Publications

Export 44 results:
Filters: First Letter Of Title is V  [Clear All Filters]
Conference Paper
M. A. El Hadj, Erradi, M., Khoumsi, A., et Benkaouz, Y., « Validation and Correction of Large Security Policies: A Clustering and Access Log Based Approach », in Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018, 2019, p. 5330-5332.
A. Fath-Allah, Cheikhi, L., Al-Qutaish, R. E., et Idri, A., « A Validation of a Measurement Based E-government Portals' Maturity Model », in 2016 42ND EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA), 2016, p. 100-107.
R. Saidi, Fredj, M., Mouline, S., Front, A., et Rieu, D., « Variability Modeling for Business Component Customization », in 2008 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2008, p. 370+.
R. Saidi, Fredj, M., Mouline, S., Front, A., et Rieu, D., « Variability modeling for Business Component customization », in Proceedings - IEEE Symposium on Computers and Communications, 2008, p. 730-735.
A. Annouch et Bellabdaoui, A., « Variable neighborhood search heuristic for the full truckload problem in liquefied petroleum gas supply », in 2017 International Colloquium on Logistics and Supply Chain Management: Competitiveness and Innovation in Automobile and Aeronautics Industries, LOGISTIQUA 2017, 2017, p. 193-198.
M. Ouaskou, Lahmer, M., et Belkasmi, M., « A variant of HB protocols based on permutation for low-cost RFID », in International Conference on Wireless Networks and Mobile Communications, WINCOM 2015, 2015.
M. Ouaskou, Lahmer, M., et Belkasmi, M., « A Variant of HB Protocols Based on Permutation for Low-cost RFID », in 2015 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2015, p. 145-148.
H. Anoual, Fkihi, S. E., Jilbab, A., et Aboutajdine, D., « Vehicle license plate detection in images », in International Conference on Multimedia Computing and Systems -Proceedings, 2011.
E. A. Bouziady, R. Thami, O. Haj, Ghogho, M., Bourja, O., et S. Fkihi, E., « Vehicle speed estimation using extracted SURF features from stereo images », in 2018 International Conference on Intelligent Systems and Computer Vision, ISCV 2018, 2018, vol. 2018-May, p. 1-6.
A. El-Yahyaoui et Kettani, M. D. Ech- Chrif, « A verifiable fully homomorphic encryption scheme to secure big data in cloud computing », in Proceedings - 2017 International Conference on Wireless Networks and Mobile Communications, WINCOM 2017, 2017.
A. Haqiq et Bounabat, B., « Verification of Multi Decisional Reactive Agent using SMV Model Checker », in 2013 8TH INTERNATIONAL DESIGN AND TEST SYMPOSIUM (IDT), 2013.
A. Haqiq et Bounabat, B., « Verification of multi decisional reactive agent using SMV model checker », in 2013 8th IEEE Design and Test Symposium, IDT 2013, 2013.
E. B. Asri, Kenzi, A., Nassar, M., et Kriouile, A., « Vers une architecture MVSOA pour la mise en oeuvre des composants multivue », in CAL 2009 - 3rd Conference Francophone sur les Architectures Logicielles, 2009, p. 1-16.
E. M. Haroussi, Chana, I., et Belkasmi, M., « VHDL design and FPGA implementation of a fully parallel BCH SISO decoder », in 2010 5th International Symposium on I/V Communications and Mobile Networks, ISIVC 2010, 2010.
E. M. Haroussi, Ayoub, F., et Belkasmi, M., « VHDL design and FPGA implementation of weighted majority logic decoders », in International Conference on Multimedia Computing and Systems -Proceedings, 2011.
Ha Bennani, Sabir, Eb, Kobbane, Aa, et Koutbi, MaEl, « Virtual MIMO systems: A game theoretical approach », in WCCCS 2014 - Proceedings; 2014 5th Workshop on Codes, Cryptography and Communication Systems, 2014, p. 77-80.
M. Alouane et H. Bakkali, E., « Virtualization in Cloud Computing: Existing solutions and new approach », in Proceedings of 2016 International Conference on Cloud Computing Technologies and Applications, CloudTech 2016, 2017, p. 116-123.
M. Alouane et Bakkali, H. El, « Virtualization in Cloud Computing: NoHype vs HyperWall », in 2016 INTERNATIONAL CONFERENCE ON ELECTRICAL AND INFORMATION TECHNOLOGIES (ICEIT), 2016, p. 49-54.
M. Alouane et H. Bakkali, E., « Virtualization in Cloud Computing: NoHype vs HyperWall new approach », in Proceedings of 2016 International Conference on Electrical and Information Technologies, ICEIT 2016, 2016, p. 49-54.
G. Oumaima, Hamd, A. A., Youness, T., Rachid, O. H. T., et Omar, B., « Vision-based fall detection and prevention for the elderly people: A review ongoing research », in 5th International Conference on Intelligent Computing in Data Sciences, ICDS 2021, 2021.
Y. Baddi et Kettani, M. D. Ech- Chrif, « VNS-RP algorithm for RP selection in multicast routing protocol PIM-SM », in Proceedings of 2012 International Conference on Multimedia Computing and Systems, ICMCS 2012, 2012, p. 595-600.
Y. Baddi et Kettani, M. Dafir Ech-, « VNS-RP algorithm for RP selection in multicast routing protocol PIM-SM », in 2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2012, p. 595-600.
N. Mohammed et Abdellah, Y., « The vocabulary and the morphology in spell checker », in Procedia Computer Science, 2018, vol. 127, p. 76-81.

Pages

Partenaires

Localisation

Suivez-nous sur

         

    

Contactez-nous

ENSIAS

Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc

  Télécopie : (+212) 5 37 68 60 78

  Secrétariat de direction : 06 61 48 10 97

        Secrétariat général : 06 61 34 09 27

        Service des affaires financières : 06 61 44 76 79

        Service des affaires estudiantines : 06 62 77 10 17 / n.mhirich@um5s.net.ma

        Résidences : 06 61 82 89 77

Contacts

    

    Compteur de visiteurs:544,078
    Education - This is a contributing Drupal Theme
    Design by WeebPal.