Publications

Export 1808 results:
Conference Paper
J. Maqboul et Bounabat, B., « An approach of data-driven framework alignment to knowledge base », in ACM International Conference Proceeding Series, 2018.
A. Khoumsi, Erradi, M., Ayache, M., et Krombi, W., « An Approach to Resolve NP-Hard Problems of Firewalls », in Networked Systems, NETYS 2016, 2016, vol. 9944, p. 229-243.
S. E. Manar El Bouanani et Kassou, I., « An approach using intertextual distance to detect web messages authors », in 2013 3rd International Symposium ISKO-Maghreb, 2013.
S. El Manar E. Bouanani et Kassou, I., « An approach using Intertextual Distance to detect Web Messages Authors », in 2013 3RD INTERNATIONAL SYMPOSIUM ISKO-MAGHREB, 2013.
L. Sinif et Bounabat, B., « Approaching an optimizing open linked government data portal », in ACM International Conference Proceeding Series, 2018, p. 135-139.
M. A. P. De Barros et M. Koutbi, E., « AQM applications in MAODV ad hoc network », in 16th International Conference on Telecommunications, ICT 2009, 2009, p. 37-40.
M. A. P. de Barros et Koutbi, M. El, « AQM applications in MAODV ad hoc network », in 2009 INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT), 2009, p. 37-40.
R. Moumen, Chiheb, R., Afia, A. E., et Faizi, R., « Arabic diacritization with gated recurrent unit », in ACM International Conference Proceeding Series, 2018.
S. Ouhbi, Fernandez-Aleman, J. Luis, Idri, A., et Pozo, J. Rivera, « Are Mobile Blood Donation Applications Green? », in 2015 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA), 2015.
Sa Ouhbi, Fernández-Alemán, J. La, Idri, Ab, et Pozo, J. Rc, « Are mobile blood donation applications green? », in 2015 10th International Conference on Intelligent Systems: Theories and Applications, SITA 2015, 2015.
R. Khaldi, A. Afia, E., Chiheb, R., et Faizi, R., « Artificial neural network based approach for blood demand forecasting: Fez transfusion blood center case study », in ACM International Conference Proceeding Series, 2017, vol. Part F129474.
Ia Slimani, Farissi, IbEl, et Achchab, Sa, « Artificial neural networks for demand forecasting: Application using Moroccan supermarket data », in International Conference on Intelligent Systems Design and Applications, ISDA, 2016, vol. 2016-June, p. 266-271.
M. Zouina et Outtaj, B., « An aspiring solution to the MITM bootstrap vulnerability », in Proceedings of the 29th International Business Information Management Association Conference - Education Excellence and Innovation Management through Vision 2020: From Regional Development Sustainability to Global Economic Growth, 2017, p. 1615-1622.
Aa Idri, Hassani, Aa, et Abran, Ab, « Assessing RBFN-based software cost estimation models », in Proceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE, 2013, vol. 2013-January, p. 483-487.
A. Echchaachoui, Choukri, A., Habbani, A., et Elkoutbi, M., « Asymmetric and Dynamic Encryption for Routing Security in MANETs », in 2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2014, p. 825-830.
H. Routaib, Badidi, E., Sabir, E., et Elkoutbi, M., « An asymmetrical nash bargaining for adaptive and automated context negotiation in pervasive environments », in 2017 14th IEEE Annual Consumer Communications and Networking Conference, CCNC 2017, 2017, p. 732-736.
E. Illi, F. Bouanani, E., et Ayoub, F., « Asymptotic analysis of underwater communication system subject to κ-μ Shadowed fading channel », in 2017 13th International Wireless Communications and Mobile Computing Conference, IWCMC 2017, 2017, p. 855-860.
A. Maarof, Senhadji, M., Labbi, Z., et Belkasmi, M., « Authentication protocol conforming to EPC class-1 Gen-2 standard », in 2016 International Conference on Advanced Communication Systems and Information Security, ACOSIS 2016 - Proceedings, 2017.
A. Maarof, Senhadji, M., Labbi, Z., et Belkasmi, M., « Authentication protocol for securing internet of things », in ACM International Conference Proceeding Series, 2018.
Wa Krombi, Erradi, Ma, et Khoumsi, Ab, « Automata-based approach to design and analyze security policies », in 2014 12th Annual Conference on Privacy, Security and Trust, PST 2014, 2014, p. 306-313.
W. Krombi, Erradi, M., et Khoumsi, A., « Automata-Based Approach to Design and Analyze Security Policies », in 2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, p. 306-313.
H. Benouda, Azizi, M., Moussaoui, M., et Esbai, R., « Automatic code generation within MDA approach for cross-platform mobiles apps », in Proceedings of EDIS 2017 - 1st International Conference on Embedded and Distributed Systems, 2018, vol. 2017-December, p. 1-5.
K. Souali, A. Afia, E., et Faizi, R., « An automatic ethical-based recommender system for e-commerce », in International Conference on Multimedia Computing and Systems -Proceedings, 2011.
E. B. Idrissi, Baina, S., et Baina, K., « Automatic generation of ontology from data models: A practical evaluation of existing approaches », in Proceedings - International Conference on Research Challenges in Information Science, 2013.
B. El Idrissi, Baina, S., et Baina, K., « Automatic Generation of Ontology from Data Models: A Practical Evaluation of Existing Approaches », in 2013 IEEE SEVENTH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS), 2013.

Pages

Partenaires

Localisation


Location map

Suivez-nous sur

  

Contactez-nous

ENSIAS

Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc

Résultat de recherche d'images pour "icone fax" Télécopie : (+212) 5 37 77 72 30

    Compteur de visiteurs:302,100
    Education - This is a contributing Drupal Theme
    Design by WeebPal.