IEEE CIST'12 Accepted Papers

  • Omar El Beggar, Brahim Bousetta and Taoufiq Gadi. Generating methods signatures from transition state diagram : A model transformation approach
  • Fatima-Zahra Ammor, Driss Bouzidi and Amina Elomri. An Automatic and Customized Support Based on Artificial Ants
  • Mina Elmaallam and Abdelaziz Kriouile. Model ISR3M for assessing maturity of IS risk management process Case study
  • Lamya El Alamy, Sara Lhaddad, Soukaina Maalal, Yasmine Taybi and Yassine Salih-Alj. Bus Identification System For Visually Impaired Person
  • Rhita Snoussi, Mariam Kaddouri, El Bachir Lmalki and Yassine Salih Alj. The Wireless Wrist Bracelet Heart Attack System
  • Abdelghani Belakir, Mustapha Amghar and Nadia Elkouhen. An indoor positionning system based on the fusion of location information
  • Khalid Benlhachmi and Mohammed Benattou. A Formal Model of Similarity Testing for Inheritance in Object-Oriented Software
  • Adil Elrharbali, Manal Hasri, Hamza Bousfiha and Yassine Salih Alj. Smart Cruise Control System with Stop&Go and Predictive Road Mapping
  • Asmaa Mountassir, Houda Benbrahim and Ilham Berrada. Some methods to address the problem of Unbalanced Sentiment Classification in an Arabic context
  • Ibtissam Elhassani, Youssef Benghabrit and Abdelaziz Kriouile. Measure of Fuzzy Presence of Descriptors on Arabic Text Mining
  • Rachid Belmeskine, Ahlame Begdouri and Dominique Leclet. Community Computer Environment supports a COP, CBR approach to solve difficulties
  • Abdelhamid Zouhair, El Mokhtar En-Naimi, Benaissa Amami, Hadhoum Boukachour, Patrick Person and Cyrille Bertelle. Multi-Agents Dynamic Case Based Reasoning & Inverse Longest Common Sub-Sequence And Individualized Follow-up of Learners in CEHL
  • Rachid Dehbi, Mohamed Talea and Abderrahim Tragha. The modeling elements of LMSGENERATOR business repository
  • Mohamed Elboukhari, Mostafa Azizi and Abdelmalek Azizi. Intrusion Detection Systems in Mobile Ad Hoc Networks: A Survey
  • Nasser Assem, Tajjeeddine Rachidi and Mohammed Taha El Graini. Host Intrusion Detection For Long Stealthy System Call Sequences
  • Ahmed Musa, Yahaya Yusuf and Matthias Meckel. A HOSPITAL RESOURCE AND PATIENT MANAGEMENT SYSTEM BASED ON REALTIME DATA CAPTURE AND INTELLIGENT DECISION MAKING

 

IEEE CIST'12 Accepted Papers as Poster communication

  • M'Hamed Rahmouni and Samir Mbarki. Model-Driven Generation: From MVC 2 Web Model to E-Commerce Web Applications
  • Hanae Sbai, Mounia Fredj and Laila Kjiri. A process pattern for managing evolution of configurable reference process model 
  • Anas Bouayad, Asmae Blilat, Nour El Houda Mejhed and Mohammed El Ghazi. Cloud Computing : security challenges
  • Mohammed Zakariae El Bastami and Kevin Smith. High Performance Computing Cluster Setup: Al Akhawayn University Case Study
  • Mehdi Nassih, Ilham Cherradi, Youssef Maghous, Badr Ouriaghli and Yassine Salih-Alj. Obstacles Recognition System for the Blind People Using RFID
  • Enaanai Adil and Sdigui Doukkali Aziz. Refining the Arabic information research by using of the text context and the user profile