Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Mohamed Benmohammed
@article{DBLP:journals/ijista/HazmouneBMB24, author = {Samira Hazmoune and Fateh Bougamouza and Smaine Mazouzi and Mohamed Benmohammed}, title = {Boosting speech recognition performance: a robust and accurate ensemble method based on HMMs}, journal = {Int. J. Intell. Syst. Technol. Appl.}, volume = {22}, number = {1}, pages = {41--76}, year = {2024}, url = {https://doi.org/10.1504/IJISTA.2024.136523}, doi = {10.1504/IJISTA.2024.136523}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijista/HazmouneBMB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csr2/ChelghoumBBSB23, author = {Massinissa Chelghoum and Gueltoum Bendiab and Mohamed Benmohammed and Stavros Shiaeles and Emanuele Bellini}, title = {{BTV2P:} Blockchain-based Trust Model for Secure Vehicles and Pedestrians Networks}, booktitle = {{IEEE} International Conference on Cyber Security and Resilience, {CSR} 2023, Venice, Italy, July 31 - Aug. 2, 2023}, pages = {148--153}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CSR57506.2023.10224934}, doi = {10.1109/CSR57506.2023.10224934}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csr2/ChelghoumBBSB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/HamoudAB22, author = {Aymen Hamoud and Esma A{\"{\i}}meur and Mohamed Benmohammed}, title = {Individual Processing of Phishing Emails: Towards a Phishing Detection Framework}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {14}, number = {1}, pages = {1--22}, year = {2022}, url = {https://doi.org/10.4018/ijsppc.311060}, doi = {10.4018/IJSPPC.311060}, timestamp = {Tue, 29 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/HamoudAB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/es/BahloulAB20, author = {Belahcene Bahloul and Hassina Aliane and Mohamed Benmohammed}, title = {ArA*summarizer: An Arabic text summarization system based on subtopic segmentation and using an A* algorithm for reduction}, journal = {Expert Syst. J. Knowl. Eng.}, volume = {37}, number = {2}, year = {2020}, url = {https://doi.org/10.1111/exsy.12476}, doi = {10.1111/EXSY.12476}, timestamp = {Tue, 26 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/es/BahloulAB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijamc-igi/KenidraB20, author = {Billel Kenidra and Mohamed Benmohammed}, title = {An Ultra-Fast Method for Clustering of Big Genomic Data}, journal = {Int. J. Appl. Metaheuristic Comput.}, volume = {11}, number = {1}, pages = {45--60}, year = {2020}, url = {https://doi.org/10.4018/IJAMC.2020010104}, doi = {10.4018/IJAMC.2020010104}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijamc-igi/KenidraB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/RamdaniBB20, author = {Mohamed Ramdani and Mohamed Benmohammed and Nadjia Benblidia}, title = {Comparison of scalar point multiplication algorithms in a low resource device}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {32}, number = {4}, pages = {425--432}, year = {2020}, url = {https://doi.org/10.1016/j.jksuci.2019.07.013}, doi = {10.1016/J.JKSUCI.2019.07.013}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jksucis/RamdaniBB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jrtip/AraarGBA20, author = {Chaouki Araar and Salim Ghanemi and Mohamed Benmohammed and Hamza Atoui}, title = {Pruned improved eight-point approximate {DCT} for image encoding in visual sensor networks requiring only ten additions}, journal = {J. Real Time Image Process.}, volume = {17}, number = {5}, pages = {1597--1608}, year = {2020}, url = {https://doi.org/10.1007/s11554-019-00918-2}, doi = {10.1007/S11554-019-00918-2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jrtip/AraarGBA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaase/BourebaaB20, author = {Fatima Bourebaa and Mohamed Benmohammed}, title = {Android Malware Detection using Convolutional Deep Neural Networks}, booktitle = {4th International Conference on Advanced Aspects of Software Engineering, {ICAASE} 2020, Constantine, Algeria, November 28-30, 2020}, pages = {1--7}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICAASE51408.2020.9380104}, doi = {10.1109/ICAASE51408.2020.9380104}, timestamp = {Wed, 14 Apr 2021 11:43:46 +0200}, biburl = {https://dblp.org/rec/conf/icaase/BourebaaB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijhpcn/GherbiAB19, author = {Chirihane Gherbi and Zibouda Aliouat and Mohamed Benmohammed}, title = {Comparative analysis of hierarchical cluster protocols for wireless sensor networks}, journal = {Int. J. High Perform. Comput. Netw.}, volume = {13}, number = {4}, pages = {366--377}, year = {2019}, url = {https://doi.org/10.1504/IJHPCN.2019.099261}, doi = {10.1504/IJHPCN.2019.099261}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijhpcn/GherbiAB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnsm/GherbiAB19, author = {Chirihane Gherbi and Zibouda Aliouat and Mohamed Benmohammed}, title = {A Novel Load Balancing Scheduling Algorithm for Wireless Sensor Networks}, journal = {J. Netw. Syst. Manag.}, volume = {27}, number = {2}, pages = {430--462}, year = {2019}, url = {https://doi.org/10.1007/s10922-018-9473-0}, doi = {10.1007/S10922-018-9473-0}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnsm/GherbiAB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-cvi/MahamdiouaB18, author = {Meriama Mahamdioua and Mohamed Benmohammed}, title = {Automatic adaptation of {SIFT} for robust facial recognition in uncontrolled lighting conditions}, journal = {{IET} Comput. Vis.}, volume = {12}, number = {5}, pages = {623--633}, year = {2018}, url = {https://doi.org/10.1049/iet-cvi.2017.0190}, doi = {10.1049/IET-CVI.2017.0190}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-cvi/MahamdiouaB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnds/GherbiAB18, author = {Chirihane Gherbi and Zibouda Aliouat and Mohamed Benmohammed}, title = {Energy efficient with time synchronised and service coverage guarantee in wireless sensor networks}, journal = {Int. J. Commun. Networks Distributed Syst.}, volume = {21}, number = {1}, pages = {56--79}, year = {2018}, url = {https://doi.org/10.1504/IJCNDS.2018.10013880}, doi = {10.1504/IJCNDS.2018.10013880}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnds/GherbiAB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcvr/BadecheBMBP18, author = {Mohamed Badeche and Fr{\'{e}}d{\'{e}}ric Bousefsaf and Abdelhak Moussaoui and Mohamed Benmohammed and Alain Pruski}, title = {An automatic natural feature selection system for indoor tracking - application to Alzheimer patient support}, journal = {Int. J. Comput. Vis. Robotics}, volume = {8}, number = {2}, pages = {201--220}, year = {2018}, url = {https://doi.org/10.1504/IJCVR.2018.10013161}, doi = {10.1504/IJCVR.2018.10013161}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcvr/BadecheBMBP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcvr/BougamouzaHB18, author = {Fateh Bougamouza and Samira Hazmoune and Mohamed Benmohammed}, title = {Normalisation of handwriting speed for online Arabic characters recognition}, journal = {Int. J. Comput. Vis. Robotics}, volume = {8}, number = {6}, pages = {591--605}, year = {2018}, url = {https://doi.org/10.1504/IJCVR.2018.095589}, doi = {10.1504/IJCVR.2018.095589}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcvr/BougamouzaHB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijst/HazmouneBMB18, author = {Samira Hazmoune and Fateh Bougamouza and Smaine Mazouzi and Mohamed Benmohammed}, title = {A new hybrid framework based on Hidden Markov models and K-nearest neighbors for speech recognition}, journal = {Int. J. Speech Technol.}, volume = {21}, number = {3}, pages = {689--704}, year = {2018}, url = {https://doi.org/10.1007/s10772-018-9535-4}, doi = {10.1007/S10772-018-9535-4}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijst/HazmouneBMB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GuerarMMBPC18, author = {Meriem Guerar and Mauro Migliardi and Alessio Merlo and Mohamed Benmohammed and Francesco Palmieri and Aniello Castiglione}, title = {Using Screen Brightness to Improve Security in Mobile Social Network Access}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {4}, pages = {621--632}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2601603}, doi = {10.1109/TDSC.2016.2601603}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/GuerarMMBPC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaase/RamdaniBB18, author = {Mohamed Ramdani and Mohamed Benmohammed and Nadjia Benblidia}, editor = {Ramdane Maamri and Faiza Belala}, title = {Comparison of Scalar Multiplication Algorithms in a Low Resource Device}, booktitle = {Proceedings of the 3rd International Conference on Advanced Aspects of Software Engineering, {ICAASE} 2018, Constantine, Algeria, December 1-2, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2326}, pages = {70--75}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2326/paper9.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:44 +0100}, biburl = {https://dblp.org/rec/conf/icaase/RamdaniBB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfnds/RamdaniBB18, author = {Mohamed Ramdani and Mohamed Benmohammed and Nadjia Benblidia}, editor = {Abdelrahman Abuarqoub and Bamidele Adebisi and Mohammad Hammoudeh and Sharefa Murad and Mounir Arioua}, title = {Distributed solution of scalar multiplication on elliptic curves over \emph{F\({}_{\mbox{p}}\)} for resource-constrained networks}, booktitle = {Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, Amman, Jordan, June 26-27, 2018}, pages = {63:1--63:6}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3231053.3231130}, doi = {10.1145/3231053.3231130}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icfnds/RamdaniBB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/misc/MaoucheB18, author = {Fadila Maouche and Mohamed Benmohammed}, editor = {Salim Chikhi and Abdelmalek Amine and Allaoua Chaoui and Djamel{-}Eddine Sa{\"{\i}}douni}, title = {Dynamic Time Warping Inside a Genetic Algorithm for Automatic Speech Recognition}, booktitle = {Modelling and Implementation of Complex Systems - Proceedings of the 5th International Symposium, {MISC} 2018, Laghouat, Algeria, December 16-18, 2018}, series = {Lecture Notes in Networks and Systems}, volume = {64}, pages = {180--192}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05481-6\_14}, doi = {10.1007/978-3-030-05481-6\_14}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/misc/MaoucheB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/DerdouriPB17, author = {Lakhdar Derdouri and Congduc Pham and Mohamed Benmohammed}, title = {Analysis of hybrid router-assisted reliable multicast protocols in lossy networks}, journal = {Int. Arab J. Inf. Technol.}, volume = {14}, number = {1}, pages = {26--34}, year = {2017}, url = {http://iajit.org/index.php?option=com\_content\&\#38;task=blogcategory\&\#38;id=111\&\#38;Itemid=419}, timestamp = {Thu, 16 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iajit/DerdouriPB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/DjellabB17, author = {Rima Djellab and Mohamed Benmohammed}, title = {A novel quantum distributed key management protocol for ring-organised group}, journal = {Int. J. Inf. Comput. Secur.}, volume = {9}, number = {4}, pages = {302--323}, year = {2017}, url = {https://doi.org/10.1504/IJICS.2017.10004329}, doi = {10.1504/IJICS.2017.10004329}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/DjellabB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijissc/BoumassataB17, author = {Meriem Boumassata and Mohamed Benmohammed}, title = {Two Rounds Based {LEACH:} {A} Variant of Low Energy Adaptive Clustering Hierarchy for Wireless Sensor Networks}, journal = {Int. J. Inf. Syst. Soc. Chang.}, volume = {8}, number = {3}, pages = {34--44}, year = {2017}, url = {https://doi.org/10.4018/IJISSC.2017070103}, doi = {10.4018/IJISSC.2017070103}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijissc/BoumassataB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/LakehalZB17, author = {Elkhamssa Lakehal and Djemel Ziou and Mohamed Benmohammed}, title = {Multiple illuminant estimation from the covariance of colors}, journal = {J. Vis. Commun. Image Represent.}, volume = {46}, pages = {107--118}, year = {2017}, url = {https://doi.org/10.1016/j.jvcir.2017.03.013}, doi = {10.1016/J.JVCIR.2017.03.013}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jvcir/LakehalZB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/ChikoucheFCB17, author = {Noureddine Chikouche and Cherif Foudil and Pierre{-}Louis Cayrel and Mohamed Benmohammed}, title = {{RFID} Authentication Protocols Based on Error-Correcting Codes: {A} Survey}, journal = {Wirel. Pers. Commun.}, volume = {96}, number = {1}, pages = {509--527}, year = {2017}, url = {https://doi.org/10.1007/s11277-017-4181-8}, doi = {10.1007/S11277-017-4181-8}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/ChikoucheFCB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijpcc/GherbiAB16, author = {Chirihane Gherbi and Zibouda Aliouat and Mohamed Benmohammed}, title = {Using adaptive clustering scheme with load balancing to enhance energy efficiency and reliability in delay tolerant with QoS in large-scale mobile wireless sensor networks}, journal = {Int. J. Pervasive Comput. Commun.}, volume = {12}, number = {3}, pages = {352--374}, year = {2016}, url = {https://doi.org/10.1108/IJPCC-10-2015-0035}, doi = {10.1108/IJPCC-10-2015-0035}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijpcc/GherbiAB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhsn/GuerarBA16, author = {Meriem Guerar and Mohamed Benmohammed and Vincent Alimi}, title = {Color wheel pin: Usable and resilient {ATM} authentication}, journal = {J. High Speed Networks}, volume = {22}, number = {3}, pages = {231--240}, year = {2016}, url = {https://doi.org/10.3233/JHS-160545}, doi = {10.3233/JHS-160545}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jhsn/GuerarBA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jips/BoussaadBB16, author = {Leila Boussaad and Mohamed Benmohammed and Redha Benzid}, title = {Age Invariant Face Recognition Based on {DCT} Feature Extraction and Kernel Fisher Analysis}, journal = {J. Inf. Process. Syst.}, volume = {12}, number = {3}, pages = {392--409}, year = {2016}, url = {https://doi.org/10.3745/JIPS.02.0043}, doi = {10.3745/JIPS.02.0043}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jips/BoussaadBB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/KenidraBBB16, author = {Billel Kenidra and Mohamed Benmohammed and Abdesselem Beghriche and Zakaria Benmounah}, title = {A Partitional Approach for Genomic-Data Clustering Combined with K-Means Algorithm}, booktitle = {2016 {IEEE} Intl Conference on Computational Science and Engineering, {CSE} 2016, and {IEEE} Intl Conference on Embedded and Ubiquitous Computing, {EUC} 2016, and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering, {DCABES} 2016, Paris, France, August 24-26, 2016}, pages = {114--121}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CSE-EUC-DCABES.2016.170}, doi = {10.1109/CSE-EUC-DCABES.2016.170}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cse/KenidraBBB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs2/BougamouzaHB16, author = {Fateh Bougamouza and Samira Hazmoune and Mohammed Benmohammed}, title = {Using Mel Frequency Cepstral Coefficient method for online Arabic characters handwriting recognition}, booktitle = {5th International Conference on Multimedia Computing and Systems, {ICMCS} 2016, Marrakech, Morocco, September 29 - October 1, 2016}, pages = {87--92}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICMCS.2016.7905532}, doi = {10.1109/ICMCS.2016.7905532}, timestamp = {Mon, 09 Aug 2021 14:54:02 +0200}, biburl = {https://dblp.org/rec/conf/icmcs2/BougamouzaHB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isivc/MahamdiouaB16, author = {Meriama Mahamdioua and Mohammed Benmohammed}, title = {Robust {SIFT} for dark face images recogntition}, booktitle = {International Symposium on Signal, Image, Video and Communications, {ISIVC} 2016, Tunis, Tunisia, November 21-23, 2016}, pages = {53--58}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISIVC.2016.7893961}, doi = {10.1109/ISIVC.2016.7893961}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/isivc/MahamdiouaB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ChikoucheFCB15, author = {Noureddine Chikouche and Cherif Foudil and Pierre{-}Louis Cayrel and Mohamed Benmohammed}, title = {Improved {RFID} Authentication Protocol Based on Randomized McEliece Cryptosystem}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {4}, pages = {413--422}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n4/ijns-2015-v17-n4-p413-422.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ChikoucheFCB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/c2si/ChikoucheFCB15, author = {Noureddine Chikouche and Cherif Foudil and Pierre{-}Louis Cayrel and Mohamed Benmohammed}, editor = {Said El Hajji and Abderrahmane Nitaj and Claude Carlet and El Mamoun Souidi}, title = {Weaknesses in Two {RFID} Authentication Protocols}, booktitle = {Codes, Cryptology, and Information Security - First International Conference, {C2SI} 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger}, series = {Lecture Notes in Computer Science}, volume = {9084}, pages = {162--172}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18681-8\_13}, doi = {10.1007/978-3-319-18681-8\_13}, timestamp = {Tue, 27 Aug 2019 17:49:45 +0200}, biburl = {https://dblp.org/rec/conf/c2si/ChikoucheFCB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciip/KenidraB15, author = {Billel Kenidra and Mohamed Benmohammed}, title = {A data-clustering approach based on artificial ant colonies with control of emergence combined with K-Means approach}, booktitle = {{IPAC} '15: International Conference on Intelligent Information Processing, Security and Advanced Communication, Batna, Algeria, November, 2015}, pages = {48:1--48:5}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2816839.2816931}, doi = {10.1145/2816839.2816931}, timestamp = {Fri, 11 Feb 2022 10:52:28 +0100}, biburl = {https://dblp.org/rec/conf/iciip/KenidraB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ieeehpcs/GuerarMMBM15, author = {Meriem Guerar and Mauro Migliardi and Alessio Merlo and Mohamed Benmohammed and Belhadri Messabih}, title = {A Completely Automatic Public Physical test to tell Computers and Humans Apart: {A} way to enhance authentication schemes in mobile devices}, booktitle = {2015 International Conference on High Performance Computing {\&} Simulation, {HPCS} 2015, Amsterdam, Netherlands, July 20-24, 2015}, pages = {203--210}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/HPCSim.2015.7237041}, doi = {10.1109/HPCSIM.2015.7237041}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ieeehpcs/GuerarMMBM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip12/ZennirBB15, author = {Mohamed Nadjib Zennir and Mohamed Benmohammed and Rima Boudjadja}, editor = {Richard Chbeir and Yannis Manolopoulos and Ilias Maglogiannis and Reda Alhajj}, title = {Spike-Time Dependant Plasticity in a Spiking Neural Network for Robot Path Planning}, booktitle = {Proceedings of the Special Tracks and Workshops at the 11th International Conference on Artificial Intelligence Applications and Innovations {(AIAI} 2015), Bayonne, France, September 14-17, 2015}, series = {{CEUR} Workshop Proceedings}, volume = {1539}, pages = {2--13}, publisher = {CEUR-WS.org}, year = {2015}, url = {https://ceur-ws.org/Vol-1539/paper1.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:48 +0100}, biburl = {https://dblp.org/rec/conf/ifip12/ZennirBB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/BoulfekharB14, author = {Samra Boulfekhar and Mohamed Benmohammed}, title = {Synchronous receiver initiated {MAC} protocol for long-lived sensor networks}, journal = {Comput. Electr. Eng.}, volume = {40}, number = {2}, pages = {504--516}, year = {2014}, url = {https://doi.org/10.1016/j.compeleceng.2013.07.011}, doi = {10.1016/J.COMPELECENG.2013.07.011}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/BoulfekharB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcvip/TaffarMB14, author = {Mokhtar Taffar and Serge Miguet and Mohamed Benmohammed}, title = {Probabilistic Modeling for Detection and Gender Classification}, journal = {Int. J. Comput. Vis. Image Process.}, volume = {4}, number = {1}, pages = {30--39}, year = {2014}, url = {https://doi.org/10.4018/ijcvip.2014010103}, doi = {10.4018/IJCVIP.2014010103}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcvip/TaffarMB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmso/NabilMB14, author = {Nabil Sahli and Mohamed Benmohammed and El{-}Bay Bourennane}, title = {Ontology and protocol secure for {SCADA}}, journal = {Int. J. Metadata Semant. Ontologies}, volume = {9}, number = {2}, pages = {114--127}, year = {2014}, url = {https://doi.org/10.1504/IJMSO.2014.060321}, doi = {10.1504/IJMSO.2014.060321}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmso/NabilMB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijprai/LehtihetOB14, author = {Raja Lehtihet and Wael El Oraiby and Mohamed Benmohammed}, title = {Ridge frequency estimation for Low-Quality Fingerprint Images enhancement using Delaunay Triangulation}, journal = {Int. J. Pattern Recognit. Artif. Intell.}, volume = {28}, number = {1}, year = {2014}, url = {https://doi.org/10.1142/S0218001414560023}, doi = {10.1142/S0218001414560023}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijprai/LehtihetOB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijapr/TaffarMB13, author = {Mokhtar Taffar and Serge Miguet and Mohamed Benmohammed}, title = {Viewpoint invariant gender recognition}, journal = {Int. J. Appl. Pattern Recognit.}, volume = {1}, number = {1}, pages = {47--60}, year = {2013}, url = {https://doi.org/10.1504/IJAPR.2013.052341}, doi = {10.1504/IJAPR.2013.052341}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijapr/TaffarMB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcvr/TaffarMB13, author = {Mokhtar Taffar and Serge Miguet and Mohamed Benmohammed}, title = {Viewpoint invariant model for face detection}, journal = {Int. J. Comput. Vis. Robotics}, volume = {3}, number = {3}, pages = {182--196}, year = {2013}, url = {https://doi.org/10.1504/IJCVR.2013.056039}, doi = {10.1504/IJCVR.2013.056039}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcvr/TaffarMB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijertcs/GhenaiB13, author = {Afifa Ghenai and Mohamed Benmohammed}, title = {Hybrid Simulation Based Approach for Embedded Systems Reliability Analysis}, journal = {Int. J. Embed. Real Time Commun. Syst.}, volume = {4}, number = {4}, pages = {27--47}, year = {2013}, url = {https://doi.org/10.4018/ijertcs.2013100102}, doi = {10.4018/IJERTCS.2013100102}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijertcs/GhenaiB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/BoulfekharB13, author = {Samra Boulfekhar and Mohamed Benmohammed}, title = {A Novel Energy Efficient and Lifetime Maximization Routing Protocol in Wireless Sensor Networks}, journal = {Wirel. Pers. Commun.}, volume = {72}, number = {2}, pages = {1333--1349}, year = {2013}, url = {https://doi.org/10.1007/s11277-013-1081-4}, doi = {10.1007/S11277-013-1081-4}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/BoulfekharB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secnet/ChikoucheFB13, author = {Noureddine Chikouche and Cherif Foudil and Mohamed Benmohammed}, editor = {Ali Ismail Awad and Aboul Ella Hassanien and Kensuke Baba}, title = {Algebraic Replay Attacks on Authentication in {RFID} Protocols}, booktitle = {Advances in Security of Information and Communication Networks - First International Conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013. Proceedings}, series = {Communications in Computer and Information Science}, volume = {381}, pages = {153--163}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40597-6\_13}, doi = {10.1007/978-3-642-40597-6\_13}, timestamp = {Wed, 19 May 2021 08:32:23 +0200}, biburl = {https://dblp.org/rec/conf/secnet/ChikoucheFB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GhenaiBB13, author = {Afifa Ghenai and Mohamed Youcef Badaoui and Mohamed Benmohammed}, title = {Towards a Good {ABS} Design for more Reliable Vehicles on the Roads}, journal = {CoRR}, volume = {abs/1307.3086}, year = {2013}, url = {http://arxiv.org/abs/1307.3086}, eprinttype = {arXiv}, eprint = {1307.3086}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GhenaiBB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bwcca/ChellougB12, author = {Samia Chelloug and Mohamed Benmohammed}, title = {Simulated Annealing for Maximizing the Lifetime of Sensor Networks under Opportunistic Routing}, booktitle = {2012 Seventh International Conference on Broadband, Wireless Computing, Communication and Applications, Victoria, BC, Canada, November 12-14, 2012}, pages = {14--19}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/BWCCA.2012.13}, doi = {10.1109/BWCCA.2012.13}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/bwcca/ChellougB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyberc/DjellabB12, author = {Rima Djellab and Mohamed Benmohammed}, title = {Securing Encryption Key Distribution in {WLAN} via {QKD}}, booktitle = {2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2012, Sanya, China, October 10-12, 2012}, pages = {160--165}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CyberC.2012.34}, doi = {10.1109/CYBERC.2012.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyberc/DjellabB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsrt/BoulfekharBB12, author = {Samra Boulfekhar and Louiza Bouallouche and Mohamed Benmohammed}, editor = {Azzedine Boukerche and Vinny Cahill and Abdulmotaleb El{-}Saddik and Georgios Theodoropoulos and Ray Walshe}, title = {{S-TDMA:} {A} New {MAC} Protocol for Wireless Sensor Networks}, booktitle = {16th {IEEE/ACM} International Symposium on Distributed Simulation and Real Time Applications, {DS-RT} 2012, Dublin, Ireland, October 25-27, 2012}, pages = {29--35}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/DS-RT.2012.13}, doi = {10.1109/DS-RT.2012.13}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsrt/BoulfekharBB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwit/NabilM12, author = {Nabil Sahli and Mohamed Benmohammed}, editor = {Mimoun Malki and Salima Benbernou and Sidi Mohamed Benslimane and Ahmed Lehireche}, title = {Security Ontology for Semantic {SCADA}}, booktitle = {Proceedings of the 4th International conference on Web and Information Technologies, {ICWIT} 2012, Sidi Bel Abbes, Algeria, April 29-30, 2012}, series = {{CEUR} Workshop Proceedings}, volume = {867}, pages = {179--192}, publisher = {CEUR-WS.org}, year = {2012}, url = {https://ceur-ws.org/Vol-867/Paper19.pdf}, timestamp = {Fri, 10 Mar 2023 16:23:03 +0100}, biburl = {https://dblp.org/rec/conf/icwit/NabilM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndt/TaffarMB12, author = {Mokhtar Taffar and Serge Miguet and Mohamed Benmohammed}, editor = {Rachid Benlamri}, title = {Viewpoint Invariant Face Detection}, booktitle = {Networked Digital Technologies - 4th International Conference, {NDT} 2012, Dubai, UAE, April 24-26, 2012, Proceedings, Part {II}}, series = {Communications in Computer and Information Science}, volume = {294}, pages = {390--402}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30567-2\_33}, doi = {10.1007/978-3-642-30567-2\_33}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndt/TaffarMB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1207-5627, author = {Noureddine Chikouche and Cherif Foudil and Mohamed Benmohammed}, title = {An Authentication Protocol Based on Combined RFID-Biometric System RFID-Biometric System}, journal = {CoRR}, volume = {abs/1207.5627}, year = {2012}, url = {http://arxiv.org/abs/1207.5627}, eprinttype = {arXiv}, eprint = {1207.5627}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1207-5627.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/KefCB11, author = {Ma{\^{a}}mar Kef and Leila Chergui and Mohamed Benmohammed}, title = {Self-organization and topology's control for mobile ad-hoc networks}, journal = {Int. Arab J. Inf. Technol.}, volume = {8}, number = {3}, pages = {227--234}, year = {2011}, url = {http://iajit.org/index.php?option=com\_content\&\#38;task=blogcategory\&\#38;id=74\&\#38;Itemid=319}, timestamp = {Thu, 16 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iajit/KefCB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciia/ChikoucheCB11, author = {Noureddine Chikouche and Cherif Foudil and Mohamed Benmohammed}, editor = {Abdelmalek Amine and Otmane A{\"{\i}}t Mohamed and Boualem Benatallah and Zakaria Elberrichi}, title = {Conception et V{\'{e}}rification d'un Protocole d'Authentification de Syst{\'{e}}me Combin{\'{e}} RFID-Biom{\'{e}}trique}, booktitle = {Proceedings of the Third International Conference on Computer Science and its Applications (CIIA'11), Saida, Algeria, December 13-15, 2011}, series = {{CEUR} Workshop Proceedings}, volume = {825}, publisher = {CEUR-WS.org}, year = {2011}, url = {https://ceur-ws.org/Vol-825/paper\_76.pdf}, timestamp = {Fri, 10 Mar 2023 16:23:22 +0100}, biburl = {https://dblp.org/rec/conf/ciia/ChikoucheCB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ip-c/LehtihetOB11, author = {Raja Lehtihet and Wael El Oraiby and Mohammed Benmohammed}, editor = {Ryszard S. Choras}, title = {Improved Fingerprint Enhancement Performance via {GPU} Programming}, booktitle = {Image Processing and Communications Challenges 3 - 3rd International Conference, IP{\&}C 2011, Proceedings}, series = {Advances in Intelligent and Soft Computing}, volume = {102}, pages = {13--21}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23154-4\_2}, doi = {10.1007/978-3-642-23154-4\_2}, timestamp = {Fri, 15 Sep 2017 09:48:55 +0200}, biburl = {https://dblp.org/rec/conf/ip-c/LehtihetOB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ip-c/TaffarB11, author = {Mokhtar Taffar and Mohammed Benmohammed}, editor = {Ryszard S. Choras}, title = {Generic Face Invariant Model for Face Detection}, booktitle = {Image Processing and Communications Challenges 3 - 3rd International Conference, IP{\&}C 2011, Proceedings}, series = {Advances in Intelligent and Soft Computing}, volume = {102}, pages = {43--51}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23154-4\_5}, doi = {10.1007/978-3-642-23154-4\_5}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ip-c/TaffarB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmm2/BoutekkoukB10, author = {Fateh Boutekkouk and Mohamed Benmohammed}, title = {Using {UML} as a Front-end for StreamIt Programs Verification and Generation}, journal = {J. Multim.}, volume = {5}, number = {5}, pages = {501--513}, year = {2010}, url = {https://doi.org/10.4304/jmm.5.5.501-513}, doi = {10.4304/JMM.5.5.501-513}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmm2/BoutekkoukB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalt/DjouadMRB10, author = {Tarek Djouad and Alain Mille and Christophe Reffay and Mohamed Benmohammed}, title = {A New Approach Based on Modelled Traces to Compute Collaborative and Individual Indicators Human Interaction}, booktitle = {{ICALT} 2010, 10th {IEEE} International Conference on Advanced Learning Technologies, Sousse, Tunisia, 5-7 July 2010}, pages = {53--54}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ICALT.2010.21}, doi = {10.1109/ICALT.2010.21}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icalt/DjouadMRB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jot/BoutekkoukBBA09, author = {Fateh Boutekkouk and Mohamed Benmohammed and S{\'{e}}bastien Bilavarn and Michel Auguin}, title = {{UML2.0} Profiles for Embedded Systems and Systems On a Chip (SOCs)}, journal = {J. Object Technol.}, volume = {8}, number = {1}, pages = {135--157}, year = {2009}, url = {https://doi.org/10.5381/jot.2009.8.1.a1}, doi = {10.5381/JOT.2009.8.1.A1}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jot/BoutekkoukBBA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jot/BoutekkoukBBA09a, author = {Fateh Boutekkouk and Mohamed Benmohammed and S{\'{e}}bastien Bilavarn and Michel Auguin}, title = {{UML} for Modelling and Performance Estimation of Embedded Systems}, journal = {J. Object Technol.}, volume = {8}, number = {2}, pages = {95--118}, year = {2009}, url = {https://doi.org/10.5381/jot.2009.8.2.a1}, doi = {10.5381/JOT.2009.8.2.A1}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jot/BoutekkoukBBA09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciia/CherguiKB09, author = {Leila Chergui and Ma{\^{a}}mar Kef and Mohamed Benmohammed}, editor = {Abdelmalek Amine and Otmane A{\"{\i}}t Mohamed and Zakaria Elberrichi}, title = {La Th{\'{e}}orie de la R{\'{e}}sonance Adaptative et les Moments de Zernike pour la Reconnaissance de Mots Arabes Manuscrits}, booktitle = {Proceedings of the 2nd Conf{\'{e}}rence Internationale sur l'Informatique et ses Applications (CIIA'09), Saida, Algeria, May 3-4, 2009}, series = {{CEUR} Workshop Proceedings}, volume = {547}, publisher = {CEUR-WS.org}, year = {2009}, url = {https://ceur-ws.org/Vol-547/108.pdf}, timestamp = {Fri, 10 Mar 2023 16:23:22 +0100}, biburl = {https://dblp.org/rec/conf/ciia/CherguiKB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciia/HarragB09, author = {Fouzi Harrag and Mohamed Benmohammed}, editor = {Abdelmalek Amine and Otmane A{\"{\i}}t Mohamed and Zakaria Elberrichi}, title = {{\'{E}}tude Comparative des Algorithmes de Segmentation Th{\'{e}}matique Pour la Langue Arabe}, booktitle = {Proceedings of the 2nd Conf{\'{e}}rence Internationale sur l'Informatique et ses Applications (CIIA'09), Saida, Algeria, May 3-4, 2009}, series = {{CEUR} Workshop Proceedings}, volume = {547}, publisher = {CEUR-WS.org}, year = {2009}, url = {https://ceur-ws.org/Vol-547/149.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ciia/HarragB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceccs/BoutekkoukB09, author = {Fateh Boutekkouk and Mohamed Benmohammed}, title = {{UML} Modeling and Formal Verification of Control/Data Driven Embedded Systems}, booktitle = {14th {IEEE} International Conference on Engineering of Complex Computer Systems, {ICECCS} 2009, Potsdam, Germany, 2-4 June 2009}, pages = {311--316}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICECCS.2009.30}, doi = {10.1109/ICECCS.2009.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iceccs/BoutekkoukB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issoc/BoutekkoukBAB08, author = {Fateh Boutekkouk and S{\'{e}}bastien Bilavarn and Michel Auguin and Mohammed Benmohammed}, title = {{UML} profile for estimating application Worst Case Execution Time on System-on-Chip}, booktitle = {2008 {IEEE} International Symposium on System-on-Chip, {SOC} 2008, Tampere, Finland, November 5-6, 2008}, pages = {1--6}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISSOC.2008.4694865}, doi = {10.1109/ISSOC.2008.4694865}, timestamp = {Mon, 09 Aug 2021 14:54:02 +0200}, biburl = {https://dblp.org/rec/conf/issoc/BoutekkoukBAB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itng/MernizB08, author = {Salah Merniz and Mohamed Benmohammed}, editor = {Shahram Latifi}, title = {A Scalable Proof Methodology for {RISC} Processor Designs: {A} Functional Approach}, booktitle = {Fifth International Conference on Information Technology: New Generations {(ITNG} 2008), 7-8 April 2008, Las Vegas, Nevada, {USA}}, pages = {241--246}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ITNG.2008.92}, doi = {10.1109/ITNG.2008.92}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itng/MernizB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/notere/BoulfekharB08, author = {Samra Boulfekhar and Mohamed Benmohammed}, editor = {Djamal Benslimane and Aris M. Ouksel}, title = {{EERP:} energy-efficient routing protocol for wireless sensor networks}, booktitle = {Proceedings of the 8th international conference on New technologies in distributed systems, {NOTERE} '08, Lyon, France, June 23-27, 2008}, pages = {16:1--16:6}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1416729.1416749}, doi = {10.1145/1416729.1416749}, timestamp = {Tue, 25 Aug 2020 14:35:29 +0200}, biburl = {https://dblp.org/rec/conf/notere/BoulfekharB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiccsa/MernizB07, author = {Salah Merniz and Mohamed Benmohammed}, title = {A Methodology for the Formal Verification of {RISC} Microprocessors {A} Functional Approach}, booktitle = {2007 {IEEE/ACS} International Conference on Computer Systems and Applications {(AICCSA} 2007), 13-16 May 2007, Amman, Jordan}, pages = {492--499}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/AICCSA.2007.370927}, doi = {10.1109/AICCSA.2007.370927}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aiccsa/MernizB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiccsa/HadjamRB01, author = {F. Z. Hadjam and Abdellatif Rahmoun and Mohamed Benmohammed}, title = {On Designing a Systolic Network for the Resolution of Linear Systems Using the " Gauss-Seidel " Method}, booktitle = {2001 {ACS} / {IEEE} International Conference on Computer Systems and Applications {(AICCSA} 2001), 26-29 June 2001, Beirut, Lebanon}, pages = {283--286}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/AICCSA.2001.933994}, doi = {10.1109/AICCSA.2001.933994}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aiccsa/HadjamRB01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icecsys/BenmohammedRK00, author = {Mohamed Benmohammed and Abdelatif Rahmoune and Polen Kission}, title = {The application of high-level synthesis techniques for the generation of pipelined reprogrammable microcontrollers}, booktitle = {Proceedings of the 2000 7th {IEEE} International Conference on Electronics, Circuits and Systems, {ICECS} 2000, Jounieh, Lebanon, December 17-20, 2000}, pages = {993--998}, publisher = {{IEEE}}, year = {2000}, url = {https://doi.org/10.1109/ICECS.2000.913043}, doi = {10.1109/ICECS.2000.913043}, timestamp = {Mon, 09 Aug 2021 14:54:04 +0200}, biburl = {https://dblp.org/rec/conf/icecsys/BenmohammedRK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.