Recherche
ENSIAS
Rapports d'activités
Archives
20 ENSIAS
Choisir l'ENSIAS c'est s'assurer une formation de pointe et innovante, une formation par la pratique avec un taux d'encadrement élevé
L'ENSIAS c'est aussi faire partie d'une équipe à haut potentiel trés recherchée par le monde professionnel avec un taux d'insertion de 100%
C'est une vie estudiantine riche en événements culturels, sportifs et associatifs
 
Accueil arrow Recherche arrow Publications arrow Publications indexées
Contact
Messagerie
Recherche
Bibliothèque

20ème anniversaire

sarprincesse lalla salma.jpg














pdf le Discours de Son Altesse Royale La Princesse Lalla Salma
Le détail des activités organisées est disponible ici : Anniversaire 20 ans ENSIAS
msg2.jpg
Identification





Mot de passe oublié ?
Publications indexées Convertir en PDF Version imprimable Suggérer par mail

EBSCO



H. Anoual, S. El Fkihi, A. Jilbab, D. Aboutajdine, A novel texture-based algorithm for localizing vehicle license plates, Journal of Theoretical & Applied Information Technology. 11/15/2012, Vol. 45 Issue 1, p27-32. 6p. , Database: Computers & Applied Sciences Complete.

S. Anter, A. Zellou, A. Idri, K-schema: a new approach, based on the distribution of user queries, to create views to materialize in a hybrid integration system, Journal of Theoretical & Applied Information Technology. 1/10/2013, Vol. 47 Issue 1, p158-170. 13p. , Database: Computers & Applied Sciences Complete.

N. Attaoui, M. Ganzha, M. Paprzycki, K. Wasielewska, M. Essaaidi, Multiple equivalent simultaneous offers strategy in an agent-based grid resource brokering system - initial considerations, Scalable Computing: Practice & Experience. Jun2013, Vol. 14 Issue 2, p83-94. 12p. DOI: 10.12694/scpe.v14i2.842. , Database: Computers & Applied Sciences Complete.

A. Azouaoui, M. Belkasmi, A. Farchane, Efficient Dual Domain Decoding of Linear Block Codes Using Genetic Algorithms, Journal of Electrical & Computer Engineering. 2012, p1-12. 12p. 3 Diagrams, 2 Charts, 27 Graphs. DOI: 10.1155/2012/503834. , Database: Computers & Applied Sciences Complete.

I. Battequi, A. El Saaidi,K. Satori, Efficient planar selfcalibration of a stationary camera with variable intrinsic parameters, Journal of Theoretical & Applied Information Technology. 8/20/2013, Vol. 53 Issue 2, p209-218. 10p. , Database: Computers & Applied Sciences Complete.

H. Belaoud, J. El Abbadi, A. Habbani, Survey of sip authentication mechanisms , Journal of Theoretical & Applied Information Technology. 12/20/2013, Vol. 58 Issue 2, p357-365. 9p. , Database: Computers & Applied Sciences Complete.

L. Ben Hiba, M. A. Janati Idrissi, Tendances des méthodes de gestion des projets informatiques. (French), E-Ti: E-Review in Technologies Information. 2012, Issue 6, p2-16. 15p. 1 Diagram, 4 Charts, 1 Graph. Language: French. , Database: Arab World Research Source.

M. Bendriss, B. Regragui, Automatic selection of filtering devices in a distributed intrusion prevension system, Journal of Theoretical & Applied Information Technology. 7/20/2013, Vol. 53 Issue 2, p307-311. 5p. , Database: Computers & Applied Sciences Complete.

M. Bendriss, B. Regragui, Honeypot based intrusion management system: from a passive architecture to an ips system, Journal of Theoretical & Applied Information Technology. 1/20/2013, Vol. 47 Issue 2, p792-797. 6p. , Database: Computers & Applied Sciences Complete.

M. Benhaddi, K. Baina, E. Abdelwahed, The user-centric soa and its impacts on other disciplines, Journal of Theoretical & Applied Information Technology. 8/31/2013, Vol. 53 Issue 3, p523-531. 9p. , Database: Computers & Applied Sciences Complete.

M. Benkhalifa, A. Mouradi, H. Bouyakhf, Integrating WordNet knowledge to supplement training data in semi-supervised agglomerative hierarchical clustering for text categorization, International Journal of Intelligent Systems. Aug2001, Vol. 16 Issue 8, p929-947. 19p. , Database: Computers & Applied Sciences Complete.

H. Berbia, F. El Bouanani, R. Romadi, H. Benazza, M. Belkasmi, Genetic algorithm for decoding linear codes over awgn and fading channels, Journal of Theoretical & Applied Information Technology. 2011, Vol. 30 Issue 1, p35-41. 7p. , Database: Computers & Applied Sciences Complete.

R. Chiheb, R. Faizi, A. El Afia, Using objective online testing tools to assess students' learning: potentials and limitations, Journal of Theoretical & Applied Information Technology. 2011, Vol. 24 Issue 1, p69-72. 4p. , Database: Computers & Applied Sciences Complete.

L. Cheikhi, R.E. Al-Qutaish, A. Idri, Software Productivity: Harmonization in ISO/IEEE Software Engineering Standard, Journal of Software (1796217X). Feb2012, Vol. 7 Issue 2, p462-470. 9p. DOI: 10.4304/jsw.7.2.462-470. , Database: Computers & Applied Sciences Complete.

L. Cheikhi, R.E. Al-Qutaish, A. Idri, A. Sellami, Chidamber and Kemerer Object-Oriented Measures: Analysis of their Design from the Metrology Perspective, International Journal of Software Engineering & Its Applications. 2014, Vol. 8 Issue 2, p359-373. 15p. 1 Diagram, 8 Charts. DOI: 10.14257/ijseia.2014.8.2.35. , Database: Computers & Applied Sciences Complete.

A. Choukri, A. Habbani, M. Elkoutbi, Behavior of ad hoc routing protocols in multiservice traffic, Journal of Theoretical & Applied Information Technology. 2012, Vol. 43 Issue 2, p208-213. 6p. , Database: Computers & Applied Sciences Complete.

A. Choukri, A. Habbani, M. Elkoutbi, Efficient Heuristic Based on Clustering Approach for OLSR, Journal of Computer Networks & Communications. 2013, p1-7. 7p. DOI: 10.1155/2013/597461. , Database: Computers & Applied Sciences Complete.

N. Daoudi, R. Ajhoun, An Adaptation of E-learning Standards to M-learning, International Journal of Interactive Mobile Technologies. 2008, Vol. 2 Issue 3, p11-16. 6p. , Database: Computers & Applied Sciences Complete.

T. Dinkelaker, M. Erradi, M. Ayache, Using Aspect-Oriented State Machines for Detecting and Resolving Feature Interactions, Computer Science & Information Systems. Sep2012, Vol. 9 Issue 3, p1046-1074. 29p. 1 Color Photograph, 6 Diagrams, 2 Graphs. DOI: 10.2298/CSIS111216033D. , Database: Computers & Applied Sciences Complete.

K. Doumi, S. Baina, K. Baina, Strategic business and it alignment: representation and evaluation, Journal of Theoretical & Applied Information Technology. 1/10/2013, Vol. 47 Issue 1, p41-52. 12p. , Database: Computers & Applied Sciences Complete.

H. El Bakkali, Enhancing Workflow Systems Resiliency by Using Delegation and Priority Concepts, Journal of Digital Information Management. Aug2013, Vol. 11 Issue 4, p267-276. 10p. , Database: Computers & Applied Sciences Complete.

N. El Hami, A. El Mir, B. El Mir, R. Ellaia, M. ITMI, B. Bounabat, Simulation and optimization of interoperability planning, Journal of Theoretical & Applied Information Technology. 6/30/2013, Vol. 52 Issue 3, p348-356. 9p. , Database: Computers & Applied Sciences Complete.

B. El Idrissi, S. Baina, K. Baina, Upgrading the semantics of the relational model for rich owl 2 ontology learning, Journal of Theoretical & Applied Information Technology. 10/10/2014, Vol. 68 Issue 1, p138-148. 11p. , Database: Computers & Applied Sciences Complete.

A. El Mir, N. El Hami, B. El Mir, B. Bounabat, R. Ellaia, M. Itmi, Multiobjective optimization of information system quality enhancement, Journal of Theoretical & Applied Information Technology. 12/10/2014, Vol. 70 Issue 1, p52-61. 10p. , Database: Computers & Applied Sciences Complete.

F. Essannouni, R. Oulad Haj Thami, D. Aboutajdine, A. Salam, Fast L4 template matching using frequency domain, Electronics Letters. 4/26/2007, Vol. 43 Issue 9, p507-508. 2p. 1 Chart. DOI: 10.1049/el:20070793. , Database: Computers & Applied Sciences Complete.

A. Ezzahout, M.Y. Hadi,R. Oulad Haj Thami, An efficient people tracking system using the fft-correlation and optimized sad , Journal of Theoretical & Applied Information Technology. 2/10/2013, Vol. 48 Issue 1, p9-14. 6p. , Database: Computers & Applied Sciences Complete.

R. Faizi, A. El Afia, R. Chiheb, Exploring the Potential Benefits of Using Social Media in Education, International Journal of Engineering Pedagogy. Oct2013, Vol. 3 Issue 4, p50-53. 4p. DOI: 10.3991/ijep.v3i4.2836. , Database: Computers & Applied Sciences Complete.

M. Ghallali, A. El Mir, B. El Ouahidi, B. Bounabat, N. El Hami, B. El Mir, Mobile security: designing a new framework limiting malware spread in the mobile cloud computing, Journal of Theoretical & Applied Information Technology. 11/30/2013, Vol. 57 Issue 3, p354-366. 13p. , Database: Computers & Applied Sciences Complete.

O. Halidou, R. Mrabet, DiffServ over WiMAX network simulation testbed, International Journal of Computer Networks & Communications Security. Nov2013, Vol. 1 Issue 6, p278-283. 6p. , Database: Arab World Research Source.

A. Harbouche, M. Erradi, A. Mokhtari, An MDE Approach to Derive System component Behavior, International Journal of Advanced Science & Technology. Apr2013, Vol. 53, p41-60. 20p. 13 Diagrams, 1 Chart. , Database: Computers & Applied Sciences Complete.

A. Harbouche, M. Erradi, A. Mokhtari, Deriving Multi-Agent System Behavior, International Journal of Software Engineering & Its Applications. Jul2013, Vol. 7 Issue 4, p137-156. 20p. 12 Diagrams, 1 Chart. , Database: Computers & Applied Sciences Complete.

B. Hdioud, R. Oulad Haj Thami, M. El Haj Tirari, Video-surveillance system for tracking a person by estimating the trajectory, Journal of Theoretical & Applied Information Technology. 11/30/2013, Vol. 57 Issue 3, p523-529. 7p. , Database: Computers & Applied Sciences Complete.

S. Idrissi, E. El Yahyaoui, A. Zellou, A. Idri, MDPM: an algorithm for mapping discovery in p2p mediation system, Journal of Theoretical & Applied Information Technology. 5/20/2014, Vol. 63 Issue 2, p261-273. 13p. , Database: Computers & Applied Sciences Complete.

M. Kassou, L. Kjiri, Ingénierie des exigences de la sécurité informatique : Revue de travaux de recherche de l'élicitation à la spécification. (French), E-Ti: E-Review in Technologies Information. 2012, Issue 6, p17-31. 15p. 6 Diagrams, 2 Charts. Language: French. , Database: Arab World Research Source.

A. Kobbane, R. El-Azouzi, K. Ibrahimi, S. K. Samanta, H. Bouyakhf, The Uplink Capacity Evaluation of Wireless Networks: Spectral Analysis Approach, Journal of Computing & Information Technology. Mar2010, Vol. 18 Issue 1, p1-17. 17p. 1 Diagram, 1 Chart, 6 Graphs. DOI: 10.2498/cit.1001384. , Database: Computers & Applied Sciences Complete.

A. Mountassir, I. Berrada, H. Benberahim, Representing text documents in training document spaces: a novel model for document representation, Journal of Theoretical & Applied Information Technology. 10/10/2013, Vol. 56 Issue 1, p30-39. 10p. , Database: Computers & Applied Sciences Complete.

K. Oudidi, A. Habbani, M. Elkoutbi, Using Mobility to Enhance Routing Process in MIS System, International Journal of Interactive Mobile Technologies. 2009 Supplement, Vol. 3 Issue S2, p24-32. 9p. 1 Color Photograph, 5 Diagrams, 2 Charts, 6 Graphs. DOI: 10.3991/ijim.v3s2.842. , Database: Computers & Applied Sciences Complete.

Z. Rachik, A. Issam, R. Oulad Haj Thami, H. Labriji, Non-Functional Requirement-Based Service Ranking and Selection, International Journal of Computer Networks & Communications Security. Jul2014, Vol. 2 Issue 7, p236-241. 6p. , Database: Arab World Research Source.

M. Zbakh, S. El Hajji, Tasks allocation problem as a non - cooperative game, Journal of Theoretical & Applied Information Technology. 2010, Vol. 16 Issue 1/2, p110-115. 6p. 2 Diagrams, 2 Charts. , Database: Computers & Applied Sciences Complete.

N. Zoukkari, N. Belkhayat, A. Doukkali, B. Regragui, E-readiness: a novel approach for indicators measurements estimation and prediction, Journal of Theoretical & Applied Information Technology. 11/30/2014, Vol. 69 Issue 3, p617-631. 15p. , Database: Computers & Applied Sciences Complete.