المنشورات
2015
Yasmina Rahmoune; Allaoua Chaoui; Elhillali Kerkouche
A Framework for Modeling and Analysis UML Activity Diagram using Graph Transformation. 10th Int. Conf. on Future Networks and Communications (FNC'15): 612-617 (2015)
Ahmed-Chawki Chaouche; Amal El Fallah Seghrouchni; Jean-Michel Ilié; Djamel Eddine Saïdouni
Spatio-Temporal Guidance for Ambient Agents. 20th Int. Conf. on Control Systems and Computer Science (CSCS'15): 719-726 (2015)
Radja Boukharrou; Jean-Michel Ilié; Djamel Eddine Saïdouni
Spatio-Temporal Planning for Mobile Ambient Agents. 12th Int. Conf. on Mobile Systems and Pervasive Computing (MobiSPC'15): 96 - 103 (2015)
Ahmed-Chawki Chaouche; Amal El Fallah Seghrouchni; Jean-Michel Ilié; Djamel Eddine Saïdouni
Improving the Contextual Selection of BDI Plans by Incorporating Situated Experiments. 11th Int. Conf. on Artificial Intelligence Applications and Innovations (AIAI'15): 266-281 (2015)
Ahmed-Chawki Chaouche
Vers une informatique ambiante : application aux Smart-campus. 1ère édition du salon de l’informatique (2015)
2014
Mohamed Gharzouli; Youcef Messelem; Mohamed Elhadi Bounas
TTL-Chord: A Chord-based Approach for Semantic Web Services Discovery. Scalable Computing: Practice and Experience (SCPE) 15(1): 89-99 (2014)
Mohamed Gharzouli; Derdour Makhlouf
To Implement an Open-MAS Architecture for Semantic Web Services Discovery: What Kind of P2P Protocol Do We Need?. Int. J. of Agent Technologies and Systems (IJATS) 6(3): 58-71 (2014)
Mounira Zerari
Business process artefact adaptability approach based on artificial immune systems. Int. J. of Information and Communication Technology (IJICT) 6(3): 355-368 (2014)
Laid Kahloul; Samir Bourekkache; Karim Djouani; Allaoua Chaoui; Okba Kazar
Using high level Petri nets in the modelling, simulation and verification of reconfigurable manufacturing systems. Int. J. of Software Enegineering and Knowledge Engineering 24(3): 419-443 (2014)
Samia Boucherkha; Akram Kout; Aymen Lamara
A comprehensive performance analysis of VANETs routing protocols in different deployment strategies. Int. J. of Systems, Control and Communications 6(1): 48-58 (2014)
Sunitha Jeyasekhar; Sihem Mostefai
Towards Effective Relevance Feedback Methods in Content-Based Image Retrieval Systems. Int. J. of Innovation, Management and Technology 5(1): 35-38 (2014)
Amer Draa; Amira Bouaziz
An artificial bee colony algorithm for image contrast enhancement. Swarm and Evolutionary Computation 16: 69-84 (2014)
Meriem Bensouyad; Nousseiba Guidoum; Djamel Eddine Saidouni
An Efficient Evolutionary Algorithm for Strict Strong Graph Coloring Problem. Int. J. of Applied Evolutionary Computation (IJAEC) 5(2): 22-36 (2014)
Sofia Kouah; Djamel Eddine Saidouni
Fuzzy Labeled Transition Refinement Tree: Application to Stepwise Designing Multi Agent Systems. Int. J. of Agent Technologies and Systems (IJATS) 6(3): 1-31 (2014)
Imed Eddine Chama; Nabil Belala; Djamel Eddine Saidouni
Formalizing Timed BPEL by D-LOTOS. Int. J. of Embedded and Real-Time Communication Systems (IJERTCS) 5(2): 1-21 (2014)
Souad Guellati; Ilham Kitouni; Riadh Matmat; Djamel Eddine Saidouni
True Concurrency Semantics: Towards a Verification of Timed Systems. Int. J. of Embedded and Real-Time Communication Systems (IJERTCS) 5(2): 22-42 (2014)
Ahmed-Chawki Chaouche; Amal El Fallah Seghrouchni; Jean-Michel Ilié; Djamel Eddine Saïdouni
A Higher-order Agent Model with Contextual Management for Ambient Systems. Transactions on Computational Collective Intelligence XVI (TCCI) 8780: 146-169 (2014)
Sara Sabba; Salim Chikhi
A discrete binary version of bat algorithm for multidimensional knapsack problem. Int. J. of Bio-Inspired Computation (IJBIC) 6(2): 140-152 (2014)
Abdesslem Layeb; Salim Chikhi
Two novel sweep-based heuristics for the vehicle routing problem. Int. J. of Computer Applications in Technology (IJCAT) 49(3): 263-269 (2014)
Chikh Ramdane; Salim Chikhi
A New Negative Selection Algorithm for Adaptive Network Intrusion Detection System. Int. J. of Information Security and Privacy (IJISP) 8(4): 1-25 (2014)