Publications

Export 388 results:
Filters: First Letter Of Last Name is H  [Clear All Filters]
Conference Paper
M. Salim Benqatla, Dikra, C., et Bounabat, B., « ACTOR NETWORK THEORY AS A COLLABORATIVE MODE: THE CONTRIBUTION OF GAME THEORY IN THE INTERESSEMENT PHASE », in PROCEEDINGS OF THE 2015 5TH WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES (WICT), 2015, p. 67-72.
A. Hamlili, « Adaptive schemes for estimating random graph parameters in mobile wireless ad hoc network's modeling », in 2010 IFIP Wireless Days, WD 2010, 2010.
Mab El Hamlaoui, Coulette, Bb, Ebersold, Sb, Bennani, Sa, Nassar, Ma, Anwar, Ae, Beugnard, Ac, Bach, J. Cc, Jamoussi, Yd, et Tran, H. Nb, « Alignment of viewpoint heterogeneous design models: "Emergency Department" Case Study », in CEUR Workshop Proceedings, 2016, vol. 1731, p. 18-27.
A. Hmami, Sbaï, H., et Fredj, M., « Applying change tree method in configurable process mining », in 2022 2nd International Conference on Innovative Research in Applied Science, Engineering and Technology, IRASET 2022, 2022.
Z. Kartit, Azougaghe, A., H. Idrissi, K., M. Marraki, E., Hedabou, M., Belkasmi, M., et Kartit, A., « Applying Encryption Algorithm for Data Security in Cloud Storage », in ADVANCES IN UBIQUITOUS NETWORKING, 2016, vol. 366, p. 141-154.
Aa Idri, Hassani, Aa, et Abran, Ab, « Assessing RBFN-based software cost estimation models », in Proceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE, 2013, vol. 2013-January, p. 483-487.
A. Echchaachoui, Choukri, A., Habbani, A., et Elkoutbi, M., « Asymmetric and Dynamic Encryption for Routing Security in MANETs », in 2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2014, p. 825-830.
W. Krombi, Erradi, M., et Khoumsi, A., « Automata-Based Approach to Design and Analyze Security Policies », in 2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, p. 306-313.
W. Krombi, Erradi, M., et Khoumsi, A., « Automata-Based Approach to Design and Analyze Security Policies », in 2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, p. 306-313.
A. Er-Rady, Faizi, R., Thami, R. O. H., et Housni, H., « Automatic sign language recognition: A survey », in Proceedings - 3rd International Conference on Advanced Technologies for Signal and Image Processing, ATSIP 2017, 2017.
S. Nouinou, Razafimampianina, R. M., Regragui, B., et Doukkali, A. S., « Big Data: Measuring How Information Technology Can Improve the Economic Growth and Better Life », in PROCEEDINGS OF THE 2015 5TH WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES (WICT), 2015, p. 152-159.
N. Mouchfiq, Habbani, A., Benjbara, C., et Berradi, H., « Blockchain-based Model Against selfish Attacks in Mobile ad hoc Networks », in Proceedings - 4th International Conference on Advanced Communication Technologies and Networking, CommNet 2021, 2021.
S. Alaoui, Idrissi, Y. El Bouzekr, et Ajhoun, R., « Building rich user profile based on intentional perspective », in INTERNATIONAL CONFERENCE ON ADVANCED WIRELESS INFORMATION AND COMMUNICATION TECHNOLOGIES (AWICT 2015), 2015, vol. 73, p. 342-349.
K. Baina, M. Hamlaoui, E., et Kabbaj, H., « Business Process Modelling Augmented: Model Driven transformation of User Stories to Processes », in ACM International Conference Proceeding Series, 2020, p. 215-220.
I. Kadi et Idri, A., « Cardiovascular Dysautonomias Diagnosis Using Crisp and Fuzzy Decision Tree: A Comparative Study », in HEALTH INFORMATICS MEETS EHEALTH, 2016, vol. 223, p. 1-8.
I. Kadi et Idri, A., « Cardiovascular Dysautonomias Diagnosis Using Crisp and Fuzzy Decision Tree: A Comparative Study », in HEALTH INFORMATICS MEETS EHEALTH, 2016, vol. 223, p. 1-8.
Ha Amraoui, Habbani, Aab, et Hajami, Ac, « CCS: A Correct Cooperation Strategy based on game theory for MANETS », in Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA, 2014, vol. 2014, p. 326-332.
Ha Amraoui, Habbani, Aab, et Hajami, Ac, « CCS: A Correct Cooperation Strategy based on game theory for MANETS », in Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA, 2014, vol. 2014, p. 326-332.
Ya Bounagui, Hafiddi, Hab, et Mezrioui, Aa, « Challenges for IT based cloud computing governance », in 2014 9th International Conference on Intelligent Systems: Theories and Applications, SITA 2014, 2014.
H. Rahimi et Bakkali, H. El, « CIOSOS: Combined Idiomatic-Ontology Based Sentiment Orientation System for Trust Reputation in E-commerce », in INTERNATIONAL JOINT CONFERENCE: CISIS'15 AND ICEUTE'15, 2015, vol. 369, p. 189-200.
J. Bouamama, Hedabou, M., et Erradi, M., « Cloud key management using trusted execution environment », in Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021, 2021, p. 560-567.
C. El Houssaini, Nassar, M., et Kriouile, A., « A Cloud Service Template for Enabling Accurate Cloud Adoption and Migration », in 2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, p. 44-49.
E. C. Houssaini, Nassar, M., et Kriouile, A., « A cloud service template for enabling accurate cloud adoption and migration », in Proceedings of 2015 International Conference on Cloud Computing Technologies and Applications, CloudTech 2015, 2015.

Pages

Partenaires

Localisation

Suivez-nous sur

         

    

Contactez-nous

ENSIAS

Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc

  Télécopie : (+212) 5 37 68 60 78

  Secrétariat de direction : 06 61 48 10 97

        Secrétariat général : 06 61 34 09 27

        Service des affaires financières : 06 61 44 76 79

        Service des affaires estudiantines : 06 62 77 10 17 / n.mhirich@um5s.net.ma

        Résidences : 06 61 82 89 77

Contacts

    

Education - This is a contributing Drupal Theme
Design by WeebPal.