Publications

Export 159 results:
Filters: First Letter Of Title is M  [Clear All Filters]
2014
M. AaEl Khaddar, Chraibi, Mb, Harroud, Hc, Boulmalf, Md, Elkoutbi, Ma, et Maach, Ab, « Modeling and enforcing security and service control policies using FlexRFID middleware: Healthcare scenarios », in Proceedings of 2014 Science and Information Conference, SAI 2014, 2014, p. 461-467.
Ha Routaib, Badidi, Eb, Elmachkour, Ma, Sabir, Ec, et Elkoutbi, Ma, « Modeling and evaluating a cloudlet-based architecture for Mobile Cloud Computing », in 2014 9th International Conference on Intelligent Systems: Theories and Applications, SITA 2014, 2014.
H. Routaib, Elmachkour, M., Sabir, E., Badidi, E., et Elkoutbi, M., « Modeling and Evaluating a Cloudlet-based Architecture for Mobile Cloud Computing », in 2014 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA'14), 2014.
Ea Elgharbaoui, Essadki, Ab, et Nasser, Tc, « MPPT commands for a photovoltaic generator using the Incremental Conductance Method and the fuzzy logic command », in 2014 International Conference on Electrical Sciences and Technologies in Maghreb, CISTEM 2014, 2014.
E. Elgharbaoui, Essadki, A., et Nasser, T., « MPPT Commands for a photovoltaic generator using the Incremental Conductance Method and the fuzzy logic command », in 2014 INTERNATIONAL CONFERENCE ON ELECTRICAL SCIENCES AND TECHNOLOGIES IN MAGHREB (CISTEM), 2014.
Na Adadi, Berrada, Ma, Chenouni, Da, et Bounabat, Bb, « Multi-agent architecture for business modeling of web services composition based on WS2JADE framework », International Review on Computers and Software, vol. 9, p. 1667-1674, 2014.
M. Rhanoui et Asri, B. El, « A Multilevel Contract Model for Dependable Feature-Oriented Components », in 2014 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA'14), 2014.
M. Rhanoui et B. Asri, E., « A multilevel contract model for dependable Feature-Oriented components », in 2014 9th International Conference on Intelligent Systems: Theories and Applications, SITA 2014, 2014.
Aa Elmir, Hami, NbEl, Elmir, Ba, Bounabat, Ba, Ellaia, Rc, et Itmi, Md, « Multiobjective optimization of information system quality enhancement », Journal of Theoretical and Applied Information Technology, vol. 70, p. 52-61, 2014.
Y. Baddi et Kettani, M. Dafir Ech-, « Multiple Active Cores-based Shared Multicast Tree for mobile IPv6 environment », in 2014 THIRD IEEE INTERNATIONAL COLLOQUIUM IN INFORMATION SCIENCE AND TECHNOLOGY (CIST'14), 2014, p. 378-383.
2013
S. Anter, Zellou, A., et Idri, A., « MATHIS: A new approach for creating views to materialize in a hybrid integration system », International Review on Computers and Software, vol. 8, p. 816-825, 2013.
A. Khiyaita et Zbakh, M., « Mean field game among cloud computing end users », in 2013 National Security Days - 3eme Edition Des Journees Nationales de Securite, JNS3, 2013.
A. Khiyaita et Zbakh, M., « Mean field game among cloud computing end users », in 2013 NATIONAL SECURITY DAYS (JNS3), 2013.
R. Ayadi et Benadada, Y., « Memetic algorithm for a multi-objective vehicle routing problem with multiple trips », International Journal of Computer Science and Applications, vol. 10, p. 72-91, 2013.
Ma Ghallali, Mir, AbEl, Ouahidi, BaEl, Bounabat, Bb, Hami, NcEl, et Elmir, Bb, « Mobile security: Designing a new framework limiting malware spread in the mobile cloud computing », Journal of Theoretical and Applied Information Technology, vol. 57, p. 354-366, 2013.
Ma Hanini, Haqiq, Abc d, et Berqia, Ae, Multicriteria queuing model to improve intra-user multi-flow qos in wireless cellular networks. 2013, p. 86-106.
Na Attaoui, Ganzha, Mb, Paprzycki, Mb, Wasielewska, Kb, et Essaaidi, Mc, « Multiple equivalent simultaneous offers strategy in an agent-based grid resource brokering system-initial considerations », Scalable Computing, vol. 14, p. 83-94, 2013.
N. Attaoui, Ganzha, M., Paprzycki, M., Wasielewska, K., et Essaaidi, M., « MULTIPLE EQUIVALENT SIMULTANEOUS OFFERS STRATEGY IN AN AGENT-BASED GRID RESOURCE BROKERING SYSTEM - INITIAL CONSIDERATIONS. », Scalable Computing: Practice & Experience, vol. 14, p. 83 - 94, 2013.
2012
M. Kassou et Kjiri, L., « A maturity metric based approach for eliciting SOA security requirements », in Proceedings of the 2nd National Days of Network Security and Systems, JNS2 2012, 2012, p. 7-11.
Y. Baddi et Kettani, M. D. E. - C. El, « MC-PIM-SM: Multicast routing protocol PIM-SM with Multiple Cores Shared tree for mobile IPv6 environment », in 2nd International Conference on Innovative Computing Technology, INTECH 2012, 2012, p. 21-26.
Y. Baddi et Kettani, M. Dafir Ech-, « MC-PIM-SM: multicast routing protocol PIM-SM with Multiple Cores Shared Tree for mobile IPv6 environment », in 2012 SECOND INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGY (INTECH), 2012, p. 21-26.
A. Sabraoui, Ennouaary, A., Khriss, I., et M. Koutbi, E., « An MDA-based approach for WS composition using UML scenarios », in Proceedings of the 9th International Conference on Information Technology, ITNG 2012, 2012, p. 306-313.
E. I. Hassani, Kriouile, A., et Benghabrit, Y., « Measure of fuzzy presence of descriptors on Arabic Text Mining », in CiSt 2012 - Proceedings: 2012 Colloquium in Information Science and Technology, 2012, p. 58-63.
H. Baidouri, Hafiddi, H., Nassar, M., et Kriouile, A., « A mediator architecture for context-aware composition in SOA », in ICEIS 2012 - Proceedings of the 14th International Conference on Enterprise Information Systems, 2012, vol. 2 ISAS, p. 245-251.
H. Belaoud, Habbani, A., et J. Abbadi, E., « Mobile networks migration towards NGN », Journal of Theoretical and Applied Information Technology, vol. 36, p. 85-91, 2012.

Pages

Partenaires

Localisation


Location map

Suivez-nous sur

  

Contactez-nous

ENSIAS

Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc

Résultat de recherche d'images pour "icone fax" Télécopie : (+212) 5 37 77 72 30

    Compteur de visiteurs:280,077
    Education - This is a contributing Drupal Theme
    Design by WeebPal.