Publications

Export 2330 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
X
A. E. Haddadi, Dousset, B., et Berrada, I., « Xplor Everywhere - The competitive intelligence system for mobile », in International Conference on Multimedia Computing and Systems -Proceedings, 2011.
A. Yousfi, Yazidi, M. H. El, et Zellou, A., « xMatcher: Matching extensible markup language schemas using semantic-based techniques », International Journal of Advanced Computer Science and Applications, vol. 11, p. 655-665, 2020.
W
E. Badidi, Esmahi, L., M. Serhani, A., et Elkoutbi, M., « WS-QoSM: A broker-based architecture for web services QoS management », in 2006 Innovations in Information Technology, 2006, p. 56-60.
J. Sangai et Bellabdaoui, A., « Workload balancing in nurse scheduling problem: Models and discussion », in 2017 International Colloquium on Logistics and Supply Chain Management: Competitiveness and Innovation in Automobile and Aeronautics Industries, LOGISTIQUA 2017, 2017, p. 82-87.
S. Yassir, Mostapha, Z., et Claude, T., « Workflow scheduling issues and techniques in cloud computing: A systematic literature review », Lecture Notes in Networks and Systems, vol. 49, p. 241-263, 2019.
M. Boughrous et H. Bakkali, E., « A Workflow Criticality-Based Approach to Bypass the Workflow Satisfiability Problem », Security and Communication Networks, vol. 2021, 2021.
H. Hatim, H. Bakkali, E., et Berrada, I., « Workflow access control: From role engineering to task engineering », in 2010 International Conference for Internet Technology and Secured Transactions, ICITST 2010, 2010.
Y. Benkaouz, Erradi, M., et Freisleben, B., « Work in Progress: K-Nearest Neighbors Techniques for ABAC Policies Clustering », in ABAC'16: PROCEEDINGS OF THE 2016 ACM INTERNATIONAL WORKSHOP ON ATTRIBUTE BASED ACCESS CONTROL, 2016, p. 72-75.
Ya Benkaouz, Erradi, Ma, et Freisleben, Bb, « Work in progress: K-nearest neighbors techniques for ABAC policies clustering », in ABAC 2016 - Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, co-located with CODASPY 2016, 2016, p. 72-75.
Y. Essadraoui et Kettani, M. D. E. - C. El, « Wireless sensor node's authentication scheme based on Multivariate Quadratic Quasi-groups », in Proceedings of 2015 IEEE World Conference on Complex Systems, WCCS 2015, 2015.
H. Berradi, Habbani, A., Benjbara, C., Mouchfiq, N., et Amraoui, H., « Wireless network stability enhancement based on spatial dependency », Lecture Notes in Electrical Engineering, vol. 684 LNEE, p. 677-686, 2020.
R. Zou, Yang, J., Wang, Y., Liu, F., Essaaidi, M., et Srinivasan, D., « Wind turbine power curve modeling using an asymmetric error characteristic-based loss function and a hybrid intelligent optimizer », Applied Energy, vol. 304, 2021.
E. O. Asmaa, Aboutajdine, D., et Aziz, D., « WiebMat, a new information extraction systemen », in Proceedings of the IADIS European Conference on Data Mining 2009, ECDM'09 Part of the IADIS Multi Conference on Computer Science and Information Systems, MCCSIS 2009, 2009, p. 171-173.
F. Gould, Brown, Z. S., et Kuzma, J., « Wicked evolution: Can we address the sociobiological dilemma of pesticide resistance? », Science, vol. 360, p. 728-732, 2018.
P. Dauvergne, « Why is the global governance of plastic failing the oceans? », Global Environmental Change, vol. 51, p. 22-31, 2018.
N. Kerzazi et Adams, B., « Who Needs Release and DevOps Engineers, and Why? », in INTERNATIONAL WORKSHOP ON CONTINUOUS SOFTWARE EVOLUTION AND DELIVERY, CSED 2016, 2016, p. 77-83.
Na Kerzazi et Adams, Bb, « Who needs release and DevOps engineers, and why? », in Proceedings - International Workshop on Continuous Software Evolution and Delivery, CSED 2016, 2016, p. 77-83.
N. Kerzazi et Asri, I. El, « Who Can Help to Review This Piece of Code? », in COLLABORATION IN A HYPERCONNECTED WORLD, 2016, vol. 480, p. 289-301.
N. Kerzazi et I. Asri, E., « Who can help to review this piece of code? », IFIP Advances in Information and Communication Technology, vol. 480, p. 289-301, 2016.
M. Sayagh, Kerzazi, N., Petrillo, F., Bennani, K., et Adams, B., « What should your run-time configuration framework do to help developers? », Empirical Software Engineering, vol. 25, p. 1259-1293, 2020.
K. Baina, « WFESelector - A tool for comparing and selecting workflow engines », in ICEIS 2007: PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS: DATABASES AND INFORMATION SYSTEMS INTEGRATION, 2007, p. 330-337.
M. Ea Koutbi, Ben-Othman, Jb, et Kobbane, Ac, « Welcome message from the general chairs », in International Conference on Wireless Networks and Mobile Communications, WINCOM 2015, 2015.
M. Essaaidi et S. Hani, E., « Welcome message from the conference general co-chairs », in Proceedings of 2017 International Conference on Electrical and Information Technologies, ICEIT 2017, 2018, vol. 2018-January.
Ma Essaaidi et Hani, SbEl, « Welcome message from the conference general co-chairs », in Proceedings of 2016 International Conference on Electrical and Information Technologies, ICEIT 2016, 2016.
E. A. Kandoussi et H. Bakkali, E., « Weighted access control policies cohabitation in distributed systems », Advances in Intelligent Systems and Computing, vol. 735, p. 350-360, 2018.

Pages

Partenaires

Localisation

Suivez-nous sur

         

    

Contactez-nous

ENSIAS

Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc

  Télécopie : (+212) 5 37 68 60 78

  Secrétariat de direction : 06 61 48 10 97

        Secrétariat général : 06 61 34 09 27

        Service des affaires financières : 06 61 44 76 79

        Service des affaires estudiantines : 06 62 77 10 17 / n.mhirich@um5s.net.ma

        CEDOC ST2I : 06 66 39 75 16

        Résidences : 06 61 82 89 77

Contacts

    

    Compteur de visiteurs:631,364
    Education - This is a contributing Drupal Theme
    Design by WeebPal.