Publications

Export 1808 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
M. Zouina et Outtaj, B., « An aspiring solution to the MITM bootstrap vulnerability », in Proceedings of the 29th International Business Information Management Association Conference - Education Excellence and Innovation Management through Vision 2020: From Regional Development Sustainability to Global Economic Growth, 2017, p. 1615-1622.
K. Boukhayma et Elmanouar, A., « Assessing decision support systems success: A conceptual analysis », International Journal of Civil Engineering and Technology, vol. 9, p. 882-889, 2018.
Aa Idri, Hassani, Aa, et Abran, Ab, « Assessing RBFN-based software cost estimation models », in Proceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE, 2013, vol. 2013-January, p. 483-487.
A. Yousfi, Elyazidi, M. H., et Zellou, A., « Assessing the performance of a new semantic similarity measure designed for schema matching for mediation systems », Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 11055 LNAI, p. 64-74, 2018.
W. Hassen, Neifar, M., Cherif, H., Mahjoubi, M., Souissi, Y., Raddadi, N., Fava, F., et Cherif, A., « Assessment of genetic diversity and bioremediation potential of pseudomonads isolated from pesticide-contaminated artichoke farm soils », 3 Biotech, vol. 8, 2018.
A. Echchaachoui, Choukri, A., Habbani, A., et Elkoutbi, M., « Asymmetric and Dynamic Encryption for Routing Security in MANETs », in 2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2014, p. 825-830.
H. Routaib, Badidi, E., Sabir, E., et Elkoutbi, M., « An asymmetrical nash bargaining for adaptive and automated context negotiation in pervasive environments », in 2017 14th IEEE Annual Consumer Communications and Networking Conference, CCNC 2017, 2017, p. 732-736.
E. A. Afia, Benchakroun, A., Dussault, J. - P., et K. Yassini, E., « Asymptotic analysis of the trajectories of the logarithmic barrier algorithm without constraint qualifications », RAIRO - Operations Research, vol. 42, p. 157-198, 2008.
E. A. Afia, Benchakroun, A., Dussault, J. - P., et K. Yassini, E., « Asymptotic analysis of the trajectories of the logarithmic barrier algorithm without constraint qualifications », RAIRO-OPERATIONS RESEARCH, vol. 42, p. 157-198, 2008.
E. Illi, F. Bouanani, E., et Ayoub, F., « Asymptotic analysis of underwater communication system subject to κ-μ Shadowed fading channel », in 2017 13th International Wireless Communications and Mobile Computing Conference, IWCMC 2017, 2017, p. 855-860.
A. Maarof, Senhadji, M., Labbi, Z., et Belkasmi, M., « Authentication protocol conforming to EPC class-1 Gen-2 standard », in 2016 International Conference on Advanced Communication Systems and Information Security, ACOSIS 2016 - Proceedings, 2017.
A. Maarof, Senhadji, M., Labbi, Z., et Belkasmi, M., « Authentication protocol for securing internet of things », in ACM International Conference Proceeding Series, 2018.
Wa Krombi, Erradi, Ma, et Khoumsi, Ab, « Automata-based approach to design and analyze security policies », in 2014 12th Annual Conference on Privacy, Security and Trust, PST 2014, 2014, p. 306-313.
W. Krombi, Erradi, M., et Khoumsi, A., « Automata-Based Approach to Design and Analyze Security Policies », in 2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, p. 306-313.
A. Khoumsi et Erradi, M., « Automata-based bottom-up design of conflict-free security policies specified as policy expressions », Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 11028 LNCS, p. 343-357, 2019.
H. Benouda, Azizi, M., Moussaoui, M., et Esbai, R., « Automatic code generation within MDA approach for cross-platform mobiles apps », in Proceedings of EDIS 2017 - 1st International Conference on Embedded and Distributed Systems, 2018, vol. 2017-December, p. 1-5.
K. Souali, A. Afia, E., et Faizi, R., « An automatic ethical-based recommender system for e-commerce », in International Conference on Multimedia Computing and Systems -Proceedings, 2011.
E. B. Idrissi, Baina, S., et Baina, K., « Automatic generation of ontology from data models: A practical evaluation of existing approaches », in Proceedings - International Conference on Research Challenges in Information Science, 2013.
B. El Idrissi, Baina, S., et Baina, K., « Automatic Generation of Ontology from Data Models: A Practical Evaluation of Existing Approaches », in 2013 IEEE SEVENTH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS), 2013.
E. Bendriss et Regragui, B., « Automatic selection of filtering devices in a distributed intrusion prevension system », Journal of Theoretical and Applied Information Technology, vol. 53, p. 307-311, 2013.
A. Er-Rady, Faizi, R., Thami, R. O. H., et Housni, H., « Automatic sign language recognition: A survey », in Proceedings - 3rd International Conference on Advanced Technologies for Signal and Image Processing, ATSIP 2017, 2017.
M. Elallaoui, Nafil, K., et Touahni, R., « Automatic Transformation of User Stories into UML Use Case Diagrams using NLP Techniques », in Procedia Computer Science, 2018, vol. 130, p. 42-49.
M. C. Muenster, « Autonomy and the future of transportation », in AUVSI XPONENTIAL 2018, 2018.
B
S. Mensou, Essadki, A., Minka, I., Nasser, T., et Idrissi, B. B., « Backstepping Controller for a Variable Wind Speed Energy Conversion System Based on a DFIG », in Proceedings of 2017 International Renewable and Sustainable Energy Conference, IRSEC 2017, 2018.
E. K. Ouahabi, Roky, K., O. Mrabet, E., Aznabet, M., et Ennasar, M. A., « Bandwidth Enhancement of Complementary Split Ring Based Antenna », in International Symposium on Advanced Electrical and Communication Technologies, ISAECT 2018 - Proceedings, 2019.

Pages

Partenaires

Localisation


Location map

Suivez-nous sur

  

Contactez-nous

ENSIAS

Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc

Résultat de recherche d'images pour "icone fax" Télécopie : (+212) 5 37 77 72 30

    Compteur de visiteurs:283,077
    Education - This is a contributing Drupal Theme
    Design by WeebPal.