Abstract is missing.
- For more understandable UML diagramsKamel Boukhelfa, Faiza Belala, Aicha Choutri, Halima Douibi. 1-7 [doi]
- A new approach for minimizing buffer capacities with throughput constraint for embedded system designMohamed Benazouz, Olivier Marchetti, Alix Munier Kordon, Pascal Urard. 1-8 [doi]
- Exploiting grid computation for solving the Vehicle Routing ProblemFabian Lecron, Pierre Manneback, Daniel Tuyttens. 1-6 [doi]
- Path computation with multiple constraints QoS in multi-domainWajih Amari, Ridha Gadhgadhi, Asma Ben Letaifa, Sami Tabbane. 1-8 [doi]
- Performance analysis of real-time rewriting modelsJounaidi Ben Hassan, Osman Hasan, Tarek Sadani, Sofiène Tahar. 1-8 [doi]
- Architecture conformance checking of multi-language applicationsRazieh Rahimi, Ramtin Khosravi. 1-8 [doi]
- An overview of search methodologies in Semantic WebThabet Slimani, Boutheina Ben Yaghlane. 1-8 [doi]
- A new design of dynamic S-Box based on two chaotic mapsGhada Zaibi, Fabrice Peyrard, Abdennaceur Kachouri, Daniele Fournier-Prunaret, Mounir Samet. 1-6 [doi]
- Software effort estimation by tuning COOCMO model parameters using differential evolutionSultan Aljahdali, Alaa F. Sheta. 1-6 [doi]
- A framework for real time communication in sensor networksM. Y. Aalsalem, Javid Taheri, Albert Y. Zomaya. 1-7 [doi]
- A lightweight user authentication scheme for Wireless Sensor NetworksOmar Cheikhrouhou, Anis Koubaa, Manel Boujelben, Mohamed Abid. 1-7 [doi]
- From UML/MARTE to RTDT: A model driven based method for scheduling analysis and HW/SW partitioningYessine Hadj Kacem, Adel Mahfoudhi, Hedi Tmar, Mohamed Abid. 1-7 [doi]
- Agents Coordination in Ad-hoc NetworksUsama Mir, Samir Aknine, Leïla Merghem-Boulahia, Dominique Gaïti. 1-8 [doi]
- Adaptive audio-aware scheduling in Xen virtual environmentHuacai Chen, Hai Jin, Kan Hu, Minhao Yuan. 1-8 [doi]
- Image classification using Partitioned-Feature based Classifier modelDong-Chul Park. 1-6 [doi]
- Design and experimental validation of a sound source model for engine of vehiclesM. Dolores Redel-Macías, Antonio J. Cubero-Atienza, D. Berckmans. 1-7 [doi]
- A design approach for numerical libraries in large scale distributed systemsNahid Emad, Olivier Delannoy, Makarem Dandouna. 1-9 [doi]
- On the impact of irregular radio propagation on coverage control and sleep scheduling in wireless sensor networksRamzi Bellazreg, Mohamed Hamdi, Noureddine Boudriga. 1-8 [doi]
- A comparison study on children reading stories from e-books and from traditional booksWisal M. Tingari, Izzeldin M. Osman, Moawia E. Yahia. 1-3 [doi]
- An agent-based approach for vertical handover in heterogeneous wireless networksAtiq Ahmed, Rana Rahim-Amoud, Leïla Merghem-Boulahia, Dominique Gaïti. 1-8 [doi]
- A multi-agent based decision mechanism for incident reaction in telecommunication networkCédric Bonhomme, Christophe Feltus, Djamel Khadraoui. 1-2 [doi]
- An algorithm for Constrained LCSDavid Becerra, Wilson Soto, Luis F. Niño, Yoan Pinzón. 1-7 [doi]
- A GPU-based iterated tabu search for solving the quadratic 3-dimensional assignment problemThé Van Luong, Lakhdar Loukil, Nouredine Melab, El-Ghazali Talbi. 1-8 [doi]
- Design of a library of motion functions for a Humanoid robot for a football gameMayez A. Al-Mouhamed, Ahmad Abu-Arafah. 1-6 [doi]
- Freshness-aware metadata management: Performance evaluation with SWN modelsOusmane Diallo, Mbaye Sene, Idrissa Sarr. 1-6 [doi]
- Towards a parameterizable cycle-accurate ISS in ArchCCharly Bechara, Nicolas Ventroux, Daniel Etiemble. 1-7 [doi]
- Towards a multi-agent based architecture to simulate the reality of a stock exchange marketSehl Mellouli, Faouzi Bouslama. 1-8 [doi]
- On proving languages non-regularFouad B. Chedid. 1-3 [doi]
- State of art and practice of COTS components search enginesNacim Yanes, Sihem Ben Sassi, Henda Hajjami Ben Ghézala. 1-8 [doi]
- Predictive dynamic resource reservation for vertical handoff optimization in 4G mobile wireless networksSihem Trabelsi, Noureddine Boudriga. 1-8 [doi]
- Pre-learning from mobile professionals' TrajectoryWided Oueslati, Jalel Akaichi. 1-7 [doi]
- Comparison of neighborhoods for the HFF-AVRPMarie-Eléonore Marmion, Jérémie Humeau, Laetitia Jourdan, Clarisse Dhaenens. 1-7 [doi]
- Managing conversational streams by explorative mind-mapsJayanta Poray, Christoph Schommer. 1-4 [doi]
- A Multi Start Great Deluge metaheuristic for engineering design problemsSouhail Dhouib. 1-5 [doi]
- Cloud Computing - an IT paradigm changerMazin Yousif. 1 [doi]
- Disassembly scheduling of complex products using parallel heuristic approachesBelarmino Adenso-Díaz, Santiago García Carbajal, Sebastián Lozano. 1-4 [doi]
- Refinements of Longest Common Subsequence algorithmMohamed Elhadi, Amjad Al-Tobi. 1-5 [doi]
- Sophistication and logical depth revisitedFouad B. Chedid. 1-4 [doi]
- 3D building modeling based on 3D line grouping using centroid neural networkDong-Min Woo, Hai-Nguyen Ho, Dong-Chul Park. 1-4 [doi]
- An efficient source authentication scheme in wireless sensor networksWafa Ben Jaballah, Aref Meddeb, Habib Youssef. 1-7 [doi]
- Optimizing area coverage in Wireless Sensor NetworksNejla Essaddi, Mohamed Hamdi, Sami Habib, Noureddine Boudriga. 1-6 [doi]
- Towards ISO interface protocol for interactive multimedia intelligent terminalsHazem El-Gendy. 1-6 [doi]
- A layered cluster based routing for an ad hoc environmentImen Jemili, Abdelfettah Belghith, Mohamed Mosbah. 1-8 [doi]
- Improving QoS for BE traffics in WIMAX networksLynda Mokdad, Jalel Ben-Othman, Mohamed Ould Cheikh. 1-5 [doi]
- A cluster based secure architecture for vehicular ad hoc networksTahani Gazdar, Abdelfettah Belghith, Abderrahim Benslimane. 1-8 [doi]
- Small-worlds clustering applied to documents re-rankingMohamed Khazri, Mohamed Tmar, Mohamed Abid. 1-6 [doi]
- Management scheme for intelligent terminals for the information super-highwaysHazem El-Gendy, Osman Ibrahim, Nabil El-Kadhi, Narayan C. Debnath. 1-6 [doi]
- Predictive multi-hop stable routing in Vehicular Ad Hoc NetworksSanjay Kumar Dhurandher, Mohammad S. Obaidat, Pulkit Jindal, Rajneesh Chavli, Sanchit Valecha. 1-6 [doi]
- 802.15.4, a MAC layer solution for PLCCedric Chauvenet, Bernard Tourancheau, Denis Genon-Catalot. 1-8 [doi]
- The genus of the complete multipartite graph and the complete multi-layered graphSaïd Bettayeb, Quan T. Nguyen. 1-4 [doi]
- Control for continuous-time Markovian Jumps Linear Systems associated with a finite number of jump timesCristiane Nespoli. 1 [doi]
- IK-BKM: An incremental clustering approach based on intra-cluster distanceSarra Ben Hariz, Zied Elouedi. 1-8 [doi]
- Tracking human face features in thermal images for respiration monitoringFarah Q. Al-Khalidi, Reza Saatchi, Derek Burke, Heather Elphick. 1-6 [doi]
- Towards a formal framework for developing concurrent programs: Modeling dynamic behaviorHassan Haghighi. 1-8 [doi]
- A component based testing technique for a MANET routing protocolFatiha Zaïdi, Mounir Lallali, Stéphane Maag. 1-7 [doi]
- Some side effects of FHSS on Bluetooth networks distributed algorithmsAhmed Jeddah, Guy-Vincent Jourdan, Nejib Zaguia. 1-8 [doi]
- Generate secure mobile agent by using SMS to protect HostsTarig Mohamed Ahmed. 1-4 [doi]
- Adaptive particle swarm for solving the Dynamic Vehicle Routing ProblemMostepha Redouane Khouadjia, Laetitia Jourdan, El-Ghazali Talbi. 1-8 [doi]
- Real-time execution models for co-simulationCyril Faure, Nicolas Pernet. 1-8 [doi]
- Optimization of the Business Process metrics definition according to the BPDM standard and its formal definition in OCLNarayan C. Debnath, C. Salgado, M. Peralta, Daniel Riesco, German Montejano. 1-8 [doi]
- Text thematic fragmentation and identificationKhaoula Mahmoudi, Sami Faiz. 1-8 [doi]
- An optimized filter for finding multiple repeats in DNA sequencesMaria Federico, Pierre Peterlongo, Nadia Pisanti. 1-8 [doi]
- Implementation of Donald elliptic projection for VH coordinates and calculation of air mileagePankaj D. Patil, Gongzhu Hu, S. N. Jayaram Murthy. 1-6 [doi]
- A possibilistic classification approach to handle continuous dataMyriam Bounhas, Khaled Mellouli. 1-8 [doi]
- Raising information system effectiveness through WebservicesSami Mahfoudhi, Rim Faiz. 1-5 [doi]
- Towards a decentralized architecture for information dissemination in Inter-Vehicles NetworksK. Dar, Mohamed Bakhouya, Jaafar Gaber, Maxime Wack. 1-6 [doi]
- A cooperative infrastructure discovery protocol for vehicle to Internet opportunistic communicationsNaourez Mejri, Fethi Filali, Farouk Kamoun. 1-8 [doi]
- Evolutionary placement of short sequence reads on multi-core architecturesAlexandros Stamatakis, Zsolt Komornik, Simon A. Berger. 1-8 [doi]
- 3D object modeling using multi-mother wavelet networkMohamed Othmani, Wajdi Bellil, Chokri Ben Amar, Adel M. Alimi. 1-5 [doi]
- A bind RGB color image watermarking based on singular value decompositionNour El-Houda Golea, Rachid Seghir, Redha Benzid. 1-5 [doi]
- Empirical performance evaluation of a fast authentication scheme in wireless access networksJahan Hassan, Björn Landfeldt. 1-6 [doi]
- A testbed for the evaluation of link quality estimators in wireless sensor networksNouha Baccour, Maissa Ben Jamåa, Denis do Rosário, Anis Koubaa, Habib Youssef, Mário Alves, Leandro Buss Becker. 1-8 [doi]
- Event-based adaptation policies for Fractal componentsJulien Dormoy, Olga Kouchnarenko. 1-8 [doi]
- Design of codebook using Centroid Neural Network with state dependence measureDong-Chul Park. 1-7 [doi]
- A Record to Record Travel metaheuristic to minimize total dispersion in food industrySaima Dhouib, Mounir Ben Aissa, Habib Chabchoub. 1-4 [doi]
- A more efficient MOPSO for optimizationWalid Elloumi, Adel M. Alimi. 1-7 [doi]
- RBT-Km: K-Means clustering for Multiple Sequence AlignmentJavid Taheri, Albert Y. Zomaya. 1-8 [doi]
- Aspect oriented Modeling of Real-Time system with UML and MARTENaoufel Machta, M. Taha Bennani, Samir Ben Ahmed. 1-7 [doi]
- A parallel version of the Branch & Prune algorithm for the Molecular Distance Geometry ProblemAntonio Mucherino, Carlile Lavor, Leo Liberti, E.-G. Talbi. 1-6 [doi]
- A component and aspect-based platform for simulating Real-Time DatabasesLeila Baccouche, Sami Limam. 1-4 [doi]
- Detecting type errors and secure coding in C/C++ applicationsHamid Mcheick, Heni Dhiab, Mohamad Dbouk, Rakan Mcheik. 1-9 [doi]
- A trust communication with SIP protocolSamer El-Sawda, Pascal Urien, Rami El Sawda. 1-6 [doi]
- Implementation of a DNA-based anomaly identification system utilizing associative string processor (ASP)Zouheir Trabelsi, Riham Hamdy. 1-8 [doi]
- Characteristics of assembled bursts in OBS network under correlated input trafficGargi Chakraborty, Subhrabrata Choudhury, Narayan C. Debnath. 1-6 [doi]
- Scalable co-scheduling strategies in distributed computingVictor V. Toporkov, Dmitry Yemelyanov, Anna S. Toporkova, Alexey Tselishchev. 1-8 [doi]
- Recovering business process diagrams from UML diagramsMaria Carmen Leonardi, María Virginia Mauco, Laura Felice, German Montejano, Daniel Riesco, Narayan C. Debnath. 1-6 [doi]
- Event extraction approach for Web 2.0Aymen Elkhlifi, Rim Faiz. 1-8 [doi]
- Accuracy of morphology-based phylogenetic fossil placement under Maximum LikelihoodSimon A. Berger, Alexandros Stamatakis. 1-9 [doi]
- A model for analyzing architectural attributesImen Derbel, Lamia Labed Jilani, Ali Mili. 1-7 [doi]
- Asynchronous locally self adjusted routing protocol for mobile multi hop ad hoc networksMohamed Amine Abid, Abdelfettah Belghith. 1-8 [doi]
- Performance evaluation of Independent Component Analysis in an iris recognition systemImen Bouraoui, Salim Chitroub, Ahmed Bouridane. 1-7 [doi]
- An improved genetic algorithm for efficient scheduling on distributed memory parallel systemsJohnatan E. Pecero, Pascal Bouvry. 1-8 [doi]
- Web-based recruitingSoumaya Amdouni, Wahiba Ben Abdessalem Karaa. 1-7 [doi]
- Decentralized resource management using a borrowing schemaNarkoy Batouma, Jean-Louis Sourrouille. 1-8 [doi]
- Facet-based access control model for View-Oriented ProgrammingMehdi Adda, Hamid Mcheick. 1-8 [doi]
- The limitations of genetic algorithms in software testingSultan H. Aljahdali, Ahmed S. Ghiduk, Mohammed E. El-Telbany. 1-7 [doi]
- QLT: A flow control strategy for wormhole network-on-chipMinghua Tang, Xiaola Lin. 1-8 [doi]
- A hybrid genetic algorithm for Golomb ruler problemNaouel Ayari, Thé Van Luong, Abderrazak Jemai. 1-4 [doi]
- The open Capacitated Arc Routing Problem: Complexity and algorithmsPaulo Morelato França, Fabio Luiz Usberti, André Luiz Morelato França. 1 [doi]
- Wireless multimedia sensor and actuator system: A necessary public security and safety testbed for an urban emergency preparedness class of applicationsAzzedine Boukerche. 1 [doi]
- Advances in e-Infrastructures for computational sciences and engineeringWolfgang Gentzsch. 1 [doi]
- Data analyzer based on data mining for Honeypot RouterAbdallah Ghourabi, Tarek Abbes, Adel Bouhoula. 1-6 [doi]
- Towards an automated tool for computing loop functionsLamia Labed Jilani, Olfa Mraihi, Asma Louhichi, Ali Mili. 1-8 [doi]
- Application of Pruned Bilinear Recurrent Neural Network to load predictionJae-Young Kim, Dong-Chul Park, Dong-Min Woo. 1-4 [doi]
- A dynamic barriers implementation in Bayesian-based bow tie diagrams for risk analysisAhmed Badreddine, Nahla Ben Amor. 1-8 [doi]
- Efficient sender authentication and signing of multicast streams over lossy channelsHamdi Eltaief, Habib Youssef. 1-7 [doi]
- Graph Coloring for class schedulingAmal Dandashi, Mayez Al-Mouhamed. 1-4 [doi]
- Evaluations of the strong ground motion parameter by neural computing and microtremor measurementTienfuan Kerh, Tienchi Ku, David J. Gunaratnam. 1-7 [doi]
- Evaluation of WiMAX QoS in a developing country s environmentEliamani Sedoyeka, Ziad Hunaiti, Daniel Tairo. 1-6 [doi]
- OLAP umbrella: Visualization model for multidimensional databasesTanmoy Bhowmik, Anirban Sarkar, Narayan C. Debnath. 1-8 [doi]
- A hybrid performance modeling approach for adaptive algorithm selection on hierarchical clustersWahid Nasri, Sami Achour. 1-8 [doi]
- Forecasting stock exchange using soft computing techniquesZainab Rahamneh, Mohamed Reyalat, Alaa F. Sheta, Sultan Aljahdali. 1-5 [doi]
- An approach of faults estimation in Takagi-Sugeno fuzzy systemsAtef Khedher, Kamel Ben Othman, Didier Maquin, Mohamed Benrejeb. 1-4 [doi]
- Autonomic architecture for wireless routing protocolsBen Arbia Anis, Youssef Habib. 1-7 [doi]
- Parallelization of the dynamic programming algorithm for solving the longest common subsequence problemBchira Ben Mabrouk, Hamadi Hasni, Zaher Mahjoub. 1-8 [doi]
- Feedback architecture for multimedia systemsBechir Alaya, Claude Duvallet, Bruno Sadeg. 1-8 [doi]
- A voting scheme to improve the secondary structure predictionJavid Taheri, Albert Y. Zomaya. 1-7 [doi]
- A novel Geocast technique with hole detection in underwater sensor networksSanjay Kumar Dhurandher, Mohammad S. Obaidat, Megha Gupta. 1-8 [doi]
- Classifying bags of keypoints using HMMsFatin Zaklouta, Bogdan Stanciulescu. 1-2 [doi]