Abstract is missing.
- An efficient intra block size decision for H.264/AVC encoding optimizationAbderrahmane Elyousfi, Hamza Hamout, Asma El Hachimi. [doi]
- Correlation of change size to fault-proneness: A real life case studyMarkus Zeindl, Markus Seitz, Christian Facchi. 1-6 [doi]
- A data cube design and construction methodology based on OLAP queriesRahma Djiroun, Kamel Boukhalfa, Zaia Alimazighi, Faten Atigui, Sandro Bimonte. 1-8 [doi]
- A broadcast authentication scheme in IoT environmentsBacem Mbarek, Aref Meddeb, Wafa Ben Jaballah, Mohamed Mosbah. 1-6 [doi]
- Performance evaluation and design considerations of lightweight block cipher for low-cost embedded devicesSonia Kotel, Fatma Sbiaa, Zeghid Medien, Mohsen Machhout, Adel Baganne, Rached Tourki. 1-7 [doi]
- Simulating the merge between user-centered graphs of social networksAmina Amara, Rihem Ben Romdhane, Mohamed Ali Hadj Taieb, Mohamed Ben Aouicha. 1-6 [doi]
- Texture classification using relative phase and Gaussian mixture models in the complex wavelet domainHind Oulhaj, Mohammed Rziza, Aouatif Amine, Rachid Jennane, Mohammed El Hassouni. 1-7 [doi]
- FlyAntClass: Intelligent move for ant based clustering algorithmAmira Hamdi, Mohamed Slimane, Nicolas Monmarché, Adel M. Alimi. 1-8 [doi]
- Parallel genetic algorithm for the uncapacited single allocation hub location problem on GPUAbdelhamid Benaini, Achraf Berrajaa, Jaouad Boukachour, Mustapha Oudani. 1-8 [doi]
- An new model for robot navigation based on AprioriAll algorithmCabral Lima, Renan Lobo, Adriano Joaquim de Oliveira Cruz, Bianca Pereira, Valk Castellani. 1-7 [doi]
- Enabling reconfiguration of adaptive control systems using real-time context-aware frameworkSoumoud Fkaier, Mohamed Romdhani, Mohamed Khalgui, Georg Frey. 1-8 [doi]
- Communication-aware VM consolidation based on formal concept analysisZaki Brahmi, Faten Ben Hassen. 1-8 [doi]
- High-level synthesis for FPGA design based-SLAM applicationMohamed Abouzahir, Abdelhafid Elouardi, Samir Bouaziz, Omar Hammami, Ismail Ali. 1-8 [doi]
- Anomaly behavior analysis of website vulnerability and securityPratik Satam, Douglas Kelly, Salim Hariri. 1-7 [doi]
- Hidden Markov Models for feature-level fusion of biometrics on mobile devicesMikhail I. Gofman, Sinjini Mitra, Nicholas Smith. 1-2 [doi]
- Event-driven modeling for context-aware information systemsZineb Aarab, Rajaa Saidi, Moulay Driss Rahmani. 1-8 [doi]
- Analysis and enhancements of an efficient biometric-based remote user authentication scheme using smart cardsSana Ibjaoun, Anas Abou El Kalam, Vincent Poirriez, Abdellah Ait Ouahman, Mina De Montfort. 1-8 [doi]
- QLAR: A Q-learning based adaptive routing for MANETsAbdellatif Serhani, Najib Naja, Abdellah Jamali. 1-7 [doi]
- An efficient minimum-process non-intrusive snapshot algorithm for vehicular ad hoc networksHoussem Mansouri, Al-Sakib Khan Pathan. 1-6 [doi]
- Parallel implementation of FCM-based volume segmentation of 3D imagesShadi AlZu'bi, Moahmmed A. Shehab, Mahmoud Al-Ayyoub, Elhadj Benkhelifa, Yaser Jararweh. 1-6 [doi]
- Data warehousing design: Automatic verification of conformity and summarizability constraintsAli Salem, Hanêne Ben-Abdallah. 1-6 [doi]
- Interval valued intuitionistic fuzzy weight techniques for TOPSIS methodFatma Dammak, Leila Baccour, Adel M. Alimi. 1-7 [doi]
- Intelligent Tunisian Arabic morphological analyzerNadia B. M. Karmani, Hsan Soussou, Adel M. Alimi. 1-8 [doi]
- Authenticity detection as a binary text categorization problem: Application to Hadith authenticationAbdelaali Hassaïne, Zeineb Safi, Ali Jaoua. 1-7 [doi]
- Serious games for vocational training: A compared approachHamza Abed, Philippe Pernelle, Chokri Ben Amar, Thibault Carron. 1-8 [doi]
- Novel time related quality of service criteriaTaycir Bouasker, Mahjoub Langar, Riadh Robbana. 1-8 [doi]
- The use of smart watches to monitor heart rates in elderly people: A complementary approachMajid H. Alsulami, Anthony S. Atkins, Russell J. Campion. 1-6 [doi]
- The collaborative relevance in the distributed information retrievalAdil Enaanai, Aziz Sdigui Doukkali, Ichrak Saif, Hicham Moutachaouik, Mustapha Hain. 1-6 [doi]
- Real-time scheduling of sporadic tasks in energy harvesting distributed reconfigurable embedded systemsWiem Housseyni, Olfa Mosbahi, Mohamed Khalgui, Maryline Chetto. 1-8 [doi]
- Advanced physical optical model for simulating rainbowsJinsen Zhang, Changwen Zheng, Yu Liu. 1-8 [doi]
- Temporal consistent stereo matching approach for road applicationsLahcen Koutti, Ilyas El Jaafari, Mohamed El Ansari. 1-6 [doi]
- Investigation on sentiment analysis for Arabic reviewsAshraf Elnagar. 1-7 [doi]
- Models and mechanisms for implementing playful scenariosNada Aouadi, Philippe Pernelle, Chokri Ben Amar, Thibault Carron, Stephane Talbot. 1-8 [doi]
- Person re-identification based on combined Gaussian weighted Fisher vectorsSalma Ksibi, Mahmoud Mejdoub, Chokri Ben Amar. 1-8 [doi]
- An agent-based architecture for a distributed MISRiad Bourbia, Lynda Dib, Ala-Eddine Benrazek. 1-2 [doi]
- A genetic algorithm feature selection based approach for Arabic Sentiment ClassificationA. A. Aliane, H. Aliane, M. Ziane, N. Bensaou. 1-6 [doi]
- Structure based modular ontologies compositionHanen Abbes, Faïez Gargouri. 1-8 [doi]
- Developing Turkish sentiment lexicon for sentiment analysis using online news mediaFatih Saglam, Hayri Sever, Burkay Genc. 1-5 [doi]
- Efficiency analysis of MANETs routing based on a new double metric with mobility and density modelsKaoutar Ourouss, Najib Naja, Abdellah Jamali. 1-8 [doi]
- CobWeb multidimensional model: From OLAP to tag cloudSaleh Alshomrani, Jamel Feki, Tarek Lefi, Omar Khrouf, Kaïs Khrouf. 1-8 [doi]
- A new method for ranking association rules with multiple criteria based on dominance relationAzzeddine Dahbi, Siham Jabri, Youssef Balouki, Taoufiq Gadi. 1-7 [doi]
- Intelligent layer for relational aggregated search based on deep neural networksSanae Achsas, El Habib Nfaoui. 1-2 [doi]
- Exploring the clustering of software vulnerability disclosure notifications across software vendorsJukka Ruohonen, Johannes Holvitie, Sami Hyrynsalmi, Ville Leppänen. 1-8 [doi]
- A compression-based technique to classify metamorphic malwareDuaa Ekhtoom, Mahmoud Al-Ayyoub, Mohammed Al-Saleh, Mohammad A. Alsmirat, Ismail Hmeidi. 1-6 [doi]
- Machine perception in gender recognition using RGB-D sensorsSafaa Azzakhnini, Lahoucine Ballihi, Driss Aboutajdine. 1-5 [doi]
- OFSF-BC: Online feature selection framework for binary classificationFatma Ben Said, Adel M. Alimi. 1-8 [doi]
- Universal metadata repository for document analysis and recognitionHassanin Al-Barhamtoshy, M. Khemakhem, Kamal M. Jambi, F. Essa, A. Fattouh, A. Al-Ghamdi. 1-6 [doi]
- Predicting the functional change status in UML activity diagram from the use case diagramMariem Haoues, Asma Sellami, Hanêne Ben-Abdallah. 1-8 [doi]
- Mobile app conceptual browser: Online marketplaces information extractionAboubakr Aqle, Fahad Islam, Eman Rezk, Ali Jaoua. 1-8 [doi]
- Class-association rules pruning using regularizationMohamed Azmi, Abdelaziz Berrado. 1-7 [doi]
- Automatic speech recognition errors detection using supervised learning techniquesRahhal Errattahi, Asmaa El Hannani, Hassan Ouahmane, Thomas Hain. 1-6 [doi]
- An UML class recommender system for software designAkil Elkamel, Mariem Gzara, Hanêne Ben-Abdallah. 1-8 [doi]
- Petri net extension for traffic road modellingYouness Riouali, Laila Benhlima, Slimane Bah. 1-6 [doi]
- Energy aware linear sensor placement scheme for water pipeline monitoringManel Elleuchi, Manel Boujelben, Mohamed Wassim Jmal, Mohamed Abid, Abdulfattah Mohammad Obeid, Mohammed S. BenSaleh. 1-8 [doi]
- Evaluation of 3D mesh segmentation using a weighted version of the Ochiai indexMohcine Bouksim, Fatima Rafii Zakani, Khadija Arhid, Taoufiq Gadi, Mohamed Aboulfatah. 1-7 [doi]
- Multifeature speech/music discrimination based on mid-term level statistics and supervised classifiersEya Mezghani, Maha Charfeddine, Chokri Ben Amar, Henri Nicolas. 1-8 [doi]
- Metamodeling approach for creating an abstract representation of simulation tools conceptsBassim Chabibi, Adil Anwar, Mahmoud Nassar. 1-7 [doi]
- Anomaly behavior analysis for building automation systemsZhiwen Pan, Jesus Pacheco, Salim Hariri. 1-8 [doi]
- Matching of omnidirectional images based on the geodesic distanceIbrahim Guelzim, Amina Amkoui, Lahcen Koutti. 1-5 [doi]
- An empirical method using features combination for Arabic native language identificationSeifeddine Mechti, Ayoub Abbassi, Lamia Hadrich Belguith, Rim Faiz. 1-5 [doi]
- Exploiting GPUs to accelerate clustering algorithmsMahmoud Al-Ayyoub, Qussai Yaseen, Mohammed A. Shehab, Yaser Jararweh, Firas AlBalas, Elhadj Benkhelifa. 1-6 [doi]
- A dynamic anti-windup AQM for congestion control in internetNabil El Fezazi, Sadek Belameedel Alaoui, Fatima El Haoussi, El Houssaine Tissir, Teresa Alvarez. 1-6 [doi]
- Enterprise information system migration to the cloud: Assessment phaseHela Malouche, Youssef Ben Halima, Henda Ben Ghézala. 1-6 [doi]
- A survey on privacy: Terminology, mechanisms and attacksRihab Boussada, Mohamed Elhoucine Elhdhili, Leïla Azouz Saïdane. 1-7 [doi]
- Identifying risks of software project management in Global Software Development: An integrative frameworkSaad Yasser Chadli, Ali Idri, José Luis Fernández Alemán, Joaquín Nicolás Ros, Ambrosio Toval. 1-7 [doi]
- Imperfect top-k skyline query with confidence levelSayda Elmi, Allel HadjAli, Mohamed Anis Bach Tobji, Boutheina Ben Yaghlane. 1-8 [doi]
- Promoting active participation of the learners in an authoring based learning movie systemA. S. M. Mahfujur Rahman, Abdulmotaleb El-Saddik. 1-6 [doi]
- New distances combination for facial expression recognition from image sequencesFatima Zahra Salmam, Abdellah Madani, Mohamed Kissi. 1-6 [doi]
- AntiPattren-based cloud ontology evaluationFaiza Loukil, Molka Rekik, Khouloud Boukadi. 1-8 [doi]
- Development of a thematic and structural elements grid for e-government strategies: Case study of Swiss cantonsKonrad Walser, Roman Hosang, Marco Meyer. 1-7 [doi]
- An efficient VLSI architecture design for integer DCT in HEVC standardAbdessamad El Ansari, Anass Mansouri, Ali Ahaitouf. 1-5 [doi]
- Data placement strategy for massive data applications based on FCA approachZaki Brahmi, Sahar Mili, Rihab Derouiche. 1-8 [doi]
- Semantic trajectory applied to the navigation of autonomous mobile robotsFernando de Lucca Siqueira, Patricia Della Mea Plentz, Edson Roberto de Pieri. 1-8 [doi]
- A selection model of ERP system in mobile ERP design science research: Case study: Mobile ERP usabilityKhalil Omar, Jorge Marx Gómez. 1-8 [doi]
- Text detection in natural scene images using two masks filteringHoussem Turki, Mohamed Ben Halima, Adel M. Alimi. 1-6 [doi]
- Complementary features for traffic sign detection and recognitionAyoub Ellahyani, Mohamed El Ansari. 1-6 [doi]
- Big data for supply chain management: Opportunities and challengesAbla Chaouni Benabdellah, Asmaa Benghabrit, Imane Bouhaddou, El Moukhtar Zemmouri. 1-6 [doi]
- DTMS-IoT: A Dirichlet-based trust management system mitigating on-off attacks and dishonest recommendations for the Internet of ThingsOumaima Ben Abderrahim, Mohamed Houcine Elhedhili, Leïla Saïdane. 1-8 [doi]
- An independent-domain natural language interface for relational database: Case Arabic languageHanane Bais, Mustapha Machkour, Lahcen Koutti. 1-7 [doi]
- A novel simultaneous failure recovery technique for large scale wireless sensor networksSamira Chouikhi, Inès El Korbi, Yacine Ghamri-Doudane, Leïla Azouz Saïdane. 1-6 [doi]
- A road rail PI hub allocation problem: Heuristic in static and dynamic caseFaiza Walha, Abdelghani Bekrar, Sondès Chaabane, Taïcir Loukil. 1-8 [doi]
- A new polynomial cluster deletion subproblemSabrine Malek, Wady Naanaa. 1-8 [doi]
- Integrated sensors system based on IoT and mobile cloud computingMajed AlOtaibi, Lo'ai Ali Tawalbeh, Yaser Jararweh. 1-5 [doi]
- Geographic interest forwarding in NDN-based wireless sensor networksAhmed Aboud, Haifa Touati. 1-8 [doi]
- Performance evaluation of RPL metrics in environments with strained transmission rangesCraig Thomson, Isam Wadhaj, Imed Romdhani, Ahmed Yassin Al-Dubai. 1-8 [doi]
- Event-driven wireless sensor networks based on consensusSlaheddine Chelbi, Claude Duvallet, Majed Abdouli, Rafik Bouaziz. 1-6 [doi]
- Towards a smart city ontologyTarek Abid, Hafed Zarzour, Mohamed Ridda Laouar, Mohamed Tarek Khadir. 1-6 [doi]
- A novel method for resemblance images using near fuzzy setYosr Ghozzi, Nesrine Baklouti, Adel M. Alimi. 1-8 [doi]
- How can crowdsourcing help in crisis situations? Missing kids case studyHasna El Alaoui El Abdallaoui, Abdelaziz El Fazziki, Abderrahmane Sadiq, Fatima Zohra Ennaji, Mohammed Sadgal. 1-7 [doi]
- Crosslingual automatic diacritization for Egyptian Colloquial DialectAyman A. Zayyan, Mohamed Elmahdy, Husniza Binti Husni, Shahrul Azmi Yousf. 1-6 [doi]
- Improved target tracking using regression tree in wireless sensor networksHanen Ahmadi, Federico Viani, Alessandro Polo, Ridha Bouallegue. 1-6 [doi]
- Clustering data stream under a belief function frameworkMaroua Bahri, Zied Elouedi. 1-8 [doi]
- The "Behavior, interaction and priority" framework applied to SystemC-based embedded systemsIsmail Assayad, Lamia Bljadiri, Abdelouahed Zakari, Tarik Nahhal. 1-6 [doi]
- Mobility support over RPL using sensor nodes speed classificationFatma Somaa, Inès El Korbi, Leïla Azouz Saïdane. 1-6 [doi]
- Hybrid community detection approach in multilayer social network: Scientific collaboration recommendation case studyWala Rebhi, Nesrine Ben Yahia, Narjès Bellamine-Ben Saoud. 1-8 [doi]
- Defining a UML profile for the consistency of design patternsHela Marouane, Achraf Makni, Rafik Bouaziz, Claude Duvallet, Bruno Sadeg. 1-8 [doi]
- HAD, a platform to create a historical dictionaryFaten Khalfallah, Chafik Aloulou, Lamia Hadrich Belguith. 1-6 [doi]
- A process-scheduling simulator based on virtual reality technologyMarcelo de Paiva Guimarães, Vagner Scamati, Mário Popolin Neto, Valeria Farinazzo Martins, Diego Roberto Colombo Dias, José Remo Ferreira Brega. 1-6 [doi]
- An efficient hybrid prediction approach for predicting cloud consumer resource needsAbdelkarim Erradi, Hisham A. Kholidy. 1-8 [doi]
- GPU implementation of multi-scale Retinex image enhancement algorithmHui Li, Weihao Xie, Xingang Wang, Shousheng Liu, Yingying Gai, Lei Yang. 1-5 [doi]
- Parallel triangular matrix system solving on CPU-GPU systemRyma Mahfoudhi, Sami Achour, Zaher Mahjoub. 1-6 [doi]
- Potential-fault cache-based regression test selectionSamia Hafez, Mustafa ElNainay, Mohammed Abougabal, Saleh ElShehaby. 1-8 [doi]
- 3D content generation to moodle platform to support anatomy teaching and learningFabrlcio Quintanilha Baptista, Mário Popolin Neto, Diego Roberto Colombo Dias, Marcelo de Paiva Guimarães, José Remo Ferreira Brega. 1-6 [doi]
- A density clustering approach for CBIR systemLacheheb Hadjer, Saliha Aouat. 1-8 [doi]
- Service oriented approach for modeling and generic integration of complex resources in MOOCsSahar Msaed, Philippe Pernelle, Chokri Ben Amar, Thibault Carron. 1-8 [doi]
- Assessing gene-disease relationship with multifunctional genes using GOHisham Al-Mubaid, Mohamed Shenify, Sultan Aljahdali. 1-6 [doi]
- Improving point matching on multimodal images using distance and orientation automatic filteringHanan Anzid, Gaëtan Le Goïc, Aissam Bekkari, Alamin Mansouri, Driss Mammass. 1-8 [doi]
- Event traffic detection using heterogenous wireless sensors networkFadoua Nejjari, Laila Benhlima, Slimane Bah. 1-6 [doi]
- Hand pose estimation system based on Viola-Jones algorithm for Android devicesHoussem Lahiani, Monji Kherallah, Mahmoud Neji. 1-6 [doi]
- Assessing the use of IP network management protocols in smart gridsMohamed Saleh, M. A. Abdou, M. Aboulhassan. 1-6 [doi]
- Just In Time Architecture (JITA) for dynamically composable data centersNirmal Kumbhare, Cihan Tunc, Salim Hariri, Ivan Djordjevic, Ali Akoglu, Howard Jay Siegel. 1-8 [doi]
- Novel AHP-based QoE factors' selection approachYosr Ben Youssef, Mériem Afif, Sami Tabbane. 1-6 [doi]
- An improved Arabic handwritten recognition system using embedded training based on HMMsMustapha Amrouch, Mouhcine Rabi, Driss Mammass. 1-5 [doi]
- Multisensors-based pedestrian detection systemRedouan Lahmyed, Mohamed El Ansari. 1-4 [doi]
- Moving object segmentation in video using spatiotemporal saliency and laplacian coordinatesHiba Ramadan, Hamid Tairi. 1-7 [doi]
- Towards ODRAH: An ontology-based data reliability assessment in mobile healthLamia Ben Amor, Imene Lahyani, Mohamed Jmaiel. 1-8 [doi]
- Data governance for security in IoT & cloud converged environmentsMajid Al-Ruithe, Siyakha Mthunzi, Elhadj Benkhelifa. 1-8 [doi]
- A classification methodology for security patterns to help fix software weaknessesLoukmen Regainia, Sébastien Salva, Cedric Ecuhcurs. 1-8 [doi]
- Building a standard dataset for Arabie sentiment analysis: Identifying potential annotation pitfallsMohammed Naji Al-Kabi, Areej A. Al-Qwaqenah, Amal H. Gigieh, Kholoud Alsmearat, Mahmoud Al-Ayyoub, Izzat Mahmoud Alsmadi. 1-6 [doi]
- A new approach of action recognition based on Motion Stable Shape (MSS) featuresImen Lassoued, Ezzeddine Zagrouba, Youssef Chahir. 1-8 [doi]
- A fuzzy similarity measure for search results evaluationMarwa Massaâbi, Jalel Akaichi. 1-6 [doi]
- Toward a generic approach to stylizationFrancois-Xavier Talgorn, Farès Belhadj, Vincent Boyer 0001. 1-8 [doi]
- More secure Internet of Things using robust encryption algorithms against side channel attacksLo'ai Ali Tawalbeh, Turki F. Al-Somani. 1-6 [doi]
- A non-Gaussian statistical modeling of SIFT and DT-CWT for radar target recognitionAyoub Karine, Abdelmalek Toumi, Ali Khenchaf, Mohammed El Hassouni. 1-5 [doi]
- Framework for a complete migration of relational databases to other types of databases(object oriented OO, object-relational OR, XML)Alae El Alami, Mohamed Bahaj. 1-7 [doi]
- A novel IEEE 802.15.6 CSMA/CA service differentiationHend Fourati, Hanen Idoudi, Leïla Azouz Saïdane. 1-7 [doi]
- A probabilistic model for web service composition in uncertain mobile contextsCheyma Ben Njima, Youssef Gamha, Lotfi Ben Romdhane. 1-7 [doi]
- A multilevel thresholding algorithm for image segmentation based on particle swarm optimizationMolka Dhieb, Mondher Frikha. 1-7 [doi]
- Analyses of social WeBhouse integrating SNA metricsMarwa Masmoudi, Faïza Ghozzi. 1-7 [doi]
- Cross-organizational orchestrator for e-government interoperabilityMohamed Mahmoud El Benany, Omar El Beqqali. 1-6 [doi]
- A Lexicon approach to multidimensional analysis of tweets opinionAfef Walha, Faïza Ghozzi, Faïez Gargouri. 1-8 [doi]
- GENUS: An ETL tool treating the Big Data VarietySalwa Souissi, Mounir BenAyed. 1-8 [doi]
- Towards a dynamic QoS management in IMS transport layer via SDNSara Khairi, Mostafa Bellafkih, Brahim Raouyane. 1-8 [doi]
- Romanized Arabic and Berber detection using prediction by partial matching and dictionary methodsWafia Adouane, Nasredine Semmar, Richard Johansson. 1-7 [doi]
- Toward a universal learning-based image quality metric with reference for stereoscopic imagesAladine Chetouani. 1-5 [doi]
- A survey of secondary studies in software process improvementAli Idri, Laila Cheikhi. 1-8 [doi]
- A hybrid trust management system for cloud environmentsManel Mrabet, Yosra Ben Saied, Leïla Azouz Saïdane. 1-6 [doi]
- A generic architecture of ADAS sensor fault injection for virtual testsMohamed Elgharbawy, Andreas Schwarzhaupt, Gerrit Scheike, Michael Frey, Frank Gauterin. 1-7 [doi]
- A fire color mapping-based segmentation: Fire pixel segmentation approachBruno Miguel Nogueira de Souza, Jacques Facon. 1-8 [doi]
- Investigating low level protocols for Wireless Body Sensor NetworksNadine Boudargham, Jacques Bou Abdo, Jacques Demerjian, Christophe Guyeux, Abdallah Makhoul. 1-6 [doi]
- Towards a new decisional needs formalizationAhmad Outfarouin, Abdelmounaim Abdali, Mohamedou Cheikh Tourad. 1-2 [doi]
- Abstracts generation as information retrieval resultsMounira Chkiwa, Anis Jedidi, Faïez Gargouri. 1-7 [doi]
- Telecommunication market share game: Inducing boundedly rational consumers via price misperceptionSara Handouf, Sara Arabi, Essaid Sabir, Mohamed Sadik. 1-7 [doi]
- A new recommendation algorithm for reducing dimensionality and improving accuracyBadr Ait Hammou, Ayoub Ait Lahcen, Driss Aboutajdine. 1-6 [doi]
- Quantum edge detection based on SHANNON entropy for medical imagesAbdelilah El Amraoui, Lhoussaine Masmoudi, Hamid Ez-Zahraouy, Youssef El Amraoui. 1-6 [doi]
- Generation of an adaptive e-learning domain model based on a fuzzy logic approachAli Aajli, Karim Afdel. 1-8 [doi]
- Design and implementation of a fall detection system on a Zynq boardSahar Abdelhedi, Mouna Baklouti, Riad Bourguiba, Jaouhar Mouine. 1-7 [doi]
- Towards a framework for customer emotion detectionMoulay Smail Bouzakraoui, Abdelalim Sadiq, Nourddine Enneya. 1-6 [doi]
- ExpOLAP: Towards exploratory OLAPDaniel Farias Batista Leite, Cláudio de Souza Baptista, Maxwell Guimarães de Oliveira, José Amilton Moura Acioli Filho, Tiago Eduardo da Silva. 1-8 [doi]
- Skyline-based approach for natural scene identificationAmeni Sassi, Chokri Ben Amar, Serge Miguet. 1-8 [doi]
- Mobile application to support dyslexia diagnostic and reading practiceValeria Farinazzo Martins, Thiago Lima, Paulo N. M. Sampaio, Marcelo de Paiva Guimarães. 1-6 [doi]
- Recommendation system based contextual analysis of Facebook commentFiras Ben Kharrat, Aymen Elkhelifi, Rim Faiz. 1-6 [doi]
- Intelligent multi agent system based solution for data protection in the cloudSara Rhazlane, Hassan Badir, Nouria Harbi, Nadia Kabachi. 1-7 [doi]
- Data-intensive service composition in Cloud Computing: State-of-the-artTakwa Mohsni, Zaki Brahmi, Mohamed Mohsen Gammoudi. 1-7 [doi]
- Towards an auto-tuning system design for optimal sparse compression format selection with user expertiseIchrak Mehrez, Olfa Hamdi-Larbi, Thomas Dufaud, Nahid Emad. 1-6 [doi]
- Analyzing textual documents with new OLAP operatorsMaha Azabou, Kaïs Khrouf, Jamel Feki, Chantal Soulé-Dupuy, Nathalie Vallès. 1-8 [doi]
- Using big data values to enhance social event detection patternSoumaya Cherichi, Rim Faiz. 1-8 [doi]
- A process mining oriented approach to improve process models analysis in developing countriesGaelle Laetitia Mouafo Mapikou, Roger Atsa Etoundi. 1-8 [doi]
- DIN: An efficient algorithm for detecting influential nodes in social graphs using network structure and attributesMyriam Jaouadi, Lotfi Ben Romdhane. 1-8 [doi]
- Security analysis of existing IoT key management protocolsSarra Naoui, Mohamed Elhoucine Elhdhili, Leïla Azouz Saïdane. 1-7 [doi]
- A scalable maximum-clique algorithm using Apache SparkAmr Elmasry, Ayman Khalafallah, Moustafa Meshry. 1-8 [doi]
- Construction of navigation map to retrieve semantically information from medical resourcesOlfa Dridi Mekni, Mohamed Ben Ahmed. 1-7 [doi]
- High performance volumetric modelling from silhouette: GPU-image-based visual hullSaouli Abdelhak, Babahenini Med Chaouki. 1-7 [doi]
- Reconfigurable function blocks: Extension to the standard IEC 61499Safa Guellouz, Adel Benzina, Mohamed Khalgui, Georg Frey. 1-8 [doi]
- On repairing queries in cloud computingAbderrahim Ait Wakrime, Saïd Jabbour. 1-6 [doi]
- Toward an optimal B-spline wavelet transform for image compressionRania Boujelbene, Yousra Ben Jemaa, Mourad Zribi. 1-8 [doi]
- A clustering based approach for query relaxation in evidential databasesAbir Amami, Zied Elouedi, Allel HadjAli. 1-8 [doi]
- Semi-supervised outlier detection via bipartite graph clusteringAyman El-Kilany, Neamat El-Tazi, Ehab Ezzat. 1-6 [doi]
- Convolution algorithm for implementing 2D discrete wavelet transform on the FPGAI. Slimani, A. Zaarane, A. Hamdoun. 1-3 [doi]
- On the road to the Internet of Biometric Things: A survey of fingerprint acquisition technologies and fingerprint databasesFatimah Al-alem, Mohammad A. Alsmirat, Mahmoud Al-Ayyoub. 1-6 [doi]
- Bayesian network for discovering the interests of authorsEmna Hlel, Salma Jamoussi, Abdelmajid Ben Hamadou. 1-6 [doi]
- A conceptual UML profile for modeling fuzzy trajectory data: An ambulance use caseOlfa Layouni, Jalel Akaichi. 1-6 [doi]
- iXercise: An immersive platform for exercise intervention for special needs populationsYunho Huh, Justan Klaus, Magda El Zarki. 1-7 [doi]
- Interoperable Arabic language resources building and exploitation in SAFAR platformDriss Namly, Yasser Regragui, Karim Bouzoubaa. 1-7 [doi]
- Perceptions and attitudes of clinical staff towards telemedicine acceptance in Saudi ArabiaAbdulellah Alaboudi, Anthony S. Atkins, Bernadette Sharp, Mohammed Alzahrani, Ahmed Balkhair, Tamara Sunbul. 1-8 [doi]
- Towards a dynamic and polarity-aware social user profile modelingAbir Gorrab, Ferihane Kboubi, Henda Ben Ghézala, Bénédicte Le Grand. 1-7 [doi]
- Quality evaluation of cardiac decision support systems using ISO 25010 standardIlham Kadi, Ali Idri, Sofia Ouhbi. 1-8 [doi]
- Intrusion detection based on genetic fuzzy classification systemMariem Belhor, Farah Jemili. 1-8 [doi]
- 802.11n wireless LAN performance for mobile devicesWilliam Agosto-Padilla, Alae Loukili, Anthony K. Tsetse, Alexander L. Wijesinha, Ramesh K. Karne. 1-6 [doi]
- Some commericial concerns of Amazon's community forums: The case of the KindleAllie Whitman, Bernard J. Jansen. 1-6 [doi]
- Comparative analysis of the HEVC decoder on two embedded processors using NEON technologyAbdessamad El Ansari, Anass Mansouri, Ali Ahaitouf. 1-4 [doi]
- Customised performance benchmarking for novel multi-tenancy architectureElhadj Benkhelifa, Dayan Abishek Fernando, Abdulaziz Alangari. 1-6 [doi]
- Performance evaluation of interest traffic generation and forwarding strategy impact in ICNAnwar Kalghoum, Sonia Mettali Gammar, Leïla Azouz Saïdane. 1-5 [doi]
- Privacy risk assessment and users' awareness for mobile apps permissionsAsma Hamed, Hella Kaffel Ben Ayed. 1-8 [doi]
- BRAD 1.0: Book reviews in Arabic datasetAshraf Elnagar, Omar Einea. 1-8 [doi]
- Ensuring consistent dynamic adaptation: An approach from design to runtimeNgoc-Tho Huynh, Maria-Teresa Segarra, Antoine Beugnard. 1-8 [doi]
- Towards the growth of optical security systems for image encryption by polarized lightWiam Zamrani, Esmail Ahouzi, Angel Lizana, Juan Campus, María Josefa Yzuel. 1-6 [doi]
- Priority-MAC: A priority based medium access control solution with QoS for WSNSoumaya Argoubi, Karima Maâlaoui, Mohamed Houcine Elhdhili, Leïla Azouz Saïdane. 1-6 [doi]
- A survey on learner models in adaptive E-learning systemsFedia Hlioui, Nadia Aloui, Faïez Gargouri. 1-7 [doi]
- Multi-agent framework for social CRM: Extracting and analyzing opinionsFatima Zohra Ennaji, Abdelaziz El Fazziki, Hasna El Alaouiel El Abdallaoui, Abderrahmane Sadiq, Mohammed Sadgal, Djamal Benslimane. 1-8 [doi]
- A GQVM approach to secure WeBhouse ETL processes developmentSalma Dammak, Faiza Ghozzi Jedidi, Faïez Gargouri. 1-8 [doi]
- The geo-social relevance ranking: A method based on geographic information and social media dataJúlio Henrique Rocha, Cláudio E. C. Campelo, Cláudio de Souza Baptista, Gabriel Joseph Ramos Rafael. 1-8 [doi]
- Efficient image search system with multi-scale database using profile-based pre-selection and coarse matchingKaoru Uchida. 1-8 [doi]
- Blockchain for the Internet of Things: A systematic literature reviewMarco Conoscenti, Antonio Vetro, Juan Carlos De Martin. 1-6 [doi]
- Data warehouse design from social media for opinion analysis: The case of Facebook and TwitterImen Moalla, Ahlem Nabli, Lotfi Bouzguenda, Mohamed Hammami. 1-8 [doi]
- Using TMT ontology in trust based medical tourism recommender systemMohamed Frikha, Mohamed Ben Ahmed Mhiri, Mounir Zarai, Faïez Gargouri. 1-8 [doi]
- A fireworks algorithm for single objective big optimization of signalsMohamed Amine El Majdouli, Saad Bougrine, Ismail Rbouh, Abdelhakim Ameur El Imrani. 1-7 [doi]
- Context-based evaluation of mobile knowledge management systemsEmna Ben Ayed, Christophe Kolski, Houcine Ezzedine. 1-8 [doi]
- Auto-tuning TRSM with an asynchronous task assignment model on multicore, multi-GPU and coprocessor systemsClícia Pinto, Marcos Barreto, Murilo Boratto. 1-8 [doi]
- Adaptive Cloud Resource Allocation scheme to minimize SLO response time violationFatima AlQayedi, Khaled Salah, M. Jamal Zemerly. 1-5 [doi]
- Prediction of Amazon spot price based on chaos theory using ANFIS modelZohra Amekraz, Moulay Youssef. 1-6 [doi]
- Addressing self-disclosure in social media: An instructional awareness approachNicolas Emilio Diaz Eerreyra, Johanna Schawel, Maritta Heisel, Christian Meske. 1-6 [doi]
- Validating social media data for automatic persona generationJisun An, Haewoon Kwak, Bernard J. Jansen. 1-6 [doi]
- Authorship attribution of Arabic tweetsAbdullateef Rabab'ah, Mahmoud Al-Ayyoub, Yaser Jararweh, Monther Aldwairi. 1-6 [doi]
- A Salient Region Detector for structured imagesElena Ranguelova. 1-8 [doi]
- On a new index of Publish/Subscribe system in the context of Big DataMohamedou Cheikh Tourad, Abdelmounaim Abdali, Ahmad Outfarouin. 1-2 [doi]
- Efficient inverted index with n-gram sampling for string matching in Arabic documentsEl Moatez Billah Nagoudi, Ahmed Khorsi, Hadda Cherroun. 1-7 [doi]
- Energy/coverage quality trade-off based tasks allocation for opportunistic real time mobile crowdsensingSalma Bradai, Sofien Khemakhem, Mohamed Jmaiel. 1-8 [doi]
- Handling occlusion in Augmented Reality surgical training based instrument trackingRawia Frikha, Ridha Ejbali, Mourad Zaied. 1-5 [doi]
- Identification and modeling of the skills within MOOCsWiem Maalej, Philippe Pernelle, Chokri Ben Amar, Thibault Carron, Elodie Kredens. 1-8 [doi]
- An agile verification framework for traffic sign classification algorithms in heavy vehiclesMohamed Elgharbawy, Benedicte Bernier, Michael Frey, Frank Gauterin. 1-8 [doi]
- An automatic essay correction for an active learning environmentCristovao Lima Frinhani, Sergio Antonio Andrade de Freitas, Mauricio Vidotti Fernandes, Edna Dias Canedo. 1-6 [doi]
- A fedearted E-learning cloud system based on mixed realityF. Essa, Kamal M. Jambi, A. Fattouh, Hassanin Al-Barhamtoshy, M. Khemakhem, A. Al-Ghamdi. 1-5 [doi]
- Using heading hierarchy for non-taxonomic relation extractionRim Zarrad, Narjes Doggaz, Ezzeddine Zagrouba. 1-7 [doi]
- Age estimation using local matched filter binary patternImad Mohamed Ouloul, Karim Afdel, Abdallah Amghar. 1-5 [doi]
- Patterns to distribute mobility simulationsMatthieu Mastio, Mahdi Zargayouna, Gérard Scémama, Omer F. Rana. 1-6 [doi]
- Outlier and anomalous behavior detection in social networks using constraint programmingEl Mehdi El Graoui, Nabila Zrira, Soufiana Mekouar, Imade Benelallam, El-Houssine Bouyakhf. 1-8 [doi]
- ReLiDSS: Novel lie detection system from speech signalHanen Nasri, Wael Ouarda, Adel M. Alimi. 1-8 [doi]