Publications

Export 159 results:
Filters: First Letter Of Title is C  [Clear All Filters]
Conference Paper
B. Assila, Kobbane, A., Ben-Othman, J., et Koutbi, M. E., « Caching as a Service for 5G Networks: A Matching Game Approach for CaaS Resource Allocation », in Proceedings - IEEE Symposium on Computers and Communications, 2018, vol. 2018-June, p. 1193-1198.
B. Assila, Kobbane, A., M. Koutbi, E., Ben-Othman, J., et Mokdad, L., « Caching as a Service in 5G Networks: Intelligent Transport and Video on Demand Scenarios », in 2018 IEEE Global Communications Conference, GLOBECOM 2018 - Proceedings, 2019.
A. Abouaomar, Filali, A., et Kobbane, A., « Caching, device-to-device and fog computing in 5th cellular networks generation: Survey », in Proceedings - 2017 International Conference on Wireless Networks and Mobile Communications, WINCOM 2017, 2017.
A. Blaise et Berqia, A., « Can MAC waiting time improve TCP performance over ad-hoc networks? », in 2009 Mediterrannean Microwave Symposium, MMS 2009, 2009.
A. Blaise et Berqia, A., « Can MAC waiting time improve TCP performance over Ad-hoc networks? », in 2009 MEDITERRANEAN MICROWAVE SYMPOSIUM, 2009, p. 134-138.
N. Majda et Najima, D., « Capitalization of Knowledge Through Ontologies: A Knowledge Management Approach in a Strategic Intelligence Process », in Colloquium in Information Science and Technology, CIST, 2018, vol. 2018-October, p. 110-116.
I. Kamal, « Car recognition for multiple data sets based on Histogram of Oriented Gradients and Support Vector Machines », in 2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2012, p. 329-333.
I. Kamal, « Car recognition for multiple data sets based on histogram of oriented gradients and support vector machines », in Proceedings of 2012 International Conference on Multimedia Computing and Systems, ICMCS 2012, 2012, p. 328-332.
I. Kamal et Oubaha, J., « Car recognition using the bag of features method », in International Conference on Multimedia Computing and Systems -Proceedings, 2017, p. 99-102.
I. Kadi et Idri, A., « Cardiovascular Dysautonomias Diagnosis Using Crisp and Fuzzy Decision Tree: A Comparative Study », in HEALTH INFORMATICS MEETS EHEALTH, 2016, vol. 223, p. 1-8.
Ha Amraoui, Habbani, Aab, et Hajami, Ac, « CCS: A Correct Cooperation Strategy based on game theory for MANETS », in Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA, 2014, vol. 2014, p. 326-332.
Ya Bounagui, Hafiddi, Hab, et Mezrioui, Aa, « Challenges for IT based cloud computing governance », in 2014 9th International Conference on Intelligent Systems: Theories and Applications, SITA 2014, 2014.
Y. Belkasmi, Kobbane, A., Koutbi, M. El, et Ben-Othman, J., « Channel Allocation Strategies in Opportunistic-based Cognitive Networks », in 2012 8TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2012, p. 872-877.
Y. Belkasmi, Kobbane, A., Koutbi, M. E., et Ben-Othman, J., « Channel allocation strategies in opportunistic-based cognitive networks », in IWCMC 2012 - 8th International Wireless Communications and Mobile Computing Conference, 2012, p. 872-877.
S. Lhazmir, Kobbane, A., et Ben-Othman, J., « Channel Assignment for D2D communication : A Regret Matching Based Approach », in 2018 14th International Wireless Communications and Mobile Computing Conference, IWCMC 2018, 2018, p. 322-327.
H. Rahimi et Bakkali, H. El, « CIOSOS: Combined Idiomatic-Ontology Based Sentiment Orientation System for Trust Reputation in E-commerce », in INTERNATIONAL JOINT CONFERENCE: CISIS'15 AND ICEUTE'15, 2015, vol. 369, p. 189-200.
E. N. Saad, Mahdi, K. E., et Zbakh, M., « Cloud computing architectures based IDS », in Proceedings of 2012 International Conference on Complex Systems, ICCS 2012, 2012.
E. Niari Saad, Mahdi, K. El, et Zbakh, M., « Cloud Computing Architectures Based IDS », in PROCEEDINGS OF 2012 INTERNATIONAL CONFERENCE ON COMPLEX SYSTEMS (ICCS12), 2012, p. 457-462.
A. Alfath, Baina, K., et Baina, S., « Cloud Computing Security: Fine-grained analysis and Security approaches », in 2013 NATIONAL SECURITY DAYS (JNS3), 2013.
A. Alfath, Baina, K., et Baina, S., « Cloud computing security: Fine-grained analysis and security approaches », in 2013 National Security Days - 3eme Edition Des Journees Nationales de Securite, JNS3, 2013.
E. A. Alami, Sadok, H., et Elhaoud, N., « Cloud computing & the organizational performance: Different approach of assessment », in Proceedings of 2015 International Conference on Cloud Computing Technologies and Applications, CloudTech 2015, 2015.
A. El Alami, Sadok, H., et Elhaoud, N., « Cloud computing & the organizational performance Different approach of assessment », in 2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, p. 318-322.
A. Benali, B. Asri, E., et Kriouile, H., « Cloud environment assignment: A context-aware and Dynamic Software Product Lines-based approach », in Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA, 2016, vol. 2016-July.
Z. Abderrazzak et Ahmed, E., « Cloud SaaS using MDA approach on a multiview models generate a SaaS from a colored Petri Net using view PNML », in Proceedings of 2015 International Conference on Cloud Computing Technologies and Applications, CloudTech 2015, 2015.

Pages

Partenaires

Localisation

Suivez-nous sur

  

Contactez-nous

ENSIAS

Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc

 Télécopie : (+212) 5 37 77 72 30

  Secrétariat de direction : 06 61 48 10 97

        Secrétariat général : 06 61 70 77 02

        Service des affaires estudiantines : 06 62 44 87 47

        Résidences : 06 61 82 89 77

    

    Compteur de visiteurs:393,943
    Education - This is a contributing Drupal Theme
    Design by WeebPal.