@conference {Assila2019, title = {Caching as a Service in 5G Networks: Intelligent Transport and Video on Demand Scenarios}, booktitle = {2018 IEEE Global Communications Conference, GLOBECOM 2018 - Proceedings}, year = {2019}, note = {cited By 0}, doi = {10.1109/GLOCOM.2018.8648110}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85063521486\&doi=10.1109\%2fGLOCOM.2018.8648110\&partnerID=40\&md5=b7935edacd24dfb7acbd2e5dbe0daed6}, author = {Assila, B. and Kobbane, A. and El Koutbi, M. and Ben-Othman, J. and Mokdad, L.} } @article {Boumkheld2019203, title = {Intrusion detection system based on a deterministic finite automaton for smart grid systems}, journal = {Advances in Intelligent Systems and Computing}, volume = {887}, year = {2019}, note = {cited By 0}, pages = {203-211}, doi = {10.1007/978-3-030-03405-4_13}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85059320815\&doi=10.1007\%2f978-3-030-03405-4_13\&partnerID=40\&md5=fbc7e73f3daac4bfba4238453eb832f4}, author = {Boumkheld, N. and El Koutbi, M.} } @conference {Brihi2019, title = {A New Profile-QoS Aware User Association Scheme for 5G Ultra-Dense W HetNets}, booktitle = {2018 IEEE Global Communications Conference, GLOBECOM 2018 - Proceedings}, year = {2019}, note = {cited By 0}, doi = {10.1109/GLOCOM.2018.8647695}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85063550006\&doi=10.1109\%2fGLOCOM.2018.8647695\&partnerID=40\&md5=a6cded91d78a47e09a4f9c639843c2d9}, author = {Brihi, S. and Walid, A. and Ben-Othman, J. and El Koutbi, M.} } @conference {Assila2018213, title = {Achieving low-energy consumption in fog computing environment: A matching game approach}, booktitle = {19th IEEE Mediterranean Eletrotechnical Conference, MELECON 2018 - Proceedings}, year = {2018}, pages = {213-218}, doi = {10.1109/MELCON.2018.8379096}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85050157229\&doi=10.1109\%2fMELCON.2018.8379096\&partnerID=40\&md5=0250d5d03e5322d270460ae3af21ca94}, author = {Assila, B. and Kobbane, A. and Walid, A. and El Koutbi, M.} } @conference {Cherqi201879, title = {Analysis of hacking related trade in the darkweb}, booktitle = {2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018}, year = {2018}, pages = {79-84}, doi = {10.1109/ISI.2018.8587311}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85061056307\&doi=10.1109\%2fISI.2018.8587311\&partnerID=40\&md5=3f2dbe2fc3377bce7e35dd18dfb3710f}, author = {Cherqi, O. and Mezzour, G. and Ghogho, M. and El Koutbi, M.} } @article {Mourchid2018, title = {CGAM: A community and geography aware mobility model}, journal = {International Journal of Communication Systems}, volume = {31}, number = {1}, year = {2018}, note = {cited By 0}, abstract = {The advances of localization-enabled technologies have led to huge volumes of large-scale human mobility data collected from Call Data Records (CDR), Global Positioning System (GPS) tracking systems, and Location Based Social networks (LBSN). These location data that encompass mobility patterns could generate an important value for building accurate and realistic mobility models and hence important value for fields of application including context-aware advertising, city-wide sensing applications, urban planning, and more. In this paper, we investigate the underlying spatio-temporal and structural properties for human mobility patterns, and propose the Community and Geography Aware Mobility (CGAM) model, which characterizes user mobility knowledge through several properties such as home location distribution, community members{\textquoteright} distribution, and radius of gyration. We validate the CGAM synthetic traces against real-world GPS traces and against the traces generated by the baseline mobility model SMOOTH and assess that CGAM is accurate in predicting the performance of flooding-based and community-based routing protocols. Copyright {\textcopyright} 2017 John Wiley \& Sons, Ltd.}, doi = {10.1002/dac.3432}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85030319469\&doi=10.1002\%2fdac.3432\&partnerID=40\&md5=9e90e1af7674bce27f60e78c6d502044}, author = {Mourchid, F. and Kobbane, A. and Ben Othman, J. and El Koutbi, M.} } @article {Mourchid2018, title = {CGAM: A community and geography aware mobility model}, journal = {International Journal of Communication Systems}, volume = {31}, number = {1}, year = {2018}, doi = {10.1002/dac.3432}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85030319469\&doi=10.1002\%2fdac.3432\&partnerID=40\&md5=9e90e1af7674bce27f60e78c6d502044}, author = {Mourchid, F. and Kobbane, A. and Ben Othman, J. and El Koutbi, M.} } @conference {Assila20181345, title = {A Cournot Economic Pricing Model for Caching Resource Management in 5G Wireless Networks}, booktitle = {2018 14th International Wireless Communications and Mobile Computing Conference, IWCMC 2018}, year = {2018}, pages = {1345-1350}, doi = {10.1109/IWCMC.2018.8450538}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85053888603\&doi=10.1109\%2fIWCMC.2018.8450538\&partnerID=40\&md5=7f9917ffc8d0c6f0be1c40a7bb027e30}, author = {Assila, B. and Kobbane, A. and El Koutbi, M.} } @conference {Assila20181, title = {A Many-To-One Matching Game Approach to Achieve Low-Latency Exploiting Fogs and Caching}, booktitle = {2018 9th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2018 - Proceedings}, volume = {2018-January}, year = {2018}, pages = {1-2}, doi = {10.1109/NTMS.2018.8328671}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85051102582\&doi=10.1109\%2fNTMS.2018.8328671\&partnerID=40\&md5=93f51b2e077f7f00d3d0e5e5a8123950}, author = {Assila, B. and Kobbane, A. and El Koutbi, M.} } @conference {Mabrouk2018495, title = {Signaling game-based approach to improve security in vehicular networks}, booktitle = {VEHITS 2018 - Proceedings of the 4th International Conference on Vehicle Technology and Intelligent Transport Systems}, volume = {2018-March}, year = {2018}, pages = {495-500}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85051947337\&partnerID=40\&md5=fd17d3ff35b56253285bf7d433abcfa8}, author = {Mabrouk, A. and Kobbane, A. and El Koutbi, M.} } @conference {Assila2017, title = {A dynamic Stackelberg-Cournot game for competitive content caching in 5G networks}, booktitle = {Proceedings - 2017 International Conference on Wireless Networks and Mobile Communications, WINCOM 2017}, year = {2017}, note = {cited By 0}, abstract = {The main concept behind 5G mobile network is to expand the idea of small cell network (SCN) to create a cooperative network able to cache data in active nodes inside radio access and Core network. Caching technique is a workaround to deal with bottleneck in the Back-haul, as the capacity of the wireless links could not support the increasing demand for rich multimedia. In this perspective multiple contents providers are in competition for caching space of network operator base stations. In fact, the caching space is a limited resource due to the exponential traffic of mobile data and video consumption. It is in this perspective that mobile operators and contents providers find themselves linked in this market profit generating, and consequently linked also in the allocating cache and setting price issues. In this paper we propose a multi-Stackelberg game between multiple MNOs (leaders) and several CPs (followers) computing under the Cournot-Nash assumption. In the first step a multi-leader Stackelberg game between Multiple MNO, considered as the leaders, aims to define the price they charges the CPs to maximize their profit. In the second step a multi-follower Cournot game between the CPs, considered as the followers, compete to increase the space quantity they cache at the MNOs small base stations (SBS) to maximize also their profit and to improve the quality of service (QoS) of their users. Our goal is to find the price the MNOs will set and the quantity of contents that each CP will cache. In the pricing game, each MNO first sets the price. Then the CPs react with proposed quantities of Space to cache. Then after the MNO sets again an optimal price according to the prediction of each CP0s optimal strategies. Numerical results describe the structure of the Nash equilibrium and the optimal prices resulting from the MNOs and CPs optimal strategies. {\textcopyright} 2017 IEEE.}, doi = {10.1109/WINCOM.2017.8238184}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85041439197\&doi=10.1109\%2fWINCOM.2017.8238184\&partnerID=40\&md5=36792f2ffea42a36227d37ccdf8af78b}, author = {Assila, B. and Kobbaney, A. and Elmachkourz, M. and El Koutbi, M.} } @conference {Mourchid20171315, title = {A game-theoretic approach for non-overlapping communities detection}, booktitle = {2017 13th International Wireless Communications and Mobile Computing Conference, IWCMC 2017}, year = {2017}, note = {cited By 1}, pages = {1315-1320}, abstract = {In this paper, we propose a game-theoretic approach to find the community structure in complex networks based on a non-cooperative game. This approach optimizes a node-based modularity for non-overlapping communities. Experiments show that our approach is effective to discover non-overlapping communities and obtain high values of modularity and Normalized Mutual Information (NMI) for real-world and synthetic networks in a reasonable time. {\textcopyright} 2017 IEEE.}, doi = {10.1109/IWCMC.2017.7986475}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85027835444\&doi=10.1109\%2fIWCMC.2017.7986475\&partnerID=40\&md5=b0751b99b8a2552e780d327bef409ddf}, author = {Mourchid, F. and Kobbane, A. and Ben Othman, J. and El Koutbi, M.} } @article {ElFachtali2017154, title = {Improved vertical handover decision algorithm using ants{\textquoteright} colonies with adaptive pheromone evaporation rate for 4th generation heterogeneous wireless networks}, journal = {International Journal of Wireless and Mobile Computing}, volume = {12}, number = {2}, year = {2017}, note = {cited By 0}, pages = {154-165}, abstract = {ACOR (Ant Colony Optimisation for Continuous Domains) has been proved to be able to adapt to vertical handoff mechanism. Adaptation capabilities of ACO are due to the pheromone evaporation, where the rate is usually fixed as it is done for vertical handover decision algorithm using ant colonies for 4G heterogeneous wireless networks. An adaptive pheromone evaporation rate (PER) is more suitable. High PER will eliminate the high intensity of pheromone trails that represent bad solutions from previous environments, while low PER may be more interesting when we have stagnation behaviours to minimise power consumption. In this paper, an update version of vertical handover decision algorithm using ant colonies for 4G heterogeneous wireless networks is proposed to vary the evaporation rate at different stages of the optimisation process. Simulation results show that ACOR with adaptive pheromone evaporation rate (ACOR APER) achieves promising results, when compared to the original ACOR and ACOR LPER (ACOR with low pheromone evaporation rate) with a fixed pheromone evaporation rate. Copyright {\textcopyright} 2017 Inderscience Enterprises Ltd.}, doi = {10.1504/IJWMC.2017.084181}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85019724918\&doi=10.1504\%2fIJWMC.2017.084181\&partnerID=40\&md5=e6d37478e0a2f4e257a4dd563e20dd01}, author = {El Fachtali, I. and Saadane, R. and El Koutbi, M.} } @conference {ElFachtali2017824, title = {Power-optimized vertical handover scheme for 4th generation heterogeneous wireless network}, booktitle = {Colloquium in Information Science and Technology, CIST}, year = {2017}, note = {cited By 0}, pages = {824-829}, abstract = {Minimizing the total power consumption required for vertical handovers in 4th generation heterogeneous wireless networks is as important as providing users with the best QoS(Quality of Service) continuously. This letter proposes a vertical handover scheme to minimize the total power consumption required for a vertical handover in 4th generation heterogeneous wireless networks, while guaranteeing a particular QoS. The proposed scheme is based on an updated Tabu-search scheme, which helps to efficiently explore the network in order to find an optimal solution and to provide a service performance that adheres to predefined service level agreements (SLA). Simulation results show that the proposed scheme can lead to lower total power consumption compared to the RSS (Received Signal Strength) based scheme. The proposed method can achieve promising results in terms of bandwidth, security and cost of service, while minimizing the power consumption. {\"\i}{\textquestiondown}{\textonehalf} 2016 IEEE.}, doi = {10.1109/CIST.2016.7805001}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85010224341\&doi=10.1109\%2fCIST.2016.7805001\&partnerID=40\&md5=34fca482e3ee5b9533ec0539843e2bb7}, author = {El Fachtali, I. and Saadane, R. and El Koutbi, M. and Chaibi, H.} } @conference {Mourchid2017, title = {Random walk based co-occurrence prediction in location-based social networks}, booktitle = {IEEE International Conference on Communications}, year = {2017}, note = {cited By 0}, abstract = {In this paper, we propose a new version of the LBRW (Learning based Random Walk), LBRW-Co, for predicting users co-occurrence based on mobility homophily and social links. More precisely, we analyze and mine jointly spatio-temporal and social features with the aim to predict and rank users co-occurrences. Experiments are performed on the Foursquare LBSN with accurate and refined measurements. Experimental results demonstrate that our LBRW-Co model have substantial advantages over baseline approaches in predicting and ranking co-occurrence interactions. {\textcopyright} 2017 IEEE.}, doi = {10.1109/ICC.2017.7997209}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85028326862\&doi=10.1109\%2fICC.2017.7997209\&partnerID=40\&md5=f865adbae7afd91e045cf307bb52ae7f}, author = {Mourchid, F. and Kobbane, A. and Ben Othman, J. and El Koutbi, M.} } @article {Walid201756, title = {Toward Eco-Friendly Smart Mobile Devices for Smart Cities}, journal = {IEEE Communications Magazine}, volume = {55}, number = {5}, year = {2017}, note = {cited By 0}, pages = {56-61}, abstract = {It is expected that the incessant use of SBSs by indoor mobile users to achieve high data rate and high energy efficiency for their smart mobile devices will drive ultra dense deployment of SCNs within MCNs, specifically in future smart cities. However, SCN densification has a hard effect on the deterioration of the energy efficiency and QoS throughput of mobile users equipped with smart mobile devices like smartphones, laptops, PDAs, and tablets. This degradation is due to the severe cross-tier interferences occurring in ultra dense co-channel deployments of SCNs within MCNs. The present article intends to study the energy efficiency of mobile users for better battery life management of their smart mobile devices through minimal energy consumption during their uplink transmissions. The proposed solution, based on a fully decentralized algorithm for sharing time access executed by SBSs and multi-homing capabilities of macrocellular users, improves the energy efficiency of mobile users for better battery life, and keeps their QoS throughput requirements. Therefore, it leads to the eco-friendly smart mobile devices required in future smart cities. The results validate our proposed solution and show the improvement achieved compared to the conventional access control mechanisms. Furthermore, our scheme requires no coordination among SBSs and macro base stations, which reduces the huge signaling overhead when using cooperative schemes. {\textcopyright} 2017 IEEE.}, doi = {10.1109/MCOM.2017.1600271}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85019660063\&doi=10.1109\%2fMCOM.2017.1600271\&partnerID=40\&md5=72802ad5f91b7f2273d0c16e81e53251}, author = {Walid, A. and Kobbane, A. and Ben-Othman, J. and El Koutbi, M.} } @article {Badidi2017611, title = {Towards data-as-a-service provisioning with high-quality data}, journal = {Lecture Notes in Electrical Engineering}, volume = {397}, year = {2017}, note = {cited By 0}, pages = {611-623}, abstract = {Given the large amount of sensed data by IoT devices and various wireless sensor networks, traditional data services lack the necessary resources to store and process that data, as well as to disseminate high-quality data to a variety of potential consumers. In this paper, we propose a framework for Data as a Service (DaaS) provisioning, which relies on deploying DaaS services on the cloud and using a DaaS agency to mediate between data consumers and DaaS services using a publish/subscribe model. Furthermore, we describe a decision algorithm for the selection of appropriate DaaS services that can fulfill consumers{\textquoteright} requests for high-quality data. One of the benefits of the proposed approach is the elasticity of the cloud resources used by DaaS services. Moreover, the selection algorithm allows ranking DaaS services by matching their quality-of-data (QoD) offers against the QoD needs of the data consumer. {\textcopyright} Springer Science+Business Media Singapore 2017.}, doi = {10.1007/978-981-10-1627-1_48}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84996995662\&doi=10.1007\%2f978-981-10-1627-1_48\&partnerID=40\&md5=3699ddd8367859bcdb3853679e370f5f}, author = {Badidi, E. and Routaib, H. and El Koutbi, M.} } @conference {Boumkheld2016108, title = {Intrusion detection system for the detection of blackhole attacks in a smart grid}, booktitle = {2016 4th International Symposium on Computational and Business Intelligence, ISCBI 2016}, year = {2016}, note = {cited By 0}, pages = {108-111}, abstract = {Smart grid is the new electrical grid that will change forever the way we use energy, thanks to the deployment of sensing and communication technologies. It allows consumers to become more aware and in control of their energy consumption. However, the pervasive communication infrastructure deployed inside the smart grid makes it a target to different types of attacks, which is why security is an essential element in building a robust grid. In this article we develop an Intrusion Detection System (IDS) that uses data mining techniques for the detection of a Denial of service (DOS) attack in a smart grid, the so called blackhole attack. {\textcopyright} 2016 IEEE.}, doi = {10.1109/ISCBI.2016.7743267}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85005943412\&doi=10.1109\%2fISCBI.2016.7743267\&partnerID=40\&md5=5c0ce5fd5e8c611326382b2cf80da730}, author = {Boumkheld, N. and Ghogho, M. and El Koutbi, M.} } @conference {ElMezouary2014843, title = {A cross-layer architecture for service differentiation in Wireless Sensor Networks with multiple sinks}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2014}, note = {cited By 0}, pages = {843-848}, abstract = {In this paper, we are interested in the description of a cross-layer architecture that supports service differentiation for real-time and best-effort traffics in Wireless Sensor Networks (WSN). We present our mathematical model that combines parameters from network and MAC layers. We aim to estimate and to enhance the throughput of multi-hop WSNs and the stability of the forwarding queues used for real-time and besteffort traffics. We suppose at the first step that we have a wireless sensor network with a single sink then we suppose that we have the same wireless sensor network with two sinks. We study the impact of transmitting real-time and best-effort traffics on the system throughput; and we also study the impact of adding a second sink on the throughput. {\textcopyright} 2014 IEEE.}, doi = {10.1109/ICMCS.2014.6911279}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84928710067\&doi=10.1109\%2fICMCS.2014.6911279\&partnerID=40\&md5=3469ccd3f0921f3eaae4a04888e98a91}, author = {El Mezouary, R. and Loutfi, A. and El Koutbi, M.} } @article {Loutfi20131793, title = {Impact of mobility and density on a cross-layer architecture for wireless sensor networks}, journal = {International Review on Computers and Software}, volume = {8}, number = {8}, year = {2013}, note = {cited By 2}, pages = {1793-1800}, abstract = {In this paper, we are interested in the service differentiation for real-time and besteffort traffics in wireless sensor networks. We present a new model that takes into account a random access in the MAC layer and a forwarding probability formulation at the network layer. We propose an approach (based on transmissions cycle) to derive the throughput of multi-hop routes and to estimate the stability of forwarding queues for real-time and best-effort traffics. We study the impact of some metric parameters: density, hop count, time, velocity and Mobility Models on the quality of service (QoS) of the studied system. In this paper, we have studied the impact these parameters on the QoS of a Wireless Sensor Network (WSN) where all nodes have a single destination (sink node). As results, we notice that the transmission probability Pi of the realtime and best-effort traffics have a great impact on the average throughput and we have also shown the correlation between the throughput and all metrics studied except for the hop count metric of best-effort streams. {\textcopyright} 2013 Praise Worthy Prize S.r.l. - All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84885905918\&partnerID=40\&md5=f268623b57af67104dfe63c50ea5413d}, author = {Loutfi, A. and El Koutbi, M.} } @conference { ISI:000349673802062, title = {Packet dropping for Real-Time Applications in Wireless Networks}, booktitle = {2013 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)}, series = {IEEE International Conference on Communications}, year = {2013}, note = {IEEE International Conference on Communications (ICC), Budapest, HUNGARY, JUN 09-13, 2013}, pages = {2949-2953}, publisher = {IEEE}, organization = {IEEE}, abstract = {In this paper, we consider a multimedia data transmission system over a wireless channel, where packets are queued at the transmitter. Multimedia data transmission over wireless networks often suffers from delay, jitter and packet loss. The main problem to implement a wireless network is the high and variable bit error rate in the radio link (fading, shadowing etc). Among the most important performance measures for real time applications are the packet loss probability. In order to improve the radio link, one often retransmits packets that have not been well received (using the Automatic Retransmission reQuest). This however may lead to queuing phenomena and increased delay due to retransmissions, and to losses of packets due to buffer overflow. In this paper, we allow that the number of retransmission is finite. We model the system state by a three-dimensional Markov chain which represents the evolution the radio link state, the number of packets in the buffer and the number of transmission of a packet in the service. We use an advanced approach based on the theory of singular perturbation in order to compute some performance of interest.}, isbn = {978-1-4673-3122-7}, issn = {1550-3607}, author = {Kobbane, A. and Ben-Othman, J. and El Koutbi, M.} } @conference { ISI:000312855700097, title = {Dynamic Power Control with Energy Constraint for Multimedia Wireless Sensor Networks}, booktitle = {2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)}, series = {IEEE International Conference on Communications}, year = {2012}, note = {IEEE International Conference on Communications (ICC), Ottawa, CANADA, JUN 10-15, 2012}, publisher = {IEEE}, organization = {IEEE}, abstract = {In recent years, many approaches and techniques have been explored for the optimization of energy usage in Wireless Sensor Networks (WSN). It is well recognized that a proper energy consumption model is the foundation for developing and evaluating a power management scheme in WSN. In this paper, we propose a new complete information Markov Decision Process (MDP) model to characterize sensors energy levels. We also propose and compare several centralized power control policies to select the more efficient policy that optimizes throughput and energy consumption.}, isbn = {978-1-4577-2053-6}, issn = {1550-3607}, author = {Kobbane, A. and Koulali, M. -A. and Tembine, H. and El Koutbi, M. and Ben-Othman, J.} } @conference {Saadane201262, title = {Evaluation of hybrid geo-location based on UMTS and GPS technologies}, booktitle = {Proceedings of 2012 International Conference on Multimedia Computing and Systems, ICMCS 2012}, year = {2012}, note = {cited By 0}, pages = {62-66}, doi = {10.1109/ICMCS.2012.6320310}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84869822901\&doi=10.1109\%2fICMCS.2012.6320310\&partnerID=40\&md5=98c5dfaf44a4e8614b501104ada67870}, author = {Saadane, R. and Belkasmi, M. and El Koutbi, M. and Dadda, M.R.} } @conference {Sabraoui2012306, title = {An MDA-based approach for WS composition using UML scenarios}, booktitle = {Proceedings of the 9th International Conference on Information Technology, ITNG 2012}, year = {2012}, note = {cited By 1}, pages = {306-313}, doi = {10.1109/ITNG.2012.52}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84863974926\&doi=10.1109\%2fITNG.2012.52\&partnerID=40\&md5=83b43893cc2ec11a345c5cce3c077cec}, author = {Sabraoui, A. and Ennouaary, A. and Khriss, I. and El Koutbi, M.} } @conference {Koulali2012145, title = {Optimal distributed relay selection for duty-cycling Wireless Sensor Networks}, booktitle = {GLOBECOM - IEEE Global Telecommunications Conference}, year = {2012}, note = {cited By 5}, pages = {145-150}, doi = {10.1109/GLOCOM.2012.6503104}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84877653430\&doi=10.1109\%2fGLOCOM.2012.6503104\&partnerID=40\&md5=96b3bdee645f0fc14aed4cb197e85ce0}, author = {Koulali, M.-A. and Kobbane, A. and El Koutbi, M. and Ben-Othman, J.} } @conference { ISI:000322375100023, title = {Optimal Distributed Relay Selection for Duty-Cycling Wireless Sensor Networks}, booktitle = {2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM)}, series = {IEEE Global Communications Conference}, year = {2012}, note = {IEEE Global Communications Conference (GLOBECOM), Anaheim, CA, DEC 03-07, 2012}, pages = {145-150}, publisher = {IEEE}, organization = {IEEE}, abstract = {Recent advances in localization technologies and algorithms for Wireless Sensor Networks (WSN) motivate the exploitation of location information in routing protocols. In this paper we consider the geographic forwarding of sporadically generated alarm messages. Our objective is to optimize sensor{\textquoteright}s energy consumption while respecting QoS constraints on transmission delay. For instance, we propose an optimal distributed relay selection policy for WSN with duty-cycling sensors based on a Markov Decision Process (MDP) with complete information. Also, we establish sufficient conditions for optimality of threshold policies. Then, end-to-end performances for a heuristic multi-hop relay selection strategy are established. Finally, we extend our model to account for queuing capabilities at sensor level.}, isbn = {978-1-4673-0921-9; 978-1-4673-0920-2}, issn = {2334-0983}, author = {Koulali, M. -A. and Kobbane, A. and El Koutbi, M. and Ben-Othman, J.} } @conference {Koulali201247, title = {QDGRP: A hybrid QoS Distributed Genetic routing protocol for Wireless Sensor Networks}, booktitle = {Proceedings of 2012 International Conference on Multimedia Computing and Systems, ICMCS 2012}, year = {2012}, note = {cited By 2}, pages = {47-52}, doi = {10.1109/ICMCS.2012.6320271}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84869852900\&doi=10.1109\%2fICMCS.2012.6320271\&partnerID=40\&md5=d66a629d14ff4cf85a93e8ce6708dbb9}, author = {Koulali, M.-A. and Kobbane, A. and El Koutbi, M. and Azizi, M.} } @conference {Salah2012314, title = {Strategies for applying rules in OWL entailment regimes}, booktitle = {Innovation Vision 2020: Sustainable growth, Entrepreneurship, and Economic Development - Proceedings of the 19th International Business Information Management Association Conference}, volume = {1}, year = {2012}, note = {cited By 0}, pages = {314-324}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84896326867\&partnerID=40\&md5=7b168c4068f656c83a4db115af183fb6}, author = {Salah, A. and El Koutbi, M. and Khriss, I.} } @conference {Tembine2010, title = {Robust power allocation games under channel uncertainty and time delays}, booktitle = {2010 IFIP Wireless Days, WD 2010}, year = {2010}, note = {cited By 0}, doi = {10.1109/WD.2010.5657740}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-78751549432\&doi=10.1109\%2fWD.2010.5657740\&partnerID=40\&md5=d221e9e9441f6d59228be21fe99203da}, author = {Tembine, H. and Kobbane, A. and El Koutbi, M.} } @conference {DeBarros200937, title = {AQM applications in MAODV ad hoc network}, booktitle = {16th International Conference on Telecommunications, ICT 2009}, year = {2009}, note = {cited By 0}, pages = {37-40}, doi = {10.1109/ICTEL.2009.5158615}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-77950670401\&doi=10.1109\%2fICTEL.2009.5158615\&partnerID=40\&md5=670f14dd45610aa5cd5640d6936ca1da}, author = {De Barros, M.A.P. and El Koutbi, M.} } @conference {Jakimi2008521, title = {Use cases and scenarios engineering}, booktitle = {Innovations{\textquoteright}07: 4th International Conference on Innovations in Information Technology, IIT}, year = {2008}, note = {cited By 0}, pages = {521-525}, doi = {10.1109/IIT.2007.4430418}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-50249112803\&doi=10.1109\%2fIIT.2007.4430418\&partnerID=40\&md5=82fe395e89ce2d783684d6544100e69f}, author = {Jakimi, A. and Sabraoui, A. and Badidi, E. and Idri, A. and El Koutbi, M.} } @conference { ISI:000259601400195, title = {Using UAM scenarios in B2B systems}, booktitle = {2008 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING, VOLS 1-3}, year = {2008}, note = {International Conference on Computer and Communication Engineering, Kuala Lumpur, MALAYSIA, MAY 13-15, 2008}, pages = {964+}, publisher = {Int Islam Univ Malaysia, Fac Engn}, organization = {Int Islam Univ Malaysia, Fac Engn}, abstract = {Over the past years, scenarios have received significant attention and have been used for different purposes such as understanding requirements, human computer interaction analysis, and object-oriented analysis and design. In this paper, we suggest to apply the scenario approach to B2B systems (Business to Business). We propose, to develop B2B systems as a three activities process deriving formal specifications and code skeletons from UML scenarios. Activities of this proposed process are generally automatic and are supported by a set of developed algorithms and tools.}, isbn = {978-1-4244-2357-6}, doi = {10.1109/ICCCE.2008.4580750}, author = {Jakimi, A. and Sabraoui, A. and Salah, A. and El Koutbi, M.} } @conference { ISI:000255983000056, title = {Use cases and scenarios engineering}, booktitle = {2007 INNOVATIONS IN INFORMATION TECHNOLOGIES, VOLS 1 AND 2}, year = {2007}, note = {4th International Conference on Innovations in Information Technology, Dubai, U ARAB EMIRATES, NOV 18-20, 2007}, pages = {274+}, publisher = {IEEE}, organization = {IEEE}, abstract = {\textbackslash{} In this paper, we suggest a requirement engineering process that composes (merge) use cases/scenarios and yields a formal specification of the system in form of a high-level Petri net. Use cases and scenarios are acquired in form of diagrams as defined by the Unified Modeling Language (UML). These diagrams are composed and transformed into Petri net specifications and merged to obtain a global Petri net specification capturing the behavior of the entire system. From the global specification, a system prototype can be generated and embedded in a user interface builder environment for further refinement. Based on end user feedback, the use cases and the input scenarios may be iteratively refined. The result of the overall process is a specification consisting of a global Petri net, together with the generated and refined prototype. This paper discusses some activities of this process.}, isbn = {978-1-4244-1840-4}, author = {Jakimi, A. and Sabraoui, A. and Badidi, E. and Idri, A. and El Koutbi, M.} }