var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/show?bib=https%3A%2F%2Fapi.zotero.org%2Fgroups%2F4441049%2Fitems%3Fkey%3D43ZOxDti5uWnzzY104blCxC4%26format%3Dbibtex%26limit%3D100?authorFirst=1&jsonp=1&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/show?bib=https%3A%2F%2Fapi.zotero.org%2Fgroups%2F4441049%2Fitems%3Fkey%3D43ZOxDti5uWnzzY104blCxC4%26format%3Dbibtex%26limit%3D100?authorFirst=1&jsonp=1\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/show?bib=https%3A%2F%2Fapi.zotero.org%2Fgroups%2F4441049%2Fitems%3Fkey%3D43ZOxDti5uWnzzY104blCxC4%26format%3Dbibtex%26limit%3D100?authorFirst=1&jsonp=1\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2021\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Natural Language Processing for Global and Local Business.\n \n \n \n\n\n \n Rahab, H.; Djoudi, M.; and Zitouni, A.\n\n\n \n\n\n\n In Fatih Pinarbasi, u.; and M. Nurdan Taskiran, u., editor(s), pages 307–331. IGI Global, 2021.\n Section: Sentiment Analysis of Arabic Documents Type: inbook\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@incollection{rahab_natural_2021,\n\ttitle = {Natural {Language} {Processing} for {Global} and {Local} {Business}},\n\tabstract = {Today, it is usual that a consumer seeks for others' feelings about their purchasing experience on the web before a simple decision of buying a product or a service. Sentiment analysis intends to help people in taking profit from the available opinionated texts on the web for their decision making, and business is one of its challenging areas. Considerable work of sentiment analysis has been achieved in English and other Indo-European languages. Despite the important number of Arabic speakers and internet users, studies in Arabic sentiment analysis are still insufficient. The current chapter vocation is to give the main challenges of Arabic sentiment together with their recent proposed solutions in the literature. The chapter flowchart is presented in a novel manner that obtains the main challenges from presented literature works. Then it gives the proposed solutions for each challenge. The chapter reaches the finding that the future tendency will be toward rule-based techniques and deep learning, allowing for more dealings with Arabic language inherent characteristics.},\n\tpublisher = {IGI Global},\n\tauthor = {Rahab, Hichem and Djoudi, Mahieddine and Zitouni, Abdelhafid},\n\teditor = {Fatih Pinarbasi, undefined and M. Nurdan Taskiran, undefined},\n\tyear = {2021},\n\tnote = {Section: Sentiment Analysis of Arabic Documents\nType: inbook},\n\tpages = {307--331},\n}\n\n
\n
\n\n\n
\n Today, it is usual that a consumer seeks for others' feelings about their purchasing experience on the web before a simple decision of buying a product or a service. Sentiment analysis intends to help people in taking profit from the available opinionated texts on the web for their decision making, and business is one of its challenging areas. Considerable work of sentiment analysis has been achieved in English and other Indo-European languages. Despite the important number of Arabic speakers and internet users, studies in Arabic sentiment analysis are still insufficient. The current chapter vocation is to give the main challenges of Arabic sentiment together with their recent proposed solutions in the literature. The chapter flowchart is presented in a novel manner that obtains the main challenges from presented literature works. Then it gives the proposed solutions for each challenge. The chapter reaches the finding that the future tendency will be toward rule-based techniques and deep learning, allowing for more dealings with Arabic language inherent characteristics.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n KAB: A new k-anonymity approach based on black hole algorithm.\n \n \n \n \n\n\n \n Kacha, L.; Zitouni, A.; and Djoudi, M.\n\n\n \n\n\n\n Journal of King Saud University - Computer and Information Sciences. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"KAB:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{kacha_kab_2021,\n\ttitle = {{KAB}: {A} new k-anonymity approach based on black hole algorithm},\n\tissn = {1319-1578},\n\turl = {https://www.sciencedirect.com/science/article/pii/S1319157821001002},\n\tdoi = {https://doi.org/10.1016/j.jksuci.2021.04.014},\n\tabstract = {K-anonymity is the most widely used approach to privacy preserving microdata which is mainly based on generalization. Although generalization-based k-anonymity approaches can achieve the privacy protection objective, they suffer from information loss. Clustering-based approaches have been successfully adapted for k-anonymization as they enhance the data quality, however, the computational complexity of finding an optimal solution has shown as NP-hard. Nature-inspired optimization algorithms are effective in finding solutions to complex problems. We propose, in this paper, a novel algorithm based on a simple nature-inspired metaheuristic called Black Hole Algorithm (BHA), to address such limitations. Experiments on real data set show that data utility has been improved by our approach compared to k-anonymity, BHA-based k-anonymity and clustering-based k-anonymity approaches.},\n\tjournal = {Journal of King Saud University - Computer and Information Sciences},\n\tauthor = {Kacha, Lynda and Zitouni, Abdelhafid and Djoudi, Mahieddine},\n\tyear = {2021},\n\tkeywords = {Anonymization, Black hole algorithm, Clustering, K-anonymity, Privacy},\n}\n\n
\n
\n\n\n
\n K-anonymity is the most widely used approach to privacy preserving microdata which is mainly based on generalization. Although generalization-based k-anonymity approaches can achieve the privacy protection objective, they suffer from information loss. Clustering-based approaches have been successfully adapted for k-anonymization as they enhance the data quality, however, the computational complexity of finding an optimal solution has shown as NP-hard. Nature-inspired optimization algorithms are effective in finding solutions to complex problems. We propose, in this paper, a novel algorithm based on a simple nature-inspired metaheuristic called Black Hole Algorithm (BHA), to address such limitations. Experiments on real data set show that data utility has been improved by our approach compared to k-anonymity, BHA-based k-anonymity and clustering-based k-anonymity approaches.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2020\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Ensuring user authentication and data integrity in multi-cloud environment.\n \n \n \n\n\n \n Megouache, L.; Zitouni, A.; and Djoudi, M.\n\n\n \n\n\n\n Human-centric Computing and Information Sciences, 10(1): 15. 2020.\n Type: article\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{megouache_ensuring_2020,\n\ttitle = {Ensuring user authentication and data integrity in multi-cloud environment},\n\tvolume = {10},\n\tabstract = {The necessity to improve security in a multi-cloud environment has become very urgent in recent years. Although in this topic, many methods using the message authentication code had been realized but, the results of these methods are unsatisfactory and heavy to apply, which, is why the security problem remains unresolved in this environment. This article proposes a new model that provides authentication and data integrity in a distributed and interoperable environment. For that in this paper, the authors first analyze some security models used in a large and distributed environment, and then, we introduce a new model to solve security issues in this environment. Our approach consists of three steps, the first step, was to propose a private virtual network to secure the data in transit. Secondly, we used an authentication method based on data encryption, to protect the identity of the user and his data, and finally, we realize an algorithm to know the integrity of data distributed on the various clouds of the system. The model achieves both identity authentication and the ability to inter-operate between processes running on different cloud’s provider. A data integrity algorithm will be demonstrated. The results of this proposed model can efficiently and safely construct a reliable and stable system in the cross-cloud environment.},\n\tnumber = {1},\n\tjournal = {Human-centric Computing and Information Sciences},\n\tauthor = {Megouache, Leila and Zitouni, Abdelhafid and Djoudi, Mahieddine},\n\tyear = {2020},\n\tnote = {Type: article},\n\tpages = {15},\n}\n\n
\n
\n\n\n
\n The necessity to improve security in a multi-cloud environment has become very urgent in recent years. Although in this topic, many methods using the message authentication code had been realized but, the results of these methods are unsatisfactory and heavy to apply, which, is why the security problem remains unresolved in this environment. This article proposes a new model that provides authentication and data integrity in a distributed and interoperable environment. For that in this paper, the authors first analyze some security models used in a large and distributed environment, and then, we introduce a new model to solve security issues in this environment. Our approach consists of three steps, the first step, was to propose a private virtual network to secure the data in transit. Secondly, we used an authentication method based on data encryption, to protect the identity of the user and his data, and finally, we realize an algorithm to know the integrity of data distributed on the various clouds of the system. The model achieves both identity authentication and the ability to inter-operate between processes running on different cloud’s provider. A data integrity algorithm will be demonstrated. The results of this proposed model can efficiently and safely construct a reliable and stable system in the cross-cloud environment.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Improving Service Performance in Oversubscribed IaaS Cloud.\n \n \n \n\n\n \n Bouaita, R.; Zitouni, A.; and Maamri, R.\n\n\n \n\n\n\n International Journal of Grid and High Performance Computing IJGHPC, , ISSN: 1938-0259, IGI Global, 12(1). 2020.\n Type: article\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{bouaita_improving_2020,\n\ttitle = {Improving {Service} {Performance} in {Oversubscribed} {IaaS} {Cloud}},\n\tvolume = {12},\n\tnumber = {1},\n\tjournal = {International Journal of Grid and High Performance Computing IJGHPC, , ISSN: 1938-0259, IGI Global},\n\tauthor = {Bouaita, Riad and Zitouni, Abdelhafid and Maamri, Ramdane},\n\tyear = {2020},\n\tnote = {Type: article},\n\tkeywords = {in press},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n An enhanced corpus for arabic newspapers comments.\n \n \n \n\n\n \n Rahab, H.; Zitouni, A.; and Djoudi, M.\n\n\n \n\n\n\n International Arab Journal of Information Technology, 17(5): 789–798. 2020.\n Type: article\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{rahab_enhanced_2020,\n\ttitle = {An enhanced corpus for arabic newspapers comments},\n\tvolume = {17},\n\tabstract = {In this paper, we propose our enhanced approach to create a dedicated corpus for Algerian Arabic newspapers comments. The developed approach has to enhance an existing approach by the enrichment of the available corpus and the inclusion of the annotation step by following the Model Annotate Train Test Evaluate Revise (MATTER) approach. A corpus is created by collecting comments from web sites of three well know Algerian newspapers. Three classifiers, support vector machines, naïve Bayes, and k-nearest neighbors, were used for classification of comments into positive and negative classes. To identify the influence of the stemming in the obtained results, the classification was tested with and without stemming. Obtained results show that stemming does not enhance considerably the classification due to the nature of Algerian comments tied to Algerian Arabic Dialect. The promising results constitute a motivation for us to improve our approach especially in dealing with non Arabic sentences, especially Dialectal and French ones.},\n\tnumber = {5},\n\tjournal = {International Arab Journal of Information Technology},\n\tauthor = {Rahab, Hichem and Zitouni, Abdelhafid and Djoudi, Mahieddine},\n\tyear = {2020},\n\tnote = {Type: article},\n\tkeywords = {Arabic, Comment, K-Nearest Neighbours, Naïve Bayes, Opinion mining, Sentiment analysis, Support Vector Machines},\n\tpages = {789--798},\n}\n\n
\n
\n\n\n
\n In this paper, we propose our enhanced approach to create a dedicated corpus for Algerian Arabic newspapers comments. The developed approach has to enhance an existing approach by the enrichment of the available corpus and the inclusion of the annotation step by following the Model Annotate Train Test Evaluate Revise (MATTER) approach. A corpus is created by collecting comments from web sites of three well know Algerian newspapers. Three classifiers, support vector machines, naïve Bayes, and k-nearest neighbors, were used for classification of comments into positive and negative classes. To identify the influence of the stemming in the obtained results, the classification was tested with and without stemming. Obtained results show that stemming does not enhance considerably the classification due to the nature of Algerian comments tied to Algerian Arabic Dialect. The promising results constitute a motivation for us to improve our approach especially in dealing with non Arabic sentences, especially Dialectal and French ones.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2019\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n SANA: Sentiment Analysis on Newspapers comments in Algeria.\n \n \n \n\n\n \n Rahab, H.; Zitouni, A.; and Djoudi, M.\n\n\n \n\n\n\n Journal of King Saud University - Computer and Information Sciences. 2019.\n Type: article\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{rahab_sana_2019,\n\ttitle = {{SANA}: {Sentiment} {Analysis} on {Newspapers} comments in {Algeria}},\n\tjournal = {Journal of King Saud University - Computer and Information Sciences},\n\tauthor = {Rahab, Hichem and Zitouni, Abdelhafid and Djoudi, Mahieddine},\n\tyear = {2019},\n\tnote = {Type: article},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Multi-robot task allocation with energetic, spatial and temporal constraints.\n \n \n \n\n\n \n Zitouni, F.; Maamri, R.; and Zitouni, A.\n\n\n \n\n\n\n International Journal of Artificial Intelligence, 17(1): 102–138. 2019.\n Type: article\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{zitouni_multi-robot_2019,\n\ttitle = {Multi-robot task allocation with energetic, spatial and temporal constraints},\n\tvolume = {17},\n\tabstract = {The Multi-Robot Task Allocation problem is the situation where some tasks and robots are given, then assignments between them must be found in order to optimize a certain measure (e.g. allocate the maximum number of tasks, etc.). We propose a generic framework to address heavily constrained MRTA problems. Some objective functions are proposed and extensively tested on ten datasets, which is our main contribution. Also, two allocation methods - exact and heuristic - are implemented, in order to compare values of adopted evaluation metrics. Performed simulations, obtained results, and comparative study show the effectiveness of the solution, even with a large number of robots and tasks.},\n\tnumber = {1},\n\tjournal = {International Journal of Artificial Intelligence},\n\tauthor = {Zitouni, Farouq and Maamri, Ramdane and Zitouni, Abdelhafid},\n\tyear = {2019},\n\tnote = {Type: article},\n\tkeywords = {Energetic constraints, Multi-robot systems, Multi-robot task allocation, Spatial constraints, Temporal constraints},\n\tpages = {102--138},\n}\n\n
\n
\n\n\n
\n The Multi-Robot Task Allocation problem is the situation where some tasks and robots are given, then assignments between them must be found in order to optimize a certain measure (e.g. allocate the maximum number of tasks, etc.). We propose a generic framework to address heavily constrained MRTA problems. Some objective functions are proposed and extensively tested on ten datasets, which is our main contribution. Also, two allocation methods - exact and heuristic - are implemented, in order to compare values of adopted evaluation metrics. Performed simulations, obtained results, and comparative study show the effectiveness of the solution, even with a large number of robots and tasks.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2018\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n A multi-agent security framework for cloud data storage.\n \n \n \n\n\n \n Arki, O.; Zitouni, A.; and Dib, A. T.\n\n\n \n\n\n\n Multiagent and Grid Systems, 14(4): 357–382. 2018.\n Publisher: IOS Press Type: article\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{arki_multi-agent_2018,\n\ttitle = {A multi-agent security framework for cloud data storage},\n\tvolume = {14},\n\tnumber = {4},\n\tjournal = {Multiagent and Grid Systems},\n\tauthor = {Arki, Oussama and Zitouni, Abdelhafid and Dib, Ahmed TakiEddine},\n\tyear = {2018},\n\tnote = {Publisher: IOS Press\nType: article},\n\tpages = {357--382},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n AMACE: agent based multi-criterions adaptation in cloud environment.\n \n \n \n\n\n \n Kemchi, S.; Zitouni, A.; and Djoudi, M.\n\n\n \n\n\n\n Human-centric Computing and Information Sciences, 8(1): 26. September 2018.\n Type: article\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{kemchi_amace_2018,\n\ttitle = {{AMACE}: agent based multi-criterions adaptation in cloud environment},\n\tvolume = {8},\n\tabstract = {Efficient resource management in dynamic cloud computing is receiving more and more attentions. Many works are still ongoing, since federated cloud computing is an open environment. We present in this paper a flexible model, new cloud operators can join the federation or leave it. The model integrates interactions between broker agents organization, permitting a multi-criterion migration of a submitted customer request. To implement the presented flexible model, we propose AMACE (agent based multi-criterions adaptation in cloud environment) a run-time self-adaptive approach, oriented agent in dynamic cloud federation environment. The proposed approach is multi-criterion, where a various and no limited number of parameters can be considered during the self-adaptation strategy (i.e. computing the load balance of the mediator agent and geographical distance “network delay” between the customer and provider…). In addition, AMACE cares about maintaining run-time coherence in optimization evolution in order to guarantee a coherent system at all moment during system execution.},\n\tnumber = {1},\n\tjournal = {Human-centric Computing and Information Sciences},\n\tauthor = {Kemchi, Sofiane and Zitouni, Abdelhafid and Djoudi, Mahieddine},\n\tmonth = sep,\n\tyear = {2018},\n\tnote = {Type: article},\n\tpages = {26},\n}\n\n
\n
\n\n\n
\n Efficient resource management in dynamic cloud computing is receiving more and more attentions. Many works are still ongoing, since federated cloud computing is an open environment. We present in this paper a flexible model, new cloud operators can join the federation or leave it. The model integrates interactions between broker agents organization, permitting a multi-criterion migration of a submitted customer request. To implement the presented flexible model, we propose AMACE (agent based multi-criterions adaptation in cloud environment) a run-time self-adaptive approach, oriented agent in dynamic cloud federation environment. The proposed approach is multi-criterion, where a various and no limited number of parameters can be considered during the self-adaptation strategy (i.e. computing the load balance of the mediator agent and geographical distance “network delay” between the customer and provider…). In addition, AMACE cares about maintaining run-time coherence in optimization evolution in order to guarantee a coherent system at all moment during system execution.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Cloud Storage and Security Overview.\n \n \n \n\n\n \n Arki, O.; and Zitouni, A.\n\n\n \n\n\n\n In International Conference on Advanced Aspects of Software Engineering (ICAASE'18), pages 26–33, 2018. \n Type: inproceedings\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{arki_cloud_2018,\n\ttitle = {Cloud {Storage} and {Security} {Overview}},\n\tbooktitle = {International {Conference} on {Advanced} {Aspects} of {Software} {Engineering} ({ICAASE}'18)},\n\tauthor = {Arki, Oussama and Zitouni, Abdelhafid},\n\tyear = {2018},\n\tnote = {Type: inproceedings},\n\tkeywords = {cloud computing, mobile agents, security of data},\n\tpages = {26--33},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2017\n \n \n (8)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n SIAAC: Sentiment Polarity Identification on Arabic Algerian Newspaper Comments.\n \n \n \n\n\n \n Rahab, H.; Zitouni, A.; and Djoudi, M.\n\n\n \n\n\n\n In volume 662. 2017.\n Section: Type: inbook\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@incollection{rahab_siaac_2017,\n\ttitle = {{SIAAC}: {Sentiment} {Polarity} {Identification} on {Arabic} {Algerian} {Newspaper} {Comments}},\n\tvolume = {662},\n\tabstract = {© 2018, Springer International Publishing AG. It is a challenging task to identify sentiment polarity in Arabic journals comments. Algerian daily newspapers interest more and more people in Algeria, and due to this fact they interact with it by comments they post on articles in their websites. In this paper we propose our approach to classify Arabic comments from Algerian Newspapers into positive and negative classes. Publicly-available Arabic datasets are very rare on the Web, which make it very hard to carring out studies in Arabic sentiment analysis. To reduce this gap we have created SIAAC (Sentiment polarity Identification on Arabic Algerian newspaper Comments) a corpus dedicated for this work. Comments are collected from website of well-known Algerian newspaper Echorouk. For experiments two well known supervised learning classifiers Support Vector Machines (SVM) and Naïve Bayes (NB) were used, with a set of different parameters for each one. Recall, Precision and F\\_measure are computed for each classifier. Best results are obtained in term of precision in both SVM and NB, also the use of bigram increase the results in the two models. Compared with OCA, a well know corpus for Arabic, SIAAC give a competitive results. Obtained results encourage us to continue with others Algerian newspaper to generalize our model.},\n\tauthor = {Rahab, Hichem and Zitouni, Abdelhafid and Djoudi, Mahieddine},\n\tyear = {2017},\n\tnote = {Section: \nType: inbook},\n\tkeywords = {Arabic comments, Machine learning, Natural Language Processing, Naïve Bayes, Newspaper, Opinion mining, Sentiment analysis, Support Vector Machines},\n}\n\n
\n
\n\n\n
\n © 2018, Springer International Publishing AG. It is a challenging task to identify sentiment polarity in Arabic journals comments. Algerian daily newspapers interest more and more people in Algeria, and due to this fact they interact with it by comments they post on articles in their websites. In this paper we propose our approach to classify Arabic comments from Algerian Newspapers into positive and negative classes. Publicly-available Arabic datasets are very rare on the Web, which make it very hard to carring out studies in Arabic sentiment analysis. To reduce this gap we have created SIAAC (Sentiment polarity Identification on Arabic Algerian newspaper Comments) a corpus dedicated for this work. Comments are collected from website of well-known Algerian newspaper Echorouk. For experiments two well known supervised learning classifiers Support Vector Machines (SVM) and Naïve Bayes (NB) were used, with a set of different parameters for each one. Recall, Precision and F_measure are computed for each classifier. Best results are obtained in term of precision in both SVM and NB, also the use of bigram increase the results in the two models. Compared with OCA, a well know corpus for Arabic, SIAAC give a competitive results. Obtained results encourage us to continue with others Algerian newspaper to generalize our model.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n An Overview on Data Security in Cloud Computing.\n \n \n \n\n\n \n Kacha, L.; and Zitouni, A.\n\n\n \n\n\n\n In pages 250–261. 2017.\n Section: Type: inbook\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@incollection{kacha_overview_2017,\n\ttitle = {An {Overview} on {Data} {Security} in {Cloud} {Computing}},\n\tauthor = {Kacha, Lynda and Zitouni, Abdelhafid},\n\tyear = {2017},\n\tnote = {Section: \nType: inbook},\n\tpages = {250--261},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Advances in Intelligent Systems and Computing.\n \n \n \n\n\n \n Arki, O.; and Zitouni, A.\n\n\n \n\n\n\n In volume 662, pages 62–73. 2017.\n Section: A Security Framework for Cloud Data Storage (CDS) Based on Agent Type: inbook\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@incollection{arki_advances_2017,\n\ttitle = {Advances in {Intelligent} {Systems} and {Computing}},\n\tvolume = {662},\n\tauthor = {Arki, Oussama and Zitouni, Abdelhafid},\n\tyear = {2017},\n\tnote = {Section: A Security Framework for Cloud Data Storage (CDS) Based on Agent\nType: inbook},\n\tpages = {62--73},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n ARAACOM: Arabic Algerian corpus for opinion mining.\n \n \n \n\n\n \n Rahab, H.; Zitouni, A.; and Djoudi, M.\n\n\n \n\n\n\n In ACM International Conference Proceeding Series, volume Part F1306, pages 1–5, 2017. \n Type: inproceedings\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{rahab_araacom_2017,\n\ttitle = {{ARAACOM}: {Arabic} {Algerian} corpus for opinion mining},\n\tvolume = {Part F1306},\n\tabstract = {© 2017 Association for Computing Machinery. Nowadays, it is no more needed to do an enormous effort to distribute a lot of forms to thousands of people and collect them, then convert this from into electronic format to track people opinion about some subjects. A lot of web sites can today reach a large spectrum with less effort. The majority of web sites suggest to their visitors to leave backups about their feeling of the site or events. So, this makes for us a lot of data which need powerful mean to exploit. Opinion mining in the web becomes more and more an attracting task, due the increasing need for individuals and societies to track the mood of people against several subjects of daily life (sports, politics, television,...). A lot of works in opinion mining was developed in western languages especially English, such works in Arabic language still very scarce. In this paper, we propose our approach, for opinion mining in Arabic Algerian news paper.},\n\tbooktitle = {{ACM} {International} {Conference} {Proceeding} {Series}},\n\tauthor = {Rahab, Hichem and Zitouni, Abdelhafid and Djoudi, Mahieddine},\n\tyear = {2017},\n\tnote = {Type: inproceedings},\n\tkeywords = {Arabic comments, Machine learning, Natural language processing, Newspaper, Opinion mining, Sentiment analysis},\n\tpages = {1--5},\n}\n\n
\n
\n\n\n
\n © 2017 Association for Computing Machinery. Nowadays, it is no more needed to do an enormous effort to distribute a lot of forms to thousands of people and collect them, then convert this from into electronic format to track people opinion about some subjects. A lot of web sites can today reach a large spectrum with less effort. The majority of web sites suggest to their visitors to leave backups about their feeling of the site or events. So, this makes for us a lot of data which need powerful mean to exploit. Opinion mining in the web becomes more and more an attracting task, due the increasing need for individuals and societies to track the mood of people against several subjects of daily life (sports, politics, television,...). A lot of works in opinion mining was developed in western languages especially English, such works in Arabic language still very scarce. In this paper, we propose our approach, for opinion mining in Arabic Algerian news paper.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A Two-Tiers Framework for Cloud Data Storage (CDS) Security Based on Agent.\n \n \n \n\n\n \n Arki, O.; and Zitouni, A.\n\n\n \n\n\n\n In Interactive Mobile Communication, Technologies and Learning, pages 814–823, 2017. Springer\n Type: inproceedings\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{arki_two-tiers_2017,\n\ttitle = {A {Two}-{Tiers} {Framework} for {Cloud} {Data} {Storage} ({CDS}) {Security} {Based} on {Agent}},\n\tbooktitle = {Interactive {Mobile} {Communication}, {Technologies} and {Learning}},\n\tpublisher = {Springer},\n\tauthor = {Arki, Oussama and Zitouni, Abdelhafid},\n\tyear = {2017},\n\tnote = {Type: inproceedings},\n\tpages = {814--823},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A New Framework of Authentication Over Cloud Computing.\n \n \n \n\n\n \n Megouache, L.; Zitouni, A.; and Djoudi, M.\n\n\n \n\n\n\n In Silhavy R., Silhavy P., Prokopova Z. (eds) Cybernetics Approaches in Intelligent Systems. CoMeSySo 2017. Advances in Intelligent Systems and Computing, vol 661. Springer, Cham, pages 262–270, 2017. \n Type: inproceedings\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{megouache_new_2017,\n\ttitle = {A {New} {Framework} of {Authentication} {Over} {Cloud} {Computing}},\n\tbooktitle = {Silhavy {R}., {Silhavy} {P}., {Prokopova} {Z}. (eds) {Cybernetics} {Approaches} in {Intelligent} {Systems}. {CoMeSySo} 2017. {Advances} in {Intelligent} {Systems} and {Computing}, vol 661. {Springer}, {Cham}},\n\tauthor = {Megouache, Leila and Zitouni, Abdelhafid and Djoudi, Mahieddine},\n\tyear = {2017},\n\tnote = {Type: inproceedings},\n\tpages = {262--270},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Applied Computational Intelligence and Mathematical Methods: Computational Methods in Systems and Software 2017, vol. 2.\n \n \n \n\n\n \n Bouaita, R.; Zitouni, A.; and Maamri, R.\n\n\n \n\n\n\n In Silhavy, R.; Silhavy, P.; and Prokopova, Z., editor(s), pages 50–61. Springer International Publishing, 2017.\n Section: An Autonomous Architecture for Managing Vertical Elasticity in the IaaS Cloud Using Memory Over-Subscription Type: inbook\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@incollection{bouaita_applied_2017,\n\ttitle = {Applied {Computational} {Intelligence} and {Mathematical} {Methods}: {Computational} {Methods} in {Systems} and {Software} 2017, vol. 2},\n\tabstract = {Elasticity is one of the essential properties in Cloud Computing that meets changeable needs of customers, and improves resource utilization for providers. In this context, oversubscription is a very powerful technique to increase resource utilization level as much as possible, which leads to a maximization of the profit of cloud providers. In this paper, we propose an autonomous architecture based on the MAPE-K control loop and using memory oversubscription to improve operating performance in a cloud infrastructure. The overload caused by oversubscription is mitigated by the live migration technique of VMs as well as the use of the network memory of the various physical machines of the cluster through the network. This latter technique is usually used as a replacement technique for the swapping disc as it has more performance.},\n\tpublisher = {Springer International Publishing},\n\tauthor = {Bouaita, Riad and Zitouni, Abdelhafid and Maamri, Ramdane},\n\teditor = {Silhavy, Radek and Silhavy, Petr and Prokopova, Zdenka},\n\tyear = {2017},\n\tnote = {Section: An Autonomous Architecture for Managing Vertical Elasticity in the IaaS Cloud Using Memory Over-Subscription\nType: inbook},\n\tpages = {50--61},\n}\n\n
\n
\n\n\n
\n Elasticity is one of the essential properties in Cloud Computing that meets changeable needs of customers, and improves resource utilization for providers. In this context, oversubscription is a very powerful technique to increase resource utilization level as much as possible, which leads to a maximization of the profit of cloud providers. In this paper, we propose an autonomous architecture based on the MAPE-K control loop and using memory oversubscription to improve operating performance in a cloud infrastructure. The overload caused by oversubscription is mitigated by the live migration technique of VMs as well as the use of the network memory of the various physical machines of the cluster through the network. This latter technique is usually used as a replacement technique for the swapping disc as it has more performance.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Software Engineering Trends and Techniques in Intelligent Systems: Proceedings of the 6th Computer Science On-line Conference 2017 (CSOC2017), Vol 3.\n \n \n \n\n\n \n Beldjezzar, L.; Zitouni, A.; and Djoudi, M.\n\n\n \n\n\n\n In Silhavy, R.; Silhavy, P.; Prokopova, Z.; Senkerik, R.; and Kominkova Oplatkova, Z., editor(s), pages 44–52. Springer International Publishing, 2017.\n Section: New Framework Model to Secure Cloud Data Storage Type: inbook\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@incollection{beldjezzar_software_2017,\n\ttitle = {Software {Engineering} {Trends} and {Techniques} in {Intelligent} {Systems}: {Proceedings} of the 6th {Computer} {Science} {On}-line {Conference} 2017 ({CSOC2017}), {Vol} 3},\n\tabstract = {Nowadays companies are increasingly adopting the technology of cloud computing. This technology is subject to a lot of research and continuous advances are made. The use of cloud computing in the companies advantages such as: reducing costs, sharing and exchange of information between institutions, but the data in the Cloud computing are susceptible to be compromised and the companies are exposing to see their data loss. In this study, we address the subject of security in cloud computing; we expose and discuss some researches that had been proposed to secure the data stored in the cloud. And then we will present our new frameworks that ensure confidentiality of data storage in the cloud environment.},\n\tpublisher = {Springer International Publishing},\n\tauthor = {Beldjezzar, Leila and Zitouni, Abdelhafid and Djoudi, Mahieddine},\n\teditor = {Silhavy, Radek and Silhavy, Petr and Prokopova, Zdenka and Senkerik, Roman and Kominkova Oplatkova, Zuzana},\n\tyear = {2017},\n\tnote = {Section: New Framework Model to Secure Cloud Data Storage\nType: inbook},\n\tpages = {44--52},\n}\n\n
\n
\n\n\n
\n Nowadays companies are increasingly adopting the technology of cloud computing. This technology is subject to a lot of research and continuous advances are made. The use of cloud computing in the companies advantages such as: reducing costs, sharing and exchange of information between institutions, but the data in the Cloud computing are susceptible to be compromised and the companies are exposing to see their data loss. In this study, we address the subject of security in cloud computing; we expose and discuss some researches that had been proposed to secure the data stored in the cloud. And then we will present our new frameworks that ensure confidentiality of data storage in the cloud environment.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2016\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Self Organization Agent Oriented Dynamic Resource Allocation on Open Federated Clouds Environment.\n \n \n \n\n\n \n Kemchi, S.; Zitouni, A.; and Djoudi, M.\n\n\n \n\n\n\n In The 2nd International Conference on Cloud Computing Technologies and Applications, CloudTech'16, Marrakesh, Morocco., 2016. \n Type: inproceedings\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{kemchi_self_2016,\n\ttitle = {Self {Organization} {Agent} {Oriented} {Dynamic} {Resource} {Allocation} on {Open} {Federated} {Clouds} {Environment}},\n\tbooktitle = {The 2nd {International} {Conference} on {Cloud} {Computing} {Technologies} and {Applications}, {CloudTech}'16, {Marrakesh}, {Morocco}.},\n\tauthor = {Kemchi, Sofiane and Zitouni, Abdelhafid and Djoudi, Mahieddine},\n\tyear = {2016},\n\tnote = {Type: inproceedings},\n\tkeywords = {XXL},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2015\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n A cloud security framework based on trust model and mobile agent.\n \n \n \n\n\n \n Benabied, S.; Zitouni, A.; and Djoudi, M.\n\n\n \n\n\n\n In Cloud Technologies and Applications (CloudTech), 2015 International Conference on, pages 1–8, 2015. \n Type: inproceedings\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{benabied_cloud_2015,\n\ttitle = {A cloud security framework based on trust model and mobile agent},\n\tabstract = {Cloud computing as a potential paradigm offers tremendous advantages to enterprises. With the cloud computing, the market's entrance time is reduced, computing capabilities is augmented and computing power is really limitless. Usually, to use the full power of cloud computing, cloud users has to rely on external cloud service provider for managing their data. Nevertheless, the management of data and services are probably not fully trustworthy. Hence, data owners are uncomfortable to place their sensitive data outside their own system .i.e., in the cloud., Bringing transparency, trustworthiness and security in the cloud model, in order to fulfill client's requirements are still ongoing. To achieve this goal, our paper introduces two levels security framework: Cloud Service Provider (CSP) and Cloud Service User (CSU). Each level is responsible for a particular task of the security. The CSU level includes a proxy agent and a trust agent, dealing with the first verification. Then a second verification is performed at the CSP level. The framework incorporates a trust model to monitor users' behaviors. The use of mobile agents will exploit their intrinsic features such as mobility, deliberate localization and secure communication channel provision. This model aims to protect user's sensitive information from other internal or external users and hackers. Moreover, it can detect policy breaches, where the users are notified in order to take necessary actions when malicious access or malicious activity would occur.},\n\tbooktitle = {Cloud {Technologies} and {Applications} ({CloudTech}), 2015 {International} {Conference} on},\n\tauthor = {Benabied, Saddek and Zitouni, Abdelhafid and Djoudi, Mahieddine},\n\tyear = {2015},\n\tnote = {Type: inproceedings},\n\tkeywords = {cloud computing, mobile agents, security of data, tru},\n\tpages = {1--8},\n}\n\n
\n
\n\n\n
\n Cloud computing as a potential paradigm offers tremendous advantages to enterprises. With the cloud computing, the market's entrance time is reduced, computing capabilities is augmented and computing power is really limitless. Usually, to use the full power of cloud computing, cloud users has to rely on external cloud service provider for managing their data. Nevertheless, the management of data and services are probably not fully trustworthy. Hence, data owners are uncomfortable to place their sensitive data outside their own system .i.e., in the cloud., Bringing transparency, trustworthiness and security in the cloud model, in order to fulfill client's requirements are still ongoing. To achieve this goal, our paper introduces two levels security framework: Cloud Service Provider (CSP) and Cloud Service User (CSU). Each level is responsible for a particular task of the security. The CSU level includes a proxy agent and a trust agent, dealing with the first verification. Then a second verification is performed at the CSP level. The framework incorporates a trust model to monitor users' behaviors. The use of mobile agents will exploit their intrinsic features such as mobility, deliberate localization and secure communication channel provision. This model aims to protect user's sensitive information from other internal or external users and hackers. Moreover, it can detect policy breaches, where the users are notified in order to take necessary actions when malicious access or malicious activity would occur.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2012\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Rigorous Description Of Design Components Functionality: An Approach Based Contract.\n \n \n \n\n\n \n Zitouni, A.\n\n\n \n\n\n\n International Journal of Computer Science Issues, 9: 187–196. 2012.\n Type: article\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{zitouni_rigorous_2012,\n\ttitle = {Rigorous {Description} {Of} {Design} {Components} {Functionality}: {An} {Approach} {Based} {Contract}},\n\tvolume = {9},\n\tjournal = {International Journal of Computer Science Issues},\n\tauthor = {Zitouni, Abdelhafid},\n\tyear = {2012},\n\tnote = {Type: article},\n\tpages = {187--196},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2011\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n A contract-based language to specify design components.\n \n \n \n\n\n \n Zitouni, A.; Boufaida, M.; and Seinturier, L.\n\n\n \n\n\n\n International Journal of Software Engineering and its Applications, 5: 71–88. 2011.\n Type: article\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{zitouni_contract-based_2011,\n\ttitle = {A contract-based language to specify design components},\n\tvolume = {5},\n\tjournal = {International Journal of Software Engineering and its Applications},\n\tauthor = {Zitouni, Abdelhafid and Boufaida, Mahmoud and Seinturier, Lionel},\n\tyear = {2011},\n\tnote = {Type: article},\n\tpages = {71--88},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n An Efficient Modeling and Execution Framework for Complex Systems Development.\n \n \n \n\n\n \n Perseil, I.; Pautet, L.; Rolland, J.; Filali, M.; Delanote, D.; Baelen, S. V.; Joosen, W.; Berbers, Y.; Mallet, F.; Bertrand, D.; Faucou, S.; Zitouni, A.; Boufaida, M.; Seinturier, L.; Champeau, J.; Abdoul, T.; Feiler, P. H; Mraidha, C.; and Gérard, S.\n\n\n \n\n\n\n In 16th IEEE International Conference on Engineering of Complex Computer Systems, ICECCS 2011, Las Vegas, Nevada, USA, 27-29 April 2011, pages 317–331, 2011. \n Type: inproceedings\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{perseil_efficient_2011,\n\ttitle = {An {Efficient} {Modeling} and {Execution} {Framework} for {Complex} {Systems} {Development}},\n\tbooktitle = {16th {IEEE} {International} {Conference} on {Engineering} of {Complex} {Computer} {Systems}, {ICECCS} 2011, {Las} {Vegas}, {Nevada}, {USA}, 27-29 {April} 2011},\n\tauthor = {Perseil, Isabelle and Pautet, Laurent and Rolland, Jean-François and Filali, Mamoun and Delanote, Didier and Baelen, Stefan Van and Joosen, Wouter and Berbers, Yolande and Mallet, Frédéric and Bertrand, Dominique and Faucou, Sébastien and Zitouni, Abdelhafid and Boufaida, Mahmoud and Seinturier, Lionel and Champeau, Joël and Abdoul, Thomas and Feiler, Peter H and Mraidha, Chokri and Gérard, Sébastien},\n\tyear = {2011},\n\tnote = {Type: inproceedings},\n\tpages = {317--331},\n}\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2010\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Specifying Components with Compositional Patterns, LOTOS and Design By Contract.\n \n \n \n\n\n \n Zitouni, A.; Boufaida, M.; and Seinturier, L.\n\n\n \n\n\n\n In ISCA 19th International Conference on Software Engineeringand Data Engineering (SEDE-2010) June 16-18, 2010, Hilton Fisherman's Wharf, San Francisco, CA, USA, pages 190–195, 2010. \n Type: inproceedings\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{zitouni_specifying_2010,\n\ttitle = {Specifying {Components} with {Compositional} {Patterns}, {LOTOS} and {Design} {By} {Contract}},\n\tbooktitle = {{ISCA} 19th {International} {Conference} on {Software} {Engineeringand} {Data} {Engineering} ({SEDE}-2010) {June} 16-18, 2010, {Hilton} {Fisherman}'s {Wharf}, {San} {Francisco}, {CA}, {USA}},\n\tauthor = {Zitouni, Abdelhafid and Boufaida, Mahmoud and Seinturier, Lionel},\n\tyear = {2010},\n\tnote = {Type: inproceedings},\n\tpages = {190--195},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2008\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Contract-based approach to analyze software components.\n \n \n \n\n\n \n Zitouni, A.; Seinturier, L.; and Boufaida, M.\n\n\n \n\n\n\n In 13th IEEE International Conference on Engineering of Complex Computer Systems (iceccs 2008), pages 237–242, 2008. IEEE\n Type: inproceedings\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{zitouni_contract-based_2008,\n\ttitle = {Contract-based approach to analyze software components},\n\tbooktitle = {13th {IEEE} {International} {Conference} on {Engineering} of {Complex} {Computer} {Systems} (iceccs 2008)},\n\tpublisher = {IEEE},\n\tauthor = {Zitouni, Abdelhafid and Seinturier, Lionel and Boufaida, Mahmoud},\n\tyear = {2008},\n\tnote = {Type: inproceedings},\n\tpages = {237--242},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2005\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Un framework pour l'utilisation des design patterns dans le développement des systèmes d'information.\n \n \n \n\n\n \n Zitouni, A.\n\n\n \n\n\n\n In Congrès International en Informatique Appliquée, CIIA'05, Bordj Bou Arréridj, Algérie., 2005. \n Type: inproceedings\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{zitouni_framework_2005,\n\ttitle = {Un framework pour l'utilisation des design patterns dans le développement des systèmes d'information},\n\tbooktitle = {Congrès {International} en {Informatique} {Appliquée}, {CIIA}'05, {Bordj} {Bou} {Arréridj}, {Algérie}.},\n\tauthor = {Zitouni, Abdelhafid},\n\tyear = {2005},\n\tnote = {Type: inproceedings},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2004\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Un Framework pour l'Utilisation des Design Patterns par Intégration du Langage de Spécification Lotos.\n \n \n \n\n\n \n Zitouni, A.\n\n\n \n\n\n\n In 4eme Séminaire National sur l'Informatique de Biskra (SNIB'04), Biskra - Algérie, 2004. \n Type: inproceedings\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{zitouni_framework_2004,\n\ttitle = {Un {Framework} pour l'{Utilisation} des {Design} {Patterns} par {Intégration} du {Langage} de {Spécification} {Lotos}},\n\tbooktitle = {4eme {Séminaire} {National} sur l'{Informatique} de {Biskra} ({SNIB}'04), {Biskra} - {Algérie}},\n\tauthor = {Zitouni, Abdelhafid},\n\tyear = {2004},\n\tnote = {Type: inproceedings},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);