - Abderrazak Iazzi
, Rachid Oulad Haj Thami, Mohammed Rziza
:
A novel approach to improve background subtraction method for fall detection system. 1-2 - Mostafa El Mallahi
, Abderrahim Mesbah, Hassan Qjidaa
, Aissam Berrahou
, Khalid Zenkouar, Hakim el Fadili
:
Volumetric image reconstruction by 3D Hahn moments. 1-8 - Samuel Ouya
, Ahmath Bamba Mbacke
, Gervais Mendy
, Pape Waly Diouf, Kalidou Sy:
Social network integration to e-learning environment. 1-4 - Tarik Fissaa
, Hatim Guermah, Hatim Hafiddi, Mahmoud Nassar
:
Towards a semantic approach for discovering context aware services. 1-4 - Amal Zouhri
, Ismail Boumhidi
:
Decentralized H∞ control of interconnected systems with time-delays. 1-6 - Asmae Benali, Bouchra El Asri, Houda Kriouile:
Cloud environment assignment: A context-aware and Dynamic Software Product Lines-based approach. 1-8 - Amira Boukhdhir, Oussama Lachiheb, Mohamed Salah Gouider:
An improved mapReduce design of kmeans for clustering very large datasets. 1-6 - El Mostafa Daoudi, Abdelmajid Dargham, Aicha Kerfali, Mohammed Khatiri:
Reducing the inter processor migrations of the DP-WRAP scheduling. 1-6 - Riadh Belkebir
, Ahmed Guessoum
:
TALAA-ASC: A sentence compression corpus for Arabic. 1-8 - Fatima Zohra Ennaji
, Abdelaziz El Fazziki
, Mohammed Sadgal
, Djamal Benslimane:
Social intelligence framework: Extracting and analyzing opinions for social CRM. 1-7 - Nabil Baklouti, Bilel Gargouri
, Mohamed Jmaiel:
Towards patterns-based Linguistic Web Service composition. 1-6 - El-Tigani B. Abdelsatir
, Narayan C. Debnath, Hisham Abushama:
A multilayered scheme for transparent audio data hiding. 1-6 - Hind Saddiki, Karim Bouzoubaa, Violetta Cavalli-Sforza:
Text readability for Arabic as a foreign language. 1-8 - Sara Najam, Hajar Mousannif
, Mohamed Ouzzif:
Building a structured collaboration system from XML specification. 1-8 - Bushra AlBelooshi, Khaled Salah
, Thomas Martin
, Ernesto Damiani
:
Inspection and deconfliction of published virtual machine templates' remnant data for improved assurance in public Clouds. 1-4 - Oumayma Banouar, Said Raghay:
Comparative study of the systems of semantic integration of information: A survey. 1-8 - Saoussen Rekhis, Nadia Bouassida:
Domain-specific design pattern instanciation. 1-6 - Kheireddine Abainia, Siham Ouamour
, Halim Sayoud
:
Neural Text Categorizer for topic identification of noisy Arabic Texts. 1-8 - Rachid Ait Daoud
, Abdellah Amine, Belaid Bouikhalene, Rachid Lbibb:
Combining RFM model and clustering techniques for customer value analysis of a company selling online. 1-6 - Marwa Amara
, Khaled Ghédira, Kamel Zidi
, Salah Zidi:
A comparative study of multi-class support vector machine methods for Arabic characters recognition. 1-6 - Hasna Elkhannoubi, Mustapha Belaïssaoui
:
Fundamental pillars for an effective cybersecurity strategy. 1-2 - Adil Maarouf, Bouchra El Qacimy, Abderrahim Marzouk, Abdelkrim Haqiq
:
A novel penalty model for managing and applying penalties in Cloud Computing. 1-6 - Mohamed Moussaoui
, Montaceur Zaghdoud, Jalel Akaichi
:
Structural-semantic approach for approximate frequent subgraph mining. 1-8 - Yassine Bounagui, Hatim Hafiddi, Abdellatif Mezrioui:
Requirements definition for a holistic approach of cloud computing governance. 1-8 - Rihab Maaloul
, Lamia Chaari
, Bernard Cousin:
Energy-aware forwarding strategy for Metro Ethernet networks. 1-7 - Rachid Selt, Yacine Challal
, Nadjia Benblidia:
Internet of things context-aware privacy architecture. 1-2 - Hassan El Alami
, Abdellah Najid
:
CFFL: Cluster formation using fuzzy logic for wireless sensor networks. 1-6 - Fatima Kabli, Reda Mohamed Hamou, Abdelmalek Amine
:
Towards a molecules production from DNA sequences based on clustering by 3D cellular automata approach and n-grams technique. 1-7 - Essma Selab, Ahmed Guessoum
:
A statistical approach for the induction of a grammar of Arabic. 1-8 - Mohamed Mahmoud El Benany
, Omar El Beqqali
:
SOA based e-government interoperability. 1-2 - Narayan C. Debnath, Mario Peralta, Carlos Salgado, Lorena Baigorria, German Montejano, Daniel Riesco:
Metrics and performance indicators to evaluate workflow processes on the cloud. 1-6 - Mohamed Nabil
, Abdelmajid Hajami, Abdelkrim Haqiq
:
Improvement of route lifetime of LAR protocol for VANET in highway scenario. 1-8 - Nabil Alami
, Mohammed Meknassi, Saïd El Alaoui Ouatik
, Noureddine Ennahnahi
:
Arabic text summarization based on graph theory. 1-8 - Ali Sahnoun, Ramdane Maamri:
Petri net modeling dynamic context of container for risk management. 1-8 - Rodrigo da Rosa Righi, Roberto de Quadros Gomes, Vinicius Facco Rodrigues
, Cristiano André da Costa
, Antônio Marcos Alberti
:
MigBSP++: Improving process rescheduling on Bulk-Synchronous Parallel applications. 1-8 - Abdeljebar Mansour
, Mohamed Sadik
, Essaid Sabir
:
Multi-factor authentication based on multimodal biometrics (MFA-MB) for Cloud Computing. 1-4 - Youness Chawki
, Khalid El Asnaoui
, Mohammed Ouanan, Brahim Aksasse
:
CBIR using the 2-D ESPRIT method: Application to Coil_100 database. 1-8 - Aimad Hakkoum, Said Raghay:
Advanced search in the Qur'an using semantic modeling. 1-4 - Takeru Kuroiwa, Noriyuki Kushiro:
Testing environment for embedded software product lines. 1-7 - Son N. Han, Quyet H. Cao, Bahram Alinia, Noël Crespi:
Design, implementation, and evaluation of 6LoWPAN for home and building automation in the Internet of Things. 1-8 - Ola Salman, Imad H. Elhajj
, Ayman I. Kayssi, Ali Chehab
:
An architecture for the Internet of Things with decentralized data and centralized control. 1-8 - Hajer Boujezza, Modher Al-mufti
, Hella Kaffel Ben Ayed, Leïla Azouz Saïdane:
A taxonomy of identities management systems in IOT. 1-8 - Khadijah S. Bahwaireth, Lo'ai Tawalbeh
, Anas Basalamah, Yaser Jararweh
, Mohammad Tawalbeh:
Efficient techniques for energy optimization in Mobile Cloud Computing. 1-8 - Umut Kizgindere, Süleyman Eken, Ahmet Sayar
:
MapReduce based scalable range query architecture for big spatial data. 1-4 - Yaser Jararweh
, Ala Darabseh, Mahmoud Al-Ayyoub, Abdelkader Bousselham, Elhadj Benkhelifa
:
Software Defined based smart grid architecture. 1-7 - Bacem Mbarek
, Aref Meddeb
, Wafa Ben Jaballah, Mohamed Mosbah
:
A secure authentication mechanism for resource constrained devices. 1-7 - Marwan Alakhras
, Mourad Oussalah, Mousa I. Hussein
:
ANFIS: General description for modeling dynamic objects. 1-8 - Mostefai Abdelkader
, Ricardo Pérez-Castillo, Malki Mimoun
:
Using text mining to locate concepts in execution traces. 1-6 - Carlos Eduardo Monteiro, Luis Carlos Trevelin:
Studies of computing techniques for performing face recognition with a focus in the crowds: A distributed architecture based on cloud computing. 1-5 - Abd El-Hameed G. El-Barbary, Layla A. A. El-Sayed, Hussein H. Aly, Mohamed Nazih ElDerini:
A cloudlet architecture using mobile devices. 1-8 - Mohamed Musallam Khasib Al Rawahi, Smitha Sunil Kumaran Nair:
Detecting skimming devices in ATM through image processing. 1-5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.