Communications Internationales

  1. GUENDOUZI Wassila and BOUKRA Abdelmadjid Using an Enhanced Bat Echolocation Approach for Security Audit Trails Analysis. MIC 2015: The XI Metaheuristics International Conference June 7-10th 2015 Agadir Morroco.
  2. Wassila Guendouzi and Boukra Abdelmadjid A Hybrid Intrusion Detection Approach Using Ant Colony System and Simulated Annealing (ACS-SA). International Conference on Intelligent Information Processing,Security and Advanced Communication (IPAC 2015) Batna November 23-25 2015.
  3. Tahar Ziouel, Khalissa Amieur Derbal, Kamel Boukhalfa: SOLAP On-the-Fly Generalization Approach Based on Spatial Hierarchical Structures. 5th International Conference on Computer Science and its Applications (CIIA’2015). Saida, Algeria. (Indexed in SPINGER, DBLP)
  4. Ali Abbassene, Zaiai Alimazighi, Moufida Aouachria : Towards an open framework for inter-organizational workflow semantic annotation. 12th International Symposium on Programming and Systems (ISPS). Algiers. (Indexed in IEEE)
  5. Rahma Djiroun, Sandro Bimonte, Kamel Boukhalfa: A First Framework for Top-K Cubes Queries. 3rd International Workshop on Modeling and Reasoning for Business Intelligence (MORE BI) Collocated with the 34th International Conference on Conceptual Modeling (ER 2015) Stockholm, Sweden 187-197. Stockholm, (Indexed in SPINGER, DBLP)
  6. Kahina Kessi, Zaia Alimazighi and Mourad Oussalah : Requirement Meta Model Of A Cooperative Information System Oriented Viewpoints, Conference on Entreprise Information systems CENTERIS 2015 Portugal
  7. Mahfoud Bala, Oussama Mokeddem, Omar Boussaid, Zaia Alimazighi: Une Plateforme ETL parallèle et distribuée pour l’intégration de données massives. ; 15èmeconférence internationale sur l’extraction et la gestion des connaissances (EGC 2015), Luxembourg.
  8. H. Benkaouha, A. Abdelli, N. Badache, J. Ben-Othman, and L. Mokdad, “AFDAN : Accurate failure detection protocol for manets,” in IWCMC, Accepted, to appear in 2015.
  9. H. Benkaouha, A. Abdelli, N. Badache, J. Ben-Othman, and L. Mokdad, “Towards improving failure detection in mobile ad hoc networks,” IEEE GLOBECOM 2015.
  10. Q. MONNET. Y.Hammal, and L. Mokdad, J Ben Othmane “Fair Election of Monitoring Nodes in WSNs,”IEEE GLOBECOM 2015.
  11. L. Mokdad, Y. Hammal, J. Ben-Othman, and A. Abdelli. « Formal Modeling and Analysis of Greedy Behaviors In IEEE 802.11 Protocols », 2015 IEEE International Conference on Communications (ICC2015) – Mobile and Wireless Networking Symposium, 8-12 June 2015, London, UK.
  12. A. Abdelli, W. Serrai, L. Mokdad, and Y. Hammal. « Time Petri Nets for Performance Evaluation of Composite Web Services Architectures », PEDISWESA Workshop, IEEE Symposium on Computers and Communications, 6-9 July, Larnaca, Cyprus.
  13. M .L Laouira, A.Abdelli L.Mokdad J.Ben Othman ‘An efficient transmitting strategy for image fusion in WMSN » IEEE ICC 2015 June 2015, London UK
  14. Fatima Lamia Haddi and Mahfoud Benchaïba, ‘’Overview of Incentive Mechanisms in Peer-to-Peer Systems,’’ In proc. of Second International Conference on New Technologies and Communication (ICNTC’2015) Chlef, Algeria 03-04 Mars 2015, pp. 110- 117.
  15. Moufida Rahmani and Mahfoud Benchaïba, ‘’Replication Strategies in a Mobile Environment,’’ In proc. of Second International Conference on New Technologies and Communication (ICNTC’2015) Chlef, Algeria 03-04 Mars 2015, pp. 38-44.
  16. Hadj Henni Mhamed and Benchaïba Mahfoud, ‘’Comparaisons des approches d’interopérabilité des réseaux P2P,’’ In proc. of Second International Conference
    6 on New Technologies and Communication(ICNTC’2015) Chlef, Algeria 03-04 Mars 2015,pp.45-52.
  17. Manel Seddiki, Mahfoud Benchaïba, ‘’An adaptive P2P overlay for MANETs,’’ In proc. of the International Conference on Distributed Computing and Networking (ICDCN 2015) : – January 4-7, 2015. BITS Pilani K K Birla Goa Campus- India, Article No. 24.
  18. Manel Seddiki, Mahfoud Benchaïba, ‘SWS: a Smart Walk mechanism for resources Search in mobile P2P’’, Accepted in the First International Conference on New Technologies of Information and Communication (NTIC’15), November 8-9, 2015, Univ. de Mila. It will be published in IEEE Xplore Digital Library
  19. A. Saadi, M. Oussalah, A. Henni and D. Bennouar, ‘’Handling the Dynamic Reconfiguration of Software Architectures using Intelligent Agents,’’ Accepted in the international conference on Intelligent Information Processing, Security and Advanced Communication (IPAC’2015). Batna, Algeria, November 23-25, 2015.
  20. Bey Fella, Bouyakoub Samia, Belkhir Abdelkader : Temporal Constraint in Web Service Composition. 17th International Conference on Enterprise Information Systems (ICEIS) , Barcelona SPAIN 27-30 April 2015.
  21. Fella Bey, Abdelkader Belkhir, Samia Bouyakoub, Temporal Exception in Web Service Composition, The Third International Conference on Building and Exploring Web Based Environments WEB 2015 May 24 – 29, 2015 – Rome, Italy.
  22. Cheniki Nasreddine, Belkhir Abdelkader, Atif Yacine, Supporting Multilingual Semantic Web Services Discovery by Consuming Data from DBpedia Knowledge Base, International conference on Intelligent Information Processing, Security and Advanced Communication (IPAC’2015), Algeria, Batna 23-25 November 2015
  23. Guebli Wassila, Belkhir Abdelkader, Providing Services in an Intelligent Environment Conflict Management in Smart Home, International conference on Intelligent Information Processing, Security and Advanced Communication (IPAC’2015), Algeria, Batna 23-25 November 2015
  24. Bey Fella, Bouyakoub Samia, Belkhir Abdelkader : Temporal Constraint in Web Service Composition. 17th International Conference on Enterprise Information Systems (ICEIS) , Barcelona SPAIN 27-30 April 2015.
  25. Fella Bey, Abdelkader Belkhir, Samia Bouyakoub, Temporal Exception in Web Service Composition, The Third International Conference on Building and Exploring Web Based Environments WEB 2015 May 24 – 29, 2015 – Rome, Italy.
  26. Zahira Chouiref , Abdelkader Belkhir, Allel Hadjali, Prefer-W2S: Preferences-Aware Query in Web Services Selection, the 10th International Conference on Internet and Web Applications and Services ( ICIW2015); June 21 – 26, 2015 – Brussels, Belgium.
  27. Smatti, M. Oussalah, M. Ahmed Nacer. “A Review of Detecting and Correcting Deviations on Software Processes”. 10th International Joint Conference on Software Engineering and Applications (ICSOFT-EA), 20-22 July 2015, Colmar-Alsace, France.
  28. Mohammed Amine Mostefai, Amina Annane, Lylia Kissoum and Ahmed Nacer Mohamed “Implementing Knowledge Management Systems in Cloud-Based Environments – A Case Study in a Computer Science High School”. International Conference on Cloud Computing Technologies and Applications, June 2-4, 2015, at the Kenzi Farah Hotel, Marrakesh, Morocco.
  29. Midhun Babu Tharayanil, Gill Whitney, Mahdi Aiash, Chafika Benzaid. Virtualization and Cyber Security: Arming Future Security Practitioners. In Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15), Helsinki, Filand, 20th-22nd August, 2015.
  30. Heman Awang Mangut, A. AL-NEMRAT, C. BENZAÏD. ARP Cache Poisoning Mitigation and Forensics Investigation. In Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15), Helsinki, Filand, 20th-22nd August, 2015.
  31. A. AL-NEMRAT, C. BENZAÏD. Cybercrime Profiling: Decision-Tree Induction, Examining Perceptions of Internet Risk and Cybercrime Victimisation. In Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15), Helsinki, Filand, 20th-22nd August, 2015.
  32. M. CHENAIT, B. ZEBBANE, I. BELHOCINE, S. FILLALI, C. BENZAÏD, N. BADACHE. A Low-Complex Coverage Eligibility for Wireless Sensor Networks. In Proceedings of International Conference on Intelligent Information Processing, Security and Advanced Communication (IPAC’15), Batna, Algeria, 23rd-25th Nov., 2015.
  33. M. CHENAIT, B. ZEBBANE, C. BENZAÏD, N. BADACHE. Sleep Scheduling With Predictive Coverage Redundancy Check in Wireless Sensor Networks. In Proceedings of the Twelfth International Symposium on Wireless Communication Systems (ISWCS’15), Brussels, Belgium, 25th-28th August, 2015.
  34. Noureddine Lasla, Mohamed Younis, Abdelraouf Ouadjaout, Nadjib Badache, On Optimal Anchor Placement for Efficient Area-based Localization in Wireless Networks, IEEE International Conference on Communications (ICC), London, UK; 06/2015

Laisser un commentaire