Publications

Export 181 results:
Filters: First Letter Of Title is S  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Y. Abdellah, Lhoussain, A. Si, Hicham, G., et Mohamed, N., « Spelling correction for the Arabic language space deletion errors- », Procedia Computer Science, vol. 177, p. 568-574, 2020.
A. Abdellaoui, Elmhamdi, J., et Berradi, H., « Spatial relation expiration time to select multipoint relays in smart city environments », in ACM International Conference Proceeding Series, 2018.
Aab Adadi, Berrada, Mab, Chenouni, Dab, et Bounabat, Bab, « A semantic web service composition for E-Government services », Journal of Theoretical and Applied Information Technology, vol. 71, p. 460-467, 2015.
E. A. Afia et Kabbaj, M. M., « Supervised learning in branch-and-cut strategies », in ACM International Conference Proceeding Series, 2017, vol. Part F129474.
A. E. Afia, Lalaoui, M., et Chiheb, R., « A Self Controlled Simulated Annealing Algorithm using Hidden Markov Model State Classification », in Procedia Computer Science, 2019, vol. 148, p. 512-521.
A. Aghmadi, Erradi, M., et Kobbane, A., « SNA: Detecting Influencers over Social Networks », in Networked Systems, NETYS 2016, 2016, vol. 9944, p. 388.
W. Aitfares, Kobbane, A., et Kriouile, A., « Suspicious behavior detection of people by monitoring camera », in International Conference on Multimedia Computing and Systems -Proceedings, 2017, p. 113-117.
S. Alaoui, Ajhoun, R., et Y. Idrissi, E. Bouzekri E., « Semantic approach for the building of user profile for recommender system », in Proceedings - 2016 Global Summit on Computer and Information Technology, GSCIT 2016, 2017, p. 114-119.
M. Alouane et H. Bakkali, E., « Security, privacy and trust in cloud computing: A comparative study », in Proceedings of 2015 International Conference on Cloud Computing Technologies and Applications, CloudTech 2015, 2015.
M. Alouane et Bakkali, H. El, « Security, Privacy and Trust in Cloud Computing: A Comparative Study », in 2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, p. 23-30.
F. Aa Amazal, Idri, Aa, et Abran, Ab, « Software development effort estimation using classical and fuzzy analogy: A cross-validation comparative study », International Journal of Computational Intelligence and Applications, vol. 13, 2014.
F. - Za Ammor, Bouzidi, Db, et Elomri, Aa, « A support model for tutoring to facilitate and automate tutoring interventions », in International Conference on Multimedia Computing and Systems -Proceedings, 2014, p. 646-651.
E. M. Amrani et Benadada, Y., « Solving the multi-capacitated location problem using a Lagrangian relaxation approach », in Proceedings - GOL 2018: 4th IEEE International Conference on Logistics Operations Management, 2018, p. 1-5.
H. Amraoui, Habbani, A., Hajami, A., et Bilal, E., « Security & cooperation mechanisms over mobile ad hoc networks: A survey and challenges », in Proceedings of 2017 International Conference on Electrical and Information Technologies, ICEIT 2017, 2018, vol. 2018-January, p. 1-6.
H. Amraoui, Habbani, A., Hajami, A., et Bilal, E., « Security-Based Mechanism for Proactive Routing Schema Using Game Theory Model », MOBILE INFORMATION SYSTEMS, 2016.
Ha Amraoui, Habbani, Aab, Hajami, Ac, et Bilal, Ed, « Security-Based Mechanism for Proactive Routing Schema Using Game Theory Model », Mobile Information Systems, vol. 2016, 2016.
D. G. Angeler, Alvarez-Cobelas, M., et Sánchez-Carrillo, S., « Sonifying social-ecological change: A wetland laments agricultural transformation », Ecology and Society, vol. 23, 2018.
A. Annouch, Bellabdaoui, A., et Minkhar, J., « Split delivery and pickup vehicle routing problem with two-dimensional loading constraints », in SITA 2016 - 11th International Conference on Intelligent Systems: Theories and Applications, 2016.
A. Annouch, Bellabdaoui, A., et Minkhar, J., « Split delivery and pickup vehicle routing problem with two-dimensional loading constraints », in 2016 11TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA), 2016.
Na Assad, Elbhiri, Bb, Fkihi, ScEl, Faqihi, M. Ac, Ouadou, Ma, et Aboutajdine, Da, « Short: Intrusion detection quality analysis for homogeneous wireless sensor networks », Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8593 LNCS, p. 324-329, 2014.
B. Aylaj et Belkasmi, M., « Simulated Annealing Decoding of Linear Block Codes », in PROCEEDINGS OF THE MEDITERRANEAN CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES 2015, VOL 1, 2016, vol. 380, p. 175-183.
Ba Aylaj et Belkasmi, Mb, « Simulated annealing decoding of linear block codes », Lecture Notes in Electrical Engineering, vol. 380, p. 175-183, 2016.
Fa Ayoub, Farchane, Ab, Mohamed, Ac, Belkasmi, Mc, et Himmi, M. Md, « Serially concatenated OSMLD codes: Design and iterative decoding », Applied Mathematical Sciences, vol. 10, p. 2179-2188, 2016.
B
S. Baina, Ansias, P. - Y., Petit, M., et Castiaux, A., « Strategic business/IT alignment using goal models », in CEUR Workshop Proceedings, 2008, vol. 336, p. 31-43.
M. El Bajta, Idri, A., Fernandez-Aleman, J. Luis, Ros, J. Nicolas, et Toval, A., « Software Cost Estimation for Global Software Development A Systematic Map and Review Study », in ENASE 2015 - PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING, 2015, p. 197-206.

Pages

Partenaires

Localisation

Suivez-nous sur

   

Contactez-nous

ENSIAS

Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc

 Télécopie : (+212) 5 37 77 72 30

  Secrétariat de direction : 06 61 48 10 97

        Secrétariat général : 06 61 70 77 02

        Service des affaires estudiantines : 06 62 44 87 47

        Résidences : 06 61 82 89 77

    

    Compteur de visiteurs:401,201
    Education - This is a contributing Drupal Theme
    Design by WeebPal.