Communications Internationales

  1. Tiberkak Allal, Belkhir Abdelkader,tinyUPnP usage for home medical equipments control: case study diabetes management, World Congress on Computer Applications and Information Systems (WCCAIS) January 17-19, Hammamet, Tunisia, 2014.
  2. Hamid Khemissa, Mohamed Ahmed-nacer and Abdelkader Belkhir, A Similarity Measure for Categorizing the Developers Profile in a Software Process, International Conference on Foundations of Computer Science & Technology(CST 2014), January 2-4, 2014, Zurich, Switzerland. Volume Editors: David C. Wyld, Jan Zizka
  3. Cheniki Nasredine, Belkhir Abedelkader, Yacine Atif, Mobile Services Discovery Using Multi-domain Ontologies and Non-monotonic Rules, International Conference on next generation computing and communication technologies (ICNGCCT 2014),Dubai April 2014
  4. Zahira Chouiref, Karim Benouaret, Allel HADJALI, Abdelkader Belkhir, Multi Matchmaking Approach for Semantic Web Services Selection based on Fuzzy Inference, Proc. of the 14th International Conference on Web Engineering ICWE’14, Toulouse, France (ICWE14), 2014
  5. Zahira CHOUIREF, Karim Benouaret, Allel HADJALI, Abdelkader Belkhir, Making Web Services Selection more Customized: A Fuzzy-Logic-Theory-Based Approach, Phd Symposium, 12th International Conference on Service Oriented Computing ICSOC’14, Paris, France, November 3-6 (ICSOC14), 2014
  6. Bey Fella, Bouyakoub Samia, Belkhir Abdelkader : Exceptions handling in a time-based Web service Composition. International Conference on Complex System CISC’2O14, Jijel 9-10 December 2014.
  7. Yasmine Benosman, Mahfoud Benchaïba,‘‘An Effective Redundancy Detection Method in Wireless Sensor Networks’’, The 1st International Conference on Information and Communication Technologies for Disaster Management (ICT-DM’2014), March 24-25, 2014, Algiers-Algeria.
  8. Lynda Aliouane, Mahfoud Benchaïba, ‘’Distributed Detecting Boundaries of Coverage Holes in Wireless Sensor Networks,’’ The International conference on advanced Networking, Distributed Systems and applications (INDS 2014) June 17-19, 2014– Bedjaia –Algeria.
  9. Manel Seddiki, Mahfoud Benchaïba, ‘’An adaptive cross-layer P2P overlay over MANETs,’’ The International conference on advanced Networking, Distributed Systems and applications (INDS 2014) June 17-19, 2014– Bedjaia –Algeria.
  10. Moufida Rahmani, Mahfoud Benchaïba, ‘’Cross-layer Design of Clustering Scheme for Peer to Peer over Manet,’’ The International conference on advanced Networking, Distributed Systems and applications (INDS 2014) June 17-19, 2014– Bedjaia –Algeria.
  11. Moufida Rahmani, Mahfoud Benchaïba, ‘’A Comparative Study of Replication Schemes for Structured P2P Networks,’’ The Ninth International Conference on Internet and Web Applications and Services (ICIW 2014), July 20 – 24, 2014 – Paris, France.
  12. Lynda Aliouane, Mahfoud Benchaïba, ‘’HACH: Healing Algorithm of Coverage Hole in a Wireless Sensor Network’’, in Proc. of the 8th International Conference on Next Generation Mobile Apps, Services and Technologies (NGMAST2014) Oxford England, UK, 10-12 September, 2014.
  13. A.Saadi, M.oussalah,A.Henni, D.Bennouar, ‘’A generic model for managing software architectures reconfiguration, » à SEDE (The Twenty Third International Conference on Software Engineering and Data Engineering), accepté le 10 August 2014. New Orleans, Louisiana, USA on October 13-15, 2014.
  14. A.Abdelli L.Mokdad « Time Petri Net based Performance evaluation of traffic scheduling in WIMAX networks » in IEEE GLOBCOM- Austin USA December 2014.
  15. Djaouida Dahmani, Samia Mazouz, Malika Boukala, Modular Modeling of SMIL Documents with Complex Termination Events. PNSE @ Petri Nets 2014: 335-336.
  16. A.Abdelli « Age semantics based state space computation of time Petri Nets » in FMI workshop of IEEE IRI – 13-15 august 2014 San fransisco USA.
  17. L.Mokdad, A.Abdelli J. Ben othmane « Detection of greedy behaviour in WSN using IEEE 802.15 protocol » in IEEE MASCOTS 9-11 September 2014 Paris France.
  18. Y.Hammal, L.Mokdad, J.Benothman, and A.Abdelli Formal Modeling and Checking of an Enhanced variant of the IEEE 802.11 CSMA/CA Protocol, In IEEE PEDEWISA, Madeia, Portugal June 2014.
  19. H Benkaouha, L. Mokdad and A. Abdelli “SAN-Based Modeling of Fault Tolerant Protocols for MANETs”, IEEE ICC 2014: Sidney 2014
  20. Manel Smatti and Mohamed Ahmed Nacer, Dealing with deviations on software process enactment: comparison framework, International Conference on Advanced Aspects of Software Engineering, ICAASE’2014, 2-4 Novembre 2014, Constantine
  21. Hamid Khemissa, Mohamed Ahmed-nacer and Mourad Oussalah «Plasticity of a Guidance System for Software Process Modeling». First International Conference on Computer Science and Information Technoly (CoSIT-2014) pp. 49–63, 2014. © CS & IT-CSCP 2014. September 2014.
  22. Ilhem Boussaïd, Patrick Siarry, and Mohamed Ahmed-Nacer. Search Based Software Module Clustering. In 5th International Conference on Metaheuristics and Nature Inspired Computing, Marrakech, Marocco, 2014.
  23. L. Mouloudj and M. Ahmed Nacer, Les Web Services sémantiques : Etat de l’art et nouvelle approche d’intégration. Colloque sur l’Optimisation et les Systèmes d’Information, COSI’2014, Bejaia, 8-10 juin 2014.
  24. Berghida Meryem et Boukra Abdelmadjid EDHSA: An enhanced discrete harmony search algorithm for a Vehicle Routing Problem with Heterogeneous Fleet, Mixed Backhauls, and Time Windows ISIA 2014 (The First International Symposium on Informatics and its Applications) organisé par the Computer Science and ICST Departments, of the Faculty of Mathematics and Computer Science, at the University of M’sila (Algeria))
  25. M.BERGHIDA, A.BOUKRA, H.GUENOUNE and M.EL-KSOURI  » A Cooperative Approach for Vehicle Routing Problem with Simultaneous Pickup and Delivery » in Third International Symposium on Modelling and Implementation of Complex Systems MISC, November 29-30, 2014, El Oued, Algeria.
  26. Mourad Daoudi and Mohamed Ahmed-Nacer, ‘An Intrusion Detection Approach Using An Adaptative Parameter-Free Algorithm’, International Conference on Systems, ICONS2014, France
  27. M.E-A. Badjara and Chergui mohamed El Amine Communication  »Problème du stable multi-objectif » Conférence Internationale sur l’Intelligence Artificielle et les Technologies de l’Information, IC2IT’14, Université Kasdi Merbah, Ourgla, 10-12 mars 2014
  28. Chergui mohamed El Amine F.Z. Ouaïl,  »Optimizing over an Integer Efficient Set » Poster à Conférence Internationale sur l’Intelligence Artificielle et les Technologies de l’Information, IC2IT’14, Université Kasdi Merbah, Ouargla, 10-12 mars 2014
  29. Amina Gacem, Kamel Boukhalfa, Handling Very Large Workloads to Effectively Partition Data Warehouses: New Approach and Experimental Study. International Conference on Information and Communication Systems (ICICS 2014), Irbid, Jordan.
  30. Bala M. Alimazighi Z., Boussaid O. “Construction de processus ETL par composition de fonctionnalités basées sur le modèle MAPReduce » INFORSID’2014
  31. Abbassene, Z. Alimazighi, « B2B Integration Platform for Cooperative Workflows », European Semantic Web Conference Summer School (ESWC-SS’14), Kalamaki, Crete (Grèce) 1-6 Septembre 2014.
  32. Abbassene, Z. Alimazighi, « Towards a Cloud-based Integration Plateform for Interorganizational Workflows », Conférence Francophone sur les Systèmes Collaboratifs (SYSCO’14), Hamammet (Tunisie) du 27 au 29 Septembre 2014.
    6
  33. Abbassène A., Alimazighi Z. « Intégration Interentreprises centrée sur les Workflows Vers une Plateforme en nuage pour l’Intégration des Workflows Inter-Organisationnels » Poster JEESI’2014 ESI- Alger
  34. Kessi K, Alimazighi Z., Oussalah M., « A viewpoint to assist cooperative Information System Modeling » AISTI’2014 Portugal.
  35. Bourai, H. Aliane « une approche d’opérationalisation d’ontologies basée sur les graphes conceptuels » ICIIAT 2014, Ourgla, Algerie.
  36. K. Kessi, Z. Alimazighi, M. Oussalah « Needs analysis phase of a cooperative IS using viewpoints », ISCA 23rd International Conference on Software Engineering and Data Engineering (SEDE 2014), October 13-15, 2014, New Orleans, USA.
  37. K. Kessi, M. Oussalah, Z. Alimazighi « Requirement engineering of a cooperative information system using viewpoint, IWAISE’2014, Novembre 2014, Tunis
  38. Hanane Amirat and Kamel Boukhalfa, A data mining-based approach for data warehouse optimization, ICA2IT International Conference on Artificial Intelligence and Information Technology. Ouargla, Algeria, March 2014.
  39. K. Derbal, I. Frihi, K. Boukhalfa and Z. Alimazighi. Spatial Data Warehouse and Geospatial Decision Making Tool for Efficient Road Risk Analysis, In the Proceedings of the International Conference on Information and Communication Technologies for Disaster Management (ICT-DM’2014), Algiers.
  40. C. BENZAID, A. SAÏAH, N. BADACHE. An Enhanced Secure Pairwise Broadcast Time Synchronization Protocol in Wireless Sensor Networks. In Proc. of the 22nd Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP 2014), Feb. 12-14, 2014, Turin, Italy.
  41. C. BENZAID, M. BAGAA, M. YOUNIS. An Efficient Clock Synchronization Protocol for Wireless Sensor Networks. To Appear in Proc. of the 10th International Wireless Communications & Mobile Computing Conference (IWCMC 2014), Aug. 04-08, 2014, Nicosia, Cyprus.
  42. B. Zebbane, M. Chenait, and N. Badache. RTCP: Redundancy aware Topology Control Protocol for Wireless Sensor. In Proceeding of the 1st IEEE International Conference on Information and Communication Technologies for Disaster Management (ICT-DM’2014). March 25-26, 2014, Algiers, Algeria. Pages 118-123.
  43. Lalouani, W.; Younis, M.; Bagaa, M.; BADACHE, N., « Effective handling of spreading events using wireless sensor and actuator networks, » Wireless Communications and Mobile Computing Conference (IWCMC), 2014 International , vol.,no.,pp.476,482,4-8Aug.2014 doi: 10.1109/IWCMC.2014.6906403
  44. K. SERGIOU, A. AL-NEMRAT, C. BENZAÏD. Investigations in Black-box Penetration Techniques on Wireless Networks: Gathering Digital Evidence against Cyber-Intrusions. In Proceedings of International Conference on Cybercrime, Security & Digital Forensics (Cyberforensics 2014), University of Strathclyde, Glasgow, pp 81-100, 2014
  45. E. INANG, C. BENZAÏD, A. AL-NEMRAT, P. WATTERS. Analysis of Malware Behaviour: Using data Mining Clustering Techniques to Support Forensics Investigation. In Proceedings of the 5th IEEE Cybercrime and Trustworthy Computing Workshop (CTC 2014), Massey University’s Auckland (Albany), New Zealand, 24th-25th Nov., 2014.

Laisser un commentaire