Publications

Export 2330 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
M. Ayache, Erradi, M., et Freisleben, B., « curlX: a MiddleWare to Enforce Access Control Policies within a Cloud Environment », in 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, p. 771-772.
Ma Ayache, Erradi, Ma, Freisleben, Bb, et Khoumsi, Ac, « Towards an efficient policy evaluation process in multi-tenancy cloud environments », in CCSW 2016 - Proceedings of the 2016 ACM Cloud Computing Security Workshop, co-located with CCS 2016, 2016, p. 55-59.
Ma Ayache, Erradi, Ma, Khoumsi, Ab, et Freisleben, Bc, « Analysis and verification of XACML policies in a medical cloud environment », Scalable Computing, vol. 17, p. 189-205, 2016.
Ma Ayache, Erradi, Ma, et Freisleben, Bb, « Access control policies enforcement in a cloud environment: Openstack », in Proceedings of the 2015 11th International Conference on Information Assurance and Security, IAS 2015, 2015, p. 26-31.
C. Avanzini, Mantelet, F., Aoussat, A., Jeanningros, F., et Bouchard, C., « Evaluating perceived quality through sensory evaluation in the development process of new products: A case study of luxury market », Advances in Intelligent Systems and Computing, vol. 739, p. 379-388, 2018.
N. Attaoui, Essaaidi, M., Ca), M. Paprzycki, et Ganzha, M., « Malicious Workers Tolerance in an Agent-Based Grid Resource Brokering System - Preliminary Considerations (Short Paper) », in 2014 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), VOL 2, 2014, p. 233-236.
Na Attaoui, Essaaidi, Mb, Paprzycki, Mc, et Ganzha, Mc, « Malicious workers tolerance in an agent-based grid resource brokering system - Preliminary considerations », in Proceedings - 2014 International Conference on Computational Science and Computational Intelligence, CSCI 2014, 2014, vol. 2, p. 233-236.
N. Attaoui, Ganzha, M., Paprzycki, M., Wasielewska, K., et Essaaidi, M., « MULTIPLE EQUIVALENT SIMULTANEOUS OFFERS STRATEGY IN AN AGENT-BASED GRID RESOURCE BROKERING SYSTEM - INITIAL CONSIDERATIONS. », Scalable Computing: Practice & Experience, vol. 14, p. 83 - 94, 2013.
Na Attaoui, Ganzha, Mb, Paprzycki, Mb, Wasielewska, Kb, et Essaaidi, Mc, « Multiple equivalent simultaneous offers strategy in an agent-based grid resource brokering system-initial considerations », Scalable Computing, vol. 14, p. 83-94, 2013.
N. Attaoui, Bendahmane, A., Essaaidi, M., Sanyal, S., Ganzha, M., Paprzycki, M., et Wasielewska, K., « MALICIOUS WORKERS TOLERANCE IN AN AGENT-BASED GRID RESOURCE BROKERING SYSTEM. », IADIS International Journal on Computer Science & Information Systems, vol. 9, p. 55 - 70, 2014.
B. Assila, Kobbane, A., et M. Koutbi, E., « A Many-To-One Matching Game Approach to Achieve Low-Latency Exploiting Fogs and Caching », in 2018 9th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2018 - Proceedings, 2018, vol. 2018-January, p. 1-2.
B. Assila, Kobbane, A., et Ben-Othman, J., « Improving caching resource management: A pricing economic approach using Cournot, Bertrand, and Stackelberg game models », International Journal of Communication Systems, 2020.
B. Assila, Kobbane, A., Ben-Othman, J., et Koutbi, M. E., « Caching as a Service for 5G Networks: A Matching Game Approach for CaaS Resource Allocation », in Proceedings - IEEE Symposium on Computers and Communications, 2018, vol. 2018-June, p. 1193-1198.
B. Assila, Kobbane, A., et M. Koutbi, E., « A Cournot Economic Pricing Model for Caching Resource Management in 5G Wireless Networks », in 2018 14th International Wireless Communications and Mobile Computing Conference, IWCMC 2018, 2018, p. 1345-1350.
B. Assila, Kobbaney, A., Elmachkourz, M., et M. Koutbi, E., « A dynamic Stackelberg-Cournot game for competitive content caching in 5G networks », in Proceedings - 2017 International Conference on Wireless Networks and Mobile Communications, WINCOM 2017, 2017.
B. Assila, Kobbane, A., M. Koutbi, E., Ben-Othman, J., et Mokdad, L., « Caching as a Service in 5G Networks: Intelligent Transport and Video on Demand Scenarios », in 2018 IEEE Global Communications Conference, GLOBECOM 2018 - Proceedings, 2019.
B. Assila, Kobbane, A., Walid, A., et M. Koutbi, E., « Achieving low-energy consumption in fog computing environment: A matching game approach », in 19th IEEE Mediterranean Eletrotechnical Conference, MELECON 2018 - Proceedings, 2018, p. 213-218.
S. Assami, Daoudi, N., et Ajhoun, R., « Ontology-based modeling for a personalized mooc recommender system », Smart Innovation, Systems and Technologies, vol. 111, p. 21-28, 2019.
S. Assami, Daoudi, N., et Ajhoun, R., « Personalization criteria for enhancing learner engagement in MOOC platforms », in IEEE Global Engineering Education Conference, EDUCON, 2018, vol. 2018-April, p. 1265-1272.
S. Assami, Daoudi, N., et Ajhoun, R., « Learning actor ontology for a personalised recommendation in massive open online courses », International Journal of Technology Enhanced Learning, vol. 12, p. 390-410, 2020.
Na Assad, Elbhiri, Bb, Faqihi, M. Ac, Ouadou, Ma, et Aboutajdine, Da, « Efficient deployment quality analysis for intrusion detection in wireless sensor networks », Wireless Networks, vol. 22, p. 991-1006, 2016.
Na Assad, Elbhiri, Bb, Fkihi, ScEl, Faqihi, M. Ac, Ouadou, Ma, et Aboutajdine, Da, « Short: Intrusion detection quality analysis for homogeneous wireless sensor networks », Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8593 LNCS, p. 324-329, 2014.
Na Assad, Elbhiri, Bb, Faqihi, M. Ac, Ouadou, Ma, et Aboutajdine, Da, « Analysis of the deployment quality for intrusion detection in wireless sensor networks », Journal of Computer Networks and Communications, vol. 2015, 2015.
N. Assad, Elbhiri, B., Faqihi, M. Ahmed, Ouadou, M., et Aboutajdine, D., « Analysis of the Deployment Quality for Intrusion Detection in Wireless Sensor Networks. », Journal of Computer Networks & Communications, vol. 2015, p. 1 - 7, 2015.
N. Assad, Elbhiri, B., Faqihi, M. Ahmed, Ouadou, M., et Aboutajdine, D., « Efficient deployment quality analysis for intrusion detection in wireless sensor networks », WIRELESS NETWORKS, vol. 22, p. 991-1006, 2016.

Pages

Partenaires

Localisation

Suivez-nous sur

         

    

Contactez-nous

ENSIAS

Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc

  Télécopie : (+212) 5 37 68 60 78

  Secrétariat de direction : 06 61 48 10 97

        Secrétariat général : 06 61 34 09 27

        Service des affaires financières : 06 61 44 76 79

        Service des affaires estudiantines : 06 62 77 10 17 / n.mhirich@um5s.net.ma

        CEDOC ST2I : 06 66 39 75 16

        Résidences : 06 61 82 89 77

Contacts

    

    Compteur de visiteurs:634,797
    Education - This is a contributing Drupal Theme
    Design by WeebPal.