@article {9434372520130201, title = {Ant colony algorithm for the multi-depot vehicle routing problem in large quantities by a heterogeneous fleet of vehicles.}, journal = {INFOR}, volume = {51}, number = {1}, year = {2013}, pages = {31 - 40}, abstract = {This article describes a heuristic method based on an ant colony algorithm for the multi-depot vehicle routing problem in large quantities by a heterogeneous fleet of vehicles. Test results on different problem instances are presented and compared with those obtained by CPLEX and by a previous constructive heuristic. [ABSTRACT FROM AUTHOR]}, keywords = {Ant algorithms, ant colony algorithm, Comparative studies, Computer networks, Heuristic algorithms, Information technology, Keywords Distribution, products in large quantities, Vehicle routing problem}, issn = {03155986}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=bth\&AN=94343725\&site=ehost-live}, author = {Benslimane, Mohammed Taha and Benadada, Youssef} } @article {8999329020120801, title = {Ing{\'e}nierie des exigences de la s{\'e}curit{\'e} informatique: Revue de travaux de recherche de l{\textquoteright}{\'e}licitation {\`a} la sp{\'e}cification.}, journal = {E-Ti: E-Review in Technologies Information}, number = {6}, year = {2012}, pages = {17 - 31}, abstract = {Nowadays Security plays an important role in the development of applications because of network expansion on one side and of the importance of information on the other side. However, security requirements have long been relegated to second place compared to the functional requirements which can cause some damage to the applications. One of the challenges of current research in the area of requirement engineering is to develop simple, expressive, reliable and costless methods for expressing and modelling security requirements. One of the challenges of current research in the area of requirement engineering is to develop simple, expressive, reliable and costless methods for expressing and modelling security requirements. (English) [ABSTRACT FROM AUTHOR]}, keywords = {Computer networks, Computer security, Computer software development, Elicitation, Formal Specification, Framework de mod{\'e}lisation, Information theory, Ing{\'e}nierie des exigences, Modelling framework, Requirement Engineering, Requirements engineering, S{\'e}curit{\'e}, Security, Sp{\'e}cification formelle}, issn = {11148802}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=89993290\&site=ehost-live}, author = {Kassou, Meryem and Kjiri, Laila} }