


default search action
CIIA 2015: Saida, Algeria
- Abdelmalek Amine

, Ladjel Bellatreche, Zakaria Elberrichi, Erich J. Neuhold, Robert Wrembel
:
Computer Science and Its Applications - 5th IFIP TC 5 International Conference, CIIA 2015, Saida, Algeria, May 20-21, 2015, Proceedings. IFIP Advances in Information and Communication Technology 456, Springer 2015, ISBN 978-3-319-19577-3
Computational Intelligence-Meta-Heuristics
- Dahi Zakaria Abd El Moiz

, Chaker Mezioud, Amer Draa
:
Binary Bat Algorithm: On The Efficiency of Mapping Functions When Handling Binary Problems Using Continuous-variable-based Metaheuristics. 3-14 - Said Layadi, Jean-Michel Ilié

, Ilham Kitouni, Djamel-Eddine Saïdouni:
Relative Timed Model for Coordinated Multi Agent Systems. 15-27
Computational Intelligence: Object Recognition and Authentification
- Mohamed Benouis, Benkkadour Mohamed Kamel, Tlmesani Redwan, Senouci Mohamed:

A Novel Technique For Human Face Recognition Using Fractal Code and Bi-dimensional Subspace. 31-42
Computational Intelligence: Image Processing
- Izem Hamouchene, Saliha Aouat

:
A New Rotation-Invariant Approach for Texture Analysis. 45-53 - Sidi Ahmed Mahmoudi

, Pierre Manneback
:
Multi-CPU/Multi-GPU Based Framework for Multimedia Processing. 54-65 - Zianou Ahmed Seghir

, Fella Hachouf:
Full-Reference Image Quality Assessment Measure Based on Color Distortion. 66-77
Computational Intelligence: Machine Learning
- Ahlam Kourid

, Mohamed Batouche
:
Biomarker Discovery Based on Large-Scale Feature Selection and MapReduce. 81-92 - Lydia Nahla Driff, Lamia Berkani, Ahmed Guessoum

, Abdellah Bendjahel:
Social Validation of Solutions in the Context of Online Communities - An Expertise-Based Learning Approach. 93-104 - Habib Mahi, Nezha Farhi, Kaouter Labed

:
Remotely Sensed Data Clustering Using K-Harmonic Means Algorithm and Cluster Validity Index. 105-116
Computational Intelligence: BioInformatics
- Ahlem Melouah

:
Comparison of Automatic Seed Generation Methods for Breast Tumor Detection Using Region Growing Technique. 119-128 - Fatima Bekaddour, Mohammed Amine Chikh:

IHBA: An Improved Homogeneity-Based Algorithm for Data Classification. 129-140 - Tahar Mehenni:

Multiple Guide Trees in a Tabu Search Algorithm for the Multiple Sequence Alignment Problem. 141-152
Information Technology: Text and Speech Processing
- Mohamed Cherif Amara Korba, Djemil Messadeg, Hocine Bourouba

, Rafik Djemili
:
Noise Robust Features Based on MVA Post-processing. 155-166 - Said Gadri, Abdelouahab Moussaoui

:
Arabic Texts Categorization: Features Selection Based on the Extraction of Words' Roots. 167-180 - Mohamed Seghir Hadj Ameur, Youcef Moulahoum, Ahmed Guessoum

:
Restoration of Arabic Diacritics Using a Multilevel Statistical Model. 181-192 - Mohamed Amine Boudia

, Reda Mohamed Hamou, Abdelmalek Amine
, Mohamed Elhadi Rahmani
, Amine Rahmani
:
A New Multi-layered Approach for Automatic Text Summaries Mono-Document Based on Social Spiders. 193-204 - Hugo Hammer, Anis Yazidi, Aleksander Bai, Paal E. Engelstad:

Building Domain Specific Sentiment Lexicons Combining Information from Many Sentiment Lexicons and a Domain Specific Corpus. 205-216 - Saida Ishak Boushaki, Nadjet Kamel

, Omar Bendjeghaba:
Improved Cuckoo Search Algorithm for Document Clustering. 217-228
Information Technology: Requirement Engineering
- Amina Cherouana

, Latifa Mahdaoui
:
Supporting Legal Requirements in the Design of Public Processes. 231-242 - Mohamed Lamine Chouder, Rachid Chalal, Waffa Setra:

Requirement Analysis in Data Warehouses to Support External Information. 243-253 - Waffa Setra, Rachid Chalal, Mohamed Lamine Chouder:

Engineering the Requirements of Data Warehouses: A Comparative Study of Goal-Oriented Approaches. 254-265
Information Technology: OLAP and Web Services
- Marcin Gorawski, Krzysztof Pasterak

:
Research and Analysis of the Stream Materialized Aggregate List. 269-278 - Tahar Ziouel, Khalissa Amieur Derbal

, Kamel Boukhalfa
:
SOLAP On-the-Fly Generalization Approach Based on Spatial Hierarchical Structures. 279-290 - Amal Halfaoui, Hadjila Fethallah, Fedoua Didi:

QoS-Aware Web Services Selection Based on Fuzzy Dominance. 291-300
Information Technology: Recommender Systems and Web Services
- Sahraoui Kharroubi, Youcef Dahmani, Omar Nouali:

A Hybrid Model to Improve Filtering Systems. 303-314 - Chahrazed Mediani

, Marie-Hélène Abel, Mahieddine Djoudi:
Towards a Recommendation System for the Learner from a Semantic Model of Knowledge in a Collaborative Environment. 315-327 - Hanane Zitouni, Omar Nouali, Souham Meshoul

:
Toward a New Recommender System Based on Multi-criteria Hybrid Information Filtering. 328-339
Information Technology: Ontologies
- Moussa Benaissa, Abderrahmane Khiat:

A New Approach for Combining the Similarity Values in Ontology Alignment. 343-354 - Mustapha Bourahla:

Exact Reasoning over Imprecise Ontologies. 355-366 - Mohamed Kharrat, Anis Jedidi

, Faïez Gargouri
:
Defining Semantic Relationships to Capitalize Content of Multimedia Resources. 367-378
Security and Network Technologies: Security
- Imen Brahmi, Hanen Brahmi, Sadok Ben Yahia

:
A Multi-agents Intrusion Detection System Using Ontology and Clustering Techniques. 381-393 - Abdelkader Khobzaoui

, Mhamed Mesfioui, Abderrahmane Yousfate, Boucif Amar Bensaber:
On Copulas-Based Classification Method for Intrusion Detection. 394-405 - Nabila Labraoui

, Abdelhak Mourad Guéroui, Larbi Sekhri:
On-Off Attacks Mitigation against Trust Systems in Wireless Sensor Networks. 406-415 - Mohamed Belaoued

, Smaine Mazouzi:
A Real-Time PE-Malware Detection System Based on CHI-Square Test and PE-File Features. 416-425
Security and Network Technologies: Wireless Sensor Networks
- Amine Dahane

, Berrached Nasr-Eddine
, Abdelhamid Loukil
:
Balanced and Safe Weighted Clustering Algorithm for Mobile Wireless Sensor Networks. 429-441 - Abdelkader Khelil, Rachid Beghdad

:
Distributed Algorithm for Coverage and Connectivity in Wireless Sensor Networks. 442-453 - Mehdi Rouan Serik, Mejdi Kaddour:

Optimizing Deployment Cost in Camera-Based Wireless Sensor Networks. 454-464 - Chifaa Tabet Hellel, Mohamed Lehsaini

, Hervé Guyennet:
A version of LEACH Adapted to the Lognormal Shadowing Model. 465-475
Security and Network Technologies: Energy and Synchronisation
- Khedidja Medani

, Makhlouf Aliouat
, Zibouda Aliouat
:
High Velocity Aware Clocks Synchronization Approach in Vehicular Ad Hoc Networks. 479-490 - Chafik Arar

, Mohamed Salah Khireddine, Abdelouahab Belazoui
, Randa Megulati:
An Energy-Efficient Fault-Tolerant Scheduling Algorithm Based on Variable Data Fragmentation. 491-502 - Kheireddine Mekkaoui, Abdellatif Rahmoun

, Gianluigi Ferrari:
Genetic Centralized Dynamic Clustering in Wireless Sensor Networks. 503-511
Security and Network Technologies: Potpourri
- Omar Boudraa, Karima Benatchba:

Region-Edge Cooperation for Image Segmentation Using Game Theory. 515-526 - Brahim Farou, Hamid Seridi

, Herman Akdag:
Improved Parameters Updating Algorithm for the Detection of Moving Objects. 527-537 - Moulay Driss Mechaoui

, Nadir Guetmi, Abdessamad Imine:
Towards Real-Time Co-authoring of Linked-Data on the Web. 538-548
Software Engineering: Modeling and Meta Modeling
- Ahmed Kheldoun, Kamel Barkaoui, Jiafeng Zhang

, Malika Ioualalen
:
A High Level Net for Modeling and Analysis Reconfigurable Discrete Event Control Systems. 551-562 - Fouzia Anguel, Abdelkrim Amirat, Nora Bounour

:
Hybrid Approach for Metamodel and Model Co-evolution. 563-573 - Mohamed Maddeh, Sarra Ayouni:

Extracting and Modeling Design Defects Using Gradual Rules and UML Profile. 574-583 - Houda Tadjer, Djamel Meslati:

An Approach to Integrating Aspects in Agile Development. 584-595
Software Engineering: Checking and Verification
- Samy Sadi

, Belabbas Yagoubi:
On the Optimum Checkpointing Interval Selection for Variable Size Checkpoint Dumps. 599-610 - Pragya Jain, Anita Goel

, Suresh Chand Gupta:
Monitoring Checklist for Ceph Object Storage Infrastructure. 611-623 - Kamel Boukhelfa

, Faiza Belala:
Towards a Formalization of Real-Time Patterns-Based Designs. 624-635

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














