International Conference Papers
Permanent URI for this collection
Browse
Browsing International Conference Papers by Title
Now showing 1 - 20 of 226
Results Per Page
Sort Options
- ItemA causal multicast protocol for dynamic groups in cellular networks(ACM, 2008-09-10) Benzaid, Chafika; Badache, NadjibGroup communication is an abstraction which deals with multicasting a message from a source process to a group of processes. In Group Communication Systems (GCS), causal message ordering is an essential tool to ensure interaction among group members in a consistent way. In this paper, we propose a simple and optimal causal multicast protocol which copes with the dynamically changing groups in mobile environments. The protocol presents an optimal communication overhead without causing inhibition effect in the delivery of messages. The group membership management depends on a simple, yet powerful idea. This original idea consists in considering the join and leave requests as data messages, and then will be ordered with other messages. This makes no need to a coordination phase in the installation of a new view. Our protocol requires minimal resources on mobile hosts and wireless links and scales well with large groups.
- ItemA clustering technique to analyse anonymous users.(CPS, 2014-08-09) Benmeziane, Souad; Badache, NadjibConcerns about privacy and anonymity have gained more and more attention in conjunction with the rapid growth of the Internet as a means of communication and information dissemination. A number of anonymous communication systems have been developed to protect the identity of communication participants. Nevertheless, it is important to provide ways to evaluate and measure the level of anonymity provided. We introduce in this paper the use of hierarchical clustering technique to analyse anonymous systems. We propose a new measure to evaluate anonymous systems by introducing the concept of dominant cluster. We further show that using this measure will overcome the limitations of other existing measures.
- ItemA Communication model of distributed information sources bacteria colonies inspired(IEEE, 2006) Mellah, Hakima; Hassas, Salima; Drias, HabibaThe implementation of communication organizational strategies constitutes an essential performance factor. Nowadays, the organization becomes companies competitiveness element (organizational structures), networks, knowledge and competences management, and cooperation. This, to be better reactive to ensure the competing character, to support better new information technologies, concerning the data exchange inside as outside an organization. The information systems specification gives a partial description of the organization, which integrated with other descriptions is regarded as being the organization model. Using the abstraction level of an information system (information source) was proven to be not sufficient to face the conflicts confronted by the organizations. These conflicts are the improvement and the change with an aim of adapting constantly to the environment new requirements. These latter are essential to support the dynamic character which tends to characterize the current organizations and which is often nature taken. In order to implement this dynamism, we took as a starting point the biological sciences and more particularly the bacteria colonies. This paper presents a correspondence model between a communication system of distributed information sources and a bacteria colony
- ItemA Concise Forwarding Information Base for Scalable and Fast Name Lookups(IEEE, 2017-11-30) Yu, Ye; Belazzougui, Djamal; Qian, Chen; Zhang, QinForwarding information base (FIB) scalability and its lookup speed are fundamental problems of numerous net- work technologies that uses location-independent network names. In this paper we present a new network algorithm, Othello Hashing, and its application of a FIB design called Concise, which uses very little memory to support ultra-fast lookups of network names. Othello Hashing and Concise make use of minimal perfect hashing and relies on the programmable network framework to support dynamic updates. Our conceptual contribution of Concise is to optimize the memory efficiency and query speed in the data plane and move the relatively complex construction and update components to the resource- rich control plane. We implemented Concise on three platforms. Experimental results show that Concise uses significantly smaller memory to achieve much faster query speed compared to existing solutions of network name lookups.
- ItemA flexible distance for the spatial placement in a multimedia document(Institute of Electrical and Electronics Engineers ( IEEE ), 2008-04-07) Maredj, Azze-Eddine; Tonkin, Nourredine; Sadallah, Madjid; Alimazighi, ZaiaIn the multimedia documents authoring systems the management of spatial and temporal inter-objects relations is the most delicate task. Spatial relations management refers to the appropriate means to express relations between the document objects and guarantee their consistency. Usually it is represented by spatial model which performances depend on its expressivity degree, on its positioning precision and on the ability to express a desired overlap. One of the most important factor that affects performnaces is the distance associated to the relations. To enhance the expressivity and precision degrees and to allow the specification of desired overlap, we introduce, in this paper, the flexible distance concept.
- ItemA framework for Object Classification in Fareld Videos(Springer, 2014-12) Setitra, Insaf; Larabi, SlimaneObject classification in videos is an important step in many applications such as abnormal event detection in video surveillance, traf- fic analysis is urban scenes and behavior control in crowded locations. In this work, propose a framework for moving object classification in farfield videos. Much works have been dedicated to accomplish this task. We overview existing works and combine several techniques to implement a real time object classifier with offline training phase. We follow three main steps to classify objects in steady background videos : background subtraction, object tracking and classification. We measure accuracy of our classifier by experiments done using the PETS 2009 dataset.
- ItemA Framework for Usage-based Document Reengineering(ACM New York, NY, USA, 2013-09) Sadallah, Madjid; Encelle, Benoît; Maredj, Azze-Eddine; Prié, YannickThis ongoing work investigates usage-based document reengineering as a means to support authors in modifying their documents. Document usages (i.e. usage feedbacks) cover readers' explicit annotations and their reading traces. We first describe a conceptual framework with various levels of assistance for document reengineering: indications on reading, problem detection, reconception suggestions and automatic reconception propositions, taking our example in e-learning document management. We then present a technical framework for usage-based document reengineering and its associated models for documents, annotations and traces representation.
- ItemA generic formal model for fission of modalities in output multi-modal interactive systems(2009) Mohand Oussaïd, Linda; Ait Ameur, Yamine; Ahmed-Nacer, MohamedOutput multi-modal human-machine interfaces combine semantically output medias and modalities in order to increase interaction machine capabilities. The aim of this paper is to present a formal model supporting formal specifications of output multi-modal interactive systems. As a consequence, the expected usability and robustness properties can be expressed and checked. This paper proposes a generic model which permits to specify the output multimodal interfaces following the CASE design space.
- ItemA genetic algorithm feature selection based approach for Arabic Sentiment Classification(IEEE Computer Society, 2016-11-29) Aliane, Hassina; Aliane, A.A; Ziane, M.; Bensaou, N.With the recently increasing interest for opinion mining from different research communities, there is an evolving body of work on Arabic Sentiment Analysis. There are few available polarity annotated datasets for this language, so most existing works use these datasets to test the best known supervised algorithms for their objectives. Naïve Bayes and SVM are the best reported algorithms in the Arabic sentiment analysis literature. The work described in this paper shows that using a genetic algorithm to select features and enhancing the quality of the training dataset improve significantly the accuracy of the learning algorithm. We use the LABR dataset of book reviews and compare our results with LABR’s authors’ results.
- ItemA Graph Approach for Enhancing Process Models Matchmaking(IEEE, 2015-06-27) Belhoul, Yacine; Yahiaoui, Saïd; Haddad, Mohammed; Gater, Ahmed; Kheddouci, Hamamache; Bouzeghoub, MokraneRecent attempts have been done to measure similarity of process models based on graph matching. This problem is known to be difficult and its computational complexity is exponential. Thus, heuristics should be proposed to obtain approximations. Spectral graph matching methods, in particular eigenvalue-based projections, are know to be fast but they lost some quality in the obtained matchmaking. In this paper, we propose a graph approach for the problem of inexact matching of process models. Our approach combines a spectral graph matching method and a string comparator based algorithm in order to improve the quality of process models matchmaking. The proposed method performs the matchmaking at both structural and semantic levels. Experimentation is provided to show the performance of our method to rank a collection of process models according to a particular user query, compared to previous work.
- ItemA new graph coloring and Fibonacci number(2012-11-26) Harik, Hakim; Belbachir, HacèneIn this paper, we introduce a new notion of a graph coloring. This notion will be used to prouve some identities involving Fibonacci number.
- ItemA New Low Cost Sessions-Based Misbehaviour Detection Protocol (SMDP) for MANE(IEEE Computer Society, 2007-05) Djenouri, Djamel; Fahad, Tarek; Askwith, Robert; Merabti, MadjidThere is a strong motivation for a node to deny packet forwarding to others and being selfish in MANET. Recently, some solutions have been proposed, but almost all of these solutions rely on the watchdog technique, which suffers from many drawbacks, particularly when using the power control technique. To overcome this problem with a moderate communication overhead, this paper introduces a new approach for detecting misbehaving nodes that drop data packets in MANET. It consists of two stages: (i) the monitoring stage in which each node monitors its direct neighbours with respect to forwarding data packets of a traffic session in the network, and (ii) the decision stage, in which direct neighbouring nodes decide whether the monitored node misbehaves or not. Our new approach is able to detect the misbehaviour in case of power control employment, with a low communication overhead compared to the existing approaches.
- ItemA Novel Approach for Selfish Nodes Detection in MANETs: Proposal and Petri Nets Based Modeling(IEEE, 2005-06) Djenouri, Djamel; Badache, NadjibThe resource limitation of nodes used in selforganized ad hoc networks, along with the multi-hop nature of these networks, may cause a new behavioral phenomena which does not exist in traditional infrastructured environments. To save its energy, a node may behave sel shly, then it would not forward packets for other nodes while using their resources to forward its own packets. This deviation from the normal behavior is a potential threat against the service availability, one of the most important security requirements. Resolving this problem is challenging, due to the self-organization and the infrastructureless features of these networks. Recently, some solutions have been proposed, but almost all these solutions rely on the watchdog technique [1], which suffers from many problems. Especially when using the power control technique, employed by some new poweraware routing protocols following the watchdog's proposal. To overcome this problem, we propose in this paper a new approach we call two hops ACK (acknowledgment). Using petri nets we model and analyze our solution based on this novel approach.
- ItemA Novel transport protocol for wireless mesh networks(Journal of Networking Technology, 2011-04-10) Kafi, Mohamed Amine; Tandjaoui, DjamelThroughput is the main concern in Wireless Mesh Networks (WMNs). The standard congestion control mechanism of TCP[7] is not able to handle the special properties of a shared wireless multi-hop channel well. Given that the unreliable wireless links and congestion are likely to be the source of throughput degradation in the network, reliable transport protocol conception dealing with wireless links properties can significantly improve the performance of such networks. This paper presents a novel transport protocol called MTCP, which covers these needs. Simulation results show that MTCP outperform TCP and its ad-hoc wireless variants in terms of reliability and congestion control.
- ItemA Parallel P2P Branch-and-Bound Algorithm for Computational Grids(2007-05-14) Bendjoudi, Ahcène; Melab, Nouredine; Talbi, El-GhazaliSolving exactly Combinatorial Optimization Problems (COPs) using a Branch-and-Bound algorithm requires a huge amount of computational resources. The efficiency of such algorithm can be improved by distributing at large scale the computation required by the exploration of the search tree. In this paper, we propose ParallelBB, which is a P2P-based parallelization of the Branch-and-Bound algorithm for the computational Grid. The algorithm has been implemented using the ProActive distributed object Grid middleware. The algorithm has been applied to a mono- criterion permutation flow-shop problem and promisingly experimented on the Grid5000 computational Grid.
- ItemA policy-based context-aware approach for the commitment of mobile transactions(ACM, 2008) Nouali-Taboudjemat, Nadia; Drias, HabibaThe transaction paradigm ensures consistency in the presence of concurrent accesses to shared data and in the presence of failures. Traditionally, the transaction semantics is defined by the ACID properties (Atomicity, Consistency, Isolation and Durability) which implementation is through such mechanisms as commitment protocols ensuring Atomicity and concurrency control protocols ensuring Isolation. Many transactional models were developed to support the diverse and variable applications needs, and more recently to overcome the constraints induced by the evolution of distributed systems environments toward wireless and mobile. Indeed, the latter are characterized by limitations in computing resources, communications and energy as well as dynamic variations in terms of resource availability and configuration. In this paper, our contribution is mainly focused on the problem of atomic commitment. We adopted an approach based on the context-aware adaptation for the management of mobile transactions. We therefore present the commit protocol aTCP (Adaptable Transaction Commit Protocol) which allows for adaptation to the requirements of applications and mobile context in terms of transactional properties and execution cost. For the implementation of aTCP we offer a context-aware architecture based on policies.
- ItemA review on Privacy and Anonymity in electronic communications(Conference Procedings, 2006-10-25) Benmeziane, Souad; Badache, NadjibCurrent Internet networking protocols provide no support to ensure the privacy of communication endpoints. An adversary can determine which addresses have asked for which services. Anonymity is now increasingly important for networked applications. This paper overviews the concept of anonymity in electronic communications, vectors for a privacy invasion, and proposed solutions. Solutions are examined from the perspective of attacks which can be reasonably expected against these systems. Particular attention is paid to mobile agents systems and how to hide the itinerary of the agent.
- ItemA simple approach to distinguish between Maghrebi and Persian calligraphy in old manuscripts(IAPR, 2014-04-07) Setitra, Insaf; Meziane, AbdelkrimManual annotation of images is usually a mandatory task in many applications where no knowledge about the image is available. In presence of huge number of images, this task becomes very tedious and prone to human errors. In this paper, we contribute in automatic annotation of Arabic old manuscripts by discovering manuscript calligraphy. Arabic manuscripts count a very large number of Persian and Maghrebi writing especially in Noth Africa. Distinguishing between these two calligraphies allow better classifying them and so annotating them. We use background constructing followed by extraction of simple features to classify Arabic manuscript calligraphies using a Quadratic Bayes classifier.
- ItemA spatial model for editing multimedia documents(2010-10-18) Maredj, Azze-Eddine; Tonkin, Nourredine; Sadallah, MadjidDans le domaine de l’édition et de documents multimédia, la gestion du placement spatial des objets constitue un des points le plus délicats dans la conception de documents. Il s'agit de pouvoir exprimer les relations spatiales entre les objets et de garantir leur cohérence. Cette gestion est représentée par un modèle dont les performances se mesurent par sa puissance d’expressivité, sa précision de placement et par la spécification du recouvrement désiré. Un des éléments déterminant dans les performances d’un modèle spatial est la distance associée aux relations. Dans cet article, nous présentons une nouvelle définition de la distance qui donne un grand degré d’expressivité et de précision aux relations et permet la spécification du recouvrement désiré dans un document multimédia.
- ItemA study of Wireless Sensor Network Architectures and Projects for Traffic Light Monitoring(Elsevier, 2012-08-27) Kafi, Mohamed Amine; Challal, Yacine; Djenouri, Djamel; Bouabdallah, Abdelmadjid; Badache, NadjibVehicular traffic is increasing around the world, especially in urban areas. This increase results in a huge traffic congestion, which has dramatic consequences on economy, human health, and environment. Traditional methods used for traffic management, surveillance and control become inefficient in terms of performance, cost, maintenance, and support, with the increased traffic. Wireless Sensor Networks (WSN) is an emergent technology with an effective potential to overcome these difficulties, and will have a great added value to intelligent transportation systems (ITS) overall. In this survey, we review traffic light projects and solutions. We discuss their architectural and engineering challenges, and shed some light on the future trends as well.