Publications

Export 2330 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
E. Bendriss et Regragui, B., « Automatic selection of filtering devices in a distributed intrusion prevension system », Journal of Theoretical and Applied Information Technology, vol. 53, p. 307-311, 2013.
L. Ajallouda, Fagroud, F. Z., Zellou, A., et Benlahmar, E. H., « Automatic Key-Phrase Extraction: Empirical Study of Graph-Based Methods », Lecture Notes in Networks and Systems, vol. 489 LNNS, p. 440-456, 2022.
E. B. Idrissi, Baina, S., et Baina, K., « Automatic generation of ontology from data models: A practical evaluation of existing approaches », in Proceedings - International Conference on Research Challenges in Information Science, 2013.
B. El Idrissi, Baina, S., et Baina, K., « Automatic Generation of Ontology from Data Models: A Practical Evaluation of Existing Approaches », in 2013 IEEE SEVENTH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS), 2013.
K. Souali, A. Afia, E., et Faizi, R., « An automatic ethical-based recommender system for e-commerce », in International Conference on Multimedia Computing and Systems -Proceedings, 2011.
Y. Lahlou, Fkihi, S. E., et Faizi, R., « Automatic Detection of Fake News on Twitter by Using a New Feature: User Credibility », Lecture Notes in Networks and Systems, vol. 489 LNNS, p. 568-580, 2022.
H. Benouda, Azizi, M., Moussaoui, M., et Esbai, R., « Automatic code generation within MDA approach for cross-platform mobiles apps », in Proceedings of EDIS 2017 - 1st International Conference on Embedded and Distributed Systems, 2018, vol. 2017-December, p. 1-5.
E. A. Kandoussi et H. Bakkali, E., « Automated security driven solution for inter-organizational workflows », Advances in Intelligent Systems and Computing, vol. 1179 AISC, p. 350-361, 2021.
I. Slimani, Slimani, N., Achchab, S., Saber, M., Farissi, I. E., Sbiti, N., et Amghar, M., « Automated machine learning: the new data science challenge », International Journal of Electrical and Computer Engineering, vol. 12, p. 4243-4252, 2022.
A. Khoumsi et Erradi, M., « Automata-based bottom-up design of conflict-free security policies specified as policy expressions », Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 11028 LNCS, p. 343-357, 2019.
Wa Krombi, Erradi, Ma, et Khoumsi, Ab, « Automata-based approach to design and analyze security policies », in 2014 12th Annual Conference on Privacy, Security and Trust, PST 2014, 2014, p. 306-313.
W. Krombi, Erradi, M., et Khoumsi, A., « Automata-Based Approach to Design and Analyze Security Policies », in 2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, p. 306-313.
A. Maarof, Senhadji, M., Labbi, Z., et Belkasmi, M., « Authentication protocol for securing internet of things », in ACM International Conference Proceeding Series, 2018.
A. Maarof, Senhadji, M., Labbi, Z., et Belkasmi, M., « Authentication protocol conforming to EPC class-1 Gen-2 standard », in 2016 International Conference on Advanced Communication Systems and Information Security, ACOSIS 2016 - Proceedings, 2017.
E. W. Pefura-Yone, Jeddi, Z., Kouotou, E. A., Delimi, B., Y. Gueddari, E., Karkar, R., Kebe, M., M. Chauvin, D., et Dumur, J. - P., « Atopic dermatitis in children and adults in Sub-saharan Africa and Maghreb [État des lieux de la dermatite atopique de l'enfant et de l'adulte en Afrique sub-saharienne et au Maghreb] », Revue Francaise d'Allergologie, vol. 60, p. 297-299, 2020.
E. A. Koufi, Bennar, A., N. Koufi, E., et Yousfi, N., « Asymptotic properties of a stochastic SIQR epidemic model with Lévy Jumps and Beddington-DeAngelis incidence rate », Results in Physics, vol. 27, 2021.
E. Illi, F. Bouanani, E., et Ayoub, F., « Asymptotic analysis of underwater communication system subject to κ-μ Shadowed fading channel », in 2017 13th International Wireless Communications and Mobile Computing Conference, IWCMC 2017, 2017, p. 855-860.
E. A. Afia, Benchakroun, A., Dussault, J. - P., et K. Yassini, E., « Asymptotic analysis of the trajectories of the logarithmic barrier algorithm without constraint qualifications », RAIRO - Operations Research, vol. 42, p. 157-198, 2008.
E. A. Afia, Benchakroun, A., Dussault, J. - P., et K. Yassini, E., « Asymptotic analysis of the trajectories of the logarithmic barrier algorithm without constraint qualifications », RAIRO-OPERATIONS RESEARCH, vol. 42, p. 157-198, 2008.
H. Routaib, Badidi, E., Sabir, E., et Elkoutbi, M., « An asymmetrical nash bargaining for adaptive and automated context negotiation in pervasive environments », in 2017 14th IEEE Annual Consumer Communications and Networking Conference, CCNC 2017, 2017, p. 732-736.
A. Echchaachoui, Choukri, A., Habbani, A., et Elkoutbi, M., « Asymmetric and Dynamic Encryption for Routing Security in MANETs », in 2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2014, p. 825-830.
C. Asaad et Ghogho, M., « AsthmaKGxE: An asthma–environment interaction knowledge graph leveraging public databases and scientific literature », Computers in Biology and Medicine, vol. 148, 2022.
W. Hassen, Neifar, M., Cherif, H., Mahjoubi, M., Souissi, Y., Raddadi, N., Fava, F., et Cherif, A., « Assessment of genetic diversity and bioremediation potential of pseudomonads isolated from pesticide-contaminated artichoke farm soils », 3 Biotech, vol. 8, 2018.
H. Bennouri et Berqia, A. A., « Assessing the performance of different TCP congestion mechanisms in underwater wireless sensor networks », International Journal of Vehicle Information and Communication Systems, vol. 5, p. 119-136, 2020.
A. Yousfi, Elyazidi, M. H., et Zellou, A., « Assessing the performance of a new semantic similarity measure designed for schema matching for mediation systems », Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 11055 LNAI, p. 64-74, 2018.

Pages

Partenaires

Localisation

Suivez-nous sur

         

    

Contactez-nous

ENSIAS

Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc

  Télécopie : (+212) 5 37 68 60 78

  Secrétariat de direction : 06 61 48 10 97

        Secrétariat général : 06 61 34 09 27

        Service des affaires financières : 06 61 44 76 79

        Service des affaires estudiantines : 06 62 77 10 17 / n.mhirich@um5s.net.ma

        CEDOC ST2I : 06 66 39 75 16

        Résidences : 06 61 82 89 77

Contacts

    

    Compteur de visiteurs:634,830
    Education - This is a contributing Drupal Theme
    Design by WeebPal.