Publications
Ouvrages
1. Bach Tobji, M.A., Jallouli, R., Koubaa, Y., Nijholt, A. Digital Economy. Emerging Technologies and Business Innovation - Third International Conference, ICDEc 2018, Brest, France, May 3-5, 2018, Proceedings. Springer. 2018
2. Jallouli, R., Zaïane, O.R., Tobji, M.A.B., Tabbane, R.S., Nijholt, A. Digital Economy. Emerging Technologies and Business Innovation - Second International Conference, ICDEc 2017, Sidi Bou Said, Tunisia, May 4-6, 2017, Proceedings. Springer. 2017
3. Jallouli, R., Nasraoui, O., Tobji, M.A.B., Tabbane, R.S., Rhouma, R. International Conference on Digital Economy, ICDEc 2016, Carthage, Tunisia, April 28-30, 2016. IEEE. 2016
4. Jallouli, R., Nasraoui, O., Bach Tobji, M-A., Tabbane, R., Rhouma, R.. Proceedings of the International Conference on Digital Economy, ICDEc 2016. IEEE. 2016
5. Maher Helaoui. Informatique Théorique: Cours et Exercices Corrigés. Editions universitaires européennes. 2016
6. Yassine SLAMA. Expatriés et cadres locaux dans le cadre de l'internationalisation des entreprises. Centre de Publication Universitaire. 2014
7. R. Rhouma. Analyse et conception des cryptsystèmes à base de chaos. Presses Académiques Francophones. ISBN : 978-3-8416-2148-1. 2013
8. R. Rhouma. Contributions à la sécurisation de l'information par chaos. Editions universitaires europeennes. ISBN : 978-613-1-59291-1. 2011
Chapitre d'ouvrages
1. Abidi, A., Bach Tobji, M.A, Hadjali, A., Ben Yaghlane, B. Statistical Methods for Use in Analysis of Trust-Skyline Sets.. Enterprise Information Systems. Springer. Pages 413-427, 2017
2. Ikbal Chammakhi Msadaa,Amine Dhraief. Chapter I- Internet of Things in Support of Public Safety Networks : Opportunities and Challenges. Wireless Public Safety Networks, Volume Two : A Systematic Approach, ISBN 9781785480522. Elsevier. Pages 1-20, 2016
3. Abassi, Y.,Ghazel, C.,Saidane, L.. Autonomous intercloud reference architecture driven by interoperability. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). . Pages , 2016
4. Yassine SLAMA et Nathalie MONTARGOT. Regards croisés de cadres expatriés et locaux de filiales multinationales en Tunisie sur la pertinence de recourir à l’expatriation. Ambivalences. LARIME- ESSEC de Tunis. Pages 65-72, 2015
5. Rym Srarfi Tabbane and Mohsen Debabi. Electronic Word-of-Mouth: Definitions and Concepts. Capturing, Analyzing, and Managing Word-of-Mouth in the Digital Marketplace. IGI Global. Pages 1-27, 2015
6. Ben N'Cir Chiheb-Eddine , Guillaume Cleuziou , Essoussi Nadia. Overview of partitional overlapping clustering methods.. Partitional Clustering Algorithm (PCA). Springer. Pages 245-275, 2015
7. Zhang, T.J.,Manhrawy, I.M.,Abdo, A.A.,El-Latif, A.A.A.,Rhouma, R.. Cryptanalysis of elementary cellular automata based image encryption. Advanced Materials Research. . Pages , 2014
8. Amine Dhraief, Imen Mahjri, and Abdelfettah Belghith. Chapter VII- A Performance Evaluation of the Coverage Configuration Protocol and Its Applicability to Precision Agriculture. Multidisciplinary Perspectives on Telecommunications, Wireless Systems, and Mobile Computing, ISBN 1466647159. IGI Global. Pages 107–122, 2014
9. Chebbah, M., Kharoune, M., Martin, A., Yaghlane, B.B. Considérant la dépendance dans la théorie des fonctions de croyance.. Fouille de données complexes. . Pages 43-64, 2014
10. Rhouma, R.,Belghith, S.. Chaos-based cryptosystem in different modes of block encryption. Cryptography: Protocols, Design and Applications. . Pages , 2012
11. Chebbah, M., Martin, A., Yaghlane, B.B. Estimation de la fiabilité des sources des bases de données évidentielles.. Fouille de données complexes. . Pages 193-210, 2011
12. Jallouli, R. et Lassouad A.. Les indicateurs de performance dans le secteur de l’art ,. Approches Tunisiennes en Gestion: Entrepreneuriat et Investissement Culturel,s. Université de Paris I Panthéon Sorbonne/ CNR, Collection l’impensé du temp. Pages -, 2010
13. Jallouli R., Zghal M and Orsoni J.. Marketing et art, Est ce le grand écart?. Nouvelles approches en culture et développement,. Université de Paris I Panthéon Sorbonne/ CNR, Collection l’impensé du temps. Pages -, 2008
Articles de journaux
1. Bahri, N., Bach Tobji, M.A. On Indexing Evidential Data. International Journal of Approximate Reasoning. Vol. 106, Issue NA, Pages 63-87, 2019
2. Sellami, C., Miranda, C., Samet, A., Bach Tobji, M-A., de Beuvron, F.. On mining frequent chronicles for machine failure prediction. Journal of Intelligent Manufacturing. Vol. NA, Issue NA, Pages NA, 2019
3. Maroua Meddeb, Amine Dhraief Abdelfettag Belghith, Thierry Monteil, Khalil Drira, and Saad Al-Ahmadi. Named Data Networking A promisin g architecture for the Internet of things (IoT). International Journal on Semantic Web and Information Systems (IJSWIS), IGI. JCR 2016 : SCI Impact Factor=1.5, Q3. Vol. 14, Issue 2, Pages 1-19, 2018
4. Maroua Meddeb, Amine Dhraief , Abdelfettah Belghith, Thierry Monteil, and Khalil Drira. Cache Freshness in Named Data Networking for the Internet of Things. The Computer Journal, Oxford University Press , JCR 2017 : SCI Impact Factor=0.792, Q4. Vol. 61, Issue 10, Pages 1496-1511, 2018
5. Imen Mahjri,Samir Medjiah,Amine Dhraief,Khalil Drira,Abdelfettah Belghith. Weighted Localization in Mobile Wireless Networks. Wiley Internet Technology Letters. Vol. 1, Issue 1, Pages 1-6, 2018
6. Mohamed Belhassen, Amine Dhraief, Abdelfettah Belghith, Hassan Mathkour. ALOE: autonomic locating of obstructing entities in MANETs. Journal of Ambient Intelligence and Humanized Computing, Springer Berlin Heidelberg, JCR 2016 : SCI Impact Factor=1.588, Q3. Vol. 9, Issue 6, Pages 1955-1974, 2018
7. Maroua Meddeb, Amine Dhraief, Abdelfettah Belghith, Thierry Monteil, Khalil Drira, Sofien Gannouni. AFIRM: Adaptive forwarding based link recovery for mobility support in NDN/IoT networks. Future Generation Computer Systems, Elsevier (JCR 2016 Q1, IF= 4.639). Vol. 87, Issue 10, Pages 351-363, 2018
8. Bousnina, F.E., Bach Tobji, M.A., Chebbah, M., Yaghlane, B.B. Modeling evidential databases as possible worlds.. Int. J. Intell. Syst.. Vol. 33, Issue 6, Pages 1146-1164, 2018
9. Abidi, A., Elmi, S., Bach Tobji, M.A., HadjAli, A., Yaghlane, B.B. Skyline queries over possibilistic RDF data. Int. J. Approx. Reasoning. Vol. 93, Issue NA, Pages 277-289, 2018
10. T.Mellah. Effectiveness of the water resources allocation institution in Tunisia. Water Policy. Vol. 20, Issue 2, Pages 429-445, 2018
11. Zeineb Ayachi. The Effect of Culture and Gender on English Learning Strategies: The Case of Tunisian and German Learners. The Reading Matrix. Vol. 18, Issue 1, Pages 124-138, 2018
12. Imen Mahjri, Amine Dhraief, Abdelfettah Belghith, Sofien Gannouni, Issam Mabrouki, Maram AlAjlanc. Collision risk assessment in Flying Ad Hoc aerial wireless networks. Journal of Network and Computer Applications, Elsevier. JCR 2017 : SCI Impact Factor=3.991, Q1. Vol. 124, Issue 12, Pages 1-13, 2018
13. Bousnina, F.E., Tobji, M.A.B., Chebbah, M., Yaghlane, B.B. Modeling evidential databases as possible worlds.. Int. J. Intell. Syst.. Vol. 33, Issue 6, Pages 1146-1164, 2018
14. Maroua Meddeb, Amine Dhraief, Abdelfettah Belghith, Thierry Monteil, Khalil Drira, HassanMathkour. Least fresh first cache replacement policy for NDN-based IoT networks. Pervasive and Mobile Computing, Elsevier. JCR 2017 : SCI Impact Factor=2.974, Q1. Vol. pp, Issue pp, Pages pp, 2018
15. Aouedi, O., Bach Tobji, M.A., Abraham, A. Internet of Things and Ambient Intelligence for Mobile Health Monitoring. International Journal of Computer Information Systems and Industrial Management Applications. Vol. 10, Issue NA, Pages 261 - 271, 2018
16. Abdulrahman Jalal, Sofiane Ouni, Karim Kamoun and Bassam A Zafar. On Improving SPARQL Information Retrieval System for Semantic Internet of Things Applications. International Journal of Computer Applications. Vol. 181, Issue 2, Pages 30-37, 2018
17. Lamia Zaibi. Transcending Boundaries: Kwame Dawes’ Digital Projects. The Rupkatha Journal On Interdisciplinary Studies In Humanities. Vol. 9, Issue 3, Pages 115-124, 2017
18. Lamia Zaibi. Kwame Dawes. A City of Bones: A Testament. World Literaure Today. Vol. 91, Issue 5, Pages 85-86, 2017
19. Hamdi, M., Rhouma, R., Belghith, S. An appropriate system for securing real-time voice communication based on ADPCM coding and chaotic maps.. Multimedia Tools Appl.. Vol. 76, Issue 5, Pages 7105-7128, 2017
20. Saidi, M., Hermassi, H., Rhouma, R., Belghith, S. A new adaptive image steganography scheme based on DCT and chaotic map.. Multimedia Tools Appl.. Vol. 76, Issue 11, Pages 13493-13510, 2017
21. Hamdi, M., Rhouma, R., Belghith, S. A selective compression-encryption of images based on SPIHT coding and Chirikov Standard Map.. Signal Processing. Vol. 131, Issue , Pages 514-526, 2017
22. Imen Mahjri, Amine Dhraief, Abdelfettah Belghith, and Ahmad AlMogren. SLIDE : A Straight Line Conflict Detection and Alerting Algorithm for Multiple Unmanned Aerial Vehicles. IEEE Transactions on Mobile Computing (TMC). JCR 2017 : SCI Impact Factor=4.098, Q1. Vol. 17, Issue 5, Pages 1-17, 2017
23. Dr Dhouha DOGHRI. Several publications and articles in international scientific journals. international journals. Vol. 000, Issue 000, Pages pp, 2017
24. . The Impact of Social Professional Category Consumer’s on Acceptance Level Towards Islamic Banking Window. Chinese Business Review. Vol. , Issue , Pages , 2017
25. El Ghali M. et Jammeli A.. "The dimensions of the media experience lived by the children: exploratory study with the Tunisian children". Journal of Internet Social Networking and Virtual Communities. Vol. À paraître, Issue À paraître, Pages À paraître, 2017
26. Zeineb Ayachi. Peer and Teacher Assessment in EFL Writing Compositions: The Case Of Advanced English Major Students in Jendouba, Tunisia. The Reading Matrix. Vol. 17, Issue 1, Pages 156-168, 2017
27. Elmi, S., Bach Tobji, M.A., Hadjali, A., Yaghlane, B.B. Selecting skyline stars over uncertain databases - Semantics and refining methods in the evidence theory setting.. Appl. Soft Comput.. Vol. 57, Issue NA, Pages 88-101, 2017
28. Amine Dhraief, Abdelfettah Belghith, Hassan Mathkour, and Khalil Drira. An M2M gateway-centric architecture for autonomic healing and optimising of machine-to-machine overlay networks. International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), Inderscience. JCR 2016 , SCI Impact Factor=0.705, Q4. Vol. 26, Issue 1, Pages 12-28, 2017
29. T.Mellah & T. Ben Amor. Performance of the Tunisian Water Utilities: an input-distance function approach. Utilities Policy. Vol. 38, Issue -, Pages 18-32, 2016
30. Tawfik BEN AMOR and Thuraya MELLAH. COST EFFICIENCY OF TUNISIAN WATER DISTRIBUTION UTILITIES: AN HETEROSKEDASTIC STOCHASTIC COST FRONTIER APPROACH. Journal of Economics Theory (2016 Volume 10). Vol. 10, Issue 4, Pages 1-9, 2016
31. Thuraya Mellah and Tawfik Ben Amor. Performance of the Tunisian Water Utility: An input-distance function approach. Utility plicy. Vol. 38, Issue February 2016,, Pages Pages 18–32, 2016
32. Lamia Zaibi. “Rewriting the Tempest: George Lamming’s Water with Berries.”. Postcolonial Interventions 1. 2. Vol. 1, Issue 2, Pages 107-134, 2016
33. Lamia Zaibi. “Exploring Landscape: A comparative Study of George Lamming’s In the Castle of My Skin and Water with Berries.”. Subalternspeak: An International Journal of Postcolonial Studies. Vol. 4, Issue 3, Pages 48-59, 2016
34. Lamia Zaibi. “Pocomania Rituals and Identity in Andrew Salkey’s a Quality of Violence (1959).”. Global Journal of Human Social Science. Vol. 14, Issue 1, Pages 1-7, 2016
35. Maher Helaoui and Wady Naanaa. Modularity-based Decomposing for Valued CSP. Annals of Mathematics and Artificial Intelligence (AMAI). Vol. 67, Issue 2, Pages 165-187, 2016
36. Zeineb Ayachi. ELT EVALUATION: THE ISSUE OF IN-COMPANY ENGLISH TRAINING IN TUNISIA. Modern Journal of Language Teaching Methods. Vol. 6, Issue 3, Pages 97-106, 2016
37. Zeineb Ayachi. The main sources of language-skills-specific anxiety in Tunsian ESP students. TAYR. Vol. 3, Issue 2, Pages 10-53, 2016
38. Amine Dhraief, Abdelfettah Belghith, and Khalil Drira.. Regular and lightweight mobility management in the HIP-based M2M overlay network. International Jour-nal of Autonomous and Adaptive Communications Systems (IJAACS), Inderscience. Vol. 9, Issue 3/4, Pages 331-352, 2016
39. Imen Mahjri, Amine Dhraief, Abdelfattah Belghith, Khalil Drira, and Hassan Mathkour. A GPS-less Framework for Localization and Coverage Maintenance in Wireless Sensor Networks. KSII Transactions on Internet and Information Systems, JCR 2016, SCI Impact Factor=0.452, Q4. Vol. 10, Issue 1, Pages 96-116, 2016
40. Rafaa Tahar, Amine Dhraief, Abdelfattah Belghith, Hassan Mathkour, and Rafik Braham. Autonomous and adaptive beaconing strategy for multi-interfaced wireless mobile nodes. Wiley Wireless Communications and Mobile Computing, JCR 2016: SCI Impact Factor=1.899, Q2. Vol. 16, Issue 12, Pages 1625-1641, 2016
41. Jallouli R. & Raboudi F.. LES DÉRIVES DE LA DÉLOCALISATION: L'EXEMPLE DES CENTRES D'APPEL EN TUNISIE. Revue française du marketing. Vol. 2, Issue 5, Pages 77-84, 2015
42. Hermassi, H.,Hamdi, M.,Rhouma, R.,Belghith, S.M.. A joint encryption-compression codec for speech signals using the ITU-T G.711 standard and chaotic map. Multimedia Tools and Applications. Vol. , Issue , Pages , 2015
43. Mannai, O.,Bechikh, R.,Hermassi, H.,Rhouma, R.,Belghith, S.. A new image encryption scheme based on a simple first-order time-delay system with appropriate nonlinearity. Nonlinear Dynamics. Vol. , Issue , Pages , 2015
44. Bechikh, R.,Hermassi, H.,Abd El-Latif, A.A.,Rhouma, R.,Belghith, S.. Breaking an image encryption scheme based on a spatiotemporal chaotic system. Signal Processing: Image Communication. Vol. , Issue , Pages , 2015
45. Elmi, S., Benouaret, K., HadhjAli, A., Bach Tobji, M-A., Ben Yaghlane, B. Requêtes Skyline en présence des données évidentielles. Revue des Nouvelles Technologies de l'Information, Extraction et Gestion des Connaissances. Vol. RNTI-E-, Issue 28, Pages 215-220, 2015
46. Lamia Ketari and Mohammadi Akheela Khanum. Impact of Facebook Usage on the Academic Grades: A case study. Journal of Computing. Vol. 5, Issue 1, Pages 44-49, 2015
47. Lamia Ketari and Akheela Khanum. A Review of Malicious Code Detection Techniques for Mobile Devices. International Journal of Com- puter Theory and Engineering. Vol. 4, Issue 2, Pages 212-216, 2015
48. Manel Hamouda et Rym Srarfi Tabbane. Impacte du BAO électronique sur l’intention d’achat du consommateur: le role modérateur de l’âge et du genre. La Revue Gestion et Organisation. Vol. 6, Issue 1, Pages 39-46, 2015
49. Ben N'Cir Chiheb-Eddine , Essoussi Nadia. Using Sequences of Words for Non-Disjoint Grouping of Documents.,. International journal of Pattern Recognition and Artificial Intelligence (IJPRAI),. Vol. 29, Issue (3), Pages 1-20, 2015
50. Ben N'Cir Chiheb-Eddine , Essoussi Nadia , Mohamed Limam. Kernel-Based Methods to Identify Overlapping Clusters with Linear and Nonlinear Boundaries. Journal of classification. Vol. 32, Issue (2), Pages 176-211, 2015
51. Raéf BAHRINI. Productivity of MENA Islamic banks: a bootstrapped Malmquist Index approach. International Journal of Islamic and Middle Eastern Finance and Management. Vol. 8, Issue 4, Pages 508-528, 2015
52. Amdouni Hamida et Gammoudi Mohamed Mohsen. Semi-Automatic Method to Assist Expert for Association Rules Validation. International Journal of Computer, Electrical, Automation, Control and Information Engineering. Vol. 9, Issue 8, Pages 1888-1896, 2015
53. Zeineb Ayachi. Adult Learning Strategies in an Onsite Training Program in Tunisia. The Reading Matrix. Vol. 15, Issue 2, Pages 80-100, 2015
54. Chebbah, M., Martin, A., Yaghlane, B.B. Combining partially independent belief functions.. Decision Support Systems. Vol. 73, Issue , Pages 37-46, 2015
55. imen Jemili, Dhouha Ghrab, Amine Dhraief, Abdelfettah Belghith, Bilel Derbel, Ahmed Al-Mogren, and Hassan Mathkour. CHRA - a coloring based hierarchical routing algorithm. Journal of Ambient Intelligence and Humanized Computing, Springer Berlin Heidelberg. 2015 JCR, SCI Impact Factor=0.835, Q4. Vol. 6, Issue 1, Pages 69-82, 2015
56. Raik Aissaoui, Amine Dhraief, Abdelfettah Belghith, Hamid Menouer, Hassan I. Mathkour, Fethi Filali, and Adnan Abu-Dayya. HCBLS - A Hierarchical Cluster-Based Location Service in Urban Environment. Mobile Information Systems. JCR 2015, SCI Impact Factor=1.462, Q2. Vol. 2015, Issue 2015, Pages 1-16, 2015
57. Abdelfettah Belghith, Mohamed Belhassen, Amine Dhraief, NourElhouda Dougui, and Hassan Mathkour. Autonomic Obstacle Detection and Avoidance in MANETs Driven by Cartography Enhanced OLSR. Mobile Information Systems. 2015 JCR, SCI Impact Factor=1.462, Q2. Vol. 2015, Issue 2015, Pages 1-18, 2015
58. Yassine SLAMA. Le rôle des salariés locaux dans le processus d'adaptation des expatriés dans le cadre de la multinationalisation des firmes. Revue Française de Gestion. Vol. 40, Issue 239, Pages 51-63, 2014
59. Koubaâ Y.,Tabbane R. & Jallouli R. On the use of structural equation modeling in marketing image research. Asia Pacific Journal of Marketing and Logistics. Vol. 26, Issue 2, Pages 315-338, 2014
60. Belazi, A.,Hermassi, H.,Rhouma, R.,Belghith, S.. Algebraic analysis of a RGB image encryption algorithm based on DNA encoding and chaotic map. Nonlinear Dynamics. Vol. , Issue , Pages , 2014
61. Yamen Koubaa, Rym Srarfi Tabbane et Rim Jallouli Chaabouni. On the Use of Structural Equations Modeling in Marketing Image Research. Asia Pacific Journal of Marketing and Logistics. Vol. 26, Issue 2, Pages 315-338, 2014
62. Ben N'Cir Chiheb-Eddine , Guillaume Cleuziou , Essoussi Nadia. Generalization of c-means for identifying non-disjoint clusters with overlap regulation,. Pattern Recognition Letters. Vol. 45, Issue (1), Pages 92-98, 2014
63. El Ghali M., Saied Ben Rached K. et Brée J.,. « Le processus d’Appropriation de l’Expérience Télévisuelle des Enfants. Cas de l’Emission de la « Star Academy ». International Journal of Business & EconomicStrategy (IJBES). Vol. 2, Issue -, Pages -, 2014
64. Hermassi, H.,Rhouma, R.,Belghith, S.. Improvement of an image encryption algorithm based on hyper-chaos. Telecommunication Systems. Vol. , Issue , Pages , 2013
65. Hermassi, H.,Belazi, A.,Rhouma, R.,Belghith, S.M.. Security analysis of an image encryption algorithm based on a DNA addition combining with chaotic maps. Multimedia Tools and Applications. Vol. , Issue , Pages , 2013
66. Manel Hamouda et Rym Srarfi Tabbane. Impact of Electronic Word of Mouth Evaluation on Purchase Intention: The Mediating Role of Attitude toward the Product. International Journal of Online Marketing. Vol. 3, Issue 2, Pages 20-37, 2013
67. Maher Helaoui, Wady Naanaa, and Béchir El Ayeb. Submodularity-based Decomposing for Valued CSP.. International Journal on Artificial Intelligence Tools (IJAIT). Vol. 22, Issue 2, Pages 1-20, 2013
68. Jean-Marc Bardet, Hatem Bibi.. Adaptive semiparametric wavelet estimator and goodness-of-fit test for long memory linear processes. Electronic Journal of Statistics, Institute of Mathematical Statistics and Bernoulli Society,. Vol. 6, Issue 0, Pages 2382-2419, 2012
69. KS Søilen, MA Kovacevic, R Jallouli. Key success factors for Ericsson mobile platforms using the value grid model. Journal of Business Research JBR. Vol. 65, Issue 9, Pages 1335-1345, 2012
70. Jallouli R., Raboudi F. and Koubâa Y.. Customer knowledge management: Implementation and added-value. ecch the case for learning UK and USA. Vol. Ref., Issue Ref. 912-007-1, Pages 17p, 2012
71. Hermassi, H.,Rhouma, R.,Belghith, S.. Security analysis of image cryptosystems only or partially based on a chaotic permutation. Journal of Systems and Software. Vol. , Issue , Pages , 2012
72. BAHRINI Raéf. Efficiency and productivity analysis of Tunisian banks during a recent deregulation period. The Journal of Management and Business Research. Vol. 2, Issue 2, Pages 68-82, 2012
73. K. Kamoun and S. Ben Yahia,. content similarity measure to assess stability during ontology enrichment. International Review on Computer and Software (IRECOS). Vol. 7, Issue 3, Pages 1020-1027, 2012
74. K. Kamoun and S. Ben Yahia. A Novel Global Measure Approach based on Ontology Spectrum to Evaluate Ontology Enrichment. International Journal of Computer Applications. Vol. 39, Issue 17, Pages 23-30, 2012
75. Ben N'Cir Chiheb-Eddine , Essoussi Nadia. Recognition of overlapping Patterns with Linear and Non-Linear Separations using Positive Definite Kernels.. International Journal of Computer Application (IJCA),. Vol. Volume 53, Issue (1), Pages 1-8, 2012
76. Amine Dhraief, Imen Mahjri, and Abdelfettah Belghith. A Performance Evaluation of the Coverage Configuration Protocol Under Location Errors, Irregular Sensing Patterns, and a Noisy Channel. International Journal of Business Data Communications and Networking, IGI. Vol. 8, Issue 3, Pages 28-41, 2012
77. Amine Dhraief and Abdelfettah Belghith. An Experimental Investigation of the Impact of Mobile IPv6 Handover on Transport Protocols. Smart Computing Review, KAIS. Vol. 2, Issue 1, Pages 1-17, 2012
78. Solak, E.,Rhouma, R.,Belghith, S.. Breaking an orbit-based symmetric cryptosystem. Mathematical and Computer Modelling. Vol. , Issue , Pages , 2011
79. Kumar, A.,Rhouma, R.,Wang, Y.,Sklavos, N.,Ghose, M.K.. Comments on, " A blind source separation-based method for multiple images encryption". Communications in Nonlinear Science and Numerical Simulation. Vol. , Issue , Pages , 2011
80. Rhouma, R.,Belghith, S.. Cryptanalysis of a chaos-based cryptosystem on DSP. Communications in Nonlinear Science and Numerical Simulation. Vol. , Issue , Pages , 2011
81. BAHRINI Raéf. Empirical analysis of non-performing loans in the case of Tunisian banks. Journal of Business Studies Quarterly. Vol. 3, Issue 1, Pages 230-245, 2011
82. Amdouni Hamida et Gammoudi Mohamed Mohsen. CondClose: A new algorithm of association rules extraction. International Journal of Computer Science Issues (IJCSI). Vol. 8, Issue 4, Pages 550-560, 2011
83. Bach Tobji, M-A., Ben Yaghlane, B. Extraction des itemsets fréquents à partir de données imparfaites : application à une base de données éducationnelles. Revue des Nouvelles Technologies de l'Information, Fouille de données complexes-Complexité liée aux données multiples. Vol. RNTI-E-, Issue 21, Pages 211-231, 2011
84. Amine Dhraief and Abdelfettah Belghith. Mobility Impact on Session Survivability under the SHIM6 Protocol and Enhancement of its Rehoming Procedure. Journal of Networks, Academy Publisher. Vol. 6, Issue 11, Pages 1521-1532, 2011
85. Arroyo, D.,Li, S.,Amigó, J.M.,Alvarez, G.,Rhouma, R.. Comment on "Image encryption with chaotically coupled chaotic maps". Physica D: Nonlinear Phenomena. Vol. , Issue , Pages , 2010
86. Solak, E.,Rhouma, R.,Belghith, S.. Cryptanalysis of a multi-chaotic systems based image cryptosystem. Optics Communications. Vol. , Issue , Pages , 2010
87. Rhouma, R.,Solak, E.,Belghith, S.. Cryptanalysis of a new substitution-diffusion based image cipher. Communications in Nonlinear Science and Numerical Simulation. Vol. , Issue , Pages , 2010
88. Hermassi, H.,Rhouma, R.,Belghith, S.. Joint compression and encryption using chaotically mutated Huffman trees. Communications in Nonlinear Science and Numerical Simulation. Vol. , Issue , Pages , 2010
89. Tawfik Ben Amor and Mohamed Goaied. "Stochastic Varying Coefficient Frontier Model in the Estimation of Technical Efficiency and Technical Efficiency of Specific Input". Agricultural Journal. Vol. Vol 5, Issue 6, Pages p 329-337, 2010
90. Tawfik Ben Amor and Christophe Muller. "Application of Stochastic Production Frontier in the Estimation of Technical Efficiency of Irrigated Agriculture in Tunisia". Agricultural Journal. Vol. 5, Issue 2, Pages p50-56., 2010
91. Ghazel, C.,Saïdane, L.. Dimensioning of NGN main components with improved and guaranteed quality of service. Journal of Networks. Vol. , Issue , Pages , 2010
92. Ghazel, C,Saidane, L. Next generation networks dimensioning for improving and guaranteeing quality of service. The International Journal of Networks (JNW). Vol. , Issue , Pages , 2010
93. Rhouma, R.,Solak, E.,Arroyo, D.,Li, S.,Alvarez, G.,Belghith, S.. Comment on "Modified Baptista type chaotic cryptosystem via matrix secret key" [Phys. Lett. A 372 (2008) 5427]. Physics Letters, Section A: General, Atomic and Solid State Physics. Vol. , Issue , Pages , 2009
94. Rhouma, R.,Belghith, S.. Cryptanalysis of a spatiotemporal chaotic cryptosystem. Chaos, Solitons and Fractals. Vol. , Issue , Pages , 2009
95. Rhouma, R.,Meherzi, S.,Belghith, S.. OCML-based colour image encryption. Chaos, Solitons and Fractals. Vol. , Issue , Pages , 2009
96. C. Ghazel, L. Saidane. An Improved Admission Control Approach for Achieving QoS Targets in NGN Networks. MASAUM Journal of Computing (MJC). Vol. , Issue , Pages , 2009
97. C. Ghazel, L. Saidane. Dimensioning of Next Generation Networks Signaling Gateway for Achieving a Quality of Service Target. International Journal of Hybrid Information Technology (IJHIT). Vol. , Issue , Pages , 2009
98. Jean-Marc Bardet, Hatem Bibi, Abdellatif Jouini.. Adaptive wavelet based estimator of the memory parameter for stationary Gaussian processes. Bernoulli Society for Mathematical Statistics and Probability. Vol. 14, Issue 3, Pages .691-724., 2008
99. Hatem Bibi, Abdellatif Jouini, M. Kratou. More general constructions of wavelets on the interval. Communications in Mathematical Analysis. Vol. 4, Issue 1, Pages 45-47, 2008
100. Rhouma, R.,Belghith, S.. Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Physics Letters, Section A: General, Atomic and Solid State Physics. Vol. , Issue , Pages , 2008
101. Rhouma, R.,Belghith, S.. Cryptanalysis of a spatiotemporal chaotic image/video cryptosystem. Physics Letters, Section A: General, Atomic and Solid State Physics. Vol. , Issue , Pages , 2008
102. Arroyo, D.,Rhouma, R.,Alvarez, G.,Li, S.,Fernandez, V.. On the security of a new image encryption scheme based on chaotic map lattices. Chaos. Vol. , Issue , Pages , 2008
103. Rhouma, R.,Safya, B.. On the security of a spatiotemporal chaotic cryptosystem. Chaos. Vol. , Issue , Pages , 2007
104. . Performance of a new Chaos-based Communication Scheme: The Reduced-Delay-Masked-DCSK. European Signal Processing Conference. Vol. , Issue , Pages , 2007
105. . A multidimensional map for a chaotic cryptosystem. European Signal Processing Conference. Vol. , Issue , Pages , 2006
106. Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Nadia Tawbi, Hamdi Yahyaoui, and Sami Zhioua. E-Bunny: A Dynamic Compiler for Embedded Java Virtual Machines.. Journal of Object Technology. Vol. 4, Issue 1, Pages 83-108, 2005
107. Henda Bélaïd Ajroud, Ali Jaoua, S. Kaabi. Classes extraction from procedural programs. Elsevier, Information Sciences, February 2002,. Vol. Volume 140, Issue Issues 3–4, Pages pages 283-294, 2002
Articles de conférence
1. Safa Kaabi and Rim Jallouli. Overview of E-commerce Technologies, Data Analysis Capabilities and Marketing Knowledge. International Conference on Digital Economy ICDEc19, 15-18 April 2019, Beirut, Lebanon. Pages 12 p., 2019
2. . Antecedents of Trust toward Islamic Banks: a proposal of an explanatory Model. ATM Hammamet. Pages , 2018
3. Jendoubi, S., Chebbah, M., Martin, A. Evidential Independence Maximization on Twitter Network.. BELIEF. Pages 121-128, 2018
4. Bousnina, F.E., Chebbah, M., Tobji, M.A.B., Hadjali, A., Yaghlane, B.B. Evidential Top-k Queries Evaluation - Algorithms and Experiments.. IPMU. Pages 407-417, 2018
5. Chehibi, M., Chebbah, M., Martin, A. Independence of Sources in Social Networks.. IPMU. Pages 418-428, 2018
6. Chehibi, M., Chebbah, M., Martin, A. Independence of Sources in Social Networks.. CoRR. Pages , 2018
7. Bousnina, F.E., Chebbah, M., Bach Tobji, M.A., Hadjali, A., Yaghlane, B.B. Evidential Top-k Queries Evaluation - Algorithms and Experiments. IPMU. Pages 407-417, 2018
8. Abidi, A., Bach Tobji, M.A., Hadjali, A., Yaghlane, B.B. A General Framework for Querying Possibilistic RDF Data.. ICTAI. Pages 158-162, 2018
9. Aouedi, O., Bach Tobji, M.A., Abraham, A. An Ensemble of Deep Auto-encoders for Healthcare Monitoring. HIS. Pages 1-18, 2018
10. Sellami, C., Samet, A., Bach Tobji. Frequent Chronicle Mining: Application on Predictive Maintenance. IEEE ICMLA. Pages 1-6, 2018
11. . A novel Architecture Design Based on Resources Allocation and Quality of Service in Cloud Computing. International Conference on Sciences of Electronic, Technologies of Information and Telecommunications (SETIT2018). Pages , 2018
12. H. Guesmi, C. Ghazel, L. Saidane. A novel Fast Entropy-based Detection Strategy against Unfair Rating Attacks for Trust Computing in Cloud Environments. The 2018 International Conference on High Performance Computing & Simulation (HPCS 2018). Pages , 2018
13. R. Haiahem, C. Ghazel, L. Saidane. An Alternative Data Gathering of the air Pollutants In the Urban Environment using LoRa and LoRaWAN. The 14th International Wireless Communications and Mobile Computing Conference (IWCMC 2018). Pages , 2018
14. Bouchaala, M.,Ghazel, C.,Saidane, L.A.,Kamoun, F.. End to end cloud computing architecture based on a novel classification of security issues. Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA. Pages , 2018
15. R. Haiahem, C. Ghazel, L. Saidane, S. Boumerdassi. Surveying and Analyzing Urban Environment Approaches of Air Quality Monitoring. The 4th International Conference on Mobile, Secure and Programmable Networking (MSPN 2018). Pages , 2018
16. Saidi, M., Hermassi, H., Rhouma, R., Belghith, S. Uniformly Spread Embedding Based Steganography.. ICDEc. Pages 162-172, 2017
17. . The impact of social professional category on consumers’ acceptance level towards Islamic banking window.. GBATA Vienna. Pages , 2017
18. Elmi, S., Hadjali, A., Tobji, M.A.B., Yaghlane, B.B. Skyline Computation and Maintenance over Imperfect Databases - A Marginal-Points-Based Approach.. ICTAI. Pages 1234-1242, 2017
19. Bousnina, F.E., Elmi, S., Chebbah, M., Tobji, M.A.B., HadjAli, A., Yaghlane, B.B. Skyline Operator over Tripadvisor Reviews Within the Belief Functions Framework.. ICDEc. Pages 186-197, 2017
20. Abidi, A., Tobji, M.A.B., Hadjali, A., Yaghlane, B.B. Skyline Modeling and Computing over Trust RDF Data.. ICEIS. Pages 634-643, 2017
21. Abidi, A., Bahri, N., Tobji, M.A.B., HadjAli, A., Yaghlane, B.B. First Steps Towards an Electronic Meta-journal Platform Based on Crowdsourcing.. ICDEc. Pages 175-185, 2017
22. Zeineb Ayachi. Speaking anxiety, order or disorder?. Jendouba, Tunisia. Pages 199-220, 2017
23. Bousnina, F.E., Chebbah, M., Bach Tobji, M.A., Hadjali, A., Yaghlane, B.B. On Top-K Queries Over Evidential Data.. ICEIS, Portugal. Pages 106-113, 2017
24. Maroua Meddeb, Amine Dhraief, Abdelfettah Belghith, Thierry Monteil, and Khalil Drira. Producer Mobility support in Named Data Internet of Things Network. International Conference on Ambient Systems, Networks and Techno- logies (ANT’17), volume 109 of Procedia Computer Science, Madeira, Portugal. Pages 1067 – 1073, 2017
25. Bousnina, F.E., Elmi, S., Chebbah, M., Tobji, M.A.B., HadjAli, A., Yaghlane, B.B. Skyline Operator over Tripadvisor Reviews Within the Belief Functions Framework.. ICDEc. Pages 186-197, 2017
26. Bousnina, F.E., Chebbah, M., Tobji, M.A.B., Hadjali, A., Yaghlane, B.B. On Top-K Queries Over Evidential Data.. ICEIS. Pages 106-113, 2017
27. Elmi, S., Hadjali, A., Bach Tobji, M.A., Yaghlane, B.B. Skyline Computation and Maintenance over Imperfect Databases - A Marginal-Points-Based Approach.. ICTAI. Pages 1234-1242, 2017
28. Jelassi, M.,Ghazel, C.,Saidane, L.A.. A survey on quality of service in cloud computing. 2017 3rd International Conference on Frontiers of Signal Processing, ICFSP 2017. Pages , 2017
29. Cherif Ghazel,Yosra Abassi,Leila Saidane. An Improved Security Architecture for an InterCloud Reference Model. 2017 European Conference on Electrical Engineering and Computer Science (EECS). Pages , 2017
30. M. Bouchaala, C. Ghazel, L, Saidane, F. Kamoun. Surveying and Analyzing Access Control Models in Cloud Computing. Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP 2017). Pages , 2017
31. Imen Mguiris, Hamida Amdouni et Mohamed Mohsen Gammoudi. An Algorithm for Fuzzy Association Rules Extraction Based on Prime Number Coding.. WETICE. Pages 182-184, 2017
32. Maroua Meddeb, Amine Dhraief, Abdelfettah Belghith, Thierry Monteil, and Khalil Drira. How to cache in ICN/IoT environments ?. 17th IEEE/ACS International Conference of Computer Systems and Applications (AICCSA’17) Hammamet, Tunisia. Pages 1-8, 2017
33. Vidal, G., Bechikh, R., Rhouma, R., Belghith, S. A commercial application of a chaos-based-stream cipher - Performance and Security analysis.. ICITST. Pages 39-44, 2016
34. Ounifi Mohamed Sami, Amdouni Hamida, Ben Elhoussine Rafika et Slimane Hammoudi. New 3D Visualization and Validation Tool for Displaying Association Rules and Their Associated Classifiers. 20th International Conference Information Visualisation, Universidade NOVA de Lisboa, Lisbon, July 19-22, Portugal. Pages 152-158, 2016
35. Jallouli, R., Jallouli, M., Rekik, J., Bach Tobji, M-A., Abdi, A., Bahri, N. The CEVEP medical application for innovative management of central venous port (CVP): Technical issues and research challenges. International Conference on Digital Economy (ICDEc 2016), Tunisia, Carthage. Pages 68-73, 2016
36. Bousnina, F-E., Elmi, S., Bach Tobji, Chebbah, M., HadjAli, A., Ben Yaghlane, B. Object-relational implementation of evidential databases. International Conference on Digital Economy (ICDEc 2016), Tunisia, Carthage. Pages 80-87, 2016
37. Elmi, S., HadjAli, A., Bach Tobji, M-A., Ben Yaghlane, B. Efficient Skyline Maintenance over Frequently Updated Evidential Databases. Information Processing and Management of Uncertainty in Knowledge-Based Systems, Netherlands, Eindhoven. Pages 199-210, 2016
38. Maher Helaoui and Wady Naanaa. A submodular-based decomposition strategy for valued CSPs. Proceedings of the Sixth Starting AI Researchers' Symposium (STAIRS), Montpellier, France. Pages 149-161, 2016
39. Mguiris Imen, Amdouni Hamida et Gammoudi Mohamed Mohsen. Fuzzy association rules mining: State of the Art. International Business Information Management Conference (28th IBIMA) 9-10 November 2016 in Seville, Spain. Pages --, 2016
40. . Trust levels toward Islamic banks in Tunisia: Users or not users it does matter?. GBATA Dubai. Pages , 2016
41. Elmi, S., HadhjAli, A., Bach Tobji, M-A., Ben Yaghlane, B. Efficient distributed skyline over imperfect data modeled by the evidence theory. IEEE 28th International Conference on Tools with Artificial Intelligence (ICTAI). Pages 335-342, 2016
42. El Ghali M. et Jammeli A.. "Les dimensions de l'expérience médiatique vécue par les enfants : étude exploratoire avec les enfants tunisiens",. Actes de 28th IBIMA Conference , Séville 2016.. Pages -, 2016
43. Bousnina, F.E., Elmi, S., Tobji, M.A.B., Chebbah, M., HadjAli, A., Yaghlane, B.B. Object-relational implementation of evidential databases.. ICDEc. Pages 80-87, 2016
44. Raik Aissaoui, Amine Dhraief, Abdelfattah Belghith, Hamid Menouer, Fethi Filali, and Hassan Mathkour. VALS: Vehicle-Aided location service in urban environment. IEEE Wireless Communications and Networking Conference (WCNC’16), Doha, Qatar. Pages 1-6, 2016
45. Imen Mahjri, Amine Dhraief, and Abdelfattah Belghith.. A three dimensional scalable and distributed conflict detection algorithm for unmanned aerial vehicles. IEEE Wireless Communications and Networking Conference (WCNC’16), Doha, Qatar. Pages 1-7, 2016
46. Belazi, A.,Rhouma, R.,Belghith, S.. A novel approach to construct S-box based on Rossler system. IWCMC 2015 - 11th International Wireless Communications and Mobile Computing Conference. Pages , 2015
47. Belazi, A.,Abd El-Latif, A.A.,Rhouma, R.,Belghith, S.. Selective image encryption scheme based on DWT, AES S-box and chaotic permutation. IWCMC 2015 - 11th International Wireless Communications and Mobile Computing Conference. Pages , 2015
48. K. Kamoun and S. Ben Yahia. Stability assess based on enhanced information content similarity measure for ontology enrichment.. 4th International conference of Model and Data Engineering, Springer, Laranaca,Cyprus.. Pages 146-153, 2015
49. Aymen HajKacem , Ben N'Cir Chiheb-Eddine , Essoussi Nadia. Parallel K-prototypes for Clustering Big Data. ICCI 2015, Madrid, ESP. Pages 627-638, 2015
50. Aymen HajKacem , Ben N'Cir Chiheb-Eddine , Essoussi Nadia. MapReduce-based K-Prototypes Clustering Method for Big Data. DSAA, IEEE, Paris, France. Pages ..., 2015
51. Mguiris Imen, Amdouni Hamida et Gammoudi Mohamed Mohsen. New validation method of fuzzy association rules based on structural equation modeling. 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD'15), August 15-17, China. Pages 624-633, 2015
52. Bousnina, F-E., Bach Tobji, Chebbah, M., Liétard, L., Ben Yaghlane, B. A New Formalism for Evidential Databases. International Symposium on Methodologies for Intelligent Systems, Lyon, France. Pages 31-40, 2015
53. . Sustainable development and education: a Tunisian case study.. GBATA Péniche/lisbon. Pages , 2015
54. El Ghali M., Saied Ben Rached K. et Brée J.,. « L’expérience de la Téléréalité Vécue par les Enfants : les Motivations et les Freins à l’Egard de « La Star Academy »,. Actes de 25th IBIMA Conference , Amesterdam 2015.. Pages -, 2015
55. Bousnina, F.E., Tobji, M.A.B., Chebbah, M., Liétard, L., Yaghlane, B.B. A New Formalism for Evidential Databases.. ISMIS. Pages 31-40, 2015
56. Chebbah, M., Kharoune, M., Martin, A., Yaghlane, B.B. Consid{é}rant la d{é}pendance dans la th{é}orie des fonctions de croyance.. CoRR. Pages , 2015
57. Chebbah, M., Martin, A., Yaghlane, B.B. Combining partially independent belief functions.. CoRR. Pages , 2015
58. Park, J., Chebbah, M., Jendoubi, S., Martin, A. Second-Order Belief Hidden Markov Models.. CoRR. Pages , 2015
59. Maroua Meddeb, Amine Dhraief, Abdelfettah Belghith, Thierry Monteil, and Khalil Drira. Cache coherence in Machine-To-Machine Information Centric Networks. the 40th IEEE Conference on Local Computer Networks (LCN’15), Clearwater Beach, FL, USA. Pages 430–433, 2015
60. . Satisfying QoS Requirements in NGN Networks using a dynamic adaptive Queuing Delay Control Method. The 10th International Conference on Future Networks and Communications (FNC 2015). Pages , 2015
61. Ghazel, C.,Saïdane, L.. Satisfying QoS requirements in NGN networks using a dynamic adaptive queuing delay control method. Procedia Computer Science. Pages , 2015
62. Ghazel, C.,Saidane, L.. Satisfying QoS requirements in NGN networks using an optimized resource control and management method. 2015 7th International Conference on New Technologies, Mobility and Security - Proceedings of NTMS 2015 Conference and Workshops. Pages , 2015
63. H. Guesmi, C. Ghazel, L. Saidane. Securing Data Storage in Cloud Computing. The 4rd International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN 2015). Pages , 2015
64. Mohamed Belhassen, Amine Dhraief, and Abdelfettah Belghith. City-Obstacles Im- pact on OLSR-Based Routing Protocols. Communication Technologies for Vehicles 8th International Workshop Nets4Cars/Nets4Trains/Nets4Aircraft, volume 9066 of Lecture Notes in Computer Science (LNCS), Sousse, Tunisia. Pages 47-59, 2015
65. Imen Mahjri, Amine Dhraief, and Abdelfettah Belghith. A Review on Collision Avoidance Systems for Unmanned Aerial Vehicles. Proceedings of the Communication Technologies for Vehicles : 8th International Workshop Nets4Cars/Nets4Trains/Nets4Aircraft, volume 9066 of Lecture Notes in Computer Science (LNCS), Sousse, Tunisia. Pages 203-214, 2015
66. Hajer Souri, Amine Dhraief, and Abdelfettah Belghith. TCP Application Recovery Improvement After Handover in Mobile Networks. Communication Technologies for Vehicles : 8th International Workshop Nets4Cars/Nets4Trains/Nets4Aircraft, volume 9066 of Lecture Notes in Computer Science (LNCS), Sousse, Tunisia. Pages 60-71, 2015
67. Yassine SLAMA. La responsabilité sociale des entreprises en Tunisie : état des lieux après la révolution. 16ème Université de Printemps de l’Audit Social, organisée par l’Institut d'Audit Sociale (IAS) et l’Université de Pékin, Pékin, Chine. Pages 699-705, 2014
68. Jammali, A., Bach Tobji, M-A., Martin, A., Ben Yaghlane, B. Indexing evidential data. The IEEE second World Conference on Complex Systems 2014, Agadir, Morocco. Pages 196 - 201, 2014
69. Elmi, S., Benouaret, K., HadjAli, A., Bach Tobji, M-A., Ben Yaghlane, B. Computing skyline from evidential data. International Conference on Scalable Uncertainty Management 2014, Oxford, UK. Lecture Notes in Artificial Intelligence, vol. 8720. Springer-Verlag. Pages 148—161, 2014
70. Hamdi, M.,Hermassi, H.,Rhouma, R.,Belghith, S.. A new secure and efficient scheme of ADPCM encoder based on chaotic encryption. 2014 1st International Conference on Advanced Technologies for Signal and Image Processing, ATSIP 2014. Pages , 2014
71. Yamen Koubaa, Rym Srarfi Tabbane et Manel Hamouda. A multiple Criteria Senior Segmentation : Case of the French market. Administrative Science Association of Canada 2014 Conference Muskoka, Ontario, Canada. Pages 00, 2014
72. Manel Hamouda et Rym Srarfi Tabbane. Gender Mediating Role in Electronic WOM Relationship and Purchase Intention: Proposal of a Conceptual Model. International Marketing Trends Conference 2014, Venice, Italy.. Pages 00, 2014
73. Hela masmoudi , Ben N'Cir Chiheb-Eddine , Essoussi Nadia. Identification de classes non-disjointes ayants des densités différentes. EGC 2014, Rennes, France. Pages 257-268, 2014
74. Rezgui Amira , Ben N'Cir Chiheb-Eddine , Essoussi Nadia. Généralisation des k-moyennes pour produire des recouvrements ajustables,. EGC 2014, Rennes, France. Pages 221-232, 2014
75. . A Tunisian pioneer Islamic bank:a case study of the quality of the website.. GBATA Baku. Pages , 2014
76. El Ghali M., Saied Ben Rached K. et Brée J.,. « Le processus d’Appropriation de l’Expérience Télévisuelle des Enfants. Cas de l’Emission de la « Star Academy »,. Actes de l’International Conference on Innovation in Business, Economics & Marketing Research (IBEM’14), Monastir 2014.-. Pages -, 2014
77. Chebbah, M.. Source Independence in the Theory of Belief Functions. (Indépendance des Sources dans la Théorie de l'évidence).. . Pages , 2014
78. Park, J., Chebbah, M., Jendoubi, S., Martin, A. Second-Order Belief Hidden Markov Models.. Belief Functions. Pages 284-293, 2014
79. Raik Aissaoui, Hamid Mnaouer, Amine Dhraief, Fethi Filali, Abdelfettah Belghith, and Adnan Abu-Dayya. Advanced real-time traffic monitoring system based on V2X communications. IEEE International Conference on Communi- cations (ICC’14), Sydney, Australia. Pages 2713–2718, 2014
80. Imen Mahjri, Amine Dhraief, Issam Mabrouki, Abdelfettah Belghith, and Khalil Drira.. The coverage configuration protocol under AT-Dist localization. the 5th International Conference on Ambient Systems, Networks and Technologies (ANT’14), volume 32 of Procedia Computer Science, Hasselt, Belgium. Pages 141–148, 2014
81. Ghazel, C.,Saidane, L.. A novel QoS-aware method based on resource control and management in NGN networks. Proceedings - 2014 22nd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2014. Pages , 2014
82. Y. Abassi, C. Ghazel, L. Saidane. Cloud adoption: taxonomy, challenges and impact. The 3rd International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN 2014). Pages , 2014
83. H. Guesmi, C. Ghazel, L. Saidane. Survey on Security Issues in Cloud Computing. The 3rd International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN 2014). Pages , 2014
84. Maroua Meddeb, Mehdi Ben Alaya, Thierry Monteil, Amine Dhraief, and Khalil Drira. M2M Platform with Autonomic Device Management Service. the 5th International Conference on Ambient Systems, Networks and Technologies (ANT’14), volume 32 of Procedia Computer Science, Hasselt, Belgium. Pages 1063-1070, 2014
85. Hajer Souri, Amine Dhraief, Syrine Tlili, Khalil Drira, and Abdelfettah Belghith. Smart Metering Privacy-preserving Techniques in a Nutshell.. the 5th International Conference on Ambient Systems, Networks and Technologies (ANT’14), volume 32 of Procedia Computer Science, Hasselt, Belgium. Pages 1087-1094, 2014
86. Imen Mahjri, Amine Dhraief, Issam Mabrouki, Abdelfettah Belghith, and Khalil Drira. An integrated framework for localization and coverage maintenance in wireless sensor networks. the 10th International Wireless Communications and Mobile Computing Conference (IWCMC’14), Nicosia, Cyprus. Pages 287-292, 2014
87. Zaghbani, S.,Rhouma, R.. Data hiding in spatial domain image using chaotic map. 2013 5th International Conference on Modeling, Simulation and Applied Optimization, ICMSAO 2013. Pages , 2013
88. Rym Srarfi Tabbane et Mohsen Debabi. Effects of eWOM on Consumer Behavior: a Stimulus-Organism-Response Model Proposition. Direct / Interactive Marketing Research Summit, Marketing EDGE, Chicago, USA. Pages 00, 2013
89. Rym Srarfi Tabbane et Manel Hamouda. Exposure to eWOM and Consumer Behavior: Does Gender Matter?. 15th Annual International Conference on Globalizing Businesses for the Next Century: Visualizing and Developing Contemporary Approach to Harness Future Opportunities, GBATA 2013, Helsinki, Finland. Pages 00, 2013
90. Rym Srarfi Tabbane et Manel Hamouda. Impact of eWOM on the Tunisian Consumer’s Attitude towards the Product. Advances in Business-Related Scientific Research Conference, Venice, Italy. Pages 00, 2013
91. Amine Dhraief, Hajer Souri, and Abdelfettah Belghith. Explicit MIPv6 handover cross-layer triggers and its impact on TCP Application recovery time. the International Conference on Computer Applications Technology (ICCAT’13),Sousse, Tunisia. Pages 1–8, 2013
92. Ben N'Cir Chiheb-Eddine , Guillaume Cleuziou , Essoussi Nadia. Detecting overlapping clustering with small and parameterizable overlaps,,. ICCAT, IEEE, Sousse, Tunisia. Pages 1-6, 2013
93. Ben N'Cir Chiheb-Eddine , Guillaume Cleuziou , Essoussi Nadia. Un modèle générique pour les k-moyennes à recouvrements ajustables,. EGC-FDC, Toulouse, France. Pages 81-92, 2013
94. Ben N'Cir Chiheb-Eddine , Zenned Afef , Essoussi Nadia. Non-disjoint grouping of text documents based Word Sequence Kernel.,. EGC2013, Toulouse, France. Pages 253-262, 2013
95. Ben N'Cir Chiheb-Eddine , Essoussi Nadia. Non-Disjoint Cluster Analysis with Non-Uniform Density.,. MIKE2013, Tamil Nadu, India.. Pages 100-111, 2013
96. Ben N'Cir Chiheb-Eddine , Essoussi Nadia. On the Extension of k-means for Overlapping Clustering: Average or Sum of clusters' representatives ?.,. KDIR2013. Pages 208-213, 2013
97. Amdouni Hamida et Gammoudi Mohamed Mohsen. Visualization of a Synthetic Representation of Association Rules to Assist Expert Validation. Computer Science and Information Technology (CS & IT-CSCP 2013), DOI: 10.5121/csit.2013.3819, Sundarapandian et al. (Eds): ICAITA, SAI, SEAS, CDKP, CMCA. Pages 229–242, 2013
98. . Consumer trust determinants in a Tunisian Bank: an exploratory study.. GBATA Helsinki. Pages , 2013
99. Amine Dhraief, Abdelfettah Belghith, Khalil Drira, Tarek Bouali, and Mohamed Amine Ghorbali. Autonomic management of the HIP-based M2M overlay network. Proceedings of the 4th International Conference on Ambient Systems, Networks and Technologies (ANT’13), volume 19 of Procedia Computer Science, Halifax, NS, Canada. Pages 98–105, 2013
100. Imen Jemili, Dhouha Ghrab, Abdelfettah Belghith, Bilel Derbel, and Amine Dhraief. Collision aware coloring algorithm for wireless sensor networks. the 9th International Wireless Communications and Mobile Computing Conference (IWCMC’13), Cagliari, Sardinia, Italy. Pages 1546–1553, 2013
101. Issam Mabrouki, Nesrine Ben Khalifa, Amine Dhraief, and Abdelfettah Belghith. CrossWalk: A novel cross-layer random walk data dissemination in wireless sensor networks. the 24th IEEE International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC’13), London, United Kingdom. Pages 2474–2478, 2013
102. Amine Dhraief, Mohamed Amine Ghorbali, Tarek Bouali, and Abdelfettah Belghith. Mobility management in the HIP-based M2M overlay network. the 22nd IEEE International Workshop on Enabling Technologies : Infrastructure for Colla- borative Enterprises (WETICE’13), Hammamet, Tunisia. Pages 50–55, 2013
103. Amine Dhraief, Khalil Drira, Abdelfettah Belghith, Tarek Bouali, and Mohamed Amine Ghorbali. Self-healing and Optimizing of the HIP-based M2M Overlay Network. the 10th International Conference on Autonomic Computing (ICAC’13), San Jose, CA, USA. Pages 183–192, 2013
104. Rafaa Tahar, Amine Dhraief, Abdelfettah Belghith, and Rafik Braham. TCP performance evaluation over multihomed networks. the International Conference on Computer Applications Technology (ICCAT’13), Sousse, Tunisia. Pages 1–6, 2013
105. Amine Dhraief, Mohamed Amine Ghorbali, Tarek Bouali, Abdelfettah Belghith, and Khalil Drira. Simultaneous mobility management in the HIP-based M2M overlay network. the 9th International Wireless Communications and Mobile Computing Conference (IWCMC’13), Cagliari, Italy. Pages 219-224, 2013
106. Dhouha Ghrab, Bilel Derbel, Imen Jemili, Amine Dhraief, Abdelfettah Belghith, and El-Ghazali Talbi. Coloring based hierarchical routing approach. Proceedings of the 4th International Conference on Ambient Systems, Networks and Technologies (ANT’13), Halifax, NS, Canada,. Pages 188-196, 2013
107. Jallouli R. & Kasraoui A.. Business Intelligence et Management des Universités. ISKO-Maghreb, 3-4 nov, Hammamet. Pages -, 2012
108. Lamia Ketari, Munesh Chandra and Akheela Khanum. A Study of Image Spam Filtering Techniques. 4th IEEE International Conference on Com- putational Intelligence and Communication Networks, CICN 2012, Mathura, India. Pages 245-250, 2012
109. Rym Srarfi Tabbane et Manel Hamouda. Impact of Electronic Word-of-Mouth on Purchase Intention: Tunisian Consumer’s Case. 2nd International Symposium ISKO-Maghreb, Hammamet, Tunisie. Pages 00, 2012
110. K. Kamoun and S. Ben Yahia. Automatic Approach for Ontology Evolution based on Stability Evaluation.. 8th International Conference on Web Information Systems and Technologies (WEBIST 2012),Porto, Portugal. Pages 452-459, 2012
111. Ben N'Cir Chiheb-Eddine , Essoussi Nadia. Improved overlapping k-means for detecting overlapping clusters.,. MSDM2012, Hammamet, Tunisia. Pages 1-6, 2012
112. Ben N'Cir Chiheb-Eddine , Guillaume Cleuziou , Essoussi Nadia. Identification of Overlapping Clusters with Small Overlaps.,. EGC-Maghreb, Hammamet, Tunisia. Pages 26-32, 2012
113. . The combined effect of strength and favourability of associations as a source of brand equity: A survey on Tunisian women.. ICIMB london. Pages , 2012
114. Chebbah, M., Martin, A., Yaghlane, B.B. About Sources Dependence in the Theory of Belief Functions.. Belief Functions. Pages 239-246, 2012
115. Chebbah, M., Martin, A., Yaghlane, B.B. Positive and Negative Dependence for Evidential Database Enrichment.. IPMU. Pages 575-584, 2012
116. Amine Dhraief, Mohamed Amine Ghorbali, Tarek Bouali, Abdelfettah Belghith, and Khalil Drira. A service-oriented framework for mobility and multihoming support. The 16th IEEE Mediterra- nean Electrotechnical Conference (MELECON’12), Hammamet, Tunisia. Pages 489–493, 2012
117. Amine Dhraief, Mohamed Amine Ghorbali, Tarek Bouali, Abdelfettah Belghith, and Khalil Drira. HBMON : A HIP based M2M overlay network. The 3rd International Conference on the Network of the Future (NOF’12), Tunis, Tunisia. Pages 1–8, 2012
118. Jallouli R. et Nahdi E.. Impact of Search Engine Marketing SEM on the Website Success. Information Systems and artificial intelligence SIIE, Casablanca, 17-19th February. Pages -, 2011
119. Mohammadi Akheela Khanum and Lamia Ketari. Trends in Combating Image Spam E-mails. In International Proceedings of Computer Science and Information Technology, CSIT 2011, Singapore. Pages 78-84, 2011
120. Lamia Ketari. Online Library for Graduation Projects Management: The OGPL System. In Proceedings of World Conference on Educational Multimedia, Hypermedia and Telecommunications, EdMedia 2011, Lisbon, Portugal. Pages 2017-2020, 2011
121. Ben N'Cir Chiheb-Eddine , Essoussi Nadia. Classification Recouvrante Bassée sur les Méthodes à Noyau,. JDS2011, Gammart, Tunisia. Pages 1-6, 2011
122. Amdouni Hamida et Gammoudi Mohamed Mohsen. Algorithms of association rules extraction: State of the Art. IEEE 3rd International Conference on Communication Software and Networks (ICCSN), May 27-29, China. Pages 333-339, 2011
123. Maher Helaoui and Wady Naanaa. Domain permutation reduction for valued CSPs. 11th Workshop on Preferences and Soft Constraints, Perugia, Italy. Pages 76-90, 2011
124. Chebbah, M., Martin, A., Yaghlane, B.B. Mesure de concordance pour les bases de données évidentielles.. EGC. Pages 197-202, 2011
125. Amine Dhraief, Raik Aissaoui, and Abdelfettah Belghith. Parallel Computing the Longest Common Subsequence (LCS) on GPUs: Efficiency and Language Suitability. the 1st International Conference on Advanced Communications and Computation (INFOCOMP’11), Barcelona, Spain. Pages 143–148, 2011
126. Jallouli R.. Interaction between International Retailers and local Retailers in Tunisia: Investment opportunities and strategic partnerships. 8 th Conference of the Society of Asian Retailing and Distribution SARD, University of Marketing and Distribution Sciences, Kobe, Japan, 26-28 november. Pages -, 2010
127. Bach Tobji, M-A., Ben Yaghlane, B. Maintaining Evidential Frequent Itemsets in Case of Data Deletion. The International Conference on Information Processing and Management of Uncertainty in Knowledge-based System 2010, Dortmund, Germany. Pages 218-227, 2010
128. Amira, H.,Rhouma, R.,Belghith, S.. An eigen value based watermarking scheme for tamper detection in gray level images. 2010 7th International Multi-Conference on Systems, Signals and Devices, SSD-10. Pages , 2010
129. K. Kamoun and S. Ben Yahia. Evolution des ontologies : un panorama,. 10ème Conférence Internationale Francophone « Extraction et Gestion des Connaissances » (EGC’10), Hammamet, Tunisie. Pages 20-29, 2010
130. Ben N'Cir Chiheb-Eddine , Essoussi Nadia , Patrice Bertrand. Overlapping clustering based on kernel similarity metric.,. MSDM2010, Hammamet, Tunisia. Pages 130-136, 2010
131. Amine Dhraief and Abdelfettah Belghith. Multihoming support in the Internet : A state of the art. Proceedings of the International Conference on Models of Information and Communication Systems (MICS’10), Rabat, Morocco. Pages 1-8, 2010
132. Ben N'Cir Chiheb-Eddine , Essoussi Nadia , Patrice Bertrand. Kernel overlapping k-means for clustering in feature space.,. KDIR2010, Valencia, ESP. Pages 250-256, 2010
133. Amdouni Hamida et Gammoudi Mohamed Mohsen. A customer profile extraction using Conceptual Decomposition of a Binary relation Algorithm. 3rd International Conference on Information Systems and Economic Intelligence (SIIE'2010), 18-20 February, Sousse. Pages **, 2010
134. Amdouni Hamida et Gammoudi Mohamed Mohsen. An Automatic Method for Ontology Construction based on Formal Concept Analysis. Proceedings of Workshop en Informatique et Applications (WIA) – February 12-14, Tozeur, Tunisia.. Pages --, 2010
135. Wady Naanaa, Maher Helaoui and Béchir El Ayeb. A decomposition method for valued CSPs. 10th International Workshop on Preferences and Soft Constraints, Saint Andrews, Scotland. Pages 143-159, 2010
136. Brée J., EL Ghali M. et Saied Ben Rached K.,. « La Star Academy libanaise : une expérience de consommation multidimensionnelle pour les enfants »,. Actes de 9ème congrès international de marketing des tendances. Pages -, 2010
137. El Ghali M., Saied Ben Rached K. et Brée J., (2010). La Star Academy comme objet de regroupement pour les enfants tunisiens : la naissance de la communauté « Star Academy ». Actes de 8ème Colloque International De L’association Tunisienne De Marketing, Sousse le 2 et 3 Avril 2010.. Pages -, 2010
138. Amine Dhraief and Abelfettah. Belghith. Suitability analysis of mobility and multihoming unification. the International Conference on Communication in Wireless Environments and Ubiquitous Systems : New Challenges (ICWUS’10), Sousse, Tunisia. Pages 1-6, 2010
139. Amine Dhraief, Zied Chedly, and Abdelfettah Belghith. The impact of mobile IPv6 on transport protocols an experimental investigation. the International Conference on Communication in Wireless Environments and Ubiquitous Systems: New Challenges (ICWUS), Sousse, Tunisia. Pages 1-6, 2010
140. Jallouli R., Khlif H. & Brahmi S.. Tunisian Call centers defy the crisis!,. 7th Conference of the Society of Asian Retailing and Distribution SARD, University of Marketing and Distribution Sciences, Chung Ang University, Seoul, Korea , 20-22 november. Pages -, 2009
141. Bach Tobji, M-A., Ben Yaghlane, B., Mellouli, K. Incremental Maintenance of Frequent Itemsets in Evidential Databases. the European Conference on Symbolic and Quantitative Approaches to Reasoning with Uncertainty 2009, Verona, Italy. Lecture Notes in Computer Science, vol. 5590. Springer Berlin/Heidelberg. Pages 457-468, 2009
142. Hermassi, H.,Rhouma, R.,Belghith, S.. A modified hyperchaos based image cryptosystem. 2009 6th International Multi-Conference on Systems, Signals and Devices, SSD 2009. Pages , 2009
143. Rhouma, R.,Arroyo, D.,Belghith, S.. A new color image cryptosystem based on a piecewise linear chaotic map. 2009 6th International Multi-Conference on Systems, Signals and Devices, SSD 2009. Pages , 2009
144. Hassine, A.,Rhouma, R.,Belghith, S.. A novel method for tamper detection and recovery resistant to vector quantization attak. 2009 6th International Multi-Conference on Systems, Signals and Devices, SSD 2009. Pages , 2009
145. Sébastien Barre, Amine Dhraief, Nicolas Montavont, and Olivier Bonaventure. MipShim6 : une approche combinée pour la mobilité et la multidomiciliation. 14ème Colloque Francophone sur l’Ingénierie des Protocoles (CFIP’09), Strasbourg, France. Pages 1-8, 2009
146. Wady Naanaa, Maher Helaoui and Béchir El Ayeb. Algorithme de décomposition de domaine pour la satisfaction et l'optimisation de contraintes. Les Cinquièmes Journées Francophones de Programmation par contraintes, Orléans, France. Pages 375-384, 2009
147. Amine Dhraief and Nicolas Montavont. Rehoming decision algorithm: Design and empirical evaluation. the International Conference on Computational Science and Engineering (CSE ’09), Vancouver, Canada. Pages 464–469, 2009
148. Ghazel, C.,Saïdane, L.. Achieving a QoS target in NGN networks via an efficient admission control strategy. Proceedings of the 8th International Conference on Networks, ICN 2009. Pages , 2009
149. Ghazel, C.,Saïdane, L.. An efficient admission control methodology for satisfying QoS requirements in NGN networks. Proceedings - International Conference on Advanced Information Networking and Applications, AINA. Pages , 2009
150. Bach Tobji, M-A., Ben Yaghlane, B., Mellouli, K. Frequent Itemset Mining from Databases Including One Evidential Attribute. Tthe Second International Conference on Scalable Uncertainty Management 2008, Napoli, Italia. Lecture Notes in Artificial Intelligence, vol. 5291. Springer-Verlag. Pages 19—32, 2008
151. Bach Tobji, M-A., Ben Yaghlane, B., Mellouli, K. A New Algorithm for Mining Frequent Itemsets from Evidential Databases. Tthe International Conference on Information Processing and Management of Uncertainty in Knowledge-based System 2008, Malaga, Spain. Pages 1535-1542, 2008
152. Bach Tobji, M-A., Abrougui, A., Ben Yaghlane, B. GUFI: a new algorithm for General Updating of Frequent Itemsets. Tthe 11th IEEE International Conference on Computational Science and Engineering – Workshops 2008, São Paulo, Brazil. Pages 45-52, 2008
153. Bach Tobji, M-A. Comparative Study Of Data Mining Query Languages. Tthe International Conference on Applied Computer 2008, Algavre, Portugal. Pages 259-268, 2008
154. Amine Dhraief and Nicolas Montavont. Toward Mobility and Multihoming Unification- The SHIM6 Protocol : A Case Study. Proceedings of the IEEE Wi- reless Communications and Networking Conference (WCNC’08), Las Vegas, USA. Pages 2840–2845, 2008
155. Saied Ben Rached K. et EL GHALI M.,. «La Star Academy : une expérience de consommation pour les jeunes enfants et préadolescents tunisiens »,. Actes de 7ème journées normandes de la consommation, colloque consommation et société, Rouen, le 27 et 28 Mars 2008. . Pages -, 2008
156. Saied Ben Rached K. et El Ghali M.,. Le comportement des enfants et préadolescents face aux émissions de la téléréalité cas de la « Star Academy » : étude exploratoire »,. Actes de 7ème congrès international de marketing des tendances à Venise, du 17 au 19 Janvier 2008.. Pages -, 2008
157. Amine Dhraief, Tanguy Ropitault, and Nicolas Montavont. Mobility and multihoming management and strategies. the 14th Eunice Open European Summer School, Brest, France. Pages 1-8, 2008
158. Ghazel, C.,Saïdane, L.. Dimensioning of Next Generation Networks signaling gateway for improving a quality of service target. Proceedings of the 2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008. Pages , 2008
159. Ghazel, C.,Saïdane, L.. Dimensioning of next generation networks multiservice gateway for achieving a quality of service target. Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008. Pages , 2008
160. Ghazel, C.,Saïdane, L.. Migration from traditional networks to converged next generation networks architecture with guaranteed quality of service. Proceedings - 2008 International Conference on Convergence and Hybrid Information Technology, ICHIT 2008. Pages , 2008
161. Cherif Ghazel, Leila Sadane. Next Generation Networks Dimensioning with Improved and Guaranteed Quality of Service. International Conference on Communications, Networking and Information Technology (ICCNIT 2008). Pages , 2008
162. Rhouma, R.,Belghith, S.. Performance of a new Chaos-based Communication Scheme: The Reduced-Delay-Masked-DCSK. European Signal Processing Conference. Pages , 2007
163. S. Zghal, K. Kamoun, S. Ben Yahia, E. M. Nguifo et Y. Slimani. EDOLA : Une nouvelle méthode d'alignement d'ontologies OWL-Lite.. 4ième Conférence en Recherche d’Information et Applications (CORIA’07), St-Etienne, France. Pages 351-367, 2007
164. Amine Dhraief, Nicolas Montavont, Romain Kuntz, and Manabu Tsukada.. E-Bicycle Demonstration on the Tour De France. the International Multi- Conference on Computing in the Global Information Technology (ICCGI’07), Guadeloupe, France. Pages 56– 56, 2007
165. S. Zghal, K. Kamoun, S. Ben Yahia, E. M. Nguifo and Y. Slimani. A new alignment method for OWL-Lite ontologies using propagation of similarity over the graph. 18th International Conference on Database and Expert Systems Applications (DEXA’07), Regensburg, Germany. Pages 524-528, 2007
166. S. Zghal, K. Kamoun, S. Ben Yahia, E. M. Nguifo et Y. Slimani. Une nouvelle méthode d'alignement et de visualisation d'ontologies OWL-Lite.. Conférence d’Extraction et Gestion des Connaissances (EGC’07), Namur, Belgique. Pages 197-198, 2007
167. Amine Dhraief, Abdelfattah Belghith, Nicolas Montavont, Jean-Marie Bonnin, and Mohamed Kassab. NS2 based simulation framework to evaluate the performance of wireless distribution systems. The 2007 Spring Simulaiton Multiconference - Volume 1, SpringSim ’07, Norfolk, Virginia, USA. Pages 264–271, 2007
168. Ghazel, C.,Saïdane, L.. An improved model for next generation networks with guaranteed end-to-end quality of service. ICON 2007 - Proceedings of the 2007 15th IEEE International Conference on Networks. Pages , 2007
169. Jallouli R.. The e-learning in Tunisia, How to succeed the implementation process?. Colloque international « les ruptures dans les sociétés d’information et l’économie de savoir», University Tunis El Manar, 15-16 february. Pages -, 2006
170. Jallouli R. et Zghal M.. Web and market orientation, The case of art product,. International Conference « Marketing in the area of ICT », Higher Institute of Management Tunis, 2- 3 november. Pages -, 2006
171. Bach Tobji, M-A., Gouider, M-S. Incremental Maintenance Of Association Rules Under Support Threshold Change. the International Conference on Applied Computer 2006, San Sebastian, Spain. Pages 91-98, 2006
172. Rhouma, R.,Safya, B.. A multidimensional map for a chaotic cryptosystem. European Signal Processing Conference. Pages , 2006
173. Belaid Ajroud Henda et Amdouni Hamida. Incremental Clustering as a Tool for CRM. Proceedings of the 5th WSEAS International Conference on Telecommunications and Informatics, Istanbul, Turkey, May 27-29. Pages 260-266, 2006
174. Saied Ben Rached K. et El Ghali M.,. «L’influence de la couleur et des personnages sur la mémorisation du packaging par les enfants : Cas des petits gâteaux et des macaronis ». Actes du 4ème colloque international de l’ATM à Tunis, du 31Mars et 1er Avril 2006.. Pages -, 2006
175. Hella Kaffel Ben Ayed and Safa Kaâbi. "Un protocole de communication pour enchères temps réel". Colloque Francophone sur l'Ingénierie des Protocoles (CFIP 2006), Tozeur, Tunisia.. Pages 12 p., 2006
176. Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Nadia Tawbi, Hamdi Yahyaoui, and Sami Zhioua. A Dynamic Compiler for Embedded Java Virtual Machines. In Proceedings of the 3rd Inter- national Conference on the Principles and Practice of Programming in Java, ACM PPPJ'2004, Las Vegas, Nevada, USA, ACM Press. Pages 100-107, 2004
177. Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Nadia Tawbi, Hamdi Yahyaoui, and Sami Zhioua. A Synergy between Efficient Interpretation and Fast Selective Dynamic Compilation for the Acceleration of Embedded Java Virtual Machines. In Pro- ceedings of the 3rd International Conference on the Principles and Practice of Programming in Java, ACM PPPJ'2004, Las Vegas, Nevada, USA, ACM Press. Pages 108-115, 2004
178. Ayed, H.K.B., Chihi, S.K., Kamoun, F. A Communication Architecture for Real-Time Auctions. Network Control and Engineering for QoS, Security and Mobility, {III} - {IFIP} {TC6} WG6.2, 6.6, 6.7 and 6.8 Third International Conference on Network Control and Engineering for QoS, Security and Mobility, . Pages 111--124, 2004
179. Mourad Debbabi, Lamia Ketari, and Hamdi Yahyaoui. A Java SIP Inter- face for Limited Connected Devices. In Proceedings of Wireless and Optical Communications Conference, IASTED' WOC'2003, Banff, Canada, IASTED Proceedings. Pages 560-565, 2003
180. Mourad Debbabi, Mourad Erhioui, Lamia Ketari, Nadia Tawbi, Hamdi Yah- yaoui, and Sami Zhioua. Method Call Acceleration in Embedded Java Virtual Machines. In Proceedings of the International Conference on Com- putational Science, ICCS'03, Lecture Notes in Computer Science, LNCS, Volume 2659, Melbourne, Australia, Springer Verlag. Pages 750-759, 2003
181. Safa Kaâbi. Evaluation de http , de l’Email, de NNTP et de l’IRC en fonction du besoin de e-négociation. Université de printemps de DNAC 2003, Internet ambiant et très hauts débits, Tozeur, Tunisie.. Pages 8 p., 2003
182. M. Elloumi, S. Kaâbi. Exact and Approximation Algorithms for the DNA Sequence Assembly Problem. 3rd World Conference on Systematics, Cybernetics and Informatics, and 5th International Conference on Information Systems Analysis and Synthesis, SCI'99/ISAS'99, Session : SCI in Biology and Medicine, (Orlando, Florida, U.S.A.), International Institu. Pages Vol. 8, p152-157, 1999
183. M. Elloumi, S. Kaâbi. DNA Sequence Assembly Algorithms. 2nd Workshop on Intelligent Control Systems, IC'98 (North Carolina, U.S.A.) : (Octobre 1998).. Pages 8 p., 1998
184. . Transcending boundaries: Kwame Dawes’s Digital Collaborations. . Pages , 0
Articles de conférence (sans cimité de lecture)
1. Jallouli R.. Marketing Research and democracy in Tunisia. 9th international seminar of the Tunisian Association of Marketing, 8-9 April 2011, Hammamet. Pages -, 2015
2. Jallouli R.. NFC Technology, The case of cultural products »,. 6ème Journée sur les stratégies de développement culturel et création artistique : Enjeux défis et nouvelles perspectives, Laboratory of Research in Culture, New Technologies and development, Higher institute of Music, University of Tunis, 24 June. Pages -, 2010
3. Jallouli, R. Marketing & E-learning,. 5th International Conference of Tunisian association of Marketing, University El Manar, Hammamet, 13-14 April. Pages -, 2007