Publications

Export 2330 results:
2015
K. Amarouche, Benbrahim, H., et Kassou, I., « Product Opinion Mining for Competitive Intelligence », in INTERNATIONAL CONFERENCE ON ADVANCED WIRELESS INFORMATION AND COMMUNICATION TECHNOLOGIES (AWICT 2015), 2015, vol. 73, p. 358-365.
K. Amarouche, Benbrahim, H., et Kassou, I., « Product Opinion Mining for Competitive Intelligence », in Procedia Computer Science, 2015, vol. 73, p. 358-365.
R. El Mezouary, Houmz, A., Jalil, J., et Koutbi, M. El, « PRoPHET-RAIP5: A New Approach to Secure Routing in Wireless Sensor Networks », in 2015 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2015, p. 52-57.
R. E. Mezouary, Houmz, A., Jalil, J., et Koutbi, M. E., « PRoPHET-RAIP5: A new approach to secure routing in wireless sensor networks », in International Conference on Wireless Networks and Mobile Communications, WINCOM 2015, 2015.
A. Khaled et Idrissi, M. Abdou Jana, « Proposition of a new ex-ante evaluation method for adapting and selecting ERP solutions. », E-Ti: E-Review in Technologies Information, p. 34 - 47, 2015.
E. Yahyaoui E. Selma, Zellou, A., et Idri, A., « Pure P2P Mediation System: A Mappings Discovery Approach », in INTERNATIONAL CONFERENCE ON INTEGRATED INFORMATION (IC-ININFO 2014), 2015, vol. 1644, p. 244-251.
L. Mimouni, Zellou, A., et Idri, A., « Quality of Data in Mediation Systems », in 2015 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA), 2015.
L. Mimouni, Zellou, A., et Idri, A., « Quality of Data in mediation systems », in 2015 10th International Conference on Intelligent Systems: Theories and Applications, SITA 2015, 2015.
Aa Idri, Hassani, Aa, et Abran, Ab, « RBFN network based models for estimating software development effort: A cross-validation study », in Proceedings - 2015 IEEE Symposium Series on Computational Intelligence, SSCI 2015, 2015, p. 976-983.
A. Idri, Hassani, A., et Abran, A., « RBFN Networks-based Models for Estimating Software Development Effort: A Cross-validation Study », in 2015 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI), 2015, p. 976-983.
A. Idri, Hassani, A., et Abran, A., « RBFN Networks-based Models for Estimating Software Development Effort: A Cross-validation Study », in 2015 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI), 2015, p. 925-932.
Aa Idri, Hassani, Ab, et Abran, Aa, « RBFN networks-based models for estimating software development effort: A cross-validation study », in Proceedings - 2015 IEEE Symposium Series on Computational Intelligence, SSCI 2015, 2015, p. 925-932.
S. Ouhbi, Idri, A., Fernández-Alemán, J., et Toval, A., « Requirements engineering education: a systematic mapping study. », Requirements Engineering, vol. 20, p. 119 - 138, 2015.
Sa Ouhbi, Idri, Aa, Fernández-Alemán, J. Lb, et Toval, Ab, « Requirements engineering education: a systematic mapping study », Requirements Engineering, vol. 20, p. 119-138, 2015.
S. Ouhbi, Idri, A., Fernandez-Aleman, J. Luis, et Toval, A., « Requirements engineering education: a systematic mapping study », REQUIREMENTS ENGINEERING, vol. 20, p. 119-138, 2015.
Z. Mcharfi, B. Asri, E., Dehmouch, I., Baya, A., et Kriouile, A., « Return on investment of software product line traceability in the short, mid and long term », in ICEIS 2015 - 17th International Conference on Enterprise Information Systems, Proceedings, 2015, vol. 2, p. 463-468.
Ya Bensitel et Romadi, Rb, « Secure data in cloud computing using homomorphic encryption », Journal of Theoretical and Applied Information Technology, vol. 82, p. 206-211, 2015.
K. Mrabet, Bouanani, F. El, et Ben-Azza, H., « A secure multi-hops routing for VANETs », in 2015 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2015, p. 6-10.
Ka Mrabet, Bouanani, F. Ea, et Ben-Azza, Hb, « A secure multi-hops routing for VANETs », in International Conference on Wireless Networks and Mobile Communications, WINCOM 2015, 2015.
T. Chanyour, Saadane, R., et Belkasmi, M., « Secure Sparse Network Coding for Reliable Routing in Large Scale DTMN », in 2015 THIRD INTERNATIONAL WORKSHOP ON RFID AND ADAPTIVE WIRELESS SENSOR NETWORKS (RAWSN), 2015, p. 57-62.
Ta Chanyour, Saadane, Rb, et Belkasmi, Ma, « Secure sparse network coding for reliable routing in large scale DTMN », in Proceedings - 2015 3rd International Workshop on RFID and Adaptive Wireless Sensor Networks, RAWSN 2015 - In conjunction with the International Conference on NETworked sYStems, NETYS 2015, 2015, p. 57-62.
Ha L'Amrani, Idrissi, YbEl Bouzekr, et Ajhoun, Ra, « The security of web services: Secure communication and identity management », in CEUR Workshop Proceedings, 2015, vol. 1580, p. 56-60.
M. Alouane et Bakkali, H. El, « Security, Privacy and Trust in Cloud Computing: A Comparative Study », in 2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, p. 23-30.
M. Alouane et H. Bakkali, E., « Security, privacy and trust in cloud computing: A comparative study », in Proceedings of 2015 International Conference on Cloud Computing Technologies and Applications, CloudTech 2015, 2015.
Ma Younes et Abdellah, Yb, « Segmentation of Arabic Handwritten Text to Lines », in Procedia Computer Science, 2015, vol. 73, p. 115-121.

Pages

Partenaires

Localisation

Suivez-nous sur

         

    

Contactez-nous

ENSIAS

Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc

  Télécopie : (+212) 5 37 68 60 78

  Secrétariat de direction : 06 61 48 10 97

        Secrétariat général : 06 61 34 09 27

        Service des affaires financières : 06 61 44 76 79

        Service des affaires estudiantines : 06 62 77 10 17 / n.mhirich@um5s.net.ma

        CEDOC ST2I : 06 66 39 75 16

        Résidences : 06 61 82 89 77

Contacts

    

    Compteur de visiteurs:637,222
    Education - This is a contributing Drupal Theme
    Design by WeebPal.