Publications

Export 2330 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
V
Y. Baddi et Kettani, M. D. E. - C. El, « VND-CS: A Variable Neighborhood Descent Algorithm for Core Selection Problem in Multicast Routing Protocol », Communications in Computer and Information Science, vol. 293 PART 1, p. 429-443, 2012.
Y. Baddi et Kettani, M. D. Ech- Chrif, « VNS-RP algorithm for RP selection in multicast routing protocol PIM-SM », in Proceedings of 2012 International Conference on Multimedia Computing and Systems, ICMCS 2012, 2012, p. 595-600.
Y. Baddi et Kettani, M. Dafir Ech-, « VNS-RP algorithm for RP selection in multicast routing protocol PIM-SM », in 2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2012, p. 595-600.
N. Mohammed et Abdellah, Y., « The vocabulary and the morphology in spell checker », in Procedia Computer Science, 2018, vol. 127, p. 76-81.
W
Aab Belahcen, Bianchini, Ma, et Scarselli, Fa, « Web spam detection using transductive−inductive graph neural networks », Smart Innovation, Systems and Technologies, vol. 37, p. 83-91, 2015.
E. A. Kandoussi et H. Bakkali, E., « Weighted access control policies cohabitation in distributed systems », Advances in Intelligent Systems and Computing, vol. 735, p. 350-360, 2018.
Ma Essaaidi et Hani, SbEl, « Welcome message from the conference general co-chairs », in Proceedings of 2016 International Conference on Electrical and Information Technologies, ICEIT 2016, 2016.
M. Essaaidi et S. Hani, E., « Welcome message from the conference general co-chairs », in Proceedings of 2017 International Conference on Electrical and Information Technologies, ICEIT 2017, 2018, vol. 2018-January.
M. Ea Koutbi, Ben-Othman, Jb, et Kobbane, Ac, « Welcome message from the general chairs », in International Conference on Wireless Networks and Mobile Communications, WINCOM 2015, 2015.
K. Baina, « WFESelector - A tool for comparing and selecting workflow engines », in ICEIS 2007: PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS: DATABASES AND INFORMATION SYSTEMS INTEGRATION, 2007, p. 330-337.
M. Sayagh, Kerzazi, N., Petrillo, F., Bennani, K., et Adams, B., « What should your run-time configuration framework do to help developers? », Empirical Software Engineering, vol. 25, p. 1259-1293, 2020.
N. Kerzazi et Asri, I. El, « Who Can Help to Review This Piece of Code? », in COLLABORATION IN A HYPERCONNECTED WORLD, 2016, vol. 480, p. 289-301.
N. Kerzazi et I. Asri, E., « Who can help to review this piece of code? », IFIP Advances in Information and Communication Technology, vol. 480, p. 289-301, 2016.
Na Kerzazi et Adams, Bb, « Who needs release and DevOps engineers, and why? », in Proceedings - International Workshop on Continuous Software Evolution and Delivery, CSED 2016, 2016, p. 77-83.
N. Kerzazi et Adams, B., « Who Needs Release and DevOps Engineers, and Why? », in INTERNATIONAL WORKSHOP ON CONTINUOUS SOFTWARE EVOLUTION AND DELIVERY, CSED 2016, 2016, p. 77-83.
P. Dauvergne, « Why is the global governance of plastic failing the oceans? », Global Environmental Change, vol. 51, p. 22-31, 2018.
F. Gould, Brown, Z. S., et Kuzma, J., « Wicked evolution: Can we address the sociobiological dilemma of pesticide resistance? », Science, vol. 360, p. 728-732, 2018.
E. O. Asmaa, Aboutajdine, D., et Aziz, D., « WiebMat, a new information extraction systemen », in Proceedings of the IADIS European Conference on Data Mining 2009, ECDM'09 Part of the IADIS Multi Conference on Computer Science and Information Systems, MCCSIS 2009, 2009, p. 171-173.
R. Zou, Yang, J., Wang, Y., Liu, F., Essaaidi, M., et Srinivasan, D., « Wind turbine power curve modeling using an asymmetric error characteristic-based loss function and a hybrid intelligent optimizer », Applied Energy, vol. 304, 2021.
H. Berradi, Habbani, A., Benjbara, C., Mouchfiq, N., et Amraoui, H., « Wireless network stability enhancement based on spatial dependency », Lecture Notes in Electrical Engineering, vol. 684 LNEE, p. 677-686, 2020.
Y. Essadraoui et Kettani, M. D. E. - C. El, « Wireless sensor node's authentication scheme based on Multivariate Quadratic Quasi-groups », in Proceedings of 2015 IEEE World Conference on Complex Systems, WCCS 2015, 2015.
Y. Benkaouz, Erradi, M., et Freisleben, B., « Work in Progress: K-Nearest Neighbors Techniques for ABAC Policies Clustering », in ABAC'16: PROCEEDINGS OF THE 2016 ACM INTERNATIONAL WORKSHOP ON ATTRIBUTE BASED ACCESS CONTROL, 2016, p. 72-75.
Ya Benkaouz, Erradi, Ma, et Freisleben, Bb, « Work in progress: K-nearest neighbors techniques for ABAC policies clustering », in ABAC 2016 - Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, co-located with CODASPY 2016, 2016, p. 72-75.
H. Hatim, H. Bakkali, E., et Berrada, I., « Workflow access control: From role engineering to task engineering », in 2010 International Conference for Internet Technology and Secured Transactions, ICITST 2010, 2010.
M. Boughrous et H. Bakkali, E., « A Workflow Criticality-Based Approach to Bypass the Workflow Satisfiability Problem », Security and Communication Networks, vol. 2021, 2021.

Pages

Partenaires

Localisation

Suivez-nous sur

         

    

Contactez-nous

ENSIAS

Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc

  Télécopie : (+212) 5 37 68 60 78

  Secrétariat de direction : 06 61 48 10 97

        Secrétariat général : 06 61 34 09 27

        Service des affaires financières : 06 61 44 76 79

        Service des affaires estudiantines : 06 62 77 10 17 / n.mhirich@um5s.net.ma

        CEDOC ST2I : 06 66 39 75 16

        Résidences : 06 61 82 89 77

Contacts

    

    Compteur de visiteurs:632,025
    Education - This is a contributing Drupal Theme
    Design by WeebPal.