Abstract is missing.
- A secure authentication mechanism for resource constrained devicesBacem Mbarek, Aref Meddeb, Wafa Ben Jaballah, Mohamed Mosbah. 1-7 [doi]
- A study of mobility support in wearable health monitoring systems: Design frameworkAmine Boulemtafes, Abderrezak Rachedi, Nadjib Badache. 1-8 [doi]
- Detection of Moroccan coastal upwelling using sea surface chlorophyll concentrationAnass El Aouni, Khalid Minaoui, Ayoub Tamim, Khalid Daoudi, Hussein M. Yahia, Abderrahman Atillah, Driss Aboutajdine. 1-4 [doi]
- Moving objects detection based on thresholding operations for video surveillance systemsOmar ElHarrouss, Driss Moujahid, Soukaina Elidrissi Elkaitouni, Hamid Tairi. 1-5 [doi]
- Improved election of cluster heads in LEACHChaima Bejaoui, Alexandre Guitton, Abdennaceur Kachouri. 1-4 [doi]
- The influence of 4Ps and system quality on perceived quality after mobile instant messaging usageParameth Voraseyanont, Mathupayas Thongmak. 1-4 [doi]
- Intrusion detection based on Neuro-Fuzzy classificationImen Gaied, Farah Jemili, Ouajdi Korbaa. 1-8 [doi]
- RPI.Idiom: A high-level language for first-class agent interaction protocolsAtef Nouri, Wided Lejouad Chaari, Khaled Ghédira. 1-8 [doi]
- An automatic approach to transform BPMN models to Pi-CalculusRiad Boussetoua, Hammadi Bennoui, Allaoua Chaoui, Khaled Khalfaoui, Elhillali Kerkouche. 1-8 [doi]
- Detecting skimming devices in ATM through image processingMohamed Musallam Khasib Al Rawahi, Smitha Sunil Kumaran Nair. 1-5 [doi]
- Analysis of the ambiguity function for phase-coded waveformsKaoutar Farnane, Khalid Minaoui, Awatif Rouijel, Driss Aboutajdine. 1-4 [doi]
- Bat inspired optimization approach for audio watermarking algorithmMustapha Hemis, Bachir Boudraa, Thouraya Merazi-Meksen. 1-7 [doi]
- Testing environment for embedded software product linesTakeru Kuroiwa, Noriyuki Kushiro. 1-7 [doi]
- A hardware accelerator for the IEEE 802.1X-2010 key hierarchy in automotive applicationsBerardino Carnevale, Francesco Falaschi, Diego Pacini, Gianluca Dini, Luca Fanucci. 1-6 [doi]
- Integration and formal security analysis of a quantum key distribution scheme within CHAP protocolAymen Ghilen, Mostafa Azizi, Ridha Bouallegue. 1-7 [doi]
- Evaluating enterprise architecture complexity using fuzzy AHP approach: Application to university information systemJihane Lakhrouit, Karim Baïna. 1-7 [doi]
- CFFL: Cluster formation using fuzzy logic for wireless sensor networksHassan El Alami, Abdellah Najid. 1-6 [doi]
- A classification rules mining method based on dynamic rules' frequencyIssa Qabajeh, Francisco Chiclana, Fadi Thabtah. 1-7 [doi]
- A modeling of a multi-agent system for the protein synthesisMohamed Hachem Kermani, Zizette Boufaïda. 1-7 [doi]
- A novel approach to improve background subtraction method for fall detection systemAbderrazak Iazzi, Rachid Oulad Haj Thami, Mohammed Rziza. 1-2 [doi]
- SmartOrBAC security and privacy in the Internet of ThingsImane Bouij-Pasquier, Abdellah Ait Ouahman, Anas Abou El Kalam, Mina Ouabiba de Montfort. 1-8 [doi]
- A blind robust image watermarking approach exploiting the DFT magnitudeMohamed Hamidi, Mohamed El Haziti, Hocine Cherifi, Driss Aboutajdine. 1-6 [doi]
- Sonar image segmentation based on statistical modeling of wavelet subbandsAyoub Karine, Noureddine Lasmar, Alexandre Baussard, Mohammed El Hassouni. 1-5 [doi]
- Fast content independent playlist generation for streaming mediaMatyas Jani. 1-6 [doi]
- SVM based approach for opinion classification in Arabic written tweetsRihab Bouchlaghem, Aymen Elkhelifi, Rim Faiz. 1-4 [doi]
- Belief Constraint Satisfaction ProblemsAouatef Rouahi, Kais Ben Salah, Khaled Ghédira. 1-4 [doi]
- A plug-in for Eclipse towards supporting business process lines documentationMarcelo Figueiredo Terenciani, Geraldo Barbosa Landre, Débora Maria Barroso Paiva, Maria Istela Cagnin. 1-8 [doi]
- AES cryptography in color image steganography by genetic algorithmsAura Conci, Andre Luiz Brazil, Simone Bacellar Leal Ferreira, Trueman MacHenry. 1-8 [doi]
- Runtime deduction of case ID for unlabeled business process execution eventsIman M. A. Helal, Ahmed Awad, Ali El Bastawissi. 1-8 [doi]
- SOA based e-government interoperabilityMohamed Mahmoud El Benany, Omar El Beqqali. 1-2 [doi]
- An efficient method for Objects indexing in three dimensionsS. Hellam, Y. Oulahrir, F. El Mounchid, A. Sadiq, S. Mbarki. 1-8 [doi]
- Monitoring solution for autonomic Middleware-level QoS management within IoT systemsYassine Banouar, Saad Reddad, Codé Diop, Christophe Chassot, Abdellah Zyane. 1-8 [doi]
- Metrics and performance indicators to evaluate workflow processes on the cloudNarayan C. Debnath, Mario Peralta, Carlos Salgado, Lorena Baigorria, German Montejano, Daniel Riesco. 1-6 [doi]
- Spanning tree based method for a social network analysisRaihana Mokhlissi, Dounia Lotfi, Mohamed El Marraki. 1-8 [doi]
- The filtered combination of the weighted edit distance and the Jaro-Winkler distance to improve spellchecking Arabic textsHicham Gueddah, Abdellah Yousfi, Mostafa Belkasmi. 1-6 [doi]
- An abstract machine for integrating heterogeneous web applicationsMarcio A. Macedo, Daniel A. S. Carvalho, Martin A. Musicante, Alberto Pardo, Umberto Souza da Costa. 1-8 [doi]
- A taxonomy of identities management systems in IOTHajer Boujezza, Modher Al-Mufti, Hela Kaffel Ben Ayed, Leila Saidane. 1-8 [doi]
- Arabic text summarization based on graph theoryNabil Alami, Mohammed Meknassi, Saïd El Alaoui Ouatik, Noureddine Ennahnahi. 1-8 [doi]
- Social intelligence framework: Extracting and analyzing opinions for social CRMFatima Zohra Ennaji, Abdelaziz El Fazziki, Mohammed Sadgal, Djamal Benslimane. 1-7 [doi]
- TALAA-ASC: A sentence compression corpus for ArabicRiadh Belkebir, Ahmed Guessoum. 1-8 [doi]
- Business process outsourcing to the Cloud: What activity to outsource?Mouna Rekik, Khouloud Boukadi, Hanêne Ben-Abdallah. 1-7 [doi]
- Petri net modeling dynamic context of container for risk managementAli Sahnoun, Ramdane Maamri. 1-8 [doi]
- A constraint-aware optimized path recommender in a crowdsourced environmentFaizan Ur Rehman, Ahmed Lbath, Bilal Sadiq, Md. Abdur Rahman, Abdullah Murad, Imad Afyouni, Akhlaq Ahmad, Saleh M. Basalamah. 1-8 [doi]
- Pre collision detection system for pedestrian safety based on HOLYoussef Azdoud, Aouatif Amine, Nawal Alioua, Mohammed Rziza. 1-2 [doi]
- Building a structured collaboration system from XML specificationSara Najam, Hajar Mousannif, Mohamed Ouzzif. 1-8 [doi]
- Reducing the inter processor migrations of the DP-WRAP schedulingEl Mostafa Daoudi, Abdelmajid Dargham, Aicha Kerfali, Mohammed Khatiri. 1-6 [doi]
- An extended Eye Movement Tracker system for an electric wheelchair movement controlFatma Ben Taher, Nader Ben Amor, Mohamed Jallouli. 1-7 [doi]
- Towards a new framework for clustering in a mixed data space: Case of gasoline service stations segmentation in MoroccoM. Lahlou Kassi, A. Berrado, L. Benabbou, K. Benabdelkader. 1-6 [doi]
- Studies of computing techniques for performing face recognition with a focus in the crowds: A distributed architecture based on cloud computingCarlos Eduardo Monteiro, Luis Carlos Trevelin. 1-5 [doi]
- Coalition-based access control models for critical infrastructuresIman Ben Abdelkrim, Amine Baïna, Mostafa Bellafkih. 1-6 [doi]
- Combining Case-Based Reasoning and Process Mining to improve collaborative decision-making in products designFatima-Zahra Berriche, Besma Zeddini, Hubert Kadima, Alain Rivière. 1-7 [doi]
- Volumetric image reconstruction by 3D Hahn momentsMostafa El Mallahi, Abderrahim Mesbah, Hassan Qjidaa, Aissam Berrahou, Khalid Zenkouar, Hakim el Fadili. 1-8 [doi]
- Mining traffic accident data by subgroup discovery using combinatorial targetsJeongmin Kim, Kwang Ryel Ryu. 1-6 [doi]
- Anomaly Behavior Analysis System for ZigBee in smart buildingsBilal Al Baalbaki, Jesus Pacheco, Cihan Tunc, Salim Hariri, Youssif B. Al-Nashif. 1-4 [doi]
- A cloudlet architecture using mobile devicesAbd El-Hameed G. El-Barbary, Layla A. A. El-Sayed, Hussein H. Aly, Mohamed Nazih ElDerini. 1-8 [doi]
- G2WS: Gloss-based WordNet and Wiktionary semantic Similarity measureMohamed Ben Aouicha, Mohamed Ali Hadj Taieb. 1-7 [doi]
- Combining RFM model and clustering techniques for customer value analysis of a company selling onlineRachid Ait Daoud, Abdellah Amine, Belaid Bouikhalene, Rachid Lbibb. 1-6 [doi]
- A formal pattern for dynamic networks through evolving graphsFaten Fakhfakh, Mohamed Tounsi, Ahmed Hadj Kacem, Mohamed Mosbah. 1-4 [doi]
- Proposition of a Bayesian model for the propagation of the information in a wireless sensor networkFrédéric Lehmann, Dina Chaal, Abdelouahid Lyhyaoui. 1-8 [doi]
- Bringing flexibility to ontology learning from relational databasesBouchra El Idrissi, Salah Baïna, Karim Baïna. 1-8 [doi]
- Behavioral appraoch for intrusion detectionTaha Ait Tchakoucht, Mostafa Ezziyyani, Mohammed Jbilou, Mikaël Salaun. 1-5 [doi]
- Towards a molecules production from DNA sequences based on clustering by 3D cellular automata approach and n-grams techniqueFatima Kabli, Reda Mohamed Hamou, Abdelmalek Amine. 1-7 [doi]
- Requirements definition for a holistic approach of cloud computing governanceYassine Bounagui, Hatim Hafiddi, Abdellatif Mezrioui. 1-8 [doi]
- A formal approach for SOA design patterns compositionImen Tounsi, Mohamed Hadj Kacem, Ahmed Hadj Kacem, Khalil Drira. 1-8 [doi]
- Parallel SAT based closed frequent itemsets enumerationImen Ouled Dlala, Saïd Jabbour, Lakhdar Sais, Yakoub Salhi, Boutheina Ben Yaghlane. 1-8 [doi]
- Towards patterns-based Linguistic Web Service compositionNabil Baklouti, Bilel Gargouri, Mohamed Jmaiel. 1-6 [doi]
- An architecture for the Internet of Things with decentralized data and centralized controlOla Salman, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab. 1-8 [doi]
- Social network integration to e-learning environmentSamuel Ouya, Ahmath Bamba Mbacke, Gervais Mendy, Pape Waly Diouf, Kalidou Sy. 1-4 [doi]
- Image classification using separable invariant moments of Krawtchouk-TchebichefMhamed Sayyouri, Abdeslam Hmimid, H. Karmouni, Hassan Qjidaa, A. Rezzouk. 1-6 [doi]
- Comparative study of the systems of semantic integration of information: A surveyOumayma Banouar, Said Raghay. 1-8 [doi]
- Toward resolving access control policy conflict in inter-organizational workflowsAsmaa Elkandoussi, Hanan Elbakkali, Narimane Elhilali. 1-4 [doi]
- Cloud environment assignment: A context-aware and Dynamic Software Product Lines-based approachAsmae Benali, Bouchra El Asri, Houda Kriouile. 1-8 [doi]
- Indexing and classifiying video genres using Support Vector MachinesNouha Dammak, Yassine Benayed. 1-5 [doi]
- Integration of a quantum protocol for mutual authentication and secret key distribution within 802.11i standardAymen Ghilen, Mostafa Azizi, Ridha Bouallegue. 1-7 [doi]
- Efficient techniques for energy optimization in Mobile Cloud ComputingKhadijah S. Bahwaireth, Lo'ai Tawalbeh, Anas Basalamah, Yaser Jararweh, Mohammad Tawalbeh. 1-8 [doi]
- Towards a Domain-Specific Language for geospatial data visualization maps with Big Data setsCleverson Ledur, Dalvan Griebler, Isabel Harb Manssour, Luiz Gustavo Fernandes. 1-8 [doi]
- Extracting accurate performance indicators from execution logs using process modelsNesma M. Zaki, Ahmed Awad, Ehab Ezat. 1-8 [doi]
- User and group networks on YouTube: A comparative analysisMalek Jebabli, Hocine Cherifi, Chantal Cherifi, Atef Hamouda. 1-8 [doi]
- Multi-versions data and epsilon-serializability for QoS enhancement in distributed RTDBMSMalek Ben Salem, Emna Bouazizi, Rafik Bouaziz. 1-6 [doi]
- A multilayered scheme for transparent audio data hidingEl-Tigani B. Abdelsatir, Narayan C. Debnath, Hisham Abushama. 1-6 [doi]
- Energy-aware forwarding strategy for Metro Ethernet networksRihab Maaloul, Lamia Chaari, Bernard Cousin. 1-7 [doi]
- New Multi-Agent architecture of visual Intelligent Decision Support Systems application in the medical fieldHamdi Ellouzi, Hela Ltifi, Mounir Ben Ayed. 1-8 [doi]
- A comparative study of Named Entity Recognition for Arabic using ensemble learning approachesIsmail El bazi, Nabil Laachfoubi. 1-6 [doi]
- Contribution to SMS management over 4G network in distance education contextLandry T. Yelome, Samuel Ouya, Samba Ndiaye, Sidi Mohamed Farssi. 1-6 [doi]
- Collaborative Xmeans-EM clustering for automatic detection and segmentation of moving objects in videoHiba Ramadan, Hamid Tairi. 1-2 [doi]
- An improved mapReduce design of kmeans for clustering very large datasetsAmira Boukhdhir, Oussama Lachiheb, Mohamed Salah Gouider. 1-6 [doi]
- A cost-aware model for risk mitigation in Cloud computing systemsHisham A. Kholidy, Abdelkarim Erradi. 1-7 [doi]
- A novel penalty model for managing and applying penalties in Cloud ComputingAdil Maarouf, Bouchra El Qacimy, Abderrahim Marzouk, Abdelkrim Haqiq. 1-6 [doi]
- Improvement of route lifetime of LAR protocol for VANET in highway scenarioMohamed Nabil, Abdelmajid Hajami, Abdlakrim Haqiq. 1-8 [doi]
- Data quality enhancement in Internet of Things environmentAimad Karkouch, Hassan Al Moatassime, Hajar Mousannif, Thomas Noël. 1-8 [doi]
- Multi-hop routing for distributed clustering protocols in wide wireless sensor networksAbderrahmen Guermazi, Abdelfettah Belghith, Mohamed Abid. 1-6 [doi]
- Considering dependability requirements in the context of Decision Support SystemsImane Hilal, Nadia Afifi, Mohamed Ouzzif, Hicham Belhaddaoui. 1-8 [doi]
- Learning through play in pervasive context: A surveyRachid Lamrani, El Hassan Abdelwahed. 1-8 [doi]
- Fundamental pillars for an effective cybersecurity strategyHasna Elkhannoubi, Mustapha Belaïssaoui. 1-2 [doi]
- Database auditing and forensics: Exploration and evaluationSalam Ismail Rasheed Khanji, Asad Masood Khattak, Hakim Hacid. 1-6 [doi]
- Cloud-based Arabic reCAPTCHA service: Design and architectureH. Abubaker, Khaled Salah, H. Al-Muhairi, A. Bentiba. 1-6 [doi]
- ANFIS: General description for modeling dynamic objectsM. Alakhras, M. Oussalah, M. Hussein. 1-8 [doi]
- MapReduce based scalable range query architecture for big spatial dataUmut Kizgindere, Süleyman Eken, Ahmet Sayar. 1-4 [doi]
- Brachiopods classification based on fusion of global and local complete and stable descriptorsYoussef Ait Khouya, Faouzi Ghorbel, Noureddine Alaa. 1-6 [doi]
- A new Authentication and Key Agreement protocol for SIP in IMSSaliha Mallem, Amina Zemmache, Chafia Yahiaoui. 1-7 [doi]
- Access control models in IoT: The road aheadAafaf Ouaddah, Hajar Mousannif, Abdellah Ait Ouahman. 1-2 [doi]
- A statistical approach for the induction of a grammar of ArabicEssma Selab, Ahmed Guessoum. 1-8 [doi]
- Performance evaluation of IEEE 802.15.6 CSMA/CA-based CANet WBANHend Fourati, Hanen Idoudi, Thierry Val, Adrien van den Bossche, Leïla Azouz Saïdane. 1-7 [doi]
- Towards an Arabic legal ontology based on documents properties extractionImen Bouaziz Mezghanni, Faïez Gargouri. 1-8 [doi]
- XPath translation to enhance the semantic matching of fine-grained Web service security policiesMonia Ben Brahim, Tarak Chaari, Mohamed Jmaiel. 1-8 [doi]
- New learning approach for computer-aided diagnosticYoussef Bourass, Hamid Zouaki, Abdelkhalak Bahri. 1-9 [doi]
- Cosolver2B: An efficient local search heuristic for the Travelling Thief ProblemMohamed El Yafrani, Belaïd Ahiod. 1-5 [doi]
- DASH-DMS: To improve streaming video over HTTPHaifa Harrouch, Mourad Kaddes, Majed Abdouli, Rafik Bouaziz, Claude Duvallet. 1-8 [doi]
- Using invariant feature descriptors for an efficient image retrievalSara Hbali, Mohammed Sadgal, Abdelaziz El Fazziki. 1-4 [doi]
- Building holistic social media strategy refering to social intelligence and digital maturityMeryem Boufim, Hafid Barka. 1-8 [doi]
- Towards a semantic approach for discovering context aware servicesTarik Fissaa, Hatim Guermah, Hatim Hafiddi, Mahmoud Nassar. 1-4 [doi]
- Curvelet-based locality sensitive hashing for mammogram retrieval in large-scale datasetsAmira Jouirou, Abir Baazaoui, Walid Barhoumi, Ezzeddine Zagrouba. 1-8 [doi]
- Efficient interleaved modular multiplication based on sign detectionMohamed A. Nassar, Layla A. A. El-Sayed. 1-5 [doi]
- A survey of uncertainty handling in frequent subgraph mining algorithmsMohamed Moussaoui, Montaceur Zaghdoud, Jalel Akaichi. 1-8 [doi]
- Bounding aggregations on bulk arrivals for performance analysis of cloudsFarah Aït-Salaht, Hind Castel. 1-8 [doi]
- Amazigh verb in the Universal Networking LanguageImane Taghablout, Fadoua Ataa-Allah, Mohamed El Marraki. 1-4 [doi]
- Decentralized H∞ control of interconnected systems with time-delaysAmal Zouhri, Ismail Boumhidi. 1-6 [doi]
- Towards an alignment of SysML and simulation toolsBassim Chabibi, Adil Anwar, Mahmoud Nassar. 1-6 [doi]
- Measuring inconsistency ontological changes based on communities in ontologyMouhamadou Gaye, Mamadou Bousso, Ousmane Sall, Moussa Lo. 1-4 [doi]
- A Reduced Reference Image Quality assessment for Multiply Distorted ImagesAladine Chetouani. 1-4 [doi]
- Formal modeling of the Simple Text Oriented Messaging Protocol using Event-B methodSanae El Mimouni, Mohamed Bouhdadi. 1-4 [doi]
- Multi-factor authentication based on multimodal biometrics (MFA-MB) for Cloud ComputingAbdeljebar Mansour, Mohamed Sadik, Essaid Sabir. 1-4 [doi]
- Information matrix: Fighting back using a matrixSanaa Kaddoura. 1-6 [doi]
- Inference models for Twitter user's home location predictionHicham G. Elmongui, Hader Morsy, Riham Mansour. 1-8 [doi]
- A comparative study of multi-class support vector machine methods for Arabic characters recognitionMarwa Amara, Khaled Ghédira, Kamel Zidi, Salah Zidi. 1-6 [doi]
- A Rules-based system for model compositionSamia Benabdellah Chaouni, Mounia Fredj, Salma Mouline. 1-8 [doi]
- A context-aware middleware for medical image based reportsÉrick Oliveira Rodrigues, José Viterbo, Aura Conci, Trueman MacHenry. 1-4 [doi]
- Enhanced Unequal Clustering Algorithm for Wireless Sensor NetworksSaid Talbi, Lotfi Zaouche. 1-4 [doi]
- SSCF: A semantic and social-based collaborative filtering approachLamia Berkani. 1-4 [doi]
- CBIR using the 2-D ESPRIT method: Application to Coil_100 databaseChawki Youness, El Asnaoui Khalid, Ouanan Mohammed, Aksasse Brahim. 1-8 [doi]
- Cloud computing architecture and migration strategy for universities and higher educationHanen Chihi, Walid Chainbi, Khaled Ghédira. 1-8 [doi]
- A novel approach based on Support Vector Machines for automatic speaker identificationRania Chakroun, Leila Beltaifa Zouari, Mondher Frikha, Ahmed Ben Hamida. 1-5 [doi]
- SGRL-Selective Gateway and Reinforcement Learning-based routing for WMNMustapha Boushaba, Abdelhakim Hafid, Abdelilah Maach, Driss El Ghanami. 1-8 [doi]
- Integration of a quantum authenticated key distribution scheme in the EAP-TLS protocolAymen Ghilen, Mostafa Azizi, Ridha Bouallegue. 1-5 [doi]
- Serializable use of Read Committed isolation levelMohammad Alomari, Alan Fekete. 1-8 [doi]
- Improved Arabic handwriting word segmentation approach using Random ForestsRoqyiah M. Abdeen, Ahmed Afifi, Ashraf B. Elsisi. 1-8 [doi]
- Using conceptual reasoning for inconsistencies detection in Islamic advisory opinion (Fatwas)Jameela Al Otaibi, Samir Elloumi, Ali Jaoua, Abdelaali Hassaïne. 1-5 [doi]
- Design, implementation, and evaluation of 6LoWPAN for home and building automation in the Internet of ThingsSon N. Han, Quyet H. Cao, Bahram Alinia, Noël Crespi. 1-8 [doi]
- Internet of things context-aware privacy architectureRachid Selt, Challal Yacine, Nadjia Benblidia. 1-2 [doi]
- Proving distributed algorithms for mobile agents: Examples of spanning tree computation in dynamic networksMouna Ktari, Mohamed Amine Haddar, Ahmed Hadj Kacem, Mohamed Mosbah. 1-7 [doi]
- Supporting collaborative work on ontology learning from Relational DatabasesBouchra El Idrissi, Salah Baïna, Karim Baïna. 1-6 [doi]
- Area and delay aware approaches for realizing multi-operand addition on FPGAs using two-operand addersNoureddine Chabini, Said Belkouch. 1-4 [doi]
- Optimal model transformation of BPMN to DEVSSofiane Boukelkoul, Ramdane Maamri. 1-8 [doi]
- Continuous monitoring of adaptive e-learning systems requirementsLamiae Dounas, Raúl Mazo, Camille Salinesi, Omar El Beqqali. 1-8 [doi]
- Using Bloom's taxonomy to enhance interactive concentric circles representationEmna Ben Mohamed, Hela Ltifi, Mounir Ben Ayed. 1-8 [doi]
- Optimal parallel scheduling for resolution a triangular system with availability constraintsMounira Belmabrouk, Mounir Marrakchi. 1-7 [doi]
- LeadersRank: Towards a new approach for community detection in social networksSara Ahajjam, Mohamed El Haddad, Hassan Badir. 1-8 [doi]
- GPU implementation of the multi depot Vehicle Routing ProblemAbdelhamid Benaini, Achraf Berrajaa, El Mostafa Daoudi. 1-7 [doi]
- Learning ontology from Big Data through MongoDB databaseHanen Abbes, Soumaya Boukettaya, Faïez Gargouri. 1-7 [doi]
- Advanced search in the Qur'an using semantic modelingAimad Hakkoum, Said Raghay. 1-4 [doi]
- Emotion analysis of Arabic articles and its impact on identifying the author's genderKholoud Alsmearat, Mohammed A. Shehab, Mahmoud Al-Ayyoub, Riyad Al-Shalabi, Ghassan Kanaan. 1-6 [doi]
- Using text mining to locate concepts in execution tracesMostefai Abdelkader, Ricardo Pérez-Castillo, Malki Mimoun. 1-6 [doi]
- xLONGWisE: An environment to support the execution of Long Running WorkflowsMilton S. S. Junior, Nelson S. Rosa, Fernando Antônio Aires Lins. 1-8 [doi]
- Analysis of the effect of weather determinants on lodging demands using big data processingSeungwoo Jeon, Bonghee Hong, Hyeongsoon Im. 1-8 [doi]
- Domain ontologies in the context of Requirements EngineeringPaulo Afonso Parreira, Rosângela Aparecida Dellosso Penteado. 1-8 [doi]
- Refinement and reuse of ontologies semantic mappingMessaouda Fareh, Hadjer Guellati, Chaima Elfarrouji. 1-4 [doi]
- Text readability for Arabic as a foreign languageHind Saddiki, Karim Bouzoubaa, Violetta Cavalli-Sforza. 1-8 [doi]
- Using SLA to guide database transition to NoSQL on the cloud: A systematic mapping studyFabio Leal, Martin A. Musicante. 1-8 [doi]
- Inspection and deconfliction of published virtual machine templates' remnant data for improved assurance in public CloudsBushra AlBelooshi, Khaled Salah, Thomas Martin, Ernesto Damiani. 1-4 [doi]
- Software Defined based smart grid architectureYaser Jararweh, Ala Darabseh, Mahmoud Al-Ayyoub, Abdelkader Bousselham, Elhadj Benkhelifa. 1-7 [doi]
- Low cost pedagogic device for practical works using embedded systemAbdessamad Malaoui. 1-8 [doi]
- Estimating software effort and function point using regression, Support Vector Machine and Artificial Neural Networks modelsSultan Aljahdali, Alaa F. Sheta, Narayan C. Debnath. 1-8 [doi]
- Overview of IaaS monitoring toolsRima Grati, Khouloud Boukadi, Hanêne Ben-Abdallah. 1-7 [doi]
- Deep architecture using Multi-Kernel Learning and multi-classifier methodsIlyes Rebai, Yassine Ben Ayed, Walid Mahdi. 1-6 [doi]
- SPL-UML: Software product lines design languageJihen Maâzoun, Nadia Bouassida, Hanêne Ben-Abdallah. 1-4 [doi]
- A measurement of the response times of various OpenFlow/SDN controllers with CBenchC. Laissaoui, Noureddine Idboufker, Raja Elassali, K. El Baamrani. 1-2 [doi]
- A new model for Online Social Networks case of FacebookDonia Khemakhem Krid, Naouel Ben Salem Grati, Riadh Robbana. 1-6 [doi]
- MigBSP++: Improving process rescheduling on Bulk-Synchronous Parallel applicationsRodrigo Da Rosa Righi, Roberto de Quadros Gomes, Vinicius Facco Rodrigues, Cristiano André da Costa, Antônio Marcos Alberti. 1-8 [doi]
- Nk-schemasSamir Anter, Ahmed Zellou, Ali Idri. 1-6 [doi]
- Accelerating Needleman-Wunsch global alignment algorithm with GPUsMaged Fakirah, Mohammed A. Shehab, Yaser Jararweh, Mahmoud Al-Ayyoub. 1-5 [doi]
- A metric for Literature-Based Discovery methodology evaluationAli Ahmed, Saadat M. Alhashmi. 1-5 [doi]
- Affine Reconstruction based on the Projective Reconstruction and Homography at InfinityB. Satouri, C. Bekkali, Khalid Satori, Abdellatif El Abderrahmani, Hamid Tairi. 1-8 [doi]
- Real-time Data Prefetching in Mobile ComputingKhalloufi Issam, El Beqqali Omar. 1-2 [doi]
- Structural-semantic approach for approximate frequent subgraph miningMohamed Moussaoui, Montaceur Zaghdoud, Jalel Akaichi. 1-8 [doi]
- Freehand sketch based 3D reconstruction using constraintsAfafe Annich, Abdellatif El Abderrahmani, Khalid Satori. 1-2 [doi]
- Neural Text Categorizer for topic identification of noisy Arabic TextsKheireddine Abainia, Siham Ouamour, Halim Sayoud. 1-8 [doi]
- Consistency awareness in a distributed collaborative system for semantic storesHafed Zarzour, Lamia Berrezzek, Hafida Ghomrani, Tarek Abid, Mokhtar Sellami 0001. 1-8 [doi]
- Domain-specific design pattern instanciationSaoussen Rekhis, Nadia Bouassida. 1-6 [doi]