Publications

Export 1807 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
N. Assad, Elbhiri, B., Faqihi, M. Ahmed, Ouadou, M., et Aboutajdine, D., « Efficient deployment quality analysis for intrusion detection in wireless sensor networks », WIRELESS NETWORKS, vol. 22, p. 991-1006, 2016.
N. Assad, Elbhiri, B., Faqihi, M., Ouadou, M., et Aboutajdine, D., « Efficient deployment quality analysis for intrusion detection in wireless sensor networks. », Wireless Networks (10220038), vol. 22, p. 991 - 1006, 2016.
Na Assad, Elbhiri, Bb, Faqihi, M. Ac, Ouadou, Ma, et Aboutajdine, Da, « On the deployment quality for multi-intrusion detection in wireless sensor networks », Lecture Notes in Electrical Engineering, vol. 381, p. 469-478, 2016.
N. Assad, Elbhiri, B., Faqihi, M. Ahmed, Ouadou, M., et Aboutajdine, D., « Analysis of the Deployment Quality for Intrusion Detection in Wireless Sensor Networks », JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS, 2015.
N. Assad, Elbhiri, B., Faqihi, M. Ahmed, Ouadou, M., et Aboutajdine, D., « On the Deployment Quality for Multi-intrusion Detection in Wireless Sensor Networks », in PROCEEDINGS OF THE MEDITERRANEAN CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES 2015 (MEDCT 2015), VOL 2, 2016, vol. 381, p. 469-478.
S. Assami, Daoudi, N., et Ajhoun, R., « Ontology-based modeling for a personalized mooc recommender system », Smart Innovation, Systems and Technologies, vol. 111, p. 21-28, 2019.
S. Assami, Daoudi, N., et Ajhoun, R., « Personalization criteria for enhancing learner engagement in MOOC platforms », in IEEE Global Engineering Education Conference, EDUCON, 2018, vol. 2018-April, p. 1265-1272.
B. Assila, Kobbane, A., Walid, A., et M. Koutbi, E., « Achieving low-energy consumption in fog computing environment: A matching game approach », in 19th IEEE Mediterranean Eletrotechnical Conference, MELECON 2018 - Proceedings, 2018, p. 213-218.
B. Assila, Kobbane, A., et M. Koutbi, E., « A Many-To-One Matching Game Approach to Achieve Low-Latency Exploiting Fogs and Caching », in 2018 9th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2018 - Proceedings, 2018, vol. 2018-January, p. 1-2.
B. Assila, Kobbane, A., Ben-Othman, J., et Koutbi, M. E., « Caching as a Service for 5G Networks: A Matching Game Approach for CaaS Resource Allocation », in Proceedings - IEEE Symposium on Computers and Communications, 2018, vol. 2018-June, p. 1193-1198.
B. Assila, Kobbane, A., et M. Koutbi, E., « A Cournot Economic Pricing Model for Caching Resource Management in 5G Wireless Networks », in 2018 14th International Wireless Communications and Mobile Computing Conference, IWCMC 2018, 2018, p. 1345-1350.
B. Assila, Kobbaney, A., Elmachkourz, M., et M. Koutbi, E., « A dynamic Stackelberg-Cournot game for competitive content caching in 5G networks », in Proceedings - 2017 International Conference on Wireless Networks and Mobile Communications, WINCOM 2017, 2017.
B. Assila, Kobbane, A., M. Koutbi, E., Ben-Othman, J., et Mokdad, L., « Caching as a Service in 5G Networks: Intelligent Transport and Video on Demand Scenarios », in 2018 IEEE Global Communications Conference, GLOBECOM 2018 - Proceedings, 2019.
N. Attaoui, Bendahmane, A., Essaaidi, M., Sanyal, S., Ganzha, M., Paprzycki, M., et Wasielewska, K., « MALICIOUS WORKERS TOLERANCE IN AN AGENT-BASED GRID RESOURCE BROKERING SYSTEM. », IADIS International Journal on Computer Science & Information Systems, vol. 9, p. 55 - 70, 2014.
N. Attaoui, Essaaidi, M., Ca), M. Paprzycki, et Ganzha, M., « Malicious Workers Tolerance in an Agent-Based Grid Resource Brokering System - Preliminary Considerations (Short Paper) », in 2014 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), VOL 2, 2014, p. 233-236.
Na Attaoui, Essaaidi, Mb, Paprzycki, Mc, et Ganzha, Mc, « Malicious workers tolerance in an agent-based grid resource brokering system - Preliminary considerations », in Proceedings - 2014 International Conference on Computational Science and Computational Intelligence, CSCI 2014, 2014, vol. 2, p. 233-236.
N. Attaoui, Ganzha, M., Paprzycki, M., Wasielewska, K., et Essaaidi, M., « MULTIPLE EQUIVALENT SIMULTANEOUS OFFERS STRATEGY IN AN AGENT-BASED GRID RESOURCE BROKERING SYSTEM - INITIAL CONSIDERATIONS. », Scalable Computing: Practice & Experience, vol. 14, p. 83 - 94, 2013.
Na Attaoui, Ganzha, Mb, Paprzycki, Mb, Wasielewska, Kb, et Essaaidi, Mc, « Multiple equivalent simultaneous offers strategy in an agent-based grid resource brokering system-initial considerations », Scalable Computing, vol. 14, p. 83-94, 2013.
C. Avanzini, Mantelet, F., Aoussat, A., Jeanningros, F., et Bouchard, C., « Evaluating perceived quality through sensory evaluation in the development process of new products: A case study of luxury market », Advances in Intelligent Systems and Computing, vol. 739, p. 379-388, 2018.
Ma Ayache, Erradi, Ma, et Freisleben, Bb, « CurlX: A middleware to enforce access control policies within a cloud environment », in 2015 IEEE Conference on Communications and NetworkSecurity, CNS 2015, 2015, p. 771-772.
M. Ayache, Erradi, M., Freisleben, B., et Khoumsi, A., « Towards an Efficient Policy Evaluation Process in Multi-Tenancy Cloud Environments », in CCSW'16: PROCEEDINGS OF THE 2016 ACM CLOUD COMPUTING SECURITY WORKSHOP, 2016, p. 55-59.
M. Ayache, Erradi, M., Khoumsi, A., et Freisleben, B., « ANALYSIS AND VERIFICATION OF XACML POLICIES IN A MEDICAL CLOUD ENVIRONMENT. », Scalable Computing: Practice & Experience, vol. 17, p. 189 - 205, 2016.
M. Ayache, Erradi, M., Freisleben, B., et Khoumsi, A., « Aspect-oriented state machines for resolving conflicts in XACML policies », Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10299 LNCS, p. 166-171, 2017.
M. Ayache, Erradi, M., Khoumsi, A., et Freisleben, B., « ANALYSIS AND VERIFICATION OF XACML POLICIES IN A MEDICAL CLOUD ENVIRONMENT », Scalable Computing-Practice and Experience, vol. 17, p. 189-205, 2016.
M. Ayache, Erradi, M., et Freisleben, B., « curlX: a MiddleWare to Enforce Access Control Policies within a Cloud Environment », in 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, p. 771-772.

Pages

Partenaires

Localisation


Location map

Suivez-nous sur

  

Contactez-nous

ENSIAS

Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc

Résultat de recherche d'images pour "icone fax" Télécopie : (+212) 5 37 77 72 30

    Compteur de visiteurs:310,177
    Education - This is a contributing Drupal Theme
    Design by WeebPal.