


default search action
8th WINCOM 2020: Reims, France
- Marwane Ayaida, Hacène Fouchal, Mohamed El-Kamili

, Khalil Ibrahimi, Abdellatif Kobbane:
8th International Conference on Wireless Networks and Mobile Communications, WINCOM 2020, Reims, France, October 27-29, 2020. IEEE 2020, ISBN 978-1-7281-9015-0 - Moussa Coulibaly, Ahmed Errami

, Essaid Sabir
:
Lifetime-Efficient Indoor Guidance for Smart Parking. 1-6 - Ezaz Mohmmed Aldahasi, Manal Mohamed Alhejazi, Eyman Abdulrahman Alyahayan:

A Smart Elderly Monitoring System based on Cloud. 1-6 - Olivier Flauzac, Joffrey Herard, Florent Nolot

, Florian Desrumaux:
Comparison Between Different Types of Sensor Architecture Using a Uniform Relay Protocol. 1-6 - Zakariae Abbad, Ahmed Drissi El Maliani, Said Ouatik El Alaoui

, Mohammed El Hassouni:
A Graph-based approach to derive the geodesic distance on Statistical manifolds: Application to Multimedia Information Retrieval. 1-6 - Fatima Zahra Benabdallah, Ahmed Drissi El Maliani, Dounia Lotfi

, Mohammed El Hassouni:
Analysis of the Over-Connectivity in Autistic Brains Using the Maximum Spanning Tree: Application on the Multi-Site and Heterogeneous ABIDE Dataset. 1-7 - Olivier Flauzac, Erick Mauricio Gallegos Robledo, Carlos Gonzalez, Fabien Mauhourat, Florent Nolot

:
SDN Architecture to prevent attacks with OpenFlow. 1-6 - Chérifa Boucetta, Olivier Flauzac, Bachar Salim Haggar, Abdel-Nassir Mahamat Nassour, Florent Nolot

:
Smart Grid Networks enabled Electricity-Theft Detection and Fault Tolerance. 1-6 - Farida Bouroumane, Abderrahim Saaidi, Mustapha Abarkan:

Design of a serious game to strengthen the immune system against Covid-19. 1-6 - Samira Lafraxo

, Mohamed El Ansari:
GastroNet: Abnormalities Recognition in Gastrointestinal Tract through Endoscopic Imagery using Deep Learning Techniques. 1-5 - Teodora Kocevska

, Andrej Hrovat, Tomaz Javornik:
Study of Cooperative MIMO Approach in Hilly Environment. 1-5 - Youssef Aamer, Yahya Benkaouz, Mohammed Ouzzif, Khalid Bouragba

:
A new approach for increasing K-nearest neighbors performance. 1-5 - Jannis Ohms, Martin Böhm

, Diederich Wermser:
Concept of a TSN to Real-Time Wireless Gateway in the Context of 5G URLLC. 1-6 - Hafsa Benaddi

, Khalil Ibrahimi
:
A Review: Collaborative Intrusion Detection for IoT integrating the Blockchain technologies. 1-6 - Nadav Schweitzer, Ariel Stulman

:
Effectiveness of DCFM on different mobility models. 1-6 - Ahlem Haddad, Djamel Slimani, Amor Nafkha, Faouzi Bader:

Users' Power Multiplexing Limitations in NOMA System over Gaussian Channel. 1-7 - Thinh Ngo

, Brian Todd Kelley, Paul Rad:
Deep Learning Based Prediction of Signal-to-Noise Ratio (SNR) for LTE and 5G Systems. 1-6 - Hind Baaqeel, Sunday O. Olatunji:

A Self-adapting Face Authentication System with Deep Learning. 1-6 - Dimitri Marcheras, Marwane Ayaida, Nadhir Messai, Frédéric Valentin:

A new middleware for managing heterogeneous robot in ubiquitous environments. 1-5 - Mariem Allouch

, Sondès Khemiri-Kallel, Ahmed Soua, Samir Tohmé:
PEARL: A Novel Priority and Guaranteed-based Resource Allocation Approach for V2V Communications in LTE-V Mode 3. 1-6 - Babacar Toure, Simon Paturel, Eitan Altman:

Congestion load balancing game with losses. 1-5 - Ait Mouhou Abderrazzak, Abderrahim Saaidi, Majid Benyakhlef, Abbad Khalid

:
Cloth Fitting Based on Skeleton Driving and Implicit Skinning. 1-5 - Adda Boualem

, Marwane Ayaida, Cyril De Runz:
Hybrid Model Approach for Wireless Sensor Networks Coverage Improvement. 1-6 - Hicham Ghennioui, Mohamed El-Kamili

:
New method of compensation the out-of-focus defect introduced by the optical system of a micro-camera. 1-5 - Salma Brihi, Anas Ghamizi, Karim Chakri:

UAV for IoT Communications: Beam Selection Using Matching Game and Network Slicing. 1-7 - Meriem Achir, Abdelkrim Abdelli

, Lynda Mokdad:
A taxonomy of service discovery approaches in IoT. 1-6 - Said Rachidi, Jamila El Alami, El Houssine El Mazoudi:

Estimation of the monthly Runoff from precipitation and flow measurement networks using Artificial Neural Network. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














