Publications indexées

DBLP



EBSCO



H. Anoual, S. El Fkihi, A. Jilbab, D. Aboutajdine, A novel texture-based algorithm for localizing vehicle license plates, Journal of Theoretical & Applied Information Technology. 11/15/2012, Vol. 45 Issue 1, p27-32. 6p. , Database: Computers & Applied Sciences Complete.

S. Anter, A. Zellou, A. Idri, K-schema: a new approach, based on the distribution of user queries, to create views to materialize in a hybrid integration system, Journal of Theoretical & Applied Information Technology. 1/10/2013, Vol. 47 Issue 1, p158-170. 13p. , Database: Computers & Applied Sciences Complete.

N. Attaoui, M. Ganzha, M. Paprzycki, K. Wasielewska, M. Essaaidi, Multiple equivalent simultaneous offers strategy in an agent-based grid resource brokering system - initial considerations, Scalable Computing: Practice & Experience. Jun2013, Vol. 14 Issue 2, p83-94. 12p. DOI: 10.12694/scpe.v14i2.842. , Database: Computers & Applied Sciences Complete.

A. Azouaoui, M. Belkasmi, A. Farchane, Efficient Dual Domain Decoding of Linear Block Codes Using Genetic Algorithms, Journal of Electrical & Computer Engineering. 2012, p1-12. 12p. 3 Diagrams, 2 Charts, 27 Graphs. DOI: 10.1155/2012/503834. , Database: Computers & Applied Sciences Complete.

I. Battequi, A. El Saaidi,K. Satori, Efficient planar selfcalibration of a stationary camera with variable intrinsic parameters, Journal of Theoretical & Applied Information Technology. 8/20/2013, Vol. 53 Issue 2, p209-218. 10p. , Database: Computers & Applied Sciences Complete.

H. Belaoud, J. El Abbadi, A. Habbani, Survey of sip authentication mechanisms , Journal of Theoretical & Applied Information Technology. 12/20/2013, Vol. 58 Issue 2, p357-365. 9p. , Database: Computers & Applied Sciences Complete.

L. Ben Hiba, M. A. Janati Idrissi, Tendances des méthodes de gestion des projets informatiques. (French), E-Ti: E-Review in Technologies Information. 2012, Issue 6, p2-16. 15p. 1 Diagram, 4 Charts, 1 Graph. Language: French. , Database: Arab World Research Source.

M. Bendriss, B. Regragui, Automatic selection of filtering devices in a distributed intrusion prevension system, Journal of Theoretical & Applied Information Technology. 7/20/2013, Vol. 53 Issue 2, p307-311. 5p. , Database: Computers & Applied Sciences Complete.

M. Bendriss, B. Regragui, Honeypot based intrusion management system: from a passive architecture to an ips system, Journal of Theoretical & Applied Information Technology. 1/20/2013, Vol. 47 Issue 2, p792-797. 6p. , Database: Computers & Applied Sciences Complete.

M. Benhaddi, K. Baina, E. Abdelwahed, The user-centric soa and its impacts on other disciplines, Journal of Theoretical & Applied Information Technology. 8/31/2013, Vol. 53 Issue 3, p523-531. 9p. , Database: Computers & Applied Sciences Complete.

M. Benkhalifa, A. Mouradi, H. Bouyakhf, Integrating WordNet knowledge to supplement training data in semi-supervised agglomerative hierarchical clustering for text categorization, International Journal of Intelligent Systems. Aug2001, Vol. 16 Issue 8, p929-947. 19p. , Database: Computers & Applied Sciences Complete.

H. Berbia, F. El Bouanani, R. Romadi, H. Benazza, M. Belkasmi, Genetic algorithm for decoding linear codes over awgn and fading channels, Journal of Theoretical & Applied Information Technology. 2011, Vol. 30 Issue 1, p35-41. 7p. , Database: Computers & Applied Sciences Complete.

R. Chiheb, R. Faizi, A. El Afia, Using objective online testing tools to assess students' learning: potentials and limitations, Journal of Theoretical & Applied Information Technology. 2011, Vol. 24 Issue 1, p69-72. 4p. , Database: Computers & Applied Sciences Complete.

L. Cheikhi, R.E. Al-Qutaish, A. Idri, Software Productivity: Harmonization in ISO/IEEE Software Engineering Standard, Journal of Software (1796217X). Feb2012, Vol. 7 Issue 2, p462-470. 9p. DOI: 10.4304/jsw.7.2.462-470. , Database: Computers & Applied Sciences Complete.

L. Cheikhi, R.E. Al-Qutaish, A. Idri, A. Sellami, Chidamber and Kemerer Object-Oriented Measures: Analysis of their Design from the Metrology Perspective, International Journal of Software Engineering & Its Applications. 2014, Vol. 8 Issue 2, p359-373. 15p. 1 Diagram, 8 Charts. DOI: 10.14257/ijseia.2014.8.2.35. , Database: Computers & Applied Sciences Complete.

A. Choukri, A. Habbani, M. Elkoutbi, Behavior of ad hoc routing protocols in multiservice traffic, Journal of Theoretical & Applied Information Technology. 2012, Vol. 43 Issue 2, p208-213. 6p. , Database: Computers & Applied Sciences Complete.

A. Choukri, A. Habbani, M. Elkoutbi, Efficient Heuristic Based on Clustering Approach for OLSR, Journal of Computer Networks & Communications. 2013, p1-7. 7p. DOI: 10.1155/2013/597461. , Database: Computers & Applied Sciences Complete.

N. Daoudi, R. Ajhoun, An Adaptation of E-learning Standards to M-learning, International Journal of Interactive Mobile Technologies. 2008, Vol. 2 Issue 3, p11-16. 6p. , Database: Computers & Applied Sciences Complete.

T. Dinkelaker, M. Erradi, M. Ayache, Using Aspect-Oriented State Machines for Detecting and Resolving Feature Interactions, Computer Science & Information Systems. Sep2012, Vol. 9 Issue 3, p1046-1074. 29p. 1 Color Photograph, 6 Diagrams, 2 Graphs. DOI: 10.2298/CSIS111216033D. , Database: Computers & Applied Sciences Complete.

K. Doumi, S. Baina, K. Baina, Strategic business and it alignment: representation and evaluation, Journal of Theoretical & Applied Information Technology. 1/10/2013, Vol. 47 Issue 1, p41-52. 12p. , Database: Computers & Applied Sciences Complete.

H. El Bakkali, Enhancing Workflow Systems Resiliency by Using Delegation and Priority Concepts, Journal of Digital Information Management. Aug2013, Vol. 11 Issue 4, p267-276. 10p. , Database: Computers & Applied Sciences Complete.

N. El Hami, A. El Mir, B. El Mir, R. Ellaia, M. ITMI, B. Bounabat, Simulation and optimization of interoperability planning, Journal of Theoretical & Applied Information Technology. 6/30/2013, Vol. 52 Issue 3, p348-356. 9p. , Database: Computers & Applied Sciences Complete.

B. El Idrissi, S. Baina, K. Baina, Upgrading the semantics of the relational model for rich owl 2 ontology learning, Journal of Theoretical & Applied Information Technology. 10/10/2014, Vol. 68 Issue 1, p138-148. 11p. , Database: Computers & Applied Sciences Complete.

A. El Mir, N. El Hami, B. El Mir, B. Bounabat, R. Ellaia, M. Itmi, Multiobjective optimization of information system quality enhancement, Journal of Theoretical & Applied Information Technology. 12/10/2014, Vol. 70 Issue 1, p52-61. 10p. , Database: Computers & Applied Sciences Complete.

F. Essannouni, R. Oulad Haj Thami, D. Aboutajdine, A. Salam, Fast L4 template matching using frequency domain, Electronics Letters. 4/26/2007, Vol. 43 Issue 9, p507-508. 2p. 1 Chart. DOI: 10.1049/el:20070793. , Database: Computers & Applied Sciences Complete.

A. Ezzahout, M.Y. Hadi,R. Oulad Haj Thami, An efficient people tracking system using the fft-correlation and optimized sad , Journal of Theoretical & Applied Information Technology. 2/10/2013, Vol. 48 Issue 1, p9-14. 6p. , Database: Computers & Applied Sciences Complete.

R. Faizi, A. El Afia, R. Chiheb, Exploring the Potential Benefits of Using Social Media in Education, International Journal of Engineering Pedagogy. Oct2013, Vol. 3 Issue 4, p50-53. 4p. DOI: 10.3991/ijep.v3i4.2836. , Database: Computers & Applied Sciences Complete.

M. Ghallali, A. El Mir, B. El Ouahidi, B. Bounabat, N. El Hami, B. El Mir, Mobile security: designing a new framework limiting malware spread in the mobile cloud computing, Journal of Theoretical & Applied Information Technology. 11/30/2013, Vol. 57 Issue 3, p354-366. 13p. , Database: Computers & Applied Sciences Complete.

O. Halidou, R. Mrabet, DiffServ over WiMAX network simulation testbed, International Journal of Computer Networks & Communications Security. Nov2013, Vol. 1 Issue 6, p278-283. 6p. , Database: Arab World Research Source.

A. Harbouche, M. Erradi, A. Mokhtari, An MDE Approach to Derive System component Behavior, International Journal of Advanced Science & Technology. Apr2013, Vol. 53, p41-60. 20p. 13 Diagrams, 1 Chart. , Database: Computers & Applied Sciences Complete.

A. Harbouche, M. Erradi, A. Mokhtari, Deriving Multi-Agent System Behavior, International Journal of Software Engineering & Its Applications. Jul2013, Vol. 7 Issue 4, p137-156. 20p. 12 Diagrams, 1 Chart. , Database: Computers & Applied Sciences Complete.

B. Hdioud, R. Oulad Haj Thami, M. El Haj Tirari, Video-surveillance system for tracking a person by estimating the trajectory, Journal of Theoretical & Applied Information Technology. 11/30/2013, Vol. 57 Issue 3, p523-529. 7p. , Database: Computers & Applied Sciences Complete.

S. Idrissi, E. El Yahyaoui, A. Zellou, A. Idri, MDPM: an algorithm for mapping discovery in p2p mediation system, Journal of Theoretical & Applied Information Technology. 5/20/2014, Vol. 63 Issue 2, p261-273. 13p. , Database: Computers & Applied Sciences Complete.

M. Kassou, L. Kjiri, Ingénierie des exigences de la sécurité informatique : Revue de travaux de recherche de l'élicitation à la spécification. (French), E-Ti: E-Review in Technologies Information. 2012, Issue 6, p17-31. 15p. 6 Diagrams, 2 Charts. Language: French. , Database: Arab World Research Source.

A. Kobbane, R. El-Azouzi, K. Ibrahimi, S. K. Samanta, H. Bouyakhf, The Uplink Capacity Evaluation of Wireless Networks: Spectral Analysis Approach, Journal of Computing & Information Technology. Mar2010, Vol. 18 Issue 1, p1-17. 17p. 1 Diagram, 1 Chart, 6 Graphs. DOI: 10.2498/cit.1001384. , Database: Computers & Applied Sciences Complete.

A. Mountassir, I. Berrada, H. Benberahim, Representing text documents in training document spaces: a novel model for document representation, Journal of Theoretical & Applied Information Technology. 10/10/2013, Vol. 56 Issue 1, p30-39. 10p. , Database: Computers & Applied Sciences Complete.

K. Oudidi, A. Habbani, M. Elkoutbi, Using Mobility to Enhance Routing Process in MIS System, International Journal of Interactive Mobile Technologies. 2009 Supplement, Vol. 3 Issue S2, p24-32. 9p. 1 Color Photograph, 5 Diagrams, 2 Charts, 6 Graphs. DOI: 10.3991/ijim.v3s2.842. , Database: Computers & Applied Sciences Complete.

Z. Rachik, A. Issam, R. Oulad Haj Thami, H. Labriji, Non-Functional Requirement-Based Service Ranking and Selection, International Journal of Computer Networks & Communications Security. Jul2014, Vol. 2 Issue 7, p236-241. 6p. , Database: Arab World Research Source.

M. Zbakh, S. El Hajji, Tasks allocation problem as a non - cooperative game, Journal of Theoretical & Applied Information Technology. 2010, Vol. 16 Issue 1/2, p110-115. 6p. 2 Diagrams, 2 Charts. , Database: Computers & Applied Sciences Complete.

N. Zoukkari, N. Belkhayat, A. Doukkali, B. Regragui, E-readiness: a novel approach for indicators measurements estimation and prediction, Journal of Theoretical & Applied Information Technology. 11/30/2014, Vol. 69 Issue 3, p617-631. 15p. , Database: Computers & Applied Sciences Complete.


SCOPUS



THOMSON