Soumissions récentes

  • ADABCAST: ADAptive BroadCAST Approach for Solar Energy Harvesting Wireless Sensor Networks 

    Khiati, Mustapha; Djenouri, Djamel
    In : (IEEE, Newark, NJ, USA, 2017-04)
    The problem of message broadcasting from the base station (BS) to sensor nodes (SNs) in solar energy harvesting wireless sensor networks (EHWSN) is considered in this paper. The aim is to ensure fast and reliable broadcasting without interfering with upstream communications (from SNs to BS), whilst taking into account ...
  • One-Step Clustering Protocol for Periodic Traffic Wireless Sensor Networks 

    Nassima, Merabtine; Djamel, Djenouri; Zegour, Djamel-Eddine; Lamini, Elseddik; Rima, Bellal; Imene, Ghaoui; Nabila, Dahlal
    In : (IEEE, Newark, NJ, USA, 2017-04)
    A new centralized clustering protocol for periodic traffic wireless sensor networks is proposed in this paper. The proposed protocol uses one-step off-line cluster computation algorithm, where all the clustering schemes and their respective durations are calculated by the base station (BS) once at the network initialization. ...
  • A Concise Forwarding Information Base for Scalable and Fast Name Lookups 

    Yu, Ye; Belazzougui, Djamal; Qian, Chen; Zhang, Qin
    In : (IEEE, Toronto, Ontario, Canada, 2017-11-30)
    Forwarding information base (FIB) scalability and its lookup speed are fundamental problems of numerous net- work technologies that uses location-independent network names. In this paper we present a new network algorithm, Othello Hashing, and its application of a FIB design called Concise, which uses very little ...
  • Fast Label Extraction in the CDAWG 

    Belazzougui, Djamal; Cunial, Fabio
    In : (Springer, Palerme, Italie, 2017-09-06)
    The compact directed acyclic word graph (CDAWG) of a string T of length n takes space proportional just to the number e of right extensions of the maximal repeats of T, and it is thus an appealing index for highly repetitive datasets, like collections of genomes from similar species, in which e grows significantly more ...
  • Flexible Indexing of Repetitive Collections 

    Belazzougui, Djamal; Cunial, Fabio; Gagie, Travis; Prezza, Nicola; Raffinot, Mathieu
    In : (Springer, Turku, Finlande., 2017-06-07)
    Highly repetitive strings are increasingly being amassed by genome sequencing experiments, and by versioned archives of source code and webpages. We describe practical data structures that support count- ing and locating all the exact occurrences of a pattern in a repetitive text, by combining the run-length encoded ...
  • Representing the Suffix Tree with the CDAWG 

    Belazzougui, Djamal; Cunial, Fabio
    In : (Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Varsovie, 2017-07-04)
    Given a string T, it is known that its suffix tree can be represented using the compact directed acyclic word graph (CDAWG) with e_T arcs, taking overall O(e_T+e_REV(T)) words of space, where REV(T) is the reverse of T, and supporting some key operations in time between O(1) and O(log(log(n))) in the worst case. This ...
  • An Approach to Improve Business Process Models Reuse Using LinkedIn Social Network 

    Khider, Hadjer; benna, Amel; Meziane, Abdelkrim; Hammoudi, Slimane
    In : (Springer International Publishing AG 2017, Editors: Rocha, Á., Correia, A.M., Adeli, H., Reis, L.P., Costanzo, S. (Eds.), Porto Santo Island, Portugal, 2017-04)
    Business process (BP) modeling is an important stage in Business Process Management (BPM) lifecycle. However, modeling BP from scratch is fallible task, complex, time-consuming and error prone task. One of the promising solutions to these issues is the reuse of BP models. BP reusability during the BP modeling stage can ...
  • Binarization of document images with various object sizes 

    Hadjadj, Zineb; Meziane, Abdelkrim
    In : (IEEE, Nancy, France, 2017-04)
    There are a lot of document image binarization techniques that try to differentiate between foreground and background but many of them fail to correctly detect all the text pixels because of degradations. In this paper, a new binarization method for document images is presented. The proposed method is based on the most ...
  • Intégration de l’utilisateur dans un modèle de recherche sociale 

    Bessai Mechmache, Fatma Zohra; Hammouche, Karima; Alimazighi, Zaia
    In : (Al Hoceima, Maroc, 2017-05)
    Dans cet article nous proposons un nouveau modèle de recherche d’information sociale basé sur un ordonnancement conjoint des documents, des auteurs et des utilisateurs d’un réseau bibliographique dans un réseau hétérogène. Ce modèle enrichit la structure du réseau en introduisant l’utilisateur comme une entité du réseau ...
  • Les Manuscrits Arabes Anciens En Ligne : Pratiques et Recommandations 

    Habbak, Noureddine; Meziane, Abdelkrim
    In : (Al-Hoceima (Maroc), 2017-05-11)
    Les technologies de l’information ont révolutionné la bibliothèque classique. Aujourd’hui, de nombreuses bibliothèques passent au monde numérique. L’accès aux documents qui ont tendance à se détériorer rapidement et qui sont très demandés tels que les manuscrits arabes anciens devient de plus en plus simple, ce qui assure ...
  • Accelerated Search over Encrypted Cloud Data 

    Boucenna, Fateh; Nouali, Omar; Dabah, Adel; Kechid, Samir
    In : (IEEE, Jeju, Corée du sud, 2017-02-13)
    Companies and other organizations such as hospitals seek more and more to enjoy the benefits of cloud computingin terms of storage space and computing power. However, outsourced data must be encrypted in order to be protected againstpossible attacks. Therefore, traditional information retrieval systems (IRS) are no longer ...
  • A tracking approach for text line segmentation in handwritten documents 

    Setitra, Insaf; Hadjadj, Zineb; Meziane, Abdelkrim
    In : (Springer, Porto, Portugal, 2017-02-24)
    Tracking of objects in videos consists of giving a label to the same object moving in different frames. This labeling is performed by predicting position of the object given its set of features observed in previous frames. In this work, we apply the same rationale by considering each connected component in the manuscript ...
  • Edit Distance: Sketching, Streaming, and Document Exchange 

    Belazzougui, Djamal; Zhang, Qin
    In : (IEEE, New Brunswick, New Jersey, 2016-12-19)
    We show that in the document exchange problem, where Alice holds x ∈ {0, 1}^n and Bob holds y ∈ {0, 1}^n , Alice can send Bob a message of size O(K(log^2 K + log n)) bits such that Bob can recover x using the message and his input y if the edit distance between x and y is no more than K, and output “error” otherwise. ...
  • Fully Dynamic de Bruijn Graphs 

    Belazzougui, Djamal; Gagie, Travis; Mäkinen, Veli; Previtali, Marco
    In : (Springer International Publishing, Beppu, Japan, 2016-09-21)
    We present a space- and time-efficient fully dynamic implementation of de Bruijn graphs, which can also support fixed-length jumbled pattern matching.
  • Bidirectional Variable-Order de Bruijn Graphs 

    Belazzougui, Djamal; Gagie, Travis; Mäkinen, Veli; Previtali, Marco; Puglisi, Simon J.
    In : (Springer International Publishing, Ensenada, Mexico, 2016-03-22)
    Implementing de Bruijn graphs compactly is an important problem because of their role in genome assembly. There are currently two main approaches, one using Bloom filters and the other using a kind of Burrows-Wheeler Transform on the edge labels of the graph. The second representation is more elegant and can even handle ...
  • Lempel-Ziv Decoding in External Memory 

    Belazzougui, Djamal; Kärkkäinen, Juha; Kempa, Dominik; Puglisi, Simon J.
    In : (Springer International Publishing, St. Petersburg, Russia, 2016-06-01)
    Simple and fast decoding is one of the main advantages of LZ77-type text encoding used in many popular file compressors such as gzip and 7zip. With the recent introduction of external memory algorithms for Lempel–Ziv factorization there is a need for external memory LZ77 decoding but the standard algorithm makes random ...
  • An oscillation-based algorithm for reliable vehicle detection with magnetic sensors 

    Djenouri, Djamel; Doudou, Messaoud; Kafi, Mohamed Amine
    In : (IEEE, Hong Kong, 2016-04)
    Vehicle monitoring using a wireless sensor network is considered in this paper, where a new algorithm is proposed for vehicle detection with magnetic sensors. The proposed algorithm is based on processing the magnetic signal and thoroughly analyzing the number/direction of its oscillations. The main feature of the proposed ...
  • Instantaneous Proxy-Based Key Update for CP-ABE 

    Touati, Lyes; Challal, Yacine
    In : (IEEE, Dubai, 2016-11-07)
    Attribute Based Encryption (ABE) scheme has been proposed to implement cryptographic fine grained access control to shared information. It allows to achieve information sharing of type one-to-many users, without considering the number of users and their identities. However, original ABE systems suffer from the ...
  • Collaborative KP-ABE for Cloud-Based Internet of Things Applications 

    Touati, Lyes; Challal, Yacine
    In : (IEEE, Kuala Lampur, Malaysia, 2016-05-23)
    KP-ABE mechanism emerges as one of the most suitable security protocol for asymmetric encryption. It has been widely used to implement access control solutions. However, due to its expensive overhead, it is difficult to consider this protocol in resource-limited networks, such as the IoT. As the cloud has become a ...
  • A review on Privacy and Anonymity in electronic communications 

    Benmeziane, Souad; Badache, Nadjib
    In : (Conference Procedings, Merida Spain, 2006-10-25)
    Current Internet networking protocols provide no support to ensure the privacy of communication endpoints. An adversary can determine which addresses have asked for which services. Anonymity is now increasingly important for networked applications. This paper overviews the concept of anonymity in electronic communications, ...

View more