Articles publiés par les enseignants de l'ESEN.
1. Abdellatif Jouini & Hatem BIBI. WAVELETS (to appear). Narosa Publisher & Oxford UNiversity Press. 2023
2. Rim Jallouli, Mohamed Anis Bach Tobji, Hamid Mcheick, Gunnar Pih. Digital Economy. Emerging Technologies and Business Innovation - 6th International Conference on Digital Economy, ICDEc 2021, Tallinn, Estonia, July 15-17, 2021, Proceedings. Springer. 2021
3. Mohamed Anis Bach Tobji, Rim Jallouli, Ahmed Samet, Mourad Touzani, Vasile Alecsandru Strat, Paul Pocatil. Digital Economy. Emerging Technologies and Business Innovation - 5th International Conference on Digital Economy, ICDEc 2020, Bucharest, Romania, June 11-13, 2020, Proceedings. Springer. 2020
4. Rim Jallouli, Mohamed Anis Bach Tobji, Deny Bélisle, Sehl Mellouli, Farid Abdallah, Ibrahim Osma. Digital Economy. Emerging Technologies and Business Innovation - 4th International Conference, ICDEc 2019, Beirut, Lebanon, April 15-18, 2019, Proceedings. Springer. 2019
5. Bach Tobji, M.A., Jallouli, R., Koubaa, Y., Nijholt, A. Digital Economy. Emerging Technologies and Business Innovation - Third International Conference, ICDEc 2018, Brest, France, May 3-5, 2018, Proceedings. Springer. 2018
6. Mohamed Anis Bach Tobji, Rim Jallouli, Yamen Koubaa, Anton Nijhol. Digital Economy. Emerging Technologies and Business Innovation - Third International Conference, ICDEc 2018, Brest, France, May 3-5, 2018, Proceedings. Springer. 2018
7. Jallouli, R., Zaïane, O.R., Tobji, M.A.B., Tabbane, R.S., Nijholt, A. Digital Economy. Emerging Technologies and Business Innovation - Second International Conference, ICDEc 2017, Sidi Bou Said, Tunisia, May 4-6, 2017, Proceedings. Springer. 2017
8. Rim Jallouli, Osmar R. Zaïane, Mohamed Anis Bach Tobji, Rym Srarfi Tabbane, Anton Nijhol. Digital Economy. Emerging Technologies and Business Innovation - Second International Conference, ICDEc 2017, Sidi Bou Said, Tunisia, May 4-6, 2017, Proceedings. Springer. 2017
9. Maher Helaoui. Informatique Théorique: Cours et Exercices Corrigés. Editions universitaires européennes. 2016
10. Jallouli, R., Nasraoui, O., Tobji, M.A.B., Tabbane, R.S., Rhouma, R. International Conference on Digital Economy, ICDEc 2016, Carthage, Tunisia, April 28-30, 2016. IEEE. 2016
11. Jallouli, R., Nasraoui, O., Bach Tobji, M-A., Tabbane, R., Rhouma, R.. Proceedings of the International Conference on Digital Economy, ICDEc 2016. IEEE. 2016
12. El Ouakdi. J. Le système d’incitation basé sur la valeur économique ajoutée: Analyses empiriques. Editions Universitaires Européennes. 2016
13. Yassine SLAMA. Expatriés et cadres locaux dans le cadre de l'internationalisation des entreprises. Centre de Publication Universitaire. 2014
14. R. Rhouma. Analyse et conception des cryptsystèmes à base de chaos. Presses Académiques Francophones. ISBN : 978-3-8416-2148-1. 2013
15. R. Rhouma. Contributions à la sécurisation de l'information par chaos. Editions universitaires europeennes. ISBN : 978-613-1-59291-1. 2011
1. Maha, N., Ghaith, M., Ouajdi, K. Gene selection for microarray data classification based on mutual information and binary whale optimization algorithm. Handbook of Whale Optimization Algorithm. . Pages 523--531, 2024
2. El Ouakdi. J., Guermazi. D., Alimi. K. Innovation, Banking Development and Governance. Actes de la Conférence Internationale avec comité de lecture, ICDEc 2018 (International Conference of Digital Economy). Springer. Pages 79-94, 2018
3. Abidi, A., Bach Tobji, M.A, Hadjali, A., Ben Yaghlane, B. Statistical Methods for Use in Analysis of Trust-Skyline Sets.. Enterprise Information Systems. Springer. Pages 413-427, 2017
4. Mouhamed Gaith Ayadi, Riadh Bouslimi, Jalel Akaichi, Hana Hedhl. Automatic Medical Image Multilingual Indexation Through a Medical Social Network.. Prediction and Inference from Social Networks and Social Media. . Pages 19-49, 2017
5. Ikbal Chammakhi Msadaa,Amine Dhraief. Chapter I- Internet of Things in Support of Public Safety Networks : Opportunities and Challenges. Wireless Public Safety Networks, Volume Two : A Systematic Approach, ISBN 9781785480522. Elsevier. Pages 1-20, 2016
6. Abassi, Y.,Ghazel, C.,Saidane, L.. Autonomous intercloud reference architecture driven by interoperability. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). . Pages , 2016
7. Yassine SLAMA et Nathalie MONTARGOT. Regards croisés de cadres expatriés et locaux de filiales multinationales en Tunisie sur la pertinence de recourir à l’expatriation. Ambivalences. LARIME- ESSEC de Tunis. Pages 65-72, 2015
8. Rym Srarfi Tabbane and Mohsen Debabi. Electronic Word-of-Mouth: Definitions and Concepts. Capturing, Analyzing, and Managing Word-of-Mouth in the Digital Marketplace. IGI Global. Pages 1-27, 2015
9. Ben N'Cir Chiheb-Eddine , Guillaume Cleuziou , Essoussi Nadia. Overview of partitional overlapping clustering methods.. Partitional Clustering Algorithm (PCA). Springer. Pages 245-275, 2015
10. Zhang, T.J.,Manhrawy, I.M.,Abdo, A.A.,El-Latif, A.A.A.,Rhouma, R.. Cryptanalysis of elementary cellular automata based image encryption. Advanced Materials Research. . Pages , 2014
11. Amine Dhraief, Imen Mahjri, and Abdelfettah Belghith. Chapter VII- A Performance Evaluation of the Coverage Configuration Protocol and Its Applicability to Precision Agriculture. Multidisciplinary Perspectives on Telecommunications, Wireless Systems, and Mobile Computing, ISBN 1466647159. IGI Global. Pages 107–122, 2014
12. Chebbah, M., Kharoune, M., Martin, A., Yaghlane, B.B. Considérant la dépendance dans la théorie des fonctions de croyance.. Fouille de données complexes. . Pages 43-64, 2014
13. Rhouma, R.,Belghith, S.. Chaos-based cryptosystem in different modes of block encryption. Cryptography: Protocols, Design and Applications. . Pages , 2012
14. Chebbah, M., Martin, A., Yaghlane, B.B. Estimation de la fiabilité des sources des bases de données évidentielles.. Fouille de données complexes. . Pages 193-210, 2011
15. Jallouli, R. et Lassouad A.. Les indicateurs de performance dans le secteur de l’art ,. Approches Tunisiennes en Gestion: Entrepreneuriat et Investissement Culturel,s. Université de Paris I Panthéon Sorbonne/ CNR, Collection l’impensé du temp. Pages -, 2010
16. Jallouli R., Zghal M and Orsoni J.. Marketing et art, Est ce le grand écart?. Nouvelles approches en culture et développement,. Université de Paris I Panthéon Sorbonne/ CNR, Collection l’impensé du temps. Pages -, 2008
17. • El Ouakdi. J., Saint-Pierre. J. Le système d’incitation basé sur la valeur économique ajoutée, la prise de décisions financières et la gouvernance. Actes du Congrès avec comité de lecture, ASAC 2007 (Administrative Sciences Association of Canada). ASAC 2007. Pages 69-88, 2007
1. Chiheb, J., Ghaith, M., Amit, C., Houssem, M., Ouajdi, K. Mutated Aquila Optimizer for assisting brain tumor segmentation. Biomedical Signal Processing and Control. Vol. 88, Issue , Pages 105089, 2024
2. Maha, N., Ghaith, M., Amit, C., Seyedali, M., Ouajdi, K. Gene selection for high dimensional biological datasets using hybrid island binary artificial bee colony with chaos game optimization. Artificial Intelligence Review. Vol. 57, Issue , Pages 1--74, 2024
3. Aymen, Z.M., Ghaith, M., Amit, C., Elyes, F., Abdelkader, M. FPGA-based hardware implementation of chaotic opposition-based arithmetic optimization algorithm. Applied Soft Computing. Vol. , Issue , Pages 111352, 2024
4. Salma Yacoubi, Ghaith Manita, Amit Chhabra, Ouajdi Korbaa. A Metaheuristic Perspective on Extracting Numeric Association Rules: Current Works, Applications, and Recommendations. Archives of Computational Methods in Engineering. Vol. 1, Issue 1, Pages 1-42, 2024
5. Raja Oueslati, Gaith Manita, Amit Chhabra, Ouajdi Korbaa. Chaos Game Optimization: A comprehensive study of its variants, applications, and future directions. Computer Science Review. Vol. 1, Issue 1, Pages 1-21, 2024
6. Brik. H., El Ouakdi. J.. Interplay of Volatility and Geopolitical Tensions in Clean Energy Markets: A Comprehensive GARCH-LSTM Forecasting Approach.. International Journal of Energy Economics and Policy. Vol. 14, Issue 4, Pages 92-107, 2024
7. Leila Bouchrit, Sajeh Zairi, Ikbal C. Msadaa, Amine Dhraief. Enhancing road safety: UAV-enabled warning message dissemination in urban and rural environments for VANETS. International Journal of Communication Networks and Distributed Systems (2023 Impact Factor: 1 (ranked 197/249 in COMPUTER SCIENCE, INFORMATION SYSTEMS , Q4 )). Vol. pp, Issue pp, Pages pp, 2024
8. Asma Hamissi and Amine Dhraief. A Survey On The Unmanned Aircraft System Traffic Management. ACM Comput. Surv. ; https://doi.org/10.1145/3617992; (2023 Impact Factor: 23.8 (ranked 1/143 in Computer Science Theory & Methods, Q1)). Vol. 56, Issue 3, Pages 1-37, 2023
9. Salma, Y., Ghaith, M., Hamida, A., Seyedali, M., Ouajdi, K. A modified multi-objective slime mould algorithm with orthogonal learning for numerical association rules mining. Neural Computing and Applications. Vol. 35, Issue , Pages 6125--6151, 2023
10. Salma, Y., Ghaith, M., Amit, C., Ouajdi, K., Seyedali, M. A multi-objective chaos game optimization algorithm based on decomposition and random learning mechanisms for numerical optimization. Applied Soft Computing. Vol. , Issue , Pages 110525, 2023
11. Aymen, Z., Ghaith, M., Elyes, F., Abdelkader, M. Hardware implementation of particle swarm optimization with chaotic fractional-order. Neural Computing and Applications. Vol. , Issue , Pages 1--20, 2023
12. Maha, N., Ghaith, M., Ouajdi, K. Advances in nature-inspired metaheuristic optimization for feature selection problem: A comprehensive survey. Computer Science Review. Vol. 49, Issue , Pages 100559, 2023
13. Maha, N., Ghaith, M., Francis, F., Ouajdi, K., Elyes, L. African vultures optimization algorithm based Choquet fuzzy integral for global optimization and engineering design problems. Artificial Intelligence Review. Vol. , Issue , Pages 1--67, 2023
14. Abdellatif Jouini and Hatem Bibi. WAVELETS ON A GENERAL BOUNDED DOMAIN. IJMSOR. Vol. 3, Issue 2, Pages 221-234, 2023
15. Brik. H., El Ouakdi. J., Ftiti. Z.. Revisiting the Contagion Effect in International Stock Markets: An Approach Based on Endogenous Crises. Recherches en Sciences de Gestion. Vol. 159, Issue ., Pages 41-69, 2023
16. Ikbal Chammakhi Msadaa; Sajeh Zairi; Amine Dhraief. Non-Terrestrial Networks in a Nutshell. IEEE Internet of Things Magazine. Vol. 5, Issue 2, Pages 168-174, 2022
17. Mouhamed Gaith Ayadi, Riadh Bouslimi, Jalel Akaich. Medical social networks content mining for a semantic annotation.. Soc. Netw. Anal. Min.. Vol. 12, Issue 1, Pages 17, 2022
18. Mouhamed Gaith Ayadi, Riadh Bouslimi, Jalel Akaich. Towards a standard modeling of social health care practice.. Soc. Netw. Anal. Min.. Vol. 12, Issue 1, Pages 95, 2022
19. Brik. H., El Ouakdi. J., Ftiti. Z. Roles of stable versus nonstable cryptocurrencies in Bitcoin market dynamics. Research in International Business and Finance. Vol. 62, Issue 101720, Pages ., 2022
20. El Ouakdi. J., Ftiti. Z., Guermazi. D., Alimi. K., Louhichi. W. Banking development and corporate innovation. Bankers, Markets and Investors. Vol. 170, Issue ., Pages ., 2022
21. Bouchmel. I., El Ouakdi. J., Ftiti. Z., Louhichi. W. Omri. A. The mediating effect of corporate innovation on the relationship between gender diversity and firm performance. Management International. Vol. 26, Issue 1, Pages 102-122, 2022
22. Wajdi, O.M., Ghaith, M., Ouajdi, K. Automatic Data Clustering Using Hybrid Chaos Game Optimization with Particle Swarm Optimization Algorithm.. Procedia Computer Science. Vol. 207, Issue , Pages 2677--2687, 2022
23. Salma, Y., Ghaith, M., Ouajdi, K. A Multiobjective Crystal Optimization-based association rule mining enhanced with TOPSIS for predictive maintenance analysis. Procedia Computer Science. Vol. 207, Issue , Pages 2782--2793, 2022
24. Wajdi, O.M., Ghaith, M., Ouajdi, K. Chaotic lightning search algorithm. Soft Computing. Vol. 25, Issue , Pages 2039--2055, 2021
25. Ghaith, M., Aymen, Z. A modified jellyfish search optimizer with orthogonal learning strategy. Procedia Computer Science. Vol. 192, Issue , Pages 697--708, 2021
26. Maha, N., Ghaith, M., Ouajdi, K. Binary Giza pyramids construction for feature selection. Procedia Computer Science. Vol. 192, Issue , Pages 676--687, 2021
27. Hatem BIBI. SOME APPLICATIONS OF WAVELETS. IJMSOR. Vol. 1, Issue 2, Pages 125-133, 2021
28. Abdealltif Jouini and Hatem BIBI. GENERAL BIORTHOGONAL MULTIRESOLUTION ANALYSES AND APPLICATIONS. IJMSOR. Vol. 1, Issue 1, Pages 61-73, 2021
29. Chayma Sellami, Carlos Miranda, Ahmed Samet, Mohamed Anis Bach Tobji, François de Bertrand de Beuvro. On mining frequent chronicles for machine failure prediction.. J. Intell. Manuf.. Vol. 31, Issue 4, Pages 1019-1035, 2020
30. Mouhamed Gaith Ayadi, Riadh Bouslimi, Jalel Akaich. Medical social network content analysis for medical image retrieval purpose.. Softw. Pract. Exp.. Vol. 50, Issue 1, Pages 65-86, 2020
31. Brik. H., El Ouakdi. J., Ftiti. Z., Louhichi. W. The predictive power of country governance for economic and financial vulnerabilities occurrence. Revue Gestion 2000. Vol. 37, Issue 5, Pages 105-119, 2020
32. Ghaith, M., Ouajdi, K., others,. Binary political optimizer for feature selection using gene expression data. Computational Intelligence and Neuroscience. Vol. 2020, Issue , Pages , 2020
33. Maroua Meddeb, Amine Dhraief, Abdelfettah Belghith, Thierry Monteil, Khalil Drira, HassanMathkour. Least fresh first cache replacement policy for NDN-based IoT networks. Pervasive and Mobile Computing, Elsevier. JCR 2017 : SCI Impact Factor=2.974, Q1. Vol. 52, Issue pp, Pages 60-70, 2019
34. Bahri, N., Bach Tobji, M.A. On Indexing Evidential Data. International Journal of Approximate Reasoning. Vol. 106, Issue NA, Pages 63-87, 2019
35. Sellami, C., Miranda, C., Samet, A., Bach Tobji, M-A., de Beuvron, F.. On mining frequent chronicles for machine failure prediction. Journal of Intelligent Manufacturing. Vol. NA, Issue NA, Pages NA, 2019
36. Nassim Bahri, Mohamed Anis Bach Tobj. On indexing evidential data.. Int. J. Approx. Reason.. Vol. 106, Issue , Pages 63-87, 2019
37. Maroua Meddeb, Amine Dhraief Abdelfettag Belghith, Thierry Monteil, Khalil Drira, and Saad Al-Ahmadi. Named Data Networking A promisin g architecture for the Internet of things (IoT). International Journal on Semantic Web and Information Systems (IJSWIS), IGI. JCR 2016 : SCI Impact Factor=1.5, Q3. Vol. 14, Issue 2, Pages 1-19, 2018
38. Maroua Meddeb, Amine Dhraief , Abdelfettah Belghith, Thierry Monteil, and Khalil Drira. Cache Freshness in Named Data Networking for the Internet of Things. The Computer Journal, Oxford University Press , JCR 2017 : SCI Impact Factor=0.792, Q4. Vol. 61, Issue 10, Pages 1496-1511, 2018
39. Imen Mahjri,Samir Medjiah,Amine Dhraief,Khalil Drira,Abdelfettah Belghith. Weighted Localization in Mobile Wireless Networks. Wiley Internet Technology Letters. Vol. 1, Issue 1, Pages 1-6, 2018
40. Mohamed Belhassen, Amine Dhraief, Abdelfettah Belghith, Hassan Mathkour. ALOE: autonomic locating of obstructing entities in MANETs. Journal of Ambient Intelligence and Humanized Computing, Springer Berlin Heidelberg, JCR 2016 : SCI Impact Factor=1.588, Q3. Vol. 9, Issue 6, Pages 1955-1974, 2018
41. Maroua Meddeb, Amine Dhraief, Abdelfettah Belghith, Thierry Monteil, Khalil Drira, Sofien Gannouni. AFIRM: Adaptive forwarding based link recovery for mobility support in NDN/IoT networks. Future Generation Computer Systems, Elsevier (JCR 2016 Q1, IF= 4.639). Vol. 87, Issue 10, Pages 351-363, 2018
42. Bousnina, F.E., Bach Tobji, M.A., Chebbah, M., Yaghlane, B.B. Modeling evidential databases as possible worlds.. Int. J. Intell. Syst.. Vol. 33, Issue 6, Pages 1146-1164, 2018
43. Abidi, A., Elmi, S., Bach Tobji, M.A., HadjAli, A., Yaghlane, B.B. Skyline queries over possibilistic RDF data. Int. J. Approx. Reasoning. Vol. 93, Issue NA, Pages 277-289, 2018
44. T.Mellah. Effectiveness of the water resources allocation institution in Tunisia. Water Policy. Vol. 20, Issue 2, Pages 429-445, 2018
45. Zeineb Ayachi. The Effect of Culture and Gender on English Learning Strategies: The Case of Tunisian and German Learners. The Reading Matrix. Vol. 18, Issue 1, Pages 124-138, 2018
46. Imen Mahjri, Amine Dhraief, Abdelfettah Belghith, Sofien Gannouni, Issam Mabrouki, Maram AlAjlanc. Collision risk assessment in Flying Ad Hoc aerial wireless networks. Journal of Network and Computer Applications, Elsevier. JCR 2017 : SCI Impact Factor=3.991, Q1. Vol. 124, Issue 12, Pages 1-13, 2018
47. Bousnina, F.E., Tobji, M.A.B., Chebbah, M., Yaghlane, B.B. Modeling evidential databases as possible worlds.. Int. J. Intell. Syst.. Vol. 33, Issue 6, Pages 1146-1164, 2018
48. Aouedi, O., Bach Tobji, M.A., Abraham, A. Internet of Things and Ambient Intelligence for Mobile Health Monitoring. International Journal of Computer Information Systems and Industrial Management Applications. Vol. 10, Issue NA, Pages 261 - 271, 2018
49. Abdulrahman Jalal, Sofiane Ouni, Karim Kamoun and Bassam A Zafar. On Improving SPARQL Information Retrieval System for Semantic Internet of Things Applications. International Journal of Computer Applications. Vol. 181, Issue 2, Pages 30-37, 2018
50. Amna Abidi, Sayda Elmi, Mohamed Anis Bach Tobji, Allel HadjAli, Boutheina Ben Yaghlan. Skyline queries over possibilistic RDF data.. Int. J. Approx. Reason.. Vol. 93, Issue , Pages 277-289, 2018
51. Fatma Ezzahra Bousnina, Mohamed Anis Bach Tobji, Mouna Chebbah, Boutheina Ben Yaghlan. Modeling evidential databases as possible worlds.. Int. J. Intell. Syst.. Vol. 33, Issue 6, Pages 1146-1164, 2018
52. Riadh Bouslimi, Mouhamed Gaith Ayadi, Jalel Akaich. Medical Image Retrieval in Healthcare Social Networks.. Int. J. Heal. Inf. Syst. Informatics. Vol. 13, Issue 2, Pages 13-28, 2018
53. Brik. H., El Ouakdi. J., Ftiti. Z., Louhichi. W. Determinants of equity returns correlations. Bankers, Markets and Investors. Vol. 154, Issue ., Pages ., 2018
54. Dr Dhouha DOGHRI. Several publications and articles in international scientific journals. international journals. Vol. 000, Issue 000, Pages pp, 2017
55. El Ghali M. et Jammeli A.. "The dimensions of the media experience lived by the children: exploratory study with the Tunisian children". Journal of Internet Social Networking and Virtual Communities. Vol. À paraître, Issue À paraître, Pages À paraître, 2017
56. Elmi, S., Bach Tobji, M.A., Hadjali, A., Yaghlane, B.B. Selecting skyline stars over uncertain databases - Semantics and refining methods in the evidence theory setting.. Appl. Soft Comput.. Vol. 57, Issue NA, Pages 88-101, 2017
57. Amine Dhraief, Abdelfettah Belghith, Hassan Mathkour, and Khalil Drira. An M2M gateway-centric architecture for autonomic healing and optimising of machine-to-machine overlay networks. International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), Inderscience. JCR 2016 , SCI Impact Factor=0.705, Q4. Vol. 26, Issue 1, Pages 12-28, 2017
58. Lamia Zaibi. Transcending Boundaries: Kwame Dawes’ Digital Projects. The Rupkatha Journal On Interdisciplinary Studies In Humanities. Vol. 9, Issue 3, Pages 115-124, 2017
59. Lamia Zaibi. Kwame Dawes. A City of Bones: A Testament. World Literaure Today. Vol. 91, Issue 5, Pages 85-86, 2017
60. Hamdi, M., Rhouma, R., Belghith, S. An appropriate system for securing real-time voice communication based on ADPCM coding and chaotic maps.. Multimedia Tools Appl.. Vol. 76, Issue 5, Pages 7105-7128, 2017
61. Saidi, M., Hermassi, H., Rhouma, R., Belghith, S. A new adaptive image steganography scheme based on DCT and chaotic map.. Multimedia Tools Appl.. Vol. 76, Issue 11, Pages 13493-13510, 2017
62. Hamdi, M., Rhouma, R., Belghith, S. A selective compression-encryption of images based on SPIHT coding and Chirikov Standard Map.. Signal Processing. Vol. 131, Issue , Pages 514-526, 2017
63. Imen Mahjri, Amine Dhraief, Abdelfettah Belghith, and Ahmad AlMogren. SLIDE : A Straight Line Conflict Detection and Alerting Algorithm for Multiple Unmanned Aerial Vehicles. IEEE Transactions on Mobile Computing (TMC). JCR 2017 : SCI Impact Factor=4.098, Q1. Vol. 17, Issue 5, Pages 1-17, 2017
64. . The Impact of Social Professional Category Consumer’s on Acceptance Level Towards Islamic Banking Window. Chinese Business Review. Vol. , Issue , Pages , 2017
65. Zeineb Ayachi. Peer and Teacher Assessment in EFL Writing Compositions: The Case Of Advanced English Major Students in Jendouba, Tunisia. The Reading Matrix. Vol. 17, Issue 1, Pages 156-168, 2017
66. Sayda Elmi, Mohamed Anis Bach Tobji, Allel Hadjali, Boutheina Ben Yaghlan. Selecting skyline stars over uncertain databases: Semantics and refining methods in the evidence theory setting.. Appl. Soft Comput.. Vol. 57, Issue , Pages 88-101, 2017
67. Riadh Bouslimi, Mouhamed Gaith Ayadi, Jalel Akaich. Semantic medical image retrieval in a medical social network.. Soc. Netw. Anal. Min.. Vol. 7, Issue 1, Pages 2:1-2:11, 2017
68. T.Mellah & T. Ben Amor. Performance of the Tunisian Water Utilities: an input-distance function approach. Utilities Policy. Vol. 38, Issue -, Pages 18-32, 2016
69. Tawfik BEN AMOR and Thuraya MELLAH. COST EFFICIENCY OF TUNISIAN WATER DISTRIBUTION UTILITIES: AN HETEROSKEDASTIC STOCHASTIC COST FRONTIER APPROACH. Journal of Economics Theory (2016 Volume 10). Vol. 10, Issue 4, Pages 1-9, 2016
70. Thuraya Mellah and Tawfik Ben Amor. Performance of the Tunisian Water Utility: An input-distance function approach. Utility plicy. Vol. 38, Issue February 2016,, Pages Pages 18–32, 2016
71. Lamia Zaibi. “Rewriting the Tempest: George Lamming’s Water with Berries.”. Postcolonial Interventions 1. 2. Vol. 1, Issue 2, Pages 107-134, 2016
72. Lamia Zaibi. “Exploring Landscape: A comparative Study of George Lamming’s In the Castle of My Skin and Water with Berries.”. Subalternspeak: An International Journal of Postcolonial Studies. Vol. 4, Issue 3, Pages 48-59, 2016
73. Lamia Zaibi. “Pocomania Rituals and Identity in Andrew Salkey’s a Quality of Violence (1959).”. Global Journal of Human Social Science. Vol. 14, Issue 1, Pages 1-7, 2016
74. Maher Helaoui and Wady Naanaa. Modularity-based Decomposing for Valued CSP. Annals of Mathematics and Artificial Intelligence (AMAI). Vol. 67, Issue 2, Pages 165-187, 2016
75. Amine Dhraief, Abdelfettah Belghith, and Khalil Drira.. Regular and lightweight mobility management in the HIP-based M2M overlay network. International Jour-nal of Autonomous and Adaptive Communications Systems (IJAACS), Inderscience. Vol. 9, Issue 3/4, Pages 331-352, 2016
76. Imen Mahjri, Amine Dhraief, Abdelfattah Belghith, Khalil Drira, and Hassan Mathkour. A GPS-less Framework for Localization and Coverage Maintenance in Wireless Sensor Networks. KSII Transactions on Internet and Information Systems, JCR 2016, SCI Impact Factor=0.452, Q4. Vol. 10, Issue 1, Pages 96-116, 2016
77. Rafaa Tahar, Amine Dhraief, Abdelfattah Belghith, Hassan Mathkour, and Rafik Braham. Autonomous and adaptive beaconing strategy for multi-interfaced wireless mobile nodes. Wiley Wireless Communications and Mobile Computing, JCR 2016: SCI Impact Factor=1.899, Q2. Vol. 16, Issue 12, Pages 1625-1641, 2016
78. Zeineb Ayachi. ELT EVALUATION: THE ISSUE OF IN-COMPANY ENGLISH TRAINING IN TUNISIA. Modern Journal of Language Teaching Methods. Vol. 6, Issue 3, Pages 97-106, 2016
79. Zeineb Ayachi. The main sources of language-skills-specific anxiety in Tunsian ESP students. TAYR. Vol. 3, Issue 2, Pages 10-53, 2016
80. Mouhamed Gaith Ayadi, Riadh Bouslimi, Jalel Akaich. A framework for medical and health care databases and data warehouses conceptual modeling support.. Netw. Model. Anal. Health Informatics Bioinform.. Vol. 5, Issue 1, Pages 13, 2016
81. Mouhamed Gaith Ayadi, Riadh Bouslimi, Jalel Akaich. Automatic medical image multilingual annotation via a medical social network.. Netw. Model. Anal. Health Informatics Bioinform.. Vol. 5, Issue 1, Pages 20, 2016
82. Mouhamed Gaith Ayadi, Riadh Bouslimi, Jalel Akaich. A medical image retrieval scheme through a medical social network.. Netw. Model. Anal. Health Informatics Bioinform.. Vol. 5, Issue 1, Pages 23, 2016
83. Riadh Bouslimi, Jalel Akaichi, Mouhamed Gaith Ayadi, Hana Hedhl. A medical collaboration network for medical image analysis.. Netw. Model. Anal. Health Informatics Bioinform.. Vol. 5, Issue 1, Pages 10, 2016
84. Riadh Bouslimi, Jalel Akaichi, Mouhamed Gaith Ayadi, Hana Hedhl. Erratum to: A medical collaboration network for medical image analysis.. Netw. Model. Anal. Health Informatics Bioinform.. Vol. 5, Issue 1, Pages 12, 2016
85. Mouhamed Gaith Ayadi, Riadh Bouslimi, Jalel Akaich. A medical image retrieval scheme with relevance feedback through a medical social network.. Soc. Netw. Anal. Min.. Vol. 6, Issue 1, Pages 53:1-53:23, 2016
86. Jallouli R. & Raboudi F.. LES DÉRIVES DE LA DÉLOCALISATION: L'EXEMPLE DES CENTRES D'APPEL EN TUNISIE. Revue française du marketing. Vol. 2, Issue 5, Pages 77-84, 2015
87. Elmi, S., Benouaret, K., HadhjAli, A., Bach Tobji, M-A., Ben Yaghlane, B. Requêtes Skyline en présence des données évidentielles. Revue des Nouvelles Technologies de l'Information, Extraction et Gestion des Connaissances. Vol. RNTI-E-, Issue 28, Pages 215-220, 2015
88. Lamia Ketari and Mohammadi Akheela Khanum. Impact of Facebook Usage on the Academic Grades: A case study. Journal of Computing. Vol. 5, Issue 1, Pages 44-49, 2015
89. Lamia Ketari and Akheela Khanum. A Review of Malicious Code Detection Techniques for Mobile Devices. International Journal of Com- puter Theory and Engineering. Vol. 4, Issue 2, Pages 212-216, 2015
90. Manel Hamouda et Rym Srarfi Tabbane. Impacte du BAO électronique sur l’intention d’achat du consommateur: le role modérateur de l’âge et du genre. La Revue Gestion et Organisation. Vol. 6, Issue 1, Pages 39-46, 2015
91. Ben N'Cir Chiheb-Eddine , Essoussi Nadia. Using Sequences of Words for Non-Disjoint Grouping of Documents.,. International journal of Pattern Recognition and Artificial Intelligence (IJPRAI),. Vol. 29, Issue (3), Pages 1-20, 2015
92. Ben N'Cir Chiheb-Eddine , Essoussi Nadia , Mohamed Limam. Kernel-Based Methods to Identify Overlapping Clusters with Linear and Nonlinear Boundaries. Journal of classification. Vol. 32, Issue (2), Pages 176-211, 2015
93. Raéf BAHRINI. Productivity of MENA Islamic banks: a bootstrapped Malmquist Index approach. International Journal of Islamic and Middle Eastern Finance and Management. Vol. 8, Issue 4, Pages 508-528, 2015
94. Amdouni Hamida et Gammoudi Mohamed Mohsen. Semi-Automatic Method to Assist Expert for Association Rules Validation. International Journal of Computer, Electrical, Automation, Control and Information Engineering. Vol. 9, Issue 8, Pages 1888-1896, 2015
95. imen Jemili, Dhouha Ghrab, Amine Dhraief, Abdelfettah Belghith, Bilel Derbel, Ahmed Al-Mogren, and Hassan Mathkour. CHRA - a coloring based hierarchical routing algorithm. Journal of Ambient Intelligence and Humanized Computing, Springer Berlin Heidelberg. 2015 JCR, SCI Impact Factor=0.835, Q4. Vol. 6, Issue 1, Pages 69-82, 2015
96. Raik Aissaoui, Amine Dhraief, Abdelfettah Belghith, Hamid Menouer, Hassan I. Mathkour, Fethi Filali, and Adnan Abu-Dayya. HCBLS - A Hierarchical Cluster-Based Location Service in Urban Environment. Mobile Information Systems. JCR 2015, SCI Impact Factor=1.462, Q2. Vol. 2015, Issue 2015, Pages 1-16, 2015
97. Abdelfettah Belghith, Mohamed Belhassen, Amine Dhraief, NourElhouda Dougui, and Hassan Mathkour. Autonomic Obstacle Detection and Avoidance in MANETs Driven by Cartography Enhanced OLSR. Mobile Information Systems. 2015 JCR, SCI Impact Factor=1.462, Q2. Vol. 2015, Issue 2015, Pages 1-18, 2015
98. Hermassi, H.,Hamdi, M.,Rhouma, R.,Belghith, S.M.. A joint encryption-compression codec for speech signals using the ITU-T G.711 standard and chaotic map. Multimedia Tools and Applications. Vol. , Issue , Pages , 2015
99. Mannai, O.,Bechikh, R.,Hermassi, H.,Rhouma, R.,Belghith, S.. A new image encryption scheme based on a simple first-order time-delay system with appropriate nonlinearity. Nonlinear Dynamics. Vol. , Issue , Pages , 2015
100. Bechikh, R.,Hermassi, H.,Abd El-Latif, A.A.,Rhouma, R.,Belghith, S.. Breaking an image encryption scheme based on a spatiotemporal chaotic system. Signal Processing: Image Communication. Vol. , Issue , Pages , 2015
101. Zeineb Ayachi. Adult Learning Strategies in an Onsite Training Program in Tunisia. The Reading Matrix. Vol. 15, Issue 2, Pages 80-100, 2015
102. Chebbah, M., Martin, A., Yaghlane, B.B. Combining partially independent belief functions.. Decision Support Systems. Vol. 73, Issue , Pages 37-46, 2015
103. Riadh Bouslimi, Jalel Akaich. Automatic medical image annotation on social network of physician collaboration.. Netw. Model. Anal. Health Informatics Bioinform.. Vol. 4, Issue 1, Pages 10, 2015
104. Hassen. R., El Ouakdi. J., Omri. A. Executive compensation and ownership structure. Journal of Applied Business Research. Vol. 32, Issue 2, Pages 593-608, 2015
105. Yassine SLAMA. Le rôle des salariés locaux dans le processus d'adaptation des expatriés dans le cadre de la multinationalisation des firmes. Revue Française de Gestion. Vol. 40, Issue 239, Pages 51-63, 2014
106. Koubaâ Y.,Tabbane R. & Jallouli R. On the use of structural equation modeling in marketing image research. Asia Pacific Journal of Marketing and Logistics. Vol. 26, Issue 2, Pages 315-338, 2014
107. Yamen Koubaa, Rym Srarfi Tabbane et Rim Jallouli Chaabouni. On the Use of Structural Equations Modeling in Marketing Image Research. Asia Pacific Journal of Marketing and Logistics. Vol. 26, Issue 2, Pages 315-338, 2014
108. Ben N'Cir Chiheb-Eddine , Guillaume Cleuziou , Essoussi Nadia. Generalization of c-means for identifying non-disjoint clusters with overlap regulation,. Pattern Recognition Letters. Vol. 45, Issue (1), Pages 92-98, 2014
109. El Ghali M., Saied Ben Rached K. et Brée J.,. « Le processus d’Appropriation de l’Expérience Télévisuelle des Enfants. Cas de l’Emission de la « Star Academy ». International Journal of Business & EconomicStrategy (IJBES). Vol. 2, Issue -, Pages -, 2014
110. Belazi, A.,Hermassi, H.,Rhouma, R.,Belghith, S.. Algebraic analysis of a RGB image encryption algorithm based on DNA encoding and chaotic map. Nonlinear Dynamics. Vol. , Issue , Pages , 2014
111. Manel Hamouda et Rym Srarfi Tabbane. Impact of Electronic Word of Mouth Evaluation on Purchase Intention: The Mediating Role of Attitude toward the Product. International Journal of Online Marketing. Vol. 3, Issue 2, Pages 20-37, 2013
112. Maher Helaoui, Wady Naanaa, and Béchir El Ayeb. Submodularity-based Decomposing for Valued CSP.. International Journal on Artificial Intelligence Tools (IJAIT). Vol. 22, Issue 2, Pages 1-20, 2013
113. Hermassi, H.,Rhouma, R.,Belghith, S.. Improvement of an image encryption algorithm based on hyper-chaos. Telecommunication Systems. Vol. , Issue , Pages , 2013
114. Hermassi, H.,Belazi, A.,Rhouma, R.,Belghith, S.M.. Security analysis of an image encryption algorithm based on a DNA addition combining with chaotic maps. Multimedia Tools and Applications. Vol. , Issue , Pages , 2013
115. Ghaith, M., Ouajdi, K. A hybrid genetic algorithm for solving machine layout problem with consideration of industrial constraints. IFAC Proceedings Volumes. Vol. 46, Issue , Pages 2039--2044, 2013
116. Jean-Marc Bardet, Hatem Bibi.. Adaptive semiparametric wavelet estimator and goodness-of-fit test for long memory linear processes. Electronic Journal of Statistics, Institute of Mathematical Statistics and Bernoulli Society,. Vol. 6, Issue 0, Pages 2382-2419, 2012
117. KS Søilen, MA Kovacevic, R Jallouli. Key success factors for Ericsson mobile platforms using the value grid model. Journal of Business Research JBR. Vol. 65, Issue 9, Pages 1335-1345, 2012
118. Jallouli R., Raboudi F. and Koubâa Y.. Customer knowledge management: Implementation and added-value. ecch the case for learning UK and USA. Vol. Ref., Issue Ref. 912-007-1, Pages 17p, 2012
119. BAHRINI Raéf. Efficiency and productivity analysis of Tunisian banks during a recent deregulation period. The Journal of Management and Business Research. Vol. 2, Issue 2, Pages 68-82, 2012
120. K. Kamoun and S. Ben Yahia,. content similarity measure to assess stability during ontology enrichment. International Review on Computer and Software (IRECOS). Vol. 7, Issue 3, Pages 1020-1027, 2012
121. K. Kamoun and S. Ben Yahia. A Novel Global Measure Approach based on Ontology Spectrum to Evaluate Ontology Enrichment. International Journal of Computer Applications. Vol. 39, Issue 17, Pages 23-30, 2012
122. Ben N'Cir Chiheb-Eddine , Essoussi Nadia. Recognition of overlapping Patterns with Linear and Non-Linear Separations using Positive Definite Kernels.. International Journal of Computer Application (IJCA),. Vol. Volume 53, Issue (1), Pages 1-8, 2012
123. Amine Dhraief, Imen Mahjri, and Abdelfettah Belghith. A Performance Evaluation of the Coverage Configuration Protocol Under Location Errors, Irregular Sensing Patterns, and a Noisy Channel. International Journal of Business Data Communications and Networking, IGI. Vol. 8, Issue 3, Pages 28-41, 2012
124. Amine Dhraief and Abdelfettah Belghith. An Experimental Investigation of the Impact of Mobile IPv6 Handover on Transport Protocols. Smart Computing Review, KAIS. Vol. 2, Issue 1, Pages 1-17, 2012
125. Hermassi, H.,Rhouma, R.,Belghith, S.. Security analysis of image cryptosystems only or partially based on a chaotic permutation. Journal of Systems and Software. Vol. , Issue , Pages , 2012
126. Ghaith, M., Riadh, K., Mohamed, L. Consensus functions for cluster ensembles. Applied Artificial Intelligence. Vol. 26, Issue , Pages 598--614, 2012
127. BAHRINI Raéf. Empirical analysis of non-performing loans in the case of Tunisian banks. Journal of Business Studies Quarterly. Vol. 3, Issue 1, Pages 230-245, 2011
128. Amdouni Hamida et Gammoudi Mohamed Mohsen. CondClose: A new algorithm of association rules extraction. International Journal of Computer Science Issues (IJCSI). Vol. 8, Issue 4, Pages 550-560, 2011
129. Amine Dhraief and Abdelfettah Belghith. Mobility Impact on Session Survivability under the SHIM6 Protocol and Enhancement of its Rehoming Procedure. Journal of Networks, Academy Publisher. Vol. 6, Issue 11, Pages 1521-1532, 2011
130. Solak, E.,Rhouma, R.,Belghith, S.. Breaking an orbit-based symmetric cryptosystem. Mathematical and Computer Modelling. Vol. , Issue , Pages , 2011
131. Kumar, A.,Rhouma, R.,Wang, Y.,Sklavos, N.,Ghose, M.K.. Comments on, " A blind source separation-based method for multiple images encryption". Communications in Nonlinear Science and Numerical Simulation. Vol. , Issue , Pages , 2011
132. Rhouma, R.,Belghith, S.. Cryptanalysis of a chaos-based cryptosystem on DSP. Communications in Nonlinear Science and Numerical Simulation. Vol. , Issue , Pages , 2011
133. Bach Tobji, M-A., Ben Yaghlane, B. Extraction des itemsets fréquents à partir de données imparfaites : application à une base de données éducationnelles. Revue des Nouvelles Technologies de l'Information, Fouille de données complexes-Complexité liée aux données multiples. Vol. RNTI-E-, Issue 21, Pages 211-231, 2011
134. Tawfik Ben Amor and Mohamed Goaied. "Stochastic Varying Coefficient Frontier Model in the Estimation of Technical Efficiency and Technical Efficiency of Specific Input". Agricultural Journal. Vol. Vol 5, Issue 6, Pages p 329-337, 2010
135. Tawfik Ben Amor and Christophe Muller. "Application of Stochastic Production Frontier in the Estimation of Technical Efficiency of Irrigated Agriculture in Tunisia". Agricultural Journal. Vol. 5, Issue 2, Pages p50-56., 2010
136. Arroyo, D.,Li, S.,Amigó, J.M.,Alvarez, G.,Rhouma, R.. Comment on "Image encryption with chaotically coupled chaotic maps". Physica D: Nonlinear Phenomena. Vol. , Issue , Pages , 2010
137. Solak, E.,Rhouma, R.,Belghith, S.. Cryptanalysis of a multi-chaotic systems based image cryptosystem. Optics Communications. Vol. , Issue , Pages , 2010
138. Rhouma, R.,Solak, E.,Belghith, S.. Cryptanalysis of a new substitution-diffusion based image cipher. Communications in Nonlinear Science and Numerical Simulation. Vol. , Issue , Pages , 2010
139. Hermassi, H.,Rhouma, R.,Belghith, S.. Joint compression and encryption using chaotically mutated Huffman trees. Communications in Nonlinear Science and Numerical Simulation. Vol. , Issue , Pages , 2010
140. Ghazel, C.,Saïdane, L.. Dimensioning of NGN main components with improved and guaranteed quality of service. Journal of Networks. Vol. , Issue , Pages , 2010
141. Ghazel, C,Saidane, L. Next generation networks dimensioning for improving and guaranteeing quality of service. The International Journal of Networks (JNW). Vol. , Issue , Pages , 2010
142. Rhouma, R.,Solak, E.,Arroyo, D.,Li, S.,Alvarez, G.,Belghith, S.. Comment on "Modified Baptista type chaotic cryptosystem via matrix secret key" [Phys. Lett. A 372 (2008) 5427]. Physics Letters, Section A: General, Atomic and Solid State Physics. Vol. , Issue , Pages , 2009
143. Rhouma, R.,Belghith, S.. Cryptanalysis of a spatiotemporal chaotic cryptosystem. Chaos, Solitons and Fractals. Vol. , Issue , Pages , 2009
144. Rhouma, R.,Meherzi, S.,Belghith, S.. OCML-based colour image encryption. Chaos, Solitons and Fractals. Vol. , Issue , Pages , 2009
145. C. Ghazel, L. Saidane. An Improved Admission Control Approach for Achieving QoS Targets in NGN Networks. MASAUM Journal of Computing (MJC). Vol. , Issue , Pages , 2009
146. C. Ghazel, L. Saidane. Dimensioning of Next Generation Networks Signaling Gateway for Achieving a Quality of Service Target. International Journal of Hybrid Information Technology (IJHIT). Vol. , Issue , Pages , 2009
147. Jean-Marc Bardet, Hatem Bibi, Abdellatif Jouini.. Adaptive wavelet based estimator of the memory parameter for stationary Gaussian processes. Bernoulli Society for Mathematical Statistics and Probability. Vol. 14, Issue 3, Pages .691-724., 2008
148. Hatem Bibi, Abdellatif Jouini, M. Kratou. More general constructions of wavelets on the interval. Communications in Mathematical Analysis. Vol. 4, Issue 1, Pages 45-47, 2008
149. Rhouma, R.,Belghith, S.. Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Physics Letters, Section A: General, Atomic and Solid State Physics. Vol. , Issue , Pages , 2008
150. Rhouma, R.,Belghith, S.. Cryptanalysis of a spatiotemporal chaotic image/video cryptosystem. Physics Letters, Section A: General, Atomic and Solid State Physics. Vol. , Issue , Pages , 2008
151. Arroyo, D.,Rhouma, R.,Alvarez, G.,Li, S.,Fernandez, V.. On the security of a new image encryption scheme based on chaotic map lattices. Chaos. Vol. , Issue , Pages , 2008
152. Rhouma, R.,Safya, B.. On the security of a spatiotemporal chaotic cryptosystem. Chaos. Vol. , Issue , Pages , 2007
153. . Performance of a new Chaos-based Communication Scheme: The Reduced-Delay-Masked-DCSK. European Signal Processing Conference. Vol. , Issue , Pages , 2007
154. . A multidimensional map for a chaotic cryptosystem. European Signal Processing Conference. Vol. , Issue , Pages , 2006
155. Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Nadia Tawbi, Hamdi Yahyaoui, and Sami Zhioua. E-Bunny: A Dynamic Compiler for Embedded Java Virtual Machines.. Journal of Object Technology. Vol. 4, Issue 1, Pages 83-108, 2005
156. Henda Bélaïd Ajroud, Ali Jaoua, S. Kaabi. Classes extraction from procedural programs. Elsevier, Information Sciences, February 2002,. Vol. Volume 140, Issue Issues 3–4, Pages pages 283-294, 2002
1. Salma, Y., Ghaith, M., Ouajdi, K. Mining Association Rules for a Sustainable Supply Chain Using Improved Multiobjective Crystal Structure Algorithm. 2023 9th International Conference on Control, Decision and Information Technologies (CoDIT). Pages 889--894, 2023
2. Leila Bouchrit; Sajeh Zairi; Ikbal C. Msadaa; Amine Dhraief; Kahlil Drira. Flying to the Rescue: UAV-Assisted Urgent Alert Transmission in VANET. 2023 IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), Paris, France, 2023, doi: 10.1109/WETICE57085.2023.10477830.. Pages 1-6, 2023
3. Asma Hamissi; Amine Dhraief; Layth Sliman. On Safety of Decentralized Unmanned Aircraft System Traffic Management Using Blockchain. 2023 IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), Paris, France, 2023,, doi: 10.1109/WETICE57085.2023.10477843. Pages 1-6, 2023
4. Mariem Bousaid; Safa Kaabi; Amine Dhraief; Khalil Drira. Unlocking the Power of Reinforcement Learning: Investigating Optimal Q-Learning Parameters for Routing in Flying Ad Hoc Networks. 2023 IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), Paris, France, 2023, doi: 10.1109/WETICE57085.2023.10477843. Pages 1-6, 2023
5. Bouchmel. I., El Ouakdi. J., Omri. A. The corporate environmental responsability: Measure and impact on Innovation. AFS 2022 Summer Finance Conference. Mahdia.. Pages ., 2022
6. Wajdi, O.M., Ghaith, M., Ouajdi, K. Improved Antlion Algorithm for Electric Vehicle Charging Station Placement. 2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT). Pages 265--271, 2022
7. Malek Chebil, Rim Jallouli, Mohamed Anis Bach Tobji, Chiheb-Eddine Ben Nci. Topic Modeling of Marketing Scientific Papers: An Experimental Survey.. ICDEc. Pages 147-171, 2021
8. Nassim Bahri, Mohamed Anis Bach Tobji, Boutheina Ben Yaghlan. ECFAR: A Rule-Based Collaborative Filtering System Dealing with Evidential Data.. ISDA. Pages 944-955, 2021
9. Bouchmel. I., El Ouakdi. J., Omri. A. The corporate environmental responsability: Measure and impact on Innovation. Conférence Internationale avec comité de lecture the Financial Economics Meeting: Post-Crisis Challenges (FEM-2021). EDC Paris Business School Paris.. Pages ., 2021
10. Wajdi, O.M., Ghaith, M., Ouajdi, K. Improved Genetic Algorithm for Electric Vehicle Charging Station Placement. Intelligent Decision Technologies: Proceedings of the 13th KES-IDT 2021 Conference. Pages 37--57, 2021
11. Mohamed Anis Bach Tobji, Rim Jalloul. Holding ICDEc 2020 Fully Online - Driving Principles and Key Decisions.. ICDEc. Pages 3-10, 2020
12. Nassim Bahri, Mohamed Anis Bach Tobji, Boutheina Ben Yaghlan. Associative Classifier for Evidential Data.. ICTAI. Pages 1274-1281, 2020
13. Nassim Bahri, Mohamed Anis Bach Tobji, Boutheina Ben Yaghlan. Rule-Based Classification for Evidential Data.. SUM. Pages 234-241, 2020
14. Achraf Ben Chrayet, Ahmed Samet, Mohamed Anis Bach Tobj. Evidence Theory Based Combination of Frequent Chronicles for Failure Prediction.. SUM. Pages 226-233, 2020
15. Safa Kaabi and Rim Jallouli. Overview of E-commerce Technologies, Data Analysis Capabilities and Marketing Knowledge. International Conference on Digital Economy ICDEc19, 15-18 April 2019, Beirut, Lebanon. Pages 12 p., 2019
16. Bouchmel. I., El Ouakdi. J., Omri. A. Gender diversity, innovation and French firms performance: Evidence of SBF 120. Conférence Internationale avec comité de lecture the Financial Economics Meeting: Post-Crisis Challenges (FEM-2019)). EDC Paris Business School Paris.. Pages ., 2019
17. Ghaith, M., Ouajdi, K. Short term planning for cyclic scheduling: A new approach. 2019 International Conference on Advanced Systems and Emergent Technologies (IC_ASET). Pages 238--242, 2019
18. . Antecedents of Trust toward Islamic Banks: a proposal of an explanatory Model. ATM Hammamet. Pages , 2018
19. Jendoubi, S., Chebbah, M., Martin, A. Evidential Independence Maximization on Twitter Network.. BELIEF. Pages 121-128, 2018
20. Bousnina, F.E., Chebbah, M., Tobji, M.A.B., Hadjali, A., Yaghlane, B.B. Evidential Top-k Queries Evaluation - Algorithms and Experiments.. IPMU. Pages 407-417, 2018
21. Chehibi, M., Chebbah, M., Martin, A. Independence of Sources in Social Networks.. IPMU. Pages 418-428, 2018
22. Chehibi, M., Chebbah, M., Martin, A. Independence of Sources in Social Networks.. CoRR. Pages , 2018
23. Bousnina, F.E., Chebbah, M., Bach Tobji, M.A., Hadjali, A., Yaghlane, B.B. Evidential Top-k Queries Evaluation - Algorithms and Experiments. IPMU. Pages 407-417, 2018
24. Abidi, A., Bach Tobji, M.A., Hadjali, A., Yaghlane, B.B. A General Framework for Querying Possibilistic RDF Data.. ICTAI. Pages 158-162, 2018
25. Aouedi, O., Bach Tobji, M.A., Abraham, A. An Ensemble of Deep Auto-encoders for Healthcare Monitoring. HIS. Pages 1-18, 2018
26. Sellami, C., Samet, A., Bach Tobji. Frequent Chronicle Mining: Application on Predictive Maintenance. IEEE ICMLA. Pages 1-6, 2018
27. . A novel Architecture Design Based on Resources Allocation and Quality of Service in Cloud Computing. International Conference on Sciences of Electronic, Technologies of Information and Telecommunications (SETIT2018). Pages , 2018
28. H. Guesmi, C. Ghazel, L. Saidane. A novel Fast Entropy-based Detection Strategy against Unfair Rating Attacks for Trust Computing in Cloud Environments. The 2018 International Conference on High Performance Computing & Simulation (HPCS 2018). Pages , 2018
29. R. Haiahem, C. Ghazel, L. Saidane. An Alternative Data Gathering of the air Pollutants In the Urban Environment using LoRa and LoRaWAN. The 14th International Wireless Communications and Mobile Computing Conference (IWCMC 2018). Pages , 2018
30. Bouchaala, M.,Ghazel, C.,Saidane, L.A.,Kamoun, F.. End to end cloud computing architecture based on a novel classification of security issues. Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA. Pages , 2018
31. R. Haiahem, C. Ghazel, L. Saidane, S. Boumerdassi. Surveying and Analyzing Urban Environment Approaches of Air Quality Monitoring. The 4th International Conference on Mobile, Secure and Programmable Networking (MSPN 2018). Pages , 2018
32. Ons Aouedi, Mohamed Anis Bach Tobji, Ajith Abraha. An Ensemble of Deep Auto-Encoders for Healthcare Monitoring.. HIS. Pages 96-105, 2018
33. Chayma Sellami, Ahmed Samet, Mohamed Anis Bach Tobj. Frequent Chronicle Mining: Application on Predictive Maintenance.. ICMLA. Pages 1388-1393, 2018
34. Amna Abidi, Mohamed Anis Bach Tobji, Allel Hadjali, Boutheina Ben Yaghlan. A General Framework for Querying Possibilistic RDF Data.. ICTAI. Pages 158-162, 2018
35. Fatma Ezzahra Bousnina, Mouna Chebbah, Mohamed Anis Bach Tobji, Allel Hadjali, Boutheina Ben Yaghlan. Evidential Top-k Queries Evaluation: Algorithms and Experiments.. IPMU. Pages 407-417, 2018
36. Jihene El Ouakdi, Dorra Guermazi, Khira Alimi. Innovation, Banking Development and Governance.. ICDEc 2018, Brest Paris. Pages 79-94, 2018
37. Bousnina, F.E., Chebbah, M., Bach Tobji, M.A., Hadjali, A., Yaghlane, B.B. On Top-K Queries Over Evidential Data.. ICEIS, Portugal. Pages 106-113, 2017
38. Maroua Meddeb, Amine Dhraief, Abdelfettah Belghith, Thierry Monteil, and Khalil Drira. Producer Mobility support in Named Data Internet of Things Network. International Conference on Ambient Systems, Networks and Techno- logies (ANT’17), volume 109 of Procedia Computer Science, Madeira, Portugal. Pages 1067 – 1073, 2017
39. Maroua Meddeb, Amine Dhraief, Abdelfettah Belghith, Thierry Monteil, and Khalil Drira. How to cache in ICN/IoT environments ?. 17th IEEE/ACS International Conference of Computer Systems and Applications (AICCSA’17) Hammamet, Tunisia. Pages 1-8, 2017
40. Saidi, M., Hermassi, H., Rhouma, R., Belghith, S. Uniformly Spread Embedding Based Steganography.. ICDEc. Pages 162-172, 2017
41. . The impact of social professional category on consumers’ acceptance level towards Islamic banking window.. GBATA Vienna. Pages , 2017
42. Elmi, S., Hadjali, A., Tobji, M.A.B., Yaghlane, B.B. Skyline Computation and Maintenance over Imperfect Databases - A Marginal-Points-Based Approach.. ICTAI. Pages 1234-1242, 2017
43. Bousnina, F.E., Elmi, S., Chebbah, M., Tobji, M.A.B., HadjAli, A., Yaghlane, B.B. Skyline Operator over Tripadvisor Reviews Within the Belief Functions Framework.. ICDEc. Pages 186-197, 2017
44. Abidi, A., Tobji, M.A.B., Hadjali, A., Yaghlane, B.B. Skyline Modeling and Computing over Trust RDF Data.. ICEIS. Pages 634-643, 2017
45. Abidi, A., Bahri, N., Tobji, M.A.B., HadjAli, A., Yaghlane, B.B. First Steps Towards an Electronic Meta-journal Platform Based on Crowdsourcing.. ICDEc. Pages 175-185, 2017
46. Zeineb Ayachi. Speaking anxiety, order or disorder?. Jendouba, Tunisia. Pages 199-220, 2017
47. Bousnina, F.E., Elmi, S., Chebbah, M., Tobji, M.A.B., HadjAli, A., Yaghlane, B.B. Skyline Operator over Tripadvisor Reviews Within the Belief Functions Framework.. ICDEc. Pages 186-197, 2017
48. Bousnina, F.E., Chebbah, M., Tobji, M.A.B., Hadjali, A., Yaghlane, B.B. On Top-K Queries Over Evidential Data.. ICEIS. Pages 106-113, 2017
49. Elmi, S., Hadjali, A., Bach Tobji, M.A., Yaghlane, B.B. Skyline Computation and Maintenance over Imperfect Databases - A Marginal-Points-Based Approach.. ICTAI. Pages 1234-1242, 2017
50. Jelassi, M.,Ghazel, C.,Saidane, L.A.. A survey on quality of service in cloud computing. 2017 3rd International Conference on Frontiers of Signal Processing, ICFSP 2017. Pages , 2017
51. Cherif Ghazel,Yosra Abassi,Leila Saidane. An Improved Security Architecture for an InterCloud Reference Model. 2017 European Conference on Electrical Engineering and Computer Science (EECS). Pages , 2017
52. M. Bouchaala, C. Ghazel, L, Saidane, F. Kamoun. Surveying and Analyzing Access Control Models in Cloud Computing. Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP 2017). Pages , 2017
53. Imen Mguiris, Hamida Amdouni et Mohamed Mohsen Gammoudi. An Algorithm for Fuzzy Association Rules Extraction Based on Prime Number Coding.. WETICE. Pages 182-184, 2017
54. Mohamed Anis Bach Tobji, Mohamed Salah Gouide. Incremental Maintenance Of Association Rules Under Support Threshold Change.. CoRR. Pages , 2017
55. Amna Abidi, Nassim Bahri, Mohamed Anis Bach Tobji, Allel HadjAli, Boutheina Ben Yaghlan. First Steps Towards an Electronic Meta-journal Platform Based on Crowdsourcing.. ICDEc. Pages 175-185, 2017
56. Fatma Ezzahra Bousnina, Sayda Elmi, Mouna Chebbah, Mohamed Anis Bach Tobji, Allel HadjAli, Boutheina Ben Yaghlan. Skyline Operator over Tripadvisor Reviews Within the Belief Functions Framework.. ICDEc. Pages 186-197, 2017
57. Amna Abidi, Mohamed Anis Bach Tobji, Allel Hadjali, Boutheina Ben Yaghlan. Skyline Modeling and Computing over Trust RDF Data.. ICEIS. Pages 634-643, 2017
58. Amna Abidi, Mohamed Anis Bach Tobji, Allel Hadjali, Boutheina Ben Yaghlan. Statistical Methods for Use in Analysis of Trust-Skyline Sets.. ICEIS. Pages 413-427, 2017
59. Fatma Ezzahra Bousnina, Mouna Chebbah, Mohamed Anis Bach Tobji, Allel Hadjali, Boutheina Ben Yaghlan. On Top-K Queries Over Evidential Data.. ICEIS. Pages 106-113, 2017
60. Sayda Elmi, Allel Hadjali, Mohamed Anis Bach Tobji, Boutheina Ben Yaghlan. Skyline Computation and Maintenance over Imperfect Databases: A Marginal-Points-Based Approach.. ICTAI. Pages 1234-1242, 2017
61. , . Comparative Study Of Data Mining Query Languages.. CoRR. Pages , 2017
62. Mouhamed Gaith Ayadi, Riadh Bouslimi, Jalel Akaich. A Model for Multilingual Terminology Extraction via a Medical Social Network.. KES. Pages 21-30, 2017
63. Ounifi Mohamed Sami, Amdouni Hamida, Ben Elhoussine Rafika et Slimane Hammoudi. New 3D Visualization and Validation Tool for Displaying Association Rules and Their Associated Classifiers. 20th International Conference Information Visualisation, Universidade NOVA de Lisboa, Lisbon, July 19-22, Portugal. Pages 152-158, 2016
64. Jallouli, R., Jallouli, M., Rekik, J., Bach Tobji, M-A., Abdi, A., Bahri, N. The CEVEP medical application for innovative management of central venous port (CVP): Technical issues and research challenges. International Conference on Digital Economy (ICDEc 2016), Tunisia, Carthage. Pages 68-73, 2016
65. Bousnina, F-E., Elmi, S., Bach Tobji, Chebbah, M., HadjAli, A., Ben Yaghlane, B. Object-relational implementation of evidential databases. International Conference on Digital Economy (ICDEc 2016), Tunisia, Carthage. Pages 80-87, 2016
66. Elmi, S., HadjAli, A., Bach Tobji, M-A., Ben Yaghlane, B. Efficient Skyline Maintenance over Frequently Updated Evidential Databases. Information Processing and Management of Uncertainty in Knowledge-Based Systems, Netherlands, Eindhoven. Pages 199-210, 2016
67. Maher Helaoui and Wady Naanaa. A submodular-based decomposition strategy for valued CSPs. Proceedings of the Sixth Starting AI Researchers' Symposium (STAIRS), Montpellier, France. Pages 149-161, 2016
68. Mguiris Imen, Amdouni Hamida et Gammoudi Mohamed Mohsen. Fuzzy association rules mining: State of the Art. International Business Information Management Conference (28th IBIMA) 9-10 November 2016 in Seville, Spain. Pages --, 2016
69. Elmi, S., HadhjAli, A., Bach Tobji, M-A., Ben Yaghlane, B. Efficient distributed skyline over imperfect data modeled by the evidence theory. IEEE 28th International Conference on Tools with Artificial Intelligence (ICTAI). Pages 335-342, 2016
70. El Ghali M. et Jammeli A.. "Les dimensions de l'expérience médiatique vécue par les enfants : étude exploratoire avec les enfants tunisiens",. Actes de 28th IBIMA Conference , Séville 2016.. Pages -, 2016
71. Raik Aissaoui, Amine Dhraief, Abdelfattah Belghith, Hamid Menouer, Fethi Filali, and Hassan Mathkour. VALS: Vehicle-Aided location service in urban environment. IEEE Wireless Communications and Networking Conference (WCNC’16), Doha, Qatar. Pages 1-6, 2016
72. Imen Mahjri, Amine Dhraief, and Abdelfattah Belghith.. A three dimensional scalable and distributed conflict detection algorithm for unmanned aerial vehicles. IEEE Wireless Communications and Networking Conference (WCNC’16), Doha, Qatar. Pages 1-7, 2016
73. Vidal, G., Bechikh, R., Rhouma, R., Belghith, S. A commercial application of a chaos-based-stream cipher - Performance and Security analysis.. ICITST. Pages 39-44, 2016
74. . Trust levels toward Islamic banks in Tunisia: Users or not users it does matter?. GBATA Dubai. Pages , 2016
75. Bousnina, F.E., Elmi, S., Tobji, M.A.B., Chebbah, M., HadjAli, A., Yaghlane, B.B. Object-relational implementation of evidential databases.. ICDEc. Pages 80-87, 2016
76. Rim Jallouli, Mohamed Jallouli, Jihene Rekik, Mohamed Anis Bach Tobji, Amna Abidi, Nassim Bahr. The CEVEP medical application for innovative management of central venous port (CVP): Technical issues and research challenges.. ICDEc. Pages 68-73, 2016
77. Sayda Elmi, Allel Hadjali, Mohamed Anis Bach Tobji, Boutheina Ben Yaghlan. Imperfect top-k skyline query with confidence level.. AICCSA. Pages 1-8, 2016
78. Riadh Bouslimi, Mouhamed Gaith Ayadi, Jalel Akaich. Content Modelling in Radiological Social Network Collaboration.. BDAS. Pages 499-506, 2016
79. Riadh Bouslimi, Mouhamed Gaith Ayadi, Jalel Akaich. A Model for Semantic Medical Image Retrieval Applied in a Medical Social Network.. ITBAM. Pages 130-138, 2016
80. K. Kamoun and S. Ben Yahia. Stability assess based on enhanced information content similarity measure for ontology enrichment.. 4th International conference of Model and Data Engineering, Springer, Laranaca,Cyprus.. Pages 146-153, 2015
81. Aymen HajKacem , Ben N'Cir Chiheb-Eddine , Essoussi Nadia. Parallel K-prototypes for Clustering Big Data. ICCI 2015, Madrid, ESP. Pages 627-638, 2015
82. Aymen HajKacem , Ben N'Cir Chiheb-Eddine , Essoussi Nadia. MapReduce-based K-Prototypes Clustering Method for Big Data. DSAA, IEEE, Paris, France. Pages ..., 2015
83. Mguiris Imen, Amdouni Hamida et Gammoudi Mohamed Mohsen. New validation method of fuzzy association rules based on structural equation modeling. 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD'15), August 15-17, China. Pages 624-633, 2015
84. Bousnina, F-E., Bach Tobji, Chebbah, M., Liétard, L., Ben Yaghlane, B. A New Formalism for Evidential Databases. International Symposium on Methodologies for Intelligent Systems, Lyon, France. Pages 31-40, 2015
85. El Ghali M., Saied Ben Rached K. et Brée J.,. « L’expérience de la Téléréalité Vécue par les Enfants : les Motivations et les Freins à l’Egard de « La Star Academy »,. Actes de 25th IBIMA Conference , Amesterdam 2015.. Pages -, 2015
86. Maroua Meddeb, Amine Dhraief, Abdelfettah Belghith, Thierry Monteil, and Khalil Drira. Cache coherence in Machine-To-Machine Information Centric Networks. the 40th IEEE Conference on Local Computer Networks (LCN’15), Clearwater Beach, FL, USA. Pages 430–433, 2015
87. Mohamed Belhassen, Amine Dhraief, and Abdelfettah Belghith. City-Obstacles Im- pact on OLSR-Based Routing Protocols. Communication Technologies for Vehicles 8th International Workshop Nets4Cars/Nets4Trains/Nets4Aircraft, volume 9066 of Lecture Notes in Computer Science (LNCS), Sousse, Tunisia. Pages 47-59, 2015
88. Imen Mahjri, Amine Dhraief, and Abdelfettah Belghith. A Review on Collision Avoidance Systems for Unmanned Aerial Vehicles. Proceedings of the Communication Technologies for Vehicles : 8th International Workshop Nets4Cars/Nets4Trains/Nets4Aircraft, volume 9066 of Lecture Notes in Computer Science (LNCS), Sousse, Tunisia. Pages 203-214, 2015
89. Hajer Souri, Amine Dhraief, and Abdelfettah Belghith. TCP Application Recovery Improvement After Handover in Mobile Networks. Communication Technologies for Vehicles : 8th International Workshop Nets4Cars/Nets4Trains/Nets4Aircraft, volume 9066 of Lecture Notes in Computer Science (LNCS), Sousse, Tunisia. Pages 60-71, 2015
90. Belazi, A.,Rhouma, R.,Belghith, S.. A novel approach to construct S-box based on Rossler system. IWCMC 2015 - 11th International Wireless Communications and Mobile Computing Conference. Pages , 2015
91. Belazi, A.,Abd El-Latif, A.A.,Rhouma, R.,Belghith, S.. Selective image encryption scheme based on DWT, AES S-box and chaotic permutation. IWCMC 2015 - 11th International Wireless Communications and Mobile Computing Conference. Pages , 2015
92. . Sustainable development and education: a Tunisian case study.. GBATA Péniche/lisbon. Pages , 2015
93. Bousnina, F.E., Tobji, M.A.B., Chebbah, M., Liétard, L., Yaghlane, B.B. A New Formalism for Evidential Databases.. ISMIS. Pages 31-40, 2015
94. Chebbah, M., Kharoune, M., Martin, A., Yaghlane, B.B. Consid{é}rant la d{é}pendance dans la th{é}orie des fonctions de croyance.. CoRR. Pages , 2015
95. Chebbah, M., Martin, A., Yaghlane, B.B. Combining partially independent belief functions.. CoRR. Pages , 2015
96. Park, J., Chebbah, M., Jendoubi, S., Martin, A. Second-Order Belief Hidden Markov Models.. CoRR. Pages , 2015
97. . Satisfying QoS Requirements in NGN Networks using a dynamic adaptive Queuing Delay Control Method. The 10th International Conference on Future Networks and Communications (FNC 2015). Pages , 2015
98. Ghazel, C.,Saïdane, L.. Satisfying QoS requirements in NGN networks using a dynamic adaptive queuing delay control method. Procedia Computer Science. Pages , 2015
99. Ghazel, C.,Saidane, L.. Satisfying QoS requirements in NGN networks using an optimized resource control and management method. 2015 7th International Conference on New Technologies, Mobility and Security - Proceedings of NTMS 2015 Conference and Workshops. Pages , 2015
100. H. Guesmi, C. Ghazel, L. Saidane. Securing Data Storage in Cloud Computing. The 4rd International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN 2015). Pages , 2015
101. Yassine SLAMA. La responsabilité sociale des entreprises en Tunisie : état des lieux après la révolution. 16ème Université de Printemps de l’Audit Social, organisée par l’Institut d'Audit Sociale (IAS) et l’Université de Pékin, Pékin, Chine. Pages 699-705, 2014
102. Jammali, A., Bach Tobji, M-A., Martin, A., Ben Yaghlane, B. Indexing evidential data. The IEEE second World Conference on Complex Systems 2014, Agadir, Morocco. Pages 196 - 201, 2014
103. Elmi, S., Benouaret, K., HadjAli, A., Bach Tobji, M-A., Ben Yaghlane, B. Computing skyline from evidential data. International Conference on Scalable Uncertainty Management 2014, Oxford, UK. Lecture Notes in Artificial Intelligence, vol. 8720. Springer-Verlag. Pages 148—161, 2014
104. Yamen Koubaa, Rym Srarfi Tabbane et Manel Hamouda. A multiple Criteria Senior Segmentation : Case of the French market. Administrative Science Association of Canada 2014 Conference Muskoka, Ontario, Canada. Pages 00, 2014
105. Manel Hamouda et Rym Srarfi Tabbane. Gender Mediating Role in Electronic WOM Relationship and Purchase Intention: Proposal of a Conceptual Model. International Marketing Trends Conference 2014, Venice, Italy.. Pages 00, 2014
106. Hela masmoudi , Ben N'Cir Chiheb-Eddine , Essoussi Nadia. Identification de classes non-disjointes ayants des densités différentes. EGC 2014, Rennes, France. Pages 257-268, 2014
107. Rezgui Amira , Ben N'Cir Chiheb-Eddine , Essoussi Nadia. Généralisation des k-moyennes pour produire des recouvrements ajustables,. EGC 2014, Rennes, France. Pages 221-232, 2014
108. El Ghali M., Saied Ben Rached K. et Brée J.,. « Le processus d’Appropriation de l’Expérience Télévisuelle des Enfants. Cas de l’Emission de la « Star Academy »,. Actes de l’International Conference on Innovation in Business, Economics & Marketing Research (IBEM’14), Monastir 2014.-. Pages -, 2014
109. Raik Aissaoui, Hamid Mnaouer, Amine Dhraief, Fethi Filali, Abdelfettah Belghith, and Adnan Abu-Dayya. Advanced real-time traffic monitoring system based on V2X communications. IEEE International Conference on Communi- cations (ICC’14), Sydney, Australia. Pages 2713–2718, 2014
110. Imen Mahjri, Amine Dhraief, Issam Mabrouki, Abdelfettah Belghith, and Khalil Drira.. The coverage configuration protocol under AT-Dist localization. the 5th International Conference on Ambient Systems, Networks and Technologies (ANT’14), volume 32 of Procedia Computer Science, Hasselt, Belgium. Pages 141–148, 2014
111. Maroua Meddeb, Mehdi Ben Alaya, Thierry Monteil, Amine Dhraief, and Khalil Drira. M2M Platform with Autonomic Device Management Service. the 5th International Conference on Ambient Systems, Networks and Technologies (ANT’14), volume 32 of Procedia Computer Science, Hasselt, Belgium. Pages 1063-1070, 2014
112. Hajer Souri, Amine Dhraief, Syrine Tlili, Khalil Drira, and Abdelfettah Belghith. Smart Metering Privacy-preserving Techniques in a Nutshell.. the 5th International Conference on Ambient Systems, Networks and Technologies (ANT’14), volume 32 of Procedia Computer Science, Hasselt, Belgium. Pages 1087-1094, 2014
113. Imen Mahjri, Amine Dhraief, Issam Mabrouki, Abdelfettah Belghith, and Khalil Drira. An integrated framework for localization and coverage maintenance in wireless sensor networks. the 10th International Wireless Communications and Mobile Computing Conference (IWCMC’14), Nicosia, Cyprus. Pages 287-292, 2014
114. Hamdi, M.,Hermassi, H.,Rhouma, R.,Belghith, S.. A new secure and efficient scheme of ADPCM encoder based on chaotic encryption. 2014 1st International Conference on Advanced Technologies for Signal and Image Processing, ATSIP 2014. Pages , 2014
115. . A Tunisian pioneer Islamic bank:a case study of the quality of the website.. GBATA Baku. Pages , 2014
116. Chebbah, M.. Source Independence in the Theory of Belief Functions. (Indépendance des Sources dans la Théorie de l'évidence).. . Pages , 2014
117. Park, J., Chebbah, M., Jendoubi, S., Martin, A. Second-Order Belief Hidden Markov Models.. Belief Functions. Pages 284-293, 2014
118. Ghazel, C.,Saidane, L.. A novel QoS-aware method based on resource control and management in NGN networks. Proceedings - 2014 22nd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2014. Pages , 2014
119. Y. Abassi, C. Ghazel, L. Saidane. Cloud adoption: taxonomy, challenges and impact. The 3rd International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN 2014). Pages , 2014
120. H. Guesmi, C. Ghazel, L. Saidane. Survey on Security Issues in Cloud Computing. The 3rd International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN 2014). Pages , 2014
121. Rimah, A., Ghaith, M., Abir, S. Robust speech recognition using consensus function based on multi-layer networks. 2014 9th Iberian Conference on Information Systems and Technologies (CISTI). Pages 1--6, 2014
122. Rym Srarfi Tabbane et Mohsen Debabi. Effects of eWOM on Consumer Behavior: a Stimulus-Organism-Response Model Proposition. Direct / Interactive Marketing Research Summit, Marketing EDGE, Chicago, USA. Pages 00, 2013
123. Rym Srarfi Tabbane et Manel Hamouda. Exposure to eWOM and Consumer Behavior: Does Gender Matter?. 15th Annual International Conference on Globalizing Businesses for the Next Century: Visualizing and Developing Contemporary Approach to Harness Future Opportunities, GBATA 2013, Helsinki, Finland. Pages 00, 2013
124. Rym Srarfi Tabbane et Manel Hamouda. Impact of eWOM on the Tunisian Consumer’s Attitude towards the Product. Advances in Business-Related Scientific Research Conference, Venice, Italy. Pages 00, 2013
125. Ben N'Cir Chiheb-Eddine , Guillaume Cleuziou , Essoussi Nadia. Detecting overlapping clustering with small and parameterizable overlaps,,. ICCAT, IEEE, Sousse, Tunisia. Pages 1-6, 2013
126. Ben N'Cir Chiheb-Eddine , Guillaume Cleuziou , Essoussi Nadia. Un modèle générique pour les k-moyennes à recouvrements ajustables,. EGC-FDC, Toulouse, France. Pages 81-92, 2013
127. Ben N'Cir Chiheb-Eddine , Zenned Afef , Essoussi Nadia. Non-disjoint grouping of text documents based Word Sequence Kernel.,. EGC2013, Toulouse, France. Pages 253-262, 2013
128. Ben N'Cir Chiheb-Eddine , Essoussi Nadia. Non-Disjoint Cluster Analysis with Non-Uniform Density.,. MIKE2013, Tamil Nadu, India.. Pages 100-111, 2013
129. Ben N'Cir Chiheb-Eddine , Essoussi Nadia. On the Extension of k-means for Overlapping Clustering: Average or Sum of clusters' representatives ?.,. KDIR2013. Pages 208-213, 2013
130. Amdouni Hamida et Gammoudi Mohamed Mohsen. Visualization of a Synthetic Representation of Association Rules to Assist Expert Validation. Computer Science and Information Technology (CS & IT-CSCP 2013), DOI: 10.5121/csit.2013.3819, Sundarapandian et al. (Eds): ICAITA, SAI, SEAS, CDKP, CMCA. Pages 229–242, 2013
131. Amine Dhraief, Abdelfettah Belghith, Khalil Drira, Tarek Bouali, and Mohamed Amine Ghorbali. Autonomic management of the HIP-based M2M overlay network. Proceedings of the 4th International Conference on Ambient Systems, Networks and Technologies (ANT’13), volume 19 of Procedia Computer Science, Halifax, NS, Canada. Pages 98–105, 2013
132. Imen Jemili, Dhouha Ghrab, Abdelfettah Belghith, Bilel Derbel, and Amine Dhraief. Collision aware coloring algorithm for wireless sensor networks. the 9th International Wireless Communications and Mobile Computing Conference (IWCMC’13), Cagliari, Sardinia, Italy. Pages 1546–1553, 2013
133. Issam Mabrouki, Nesrine Ben Khalifa, Amine Dhraief, and Abdelfettah Belghith. CrossWalk: A novel cross-layer random walk data dissemination in wireless sensor networks. the 24th IEEE International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC’13), London, United Kingdom. Pages 2474–2478, 2013
134. Amine Dhraief, Mohamed Amine Ghorbali, Tarek Bouali, and Abdelfettah Belghith. Mobility management in the HIP-based M2M overlay network. the 22nd IEEE International Workshop on Enabling Technologies : Infrastructure for Colla- borative Enterprises (WETICE’13), Hammamet, Tunisia. Pages 50–55, 2013
135. Amine Dhraief, Khalil Drira, Abdelfettah Belghith, Tarek Bouali, and Mohamed Amine Ghorbali. Self-healing and Optimizing of the HIP-based M2M Overlay Network. the 10th International Conference on Autonomic Computing (ICAC’13), San Jose, CA, USA. Pages 183–192, 2013
136. Rafaa Tahar, Amine Dhraief, Abdelfettah Belghith, and Rafik Braham. TCP performance evaluation over multihomed networks. the International Conference on Computer Applications Technology (ICCAT’13), Sousse, Tunisia. Pages 1–6, 2013
137. Amine Dhraief, Mohamed Amine Ghorbali, Tarek Bouali, Abdelfettah Belghith, and Khalil Drira. Simultaneous mobility management in the HIP-based M2M overlay network. the 9th International Wireless Communications and Mobile Computing Conference (IWCMC’13), Cagliari, Italy. Pages 219-224, 2013
138. Dhouha Ghrab, Bilel Derbel, Imen Jemili, Amine Dhraief, Abdelfettah Belghith, and El-Ghazali Talbi. Coloring based hierarchical routing approach. Proceedings of the 4th International Conference on Ambient Systems, Networks and Technologies (ANT’13), Halifax, NS, Canada,. Pages 188-196, 2013
139. Zaghbani, S.,Rhouma, R.. Data hiding in spatial domain image using chaotic map. 2013 5th International Conference on Modeling, Simulation and Applied Optimization, ICMSAO 2013. Pages , 2013
140. Amine Dhraief, Hajer Souri, and Abdelfettah Belghith. Explicit MIPv6 handover cross-layer triggers and its impact on TCP Application recovery time. the International Conference on Computer Applications Technology (ICCAT’13),Sousse, Tunisia. Pages 1–8, 2013
141. . Consumer trust determinants in a Tunisian Bank: an exploratory study.. GBATA Helsinki. Pages , 2013
142. Mouhamed Gaith Ayadi, Riadh Bouslimi, Jalel Akaich. Extending UML for Conceptual Modeling of Annotation of Medical Images.. CoRR. Pages , 2013
143. Riadh Bouslimi, Abir Messaoudi, Jalel Akaich. Using a bag of Words for Automatic Medical Image Annotation with a Latent Semantic.. CoRR. Pages , 2013
144. Abir Messaoudi, Riadh Bouslimi, Jalel Akaich. Indexing Medical Images based on Collaborative Experts Reports. CoRR. Pages , 2013
145. Ghaith, M., Ouajdi, K. A Min-Max ANT colony algorithm for machine loop layout problem. 21st Mediterranean Conference on Control and Automation. Pages 741--747, 2013
146. Ghaith, M. Consensus function based on multi-layer networks technique. 2013 6th International Conference on Human System Interactions (HSI). Pages 252--256, 2013
147. Ghaith, M., Ouajdi, K. A Multi-Agent System to Solve a New Formulation of Machine Layout Problem. Advances in Sustainable and Competitive Manufacturing Systems: 23rd International Conference on Flexible Automation & Intelligent Manufacturing. Pages 1129--1139, 2013
148. Jallouli R. & Kasraoui A.. Business Intelligence et Management des Universités. ISKO-Maghreb, 3-4 nov, Hammamet. Pages -, 2012
149. Lamia Ketari, Munesh Chandra and Akheela Khanum. A Study of Image Spam Filtering Techniques. 4th IEEE International Conference on Com- putational Intelligence and Communication Networks, CICN 2012, Mathura, India. Pages 245-250, 2012
150. Rym Srarfi Tabbane et Manel Hamouda. Impact of Electronic Word-of-Mouth on Purchase Intention: Tunisian Consumer’s Case. 2nd International Symposium ISKO-Maghreb, Hammamet, Tunisie. Pages 00, 2012
151. K. Kamoun and S. Ben Yahia. Automatic Approach for Ontology Evolution based on Stability Evaluation.. 8th International Conference on Web Information Systems and Technologies (WEBIST 2012),Porto, Portugal. Pages 452-459, 2012
152. Ben N'Cir Chiheb-Eddine , Essoussi Nadia. Improved overlapping k-means for detecting overlapping clusters.,. MSDM2012, Hammamet, Tunisia. Pages 1-6, 2012
153. Ben N'Cir Chiheb-Eddine , Guillaume Cleuziou , Essoussi Nadia. Identification of Overlapping Clusters with Small Overlaps.,. EGC-Maghreb, Hammamet, Tunisia. Pages 26-32, 2012
154. Amine Dhraief, Mohamed Amine Ghorbali, Tarek Bouali, Abdelfettah Belghith, and Khalil Drira. A service-oriented framework for mobility and multihoming support. The 16th IEEE Mediterra- nean Electrotechnical Conference (MELECON’12), Hammamet, Tunisia. Pages 489–493, 2012
155. Amine Dhraief, Mohamed Amine Ghorbali, Tarek Bouali, Abdelfettah Belghith, and Khalil Drira. HBMON : A HIP based M2M overlay network. The 3rd International Conference on the Network of the Future (NOF’12), Tunis, Tunisia. Pages 1–8, 2012
156. . The combined effect of strength and favourability of associations as a source of brand equity: A survey on Tunisian women.. ICIMB london. Pages , 2012
157. Chebbah, M., Martin, A., Yaghlane, B.B. About Sources Dependence in the Theory of Belief Functions.. Belief Functions. Pages 239-246, 2012
158. Chebbah, M., Martin, A., Yaghlane, B.B. Positive and Negative Dependence for Evidential Database Enrichment.. IPMU. Pages 575-584, 2012
159. Riadh Bouslimi, Jalel Akaich. Using Hausdorff Distance for New Medical Image Annotation. CoRR. Pages , 2012
160. Houda Amraoui, Riadh Bouslim. Fault detection system for Arabic language. CoRR. Pages , 2012
161. Jallouli R. et Nahdi E.. Impact of Search Engine Marketing SEM on the Website Success. Information Systems and artificial intelligence SIIE, Casablanca, 17-19th February. Pages -, 2011
162. Mohammadi Akheela Khanum and Lamia Ketari. Trends in Combating Image Spam E-mails. In International Proceedings of Computer Science and Information Technology, CSIT 2011, Singapore. Pages 78-84, 2011
163. Lamia Ketari. Online Library for Graduation Projects Management: The OGPL System. In Proceedings of World Conference on Educational Multimedia, Hypermedia and Telecommunications, EdMedia 2011, Lisbon, Portugal. Pages 2017-2020, 2011
164. Ben N'Cir Chiheb-Eddine , Essoussi Nadia. Classification Recouvrante Bassée sur les Méthodes à Noyau,. JDS2011, Gammart, Tunisia. Pages 1-6, 2011
165. Amdouni Hamida et Gammoudi Mohamed Mohsen. Algorithms of association rules extraction: State of the Art. IEEE 3rd International Conference on Communication Software and Networks (ICCSN), May 27-29, China. Pages 333-339, 2011
166. Maher Helaoui and Wady Naanaa. Domain permutation reduction for valued CSPs. 11th Workshop on Preferences and Soft Constraints, Perugia, Italy. Pages 76-90, 2011
167. Amine Dhraief, Raik Aissaoui, and Abdelfettah Belghith. Parallel Computing the Longest Common Subsequence (LCS) on GPUs: Efficiency and Language Suitability. the 1st International Conference on Advanced Communications and Computation (INFOCOMP’11), Barcelona, Spain. Pages 143–148, 2011
168. Chebbah, M., Martin, A., Yaghlane, B.B. Mesure de concordance pour les bases de données évidentielles.. EGC. Pages 197-202, 2011
169. Jallouli R.. Interaction between International Retailers and local Retailers in Tunisia: Investment opportunities and strategic partnerships. 8 th Conference of the Society of Asian Retailing and Distribution SARD, University of Marketing and Distribution Sciences, Kobe, Japan, 26-28 november. Pages -, 2010
170. Bach Tobji, M-A., Ben Yaghlane, B. Maintaining Evidential Frequent Itemsets in Case of Data Deletion. The International Conference on Information Processing and Management of Uncertainty in Knowledge-based System 2010, Dortmund, Germany. Pages 218-227, 2010
171. K. Kamoun and S. Ben Yahia. Evolution des ontologies : un panorama,. 10ème Conférence Internationale Francophone « Extraction et Gestion des Connaissances » (EGC’10), Hammamet, Tunisie. Pages 20-29, 2010
172. Ben N'Cir Chiheb-Eddine , Essoussi Nadia , Patrice Bertrand. Overlapping clustering based on kernel similarity metric.,. MSDM2010, Hammamet, Tunisia. Pages 130-136, 2010
173. Ben N'Cir Chiheb-Eddine , Essoussi Nadia , Patrice Bertrand. Kernel overlapping k-means for clustering in feature space.,. KDIR2010, Valencia, ESP. Pages 250-256, 2010
174. Amdouni Hamida et Gammoudi Mohamed Mohsen. A customer profile extraction using Conceptual Decomposition of a Binary relation Algorithm. 3rd International Conference on Information Systems and Economic Intelligence (SIIE'2010), 18-20 February, Sousse. Pages **, 2010
175. Amdouni Hamida et Gammoudi Mohamed Mohsen. An Automatic Method for Ontology Construction based on Formal Concept Analysis. Proceedings of Workshop en Informatique et Applications (WIA) – February 12-14, Tozeur, Tunisia.. Pages --, 2010
176. Wady Naanaa, Maher Helaoui and Béchir El Ayeb. A decomposition method for valued CSPs. 10th International Workshop on Preferences and Soft Constraints, Saint Andrews, Scotland. Pages 143-159, 2010
177. Brée J., EL Ghali M. et Saied Ben Rached K.,. « La Star Academy libanaise : une expérience de consommation multidimensionnelle pour les enfants »,. Actes de 9ème congrès international de marketing des tendances. Pages -, 2010
178. El Ghali M., Saied Ben Rached K. et Brée J., (2010). La Star Academy comme objet de regroupement pour les enfants tunisiens : la naissance de la communauté « Star Academy ». Actes de 8ème Colloque International De L’association Tunisienne De Marketing, Sousse le 2 et 3 Avril 2010.. Pages -, 2010
179. Amine Dhraief and Abelfettah. Belghith. Suitability analysis of mobility and multihoming unification. the International Conference on Communication in Wireless Environments and Ubiquitous Systems : New Challenges (ICWUS’10), Sousse, Tunisia. Pages 1-6, 2010
180. Amine Dhraief, Zied Chedly, and Abdelfettah Belghith. The impact of mobile IPv6 on transport protocols an experimental investigation. the International Conference on Communication in Wireless Environments and Ubiquitous Systems: New Challenges (ICWUS), Sousse, Tunisia. Pages 1-6, 2010
181. Amira, H.,Rhouma, R.,Belghith, S.. An eigen value based watermarking scheme for tamper detection in gray level images. 2010 7th International Multi-Conference on Systems, Signals and Devices, SSD-10. Pages , 2010
182. Amine Dhraief and Abdelfettah Belghith. Multihoming support in the Internet : A state of the art. Proceedings of the International Conference on Models of Information and Communication Systems (MICS’10), Rabat, Morocco. Pages 1-8, 2010
183. Jallouli R., Khlif H. & Brahmi S.. Tunisian Call centers defy the crisis!,. 7th Conference of the Society of Asian Retailing and Distribution SARD, University of Marketing and Distribution Sciences, Chung Ang University, Seoul, Korea , 20-22 november. Pages -, 2009
184. Bach Tobji, M-A., Ben Yaghlane, B., Mellouli, K. Incremental Maintenance of Frequent Itemsets in Evidential Databases. the European Conference on Symbolic and Quantitative Approaches to Reasoning with Uncertainty 2009, Verona, Italy. Lecture Notes in Computer Science, vol. 5590. Springer Berlin/Heidelberg. Pages 457-468, 2009
185. Wady Naanaa, Maher Helaoui and Béchir El Ayeb. Algorithme de décomposition de domaine pour la satisfaction et l'optimisation de contraintes. Les Cinquièmes Journées Francophones de Programmation par contraintes, Orléans, France. Pages 375-384, 2009
186. Amine Dhraief and Nicolas Montavont. Rehoming decision algorithm: Design and empirical evaluation. the International Conference on Computational Science and Engineering (CSE ’09), Vancouver, Canada. Pages 464–469, 2009
187. Hermassi, H.,Rhouma, R.,Belghith, S.. A modified hyperchaos based image cryptosystem. 2009 6th International Multi-Conference on Systems, Signals and Devices, SSD 2009. Pages , 2009
188. Rhouma, R.,Arroyo, D.,Belghith, S.. A new color image cryptosystem based on a piecewise linear chaotic map. 2009 6th International Multi-Conference on Systems, Signals and Devices, SSD 2009. Pages , 2009
189. Hassine, A.,Rhouma, R.,Belghith, S.. A novel method for tamper detection and recovery resistant to vector quantization attak. 2009 6th International Multi-Conference on Systems, Signals and Devices, SSD 2009. Pages , 2009
190. Sébastien Barre, Amine Dhraief, Nicolas Montavont, and Olivier Bonaventure. MipShim6 : une approche combinée pour la mobilité et la multidomiciliation. 14ème Colloque Francophone sur l’Ingénierie des Protocoles (CFIP’09), Strasbourg, France. Pages 1-8, 2009
191. Ghazel, C.,Saïdane, L.. Achieving a QoS target in NGN networks via an efficient admission control strategy. Proceedings of the 8th International Conference on Networks, ICN 2009. Pages , 2009
192. Ghazel, C.,Saïdane, L.. An efficient admission control methodology for satisfying QoS requirements in NGN networks. Proceedings - International Conference on Advanced Information Networking and Applications, AINA. Pages , 2009
193. Bach Tobji, M-A., Ben Yaghlane, B., Mellouli, K. Frequent Itemset Mining from Databases Including One Evidential Attribute. Tthe Second International Conference on Scalable Uncertainty Management 2008, Napoli, Italia. Lecture Notes in Artificial Intelligence, vol. 5291. Springer-Verlag. Pages 19—32, 2008
194. Bach Tobji, M-A., Ben Yaghlane, B., Mellouli, K. A New Algorithm for Mining Frequent Itemsets from Evidential Databases. Tthe International Conference on Information Processing and Management of Uncertainty in Knowledge-based System 2008, Malaga, Spain. Pages 1535-1542, 2008
195. Bach Tobji, M-A., Abrougui, A., Ben Yaghlane, B. GUFI: a new algorithm for General Updating of Frequent Itemsets. Tthe 11th IEEE International Conference on Computational Science and Engineering – Workshops 2008, São Paulo, Brazil. Pages 45-52, 2008
196. Bach Tobji, M-A. Comparative Study Of Data Mining Query Languages. Tthe International Conference on Applied Computer 2008, Algavre, Portugal. Pages 259-268, 2008
197. Saied Ben Rached K. et EL GHALI M.,. «La Star Academy : une expérience de consommation pour les jeunes enfants et préadolescents tunisiens »,. Actes de 7ème journées normandes de la consommation, colloque consommation et société, Rouen, le 27 et 28 Mars 2008. . Pages -, 2008
198. Saied Ben Rached K. et El Ghali M.,. Le comportement des enfants et préadolescents face aux émissions de la téléréalité cas de la « Star Academy » : étude exploratoire »,. Actes de 7ème congrès international de marketing des tendances à Venise, du 17 au 19 Janvier 2008.. Pages -, 2008
199. Amine Dhraief, Tanguy Ropitault, and Nicolas Montavont. Mobility and multihoming management and strategies. the 14th Eunice Open European Summer School, Brest, France. Pages 1-8, 2008
200. Amine Dhraief and Nicolas Montavont. Toward Mobility and Multihoming Unification- The SHIM6 Protocol : A Case Study. Proceedings of the IEEE Wi- reless Communications and Networking Conference (WCNC’08), Las Vegas, USA. Pages 2840–2845, 2008
201. Ghazel, C.,Saïdane, L.. Dimensioning of Next Generation Networks signaling gateway for improving a quality of service target. Proceedings of the 2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008. Pages , 2008
202. Ghazel, C.,Saïdane, L.. Dimensioning of next generation networks multiservice gateway for achieving a quality of service target. Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008. Pages , 2008
203. Ghazel, C.,Saïdane, L.. Migration from traditional networks to converged next generation networks architecture with guaranteed quality of service. Proceedings - 2008 International Conference on Convergence and Hybrid Information Technology, ICHIT 2008. Pages , 2008
204. Cherif Ghazel, Leila Sadane. Next Generation Networks Dimensioning with Improved and Guaranteed Quality of Service. International Conference on Communications, Networking and Information Technology (ICCNIT 2008). Pages , 2008
205. S. Zghal, K. Kamoun, S. Ben Yahia, E. M. Nguifo et Y. Slimani. EDOLA : Une nouvelle méthode d'alignement d'ontologies OWL-Lite.. 4ième Conférence en Recherche d’Information et Applications (CORIA’07), St-Etienne, France. Pages 351-367, 2007
206. S. Zghal, K. Kamoun, S. Ben Yahia, E. M. Nguifo and Y. Slimani. A new alignment method for OWL-Lite ontologies using propagation of similarity over the graph. 18th International Conference on Database and Expert Systems Applications (DEXA’07), Regensburg, Germany. Pages 524-528, 2007
207. S. Zghal, K. Kamoun, S. Ben Yahia, E. M. Nguifo et Y. Slimani. Une nouvelle méthode d'alignement et de visualisation d'ontologies OWL-Lite.. Conférence d’Extraction et Gestion des Connaissances (EGC’07), Namur, Belgique. Pages 197-198, 2007
208. Amine Dhraief, Abdelfattah Belghith, Nicolas Montavont, Jean-Marie Bonnin, and Mohamed Kassab. NS2 based simulation framework to evaluate the performance of wireless distribution systems. The 2007 Spring Simulaiton Multiconference - Volume 1, SpringSim ’07, Norfolk, Virginia, USA. Pages 264–271, 2007
209. Rhouma, R.,Belghith, S.. Performance of a new Chaos-based Communication Scheme: The Reduced-Delay-Masked-DCSK. European Signal Processing Conference. Pages , 2007
210. Amine Dhraief, Nicolas Montavont, Romain Kuntz, and Manabu Tsukada.. E-Bicycle Demonstration on the Tour De France. the International Multi- Conference on Computing in the Global Information Technology (ICCGI’07), Guadeloupe, France. Pages 56– 56, 2007
211. Ghazel, C.,Saïdane, L.. An improved model for next generation networks with guaranteed end-to-end quality of service. ICON 2007 - Proceedings of the 2007 15th IEEE International Conference on Networks. Pages , 2007
212. Jallouli R.. The e-learning in Tunisia, How to succeed the implementation process?. Colloque international « les ruptures dans les sociétés d’information et l’économie de savoir», University Tunis El Manar, 15-16 february. Pages -, 2006
213. Jallouli R. et Zghal M.. Web and market orientation, The case of art product,. International Conference « Marketing in the area of ICT », Higher Institute of Management Tunis, 2- 3 november. Pages -, 2006
214. Bach Tobji, M-A., Gouider, M-S. Incremental Maintenance Of Association Rules Under Support Threshold Change. the International Conference on Applied Computer 2006, San Sebastian, Spain. Pages 91-98, 2006
215. Belaid Ajroud Henda et Amdouni Hamida. Incremental Clustering as a Tool for CRM. Proceedings of the 5th WSEAS International Conference on Telecommunications and Informatics, Istanbul, Turkey, May 27-29. Pages 260-266, 2006
216. Saied Ben Rached K. et El Ghali M.,. «L’influence de la couleur et des personnages sur la mémorisation du packaging par les enfants : Cas des petits gâteaux et des macaronis ». Actes du 4ème colloque international de l’ATM à Tunis, du 31Mars et 1er Avril 2006.. Pages -, 2006
217. Rhouma, R.,Safya, B.. A multidimensional map for a chaotic cryptosystem. European Signal Processing Conference. Pages , 2006
218. Hella Kaffel Ben Ayed and Safa Kaâbi. "Un protocole de communication pour enchères temps réel". Colloque Francophone sur l'Ingénierie des Protocoles (CFIP 2006), Tozeur, Tunisia.. Pages 12 p., 2006
219. Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Nadia Tawbi, Hamdi Yahyaoui, and Sami Zhioua. A Dynamic Compiler for Embedded Java Virtual Machines. In Proceedings of the 3rd Inter- national Conference on the Principles and Practice of Programming in Java, ACM PPPJ'2004, Las Vegas, Nevada, USA, ACM Press. Pages 100-107, 2004
220. Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Nadia Tawbi, Hamdi Yahyaoui, and Sami Zhioua. A Synergy between Efficient Interpretation and Fast Selective Dynamic Compilation for the Acceleration of Embedded Java Virtual Machines. In Pro- ceedings of the 3rd International Conference on the Principles and Practice of Programming in Java, ACM PPPJ'2004, Las Vegas, Nevada, USA, ACM Press. Pages 108-115, 2004
221. Ayed, H.K.B., Chihi, S.K., Kamoun, F. A Communication Architecture for Real-Time Auctions. Network Control and Engineering for QoS, Security and Mobility, {III} - {IFIP} {TC6} WG6.2, 6.6, 6.7 and 6.8 Third International Conference on Network Control and Engineering for QoS, Security and Mobility, . Pages 111--124, 2004
222. Mourad Debbabi, Lamia Ketari, and Hamdi Yahyaoui. A Java SIP Inter- face for Limited Connected Devices. In Proceedings of Wireless and Optical Communications Conference, IASTED' WOC'2003, Banff, Canada, IASTED Proceedings. Pages 560-565, 2003
223. Mourad Debbabi, Mourad Erhioui, Lamia Ketari, Nadia Tawbi, Hamdi Yah- yaoui, and Sami Zhioua. Method Call Acceleration in Embedded Java Virtual Machines. In Proceedings of the International Conference on Com- putational Science, ICCS'03, Lecture Notes in Computer Science, LNCS, Volume 2659, Melbourne, Australia, Springer Verlag. Pages 750-759, 2003
224. Safa Kaâbi. Evaluation de http , de l’Email, de NNTP et de l’IRC en fonction du besoin de e-négociation. Université de printemps de DNAC 2003, Internet ambiant et très hauts débits, Tozeur, Tunisie.. Pages 8 p., 2003
225. M. Elloumi, S. Kaâbi. Exact and Approximation Algorithms for the DNA Sequence Assembly Problem. 3rd World Conference on Systematics, Cybernetics and Informatics, and 5th International Conference on Information Systems Analysis and Synthesis, SCI'99/ISAS'99, Session : SCI in Biology and Medicine, (Orlando, Florida, U.S.A.), International Institu. Pages Vol. 8, p152-157, 1999
226. M. Elloumi, S. Kaâbi. DNA Sequence Assembly Algorithms. 2nd Workshop on Intelligent Control Systems, IC'98 (North Carolina, U.S.A.) : (Octobre 1998).. Pages 8 p., 1998
227. . Transcending boundaries: Kwame Dawes’s Digital Collaborations. . Pages , 0
1. Jallouli R.. Marketing Research and democracy in Tunisia. 9th international seminar of the Tunisian Association of Marketing, 8-9 April 2011, Hammamet. Pages -, 2015
2. Jallouli R.. NFC Technology, The case of cultural products »,. 6ème Journée sur les stratégies de développement culturel et création artistique : Enjeux défis et nouvelles perspectives, Laboratory of Research in Culture, New Technologies and development, Higher institute of Music, University of Tunis, 24 June. Pages -, 2010
3. Jallouli, R. Marketing & E-learning,. 5th International Conference of Tunisian association of Marketing, University El Manar, Hammamet, 13-14 April. Pages -, 2007