BibTeX records: Mohamed Benmohammed

download as .bib file

@article{DBLP:journals/ijista/HazmouneBMB24,
  author       = {Samira Hazmoune and
                  Fateh Bougamouza and
                  Smaine Mazouzi and
                  Mohamed Benmohammed},
  title        = {Boosting speech recognition performance: a robust and accurate ensemble
                  method based on HMMs},
  journal      = {Int. J. Intell. Syst. Technol. Appl.},
  volume       = {22},
  number       = {1},
  pages        = {41--76},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJISTA.2024.136523},
  doi          = {10.1504/IJISTA.2024.136523},
  timestamp    = {Fri, 16 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijista/HazmouneBMB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csr2/ChelghoumBBSB23,
  author       = {Massinissa Chelghoum and
                  Gueltoum Bendiab and
                  Mohamed Benmohammed and
                  Stavros Shiaeles and
                  Emanuele Bellini},
  title        = {{BTV2P:} Blockchain-based Trust Model for Secure Vehicles and Pedestrians
                  Networks},
  booktitle    = {{IEEE} International Conference on Cyber Security and Resilience,
                  {CSR} 2023, Venice, Italy, July 31 - Aug. 2, 2023},
  pages        = {148--153},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CSR57506.2023.10224934},
  doi          = {10.1109/CSR57506.2023.10224934},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csr2/ChelghoumBBSB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/HamoudAB22,
  author       = {Aymen Hamoud and
                  Esma A{\"{\i}}meur and
                  Mohamed Benmohammed},
  title        = {Individual Processing of Phishing Emails: Towards a Phishing Detection
                  Framework},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {14},
  number       = {1},
  pages        = {1--22},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijsppc.311060},
  doi          = {10.4018/IJSPPC.311060},
  timestamp    = {Tue, 29 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/HamoudAB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/es/BahloulAB20,
  author       = {Belahcene Bahloul and
                  Hassina Aliane and
                  Mohamed Benmohammed},
  title        = {ArA*summarizer: An Arabic text summarization system based on subtopic
                  segmentation and using an A* algorithm for reduction},
  journal      = {Expert Syst. J. Knowl. Eng.},
  volume       = {37},
  number       = {2},
  year         = {2020},
  url          = {https://doi.org/10.1111/exsy.12476},
  doi          = {10.1111/EXSY.12476},
  timestamp    = {Tue, 26 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/es/BahloulAB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijamc-igi/KenidraB20,
  author       = {Billel Kenidra and
                  Mohamed Benmohammed},
  title        = {An Ultra-Fast Method for Clustering of Big Genomic Data},
  journal      = {Int. J. Appl. Metaheuristic Comput.},
  volume       = {11},
  number       = {1},
  pages        = {45--60},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJAMC.2020010104},
  doi          = {10.4018/IJAMC.2020010104},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijamc-igi/KenidraB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/RamdaniBB20,
  author       = {Mohamed Ramdani and
                  Mohamed Benmohammed and
                  Nadjia Benblidia},
  title        = {Comparison of scalar point multiplication algorithms in a low resource
                  device},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {32},
  number       = {4},
  pages        = {425--432},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jksuci.2019.07.013},
  doi          = {10.1016/J.JKSUCI.2019.07.013},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/RamdaniBB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jrtip/AraarGBA20,
  author       = {Chaouki Araar and
                  Salim Ghanemi and
                  Mohamed Benmohammed and
                  Hamza Atoui},
  title        = {Pruned improved eight-point approximate {DCT} for image encoding in
                  visual sensor networks requiring only ten additions},
  journal      = {J. Real Time Image Process.},
  volume       = {17},
  number       = {5},
  pages        = {1597--1608},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11554-019-00918-2},
  doi          = {10.1007/S11554-019-00918-2},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jrtip/AraarGBA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaase/BourebaaB20,
  author       = {Fatima Bourebaa and
                  Mohamed Benmohammed},
  title        = {Android Malware Detection using Convolutional Deep Neural Networks},
  booktitle    = {4th International Conference on Advanced Aspects of Software Engineering,
                  {ICAASE} 2020, Constantine, Algeria, November 28-30, 2020},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICAASE51408.2020.9380104},
  doi          = {10.1109/ICAASE51408.2020.9380104},
  timestamp    = {Wed, 14 Apr 2021 11:43:46 +0200},
  biburl       = {https://dblp.org/rec/conf/icaase/BourebaaB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijhpcn/GherbiAB19,
  author       = {Chirihane Gherbi and
                  Zibouda Aliouat and
                  Mohamed Benmohammed},
  title        = {Comparative analysis of hierarchical cluster protocols for wireless
                  sensor networks},
  journal      = {Int. J. High Perform. Comput. Netw.},
  volume       = {13},
  number       = {4},
  pages        = {366--377},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJHPCN.2019.099261},
  doi          = {10.1504/IJHPCN.2019.099261},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijhpcn/GherbiAB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnsm/GherbiAB19,
  author       = {Chirihane Gherbi and
                  Zibouda Aliouat and
                  Mohamed Benmohammed},
  title        = {A Novel Load Balancing Scheduling Algorithm for Wireless Sensor Networks},
  journal      = {J. Netw. Syst. Manag.},
  volume       = {27},
  number       = {2},
  pages        = {430--462},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10922-018-9473-0},
  doi          = {10.1007/S10922-018-9473-0},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnsm/GherbiAB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-cvi/MahamdiouaB18,
  author       = {Meriama Mahamdioua and
                  Mohamed Benmohammed},
  title        = {Automatic adaptation of {SIFT} for robust facial recognition in uncontrolled
                  lighting conditions},
  journal      = {{IET} Comput. Vis.},
  volume       = {12},
  number       = {5},
  pages        = {623--633},
  year         = {2018},
  url          = {https://doi.org/10.1049/iet-cvi.2017.0190},
  doi          = {10.1049/IET-CVI.2017.0190},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-cvi/MahamdiouaB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnds/GherbiAB18,
  author       = {Chirihane Gherbi and
                  Zibouda Aliouat and
                  Mohamed Benmohammed},
  title        = {Energy efficient with time synchronised and service coverage guarantee
                  in wireless sensor networks},
  journal      = {Int. J. Commun. Networks Distributed Syst.},
  volume       = {21},
  number       = {1},
  pages        = {56--79},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJCNDS.2018.10013880},
  doi          = {10.1504/IJCNDS.2018.10013880},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnds/GherbiAB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcvr/BadecheBMBP18,
  author       = {Mohamed Badeche and
                  Fr{\'{e}}d{\'{e}}ric Bousefsaf and
                  Abdelhak Moussaoui and
                  Mohamed Benmohammed and
                  Alain Pruski},
  title        = {An automatic natural feature selection system for indoor tracking
                  - application to Alzheimer patient support},
  journal      = {Int. J. Comput. Vis. Robotics},
  volume       = {8},
  number       = {2},
  pages        = {201--220},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJCVR.2018.10013161},
  doi          = {10.1504/IJCVR.2018.10013161},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcvr/BadecheBMBP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcvr/BougamouzaHB18,
  author       = {Fateh Bougamouza and
                  Samira Hazmoune and
                  Mohamed Benmohammed},
  title        = {Normalisation of handwriting speed for online Arabic characters recognition},
  journal      = {Int. J. Comput. Vis. Robotics},
  volume       = {8},
  number       = {6},
  pages        = {591--605},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJCVR.2018.095589},
  doi          = {10.1504/IJCVR.2018.095589},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcvr/BougamouzaHB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijst/HazmouneBMB18,
  author       = {Samira Hazmoune and
                  Fateh Bougamouza and
                  Smaine Mazouzi and
                  Mohamed Benmohammed},
  title        = {A new hybrid framework based on Hidden Markov models and K-nearest
                  neighbors for speech recognition},
  journal      = {Int. J. Speech Technol.},
  volume       = {21},
  number       = {3},
  pages        = {689--704},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10772-018-9535-4},
  doi          = {10.1007/S10772-018-9535-4},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijst/HazmouneBMB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GuerarMMBPC18,
  author       = {Meriem Guerar and
                  Mauro Migliardi and
                  Alessio Merlo and
                  Mohamed Benmohammed and
                  Francesco Palmieri and
                  Aniello Castiglione},
  title        = {Using Screen Brightness to Improve Security in Mobile Social Network
                  Access},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {15},
  number       = {4},
  pages        = {621--632},
  year         = {2018},
  url          = {https://doi.org/10.1109/TDSC.2016.2601603},
  doi          = {10.1109/TDSC.2016.2601603},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/GuerarMMBPC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaase/RamdaniBB18,
  author       = {Mohamed Ramdani and
                  Mohamed Benmohammed and
                  Nadjia Benblidia},
  editor       = {Ramdane Maamri and
                  Faiza Belala},
  title        = {Comparison of Scalar Multiplication Algorithms in a Low Resource Device},
  booktitle    = {Proceedings of the 3rd International Conference on Advanced Aspects
                  of Software Engineering, {ICAASE} 2018, Constantine, Algeria, December
                  1-2, 2018},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2326},
  pages        = {70--75},
  publisher    = {CEUR-WS.org},
  year         = {2018},
  url          = {https://ceur-ws.org/Vol-2326/paper9.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:44 +0100},
  biburl       = {https://dblp.org/rec/conf/icaase/RamdaniBB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfnds/RamdaniBB18,
  author       = {Mohamed Ramdani and
                  Mohamed Benmohammed and
                  Nadjia Benblidia},
  editor       = {Abdelrahman Abuarqoub and
                  Bamidele Adebisi and
                  Mohammad Hammoudeh and
                  Sharefa Murad and
                  Mounir Arioua},
  title        = {Distributed solution of scalar multiplication on elliptic curves over
                  \emph{F\({}_{\mbox{p}}\)} for resource-constrained networks},
  booktitle    = {Proceedings of the 2nd International Conference on Future Networks
                  and Distributed Systems, Amman, Jordan, June 26-27, 2018},
  pages        = {63:1--63:6},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3231053.3231130},
  doi          = {10.1145/3231053.3231130},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icfnds/RamdaniBB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/misc/MaoucheB18,
  author       = {Fadila Maouche and
                  Mohamed Benmohammed},
  editor       = {Salim Chikhi and
                  Abdelmalek Amine and
                  Allaoua Chaoui and
                  Djamel{-}Eddine Sa{\"{\i}}douni},
  title        = {Dynamic Time Warping Inside a Genetic Algorithm for Automatic Speech
                  Recognition},
  booktitle    = {Modelling and Implementation of Complex Systems - Proceedings of the
                  5th International Symposium, {MISC} 2018, Laghouat, Algeria, December
                  16-18, 2018},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {64},
  pages        = {180--192},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05481-6\_14},
  doi          = {10.1007/978-3-030-05481-6\_14},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/misc/MaoucheB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iajit/DerdouriPB17,
  author       = {Lakhdar Derdouri and
                  Congduc Pham and
                  Mohamed Benmohammed},
  title        = {Analysis of hybrid router-assisted reliable multicast protocols in
                  lossy networks},
  journal      = {Int. Arab J. Inf. Technol.},
  volume       = {14},
  number       = {1},
  pages        = {26--34},
  year         = {2017},
  url          = {http://iajit.org/index.php?option=com\_content\&\#38;task=blogcategory\&\#38;id=111\&\#38;Itemid=419},
  timestamp    = {Thu, 16 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iajit/DerdouriPB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/DjellabB17,
  author       = {Rima Djellab and
                  Mohamed Benmohammed},
  title        = {A novel quantum distributed key management protocol for ring-organised
                  group},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {9},
  number       = {4},
  pages        = {302--323},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJICS.2017.10004329},
  doi          = {10.1504/IJICS.2017.10004329},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/DjellabB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijissc/BoumassataB17,
  author       = {Meriem Boumassata and
                  Mohamed Benmohammed},
  title        = {Two Rounds Based {LEACH:} {A} Variant of Low Energy Adaptive Clustering
                  Hierarchy for Wireless Sensor Networks},
  journal      = {Int. J. Inf. Syst. Soc. Chang.},
  volume       = {8},
  number       = {3},
  pages        = {34--44},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJISSC.2017070103},
  doi          = {10.4018/IJISSC.2017070103},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijissc/BoumassataB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/LakehalZB17,
  author       = {Elkhamssa Lakehal and
                  Djemel Ziou and
                  Mohamed Benmohammed},
  title        = {Multiple illuminant estimation from the covariance of colors},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {46},
  pages        = {107--118},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jvcir.2017.03.013},
  doi          = {10.1016/J.JVCIR.2017.03.013},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jvcir/LakehalZB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/ChikoucheFCB17,
  author       = {Noureddine Chikouche and
                  Cherif Foudil and
                  Pierre{-}Louis Cayrel and
                  Mohamed Benmohammed},
  title        = {{RFID} Authentication Protocols Based on Error-Correcting Codes: {A}
                  Survey},
  journal      = {Wirel. Pers. Commun.},
  volume       = {96},
  number       = {1},
  pages        = {509--527},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11277-017-4181-8},
  doi          = {10.1007/S11277-017-4181-8},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/ChikoucheFCB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijpcc/GherbiAB16,
  author       = {Chirihane Gherbi and
                  Zibouda Aliouat and
                  Mohamed Benmohammed},
  title        = {Using adaptive clustering scheme with load balancing to enhance energy
                  efficiency and reliability in delay tolerant with QoS in large-scale
                  mobile wireless sensor networks},
  journal      = {Int. J. Pervasive Comput. Commun.},
  volume       = {12},
  number       = {3},
  pages        = {352--374},
  year         = {2016},
  url          = {https://doi.org/10.1108/IJPCC-10-2015-0035},
  doi          = {10.1108/IJPCC-10-2015-0035},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijpcc/GherbiAB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhsn/GuerarBA16,
  author       = {Meriem Guerar and
                  Mohamed Benmohammed and
                  Vincent Alimi},
  title        = {Color wheel pin: Usable and resilient {ATM} authentication},
  journal      = {J. High Speed Networks},
  volume       = {22},
  number       = {3},
  pages        = {231--240},
  year         = {2016},
  url          = {https://doi.org/10.3233/JHS-160545},
  doi          = {10.3233/JHS-160545},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jhsn/GuerarBA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jips/BoussaadBB16,
  author       = {Leila Boussaad and
                  Mohamed Benmohammed and
                  Redha Benzid},
  title        = {Age Invariant Face Recognition Based on {DCT} Feature Extraction and
                  Kernel Fisher Analysis},
  journal      = {J. Inf. Process. Syst.},
  volume       = {12},
  number       = {3},
  pages        = {392--409},
  year         = {2016},
  url          = {https://doi.org/10.3745/JIPS.02.0043},
  doi          = {10.3745/JIPS.02.0043},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jips/BoussaadBB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/KenidraBBB16,
  author       = {Billel Kenidra and
                  Mohamed Benmohammed and
                  Abdesselem Beghriche and
                  Zakaria Benmounah},
  title        = {A Partitional Approach for Genomic-Data Clustering Combined with K-Means
                  Algorithm},
  booktitle    = {2016 {IEEE} Intl Conference on Computational Science and Engineering,
                  {CSE} 2016, and {IEEE} Intl Conference on Embedded and Ubiquitous
                  Computing, {EUC} 2016, and 15th Intl Symposium on Distributed Computing
                  and Applications for Business Engineering, {DCABES} 2016, Paris, France,
                  August 24-26, 2016},
  pages        = {114--121},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CSE-EUC-DCABES.2016.170},
  doi          = {10.1109/CSE-EUC-DCABES.2016.170},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cse/KenidraBBB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs2/BougamouzaHB16,
  author       = {Fateh Bougamouza and
                  Samira Hazmoune and
                  Mohammed Benmohammed},
  title        = {Using Mel Frequency Cepstral Coefficient method for online Arabic
                  characters handwriting recognition},
  booktitle    = {5th International Conference on Multimedia Computing and Systems,
                  {ICMCS} 2016, Marrakech, Morocco, September 29 - October 1, 2016},
  pages        = {87--92},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICMCS.2016.7905532},
  doi          = {10.1109/ICMCS.2016.7905532},
  timestamp    = {Mon, 09 Aug 2021 14:54:02 +0200},
  biburl       = {https://dblp.org/rec/conf/icmcs2/BougamouzaHB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isivc/MahamdiouaB16,
  author       = {Meriama Mahamdioua and
                  Mohammed Benmohammed},
  title        = {Robust {SIFT} for dark face images recogntition},
  booktitle    = {International Symposium on Signal, Image, Video and Communications,
                  {ISIVC} 2016, Tunis, Tunisia, November 21-23, 2016},
  pages        = {53--58},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISIVC.2016.7893961},
  doi          = {10.1109/ISIVC.2016.7893961},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/isivc/MahamdiouaB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChikoucheFCB15,
  author       = {Noureddine Chikouche and
                  Cherif Foudil and
                  Pierre{-}Louis Cayrel and
                  Mohamed Benmohammed},
  title        = {Improved {RFID} Authentication Protocol Based on Randomized McEliece
                  Cryptosystem},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {4},
  pages        = {413--422},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n4/ijns-2015-v17-n4-p413-422.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ChikoucheFCB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/c2si/ChikoucheFCB15,
  author       = {Noureddine Chikouche and
                  Cherif Foudil and
                  Pierre{-}Louis Cayrel and
                  Mohamed Benmohammed},
  editor       = {Said El Hajji and
                  Abderrahmane Nitaj and
                  Claude Carlet and
                  El Mamoun Souidi},
  title        = {Weaknesses in Two {RFID} Authentication Protocols},
  booktitle    = {Codes, Cryptology, and Information Security - First International
                  Conference, {C2SI} 2015, Rabat, Morocco, May 26-28, 2015, Proceedings
                  - In Honor of Thierry Berger},
  series       = {Lecture Notes in Computer Science},
  volume       = {9084},
  pages        = {162--172},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18681-8\_13},
  doi          = {10.1007/978-3-319-18681-8\_13},
  timestamp    = {Tue, 27 Aug 2019 17:49:45 +0200},
  biburl       = {https://dblp.org/rec/conf/c2si/ChikoucheFCB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciip/KenidraB15,
  author       = {Billel Kenidra and
                  Mohamed Benmohammed},
  title        = {A data-clustering approach based on artificial ant colonies with control
                  of emergence combined with K-Means approach},
  booktitle    = {{IPAC} '15: International Conference on Intelligent Information Processing,
                  Security and Advanced Communication, Batna, Algeria, November, 2015},
  pages        = {48:1--48:5},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2816839.2816931},
  doi          = {10.1145/2816839.2816931},
  timestamp    = {Fri, 11 Feb 2022 10:52:28 +0100},
  biburl       = {https://dblp.org/rec/conf/iciip/KenidraB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ieeehpcs/GuerarMMBM15,
  author       = {Meriem Guerar and
                  Mauro Migliardi and
                  Alessio Merlo and
                  Mohamed Benmohammed and
                  Belhadri Messabih},
  title        = {A Completely Automatic Public Physical test to tell Computers and
                  Humans Apart: {A} way to enhance authentication schemes in mobile
                  devices},
  booktitle    = {2015 International Conference on High Performance Computing {\&}
                  Simulation, {HPCS} 2015, Amsterdam, Netherlands, July 20-24, 2015},
  pages        = {203--210},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/HPCSim.2015.7237041},
  doi          = {10.1109/HPCSIM.2015.7237041},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ieeehpcs/GuerarMMBM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip12/ZennirBB15,
  author       = {Mohamed Nadjib Zennir and
                  Mohamed Benmohammed and
                  Rima Boudjadja},
  editor       = {Richard Chbeir and
                  Yannis Manolopoulos and
                  Ilias Maglogiannis and
                  Reda Alhajj},
  title        = {Spike-Time Dependant Plasticity in a Spiking Neural Network for Robot
                  Path Planning},
  booktitle    = {Proceedings of the Special Tracks and Workshops at the 11th International
                  Conference on Artificial Intelligence Applications and Innovations
                  {(AIAI} 2015), Bayonne, France, September 14-17, 2015},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1539},
  pages        = {2--13},
  publisher    = {CEUR-WS.org},
  year         = {2015},
  url          = {https://ceur-ws.org/Vol-1539/paper1.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:48 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip12/ZennirBB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/BoulfekharB14,
  author       = {Samra Boulfekhar and
                  Mohamed Benmohammed},
  title        = {Synchronous receiver initiated {MAC} protocol for long-lived sensor
                  networks},
  journal      = {Comput. Electr. Eng.},
  volume       = {40},
  number       = {2},
  pages        = {504--516},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.compeleceng.2013.07.011},
  doi          = {10.1016/J.COMPELECENG.2013.07.011},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/BoulfekharB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcvip/TaffarMB14,
  author       = {Mokhtar Taffar and
                  Serge Miguet and
                  Mohamed Benmohammed},
  title        = {Probabilistic Modeling for Detection and Gender Classification},
  journal      = {Int. J. Comput. Vis. Image Process.},
  volume       = {4},
  number       = {1},
  pages        = {30--39},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijcvip.2014010103},
  doi          = {10.4018/IJCVIP.2014010103},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcvip/TaffarMB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmso/NabilMB14,
  author       = {Nabil Sahli and
                  Mohamed Benmohammed and
                  El{-}Bay Bourennane},
  title        = {Ontology and protocol secure for {SCADA}},
  journal      = {Int. J. Metadata Semant. Ontologies},
  volume       = {9},
  number       = {2},
  pages        = {114--127},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJMSO.2014.060321},
  doi          = {10.1504/IJMSO.2014.060321},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmso/NabilMB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijprai/LehtihetOB14,
  author       = {Raja Lehtihet and
                  Wael El Oraiby and
                  Mohamed Benmohammed},
  title        = {Ridge frequency estimation for Low-Quality Fingerprint Images enhancement
                  using Delaunay Triangulation},
  journal      = {Int. J. Pattern Recognit. Artif. Intell.},
  volume       = {28},
  number       = {1},
  year         = {2014},
  url          = {https://doi.org/10.1142/S0218001414560023},
  doi          = {10.1142/S0218001414560023},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijprai/LehtihetOB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijapr/TaffarMB13,
  author       = {Mokhtar Taffar and
                  Serge Miguet and
                  Mohamed Benmohammed},
  title        = {Viewpoint invariant gender recognition},
  journal      = {Int. J. Appl. Pattern Recognit.},
  volume       = {1},
  number       = {1},
  pages        = {47--60},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJAPR.2013.052341},
  doi          = {10.1504/IJAPR.2013.052341},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijapr/TaffarMB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcvr/TaffarMB13,
  author       = {Mokhtar Taffar and
                  Serge Miguet and
                  Mohamed Benmohammed},
  title        = {Viewpoint invariant model for face detection},
  journal      = {Int. J. Comput. Vis. Robotics},
  volume       = {3},
  number       = {3},
  pages        = {182--196},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJCVR.2013.056039},
  doi          = {10.1504/IJCVR.2013.056039},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcvr/TaffarMB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijertcs/GhenaiB13,
  author       = {Afifa Ghenai and
                  Mohamed Benmohammed},
  title        = {Hybrid Simulation Based Approach for Embedded Systems Reliability
                  Analysis},
  journal      = {Int. J. Embed. Real Time Commun. Syst.},
  volume       = {4},
  number       = {4},
  pages        = {27--47},
  year         = {2013},
  url          = {https://doi.org/10.4018/ijertcs.2013100102},
  doi          = {10.4018/IJERTCS.2013100102},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijertcs/GhenaiB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/BoulfekharB13,
  author       = {Samra Boulfekhar and
                  Mohamed Benmohammed},
  title        = {A Novel Energy Efficient and Lifetime Maximization Routing Protocol
                  in Wireless Sensor Networks},
  journal      = {Wirel. Pers. Commun.},
  volume       = {72},
  number       = {2},
  pages        = {1333--1349},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11277-013-1081-4},
  doi          = {10.1007/S11277-013-1081-4},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/BoulfekharB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secnet/ChikoucheFB13,
  author       = {Noureddine Chikouche and
                  Cherif Foudil and
                  Mohamed Benmohammed},
  editor       = {Ali Ismail Awad and
                  Aboul Ella Hassanien and
                  Kensuke Baba},
  title        = {Algebraic Replay Attacks on Authentication in {RFID} Protocols},
  booktitle    = {Advances in Security of Information and Communication Networks - First
                  International Conference, SecNet 2013, Cairo, Egypt, September 3-5,
                  2013. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {381},
  pages        = {153--163},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40597-6\_13},
  doi          = {10.1007/978-3-642-40597-6\_13},
  timestamp    = {Wed, 19 May 2021 08:32:23 +0200},
  biburl       = {https://dblp.org/rec/conf/secnet/ChikoucheFB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GhenaiBB13,
  author       = {Afifa Ghenai and
                  Mohamed Youcef Badaoui and
                  Mohamed Benmohammed},
  title        = {Towards a Good {ABS} Design for more Reliable Vehicles on the Roads},
  journal      = {CoRR},
  volume       = {abs/1307.3086},
  year         = {2013},
  url          = {http://arxiv.org/abs/1307.3086},
  eprinttype    = {arXiv},
  eprint       = {1307.3086},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GhenaiBB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bwcca/ChellougB12,
  author       = {Samia Chelloug and
                  Mohamed Benmohammed},
  title        = {Simulated Annealing for Maximizing the Lifetime of Sensor Networks
                  under Opportunistic Routing},
  booktitle    = {2012 Seventh International Conference on Broadband, Wireless Computing,
                  Communication and Applications, Victoria, BC, Canada, November 12-14,
                  2012},
  pages        = {14--19},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/BWCCA.2012.13},
  doi          = {10.1109/BWCCA.2012.13},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/bwcca/ChellougB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyberc/DjellabB12,
  author       = {Rima Djellab and
                  Mohamed Benmohammed},
  title        = {Securing Encryption Key Distribution in {WLAN} via {QKD}},
  booktitle    = {2012 International Conference on Cyber-Enabled Distributed Computing
                  and Knowledge Discovery, CyberC 2012, Sanya, China, October 10-12,
                  2012},
  pages        = {160--165},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberC.2012.34},
  doi          = {10.1109/CYBERC.2012.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyberc/DjellabB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsrt/BoulfekharBB12,
  author       = {Samra Boulfekhar and
                  Louiza Bouallouche and
                  Mohamed Benmohammed},
  editor       = {Azzedine Boukerche and
                  Vinny Cahill and
                  Abdulmotaleb El{-}Saddik and
                  Georgios Theodoropoulos and
                  Ray Walshe},
  title        = {{S-TDMA:} {A} New {MAC} Protocol for Wireless Sensor Networks},
  booktitle    = {16th {IEEE/ACM} International Symposium on Distributed Simulation
                  and Real Time Applications, {DS-RT} 2012, Dublin, Ireland, October
                  25-27, 2012},
  pages        = {29--35},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/DS-RT.2012.13},
  doi          = {10.1109/DS-RT.2012.13},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsrt/BoulfekharBB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwit/NabilM12,
  author       = {Nabil Sahli and
                  Mohamed Benmohammed},
  editor       = {Mimoun Malki and
                  Salima Benbernou and
                  Sidi Mohamed Benslimane and
                  Ahmed Lehireche},
  title        = {Security Ontology for Semantic {SCADA}},
  booktitle    = {Proceedings of the 4th International conference on Web and Information
                  Technologies, {ICWIT} 2012, Sidi Bel Abbes, Algeria, April 29-30,
                  2012},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {867},
  pages        = {179--192},
  publisher    = {CEUR-WS.org},
  year         = {2012},
  url          = {https://ceur-ws.org/Vol-867/Paper19.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:23:03 +0100},
  biburl       = {https://dblp.org/rec/conf/icwit/NabilM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndt/TaffarMB12,
  author       = {Mokhtar Taffar and
                  Serge Miguet and
                  Mohamed Benmohammed},
  editor       = {Rachid Benlamri},
  title        = {Viewpoint Invariant Face Detection},
  booktitle    = {Networked Digital Technologies - 4th International Conference, {NDT}
                  2012, Dubai, UAE, April 24-26, 2012, Proceedings, Part {II}},
  series       = {Communications in Computer and Information Science},
  volume       = {294},
  pages        = {390--402},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30567-2\_33},
  doi          = {10.1007/978-3-642-30567-2\_33},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndt/TaffarMB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1207-5627,
  author       = {Noureddine Chikouche and
                  Cherif Foudil and
                  Mohamed Benmohammed},
  title        = {An Authentication Protocol Based on Combined RFID-Biometric System
                  RFID-Biometric System},
  journal      = {CoRR},
  volume       = {abs/1207.5627},
  year         = {2012},
  url          = {http://arxiv.org/abs/1207.5627},
  eprinttype    = {arXiv},
  eprint       = {1207.5627},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1207-5627.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iajit/KefCB11,
  author       = {Ma{\^{a}}mar Kef and
                  Leila Chergui and
                  Mohamed Benmohammed},
  title        = {Self-organization and topology's control for mobile ad-hoc networks},
  journal      = {Int. Arab J. Inf. Technol.},
  volume       = {8},
  number       = {3},
  pages        = {227--234},
  year         = {2011},
  url          = {http://iajit.org/index.php?option=com\_content\&\#38;task=blogcategory\&\#38;id=74\&\#38;Itemid=319},
  timestamp    = {Thu, 16 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iajit/KefCB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciia/ChikoucheCB11,
  author       = {Noureddine Chikouche and
                  Cherif Foudil and
                  Mohamed Benmohammed},
  editor       = {Abdelmalek Amine and
                  Otmane A{\"{\i}}t Mohamed and
                  Boualem Benatallah and
                  Zakaria Elberrichi},
  title        = {Conception et V{\'{e}}rification d'un Protocole d'Authentification
                  de Syst{\'{e}}me Combin{\'{e}} RFID-Biom{\'{e}}trique},
  booktitle    = {Proceedings of the Third International Conference on Computer Science
                  and its Applications (CIIA'11), Saida, Algeria, December 13-15, 2011},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {825},
  publisher    = {CEUR-WS.org},
  year         = {2011},
  url          = {https://ceur-ws.org/Vol-825/paper\_76.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:23:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ciia/ChikoucheCB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ip-c/LehtihetOB11,
  author       = {Raja Lehtihet and
                  Wael El Oraiby and
                  Mohammed Benmohammed},
  editor       = {Ryszard S. Choras},
  title        = {Improved Fingerprint Enhancement Performance via {GPU} Programming},
  booktitle    = {Image Processing and Communications Challenges 3 - 3rd International
                  Conference, IP{\&}C 2011, Proceedings},
  series       = {Advances in Intelligent and Soft Computing},
  volume       = {102},
  pages        = {13--21},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23154-4\_2},
  doi          = {10.1007/978-3-642-23154-4\_2},
  timestamp    = {Fri, 15 Sep 2017 09:48:55 +0200},
  biburl       = {https://dblp.org/rec/conf/ip-c/LehtihetOB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ip-c/TaffarB11,
  author       = {Mokhtar Taffar and
                  Mohammed Benmohammed},
  editor       = {Ryszard S. Choras},
  title        = {Generic Face Invariant Model for Face Detection},
  booktitle    = {Image Processing and Communications Challenges 3 - 3rd International
                  Conference, IP{\&}C 2011, Proceedings},
  series       = {Advances in Intelligent and Soft Computing},
  volume       = {102},
  pages        = {43--51},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23154-4\_5},
  doi          = {10.1007/978-3-642-23154-4\_5},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ip-c/TaffarB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmm2/BoutekkoukB10,
  author       = {Fateh Boutekkouk and
                  Mohamed Benmohammed},
  title        = {Using {UML} as a Front-end for StreamIt Programs Verification and
                  Generation},
  journal      = {J. Multim.},
  volume       = {5},
  number       = {5},
  pages        = {501--513},
  year         = {2010},
  url          = {https://doi.org/10.4304/jmm.5.5.501-513},
  doi          = {10.4304/JMM.5.5.501-513},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmm2/BoutekkoukB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalt/DjouadMRB10,
  author       = {Tarek Djouad and
                  Alain Mille and
                  Christophe Reffay and
                  Mohamed Benmohammed},
  title        = {A New Approach Based on Modelled Traces to Compute Collaborative and
                  Individual Indicators Human Interaction},
  booktitle    = {{ICALT} 2010, 10th {IEEE} International Conference on Advanced Learning
                  Technologies, Sousse, Tunisia, 5-7 July 2010},
  pages        = {53--54},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICALT.2010.21},
  doi          = {10.1109/ICALT.2010.21},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icalt/DjouadMRB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jot/BoutekkoukBBA09,
  author       = {Fateh Boutekkouk and
                  Mohamed Benmohammed and
                  S{\'{e}}bastien Bilavarn and
                  Michel Auguin},
  title        = {{UML2.0} Profiles for Embedded Systems and Systems On a Chip (SOCs)},
  journal      = {J. Object Technol.},
  volume       = {8},
  number       = {1},
  pages        = {135--157},
  year         = {2009},
  url          = {https://doi.org/10.5381/jot.2009.8.1.a1},
  doi          = {10.5381/JOT.2009.8.1.A1},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jot/BoutekkoukBBA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jot/BoutekkoukBBA09a,
  author       = {Fateh Boutekkouk and
                  Mohamed Benmohammed and
                  S{\'{e}}bastien Bilavarn and
                  Michel Auguin},
  title        = {{UML} for Modelling and Performance Estimation of Embedded Systems},
  journal      = {J. Object Technol.},
  volume       = {8},
  number       = {2},
  pages        = {95--118},
  year         = {2009},
  url          = {https://doi.org/10.5381/jot.2009.8.2.a1},
  doi          = {10.5381/JOT.2009.8.2.A1},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jot/BoutekkoukBBA09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciia/CherguiKB09,
  author       = {Leila Chergui and
                  Ma{\^{a}}mar Kef and
                  Mohamed Benmohammed},
  editor       = {Abdelmalek Amine and
                  Otmane A{\"{\i}}t Mohamed and
                  Zakaria Elberrichi},
  title        = {La Th{\'{e}}orie de la R{\'{e}}sonance Adaptative et les
                  Moments de Zernike pour la Reconnaissance de Mots Arabes Manuscrits},
  booktitle    = {Proceedings of the 2nd Conf{\'{e}}rence Internationale sur l'Informatique
                  et ses Applications (CIIA'09), Saida, Algeria, May 3-4, 2009},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {547},
  publisher    = {CEUR-WS.org},
  year         = {2009},
  url          = {https://ceur-ws.org/Vol-547/108.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:23:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ciia/CherguiKB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciia/HarragB09,
  author       = {Fouzi Harrag and
                  Mohamed Benmohammed},
  editor       = {Abdelmalek Amine and
                  Otmane A{\"{\i}}t Mohamed and
                  Zakaria Elberrichi},
  title        = {{\'{E}}tude Comparative des Algorithmes de Segmentation Th{\'{e}}matique
                  Pour la Langue Arabe},
  booktitle    = {Proceedings of the 2nd Conf{\'{e}}rence Internationale sur l'Informatique
                  et ses Applications (CIIA'09), Saida, Algeria, May 3-4, 2009},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {547},
  publisher    = {CEUR-WS.org},
  year         = {2009},
  url          = {https://ceur-ws.org/Vol-547/149.pdf},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ciia/HarragB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceccs/BoutekkoukB09,
  author       = {Fateh Boutekkouk and
                  Mohamed Benmohammed},
  title        = {{UML} Modeling and Formal Verification of Control/Data Driven Embedded
                  Systems},
  booktitle    = {14th {IEEE} International Conference on Engineering of Complex Computer
                  Systems, {ICECCS} 2009, Potsdam, Germany, 2-4 June 2009},
  pages        = {311--316},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICECCS.2009.30},
  doi          = {10.1109/ICECCS.2009.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iceccs/BoutekkoukB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issoc/BoutekkoukBAB08,
  author       = {Fateh Boutekkouk and
                  S{\'{e}}bastien Bilavarn and
                  Michel Auguin and
                  Mohammed Benmohammed},
  title        = {{UML} profile for estimating application Worst Case Execution Time
                  on System-on-Chip},
  booktitle    = {2008 {IEEE} International Symposium on System-on-Chip, {SOC} 2008,
                  Tampere, Finland, November 5-6, 2008},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISSOC.2008.4694865},
  doi          = {10.1109/ISSOC.2008.4694865},
  timestamp    = {Mon, 09 Aug 2021 14:54:02 +0200},
  biburl       = {https://dblp.org/rec/conf/issoc/BoutekkoukBAB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itng/MernizB08,
  author       = {Salah Merniz and
                  Mohamed Benmohammed},
  editor       = {Shahram Latifi},
  title        = {A Scalable Proof Methodology for {RISC} Processor Designs: {A} Functional
                  Approach},
  booktitle    = {Fifth International Conference on Information Technology: New Generations
                  {(ITNG} 2008), 7-8 April 2008, Las Vegas, Nevada, {USA}},
  pages        = {241--246},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ITNG.2008.92},
  doi          = {10.1109/ITNG.2008.92},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itng/MernizB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/notere/BoulfekharB08,
  author       = {Samra Boulfekhar and
                  Mohamed Benmohammed},
  editor       = {Djamal Benslimane and
                  Aris M. Ouksel},
  title        = {{EERP:} energy-efficient routing protocol for wireless sensor networks},
  booktitle    = {Proceedings of the 8th international conference on New technologies
                  in distributed systems, {NOTERE} '08, Lyon, France, June 23-27, 2008},
  pages        = {16:1--16:6},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1416729.1416749},
  doi          = {10.1145/1416729.1416749},
  timestamp    = {Tue, 25 Aug 2020 14:35:29 +0200},
  biburl       = {https://dblp.org/rec/conf/notere/BoulfekharB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiccsa/MernizB07,
  author       = {Salah Merniz and
                  Mohamed Benmohammed},
  title        = {A Methodology for the Formal Verification of {RISC} Microprocessors
                  {A} Functional Approach},
  booktitle    = {2007 {IEEE/ACS} International Conference on Computer Systems and Applications
                  {(AICCSA} 2007), 13-16 May 2007, Amman, Jordan},
  pages        = {492--499},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/AICCSA.2007.370927},
  doi          = {10.1109/AICCSA.2007.370927},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aiccsa/MernizB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiccsa/HadjamRB01,
  author       = {F. Z. Hadjam and
                  Abdellatif Rahmoun and
                  Mohamed Benmohammed},
  title        = {On Designing a Systolic Network for the Resolution of Linear Systems
                  Using the " Gauss-Seidel " Method},
  booktitle    = {2001 {ACS} / {IEEE} International Conference on Computer Systems and
                  Applications {(AICCSA} 2001), 26-29 June 2001, Beirut, Lebanon},
  pages        = {283--286},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/AICCSA.2001.933994},
  doi          = {10.1109/AICCSA.2001.933994},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aiccsa/HadjamRB01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icecsys/BenmohammedRK00,
  author       = {Mohamed Benmohammed and
                  Abdelatif Rahmoune and
                  Polen Kission},
  title        = {The application of high-level synthesis techniques for the generation
                  of pipelined reprogrammable microcontrollers},
  booktitle    = {Proceedings of the 2000 7th {IEEE} International Conference on Electronics,
                  Circuits and Systems, {ICECS} 2000, Jounieh, Lebanon, December 17-20,
                  2000},
  pages        = {993--998},
  publisher    = {{IEEE}},
  year         = {2000},
  url          = {https://doi.org/10.1109/ICECS.2000.913043},
  doi          = {10.1109/ICECS.2000.913043},
  timestamp    = {Mon, 09 Aug 2021 14:54:04 +0200},
  biburl       = {https://dblp.org/rec/conf/icecsys/BenmohammedRK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics