Now showing items 704-723 of 777

  • TopCoF: NS2-based Topology Control Framework for Wireless Ad hoc Networks 

    Yahiaoui, Saïd; Belhoul, Yacine; Faoudi, Farid; Kheddouci, Hamamache
    In : Rapports de recherche internes, (CERIST, Alger, 2010-02)
    Topology Control (TC) is the most well known technique used in wireless ad hoc and sensor networks to reduce energy consumption and radio interferences. This technique coordinates the decisions of network nodes about their transmission power to save energy, prolong network lifetime, and mitigate MAC-level medium contention, ...
  • Tor Network Limits 

    Benmeziane, Souad; Badache, Nadjib
    In : Rapports de recherche internes, (CERIST, Alger, 2010-12)
    Tor is a volunteer run relay network designed for privacy, anonymity, and censorship resistance. Tor has become the most successful public anonymity communication service in the Internet because of its low latency. In this paper, we present a method to exploit the Tor limits in conjunction with the public profile of a ...
  • Toward a business process collaboration in E-commerce exchange using Web serice 

    Khelifa, Lydia Nadia; Aklouf, Youcef; Drias, Habiba; Boumellil, Lamia Sabiha
    In : Rapports de recherche internes, (CERIST, Alger, 2009)
    B2B e-commerce is an emergent area, which the profit of enterprises depend on its performance. Business Process collaboration is a challenge that companies are facing to. However, emergent specifications resulted from the convergence of web services and grid i-e Web Service Resource Framework (WSRF) open new horizon for ...
  • Toward a neural aggregated search model for semi-structured documents 

    Bessai, Fatma-Zohra
    In : Rapports de recherche internes, (CERIST, Alger, 2013-07)
    In this paper, we are interested in content-oriented XML information retrieval. Our goal is to revisit the granularity of the unit to be returned. More precisely, instead of returning the whole document or a list of disjoint elements of a document, as it is usually done in the most XML information retrieval systems, we ...
  • Toward a new Backpressure-based framework to Enhance Situational Awareness in Disaster Response 

    Kabou, Abdelbaset; Nouali-Taboudjemat, Nadia; Nouali, Omar
    In : (IEEE ICT-DM-2017, International Conference on Information and Communication Technologies for Disaster Management (ICT-DM), 2017-12-11)
    Crises generate intense need to communication not just as a panic reaction to crisis, but also due the critical need for communication in order to better coordinate during response activities. In the afterward of a disaster, the lack of resources to handle this increase of data, due to the fragility of network inf ...
  • Toward an Approach to Improve Business Process Models Reuse Based on Linkedin Social Network 

    Khider, Hadjer; Benna, Amel; Meziane, Abdelkrim; Hammoudi, Slimane
    In : Rapports de recherche internes, (CERIST, Alger, 2017-01-10)
    Business process (BP) modeling is an important stage in BPM lifecycle. However, modeling BP from scratch is fallible task, complex, time-consuming and error prone task. One of the promising solutions to these issues is the reuse of BP models. BP reusability during the BP modeling stage can be very useful since it reduces ...
  • Toward an Approach to Improve Business Process Models Reuse Based on LinkedIn Social Network 

    Khider, Hadjer
    In : (Springer International Publishing, Porto Santo Island Madeira, Portugal, 2017-04-11)
    Business process (BP) modeling is an important stage in Business Process Management (BPM) lifecycle. However, modeling BP from scratch is fallible task, complex, time-consuming and error prone task. One of the promising solutions to these issues is the reuse of BP models. BP reusability during the BP modeling stage ...
  • Towards a Dynamic Evacuation System for Disaster Situations 

    Benssam, Ali; Bendjoudi, Ahcène; Yahiaoui, Saïd; Nouali-Taboudjemat, Nadia; Nouali, Omar
    In : IEEE International Conference on Information and Communication Technologies for Disaster Management (ICT-DM'2014), (IEEE, Algiers, Algeria, 2014-03)
    Medical evacuation is one of the most important modules in the emergency plans activated during disaster situations. It aims at evacuating victims to the most appropriate health-care facilities. Evacuation plans were for a long time performed approximatively and passively rather than optimally and proactively between the ...
  • Towards a framework, for adapting information and communication technologies to enterprise providers, to promote their products 

    Mellah, Hakima; Matouk, Fatma Zohra
    In : المؤتمر العربي الدولي السابع لتكنولوجيا المعلومات, (Rabat- Maroc, 2015-05-19)
    The present work emphasizes three representative aspects of ICT such as the media, modalities and modes, and meet the following requirements: -Understanding how product suppliers, also considered as companies business managers, adapt to ICT -Integrating user preferences in choosing the proper interaction mode -Showing ...
  • Towards an event-aware approach for ubiquitous computing based on automatic service composition and selection 

    Badache, Nadjib; Yachir, Ali; Amirat, Yacine
    In : Annals of telecommunications, (Springer-Verlag, 2012-08)
    Service composition in ubiquitous and pervasive environments is becoming an active research domain which has received widespread attention in recent years. It aims to offer seamless access to a variety of high level and complex functionalities by combining existing services. Several frameworks have been designed to support ...
  • Towards an intrusion detection system : a critical and comparative study 

    Bensefia, Hassina; Ahmed-Nacer, Mohamed
    In : Rapports de recherche internes, (CERIST, Alger, 2008)
    An Intrusion Detection System(IDS), that is destined to supervise an environment, must adjust itself according to every change in the environment and be handling every new attack occurrence. This feature is referred to as the adaptability. It makes the IDS a learning system in relation to its target environment, practicing ...
  • Towards an IT-Based Platform for Disaster Risks Management in Algeria 

    Benssam, Ali; Nouali-Taboudjemat, Nadia; Nouali, Omar
    In : Proceedings of the 10th International ISCRAM Conference, (Baden-Baden, Germany, 2013-05)
    Disaster management and risk prevention in Algeria have undergone many changes in the recent years. Important efforts have been provided on the legal and organizational sides to set the right conditions for an integrated and collaborative framework for disaster management in the country. The aim is to address the lack of ...
  • Towards Immunizing MANET’s Source Routing Protocols Against Packet Droppers 

    Djenouri, Djamel; Mahmoudi, Othmane; Bouamama, Mohamed
    In : Journal of Interconnection Networks, (World Scientific, 2009-03)
    This paper deals with security of routing protocols of Mobile Ad hoc Networks (MANETs), and proposes a solution to immunize such protocols against packet dropping misbehavior. Most of the current secure protocols are vulnerable to packet dropping misbehavior, which can be exploited by selfish nodes and malicious ones as ...
  • Towards Merging Vehicular Ad hoc Networks and Wireless Sensor Networks 

    Djenouri, Djamel
    In : Revue RIST, (CERIST, CERIST, 2013-01)
    This paper reviews current applications based on Wireless Vehicular Sensor Networking (WVSN); an emerg- ing type of wireless and mobile networks that combines wireless sensor networks (WSN) and vehicular ad hoc networks (VANET). Some recent researches have been devoted to proposing new solutions for several vehicular ...
  • Towards Reading Session-based indicators in Educational Reading 

    Sadallah, Madjid; Encelle, Benoît; Maredj, Azze-Eddine; Prié, Yannick
    In : Rapports de recherche internes, (CERIST, Alger, 2015-06)
    It is a challenging task to identify eLearning courses parts that have to be revised to best suit learners’ requirements. Reading being one of the most salient learning activities, one way of doing so is to study how learners consume courses. We intend to support course authors (e.g. teachers) during courses revision by ...
  • Towards Reading Session-based indicators in Educational Reading 

    Sadallah, Madjid; Encelle, Benoît; Maredj, Azze-Eddine; Prié, Yannick
    In : (Springer, Toledo, Spain, 2015-09)
    It is a challenging task to identify eLearning courses parts that have to be revised to best suit learners' requirements. Reading being one of the most salient learning activities, one way of doing so is to study how learners consume courses. We intend to support course authors (e.g. teachers) during courses revision by ...
  • Traffic-Differentiation-Based Modular QoS Localized Routing for Wireless Sensor Networks 

    Djenouri, Djamel; Balasingham, Ilangko
    In : IEEE Transactions on Mobile Computing, (IEEE Computer Society, 2011-06)
    A new localized quality of service (QoS) routing protocol for wireless sensor networks (WSN) is proposed in this paper. The proposed protocol targets WSN's applications having different types of data traffic. It is based on differentiating QoS requirements according to the data type, which enables to provide several and ...
  • Travaux pratiques et EIAH Intégration de travaux pratiques dans un EIAH : le cas des expériences en réseaux et des plates-formes d’apprentissage 

    Bouabid, Mohamed Amine; Vidal, Phillipe; Broisin, Julien
    In : Rapports de recherche internes, (CERIST, Alger, 2009-04)
    Bien que les technologies de virtualisation soient suffisamment mûres pour offrir des expériences en réseaux et systèmes informatiques dans le contexte de la formation à distance, elles ne sont pas encore bien intégrées dans les environnements d’apprentissage, et par conséquent elles ne permettent pas aux enseignants de ...
  • Trust management in IoT routing protocol 

    Djedjig, Nabil; Tandjaoui, Djamel; Medjek, Faiza
    In : Rapports de recherche internes, (CERIST, Alger, 2015-04-19)
    The Routing Protocol for Low-Power and Lossy Networks (RPL) is the routing protocol standardized for constrained environments such as 6LoWPAN networks, and is considered as the routing protocol of the Internet of Things (IoT). However, this protocol is subject to several internal and external attacks. In this paper, we ...
  • Tutoriel SNDL 

    Elaïhar, Amel
    In : Manuels d'utilisation, (CERIST, Alger, 2014)
    Tutoriel permettant aux nouveaux utilisateur SNDL de s'auto-former sur les différentes fonctionnalités que leur offre le système.IL se compose de six (06) parties: 1- Connexion; 2- Recherche. 3- Formation; 4- Actualités; 5- Aide; 6- Veille.

Tous les documents dans CERIST DIGITAL LIBRARY sont protégés par copyright, avec tous droits réservés. copyright © 2013-2015  CERIST
Powered by 
@mire NV