Publications

Export 1807 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
N. Assad, Elbhiri, B., Faqihi, M. Ahmed, Ouadou, M., et Aboutajdine, D., « Analysis of the Deployment Quality for Intrusion Detection in Wireless Sensor Networks », JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS, 2015.
N. Assad, Elbhiri, B., Faqihi, M. Ahmed, Ouadou, M., et Aboutajdine, D., « On the Deployment Quality for Multi-intrusion Detection in Wireless Sensor Networks », in PROCEEDINGS OF THE MEDITERRANEAN CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES 2015 (MEDCT 2015), VOL 2, 2016, vol. 381, p. 469-478.
Na Assad, Elbhiri, Bb, Fkihi, ScEl, Faqihi, M. Ac, Ouadou, Ma, et Aboutajdine, Da, « Short: Intrusion detection quality analysis for homogeneous wireless sensor networks », Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8593 LNCS, p. 324-329, 2014.
Na Assad, Elbhiri, Bb, Faqihi, M. Ac, Ouadou, Ma, et Aboutajdine, Da, « Efficient deployment quality analysis for intrusion detection in wireless sensor networks », Wireless Networks, vol. 22, p. 991-1006, 2016.
Na Assad, Elbhiri, Bb, Faqihi, M. Ac, Ouadou, Ma, et Aboutajdine, Da, « Analysis of the deployment quality for intrusion detection in wireless sensor networks », Journal of Computer Networks and Communications, vol. 2015, 2015.
S. Assami, Daoudi, N., et Ajhoun, R., « Ontology-based modeling for a personalized mooc recommender system », Smart Innovation, Systems and Technologies, vol. 111, p. 21-28, 2019.
S. Assami, Daoudi, N., et Ajhoun, R., « Personalization criteria for enhancing learner engagement in MOOC platforms », in IEEE Global Engineering Education Conference, EDUCON, 2018, vol. 2018-April, p. 1265-1272.
B. Assila, Kobbaney, A., Elmachkourz, M., et M. Koutbi, E., « A dynamic Stackelberg-Cournot game for competitive content caching in 5G networks », in Proceedings - 2017 International Conference on Wireless Networks and Mobile Communications, WINCOM 2017, 2017.
B. Assila, Kobbane, A., M. Koutbi, E., Ben-Othman, J., et Mokdad, L., « Caching as a Service in 5G Networks: Intelligent Transport and Video on Demand Scenarios », in 2018 IEEE Global Communications Conference, GLOBECOM 2018 - Proceedings, 2019.
B. Assila, Kobbane, A., Walid, A., et M. Koutbi, E., « Achieving low-energy consumption in fog computing environment: A matching game approach », in 19th IEEE Mediterranean Eletrotechnical Conference, MELECON 2018 - Proceedings, 2018, p. 213-218.
B. Assila, Kobbane, A., et M. Koutbi, E., « A Many-To-One Matching Game Approach to Achieve Low-Latency Exploiting Fogs and Caching », in 2018 9th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2018 - Proceedings, 2018, vol. 2018-January, p. 1-2.
B. Assila, Kobbane, A., Ben-Othman, J., et Koutbi, M. E., « Caching as a Service for 5G Networks: A Matching Game Approach for CaaS Resource Allocation », in Proceedings - IEEE Symposium on Computers and Communications, 2018, vol. 2018-June, p. 1193-1198.
B. Assila, Kobbane, A., et M. Koutbi, E., « A Cournot Economic Pricing Model for Caching Resource Management in 5G Wireless Networks », in 2018 14th International Wireless Communications and Mobile Computing Conference, IWCMC 2018, 2018, p. 1345-1350.
N. Attaoui, Essaaidi, M., Ca), M. Paprzycki, et Ganzha, M., « Malicious Workers Tolerance in an Agent-Based Grid Resource Brokering System - Preliminary Considerations (Short Paper) », in 2014 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), VOL 2, 2014, p. 233-236.
N. Attaoui, Ganzha, M., Paprzycki, M., Wasielewska, K., et Essaaidi, M., « MULTIPLE EQUIVALENT SIMULTANEOUS OFFERS STRATEGY IN AN AGENT-BASED GRID RESOURCE BROKERING SYSTEM - INITIAL CONSIDERATIONS. », Scalable Computing: Practice & Experience, vol. 14, p. 83 - 94, 2013.
Na Attaoui, Ganzha, Mb, Paprzycki, Mb, Wasielewska, Kb, et Essaaidi, Mc, « Multiple equivalent simultaneous offers strategy in an agent-based grid resource brokering system-initial considerations », Scalable Computing, vol. 14, p. 83-94, 2013.
N. Attaoui, Bendahmane, A., Essaaidi, M., Sanyal, S., Ganzha, M., Paprzycki, M., et Wasielewska, K., « MALICIOUS WORKERS TOLERANCE IN AN AGENT-BASED GRID RESOURCE BROKERING SYSTEM. », IADIS International Journal on Computer Science & Information Systems, vol. 9, p. 55 - 70, 2014.
Na Attaoui, Essaaidi, Mb, Paprzycki, Mc, et Ganzha, Mc, « Malicious workers tolerance in an agent-based grid resource brokering system - Preliminary considerations », in Proceedings - 2014 International Conference on Computational Science and Computational Intelligence, CSCI 2014, 2014, vol. 2, p. 233-236.
C. Avanzini, Mantelet, F., Aoussat, A., Jeanningros, F., et Bouchard, C., « Evaluating perceived quality through sensory evaluation in the development process of new products: A case study of luxury market », Advances in Intelligent Systems and Computing, vol. 739, p. 379-388, 2018.
M. Ayache, Erradi, M., Khoumsi, A., et Freisleben, B., « ANALYSIS AND VERIFICATION OF XACML POLICIES IN A MEDICAL CLOUD ENVIRONMENT. », Scalable Computing: Practice & Experience, vol. 17, p. 189 - 205, 2016.
M. Ayache, Erradi, M., Freisleben, B., et Khoumsi, A., « Aspect-oriented state machines for resolving conflicts in XACML policies », Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10299 LNCS, p. 166-171, 2017.
M. Ayache, Erradi, M., Khoumsi, A., et Freisleben, B., « ANALYSIS AND VERIFICATION OF XACML POLICIES IN A MEDICAL CLOUD ENVIRONMENT », Scalable Computing-Practice and Experience, vol. 17, p. 189-205, 2016.
M. Ayache, Erradi, M., et Freisleben, B., « curlX: a MiddleWare to Enforce Access Control Policies within a Cloud Environment », in 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, p. 771-772.
Ma Ayache, Erradi, Ma, Freisleben, Bb, et Khoumsi, Ac, « Towards an efficient policy evaluation process in multi-tenancy cloud environments », in CCSW 2016 - Proceedings of the 2016 ACM Cloud Computing Security Workshop, co-located with CCS 2016, 2016, p. 55-59.
Ma Ayache, Erradi, Ma, Khoumsi, Ab, et Freisleben, Bc, « Analysis and verification of XACML policies in a medical cloud environment », Scalable Computing, vol. 17, p. 189-205, 2016.

Pages

Partenaires

Localisation


Location map

Suivez-nous sur

  

Contactez-nous

ENSIAS

Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc

Résultat de recherche d'images pour "icone fax" Télécopie : (+212) 5 37 77 72 30

    Compteur de visiteurs:311,276
    Education - This is a contributing Drupal Theme
    Design by WeebPal.