Publications

Export 94 results:
Filters: First Letter Of Last Name is G  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
O. Cherqi, Mezzour, G., Ghogho, M., et M. Koutbi, E., « Analysis of hacking related trade in the darkweb », in 2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018, 2018, p. 79-84.
N. Drissi, Ouhbi, S., Idrissi, M. Abdou Jana, et Ghogho, M., « An analysis on self-management and treatment-related functionality and characteristics of highly rated anxiety apps », International Journal of Medical Informatics, vol. 141, p. 104243, 2020.
H. Rezzouqi, Gryech, I., Sbihi, N., Ghogho, M., et Benbrahim, H., « Analyzing the accuracy of historical average for urban traffic forecasting using google maps », Advances in Intelligent Systems and Computing, vol. 868, p. 1145-1156, 2018.
H. Rezzouqi, Gryech, I., Sbihi, N., Ghogho, M., et Benbrahim, H., « Analyzing the accuracy of historical average for urban traffic forecasting using google maps », Advances in Intelligent Systems and Computing, vol. 868, p. 1145-1156, 2018.
J. Baltzegar, J. Barnes, C., Elsensohn, J. E., Gutzmann, N., Jones, M. S., King, S., et Sudweeks, J., « Anticipating complexity in the deployment of gene drive insects in agriculture », Journal of Responsible Innovation, vol. 5, p. S81-S97, 2018.
W. Krombi, Erradi, M., et Khoumsi, A., « Automata-Based Approach to Design and Analyze Security Policies », in 2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, p. 306-313.
B
W. Gaaloul, Baina, K., et Godart, C., « A bottom-up workflow mining approach for workflow applications analysis », in DATA ENGINEERING ISSUES IN E-COMMERCE AND SERVICES, PROCEEDINGS, 2006, vol. 4055, p. 182-197.
W. Gaaloul, Baina, K., et Godart, C., « A bottom-up workflow mining approach for workflow applications analysis », in DATA ENGINEERING ISSUES IN E-COMMERCE AND SERVICES, PROCEEDINGS, 2006, vol. 4055, p. 182-197.
C
Ha Guermah, Fissaa, Ta, Hafiddi, Hab, Nassar, Ma, et Kriouile, Aa, « Context modeling and reasoning for building context aware services », in Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA, 2013.
H. Guermah, Fissaa, T., Hafiddi, H., Nassar, M., et Kriouile, A., « Context Modeling and Reasoning for building Context Aware Services », in 2013 ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2013.
M. Et-tolba, Naamane, F. Ezzahra, et Saoudi, S., « A cross-validation based semi-analytical performance evaluation for high order modulations », in 2016 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2016, p. P140-P145.
D
E. Y. Ghayam et Erradi, M., « Decision tree based context management in a collaborative environment1 », in NOTERE'10 - 10th Annual International Conference on New Technologies of Distributed Systems, 2010, p. 151-156.
K. Baina, Benali, K., et Godart, C., « DISCOBOLE: A service architecture for interconnecting workflow processes », COMPUTERS IN INDUSTRY, vol. 57, p. 768-777, 2006.
E. Y. Ghayam et Erradi, M., « Distributed context management in collaborative environment », in 2011 11th Annual International Conference on New Technologies of Distributed Systems, NOTERE 2011 - Proceedings, 2011.
F
M. Hafid El Yazidi, Zellou, A., et Idri, A., « FGAV (Fuzzy Global as Views) », in INTERNATIONAL CONFERENCE ON INTEGRATED INFORMATION (IC-ININFO 2014), 2015, vol. 1644, p. 236-243.
Ha Gueddah, Yousfi, Ab, et Belkasmi, Ma, « The filtered combination of the weighted edit distance and the Jaro-Winkler distance to improve spellchecking Arabic texts », in Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA, 2016, vol. 2016-July.
A. Afyf, Bellarbi, L., Riouch, F., Achour, A., Errachid, A., et Sennouni, M. Adel, « Flexible Miniaturized UWB CPW II-shaped Slot Antenna for Wireless Body Area Network (WBAN) Applications », in 2015 THIRD INTERNATIONAL WORKSHOP ON RFID AND ADAPTIVE WIRELESS SENSOR NETWORKS (RAWSN), 2015, p. 52-56.
A. Khoumsi, Krombi, W., et Erradi, M., « A Formal Approach to Verify Completeness and Detect Anomalies in Firewall Security Policies », in FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014), 2015, vol. 8930, p. 221-236.
G
I. Mbaye, Martinez, J., et Thami, R. Oulad Haj, « Galois' lattice for video navigation in a DBMS », in MULTIMEDIA CONTENT REPRESENTATION, CLASSIFICATION AND SECURITY, 2006, vol. 4105, p. 418-425.
Sa Gmira, Kobbane, Aa, Sabir, Eb, et Ben-Othman, Jc, « A game theoretic approach for an hybrid overlay-underlay spectrum access mode », in 2016 IEEE International Conference on Communications, ICC 2016, 2016.

Pages

Partenaires

Localisation

Suivez-nous sur

  

Contactez-nous

ENSIAS

Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc

 Télécopie : (+212) 5 37 77 72 30

  Secrétariat de direction : 06 61 48 10 97

        Secrétariat général : 06 61 70 77 02

        Service des affaires estudiantines : 06 62 44 87 47

        Résidences : 06 61 82 89 77

    

    Compteur de visiteurs:393,947
    Education - This is a contributing Drupal Theme
    Design by WeebPal.