Publications

Export 235 results:
Filters: First Letter Of Title is S  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Y. Abdellah, Lhoussain, A. S., Hicham, G., et Mohamed, N., « Spelling correction for the Arabic language-space deletion errors », in Procedia Computer Science, 2020, vol. 177, p. 568-574.
Y. Abdellah, Lhoussain, A. Si, Hicham, G., et Mohamed, N., « Spelling correction for the Arabic language space deletion errors- », Procedia Computer Science, vol. 177, p. 568-574, 2020.
A. Abdellaoui, Elmhamdi, J., et Berradi, H., « Spatial relation expiration time to select multipoint relays in smart city environments », in ACM International Conference Proceeding Series, 2018.
S. Abid et Mhada, F. Z., « Simulation optimisation methods applied in reverse logistics: a systematic review », International Journal of Sustainable Engineering, vol. 14, p. 1463-1483, 2021.
A. Abouaomar, Cherkaoui, S., Mlika, Z., et Kobbane, A., « Service Function Chaining in MEC: A Mean-Field Game and Reinforcement Learning Approach », IEEE Systems Journal, p. 1-12, 2022.
Aab Adadi, Berrada, Mab, Chenouni, Dab, et Bounabat, Bab, « A semantic web service composition for E-Government services », Journal of Theoretical and Applied Information Technology, vol. 71, p. 460-467, 2015.
E. A. Afia et Kabbaj, M. M., « Supervised learning in branch-and-cut strategies », in ACM International Conference Proceeding Series, 2017, vol. Part F129474.
A. E. Afia, Lalaoui, M., et Chiheb, R., « A Self Controlled Simulated Annealing Algorithm using Hidden Markov Model State Classification », in Procedia Computer Science, 2019, vol. 148, p. 512-521.
A. Aghmadi, Erradi, M., et Kobbane, A., « SNA: Detecting Influencers over Social Networks », in Networked Systems, NETYS 2016, 2016, vol. 9944, p. 388.
W. Aitfares, Kobbane, A., et Kriouile, A., « Suspicious behavior detection of people by monitoring camera », in International Conference on Multimedia Computing and Systems -Proceedings, 2017, p. 113-117.
L. Ajallouda, Fagroud, F. Z., Zellou, A., et Benlahmar, E. H., « A Systematic Literature Review of Keyphrases Extraction Approaches », International Journal of Interactive Mobile Technologies, vol. 16, p. 31-58, 2022.
S. Alaoui, Ajhoun, R., et Y. Idrissi, E. Bouzekri E., « Semantic approach for the building of user profile for recommender system », in Proceedings - 2016 Global Summit on Computer and Information Technology, GSCIT 2016, 2017, p. 114-119.
M. Aloqaily, Abdellatif, K., et Yan, F., « Special Issue on Internet of Things: Intelligent Networks, Communication and Mobility (AdHocNets 2020) », Mobile Networks and Applications, vol. 27, p. 1283-1285, 2022.
M. Alouane et H. Bakkali, E., « Security, privacy and trust in cloud computing: A comparative study », in Proceedings of 2015 International Conference on Cloud Computing Technologies and Applications, CloudTech 2015, 2015.
M. Alouane et Bakkali, H. El, « Security, Privacy and Trust in Cloud Computing: A Comparative Study », in 2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, p. 23-30.
F. Aa Amazal, Idri, Aa, et Abran, Ab, « Software development effort estimation using classical and fuzzy analogy: A cross-validation comparative study », International Journal of Computational Intelligence and Applications, vol. 13, 2014.
F. - Za Ammor, Bouzidi, Db, et Elomri, Aa, « A support model for tutoring to facilitate and automate tutoring interventions », in International Conference on Multimedia Computing and Systems -Proceedings, 2014, p. 646-651.
E. M. Amrani et Benadada, Y., « Solving the multi-capacitated location problem using a Lagrangian relaxation approach », in Proceedings - GOL 2018: 4th IEEE International Conference on Logistics Operations Management, 2018, p. 1-5.
H. Amraoui, Habbani, A., Hajami, A., et Bilal, E., « Security & cooperation mechanisms over mobile ad hoc networks: A survey and challenges », in Proceedings of 2017 International Conference on Electrical and Information Technologies, ICEIT 2017, 2018, vol. 2018-January, p. 1-6.
H. Amraoui, Habbani, A., Hajami, A., et Bilal, E., « Security-Based Mechanism for Proactive Routing Schema Using Game Theory Model », MOBILE INFORMATION SYSTEMS, 2016.
Ha Amraoui, Habbani, Aab, Hajami, Ac, et Bilal, Ed, « Security-Based Mechanism for Proactive Routing Schema Using Game Theory Model », Mobile Information Systems, vol. 2016, 2016.
D. G. Angeler, Alvarez-Cobelas, M., et Sánchez-Carrillo, S., « Sonifying social-ecological change: A wetland laments agricultural transformation », Ecology and Society, vol. 23, 2018.
A. Annouch, Bellabdaoui, A., et Minkhar, J., « Split delivery and pickup vehicle routing problem with two-dimensional loading constraints », in SITA 2016 - 11th International Conference on Intelligent Systems: Theories and Applications, 2016.
A. Annouch, Bellabdaoui, A., et Minkhar, J., « Split delivery and pickup vehicle routing problem with two-dimensional loading constraints », in 2016 11TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA), 2016.
Na Assad, Elbhiri, Bb, Fkihi, ScEl, Faqihi, M. Ac, Ouadou, Ma, et Aboutajdine, Da, « Short: Intrusion detection quality analysis for homogeneous wireless sensor networks », Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8593 LNCS, p. 324-329, 2014.

Pages

Partenaires

Localisation

Suivez-nous sur

         

    

Contactez-nous

ENSIAS

Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc

  Télécopie : (+212) 5 37 68 60 78

  Secrétariat de direction : 06 61 48 10 97

        Secrétariat général : 06 61 34 09 27

        Service des affaires financières : 06 61 44 76 79

        Service des affaires estudiantines : 06 62 77 10 17 / n.mhirich@um5s.net.ma

        Résidences : 06 61 82 89 77

Contacts

    

Education - This is a contributing Drupal Theme
Design by WeebPal.