{"title":"A Multi-agents Intrusion Detection System Using Ontology and Clustering Techniques","authors":"Imen Brahmi, H. Brahmi, S. Yahia","doi":"10.1007/978-3-319-19578-0_31","DOIUrl":"https://doi.org/10.1007/978-3-319-19578-0_31","url":null,"abstract":"","PeriodicalId":159127,"journal":{"name":"Conférence Internationale sur l'Informatique et ses Applications","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121171409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Approach to Integrating Aspects in Agile Development","authors":"Houda Tadjer, D. Meslati","doi":"10.1007/978-3-319-19578-0_48","DOIUrl":"https://doi.org/10.1007/978-3-319-19578-0_48","url":null,"abstract":"","PeriodicalId":159127,"journal":{"name":"Conférence Internationale sur l'Informatique et ses Applications","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116506707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Arabic Texts Categorization: Features Selection Based on the Extraction of Words' Roots","authors":"Said Gadri, A. Moussaoui","doi":"10.1007/978-3-319-19578-0_14","DOIUrl":"https://doi.org/10.1007/978-3-319-19578-0_14","url":null,"abstract":"","PeriodicalId":159127,"journal":{"name":"Conférence Internationale sur l'Informatique et ses Applications","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134204528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohamed Seghir Hadj Ameur, Youcef Moulahoum, A. Guessoum
{"title":"Restoration of Arabic Diacritics Using a Multilevel Statistical Model","authors":"Mohamed Seghir Hadj Ameur, Youcef Moulahoum, A. Guessoum","doi":"10.1007/978-3-319-19578-0_15","DOIUrl":"https://doi.org/10.1007/978-3-319-19578-0_15","url":null,"abstract":"","PeriodicalId":159127,"journal":{"name":"Conférence Internationale sur l'Informatique et ses Applications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134599401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a Recommendation System for the Learner from a Semantic Model of Knowledge in a Collaborative Environment","authors":"Chahrazed Mediani, Marie-Hélène Abel, M. Djoudi","doi":"10.1007/978-3-319-19578-0_26","DOIUrl":"https://doi.org/10.1007/978-3-319-19578-0_26","url":null,"abstract":"","PeriodicalId":159127,"journal":{"name":"Conférence Internationale sur l'Informatique et ses Applications","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132933035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Real-Time PE-Malware Detection System Based on CHI-Square Test and PE-File Features","authors":"Mohamed Belaoued, S. Mazouzi","doi":"10.1007/978-3-319-19578-0_34","DOIUrl":"https://doi.org/10.1007/978-3-319-19578-0_34","url":null,"abstract":"","PeriodicalId":159127,"journal":{"name":"Conférence Internationale sur l'Informatique et ses Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133889870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amine Boudia, R. M. Hamou, Abdelmalek Amine, M. Rahmani, Amine Rahmani
{"title":"A New Multi-layered Approach for Automatic Text Summaries Mono-Document Based on Social Spiders","authors":"Amine Boudia, R. M. Hamou, Abdelmalek Amine, M. Rahmani, Amine Rahmani","doi":"10.1007/978-3-319-19578-0_16","DOIUrl":"https://doi.org/10.1007/978-3-319-19578-0_16","url":null,"abstract":"","PeriodicalId":159127,"journal":{"name":"Conférence Internationale sur l'Informatique et ses Applications","volume":"261 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116174675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Supporting Legal Requirements in the Design of Public Processes","authors":"A. Cherouana, L. Mahdaoui","doi":"10.1007/978-3-319-19578-0_19","DOIUrl":"https://doi.org/10.1007/978-3-319-19578-0_19","url":null,"abstract":"","PeriodicalId":159127,"journal":{"name":"Conférence Internationale sur l'Informatique et ses Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126044921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Region-Edge Cooperation for Image Segmentation Using Game Theory","authors":"Omar Boudraa, K. Benatchba","doi":"10.1007/978-3-319-19578-0_42","DOIUrl":"https://doi.org/10.1007/978-3-319-19578-0_42","url":null,"abstract":"","PeriodicalId":159127,"journal":{"name":"Conférence Internationale sur l'Informatique et ses Applications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130260496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid Approach for Metamodel and Model Co-evolution","authors":"F. Anguel, A. Amirat, N. Bounour","doi":"10.1007/978-3-319-19578-0_46","DOIUrl":"https://doi.org/10.1007/978-3-319-19578-0_46","url":null,"abstract":"","PeriodicalId":159127,"journal":{"name":"Conférence Internationale sur l'Informatique et ses Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129174392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}