Loading...
Last publications
-
-
-
-
Hajar Hammouch, Mounim El-Yacoubi, Huafeng Qin, Hassan Berbia, Mohamed Chikhaoui. Controlling the quality of GAN-based generated images for predictions tasks. CPRAI 2022: 3rd International Conference on Pattern Recognition and Artificial Intelligence, Jun 2022, Paris, France. pp.121-133, ⟨10.1007/978-3-031-09037-0_11⟩. ⟨hal-03944317⟩
-
-
Mwamsojo Nickson, Kamel Merghem, Mounim El Yacoubi, Yann Frignac, Badr-Eddine Benkelfat, et al.. Optoelectronic reservoir computer for early stage Alzheimer’s disease detection. CLEO: Applications and Technology (CLEO), CLEO US, May 2022, San Jose, United States. pp.ATh4I.5, ⟨10.1364/CLEO_AT.2022.ATh4I.5⟩. ⟨hal-04010199⟩
-
-
Luong Nguyen, Mariana Segovia, Wissam Mallouli, Edgardo Montes De Oca, Ana R Cavalli. Digital Twin for IoT Environments: A Testing and Simulation Tool. 15th International Conference Quality of Information and Communications Technology (QUATIC 2022), Sep 2022, Talavera de la Reina, Spain. pp.205-219, ⟨10.1007/978-3-031-14179-9_14⟩. ⟨hal-04008905⟩
-
-
Fatemeh Banaeizadeh, Michel Barbeau, Joaquin Garcia-Alfaro, Venkata Srinivas Kothapalli, Evangelos Kranakis. Uplink Interference Management in Cellular-Connected UAV Networks Using Multi-Armed Bandit and NOMA. 2022 IEEE Latin-American Conference on Communications (LATINCOM), Nov 2022, Rio de Janeiro, Brazil. pp.1-6, ⟨10.1109/LATINCOM56090.2022.10000584⟩. ⟨hal-04006345⟩
Keywords
Authentication
Computer networks
Optimisation
Energy efficiency
Blockchain
NGN
Indoor positioning
Social media
Wireless sensor network
Reputation
Augmented Reality
Model checking
Software engineering
Pervasive computing
Event-B
Anomaly detection
Hidden Markov models
NFV
Formal verification
P2P
Service composition
Modeling
Ontologies
QoS
Conformance testing
Energy consumption
WSN
Internet of things
Triplet Markov chains
Performance
Semantics
Performance analysis
Hidden Markov chains
Signal processing
Trust
Machine learning
IoT
Resource allocation
Mobility
MANETs
Intrusion detection
QoE
MPEG
Optimization
Performance evaluation
Data security
Ubiquitous computing
Interoperability
Semantic web
MPEG-4
Cloud computing
Privacy
Access control
Biometrics
Middleware
LTE
Artificial intelligence
Internet of Things
Sensor networks
RFID
Simulation
Context
Context-awareness
Network security
Business process
Classification
VANET
Wireless sensor networks
Scalability
Sécurité
SVM
Cloud
SDN
IMS
Reinforcement learning
Compression
Particle filtering
5G
Deep learning
Ontology
Verification
Formal methods
Distributed systems
Security
Clustering
Passive testing
Data mining
Cryptography
Cloud Computing
Social networks
Monitoring
Internet des objets
Quality of service
SIP
Testing
Indoor localization
Web services
Wireless networks
Routing
Virtualization
Number of fulltext
1 758
Number of reference
4 596
COLLABORATIONS
Submissions evolution