Message d'état

PURL test ID: finland

Publications indexées

Year of Publication: 2021

Pages

Pages

Hafdi K, Kriouile A. Designing ReDy Distributed Systems. Dans: Lalanda P, Diaconescu A, Cherkasova L, Kounev S. 2015 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING. IEEE; usenix; Univ Joseph Fourier; Telecom ParisTech; Spec; GRENOBLE ALPLES METROPOLE; VILLE CRENOBOLE; MINALOGIC; CPS; IEEE COMPUTER SOC; hp; Google; orange; FOCAS; INRIA INVENTORS DIGITAL WORLD; 2015. p. 331-336.
Year of Publication: 2015
Aghmadi A, Bouksim I, Kobbane A, Taleb T. A MTC Traffic Generation and QCI Priority-First Scheduling Algorithm over LTE. Dans 2015 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM). 2015. p. 11-16.
Year of Publication: 2015
Alaoui S, Idrissi YEl Bouzekr, Ajhoun R. Building rich user profile based on intentional perspective. Dans: Boubiche DE, Hidoussi F, Cruz HT. INTERNATIONAL CONFERENCE ON ADVANCED WIRELESS INFORMATION AND COMMUNICATION TECHNOLOGIES (AWICT 2015). 2015. p. 342-349.
Year of Publication: 2015
Adadi N, Berrada M, Chenouni D, Bounabat B. Modeling and Simulation of Web Services Composition Based on MARDS Model. Dans 2015 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA). IEEE; 2015.
Year of Publication: 2015
Ouhbi S, Fernandez-Aleman JLuis, Idri A, Pozo JRivera. Are Mobile Blood Donation Applications Green?. Dans 2015 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA). IEEE; 2015.
Year of Publication: 2015
Badidi E, Routaib H. A Conceptual Framework for Personalization of Mobile Cloud Services. Dans 2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15). 2015. p. 238-244.
Year of Publication: 2015
Ayache M, Erradi M, Freisleben B. curlX: a MiddleWare to Enforce Access Control Policies within a Cloud Environment. Dans 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS). 2015. p. 771-772.
Year of Publication: 2015
Selma EYahyaoui E, Zellou A, Idri A. Mapping discovery methodology in a pure P2P mediation system for XML schemas. Dans 2015 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA). IEEE; 2015.
Year of Publication: 2015
Alouane M, Bakkali HEl. Security, Privacy and Trust in Cloud Computing: A Comparative Study. Dans 2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15). 2015. p. 23-30.
Year of Publication: 2015
Chanyour T, Saadane R, Belkasmi M. Secure Sparse Network Coding for Reliable Routing in Large Scale DTMN. Dans: Berrada I, Ghennioui H. 2015 THIRD INTERNATIONAL WORKSHOP ON RFID AND ADAPTIVE WIRELESS SENSOR NETWORKS (RAWSN). FST FES; IEEE Morocco Sect; CNRST; MobiTic; Laboratoire Signaux Systemes Composants; LiMs Laboratoire; 2015. p. 57-62.
Year of Publication: 2015
Belhiah M, Bounabat B, Achchab S. The impact of data accuracy on user-perceived business service's quality. Dans: Rocha A, Dias GP, Martins A, Reis LP, Cota MP. 2015 10TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI). Iberian Assoc Syst Informat Technol; 2015.
Year of Publication: 2015
Year of Publication: 2015
Naja A, Essaaidi M, Azzekhmam M, Boulmalef M. A new adaptive algorithm for data dissemination in Vehicular Ad hoc Networks. Dans: Essaaidi M, ElHani S. PROCEEDINGS OF 2015 INTERNATIONAL CONFERENCE ON ELECTRICAL AND INFORMATION TECHNOLOGIES (ICEIT 2015). 2015. p. 36-42.
Year of Publication: 2015
Selma EYahyaoui E, Zellou A, Idri A. Pure P2P Mediation System: A Mappings Discovery Approach. Dans: Giannakopoulos G, Sakas DP, KyriakiManessi D. INTERNATIONAL CONFERENCE ON INTEGRATED INFORMATION (IC-ININFO 2014). Univ Peloponnese; Linnaeus Univ; Aberystwyth Univ; Technol & Educ Inst Athens; Univ Complutense Madrid, Fac Ciencias Documentac; Inst Disseminat Arts & Sci; 2015. p. 244-251.
Year of Publication: 2015
Mezouary REl, Houmz A, Jalil J, Koutbi MEl. PRoPHET-RAIP5: A New Approach to Secure Routing in Wireless Sensor Networks. Dans 2015 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM). 2015. p. 52-57.
Year of Publication: 2015
Kerzazi N. Conceptual Alignment Between SPEM-Based Processes and CMMI. Dans 2015 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA). IEEE; 2015.
Year of Publication: 2015
Zbakh M, Elmahdi K, Cherkaoui R, Enniari S. A multi-criteria analysis of intrusion detection architectures in cloud environments. Dans 2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15). 2015. p. 87-95.
Year of Publication: 2015
Sadki S, Bakkali HEl. Towards negotiable privacy policies in Mobile Healthcare. Dans FIFTH INTERNATIONAL CONFERENCE ON THE INNOVATIVE COMPUTING TECHNOLOGY (INTECH 2015). 2015. p. 94-99.
Year of Publication: 2015
Nouinou S, Razafimampianina RM, Regragui B, Doukkali AS. Big Data: Measuring How Information Technology Can Improve the Economic Growth and Better Life. Dans: Abrahim A, Alimi AM, Haqiq A, Karray H, Mousannif H, BenHalima M, et al. PROCEEDINGS OF THE 2015 5TH WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES (WICT). IEEE; IEEE Morocco Sect; IEEE Morocco Sect; IEEE SMC Tech Comm Soft Comp; Lab Informatique, Reseaux Mobilite Modelisation; lab Res Grp Intelligent Machines; MIR Labs; 2015. p. 152-159.
Year of Publication: 2015
Mrabet K, Bouanani FEl, Ben-Azza H. A secure multi-hops routing for VANETs. Dans 2015 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM). 2015. p. 6-10.
Year of Publication: 2015
Mokhtari Y, Yousfi A. Segmentation of Arabic handwritten text to lines. Dans: Boubiche DE, Hidoussi F, Cruz HT. INTERNATIONAL CONFERENCE ON ADVANCED WIRELESS INFORMATION AND COMMUNICATION TECHNOLOGIES (AWICT 2015). 2015. p. 115-121.
Year of Publication: 2015
Adadi A, Berrada M, Chenouni D, Bounabat B. Ontology based composition of e-Government services using AI Planning. Dans 2015 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA). IEEE; 2015.
Year of Publication: 2015
Ouaftouh S, Zellou A, Idri A. User profile model: a user dimension based classification. Dans 2015 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA). IEEE; 2015.
Year of Publication: 2015
Sadki S, Bakkali HEl. An approach for privacy policies negotiation in mobile health-Cloud environments. Dans 2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15). 2015. p. 179-184.
Year of Publication: 2015
Walid A, Sabir E, Kobbane A, Taleb T, Koutbi MEl. On Improving Network Capacity for Downlink and Uplink of Two-Tier LTE-FDD Networks. Dans 2015 INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC). IEEE; IEEE Croatia Sect; Univ Dubrovnik; 2015. p. 1168-1173.
Year of Publication: 2015

Pages

Partenaires

Localisation

Suivez-nous sur

         

    

Contactez-nous

ENSIAS

Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc

  Télécopie : (+212) 5 37 68 60 78

  Secrétariat de direction : 06 61 48 10 97

        Secrétariat général : 06 61 34 09 27

        Service des affaires financières : 06 61 44 76 79

        Service des affaires estudiantines : 06 62 77 10 17 / n.mhirich@um5s.net.ma

        CEDOC ST2I : 06 66 39 75 16

        Résidences : 06 61 82 89 77

Contacts

    

    Compteur de visiteurs:631,529
    Education - This is a contributing Drupal Theme
    Design by WeebPal.