A Cloud computing approach based on mobile agents for Web services discovery
Hamza, S., Okba, K., Aïcha-Nabila, B., Youssef, A.
Published in Second International Conference on the Innovative Computing Technology (INTECH 2012) (01.09.2012)
Published in Second International Conference on the Innovative Computing Technology (INTECH 2012) (01.09.2012)
Get full text
Conference Proceeding
Video summarization using shot segmentation and local motion estimation
Sabbar, W., Chergui, A., Bekkhoucha, A.
Published in Second International Conference on the Innovative Computing Technology (INTECH 2012) (01.09.2012)
Published in Second International Conference on the Innovative Computing Technology (INTECH 2012) (01.09.2012)
Get full text
Conference Proceeding
Quantum cryptography based on Grover's algorithm
Sakhi, Z., Kabil, R., Tragha, A., Bennai, M.
Published in Second International Conference on the Innovative Computing Technology (INTECH 2012) (01.09.2012)
Published in Second International Conference on the Innovative Computing Technology (INTECH 2012) (01.09.2012)
Get full text
Conference Proceeding
Baeza-Yates and Navarro approximate string matching for spam filtering
Aldwairi, M., Flaifel, Y.
Published in Second International Conference on the Innovative Computing Technology (INTECH 2012) (01.09.2012)
Published in Second International Conference on the Innovative Computing Technology (INTECH 2012) (01.09.2012)
Get full text
Conference Proceeding
Intrusion Detection based Sample Selection for imbalanced data distribution
Chairi, I., Alaoui, S., Lyhyaoui, A.
Published in Second International Conference on the Innovative Computing Technology (INTECH 2012) (01.09.2012)
Published in Second International Conference on the Innovative Computing Technology (INTECH 2012) (01.09.2012)
Get full text
Conference Proceeding
A method for modelling and organazing ETL processes
Kabiri, A., Chiadmi, D.
Published in Second International Conference on the Innovative Computing Technology (INTECH 2012) (01.09.2012)
Published in Second International Conference on the Innovative Computing Technology (INTECH 2012) (01.09.2012)
Get full text
Conference Proceeding
Simulation based evaluation of MANET routing protocols for static WSN
Ihbeel, A. A. S., Sigiuk, H. I., Alhnsh, A. A.
Published in Second International Conference on the Innovative Computing Technology (INTECH 2012) (01.09.2012)
Published in Second International Conference on the Innovative Computing Technology (INTECH 2012) (01.09.2012)
Get full text
Conference Proceeding
A hybrid method for improving the SQD-PageRank algorithm
Djaanfar, A. S., Frikh, B., Ouhbi, B.
Published in Second International Conference on the Innovative Computing Technology (INTECH 2012) (01.09.2012)
Published in Second International Conference on the Innovative Computing Technology (INTECH 2012) (01.09.2012)
Get full text
Conference Proceeding
Optimized strategy of deployment firewall policies
Bezzazi, F., Kartit, A., Marraki, M. E., Aboutajdine, D.
Published in Second International Conference on the Innovative Computing Technology (INTECH 2012) (01.09.2012)
Published in Second International Conference on the Innovative Computing Technology (INTECH 2012) (01.09.2012)
Get full text
Conference Proceeding
Reducing handover metrics for access network selection in heterogeneous wireless networks
Lahby, M., Cherkaoui, L., Adib, A.
Published in Second International Conference on the Innovative Computing Technology (INTECH 2012) (01.09.2012)
Published in Second International Conference on the Innovative Computing Technology (INTECH 2012) (01.09.2012)
Get full text
Conference Proceeding
Refactor Software architecture using graph transformation approach
Amirat, A., Bouchouk, A., Yeslem, M. O., Gasmallah, N.
Published in Second International Conference on the Innovative Computing Technology (INTECH 2012) (01.09.2012)
Published in Second International Conference on the Innovative Computing Technology (INTECH 2012) (01.09.2012)
Get full text
Conference Proceeding
LMSGENERATOR: The contribution of XML technology and model transformations
Dehbi, R., Talea, M., Tragha, A.
Published in Second International Conference on the Innovative Computing Technology (INTECH 2012) (01.09.2012)
Published in Second International Conference on the Innovative Computing Technology (INTECH 2012) (01.09.2012)
Get full text
Conference Proceeding
Biometric cryptosystems based Fuzzy Vault approach: Security analysis
Lafkih, M., Mikram, M., Ghouzali, S., Haziti, M. E., Aboutajdine, D.
Published in Second International Conference on the Innovative Computing Technology (INTECH 2012) (01.09.2012)
Published in Second International Conference on the Innovative Computing Technology (INTECH 2012) (01.09.2012)
Get full text
Conference Proceeding
A medical image watermarking scheme based on dual-tree wavelet transform
Kongo, Romain Mavudila, Masmoudi, Lhousaine, Idrissi, Nadia, Hassanain, Najem, Cherkaoui, Mohammed, Roukhe, Ahmed
Published in Second International Conference on the Innovative Computing Technology (INTECH 2012) (01.09.2012)
Published in Second International Conference on the Innovative Computing Technology (INTECH 2012) (01.09.2012)
Get full text
Conference Proceeding