Publications

Export 133 results:
Filters: First Letter Of Last Name is K  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
K
Aa Kobbane, Ben-Othman, Jb, et Koutbi, M. Ea, « Packet dropping for real-time applications in wireless networks », in IEEE International Conference on Communications, 2013, p. 2949-2953.
A. Kobbane, Koulali, M. - A., Tembine, H., M. Koutbi, E., et Ben-Othman, J., « Dynamic Power Control with Energy Constraint for Multimedia Wireless Sensor Networks », in 2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012.
A. Kobbane, Ben-Othman, J., et M. Koutbi, E., « Packet dropping for Real-Time Applications in Wireless Networks », in 2013 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2013, p. 2949-2953.
A. Kobbane et Ibrahimi, K., « Foreword », in Proceedings - 2017 International Conference on Wireless Networks and Mobile Communications, WINCOM 2017, 2017.
A. Kobbane, El-Azouzi, R., Ibrahimi, K., Samanta, S. Kumar, et Bouyakhf, E. - H., « The Uplink Capacity Evaluation of Wireless Networks: Spectral Analysis Approach. », Journal of Computing & Information Technology, vol. 18, p. 1 - 17, 2010.
A. Khtira, Benlarabi, A., et Asri, B. El, « Detecting Feature Duplication in Natural Language Specifications when Evolving Software Product Lines », in ENASE 2015 - PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING, 2015, p. 257-262.
A. Khtira, Benlarabi, A., et Asri, B. El, « Towards a Requirement-Based Approach to Support Early Decisions in Software Product Line Engineering », in 2014 SECOND WORLD CONFERENCE ON COMPLEX SYSTEMS (WCCS), 2014, p. 152-157.
R. Khtira, Elasri, B., et Rhanoui, M., « From data to big data: Moroccan public sector », in ACM International Conference Proceeding Series, 2017, vol. Part F129474.
A. Khtira, Benlarabi, A., et B. Asri, E., « Duplication detection when evolving feature models of software product lines », Information (Switzerland), vol. 6, p. 592-612, 2015.
A. Khtira, « Towards a framework for feature deduplication during software product lines evolution », in CEUR Workshop Proceedings, 2015, vol. 1415, p. 65-73.
A. Khtira, Benlarabi, A., et B. Asri, E., « Towards a requirement-based approach to support early decisions in software product line engineering », in 2014 2nd World Conference on Complex Systems, WCCS 2014, 2014, p. 152-157.
I. Khriss, Koutbi, M. E., et Dkiouak, Y., « Towards change and verification support in collaborative business processes », in Proceedings of 2012 International Conference on Complex Systems, ICCS 2012, 2012.
Aa Khoumsi, Erradi, Mb, Ayache, Mb, et Krombi, Wb, « An approach to resolve NP-hard problems of firewalls », Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 9944 LNCS, p. 229-243, 2016.
A. Khoumsi, Krombi, W., et Erradi, M., « A Formal Approach to Verify Completeness and Detect Anomalies in Firewall Security Policies », in FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014), 2015, vol. 8930, p. 221-236.
A. Khoumsi, Erradi, M., et Krombi, W., « A formal basis for the design and analysis of firewall security policies », Journal of King Saud University - Computer and Information Sciences, vol. 30, p. 51-66, 2018.
A. Khoumsi, Erradi, M., et Krombi, W., « A formal basis for the design and analysis of firewall security policies », Journal of King Saud University - Computer and Information Sciences, vol. 30, p. 51-66, 2018.
Aa Khoumsi, Krombi, Wb, et Erradi, Mb, « A formal approach to verify completeness and detect anomalies in firewall security policies », Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8930, p. 221-236, 2015.
Aa Khoumsi, Erradi, Mb, et Krombi, Wb, « A formal basis for the design and analysis of firewall security policies », Journal of King Saud University - Computer and Information Sciences, 2016.
A. Khoumsi et Erradi, M., « Automata-based bottom-up design of conflict-free security policies specified as policy expressions », Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 11028 LNCS, p. 343-357, 2019.
A. Khoumsi, Erradi, M., Ayache, M., et Krombi, W., « An Approach to Resolve NP-Hard Problems of Firewalls », in Networked Systems, NETYS 2016, 2016, vol. 9944, p. 229-243.
Ia Khoufi, Minet, Pa, Koulali, M. - Ab, et Kobbane, Ac, « Path planning of mobile sinks in charge of data gathering: A coalitional game theory approach », in 2016 IEEE 35th International Performance Computing and Communications Conference, IPCCC 2016, 2016.
I. Khoufi, Minet, P., Koulali, M. - A., et Kobbane, A., « Path planning of mobile sinks in charge of data gathering: A coalitional game theory approach », in 2016 IEEE 35th International Performance Computing and Communications Conference, IPCCC 2016, 2017.
Ia Khoufi, Minet, Pa, Koulali, M. - Ab, et Erradi, Mc, « A game theory-based approach for robots deploying wireless sensor nodes », in IWCMC 2015 - 11th International Wireless Communications and Mobile Computing Conference, 2015, p. 557-562.
I. Khoufi, Minet, P., Koulali, M. - A., et Erradi, M., « A Game Theory-Based Approach for Robots Deploying Wireless Sensor Nodes », in 2015 INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2015, p. 557-562.
A. Khiyaita et Zbakh, M., « Mean field game among cloud computing end users », in 2013 NATIONAL SECURITY DAYS (JNS3), 2013.

Pages

Partenaires

Localisation

Suivez-nous sur

  

Contactez-nous

ENSIAS

Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc

 Télécopie : (+212) 5 37 77 72 30

  Secrétariat de direction : 06 61 48 10 97

        Secrétariat général : 06 61 70 77 02

        Service des affaires estudiantines : 06 62 44 87 47

        Résidences : 06 61 82 89 77

    

Education - This is a contributing Drupal Theme
Design by WeebPal.