index - Computer Science and Its Applications
   


Full Text Documents

51

Search


Computer Science and Its Applications
Abdelmalek Amine, Ladjel Bellatreche, Zakaria Elberrichi, Erich J. Neuhold, Robert Wrembel
Front Matter

Computational Intelligence–Meta-Heuristics


Binary Bat Algorithm: On The Efficiency of Mapping Functions When Handling Binary Problems Using Continuous-variable-based Metaheuristics
Zakaria Dahi, Chaker Mezioud, Amer Draa
3-14
Relative Timed Model for Coordinated Multi Agent Systems
Said Layadi, Jean-Michel Ilie, Ilham Kitouni, Djamel-Eddine Saidouni
15-27

Computational Intelligence: Object Recognition and Authentification


A Novel Technique For Human Face Recognition Using Fractal Code and Bi-dimensional Subspace
Benouis Mohamed, Benkkadour Kamel, Tlmesani Redwan, Senouci Mohamed
31-42

Computational Intelligence: Image Processing


A New Rotation-Invariant Approach for Texture Analysis
Izem Hamouchene, Saliha Aouat
45-53
Multi-CPU/Multi-GPU Based Framework for Multimedia Processing
Sidi Mahmoudi, Pierre Manneback
54-65
Full-Reference Image Quality Assessment Measure Based on Color Distortion
Zianou Seghir, Fella Hachouf
66-77

Computational Intelligence: Machine Learning


Biomarker Discovery Based on Large-Scale Feature Selection and MapReduce
Ahlam Kourid, Mohamed Batouche
81-92
Social Validation of Solutions in the Context of Online Communities
Lydia Driff, Lamia Berkani, Ahmed Guessoum, Abdellah Bendjahel
93-104
Remotely Sensed Data Clustering Using K-Harmonic Means Algorithm and Cluster Validity Index
Habib Mahi, Nezha Farhi, Kaouter Labed
105-116

Computational Intelligence: BioInformatics


Comparison of Automatic Seed Generation Methods for Breast Tumor Detection Using Region Growing Technique
Ahlem Melouah
119-128
IHBA: An Improved Homogeneity-Based Algorithm for Data Classification
Fatima Bekaddour, Chikh Amine
129-140
Multiple Guide Trees in a Tabu Search Algorithm for the Multiple Sequence Alignment Problem
Tahar Mehenni
141-152

Information Technology: Text and Speech Processing


Noise Robust Features Based on MVA Post-processing
Mohamed Korba, Djemil Messadeg, Houcine Bourouba, Rafik Djemili
155-166
Arabic Texts Categorization: Features Selection Based on the Extraction of Words’ Roots
Said Gadri, Abdelouahab Moussaoui
167-180
Restoration of Arabic Diacritics Using a Multilevel Statistical Model
Mohamed Hadj Ameur, Youcef Moulahoum, Ahmed Guessoum
181-192
A New Multi-layered Approach for Automatic Text Summaries Mono-Document Based on Social Spiders
Mohamed Boudia, Reda Hamou, Abdelmalek Amine, Mohamed Rahmani, Amine Rahmani
193-204
Building Domain Specific Sentiment Lexicons Combining Information from Many Sentiment Lexicons and a Domain Specific Corpus
Hugo Hammer, Anis Yazidi, Aleksander Bai, Paal Engelstad
205-216
Improved Cuckoo Search Algorithm for Document Clustering
Saida Boushaki, Nadjet Kamel, Omar Bendjeghaba
217-228

Information Technology: Requirement Engineering


Supporting Legal Requirements in the Design of Public Processes
Amina Cherouana, Latifa Mahdaoui
231-242
Requirement Analysis in Data Warehouses to Support External Information
Mohamed Chouder, Rachid Chalal, Waffa Setra
243-253
Engineering the Requirements of Data Warehouses: A Comparative Study of Goal-Oriented Approaches
Waffa Setra, Rachid Chalal, Mohamed Chouder
254-265

Information Technology: OLAP and Web Services


Research and Analysis of the Stream Materialized Aggregate List
Marcin Gorawski, Krzysztof Pasterak
269-278
SOLAP On-the-Fly Generalization Approach Based on Spatial Hierarchical Structures
Tahar Ziouel, Khalissa Amieur-Derbal, Kamel Boukhalfa
279-290
QoS-Aware Web Services Selection Based on Fuzzy Dominance
Amal Halfaoui, Fethallah Hadjila, Fedoua Didi
291-300

Information Technology: Recommender Systems and Web Services


A Hybrid Model to Improve Filtering Systems
Kharroubi Sahraoui, Dahmani Youcef, Nouali Omar
303-314
Towards a Recommendation System for the Learner from a Semantic Model of Knowledge in a Collaborative Environment
Chahrazed Mediani, Marie-Hélène Abel, Mahieddine Djoudi
315-327
Toward a New Recommender System Based on Multi-criteria Hybrid Information Filtering
Hanane Zitouni, Omar Nouali, Souham Meshoul
328-339

Information Technology: Ontologies


A New Approach for Combining the Similarity Values in Ontology Alignment
Moussa Benaissa, Abderrahmane Khiat
343-354
Exact Reasoning over Imprecise Ontologies
Mustapha Bourahla
355-366
Defining Semantic Relationships to Capitalize Content of Multimedia Resources
Mohamed Kharrat, Anis Jedidi, Faiez Gargouri
367-378

Security and Network Technologies: Security


A Multi-agents Intrusion Detection System Using Ontology and Clustering Techniques
Imen Brahmi, Hanen Brahmi, Sadok Yahia
381-393
On Copulas-Based Classification Method for Intrusion Detection
Abdelkader Khobzaoui, Mhamed Mesfioui, Abderrahmane Yousfate, Boucif Amar Bensaber
394-405
On-Off Attacks Mitigation against Trust Systems in Wireless Sensor Networks
Nabila Labraoui, Mourad Gueroui, Larbi Sekhri
406-415
A Real-Time PE-Malware Detection System Based on CHI-Square Test and PE-File Features
Mohamed Belaoued, Smaine Mazouzi
416-425

Security and Network Technologies: Wireless Sensor Networks


Balanced and Safe Weighted Clustering Algorithm for Mobile Wireless Sensor Networks
Amine Dahane, Nasr-Eddine Berrached, Abdelhamid Loukil
429-441
Distributed Algorithm for Coverage and Connectivity in Wireless Sensor Networks
Abdelkader Khelil, Rachid Beghdad
442-453
Optimizing Deployment Cost in Camera-Based Wireless Sensor Networks
Mehdi Rouan Serik, Mejdi Kaddour
454-464
A version of LEACH Adapted to the Lognormal Shadowing Model
Chifaa Tabet Hellel, Mohamed Lehsaini, Hervé Guyennet
465-475

Security and Network Technologies: Energy and Synchronisation


High Velocity Aware Clocks Synchronization Approach in Vehicular Ad Hoc Networks
Khedidja Medani, Makhlouf Aliouat, Zibouda Aliouat
479-490
An Energy-Efficient Fault-Tolerant Scheduling Algorithm Based on Variable Data Fragmentation
Chafik Arar, Mohamed Khireddine, Abdelouahab Belazoui, Randa Megulati
491-502
Genetic Centralized Dynamic Clustering in Wireless Sensor Networks
Mekkaoui Kheireddine, Rahmoun Abdellatif, Gianluigi Ferrari
503-511

Security and Network Technologies: Potpourri


Region-Edge Cooperation for Image Segmentation Using Game Theory
Omar Boudraa, Karima Benatchba
515-526
Improved Parameters Updating Algorithm for the Detection of Moving Objects
Brahim Farou, Hamid Seridi, Herman Akdag
527-537
Towards Real-Time Co-authoring of Linked-Data on the Web
Moulay Mechaoui, Nadir Guetmi, Abdessamad Imine
538-548

Software Engineering: Modeling and Meta Modeling


A High Level Net for Modeling and Analysis Reconfigurable Discrete Event Control Systems
Ahmed Kheldoun, Kamel Barkaoui, Jiafeng Zhang, Malika Ioualalen
551-562
Hybrid Approach for Metamodel and Model Co-evolution
Fouzia Anguel, Abdelkrim Amirat, Nora Bounour
563-573
Extracting and Modeling Design Defects Using Gradual Rules and UML Profile
Mohamed Maddeh, Sarra Ayouni
574-583
An Approach to Integrating Aspects in Agile Development
Tadjer Houda, Meslati Djamel
584-595

Software Engineering: Checking and Verification


On the Optimum Checkpointing Interval Selection for Variable Size Checkpoint Dumps
Samy Sadi, Belabbas Yagoubi
599-610
Monitoring Checklist for Ceph Object Storage Infrastructure
Pragya Jain, Anita Goel, S. Gupta
611-623
Towards a Formalization of Real-Time Patterns-Based Designs
Kamel Boukhelfa, Faiza Belala
624-635

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/