Publications

Export 343 results:
Filters: First Letter Of Last Name is S  [Clear All Filters]
Conference Paper
S. Slimani, Baina, S., et Baina, K., « Agent-based Architecture for Service Ontology evolution management », in 22ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING & KNOWLEDGE ENGINEERING (SEKE 2010), 2010, p. 664-667.
S. Slimani, Baina, S., et Baina, K., « Agent-based architecture for service ontology evolution management », in SEKE 2010 - Proceedings of the 22nd International Conference on Software Engineering and Knowledge Engineering, 2010, p. 664-667.
Z. Kartit, Azougaghe, A., H. Idrissi, K., M. Marraki, E., Hedabou, M., Belkasmi, M., et Kartit, A., « Applying Encryption Algorithm for Data Security in Cloud Storage », in ADVANCES IN UBIQUITOUS NETWORKING, 2016, vol. 366, p. 141-154.
Z. Kartit, Azougaghe, A., H. Idrissi, K., M. Marraki, E., Hedabou, M., Belkasmi, M., et Kartit, A., « Applying Encryption Algorithm for Data Security in Cloud Storage », in ADVANCES IN UBIQUITOUS NETWORKING, 2016, vol. 366, p. 141-154.
S. Sadki et Bakkali, H. El, « An approach for privacy policies negotiation in mobile health-Cloud environments », in 2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, p. 179-184.
S. Sadki et H. Bakkali, E., « An approach for privacy policies negotiation in mobile health-Cloud environments », in Proceedings of 2015 International Conference on Cloud Computing Technologies and Applications, CloudTech 2015, 2015.
L. Sinif et Bounabat, B., « Approaching an optimizing open linked government data portal », in ACM International Conference Proceeding Series, 2018, p. 135-139.
Ia Slimani, Farissi, IbEl, et Achchab, Sa, « Artificial neural networks for demand forecasting: Application using Moroccan supermarket data », in International Conference on Intelligent Systems Design and Applications, ISDA, 2016, vol. 2016-June, p. 266-271.
H. Routaib, Badidi, E., Sabir, E., et Elkoutbi, M., « An asymmetrical nash bargaining for adaptive and automated context negotiation in pervasive environments », in 2017 14th IEEE Annual Consumer Communications and Networking Conference, CCNC 2017, 2017, p. 732-736.
A. Maarof, Senhadji, M., Labbi, Z., et Belkasmi, M., « Authentication protocol conforming to EPC class-1 Gen-2 standard », in 2016 International Conference on Advanced Communication Systems and Information Security, ACOSIS 2016 - Proceedings, 2017.
A. Maarof, Senhadji, M., Labbi, Z., et Belkasmi, M., « Authentication protocol for securing internet of things », in ACM International Conference Proceeding Series, 2018.
K. Souali, A. Afia, E., et Faizi, R., « An automatic ethical-based recommender system for e-commerce », in International Conference on Multimedia Computing and Systems -Proceedings, 2011.
H. Routaib, Badidi, E., Sabir, E., et Elkoutbi, M., « A Bargaining Nash Game Based Adaptive Negotiation of Context Level Agreements for Pervasive Systems », in ADVANCES IN UBIQUITOUS NETWORKING, 2016, vol. 366, p. 91-104.
H. Routaib, Badidi, E., Sabir, E., et Elkoutbi, M., « A Bargaining Nash Game Based Adaptive Negotiation of Context Level Agreements for Pervasive Systems », in ADVANCES IN UBIQUITOUS NETWORKING, 2016, vol. 366, p. 91-104.
H. Routaib, Badidi, E., Sabir, E., et Elkoutbi, M., « A Bargaining Nash Game Based Adaptive Negotiation of Context Level Agreements for Pervasive Systems », in ADVANCES IN UBIQUITOUS NETWORKING, 2016, vol. 366, p. 91-104.
W. Gaaloul, Baina, K., et Godart, C., « A bottom-up workflow mining approach for workflow applications analysis », in DATA ENGINEERING ISSUES IN E-COMMERCE AND SERVICES, PROCEEDINGS, 2006, vol. 4055, p. 182-197.
W. Gaaloul, Baina, K., et Godart, C., « A bottom-up workflow mining approach for workflow applications analysis », in DATA ENGINEERING ISSUES IN E-COMMERCE AND SERVICES, PROCEEDINGS, 2006, vol. 4055, p. 182-197.
I. Kadi et Idri, A., « Cardiovascular Dysautonomias Diagnosis Using Crisp and Fuzzy Decision Tree: A Comparative Study », in HEALTH INFORMATICS MEETS EHEALTH, 2016, vol. 223, p. 1-8.
H. Rahimi et Bakkali, H. El, « CIOSOS: Combined Idiomatic-Ontology Based Sentiment Orientation System for Trust Reputation in E-commerce », in INTERNATIONAL JOINT CONFERENCE: CISIS'15 AND ICEUTE'15, 2015, vol. 369, p. 189-200.
E. Niari Saad, Mahdi, K. El, et Zbakh, M., « Cloud Computing Architectures Based IDS », in PROCEEDINGS OF 2012 INTERNATIONAL CONFERENCE ON COMPLEX SYSTEMS (ICCS12), 2012, p. 457-462.
E. N. Saad, Mahdi, K. E., et Zbakh, M., « Cloud computing architectures based IDS », in Proceedings of 2012 International Conference on Complex Systems, ICCS 2012, 2012.
E. A. Alami, Sadok, H., et Elhaoud, N., « Cloud computing & the organizational performance: Different approach of assessment », in Proceedings of 2015 International Conference on Cloud Computing Technologies and Applications, CloudTech 2015, 2015.
A. El Alami, Sadok, H., et Elhaoud, N., « Cloud computing & the organizational performance Different approach of assessment », in 2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, p. 318-322.

Pages

Partenaires

Localisation

Suivez-nous sur

   

Contactez-nous

ENSIAS

Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc

 Télécopie : (+212) 5 37 77 72 30

  Secrétariat de direction : 06 61 48 10 97

        Secrétariat général : 06 61 70 77 02

        Service des affaires estudiantines : 06 62 44 87 47

        Résidences : 06 61 82 89 77

    

    Compteur de visiteurs:400,910
    Education - This is a contributing Drupal Theme
    Design by WeebPal.