default search action
CIIA 2015: Saida, Algeria
- Abdelmalek Amine, Ladjel Bellatreche, Zakaria Elberrichi, Erich J. Neuhold, Robert Wrembel:
Computer Science and Its Applications - 5th IFIP TC 5 International Conference, CIIA 2015, Saida, Algeria, May 20-21, 2015, Proceedings. IFIP Advances in Information and Communication Technology 456, Springer 2015, ISBN 978-3-319-19577-3
Computational Intelligence-Meta-Heuristics
- Dahi Zakaria Abd El Moiz, Chaker Mezioud, Amer Draa:
Binary Bat Algorithm: On The Efficiency of Mapping Functions When Handling Binary Problems Using Continuous-variable-based Metaheuristics. 3-14 - Said Layadi, Jean-Michel Ilié, Ilham Kitouni, Djamel-Eddine Saïdouni:
Relative Timed Model for Coordinated Multi Agent Systems. 15-27
Computational Intelligence: Object Recognition and Authentification
- Mohamed Benouis, Benkkadour Mohamed Kamel, Tlmesani Redwan, Senouci Mohamed:
A Novel Technique For Human Face Recognition Using Fractal Code and Bi-dimensional Subspace. 31-42
Computational Intelligence: Image Processing
- Izem Hamouchene, Saliha Aouat:
A New Rotation-Invariant Approach for Texture Analysis. 45-53 - Sidi Ahmed Mahmoudi, Pierre Manneback:
Multi-CPU/Multi-GPU Based Framework for Multimedia Processing. 54-65 - Zianou Ahmed Seghir, Fella Hachouf:
Full-Reference Image Quality Assessment Measure Based on Color Distortion. 66-77
Computational Intelligence: Machine Learning
- Ahlam Kourid, Mohamed Batouche:
Biomarker Discovery Based on Large-Scale Feature Selection and MapReduce. 81-92 - Lydia Nahla Driff, Lamia Berkani, Ahmed Guessoum, Abdellah Bendjahel:
Social Validation of Solutions in the Context of Online Communities - An Expertise-Based Learning Approach. 93-104 - Habib Mahi, Nezha Farhi, Kaouter Labed:
Remotely Sensed Data Clustering Using K-Harmonic Means Algorithm and Cluster Validity Index. 105-116
Computational Intelligence: BioInformatics
- Ahlem Melouah:
Comparison of Automatic Seed Generation Methods for Breast Tumor Detection Using Region Growing Technique. 119-128 - Fatima Bekaddour, Mohammed Amine Chikh:
IHBA: An Improved Homogeneity-Based Algorithm for Data Classification. 129-140 - Tahar Mehenni:
Multiple Guide Trees in a Tabu Search Algorithm for the Multiple Sequence Alignment Problem. 141-152
Information Technology: Text and Speech Processing
- Mohamed Cherif Amara Korba, Djemil Messadeg, Hocine Bourouba, Rafik Djemili:
Noise Robust Features Based on MVA Post-processing. 155-166 - Said Gadri, Abdelouahab Moussaoui:
Arabic Texts Categorization: Features Selection Based on the Extraction of Words' Roots. 167-180 - Mohamed Seghir Hadj Ameur, Youcef Moulahoum, Ahmed Guessoum:
Restoration of Arabic Diacritics Using a Multilevel Statistical Model. 181-192 - Mohamed Amine Boudia, Reda Mohamed Hamou, Abdelmalek Amine, Mohamed Elhadi Rahmani, Amine Rahmani:
A New Multi-layered Approach for Automatic Text Summaries Mono-Document Based on Social Spiders. 193-204 - Hugo Hammer, Anis Yazidi, Aleksander Bai, Paal E. Engelstad:
Building Domain Specific Sentiment Lexicons Combining Information from Many Sentiment Lexicons and a Domain Specific Corpus. 205-216 - Saida Ishak Boushaki, Nadjet Kamel, Omar Bendjeghaba:
Improved Cuckoo Search Algorithm for Document Clustering. 217-228
Information Technology: Requirement Engineering
- Amina Cherouana, Latifa Mahdaoui:
Supporting Legal Requirements in the Design of Public Processes. 231-242 - Mohamed Lamine Chouder, Rachid Chalal, Waffa Setra:
Requirement Analysis in Data Warehouses to Support External Information. 243-253 - Waffa Setra, Rachid Chalal, Mohamed Lamine Chouder:
Engineering the Requirements of Data Warehouses: A Comparative Study of Goal-Oriented Approaches. 254-265
Information Technology: OLAP and Web Services
- Marcin Gorawski, Krzysztof Pasterak:
Research and Analysis of the Stream Materialized Aggregate List. 269-278 - Tahar Ziouel, Khalissa Amieur Derbal, Kamel Boukhalfa:
SOLAP On-the-Fly Generalization Approach Based on Spatial Hierarchical Structures. 279-290 - Amal Halfaoui, Hadjila Fethallah, Fedoua Didi:
QoS-Aware Web Services Selection Based on Fuzzy Dominance. 291-300
Information Technology: Recommender Systems and Web Services
- Sahraoui Kharroubi, Youcef Dahmani, Omar Nouali:
A Hybrid Model to Improve Filtering Systems. 303-314 - Chahrazed Mediani, Marie-Hélène Abel, Mahieddine Djoudi:
Towards a Recommendation System for the Learner from a Semantic Model of Knowledge in a Collaborative Environment. 315-327 - Hanane Zitouni, Omar Nouali, Souham Meshoul:
Toward a New Recommender System Based on Multi-criteria Hybrid Information Filtering. 328-339
Information Technology: Ontologies
- Moussa Benaissa, Abderrahmane Khiat:
A New Approach for Combining the Similarity Values in Ontology Alignment. 343-354 - Mustapha Bourahla:
Exact Reasoning over Imprecise Ontologies. 355-366 - Mohamed Kharrat, Anis Jedidi, Faïez Gargouri:
Defining Semantic Relationships to Capitalize Content of Multimedia Resources. 367-378
Security and Network Technologies: Security
- Imen Brahmi, Hanen Brahmi, Sadok Ben Yahia:
A Multi-agents Intrusion Detection System Using Ontology and Clustering Techniques. 381-393 - Abdelkader Khobzaoui, Mhamed Mesfioui, Abderrahmane Yousfate, Boucif Amar Bensaber:
On Copulas-Based Classification Method for Intrusion Detection. 394-405 - Nabila Labraoui, Abdelhak Mourad Guéroui, Larbi Sekhri:
On-Off Attacks Mitigation against Trust Systems in Wireless Sensor Networks. 406-415 - Mohamed Belaoued, Smaine Mazouzi:
A Real-Time PE-Malware Detection System Based on CHI-Square Test and PE-File Features. 416-425
Security and Network Technologies: Wireless Sensor Networks
- Amine Dahane, Berrached Nasr-Eddine, Abdelhamid Loukil:
Balanced and Safe Weighted Clustering Algorithm for Mobile Wireless Sensor Networks. 429-441 - Abdelkader Khelil, Rachid Beghdad:
Distributed Algorithm for Coverage and Connectivity in Wireless Sensor Networks. 442-453 - Mehdi Rouan Serik, Mejdi Kaddour:
Optimizing Deployment Cost in Camera-Based Wireless Sensor Networks. 454-464 - Chifaa Tabet Hellel, Mohamed Lehsaini, Hervé Guyennet:
A version of LEACH Adapted to the Lognormal Shadowing Model. 465-475
Security and Network Technologies: Energy and Synchronisation
- Khedidja Medani, Makhlouf Aliouat, Zibouda Aliouat:
High Velocity Aware Clocks Synchronization Approach in Vehicular Ad Hoc Networks. 479-490 - Chafik Arar, Mohamed Salah Khireddine, Abdelouahab Belazoui, Randa Megulati:
An Energy-Efficient Fault-Tolerant Scheduling Algorithm Based on Variable Data Fragmentation. 491-502 - Kheireddine Mekkaoui, Abdellatif Rahmoun, Gianluigi Ferrari:
Genetic Centralized Dynamic Clustering in Wireless Sensor Networks. 503-511
Security and Network Technologies: Potpourri
- Omar Boudraa, Karima Benatchba:
Region-Edge Cooperation for Image Segmentation Using Game Theory. 515-526 - Brahim Farou, Hamid Seridi, Herman Akdag:
Improved Parameters Updating Algorithm for the Detection of Moving Objects. 527-537 - Moulay Driss Mechaoui, Nadir Guetmi, Abdessamad Imine:
Towards Real-Time Co-authoring of Linked-Data on the Web. 538-548
Software Engineering: Modeling and Meta Modeling
- Ahmed Kheldoun, Kamel Barkaoui, Jiafeng Zhang, Malika Ioualalen:
A High Level Net for Modeling and Analysis Reconfigurable Discrete Event Control Systems. 551-562 - Fouzia Anguel, Abdelkrim Amirat, Nora Bounour:
Hybrid Approach for Metamodel and Model Co-evolution. 563-573 - Mohamed Maddeh, Sarra Ayouni:
Extracting and Modeling Design Defects Using Gradual Rules and UML Profile. 574-583 - Houda Tadjer, Djamel Meslati:
An Approach to Integrating Aspects in Agile Development. 584-595
Software Engineering: Checking and Verification
- Samy Sadi, Belabbas Yagoubi:
On the Optimum Checkpointing Interval Selection for Variable Size Checkpoint Dumps. 599-610 - Pragya Jain, Anita Goel, Suresh Chand Gupta:
Monitoring Checklist for Ceph Object Storage Infrastructure. 611-623 - Kamel Boukhelfa, Faiza Belala:
Towards a Formalization of Real-Time Patterns-Based Designs. 624-635
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.