Soumissions récentes

  • An Approach to Improve Business Process Models Reuse Using LinkedIn Social Network 

    Khider, Hadjer; benna, Amel; Meziane, Abdelkrim; Hammoudi, Slimane
    In : (Springer International Publishing AG 2017, Editors: Rocha, Á., Correia, A.M., Adeli, H., Reis, L.P., Costanzo, S. (Eds.), Porto Santo Island, Portugal, 2017-04)
    Business process (BP) modeling is an important stage in Business Process Management (BPM) lifecycle. However, modeling BP from scratch is fallible task, complex, time-consuming and error prone task. One of the promising solutions to these issues is the reuse of BP models. BP reusability during the BP modeling stage can ...
  • Binarization of document images with various object sizes 

    Hadjadj, Zineb; Meziane, Abdelkrim
    In : (IEEE, Nancy, France, 2017-04)
    There are a lot of document image binarization techniques that try to differentiate between foreground and background but many of them fail to correctly detect all the text pixels because of degradations. In this paper, a new binarization method for document images is presented. The proposed method is based on the most ...
  • Intégration de l’utilisateur dans un modèle de recherche sociale 

    Bessai Mechmache, Fatma Zohra; Hammouche, Karima; Alimazighi, Zaia
    In : (Al Hoceima, Maroc, 2017-05)
    Dans cet article nous proposons un nouveau modèle de recherche d’information sociale basé sur un ordonnancement conjoint des documents, des auteurs et des utilisateurs d’un réseau bibliographique dans un réseau hétérogène. Ce modèle enrichit la structure du réseau en introduisant l’utilisateur comme une entité du réseau ...
  • Les Manuscrits Arabes Anciens En Ligne : Pratiques et Recommandations 

    Habbak, Noureddine; Meziane, Abdelkrim
    In : (Al-Hoceima (Maroc), 2017-05-11)
    Les technologies de l’information ont révolutionné la bibliothèque classique. Aujourd’hui, de nombreuses bibliothèques passent au monde numérique. L’accès aux documents qui ont tendance à se détériorer rapidement et qui sont très demandés tels que les manuscrits arabes anciens devient de plus en plus simple, ce qui assure ...
  • Accelerated Search over Encrypted Cloud Data 

    Boucenna, Fateh; Nouali, Omar; Dabah, Adel; Kechid, Samir
    In : (IEEE, Jeju, Corée du sud, 2017-02-13)
    Companies and other organizations such as hospitals seek more and more to enjoy the benefits of cloud computingin terms of storage space and computing power. However, outsourced data must be encrypted in order to be protected againstpossible attacks. Therefore, traditional information retrieval systems (IRS) are no longer ...
  • A tracking approach for text line segmentation in handwritten documents 

    Setitra, Insaf; Hadjadj, Zineb; Meziane, Abdelkrim
    In : (Springer, Porto, Portugal, 2017-02-24)
    Tracking of objects in videos consists of giving a label to the same object moving in different frames. This labeling is performed by predicting position of the object given its set of features observed in previous frames. In this work, we apply the same rationale by considering each connected component in the manuscript ...
  • Edit Distance: Sketching, Streaming, and Document Exchange 

    Belazzougui, Djamal; Zhang, Qin
    In : (IEEE, New Brunswick, New Jersey, 2016-12-19)
    We show that in the document exchange problem, where Alice holds x ∈ {0, 1}^n and Bob holds y ∈ {0, 1}^n , Alice can send Bob a message of size O(K(log^2 K + log n)) bits such that Bob can recover x using the message and his input y if the edit distance between x and y is no more than K, and output “error” otherwise. ...
  • Fully Dynamic de Bruijn Graphs 

    Belazzougui, Djamal; Gagie, Travis; Mäkinen, Veli; Previtali, Marco
    In : (Springer International Publishing, Beppu, Japan, 2016-09-21)
    We present a space- and time-efficient fully dynamic implementation of de Bruijn graphs, which can also support fixed-length jumbled pattern matching.
  • Bidirectional Variable-Order de Bruijn Graphs 

    Belazzougui, Djamal; Gagie, Travis; Mäkinen, Veli; Previtali, Marco; Puglisi, Simon J.
    In : (Springer International Publishing, Ensenada, Mexico, 2016-03-22)
    Implementing de Bruijn graphs compactly is an important problem because of their role in genome assembly. There are currently two main approaches, one using Bloom filters and the other using a kind of Burrows-Wheeler Transform on the edge labels of the graph. The second representation is more elegant and can even handle ...
  • Lempel-Ziv Decoding in External Memory 

    Belazzougui, Djamal; Kärkkäinen, Juha; Kempa, Dominik; Puglisi, Simon J.
    In : (Springer International Publishing, St. Petersburg, Russia, 2016-06-01)
    Simple and fast decoding is one of the main advantages of LZ77-type text encoding used in many popular file compressors such as gzip and 7zip. With the recent introduction of external memory algorithms for Lempel–Ziv factorization there is a need for external memory LZ77 decoding but the standard algorithm makes random ...
  • An oscillation-based algorithm for reliable vehicle detection with magnetic sensors 

    Djenouri, Djamel; Doudou, Messaoud; Kafi, Mohamed Amine
    In : (IEEE, Hong Kong, 2016-04)
    Vehicle monitoring using a wireless sensor network is considered in this paper, where a new algorithm is proposed for vehicle detection with magnetic sensors. The proposed algorithm is based on processing the magnetic signal and thoroughly analyzing the number/direction of its oscillations. The main feature of the proposed ...
  • Instantaneous Proxy-Based Key Update for CP-ABE 

    Touati, Lyes; Challal, Yacine
    In : (IEEE, Dubai, 2016-11-07)
    Attribute Based Encryption (ABE) scheme has been proposed to implement cryptographic fine grained access control to shared information. It allows to achieve information sharing of type one-to-many users, without considering the number of users and their identities. However, original ABE systems suffer from the ...
  • Collaborative KP-ABE for Cloud-Based Internet of Things Applications 

    Touati, Lyes; Challal, Yacine
    In : (IEEE, Kuala Lampur, Malaysia, 2016-05-23)
    KP-ABE mechanism emerges as one of the most suitable security protocol for asymmetric encryption. It has been widely used to implement access control solutions. However, due to its expensive overhead, it is difficult to consider this protocol in resource-limited networks, such as the IoT. As the cloud has become a ...
  • A review on Privacy and Anonymity in electronic communications 

    Benmeziane, Souad; Badache, Nadjib
    In : (Conference Procedings, Merida Spain, 2006-10-25)
    Current Internet networking protocols provide no support to ensure the privacy of communication endpoints. An adversary can determine which addresses have asked for which services. Anonymity is now increasingly important for networked applications. This paper overviews the concept of anonymity in electronic communications, ...
  • Anonymous Mobile Agents 

    Benmeziane, Souad; Larab, Baghdad
    In : (IEEE, Syria, 2006-04-24)
    One of the most important issues of the agent security is to keep the agent anonymity, not only in regard of the outsider (eavesdropper) but from the visited hosts too. Indeed, the observer may access agent's data, like the agent's route information data, and thus collecting sensitive information about the agent's owner. ...
  • An Adaptive Anonymous Authentication for Cloud Environment 

    Djellalbia, Amina; Benmeziane, Souad; Badache, Nadjib; Bensimessaoud, Sihem
    In : International Conference on Cloud Computing Technologies and Applications - CLOUDTECH 2015, (IEEE Xplore Digital labrary, Marrakech, Maroc, 2015-06-02)
    Preserving identity privacy is a significant challenge for the security in cloud services. Indeed, an important barrier to the adoption of cloud services is user fear of privacy loss in the cloud. One interesting issue from a privacy perspective is to hide user’s usage behavior or meta-information which includes access ...
  • SMART: Secure Multi-pAths Routing for wireless sensor neTworks 

    Lasla, Noureddine; Derhab, Abdelouahid; Ouadjaout, Abdelraouf; Bagaa, Miloud; Challal, Yacine
    In : (IEEE, Benidorm, Spain, 2014-06-22)
    In this paper, we propose a novel secure routing protocol named Secure Multi-pAths Routing for wireless sensor neTworks (SMART) as well as its underlying key management scheme named Extended Twohop Keys Establishment (ETKE). The proposed framework keeps consistent routing topology by protecting the hop count information ...
  • Distributed Algorithm for the Actor Coverage Problem in WSN-based Precision Irrigation Applications 

    Derhab, Abdelouahid; Lasla, Noureddine
    In : (IEEE, China, 2011-05)
    In this paper, we study the actor coverage problem with the goal of meeting the requirements of precision irrigation applications in Wireless sensor and Actor Networks (WSANs), which are : (1) the volume of water applied by actors should match plant water demand and (2) minimizing over-irrigation to the least extent. We ...
  • Congestion Detection Strategies in Wireless Sensor Networks: A Comparative Study with Testbed Experiments 

    Kafi, Mohamed Amine; Djenouri, Djamel; Ouadjaout, Abdelraouf; Badache, Nadjib
    In : (Elsevier, Halifax, Canada, 2014-09)
    Event based applications of Wireless Sensor Networks (WSNs) are prone to traffic congestion, where unpredicted event detection yields simultaneous generation of traffic at spatially co-related nodes, and its propagation towards the sink. This results in loss of information and waste energy. Early congestion detection is ...
  • Interference-aware Congestion Control Protocol for Wireless Sensor Networks 

    Kafi, Mohamed Amine; Djenouri, Djamel; Ben Othman, Jalel; Ouadjaout, Abdelraouf; Bagaa, Miloud; Lasla, Noureddine; Badache, Nadjib
    In : (Elsevier, Halifax, Canada, 2014-09)
    This paper deals with congestion and interference control in wireless sensor networks (WSN), which is essential for improving the throughput and saving the scarce energy in networks where nodes have different capacities and traffic patterns. A scheme called IACC (Interference-Aware Congestion Control) is proposed. It ...

View more