


default search action
12th AICCSA 2015: Marrakech, Morocco
- 12th IEEE/ACS International Conference of Computer Systems and Applications, AICCSA 2015, Marrakech, Morocco, November 17-20, 2015. IEEE Computer Society 2015, ISBN 978-1-5090-0478-2

- Mohamed A. Nassar, Layla A. A. El-Sayed:

Efficient interleaved modular multiplication based on sign detection. 1-5 - Milton S. S. Junior, Nelson S. Rosa

, Fernando Antônio Aires Lins:
xLONGWisE: An environment to support the execution of Long Running Workflows. 1-8 - Aafaf Ouaddah, Hajar Mousannif

, Abdellah Ait Ouahman:
Access control models in IoT: The road ahead. 1-2 - Meryem Boufim, Hafid Barka:

Building holistic social media strategy refering to social intelligence and digital maturity. 1-8 - Ali Ahmed

, Saadat M. Alhashmi
:
A metric for Literature-Based Discovery methodology evaluation. 1-5 - Salam Ismail Rasheed Khanji, Asad Masood Khattak, Hakim Hacid:

Database auditing and forensics: Exploration and evaluation. 1-6 - Mohamed Hachem Kermani

, Zizette Boufaïda:
A modeling of a multi-agent system for the protein synthesis. 1-7 - Messaouda Fareh

, Hadjer Guellati, Chaima Elfarrouji:
Refinement and reuse of ontologies semantic mapping. 1-4 - Chaima Bejaoui

, Alexandre Guitton, Abdennaceur Kachouri:
Improved election of cluster heads in LEACH. 1-4 - Jameela Al Otaibi, Samir Elloumi, Ali Jaoua

, Abdelaali Hassaïne:
Using conceptual reasoning for inconsistencies detection in Islamic advisory opinion (Fatwas). 1-5 - Imane Bouij-Pasquier, Abdellah Ait Ouahman, Anas Abou El Kalam

, Mina Ouabiba de Montfort:
SmartOrBAC security and privacy in the Internet of Things. 1-8 - Mohamed El Yafrani

, Belaïd Ahiod:
Cosolver2B: An efficient local search heuristic for the Travelling Thief Problem. 1-5 - Aura Conci

, Andre Luiz Brazil, Simone Bacellar Leal Ferreira, Trueman MacHenry:
AES cryptography in color image steganography by genetic algorithms. 1-8 - Fatma Ben Taher, Nader Ben Amor

, Mohamed Jallouli:
An extended Eye Movement Tracker system for an electric wheelchair movement control. 1-7 - Mohammad Alomari, Alan D. Fekete:

Serializable use of Read Committed isolation level. 1-8 - Parameth Voraseyanont, Mathupayas Thongmak

:
The influence of 4Ps and system quality on perceived quality after mobile instant messaging usage. 1-4 - Roqyiah M. Abdeen, Ahmed Afifi, Ashraf B. Elsisi:

Improved Arabic handwriting word segmentation approach using Random Forests. 1-8 - Amira Jouirou

, Abir Baâzaoui, Walid Barhoumi
, Ezzeddine Zagrouba
:
Curvelet-based locality sensitive hashing for mammogram retrieval in large-scale datasets. 1-8 - Afafe Annich

, Abdellatif El Abderrahmani, Khalid Satori
:
Freehand sketch based 3D reconstruction using constraints. 1-2 - Aouatef Rouahi, Kais Ben Salah, Khaled Ghédira:

Belief Constraint Satisfaction Problems. 1-4 - Jihen Maâzoun, Nadia Bouassida, Hanêne Ben-Abdallah

:
SPL-UML: Software product lines design language. 1-4 - Aymen Ghilen

, Mostafa Azizi, Ridha Bouallegue
:
Integration of a quantum protocol for mutual authentication and secret key distribution within 802.11i standard. 1-7 - Hisham A. Kholidy, Abdelkarim Erradi:

A cost-aware model for risk mitigation in Cloud computing systems. 1-7 - Imen Gaied, Farah Jemili

, Ouajdi Korbaa
:
Intrusion detection based on Neuro-Fuzzy classification. 1-8 - Maged Fakirah

, Mohammed A. Shehab
, Yaser Jararweh
, Mahmoud Al-Ayyoub:
Accelerating Needleman-Wunsch global alignment algorithm with GPUs. 1-5 - Aladine Chetouani:

A Reduced Reference Image Quality assessment for Multiply Distorted Images. 1-4 - Sofiane Boukelkoul

, Ramdane Maamri:
Optimal model transformation of BPMN to DEVS. 1-8 - Said Talbi, Lotfi Zaouche:

Enhanced Unequal Clustering Algorithm for Wireless Sensor Networks. 1-4 - Aimad Karkouch

, Hassan Al Moatassime, Hajar Mousannif
, Thomas Noël:
Data quality enhancement in Internet of Things environment. 1-8 - Taha Ait Tchakoucht, Mostafa Ezziyyani

, Mohammed Jbilou, Mikaël Salaün:
Behavioral appraoch for intrusion detection. 1-5 - Rachid Lamrani

, El Hassan Abdelwahed
:
Learning through play in pervasive context: A survey. 1-8 - Farah Aït-Salaht

, Hind Castel:
Bounding aggregations on bulk arrivals for performance analysis of clouds. 1-8 - Mounir Lahlou Kassi, Abdelaziz Berrado

, Loubna Benabbou, K. Benabdelkader:
Towards a new framework for clustering in a mixed data space: Case of gasoline service stations segmentation in Morocco. 1-6 - Monia Ben Brahim, Tarak Chaari, Mohamed Jmaiel:

XPath translation to enhance the semantic matching of fine-grained Web service security policies. 1-8 - Mohamed Hamidi, Mohamed El Haziti, Hocine Cherifi

, Driss Aboutajdine:
A blind robust image watermarking approach exploiting the DFT magnitude. 1-6 - Aymen Ghilen

, Mostafa Azizi, Ridha Bouallegue
:
Integration of a quantum authenticated key distribution scheme in the EAP-TLS protocol. 1-5 - Malek Jebabli, Hocine Cherifi

, Chantal Cherifi
, Atef Hamouda:
User and group networks on YouTube: A comparative analysis. 1-8 - Sanaa Kaddoura

:
Information matrix: Fighting back using a matrix. 1-6 - Hicham Gueddah

, Abdellah Yousfi
, Mostafa Belkasmi
:
The filtered combination of the weighted edit distance and the Jaro-Winkler distance to improve spellchecking Arabic texts. 1-6 - Aymen Ghilen

, Mostafa Azizi, Ridha Bouallegue
:
Integration and formal security analysis of a quantum key distribution scheme within CHAP protocol. 1-7 - Fábio Leal, Martin A. Musicante

:
Using SLA to guide database transition to NoSQL on the cloud: A systematic mapping study. 1-8 - Iman M. A. Helal

, Ahmed Awad
, Ali El Bastawissi:
Runtime deduction of case ID for unlabeled business process execution events. 1-8 - Bouchra El Idrissi

, Salah Baïna, Karim Baïna
:
Supporting collaborative work on ontology learning from Relational Databases. 1-6 - Ayoub Karine, Noureddine Lasmar, Alexandre Baussard, Mohammed El Hassouni:

Sonar image segmentation based on statistical modeling of wavelet subbands. 1-5 - Hamdi Ellouzi, Hela Ltifi, Mounir Ben Ayed:

New Multi-Agent architecture of visual Intelligent Decision Support Systems application in the medical field. 1-8 - Saliha Mallem, Amina Zemmache, Chafia Yahiaoui:

A new Authentication and Key Agreement protocol for SIP in IMS. 1-7 - Youssef Azdoud, Aouatif Amine

, Nawal Alioua, Mohammed Rziza
:
Pre collision detection system for pedestrian safety based on HOL. 1-2 - Rania Chakroun, Leila Beltaïfa Zouari, Mondher Frikha

, Ahmed Ben Hamida:
A novel approach based on Support Vector Machines for automatic speaker identification. 1-5 - Hanen Chihi, Walid Chainbi

, Khaled Ghédira:
Cloud computing architecture and migration strategy for universities and higher education. 1-8 - Malek Ben Salem

, Emna Bouazizi
, Rafik Bouaziz
:
Multi-versions data and epsilon-serializability for QoS enhancement in distributed RTDBMS. 1-6 - Mhamed Sayyouri

, Abdeslam Hmimid, Hicham Karmouni
, Hassan Qjidaa
, Abdellah Rezzouk
:
Image classification using separable invariant moments of Krawtchouk-Tchebichef. 1-6 - Ismail El Bazi, Nabil Laachfoubi:

A comparative study of Named Entity Recognition for Arabic using ensemble learning approaches. 1-6 - Haifa Harrouch, Mourad Kaddes, Majed Abdouli

, Rafik Bouaziz
, Claude Duvallet:
DASH-DMS: To improve streaming video over HTTP. 1-8 - Rima Grati, Khouloud Boukadi

, Hanêne Ben-Abdallah
:
Overview of IaaS monitoring tools. 1-7 - Érick Oliveira Rodrigues

, José Viterbo
, Aura Conci
, Trueman MacHenry:
A context-aware middleware for medical image based reports. 1-4 - Hiba Ramadan

, Hamid Tairi
:
Collaborative Xmeans-EM clustering for automatic detection and segmentation of moving objects in video. 1-2 - Sultan Aljahdali, Alaa F. Sheta

, Narayan C. Debnath:
Estimating software effort and function point using regression, Support Vector Machine and Artificial Neural Networks models. 1-8 - Seungwoo Jeon, Bonghee Hong, Hyeongsoon Im:

Analysis of the effect of weather determinants on lodging demands using big data processing. 1-8 - Imen Ouled Dlala, Saïd Jabbour, Lakhdar Sais, Yakoub Salhi

, Boutheina Ben Yaghlane:
Parallel SAT based closed frequent itemsets enumeration. 1-8 - Landry T. Yelome, Samuel Ouya

, Samba Ndiaye, Sidi Mohamed Farssi:
Contribution to SMS management over 4G network in distance education context. 1-6 - Rihab Bouchlaghem, Aymen Elkhelifi, Rim Faiz:

SVM based approach for opinion classification in Arabic written tweets. 1-4 - Imen Tounsi, Mohamed Hadj Kacem, Ahmed Hadj Kacem, Khalil Drira:

A formal approach for SOA design patterns composition. 1-8 - Ilyes Rebai

, Yassine Ben Ayed, Walid Mahdi
:
Deep architecture using Multi-Kernel Learning and multi-classifier methods. 1-6 - Sara Hbali, Mohammed Sadgal

, Abdelaziz El Fazziki
:
Using invariant feature descriptors for an efficient image retrieval. 1-4 - Mustapha Hemis

, Bachir Boudraa
, Thouraya Merazi-Meksen:
Bat inspired optimization approach for audio watermarking algorithm. 1-7 - Amine Boulemtafes

, Abderrezak Rachedi
, Nadjib Badache:
A study of mobility support in wearable health monitoring systems: Design framework. 1-8 - Mounira Belmabrouk, Mounir Marrakchi:

Optimal parallel scheduling for resolution a triangular system with availability constraints. 1-7 - Abdessamad Malaoui:

Low cost pedagogic device for practical works using embedded system. 1-8 - Márcio A. Macêdo, Daniel A. S. Carvalho, Martin A. Musicante

, Alberto Pardo, Umberto Souza da Costa:
An abstract machine for integrating heterogeneous web applications. 1-8 - Abdelhamid Benaini, Achraf Berrajaa

, El Mostafa Daoudi:
GPU implementation of the multi depot Vehicle Routing Problem. 1-7 - Iman Ben Abdelkrim, Amine Baïna, Mostafa Bellafkih

:
Coalition-based access control models for critical infrastructures. 1-6 - Issa Qabajeh

, Francisco Chiclana
, Fadi A. Thabtah:
A classification rules mining method based on dynamic rules' frequency. 1-7 - Anass El Aouni

, Khalid Minaoui
, Ayoub Tamim, Khalid Daoudi, Hussein M. Yahia, Abderrahman Atillah, Driss Aboutajdine:
Detection of Moroccan coastal upwelling using sea surface chlorophyll concentration. 1-4 - Hanen Abbes

, Soumaya Boukettaya
, Faïez Gargouri
:
Learning ontology from Big Data through MongoDB database. 1-7 - Mouna Ktari

, Mohamed Amine Haddar, Ahmed Hadj Kacem, Mohamed Mosbah
:
Proving distributed algorithms for mobile agents: Examples of spanning tree computation in dynamic networks. 1-7 - Mohamed Ben Aouicha

, Mohamed Ali Hadj Taieb
:
G2WS: Gloss-based WordNet and Wiktionary semantic Similarity measure. 1-7 - Mustapha Boushaba, Abdelhakim Hafid, Abdelilah Maach, Driss El Ghanami:

SGRL-Selective Gateway and Reinforcement Learning-based routing for WMN. 1-8 - Sanae El Mimouni

, Mohamed Bouhdadi:
Formal modeling of the Simple Text Oriented Messaging Protocol using Event-B method. 1-4 - Jeongmin Kim, Kwang Ryel Ryu:

Mining traffic accident data by subgroup discovery using combinatorial targets. 1-6 - Mouhamadou Gaye, Mamadou Bousso, Ousmane Sall

, Moussa Lo:
Measuring inconsistency ontological changes based on communities in ontology. 1-4 - Nesma M. Zaki, Ahmed Awad

, Ehab Ezat:
Extracting accurate performance indicators from execution logs using process models. 1-8 - Raihana Mokhlissi

, Dounia Lotfi
, Mohamed El Marraki:
Spanning tree based method for a social network analysis. 1-8 - Marcelo Figueiredo Terenciani, Geraldo Barbosa Landre, Débora Maria Barroso Paiva

, Maria Istela Cagnin:
A plug-in for Eclipse towards supporting business process lines documentation. 1-8 - Riad Boussetoua, Hammadi Bennoui, Allaoua Chaoui

, Khaled Khalfaoui
, Elhillali Kerkouche:
An automatic approach to transform BPMN models to Pi-Calculus. 1-8 - Donia Khemakhem Krid, Naouel Ben Salem Grati, Riadh Robbana:

A new model for Online Social Networks case of Facebook. 1-6 - Cleverson Ledur, Dalvan Griebler

, Isabel Harb Manssour, Luiz Gustavo Fernandes
:
Towards a Domain-Specific Language for geospatial data visualization maps with Big Data sets. 1-8 - Matyas Jani:

Fast content independent playlist generation for streaming media. 1-6 - Omar Elharrouss

, Driss Moujahid, Soukaina Elidrissi Elkaitouni, Hamid Tairi
:
Moving objects detection based on thresholding operations for video surveillance systems. 1-5 - Hend Fourati, Hanen Idoudi, Thierry Val, Adrien van den Bossche, Leïla Azouz Saïdane:

Performance evaluation of IEEE 802.15.6 CSMA/CA-based CANet WBAN. 1-7 - Hicham G. Elmongui, Hader Morsy, Riham Mansour:

Inference models for Twitter user's home location prediction. 1-8 - Khalloufi Issam, El Beqqali Omar:

Real-time Data Prefetching in Mobile Computing. 1-2 - S. Hellam, Y. Oulahrir, F. El Mounchid, Abdelalim Sadiq, S. Mbarki:

An efficient method for Objects indexing in three dimensions. 1-8 - Faizan Ur Rehman

, Ahmed Lbath, Bilal Sadiq, Md. Abdur Rahman
, Abdullah Murad, Imad Afyouni, Akhlaq Ahmad, Saleh M. Basalamah
:
A constraint-aware optimized path recommender in a crowdsourced environment. 1-8 - Mohamed Moussaoui

, Montaceur Zaghdoud, Jalel Akaichi
:
A survey of uncertainty handling in frequent subgraph mining algorithms. 1-8 - Bilal Al Baalbaki, Jesus Pacheco

, Cihan Tunc
, Salim Hariri, Youssif B. Al-Nashif:
Anomaly Behavior Analysis System for ZigBee in smart buildings. 1-4 - Atef Nouri, Wided Lejouad Chaari

, Khaled Ghédira:
RPI.Idiom: A high-level language for first-class agent interaction protocols. 1-8 - Hanin B. Abubaker, Khaled Salah

, Hassan Al-Muhairi, Ahmed Bentiba:
Cloud-based Arabic reCAPTCHA service: Design and architecture. 1-6 - Mouna Rekik

, Khouloud Boukadi
, Hanêne Ben-Abdallah
:
Business process outsourcing to the Cloud: What activity to outsource? 1-7 - Faten Fakhfakh, Mohamed Tounsi

, Ahmed Hadj Kacem, Mohamed Mosbah
:
A formal pattern for dynamic networks through evolving graphs. 1-4 - Nouha Dammak, Yassine Benayed:

Indexing and classifiying video genres using Support Vector Machines. 1-5 - Frédéric Lehmann, Dina Chaal, Abdelouahid Lyhyaoui:

Proposition of a Bayesian model for the propagation of the information in a wireless sensor network. 1-8 - Lamia Berkani:

SSCF: A semantic and social-based collaborative filtering approach. 1-4 - Kaoutar Farnane

, Khalid Minaoui
, Awatif Rouijel, Driss Aboutajdine:
Analysis of the ambiguity function for phase-coded waveforms. 1-4 - Kholoud Alsmearat, Mohammed A. Shehab

, Mahmoud Al-Ayyoub, Riyad Al-Shalabi
, Ghassan Kanaan
:
Emotion analysis of Arabic articles and its impact on identifying the author's gender. 1-6 - Noureddine Chabini, Said Belkouch:

Area and delay aware approaches for realizing multi-operand addition on FPGAs using two-operand adders. 1-4 - Berardino Carnevale, Francesco Falaschi, Diego Pacini, Gianluca Dini, Luca Fanucci

:
A hardware accelerator for the IEEE 802.1X-2010 key hierarchy in automotive applications. 1-6 - Fatima-Zahra Berriche, Besma Zeddini

, Hubert Kadima, Alain Rivière:
Combining Case-Based Reasoning and Process Mining to improve collaborative decision-making in products design. 1-7 - Samir Anter

, Ahmed Zellou
, Ali Idri:
Nk-schemas. 1-6 - Youssef Bourass, Hamid Zouaki, Abdelkhalak Bahri:

New learning approach for computer-aided diagnostic. 1-9 - Yassine Banouar, Saad Reddad, Codé Diop, Christophe Chassot, Abdellah Zyane:

Monitoring solution for autonomic Middleware-level QoS management within IoT systems. 1-8 - C. Laissaoui, Noureddine Idboufker, Raja Elassali, K. El Baamrani:

A measurement of the response times of various OpenFlow/SDN controllers with CBench. 1-2 - Hafed Zarzour

, Lamia Berrezzek, Hafida Ghomrani, Tarek Abid, Mokhtar Sellami:
Consistency awareness in a distributed collaborative system for semantic stores. 1-8 - Imane Taghablout, Fadoua Ataa-Allah

, Mohamed El Marraki:
Amazigh verb in the Universal Networking Language. 1-4 - Paulo Afonso Parreira, Rosângela Aparecida Dellosso Penteado:

Domain ontologies in the context of Requirements Engineering. 1-8 - Imane Hilal

, Nadia Afifi
, Mohamed Ouzzif, Hicham Belhaddaoui:
Considering dependability requirements in the context of Decision Support Systems. 1-8 - Emna Ben Mohamed

, Hela Ltifi, Mounir Ben Ayed:
Using Bloom's taxonomy to enhance interactive concentric circles representation. 1-8 - Abderrahmen Guermazi, Abdelfettah Belghith

, Mohamed Abid:
Multi-hop routing for distributed clustering protocols in wide wireless sensor networks. 1-6 - Lamiae Dounas, Raúl Mazo, Camille Salinesi, Omar El Beqqali

:
Continuous monitoring of adaptive e-learning systems requirements. 1-8 - Jihane Lakhrouit, Karim Baïna

:
Evaluating enterprise architecture complexity using fuzzy AHP approach: Application to university information system. 1-7 - Boutaina Satouri, C. Bekkali, Khalid Satori

, Abdellatif El Abderrahmani, Hamid Tairi
:
Affine Reconstruction based on the Projective Reconstruction and Homography at Infinity. 1-8 - Bouchra El Idrissi

, Salah Baïna, Karim Baïna
:
Bringing flexibility to ontology learning from relational databases. 1-8 - Youssef Ait Khouya, Faouzi Ghorbel

, Noureddine Alaa:
Brachiopods classification based on fusion of global and local complete and stable descriptors. 1-6 - Sara Ahajjam, Mohamed El Haddad, Hassan Badir

:
LeadersRank: Towards a new approach for community detection in social networks. 1-8 - Bassim Chabibi, Adil Anwar, Mahmoud Nassar

:
Towards an alignment of SysML and simulation tools. 1-6 - Samia Benabdellah Chaouni, Mounia Fredj, Salma Mouline

:
A Rules-based system for model composition. 1-8 - Asmaa Elkandoussi

, Hanan El Bakkali, Narimane Elhilali
:
Toward resolving access control policy conflict in inter-organizational workflows. 1-4 - Imen Bouaziz Mezghanni, Faïez Gargouri

:
Towards an Arabic legal ontology based on documents properties extraction. 1-8 - Abderrazak Iazzi

, Rachid Oulad Haj Thami, Mohammed Rziza
:
A novel approach to improve background subtraction method for fall detection system. 1-2 - Mostafa El Mallahi

, Abderrahim Mesbah, Hassan Qjidaa
, Aissam Berrahou
, Khalid Zenkouar, Hakim el Fadili
:
Volumetric image reconstruction by 3D Hahn moments. 1-8 - Samuel Ouya

, Ahmath Bamba Mbacke
, Gervais Mendy
, Pape Waly Diouf, Kalidou Sy:
Social network integration to e-learning environment. 1-4 - Tarik Fissaa

, Hatim Guermah, Hatim Hafiddi, Mahmoud Nassar
:
Towards a semantic approach for discovering context aware services. 1-4 - Amal Zouhri

, Ismail Boumhidi
:
Decentralized H∞ control of interconnected systems with time-delays. 1-6 - Asmae Benali, Bouchra El Asri, Houda Kriouile:

Cloud environment assignment: A context-aware and Dynamic Software Product Lines-based approach. 1-8 - Amira Boukhdhir, Oussama Lachiheb, Mohamed Salah Gouider:

An improved mapReduce design of kmeans for clustering very large datasets. 1-6 - El Mostafa Daoudi, Abdelmajid Dargham, Aicha Kerfali, Mohammed Khatiri:

Reducing the inter processor migrations of the DP-WRAP scheduling. 1-6 - Riadh Belkebir

, Ahmed Guessoum
:
TALAA-ASC: A sentence compression corpus for Arabic. 1-8 - Fatima Zohra Ennaji

, Abdelaziz El Fazziki
, Mohammed Sadgal
, Djamal Benslimane:
Social intelligence framework: Extracting and analyzing opinions for social CRM. 1-7 - Nabil Baklouti, Bilel Gargouri

, Mohamed Jmaiel:
Towards patterns-based Linguistic Web Service composition. 1-6 - El-Tigani B. Abdelsatir

, Narayan C. Debnath, Hisham Abushama:
A multilayered scheme for transparent audio data hiding. 1-6 - Hind Saddiki, Karim Bouzoubaa, Violetta Cavalli-Sforza:

Text readability for Arabic as a foreign language. 1-8 - Sara Najam, Hajar Mousannif

, Mohamed Ouzzif:
Building a structured collaboration system from XML specification. 1-8 - Bushra AlBelooshi, Khaled Salah

, Thomas Martin
, Ernesto Damiani
:
Inspection and deconfliction of published virtual machine templates' remnant data for improved assurance in public Clouds. 1-4 - Oumayma Banouar, Said Raghay:

Comparative study of the systems of semantic integration of information: A survey. 1-8 - Saoussen Rekhis, Nadia Bouassida:

Domain-specific design pattern instanciation. 1-6 - Kheireddine Abainia, Siham Ouamour

, Halim Sayoud
:
Neural Text Categorizer for topic identification of noisy Arabic Texts. 1-8 - Rachid Ait Daoud

, Abdellah Amine, Belaid Bouikhalene, Rachid Lbibb:
Combining RFM model and clustering techniques for customer value analysis of a company selling online. 1-6 - Marwa Amara

, Khaled Ghédira, Kamel Zidi
, Salah Zidi:
A comparative study of multi-class support vector machine methods for Arabic characters recognition. 1-6 - Hasna Elkhannoubi, Mustapha Belaïssaoui

:
Fundamental pillars for an effective cybersecurity strategy. 1-2 - Adil Maarouf, Bouchra El Qacimy, Abderrahim Marzouk, Abdelkrim Haqiq

:
A novel penalty model for managing and applying penalties in Cloud Computing. 1-6 - Mohamed Moussaoui

, Montaceur Zaghdoud, Jalel Akaichi
:
Structural-semantic approach for approximate frequent subgraph mining. 1-8 - Yassine Bounagui, Hatim Hafiddi, Abdellatif Mezrioui:

Requirements definition for a holistic approach of cloud computing governance. 1-8 - Rihab Maaloul

, Lamia Chaari
, Bernard Cousin:
Energy-aware forwarding strategy for Metro Ethernet networks. 1-7 - Rachid Selt, Yacine Challal

, Nadjia Benblidia:
Internet of things context-aware privacy architecture. 1-2 - Hassan El Alami

, Abdellah Najid
:
CFFL: Cluster formation using fuzzy logic for wireless sensor networks. 1-6 - Fatima Kabli, Reda Mohamed Hamou, Abdelmalek Amine

:
Towards a molecules production from DNA sequences based on clustering by 3D cellular automata approach and n-grams technique. 1-7 - Essma Selab, Ahmed Guessoum

:
A statistical approach for the induction of a grammar of Arabic. 1-8 - Mohamed Mahmoud El Benany

, Omar El Beqqali
:
SOA based e-government interoperability. 1-2 - Narayan C. Debnath, Mario Peralta, Carlos Salgado, Lorena Baigorria, German Montejano, Daniel Riesco:

Metrics and performance indicators to evaluate workflow processes on the cloud. 1-6 - Mohamed Nabil

, Abdelmajid Hajami, Abdelkrim Haqiq
:
Improvement of route lifetime of LAR protocol for VANET in highway scenario. 1-8 - Nabil Alami

, Mohammed Meknassi, Saïd El Alaoui Ouatik
, Noureddine Ennahnahi
:
Arabic text summarization based on graph theory. 1-8 - Ali Sahnoun, Ramdane Maamri:

Petri net modeling dynamic context of container for risk management. 1-8 - Rodrigo da Rosa Righi, Roberto de Quadros Gomes, Vinicius Facco Rodrigues

, Cristiano André da Costa
, Antônio Marcos Alberti
:
MigBSP++: Improving process rescheduling on Bulk-Synchronous Parallel applications. 1-8 - Abdeljebar Mansour

, Mohamed Sadik
, Essaid Sabir
:
Multi-factor authentication based on multimodal biometrics (MFA-MB) for Cloud Computing. 1-4 - Youness Chawki

, Khalid El Asnaoui
, Mohammed Ouanan, Brahim Aksasse
:
CBIR using the 2-D ESPRIT method: Application to Coil_100 database. 1-8 - Aimad Hakkoum, Said Raghay:

Advanced search in the Qur'an using semantic modeling. 1-4 - Takeru Kuroiwa, Noriyuki Kushiro:

Testing environment for embedded software product lines. 1-7 - Son N. Han, Quyet H. Cao, Bahram Alinia, Noël Crespi:

Design, implementation, and evaluation of 6LoWPAN for home and building automation in the Internet of Things. 1-8 - Ola Salman, Imad H. Elhajj

, Ayman I. Kayssi, Ali Chehab
:
An architecture for the Internet of Things with decentralized data and centralized control. 1-8 - Hajer Boujezza, Modher Al-mufti

, Hella Kaffel Ben Ayed, Leïla Azouz Saïdane:
A taxonomy of identities management systems in IOT. 1-8 - Khadijah S. Bahwaireth, Lo'ai Tawalbeh

, Anas Basalamah, Yaser Jararweh
, Mohammad Tawalbeh:
Efficient techniques for energy optimization in Mobile Cloud Computing. 1-8 - Umut Kizgindere, Süleyman Eken, Ahmet Sayar

:
MapReduce based scalable range query architecture for big spatial data. 1-4 - Yaser Jararweh

, Ala Darabseh, Mahmoud Al-Ayyoub, Abdelkader Bousselham, Elhadj Benkhelifa
:
Software Defined based smart grid architecture. 1-7 - Bacem Mbarek

, Aref Meddeb
, Wafa Ben Jaballah, Mohamed Mosbah
:
A secure authentication mechanism for resource constrained devices. 1-7 - Marwan Alakhras

, Mourad Oussalah, Mousa I. Hussein
:
ANFIS: General description for modeling dynamic objects. 1-8 - Mostefai Abdelkader

, Ricardo Pérez-Castillo, Malki Mimoun
:
Using text mining to locate concepts in execution traces. 1-6 - Carlos Eduardo Monteiro, Luis Carlos Trevelin:

Studies of computing techniques for performing face recognition with a focus in the crowds: A distributed architecture based on cloud computing. 1-5 - Abd El-Hameed G. El-Barbary, Layla A. A. El-Sayed, Hussein H. Aly, Mohamed Nazih ElDerini:

A cloudlet architecture using mobile devices. 1-8 - Mohamed Musallam Khasib Al Rawahi, Smitha Sunil Kumaran Nair

:
Detecting skimming devices in ATM through image processing. 1-5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














