Publications

Export 1808 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
A. Aghmadi, Erradi, M., et Kobbane, A., « SNA: Detecting Influencers over Social Networks », in Networked Systems, NETYS 2016, 2016, vol. 9944, p. 388.
Aa Aghmadi, Bouksim, Ia, Kobbane, Aa, et Taleb, Tb, « A MTC traffic generation and QCI priority-first scheduling algorithm over LTE », in International Conference on Wireless Networks and Mobile Communications, WINCOM 2015, 2015.
A. Ahmadi, Bouanani, F. El, et Ben-Azza, H., « New Iterative Decoding Algorithms of 2D Product Block Codes », in 2014 WORLD CONGRESS ON COMPUTER APPLICATIONS AND INFORMATION SYSTEMS (WCCAIS), 2014.
A. Ahmadi, Bouanani, F. El, Ben-Azza, H., et Benghabrit, Y., « Reduced Complexity Iterative Decoding of 3D-Product Block Codes Based on Genetic Algorithms. », Journal of Electrical & Computer Engineering, p. 1 - 8, 2012.
Aa Ahmadi, Ben-Azza, Ha, et Bouanani, FbEl, « New iterative decoding algorithms of 2D product block codes », in 2014 World Congress on Computer Applications and Information Systems, WCCAIS 2014, 2014.
M. M. E. El Aichi et Kettani, M. D. E. - C. El, « Maturity models transition from eGovernment interoperability to t-government: Restyling dynamic public services through integrated transformation of service delivery », in Proceedings of the European Conference on e-Government, ECEG, 2011, p. 591-602.
M. Mohyi Eddi Aichi et Kettani, M. Dafir Ech-, « Maturity Models Transition from eGovernment Interoperability to T-Government: Restyling Dynamic Public Services Through Integrated Transformation of Service Delivery », in PROCEEDINGS OF THE 11TH EUROPEAN CONFERENCE ON EGOVERNMENT, 2011, p. 591-602.
M. M. E. El Aichi, « Moroccan E-government ten years evolutions », in ACM International Conference Proceeding Series, 2012, p. 492-493.
O. E. Aissaoui, Madani, Y. E. A. El, Oughdir, L., et Allioui, Y. E., « Combining supervised and unsupervised machine learning algorithms to predict the learners' learning styles », in Procedia Computer Science, 2019, vol. 148, p. 87-96.
W. Aitfares, Kobbane, A., et Kriouile, A., « Suspicious behavior detection of people by monitoring camera », in International Conference on Multimedia Computing and Systems -Proceedings, 2017, p. 113-117.
M. E. Ajana, Harroud, H., Boulmalf, M., et Elkoutbi, M., « FlexRFID middleware in the supply chain: Strategic values and challenges », International Journal of Mobile Computing and Multimedia Communications, vol. 3, p. 19-32, 2011.
M. E. Ka Ajana, Mohammed, Eab, et Boulmalf, Mc, Middleware architecture in WSN. 2015, p. 69-94.
M. El Akrouchi, Benbrahim, H., et Kassou, I., « Early Warning Signs Detection in Competitive Intelligence », in INNOVATION VISION 2020: FROM REGIONAL DEVELOPMENT SUSTAINABILITY TO GLOBAL ECONOMIC GROWTH, VOL I-VI, 2015, p. 1014-1024.
A. El Alami, Sadok, H., et Elhaoud, N., « Cloud computing & the organizational performance Different approach of assessment », in 2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, p. 318-322.
E. A. Alami, Sadok, H., et Elhaoud, N., « Cloud computing & the organizational performance: Different approach of assessment », in Proceedings of 2015 International Conference on Cloud Computing Technologies and Applications, CloudTech 2015, 2015.
Sa Alaoui, Idrissi, Y. E. B. Eb, et Ajhoun, Ra, « Building Rich User Profile Based on Intentional Perspective », in Procedia Computer Science, 2015, vol. 73, p. 342-349.
Sa Alaoui, Idrissi, Y. E. BbEl, et Ajhoun, Ra, « Intentional approach to improve the discovery of Web services », in Proceedings - International Conference on Computer Vision and Image Analysis Applications, ICCVIA 2015, 2015.
S. Alaoui, Idrissi, Y. El Bouzekr, et Ajhoun, R., « Intentional approach to improve the discovery of Web services », in INTERNATIONAL CONFERENCE ON COMPUTER VISION AND IMAGE ANALYSIS APPLICATIONS, 2015.
S. Alaoui, Ajhoun, R., et Y. Idrissi, E. Bouzekri E., « Semantic approach for the building of user profile for recommender system », in Proceedings - 2016 Global Summit on Computer and Information Technology, GSCIT 2016, 2017, p. 114-119.
S. Alaoui, Idrissi, Y. El Bouzekr, et Ajhoun, R., « Building rich user profile based on intentional perspective », in INTERNATIONAL CONFERENCE ON ADVANCED WIRELESS INFORMATION AND COMMUNICATION TECHNOLOGIES (AWICT 2015), 2015, vol. 73, p. 342-349.
Sa Alaoui, Idrissi, Y. E. BbEl, Ajhoun, Ra, Mendili, FbEl, et Benfaress, Cb, « New approach for service discovery and prediction based on intentional perspective and recommendation », International Review on Computers and Software, vol. 10, p. 1202-1208, 2015.
Y. A. Alaoui, A. Hassouny, E., R. Thami, O. Haj, et Tairi, H., « Human fall detection using von mises distribution and motion vectors of interest points », in ACM International Conference Proceeding Series, 2017, vol. Part F129474.
A. Alfath, Baina, K., et Baina, S., « Cloud Computing Security: Fine-grained analysis and Security approaches », in 2013 NATIONAL SECURITY DAYS (JNS3), 2013.
A. Alfath, Baina, K., et Baina, S., « Cloud computing security: Fine-grained analysis and security approaches », in 2013 National Security Days - 3eme Edition Des Journees Nationales de Securite, JNS3, 2013.
A. Alfath, Baina, S., et Baina, K., « Elasticity and Scalability Centric Quality Model for the Cloud », in 2014 THIRD IEEE INTERNATIONAL COLLOQUIUM IN INFORMATION SCIENCE AND TECHNOLOGY (CIST'14), 2014, p. 135-140.

Pages

Partenaires

Localisation


Location map

Suivez-nous sur

  

Contactez-nous

ENSIAS

Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc

Résultat de recherche d'images pour "icone fax" Télécopie : (+212) 5 37 77 72 30

    Compteur de visiteurs:301,852
    Education - This is a contributing Drupal Theme
    Design by WeebPal.