Publications

Export 735 results:
Filters: First Letter Of Last Name is E  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
A. Echchaachoui, Choukri, A., Habbani, A., et Elkoutbi, M., « Asymmetric and Dynamic Encryption for Routing Security in MANETs », in 2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2014, p. 825-830.
A. Echchaachoui, Choukri, A., Habbani, A., et Elkoutbi, M., « Asymmetric and Dynamic Encryption for Routing Security in MANETs », in 2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2014, p. 825-830.
H. Routaib, Badidi, E., Sabir, E., et Elkoutbi, M., « An asymmetrical nash bargaining for adaptive and automated context negotiation in pervasive environments », in 2017 14th IEEE Annual Consumer Communications and Networking Conference, CCNC 2017, 2017, p. 732-736.
Wa Krombi, Erradi, Ma, et Khoumsi, Ab, « Automata-based approach to design and analyze security policies », in 2014 12th Annual Conference on Privacy, Security and Trust, PST 2014, 2014, p. 306-313.
W. Krombi, Erradi, M., et Khoumsi, A., « Automata-Based Approach to Design and Analyze Security Policies », in 2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, p. 306-313.
A. Khoumsi et Erradi, M., « Automata-based bottom-up design of conflict-free security policies specified as policy expressions », Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 11028 LNCS, p. 343-357, 2019.
H. Benouda, Azizi, M., Moussaoui, M., et Esbai, R., « Automatic code generation within MDA approach for cross-platform mobiles apps », in Proceedings of EDIS 2017 - 1st International Conference on Embedded and Distributed Systems, 2018, vol. 2017-December, p. 1-5.
A. Er-Rady, Faizi, R., Thami, R. O. H., et Housni, H., « Automatic sign language recognition: A survey », in Proceedings - 3rd International Conference on Advanced Technologies for Signal and Image Processing, ATSIP 2017, 2017.
M. Elallaoui, Nafil, K., et Touahni, R., « Automatic Transformation of User Stories into UML Use Case Diagrams using NLP Techniques », in Procedia Computer Science, 2018, vol. 130, p. 42-49.
B
S. Mensou, Essadki, A., Minka, I., Nasser, T., et Idrissi, B. B., « Backstepping Controller for a Variable Wind Speed Energy Conversion System Based on a DFIG », in Proceedings of 2017 International Renewable and Sustainable Energy Conference, IRSEC 2017, 2018.
E. K. Ouahabi, Roky, K., O. Mrabet, E., Aznabet, M., et Ennasar, M. A., « Bandwidth Enhancement of Complementary Split Ring Based Antenna », in International Symposium on Advanced Electrical and Communication Technologies, ISAECT 2018 - Proceedings, 2019.
Ha Routaib, Badidi, Eb, Sabir, Ec, et Elkoutbi, Ma, « A bargaining nash game based adaptive negotiation of context level agreements for pervasive systems », Lecture Notes in Electrical Engineering, vol. 366, p. 91-104, 2016.
H. Routaib, Badidi, E., Sabir, E., et Elkoutbi, M., « A Bargaining Nash Game Based Adaptive Negotiation of Context Level Agreements for Pervasive Systems », in ADVANCES IN UBIQUITOUS NETWORKING, 2016, vol. 366, p. 91-104.
A. Choukri, Habbani, A., et Elkoutbi, M., « Behavior of ad hoc routing protocols in multi service traffic », Journal of Theoretical and Applied Information Technology, vol. 43, p. 208-213, 2012.
B. Elmaroud, Faqihi, M. A., Abbad, M., et Aboutajdine, D., « BER analysis of FBMC based multi-cellular networks in the presence of synchronization errors and HPA NLD », in IEEE Vehicular Technology Conference, 2017.
M. Elmouhtadi, Lafkik, M., et Elfkihi, S., « Biometric protection approach based on fingerprint hierarchical identification », International Journal of Applied Engineering Research, vol. 12, p. 11007-11014, 2017.
M. Elmouhtadi, Lafkik, M., et Elfkihi, S., « Biometric protection approach based on fingerprint hierarchical identification », International Journal of Applied Engineering Research, vol. 12, p. 11007-11014, 2017.
R. Zennou, Atig, M. F., Biswas, R., Bouajjani, A., Enea, C., et Erradi, M., « Boosting Sequential Consistency Checking Using Saturation », Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12302 LNCS, p. 360-376, 2020.
R. Zennou, Atig, M. F., Biswas, R., Bouajjani, A., Enea, C., et Erradi, M., « Boosting Sequential Consistency Checking Using Saturation », Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12302 LNCS, p. 360-376, 2020.
I. Aznabet, Ennasar, M. A., O. Mrabet, E., G. Vera, A., Khalladi, M., et Tedjni, S., « A broadband modified T-shaped planar dipole antenna for UHF RFID tag applications », Progress In Electromagnetics Research C, vol. 73, p. 137-144, 2017.

Pages

Partenaires

Localisation

Suivez-nous sur

         

    

Contactez-nous

ENSIAS

Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc

  Télécopie : (+212) 5 37 68 60 78

  Secrétariat de direction : 06 61 48 10 97

        Secrétariat général : 06 61 34 09 27

        Service des affaires financières : 06 61 44 76 79

        Service des affaires estudiantines : 06 62 77 10 17 / n.mhirich@um5s.net.ma

        Résidences : 06 61 82 89 77

Contacts

    

    Compteur de visiteurs:543,018
    Education - This is a contributing Drupal Theme
    Design by WeebPal.