| 2015 | 12th IEEE/ACS International Conference of Computer Systems and Applications, AICCSA 2015, Marrakech, Morocco, November 17-20, 2015 |
| 2015 | A Reduced Reference Image Quality assessment for Multiply Distorted Images. Aladine Chetouani |
| 2015 | A Rules-based system for model composition. Samia Benabdellah Chaouni, Mounia Fredj, Salma Mouline |
| 2015 | A blind robust image watermarking approach exploiting the DFT magnitude. Mohamed Hamidi, Mohamed El Haziti, Hocine Cherifi, Driss Aboutajdine |
| 2015 | A classification rules mining method based on dynamic rules' frequency. Issa Qabajeh, Francisco Chiclana, Fadi A. Thabtah |
| 2015 | A cloudlet architecture using mobile devices. Abd El-Hameed G. El-Barbary, Layla A. A. El-Sayed, Hussein H. Aly, Mohamed Nazih ElDerini |
| 2015 | A comparative study of Named Entity Recognition for Arabic using ensemble learning approaches. Ismail El Bazi, Nabil Laachfoubi |
| 2015 | A comparative study of multi-class support vector machine methods for Arabic characters recognition. Marwa Amara, Khaled Ghédira, Kamel Zidi, Salah Zidi |
| 2015 | A constraint-aware optimized path recommender in a crowdsourced environment. Faizan Ur Rehman, Ahmed Lbath, Bilal Sadiq, Md. Abdur Rahman, Abdullah Murad, Imad Afyouni, Akhlaq Ahmad, Saleh M. Basalamah |
| 2015 | A context-aware middleware for medical image based reports. Érick Oliveira Rodrigues, José Viterbo, Aura Conci, Trueman MacHenry |
| 2015 | A cost-aware model for risk mitigation in Cloud computing systems. Hisham A. Kholidy, Abdelkarim Erradi |
| 2015 | A formal approach for SOA design patterns composition. Imen Tounsi, Mohamed Hadj Kacem, Ahmed Hadj Kacem, Khalil Drira |
| 2015 | A formal pattern for dynamic networks through evolving graphs. Faten Fakhfakh, Mohamed Tounsi, Ahmed Hadj Kacem, Mohamed Mosbah |
| 2015 | A hardware accelerator for the IEEE 802.1X-2010 key hierarchy in automotive applications. Berardino Carnevale, Francesco Falaschi, Diego Pacini, Gianluca Dini, Luca Fanucci |
| 2015 | A measurement of the response times of various OpenFlow/SDN controllers with CBench. C. Laissaoui, Noureddine Idboufker, Raja Elassali, K. El Baamrani |
| 2015 | A metric for Literature-Based Discovery methodology evaluation. Ali Ahmed, Saadat M. Alhashmi |
| 2015 | A modeling of a multi-agent system for the protein synthesis. Mohamed Hachem Kermani, Zizette Boufaïda |
| 2015 | A multilayered scheme for transparent audio data hiding. El-Tigani B. Abdelsatir, Narayan C. Debnath, Hisham Abushama |
| 2015 | A new Authentication and Key Agreement protocol for SIP in IMS. Saliha Mallem, Amina Zemmache, Chafia Yahiaoui |
| 2015 | A new model for Online Social Networks case of Facebook. Donia Khemakhem Krid, Naouel Ben Salem Grati, Riadh Robbana |
| 2015 | A novel approach based on Support Vector Machines for automatic speaker identification. Rania Chakroun, Leila Beltaïfa Zouari, Mondher Frikha, Ahmed Ben Hamida |
| 2015 | A novel approach to improve background subtraction method for fall detection system. Abderrazak Iazzi, Rachid Oulad Haj Thami, Mohammed Rziza |
| 2015 | A novel penalty model for managing and applying penalties in Cloud Computing. Adil Maarouf, Bouchra El Qacimy, Abderrahim Marzouk, Abdelkrim Haqiq |
| 2015 | A plug-in for Eclipse towards supporting business process lines documentation. Marcelo Figueiredo Terenciani, Geraldo Barbosa Landre, Débora Maria Barroso Paiva, Maria Istela Cagnin |
| 2015 | A secure authentication mechanism for resource constrained devices. Bacem Mbarek, Aref Meddeb, Wafa Ben Jaballah, Mohamed Mosbah |
| 2015 | A statistical approach for the induction of a grammar of Arabic. Essma Selab, Ahmed Guessoum |
| 2015 | A study of mobility support in wearable health monitoring systems: Design framework. Amine Boulemtafes, Abderrezak Rachedi, Nadjib Badache |
| 2015 | A survey of uncertainty handling in frequent subgraph mining algorithms. Mohamed Moussaoui, Montaceur Zaghdoud, Jalel Akaichi |
| 2015 | A taxonomy of identities management systems in IOT. Hajer Boujezza, Modher Al-mufti, Hella Kaffel Ben Ayed, Leïla Azouz Saïdane |
| 2015 | AES cryptography in color image steganography by genetic algorithms. Aura Conci, Andre Luiz Brazil, Simone Bacellar Leal Ferreira, Trueman MacHenry |
| 2015 | ANFIS: General description for modeling dynamic objects. Marwan Alakhras, Mourad Oussalah, Mousa I. Hussein |
| 2015 | Accelerating Needleman-Wunsch global alignment algorithm with GPUs. Maged Fakirah, Mohammed A. Shehab, Yaser Jararweh, Mahmoud Al-Ayyoub |
| 2015 | Access control models in IoT: The road ahead. Aafaf Ouaddah, Hajar Mousannif, Abdellah Ait Ouahman |
| 2015 | Advanced search in the Qur'an using semantic modeling. Aimad Hakkoum, Said Raghay |
| 2015 | Affine Reconstruction based on the Projective Reconstruction and Homography at Infinity. Boutaina Satouri, C. Bekkali, Khalid Satori, Abdellatif El Abderrahmani, Hamid Tairi |
| 2015 | Amazigh verb in the Universal Networking Language. Imane Taghablout, Fadoua Ataa-Allah, Mohamed El Marraki |
| 2015 | An abstract machine for integrating heterogeneous web applications. Márcio A. Macêdo, Daniel A. S. Carvalho, Martin A. Musicante, Alberto Pardo, Umberto Souza da Costa |
| 2015 | An architecture for the Internet of Things with decentralized data and centralized control. Ola Salman, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab |
| 2015 | An automatic approach to transform BPMN models to Pi-Calculus. Riad Boussetoua, Hammadi Bennoui, Allaoua Chaoui, Khaled Khalfaoui, Elhillali Kerkouche |
| 2015 | An efficient method for Objects indexing in three dimensions. S. Hellam, Y. Oulahrir, F. El Mounchid, Abdelalim Sadiq, S. Mbarki |
| 2015 | An extended Eye Movement Tracker system for an electric wheelchair movement control. Fatma Ben Taher, Nader Ben Amor, Mohamed Jallouli |
| 2015 | An improved mapReduce design of kmeans for clustering very large datasets. Amira Boukhdhir, Oussama Lachiheb, Mohamed Salah Gouider |
| 2015 | Analysis of the ambiguity function for phase-coded waveforms. Kaoutar Farnane, Khalid Minaoui, Awatif Rouijel, Driss Aboutajdine |
| 2015 | Analysis of the effect of weather determinants on lodging demands using big data processing. Seungwoo Jeon, Bonghee Hong, Hyeongsoon Im |
| 2015 | Anomaly Behavior Analysis System for ZigBee in smart buildings. Bilal Al Baalbaki, Jesus Pacheco, Cihan Tunc, Salim Hariri, Youssif B. Al-Nashif |
| 2015 | Arabic text summarization based on graph theory. Nabil Alami, Mohammed Meknassi, Saïd El Alaoui Ouatik, Noureddine Ennahnahi |
| 2015 | Area and delay aware approaches for realizing multi-operand addition on FPGAs using two-operand adders. Noureddine Chabini, Said Belkouch |
| 2015 | Bat inspired optimization approach for audio watermarking algorithm. Mustapha Hemis, Bachir Boudraa, Thouraya Merazi-Meksen |
| 2015 | Behavioral appraoch for intrusion detection. Taha Ait Tchakoucht, Mostafa Ezziyyani, Mohammed Jbilou, Mikaël Salaün |
| 2015 | Belief Constraint Satisfaction Problems. Aouatef Rouahi, Kais Ben Salah, Khaled Ghédira |
| 2015 | Bounding aggregations on bulk arrivals for performance analysis of clouds. Farah Aït-Salaht, Hind Castel |
| 2015 | Brachiopods classification based on fusion of global and local complete and stable descriptors. Youssef Ait Khouya, Faouzi Ghorbel, Noureddine Alaa |
| 2015 | Bringing flexibility to ontology learning from relational databases. Bouchra El Idrissi, Salah Baïna, Karim Baïna |
| 2015 | Building a structured collaboration system from XML specification. Sara Najam, Hajar Mousannif, Mohamed Ouzzif |
| 2015 | Building holistic social media strategy refering to social intelligence and digital maturity. Meryem Boufim, Hafid Barka |
| 2015 | Business process outsourcing to the Cloud: What activity to outsource? Mouna Rekik, Khouloud Boukadi, Hanêne Ben-Abdallah |
| 2015 | CBIR using the 2-D ESPRIT method: Application to Coil_100 database. Youness Chawki, Khalid El Asnaoui, Mohammed Ouanan, Brahim Aksasse |
| 2015 | CFFL: Cluster formation using fuzzy logic for wireless sensor networks. Hassan El Alami, Abdellah Najid |
| 2015 | Cloud computing architecture and migration strategy for universities and higher education. Hanen Chihi, Walid Chainbi, Khaled Ghédira |
| 2015 | Cloud environment assignment: A context-aware and Dynamic Software Product Lines-based approach. Asmae Benali, Bouchra El Asri, Houda Kriouile |
| 2015 | Cloud-based Arabic reCAPTCHA service: Design and architecture. Hanin B. Abubaker, Khaled Salah, Hassan Al-Muhairi, Ahmed Bentiba |
| 2015 | Coalition-based access control models for critical infrastructures. Iman Ben Abdelkrim, Amine Baïna, Mostafa Bellafkih |
| 2015 | Collaborative Xmeans-EM clustering for automatic detection and segmentation of moving objects in video. Hiba Ramadan, Hamid Tairi |
| 2015 | Combining Case-Based Reasoning and Process Mining to improve collaborative decision-making in products design. Fatima-Zahra Berriche, Besma Zeddini, Hubert Kadima, Alain Rivière |
| 2015 | Combining RFM model and clustering techniques for customer value analysis of a company selling online. Rachid Ait Daoud, Abdellah Amine, Belaid Bouikhalene, Rachid Lbibb |
| 2015 | Comparative study of the systems of semantic integration of information: A survey. Oumayma Banouar, Said Raghay |
| 2015 | Considering dependability requirements in the context of Decision Support Systems. Imane Hilal, Nadia Afifi, Mohamed Ouzzif, Hicham Belhaddaoui |
| 2015 | Consistency awareness in a distributed collaborative system for semantic stores. Hafed Zarzour, Lamia Berrezzek, Hafida Ghomrani, Tarek Abid, Mokhtar Sellami |
| 2015 | Continuous monitoring of adaptive e-learning systems requirements. Lamiae Dounas, Raúl Mazo, Camille Salinesi, Omar El Beqqali |
| 2015 | Contribution to SMS management over 4G network in distance education context. Landry T. Yelome, Samuel Ouya, Samba Ndiaye, Sidi Mohamed Farssi |
| 2015 | Cosolver2B: An efficient local search heuristic for the Travelling Thief Problem. Mohamed El Yafrani, Belaïd Ahiod |
| 2015 | Curvelet-based locality sensitive hashing for mammogram retrieval in large-scale datasets. Amira Jouirou, Abir Baâzaoui, Walid Barhoumi, Ezzeddine Zagrouba |
| 2015 | DASH-DMS: To improve streaming video over HTTP. Haifa Harrouch, Mourad Kaddes, Majed Abdouli, Rafik Bouaziz, Claude Duvallet |
| 2015 | Data quality enhancement in Internet of Things environment. Aimad Karkouch, Hassan Al Moatassime, Hajar Mousannif, Thomas Noël |
| 2015 | Database auditing and forensics: Exploration and evaluation. Salam Ismail Rasheed Khanji, Asad Masood Khattak, Hakim Hacid |
| 2015 | Decentralized H∞ control of interconnected systems with time-delays. Amal Zouhri, Ismail Boumhidi |
| 2015 | Deep architecture using Multi-Kernel Learning and multi-classifier methods. Ilyes Rebai, Yassine Ben Ayed, Walid Mahdi |
| 2015 | Design, implementation, and evaluation of 6LoWPAN for home and building automation in the Internet of Things. Son N. Han, Quyet H. Cao, Bahram Alinia, Noël Crespi |
| 2015 | Detecting skimming devices in ATM through image processing. Mohamed Musallam Khasib Al Rawahi, Smitha Sunil Kumaran Nair |
| 2015 | Detection of Moroccan coastal upwelling using sea surface chlorophyll concentration. Anass El Aouni, Khalid Minaoui, Ayoub Tamim, Khalid Daoudi, Hussein M. Yahia, Abderrahman Atillah, Driss Aboutajdine |
| 2015 | Domain ontologies in the context of Requirements Engineering. Paulo Afonso Parreira, Rosângela Aparecida Dellosso Penteado |
| 2015 | Domain-specific design pattern instanciation. Saoussen Rekhis, Nadia Bouassida |
| 2015 | Efficient interleaved modular multiplication based on sign detection. Mohamed A. Nassar, Layla A. A. El-Sayed |
| 2015 | Efficient techniques for energy optimization in Mobile Cloud Computing. Khadijah S. Bahwaireth, Lo'ai Tawalbeh, Anas Basalamah, Yaser Jararweh, Mohammad Tawalbeh |
| 2015 | Emotion analysis of Arabic articles and its impact on identifying the author's gender. Kholoud Alsmearat, Mohammed A. Shehab, Mahmoud Al-Ayyoub, Riyad Al-Shalabi, Ghassan Kanaan |
| 2015 | Energy-aware forwarding strategy for Metro Ethernet networks. Rihab Maaloul, Lamia Chaari, Bernard Cousin |
| 2015 | Enhanced Unequal Clustering Algorithm for Wireless Sensor Networks. Said Talbi, Lotfi Zaouche |
| 2015 | Estimating software effort and function point using regression, Support Vector Machine and Artificial Neural Networks models. Sultan Aljahdali, Alaa F. Sheta, Narayan C. Debnath |
| 2015 | Evaluating enterprise architecture complexity using fuzzy AHP approach: Application to university information system. Jihane Lakhrouit, Karim Baïna |
| 2015 | Extracting accurate performance indicators from execution logs using process models. Nesma M. Zaki, Ahmed Awad, Ehab Ezat |
| 2015 | Fast content independent playlist generation for streaming media. Matyas Jani |
| 2015 | Formal modeling of the Simple Text Oriented Messaging Protocol using Event-B method. Sanae El Mimouni, Mohamed Bouhdadi |
| 2015 | Freehand sketch based 3D reconstruction using constraints. Afafe Annich, Abdellatif El Abderrahmani, Khalid Satori |
| 2015 | Fundamental pillars for an effective cybersecurity strategy. Hasna Elkhannoubi, Mustapha Belaïssaoui |
| 2015 | G2WS: Gloss-based WordNet and Wiktionary semantic Similarity measure. Mohamed Ben Aouicha, Mohamed Ali Hadj Taieb |
| 2015 | GPU implementation of the multi depot Vehicle Routing Problem. Abdelhamid Benaini, Achraf Berrajaa, El Mostafa Daoudi |
| 2015 | Image classification using separable invariant moments of Krawtchouk-Tchebichef. Mhamed Sayyouri, Abdeslam Hmimid, Hicham Karmouni, Hassan Qjidaa, Abdellah Rezzouk |
| 2015 | Improved Arabic handwriting word segmentation approach using Random Forests. Roqyiah M. Abdeen, Ahmed Afifi, Ashraf B. Elsisi |
| 2015 | Improved election of cluster heads in LEACH. Chaima Bejaoui, Alexandre Guitton, Abdennaceur Kachouri |
| 2015 | Improvement of route lifetime of LAR protocol for VANET in highway scenario. Mohamed Nabil, Abdelmajid Hajami, Abdelkrim Haqiq |
| 2015 | Indexing and classifiying video genres using Support Vector Machines. Nouha Dammak, Yassine Benayed |
| 2015 | Inference models for Twitter user's home location prediction. Hicham G. Elmongui, Hader Morsy, Riham Mansour |
| 2015 | Information matrix: Fighting back using a matrix. Sanaa Kaddoura |
| 2015 | Inspection and deconfliction of published virtual machine templates' remnant data for improved assurance in public Clouds. Bushra AlBelooshi, Khaled Salah, Thomas Martin, Ernesto Damiani |
| 2015 | Integration and formal security analysis of a quantum key distribution scheme within CHAP protocol. Aymen Ghilen, Mostafa Azizi, Ridha Bouallegue |
| 2015 | Integration of a quantum authenticated key distribution scheme in the EAP-TLS protocol. Aymen Ghilen, Mostafa Azizi, Ridha Bouallegue |
| 2015 | Integration of a quantum protocol for mutual authentication and secret key distribution within 802.11i standard. Aymen Ghilen, Mostafa Azizi, Ridha Bouallegue |
| 2015 | Internet of things context-aware privacy architecture. Rachid Selt, Yacine Challal, Nadjia Benblidia |
| 2015 | Intrusion detection based on Neuro-Fuzzy classification. Imen Gaied, Farah Jemili, Ouajdi Korbaa |
| 2015 | LeadersRank: Towards a new approach for community detection in social networks. Sara Ahajjam, Mohamed El Haddad, Hassan Badir |
| 2015 | Learning ontology from Big Data through MongoDB database. Hanen Abbes, Soumaya Boukettaya, Faïez Gargouri |
| 2015 | Learning through play in pervasive context: A survey. Rachid Lamrani, El Hassan Abdelwahed |
| 2015 | Low cost pedagogic device for practical works using embedded system. Abdessamad Malaoui |
| 2015 | MapReduce based scalable range query architecture for big spatial data. Umut Kizgindere, Süleyman Eken, Ahmet Sayar |
| 2015 | Measuring inconsistency ontological changes based on communities in ontology. Mouhamadou Gaye, Mamadou Bousso, Ousmane Sall, Moussa Lo |
| 2015 | Metrics and performance indicators to evaluate workflow processes on the cloud. Narayan C. Debnath, Mario Peralta, Carlos Salgado, Lorena Baigorria, German Montejano, Daniel Riesco |
| 2015 | MigBSP++: Improving process rescheduling on Bulk-Synchronous Parallel applications. Rodrigo da Rosa Righi, Roberto de Quadros Gomes, Vinicius Facco Rodrigues, Cristiano André da Costa, Antônio Marcos Alberti |
| 2015 | Mining traffic accident data by subgroup discovery using combinatorial targets. Jeongmin Kim, Kwang Ryel Ryu |
| 2015 | Monitoring solution for autonomic Middleware-level QoS management within IoT systems. Yassine Banouar, Saad Reddad, Codé Diop, Christophe Chassot, Abdellah Zyane |
| 2015 | Moving objects detection based on thresholding operations for video surveillance systems. Omar Elharrouss, Driss Moujahid, Soukaina Elidrissi Elkaitouni, Hamid Tairi |
| 2015 | Multi-factor authentication based on multimodal biometrics (MFA-MB) for Cloud Computing. Abdeljebar Mansour, Mohamed Sadik, Essaid Sabir |
| 2015 | Multi-hop routing for distributed clustering protocols in wide wireless sensor networks. Abderrahmen Guermazi, Abdelfettah Belghith, Mohamed Abid |
| 2015 | Multi-versions data and epsilon-serializability for QoS enhancement in distributed RTDBMS. Malek Ben Salem, Emna Bouazizi, Rafik Bouaziz |
| 2015 | Neural Text Categorizer for topic identification of noisy Arabic Texts. Kheireddine Abainia, Siham Ouamour, Halim Sayoud |
| 2015 | New Multi-Agent architecture of visual Intelligent Decision Support Systems application in the medical field. Hamdi Ellouzi, Hela Ltifi, Mounir Ben Ayed |
| 2015 | New learning approach for computer-aided diagnostic. Youssef Bourass, Hamid Zouaki, Abdelkhalak Bahri |
| 2015 | Nk-schemas. Samir Anter, Ahmed Zellou, Ali Idri |
| 2015 | Optimal model transformation of BPMN to DEVS. Sofiane Boukelkoul, Ramdane Maamri |
| 2015 | Optimal parallel scheduling for resolution a triangular system with availability constraints. Mounira Belmabrouk, Mounir Marrakchi |
| 2015 | Overview of IaaS monitoring tools. Rima Grati, Khouloud Boukadi, Hanêne Ben-Abdallah |
| 2015 | Parallel SAT based closed frequent itemsets enumeration. Imen Ouled Dlala, Saïd Jabbour, Lakhdar Sais, Yakoub Salhi, Boutheina Ben Yaghlane |
| 2015 | Performance evaluation of IEEE 802.15.6 CSMA/CA-based CANet WBAN. Hend Fourati, Hanen Idoudi, Thierry Val, Adrien van den Bossche, Leïla Azouz Saïdane |
| 2015 | Petri net modeling dynamic context of container for risk management. Ali Sahnoun, Ramdane Maamri |
| 2015 | Pre collision detection system for pedestrian safety based on HOL. Youssef Azdoud, Aouatif Amine, Nawal Alioua, Mohammed Rziza |
| 2015 | Proposition of a Bayesian model for the propagation of the information in a wireless sensor network. Frédéric Lehmann, Dina Chaal, Abdelouahid Lyhyaoui |
| 2015 | Proving distributed algorithms for mobile agents: Examples of spanning tree computation in dynamic networks. Mouna Ktari, Mohamed Amine Haddar, Ahmed Hadj Kacem, Mohamed Mosbah |
| 2015 | RPI.Idiom: A high-level language for first-class agent interaction protocols. Atef Nouri, Wided Lejouad Chaari, Khaled Ghédira |
| 2015 | Real-time Data Prefetching in Mobile Computing. Khalloufi Issam, El Beqqali Omar |
| 2015 | Reducing the inter processor migrations of the DP-WRAP scheduling. El Mostafa Daoudi, Abdelmajid Dargham, Aicha Kerfali, Mohammed Khatiri |
| 2015 | Refinement and reuse of ontologies semantic mapping. Messaouda Fareh, Hadjer Guellati, Chaima Elfarrouji |
| 2015 | Requirements definition for a holistic approach of cloud computing governance. Yassine Bounagui, Hatim Hafiddi, Abdellatif Mezrioui |
| 2015 | Runtime deduction of case ID for unlabeled business process execution events. Iman M. A. Helal, Ahmed Awad, Ali El Bastawissi |
| 2015 | SGRL-Selective Gateway and Reinforcement Learning-based routing for WMN. Mustapha Boushaba, Abdelhakim Hafid, Abdelilah Maach, Driss El Ghanami |
| 2015 | SOA based e-government interoperability. Mohamed Mahmoud El Benany, Omar El Beqqali |
| 2015 | SPL-UML: Software product lines design language. Jihen Maâzoun, Nadia Bouassida, Hanêne Ben-Abdallah |
| 2015 | SSCF: A semantic and social-based collaborative filtering approach. Lamia Berkani |
| 2015 | SVM based approach for opinion classification in Arabic written tweets. Rihab Bouchlaghem, Aymen Elkhelifi, Rim Faiz |
| 2015 | Serializable use of Read Committed isolation level. Mohammad Alomari, Alan D. Fekete |
| 2015 | SmartOrBAC security and privacy in the Internet of Things. Imane Bouij-Pasquier, Abdellah Ait Ouahman, Anas Abou El Kalam, Mina Ouabiba de Montfort |
| 2015 | Social intelligence framework: Extracting and analyzing opinions for social CRM. Fatima Zohra Ennaji, Abdelaziz El Fazziki, Mohammed Sadgal, Djamal Benslimane |
| 2015 | Social network integration to e-learning environment. Samuel Ouya, Ahmath Bamba Mbacke, Gervais Mendy, Pape Waly Diouf, Kalidou Sy |
| 2015 | Software Defined based smart grid architecture. Yaser Jararweh, Ala Darabseh, Mahmoud Al-Ayyoub, Abdelkader Bousselham, Elhadj Benkhelifa |
| 2015 | Sonar image segmentation based on statistical modeling of wavelet subbands. Ayoub Karine, Noureddine Lasmar, Alexandre Baussard, Mohammed El Hassouni |
| 2015 | Spanning tree based method for a social network analysis. Raihana Mokhlissi, Dounia Lotfi, Mohamed El Marraki |
| 2015 | Structural-semantic approach for approximate frequent subgraph mining. Mohamed Moussaoui, Montaceur Zaghdoud, Jalel Akaichi |
| 2015 | Studies of computing techniques for performing face recognition with a focus in the crowds: A distributed architecture based on cloud computing. Carlos Eduardo Monteiro, Luis Carlos Trevelin |
| 2015 | Supporting collaborative work on ontology learning from Relational Databases. Bouchra El Idrissi, Salah Baïna, Karim Baïna |
| 2015 | TALAA-ASC: A sentence compression corpus for Arabic. Riadh Belkebir, Ahmed Guessoum |
| 2015 | Testing environment for embedded software product lines. Takeru Kuroiwa, Noriyuki Kushiro |
| 2015 | Text readability for Arabic as a foreign language. Hind Saddiki, Karim Bouzoubaa, Violetta Cavalli-Sforza |
| 2015 | The filtered combination of the weighted edit distance and the Jaro-Winkler distance to improve spellchecking Arabic texts. Hicham Gueddah, Abdellah Yousfi, Mostafa Belkasmi |
| 2015 | The influence of 4Ps and system quality on perceived quality after mobile instant messaging usage. Parameth Voraseyanont, Mathupayas Thongmak |
| 2015 | Toward resolving access control policy conflict in inter-organizational workflows. Asmaa Elkandoussi, Hanan El Bakkali, Narimane Elhilali |
| 2015 | Towards a Domain-Specific Language for geospatial data visualization maps with Big Data sets. Cleverson Ledur, Dalvan Griebler, Isabel Harb Manssour, Luiz Gustavo Fernandes |
| 2015 | Towards a molecules production from DNA sequences based on clustering by 3D cellular automata approach and n-grams technique. Fatima Kabli, Reda Mohamed Hamou, Abdelmalek Amine |
| 2015 | Towards a new framework for clustering in a mixed data space: Case of gasoline service stations segmentation in Morocco. Mounir Lahlou Kassi, Abdelaziz Berrado, Loubna Benabbou, K. Benabdelkader |
| 2015 | Towards a semantic approach for discovering context aware services. Tarik Fissaa, Hatim Guermah, Hatim Hafiddi, Mahmoud Nassar |
| 2015 | Towards an Arabic legal ontology based on documents properties extraction. Imen Bouaziz Mezghanni, Faïez Gargouri |
| 2015 | Towards an alignment of SysML and simulation tools. Bassim Chabibi, Adil Anwar, Mahmoud Nassar |
| 2015 | Towards patterns-based Linguistic Web Service composition. Nabil Baklouti, Bilel Gargouri, Mohamed Jmaiel |
| 2015 | User and group networks on YouTube: A comparative analysis. Malek Jebabli, Hocine Cherifi, Chantal Cherifi, Atef Hamouda |
| 2015 | Using Bloom's taxonomy to enhance interactive concentric circles representation. Emna Ben Mohamed, Hela Ltifi, Mounir Ben Ayed |
| 2015 | Using SLA to guide database transition to NoSQL on the cloud: A systematic mapping study. Fábio Leal, Martin A. Musicante |
| 2015 | Using conceptual reasoning for inconsistencies detection in Islamic advisory opinion (Fatwas). Jameela Al Otaibi, Samir Elloumi, Ali Jaoua, Abdelaali Hassaïne |
| 2015 | Using invariant feature descriptors for an efficient image retrieval. Sara Hbali, Mohammed Sadgal, Abdelaziz El Fazziki |
| 2015 | Using text mining to locate concepts in execution traces. Mostefai Abdelkader, Ricardo Pérez-Castillo, Malki Mimoun |
| 2015 | Volumetric image reconstruction by 3D Hahn moments. Mostafa El Mallahi, Abderrahim Mesbah, Hassan Qjidaa, Aissam Berrahou, Khalid Zenkouar, Hakim el Fadili |
| 2015 | XPath translation to enhance the semantic matching of fine-grained Web service security policies. Monia Ben Brahim, Tarak Chaari, Mohamed Jmaiel |
| 2015 | xLONGWisE: An environment to support the execution of Long Running Workflows. Milton S. S. Junior, Nelson S. Rosa, Fernando Antônio Aires Lins |