Publications

Export 204 results:
Filters: First Letter Of Title is M  [Clear All Filters]
2011
K. Doumi, Baina, S., et Baina, K., « Modeling approach for business it alignment », in ICEIS 2011 - Proceedings of the 13th International Conference on Enterprise Information Systems, 2011, vol. 4 SAIC, p. 457-464.
K. Doumi, Baina, S., et Baina, K., « Modeling approach using goal modeling and enterprise architecture for business IT alignment », Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 6918 LNCS, p. 249-261, 2011.
K. Doumi, Baiem, S., et Baiena, K., « Modeling Approach Using Goal Modeling and Enterprise Architecture for Business IT Alignment », in MODEL AND DATA ENGINEERING, 2011, vol. 6918, p. 249-261.
2012
M. Kassou et Kjiri, L., « A maturity metric based approach for eliciting SOA security requirements », in Proceedings of the 2nd National Days of Network Security and Systems, JNS2 2012, 2012, p. 7-11.
Y. Baddi et Kettani, M. D. E. - C. El, « MC-PIM-SM: Multicast routing protocol PIM-SM with Multiple Cores Shared tree for mobile IPv6 environment », in 2nd International Conference on Innovative Computing Technology, INTECH 2012, 2012, p. 21-26.
Y. Baddi et Kettani, M. Dafir Ech-, « MC-PIM-SM: multicast routing protocol PIM-SM with Multiple Cores Shared Tree for mobile IPv6 environment », in 2012 SECOND INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGY (INTECH), 2012, p. 21-26.
A. Sabraoui, Ennouaary, A., Khriss, I., et M. Koutbi, E., « An MDA-based approach for WS composition using UML scenarios », in Proceedings of the 9th International Conference on Information Technology, ITNG 2012, 2012, p. 306-313.
E. I. Hassani, Kriouile, A., et Benghabrit, Y., « Measure of fuzzy presence of descriptors on Arabic Text Mining », in CiSt 2012 - Proceedings: 2012 Colloquium in Information Science and Technology, 2012, p. 58-63.
H. Baidouri, Hafiddi, H., Nassar, M., et Kriouile, A., « A mediator architecture for context-aware composition in SOA », in ICEIS 2012 - Proceedings of the 14th International Conference on Enterprise Information Systems, 2012, vol. 2 ISAS, p. 245-251.
H. Belaoud, Habbani, A., et J. Abbadi, E., « Mobile networks migration towards NGN », Journal of Theoretical and Applied Information Technology, vol. 36, p. 85-91, 2012.
M. Daoui, Belkadi, M., Chamek, L., Lalam, M., Hamrioui, S., et Berqia, A., « Mobility prediction and location management based on data mining », International Conference on Next Generation Networks and Services, NGNS, p. 137-140, 2012.
M. Elmaallam et Kriouile, A., « Model ISR3M for assessing maturity of IS risk management process: Case study », in CiSt 2012 - Proceedings: 2012 Colloquium in Information Science and Technology, 2012, p. 16-21.
H. Baidouri, Hafiddi, H., Nassar, M., et Kriouile, A., « A Model-driven Approach for Context-Aware Services Composition », in 2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2012, p. 693-698.
H. Baidouri, Hafiddi, H., Nassar, M., et Kriouile, A., « A model-driven approach for Context-Aware services composition », in Proceedings of 2012 International Conference on Multimedia Computing and Systems, ICMCS 2012, 2012, p. 693-698.
H. Bahtit et Regragui, B., « Modeling of the process of ISO 27005 standard [Modélisation des processus de la norme ISO 27005] », in Proceedings of the 2nd National Days of Network Security and Systems, JNS2 2012, 2012, p. 1-6.
M. M. E. El Aichi, « Moroccan E-government ten years evolutions », in ACM International Conference Proceeding Series, 2012, p. 492-493.
2013
S. Anter, Zellou, A., et Idri, A., « MATHIS: A new approach for creating views to materialize in a hybrid integration system », International Review on Computers and Software, vol. 8, p. 816-825, 2013.
A. Khiyaita et Zbakh, M., « Mean field game among cloud computing end users », in 2013 NATIONAL SECURITY DAYS (JNS3), 2013.
A. Khiyaita et Zbakh, M., « Mean field game among cloud computing end users », in 2013 National Security Days - 3eme Edition Des Journees Nationales de Securite, JNS3, 2013.
R. Ayadi et Benadada, Y., « Memetic algorithm for a multi-objective vehicle routing problem with multiple trips », International Journal of Computer Science and Applications, vol. 10, p. 72-91, 2013.
Ma Ghallali, Mir, AbEl, Ouahidi, BaEl, Bounabat, Bb, Hami, NcEl, et Elmir, Bb, « Mobile security: Designing a new framework limiting malware spread in the mobile cloud computing », Journal of Theoretical and Applied Information Technology, vol. 57, p. 354-366, 2013.
Ma Hanini, Haqiq, Abc d, et Berqia, Ae, Multicriteria queuing model to improve intra-user multi-flow qos in wireless cellular networks. 2013, p. 86-106.
N. Attaoui, Ganzha, M., Paprzycki, M., Wasielewska, K., et Essaaidi, M., « MULTIPLE EQUIVALENT SIMULTANEOUS OFFERS STRATEGY IN AN AGENT-BASED GRID RESOURCE BROKERING SYSTEM - INITIAL CONSIDERATIONS. », Scalable Computing: Practice & Experience, vol. 14, p. 83 - 94, 2013.
Na Attaoui, Ganzha, Mb, Paprzycki, Mb, Wasielewska, Kb, et Essaaidi, Mc, « Multiple equivalent simultaneous offers strategy in an agent-based grid resource brokering system-initial considerations », Scalable Computing, vol. 14, p. 83-94, 2013.
2014
N. Attaoui, Essaaidi, M., Ca), M. Paprzycki, et Ganzha, M., « Malicious Workers Tolerance in an Agent-Based Grid Resource Brokering System - Preliminary Considerations (Short Paper) », in 2014 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), VOL 2, 2014, p. 233-236.

Pages

Partenaires

Localisation

Suivez-nous sur

         

    

Contactez-nous

ENSIAS

Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc

  Télécopie : (+212) 5 37 68 60 78

  Secrétariat de direction : 06 61 48 10 97

        Secrétariat général : 06 61 34 09 27

        Service des affaires financières : 06 61 44 76 79

        Service des affaires estudiantines : 06 62 77 10 17 / n.mhirich@um5s.net.ma

        Résidences : 06 61 82 89 77

Contacts

    

    Compteur de visiteurs:546,783
    Education - This is a contributing Drupal Theme
    Design by WeebPal.