Collection's Items (Sorted by Submit Date in Descending order): 1 to 11 of 11
Issue Date | Title | Author(s) |
26-Nov-2015 | Modèles de contrôle d’accès dynamiques | ZERKOUK, Meriem |
21-Oct-2015 | Tolérance aux fautes dans les grilles de calcul | Mohammed REBBAH |
2-Jun-2015 | Towards a software component assembly evaluation | Yahlali, Mebarka; Chouarfia, Abdellah |
19-Mar-2015 | Use partly hidden Markov model to evaluate a future failure | Asmaa, Boughrara; Belhadri, Messabih |
19-Mar-2015 | A Two-Stage Multi-Agent Based Assessment Approach to Enhance Students’ Learning Motivation Through Negotiated Skills Assessment | Chadli, Abdelhafid; Bendella, Fatima; ranvouez, Erwan |
15-Mar-2015 | Probabilistic Models for Local Patterns Analysis | Khiat, Salim; Belbachir, Hafida; Rahal, Sid Ahmed |
2015 | ROUTAGE MULTIPATH DANS LES RESEAUX AD HOC | Omar, Smail |
15-Feb-2015 | The Mobility Issue in Admission Controls and Available Bandwidth Measures in MANets | Belbachir, Redouane; Mekkakia Maaza, Zoulikha; Kies, Ali |
17-Apr-2013 | Contribution à la Recherche Intelligente sur le Web : Indexation S émantique des T ext es Non - S tructurés | Abderrezak, BRAHMI |
23-Feb-2012 | Reconnaissance d es Formes - Intelligence Artificielle (RF - IA | Redouane, TLE MSANI |
8-Apr-2013 | Application des algorithmes de colonies de fourmis pour l’optimisation et la classification des images | Benyamina, Ahmed |
Collection's Items (Sorted by Submit Date in Descending order): 1 to 11 of 11