LES DERNIÈRES INFORMATIONS
Publications
Conference Paper
A. Khoumsi, Erradi, M., Ayache, M., et Krombi, W.,
« An Approach to Resolve NP-Hard Problems of Firewalls », in
Networked Systems, NETYS 2016, 2016, vol. 9944, p. 229-243.
M. A. P. De Barros et M. Koutbi, E.,
« AQM applications in MAODV ad hoc network », in
16th International Conference on Telecommunications, ICT 2009, 2009, p. 37-40.
M. A. P. de Barros et Koutbi, M. El,
« AQM applications in MAODV ad hoc network », in
2009 INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT), 2009, p. 37-40.
Sa Ouhbi, Fernández-Alemán, J. La, Idri, Ab, et Pozo, J. Rc,
« Are mobile blood donation applications green? », in
2015 10th International Conference on Intelligent Systems: Theories and Applications, SITA 2015, 2015.
S. Ouhbi, Fernandez-Aleman, J. Luis, Idri, A., et Pozo, J. Rivera,
« Are Mobile Blood Donation Applications Green? », in
2015 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA), 2015.
R. Khaldi, A. Afia, E., Chiheb, R., et Faizi, R.,
« Artificial neural network based approach for blood demand forecasting: Fez transfusion blood center case study », in
ACM International Conference Proceeding Series, 2017, vol. Part F129474.
Ia Slimani, Farissi, IbEl, et Achchab, Sa,
« Artificial neural networks for demand forecasting: Application using Moroccan supermarket data », in
International Conference on Intelligent Systems Design and Applications, ISDA, 2016, vol. 2016-June, p. 266-271.
M. Zouina et Outtaj, B.,
« An aspiring solution to the MITM bootstrap vulnerability », in
Proceedings of the 29th International Business Information Management Association Conference - Education Excellence and Innovation Management through Vision 2020: From Regional Development Sustainability to Global Economic Growth, 2017, p. 1615-1622.
Aa Idri, Hassani, Aa, et Abran, Ab,
« Assessing RBFN-based software cost estimation models », in
Proceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE, 2013, vol. 2013-January, p. 483-487.
A. Echchaachoui, Choukri, A., Habbani, A., et Elkoutbi, M.,
« Asymmetric and Dynamic Encryption for Routing Security in MANETs », in
2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2014, p. 825-830.
H. Routaib, Badidi, E., Sabir, E., et Elkoutbi, M.,
« An asymmetrical nash bargaining for adaptive and automated context negotiation in pervasive environments », in
2017 14th IEEE Annual Consumer Communications and Networking Conference, CCNC 2017, 2017, p. 732-736.
A. Maarof, Senhadji, M., Labbi, Z., et Belkasmi, M.,
« Authentication protocol conforming to EPC class-1 Gen-2 standard », in
2016 International Conference on Advanced Communication Systems and Information Security, ACOSIS 2016 - Proceedings, 2017.
Wa Krombi, Erradi, Ma, et Khoumsi, Ab,
« Automata-based approach to design and analyze security policies », in
2014 12th Annual Conference on Privacy, Security and Trust, PST 2014, 2014, p. 306-313.
W. Krombi, Erradi, M., et Khoumsi, A.,
« Automata-Based Approach to Design and Analyze Security Policies », in
2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, p. 306-313.
H. Benouda, Azizi, M., Moussaoui, M., et Esbai, R.,
« Automatic code generation within MDA approach for cross-platform mobiles apps », in
Proceedings of EDIS 2017 - 1st International Conference on Embedded and Distributed Systems, 2018, vol. 2017-December, p. 1-5.
K. Souali, A. Afia, E., et Faizi, R.,
« An automatic ethical-based recommender system for e-commerce », in
International Conference on Multimedia Computing and Systems -Proceedings, 2011.
Pages
Compteur de visiteurs:373,941
Education - This is a contributing Drupal Theme
Design by
WeebPal.