Publications

Export 1808 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
X
A. E. Haddadi, Dousset, B., et Berrada, I., « Xplor Everywhere - The competitive intelligence system for mobile », in International Conference on Multimedia Computing and Systems -Proceedings, 2011.
W
E. Badidi, Esmahi, L., M. Serhani, A., et Elkoutbi, M., « WS-QoSM: A broker-based architecture for web services QoS management », in 2006 Innovations in Information Technology, 2006, p. 56-60.
J. Sangai et Bellabdaoui, A., « Workload balancing in nurse scheduling problem: Models and discussion », in 2017 International Colloquium on Logistics and Supply Chain Management: Competitiveness and Innovation in Automobile and Aeronautics Industries, LOGISTIQUA 2017, 2017, p. 82-87.
S. Yassir, Mostapha, Z., et Claude, T., « Workflow scheduling issues and techniques in cloud computing: A systematic literature review », Lecture Notes in Networks and Systems, vol. 49, p. 241-263, 2019.
H. Hatim, H. Bakkali, E., et Berrada, I., « Workflow access control: From role engineering to task engineering », in 2010 International Conference for Internet Technology and Secured Transactions, ICITST 2010, 2010.
Y. Benkaouz, Erradi, M., et Freisleben, B., « Work in Progress: K-Nearest Neighbors Techniques for ABAC Policies Clustering », in ABAC'16: PROCEEDINGS OF THE 2016 ACM INTERNATIONAL WORKSHOP ON ATTRIBUTE BASED ACCESS CONTROL, 2016, p. 72-75.
Ya Benkaouz, Erradi, Ma, et Freisleben, Bb, « Work in progress: K-nearest neighbors techniques for ABAC policies clustering », in ABAC 2016 - Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, co-located with CODASPY 2016, 2016, p. 72-75.
Y. Essadraoui et Kettani, M. D. E. - C. El, « Wireless sensor node's authentication scheme based on Multivariate Quadratic Quasi-groups », in Proceedings of 2015 IEEE World Conference on Complex Systems, WCCS 2015, 2015.
E. O. Asmaa, Aboutajdine, D., et Aziz, D., « WiebMat, a new information extraction systemen », in Proceedings of the IADIS European Conference on Data Mining 2009, ECDM'09 Part of the IADIS Multi Conference on Computer Science and Information Systems, MCCSIS 2009, 2009, p. 171-173.
F. Gould, Brown, Z. S., et Kuzma, J., « Wicked evolution: Can we address the sociobiological dilemma of pesticide resistance? », Science, vol. 360, p. 728-732, 2018.
P. Dauvergne, « Why is the global governance of plastic failing the oceans? », Global Environmental Change, vol. 51, p. 22-31, 2018.
N. Kerzazi et Adams, B., « Who Needs Release and DevOps Engineers, and Why? », in INTERNATIONAL WORKSHOP ON CONTINUOUS SOFTWARE EVOLUTION AND DELIVERY, CSED 2016, 2016, p. 77-83.
Na Kerzazi et Adams, Bb, « Who needs release and DevOps engineers, and why? », in Proceedings - International Workshop on Continuous Software Evolution and Delivery, CSED 2016, 2016, p. 77-83.
N. Kerzazi et Asri, I. El, « Who Can Help to Review This Piece of Code? », in COLLABORATION IN A HYPERCONNECTED WORLD, 2016, vol. 480, p. 289-301.
N. Kerzazi et I. Asri, E., « Who can help to review this piece of code? », IFIP Advances in Information and Communication Technology, vol. 480, p. 289-301, 2016.
K. Baina, « WFESelector - A tool for comparing and selecting workflow engines », in ICEIS 2007: PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS: DATABASES AND INFORMATION SYSTEMS INTEGRATION, 2007, p. 330-337.
M. Ea Koutbi, Ben-Othman, Jb, et Kobbane, Ac, « Welcome message from the general chairs », in International Conference on Wireless Networks and Mobile Communications, WINCOM 2015, 2015.
M. Essaaidi et S. Hani, E., « Welcome message from the conference general co-chairs », in Proceedings of 2017 International Conference on Electrical and Information Technologies, ICEIT 2017, 2018, vol. 2018-January.
Ma Essaaidi et Hani, SbEl, « Welcome message from the conference general co-chairs », in Proceedings of 2016 International Conference on Electrical and Information Technologies, ICEIT 2016, 2016.
E. A. Kandoussi et H. Bakkali, E., « Weighted access control policies cohabitation in distributed systems », Advances in Intelligent Systems and Computing, vol. 735, p. 350-360, 2018.
Aab Belahcen, Bianchini, Ma, et Scarselli, Fa, « Web spam detection using transductive−inductive graph neural networks », Smart Innovation, Systems and Technologies, vol. 37, p. 83-91, 2015.
V
N. Mohammed et Abdellah, Y., « The vocabulary and the morphology in spell checker », in Procedia Computer Science, 2018, vol. 127, p. 76-81.
Y. Baddi et Kettani, M. Dafir Ech-, « VNS-RP algorithm for RP selection in multicast routing protocol PIM-SM », in 2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2012, p. 595-600.
Y. Baddi et Kettani, M. D. Ech- Chrif, « VNS-RP algorithm for RP selection in multicast routing protocol PIM-SM », in Proceedings of 2012 International Conference on Multimedia Computing and Systems, ICMCS 2012, 2012, p. 595-600.
Y. Baddi et Kettani, M. D. E. - C. El, « VND-CS: A Variable Neighborhood Descent Algorithm for Core Selection Problem in Multicast Routing Protocol », Communications in Computer and Information Science, vol. 293 PART 1, p. 429-443, 2012.

Pages

Partenaires

Localisation


Location map

Suivez-nous sur

  

Contactez-nous

ENSIAS

Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc

Résultat de recherche d'images pour "icone fax" Télécopie : (+212) 5 37 77 72 30

    Compteur de visiteurs:274,270
    Education - This is a contributing Drupal Theme
    Design by WeebPal.