Publications

Publications

Ouvrages

1. Jallouli, R., Zaïane, O.R., Tobji, M.A.B., Tabbane, R.S., Nijholt, A. Digital Economy. Emerging Technologies and Business Innovation - Second International Conference, ICDEc 2017, Sidi Bou Said, Tunisia, May 4-6, 2017, Proceedings. Springer. 2017

2. Jallouli, R., Nasraoui, O., Tobji, M.A.B., Tabbane, R.S., Rhouma, R. International Conference on Digital Economy, ICDEc 2016, Carthage, Tunisia, April 28-30, 2016. IEEE. 2016

3. Jallouli, R., Nasraoui, O., Bach Tobji, M-A., Tabbane, R., Rhouma, R.. Proceedings of the International Conference on Digital Economy, ICDEc 2016. IEEE. 2016

4. Maher Helaoui. Informatique Théorique: Cours et Exercices Corrigés. Editions universitaires européennes. 2016

5. Yassine SLAMA. Expatriés et cadres locaux dans le cadre de l'internationalisation des entreprises. Centre de Publication Universitaire. 2014

6. R. Rhouma. Analyse et conception des cryptsystèmes à base de chaos. Presses Académiques Francophones. ISBN : 978-3-8416-2148-1. 2013

7. R. Rhouma. Contributions à la sécurisation de l'information par chaos. Editions universitaires europeennes. ISBN : 978-613-1-59291-1. 2011

Chapitre d'ouvrages

1. Ikbal Chammakhi Msadaa,Amine Dhraief. Chapter I- Internet of Things in Support of Public Safety Networks : Opportunities and Challenges. Wireless Public Safety Networks, Volume Two : A Systematic Approach, ISBN 9781785480522. Elsevier. Pages 1-20, 2016

2. Yassine SLAMA et Nathalie MONTARGOT. Regards croisés de cadres expatriés et locaux de filiales multinationales en Tunisie sur la pertinence de recourir à l’expatriation. Ambivalences. LARIME- ESSEC de Tunis. Pages 65-72, 2015

3. Rym Srarfi Tabbane and Mohsen Debabi. Electronic Word-of-Mouth: Definitions and Concepts. Capturing, Analyzing, and Managing Word-of-Mouth in the Digital Marketplace. IGI Global. Pages 1-27, 2015

4. Ben N'Cir Chiheb-Eddine , Guillaume Cleuziou , Essoussi Nadia. Overview of partitional overlapping clustering methods.. Partitional Clustering Algorithm (PCA). Springer. Pages 245-275, 2015

5. Zhang, T.J.,Manhrawy, I.M.,Abdo, A.A.,El-Latif, A.A.A.,Rhouma, R.. Cryptanalysis of elementary cellular automata based image encryption. Advanced Materials Research. . Pages , 2014

6. Amine Dhraief, Imen Mahjri, and Abdelfettah Belghith. Chapter VII- A Performance Evaluation of the Coverage Configuration Protocol and Its Applicability to Precision Agriculture. Multidisciplinary Perspectives on Telecommunications, Wireless Systems, and Mobile Computing, ISBN 1466647159. IGI Global. Pages 107–122, 2014

7. Rhouma, R.,Belghith, S.. Chaos-based cryptosystem in different modes of block encryption. Cryptography: Protocols, Design and Applications. . Pages , 2012

8. Jallouli, R. et Lassouad A.. Les indicateurs de performance dans le secteur de l’art ,. Approches Tunisiennes en Gestion: Entrepreneuriat et Investissement Culturel,s. Université de Paris I Panthéon Sorbonne/ CNR, Collection l’impensé du temp. Pages -, 2010

9. Jallouli R., Zghal M and Orsoni J.. Marketing et art, Est ce le grand écart?. Nouvelles approches en culture et développement,. Université de Paris I Panthéon Sorbonne/ CNR, Collection l’impensé du temps. Pages -, 2008

Articles de journaux

1. Maroua Meddeb, Amine Dhraief Abdelfettag Belghith, Thierry Monteil, Khalil Drira, and Saad Al-Ahmadi. Named Data Networking A promisin g architecture for the Internet of things (IoT). International Journal on Semantic Web and Information Systems (IJSWIS), IGI. JCR 2016 : SCI Impact Factor=1.5, Q3. Vol. 14, Issue 2, Pages 1-19, 2018

2. Maroua Meddeb, Amine Dhraief , Abdelfettah Belghith, Thierry Monteil, and Khalil Drira. Cache Freshness in Named Data Networking for the Internet of Things. The Computer Journal, Oxford University Press , 2018. Accepted for publication, to appear in 2018, JCR 2016 : SCI Impact Factor=0.77, Q4. Vol. pp, Issue pp, Pages pp, 2018

3. Imen Mahjri,Samir Medjiah,Amine Dhraief,Khalil Drira,Abdelfettah Belghith. Weighted Localization in Mobile Wireless Networks. Wiley Internet Technology Letters. Vol. 1, Issue 1, Pages 1-6, 2018

4. Mohamed Belhassen, Amine Dhraief, Abdelfettah Belghith, Hassan Mathkour. ALOE: autonomic locating of obstructing entities in MANETs. Journal of Ambient Intelligence and Humanized Computing, Springer Berlin Heidelberg, 2018. Accepted for publication, to appear in 2018, JCR 2016 : SCI Impact Factor=1.588, Q3. Vol. pp, Issue pp, Pages 1-20, 2018

5. Maroua Meddeb, Amine Dhraief, Abdelfettah Belghith, Thierry Monteil, Khalil Drira, Sofien Gannouni. AFIRM: Adaptive forwarding based link recovery for mobility support in NDN/IoT networks. Future Generation Computer Systems, Elsevier (JCR 2016 Q1, IF= 3.999). Vol. pp, Issue pp, Pages pp, 2018

6. Bousnina, F.E., Tobji, M.A.B., Chebbah, M., Yaghlane, B.B. Modeling evidential databases as possible worlds.. Int. J. Intell. Syst.. Vol. 33, Issue 6, Pages 1146-1164, 2018

7. Abidi, A., Elmi, S., Tobji, M.A.B., HadjAli, A., Yaghlane, B.B. Skyline queries over possibilistic RDF data.. Int. J. Approx. Reasoning. Vol. 93, Issue , Pages 277-289, 2018

8. T.Mellah. Effectiveness of the water resources allocation institution in Tunisia. Water Policy. Vol. 20, Issue 2, Pages 429-445, 2018

9. Zeineb Ayachi. The Effect of Culture and Gender on English Learning Strategies: The Case of Tunisian and German Learners. The Reading Matrix. Vol. 18, Issue 1, Pages 124-138, 2018

10. Lamia Zaibi. Transcending Boundaries: Kwame Dawes’ Digital Projects. The Rupkatha Journal On Interdisciplinary Studies In Humanities. Vol. 9, Issue 3, Pages 115-124, 2017

11. Lamia Zaibi. Kwame Dawes. A City of Bones: A Testament. World Literaure Today. Vol. 91, Issue 5, Pages 85-86, 2017

12. Hamdi, M., Rhouma, R., Belghith, S. An appropriate system for securing real-time voice communication based on ADPCM coding and chaotic maps.. Multimedia Tools Appl.. Vol. 76, Issue 5, Pages 7105-7128, 2017

13. Saidi, M., Hermassi, H., Rhouma, R., Belghith, S. A new adaptive image steganography scheme based on DCT and chaotic map.. Multimedia Tools Appl.. Vol. 76, Issue 11, Pages 13493-13510, 2017

14. Hamdi, M., Rhouma, R., Belghith, S. A selective compression-encryption of images based on SPIHT coding and Chirikov Standard Map.. Signal Processing. Vol. 131, Issue , Pages 514-526, 2017

15. Imen Mahjri, Amine Dhraief, Abdelfettah Belghith, and Ahmad AlMogren. SLIDE : A Straight Line Conflict Detection and Alerting Algorithm for Multiple Unmanned Aerial Vehicles. IEEE Transactions on Mobile Computing (TMC). JCR 2016 : SCI Impact Factor=3.822, Q1. Vol. pp, Issue pp, Pages 1-17, 2017

16. Dr Dhouha DOGHRI. Several publications and articles in international scientific journals. international journals. Vol. 000, Issue 000, Pages pp, 2017

17. . The Impact of Social Professional Category Consumer’s on Acceptance Level Towards Islamic Banking Window. Chinese Business Review. Vol. , Issue , Pages , 2017

18. El Ghali M. et Jammeli A.. "The dimensions of the media experience lived by the children: exploratory study with the Tunisian children". Journal of Internet Social Networking and Virtual Communities. Vol. À paraître, Issue À paraître, Pages À paraître, 2017

19. Zeineb Ayachi. Peer and Teacher Assessment in EFL Writing Compositions: The Case Of Advanced English Major Students in Jendouba, Tunisia. The Reading Matrix. Vol. 17, Issue 1, Pages 156-168, 2017

20. Elmi, S., Tobji, M.A.B., Hadjali, A., Yaghlane, B.B. Selecting skyline stars over uncertain databases - Semantics and refining methods in the evidence theory setting.. Appl. Soft Comput.. Vol. 57, Issue , Pages 88-101, 2017

21. Amine Dhraief, Abdelfettah Belghith, Hassan Mathkour, and Khalil Drira. An M2M gateway-centric architecture for autonomic healing and optimising of machine-to-machine overlay networks. International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), Inderscience. JCR 2016 , SCI Impact Factor=0.705, Q4. Vol. 26, Issue 1, Pages 12-28, 2017

22. T.Mellah & T. Ben Amor. Performance of the Tunisian Water Utilities: an input-distance function approach. Utilities Policy. Vol. 38, Issue -, Pages 18-32, 2016

23. Tawfik BEN AMOR and Thuraya MELLAH. COST EFFICIENCY OF TUNISIAN WATER DISTRIBUTION UTILITIES: AN HETEROSKEDASTIC STOCHASTIC COST FRONTIER APPROACH. Journal of Economics Theory (2016 Volume 10). Vol. 10, Issue 4, Pages 1-9, 2016

24. Thuraya Mellah and Tawfik Ben Amor. Performance of the Tunisian Water Utility: An input-distance function approach. Utility plicy. Vol. 38, Issue February 2016,, Pages Pages 18–32, 2016

25. Lamia Zaibi. “Rewriting the Tempest: George Lamming’s Water with Berries.”. Postcolonial Interventions 1. 2. Vol. 1, Issue 2, Pages 107-134, 2016

26. Lamia Zaibi. “Exploring Landscape: A comparative Study of George Lamming’s In the Castle of My Skin and Water with Berries.”. Subalternspeak: An International Journal of Postcolonial Studies. Vol. 4, Issue 3, Pages 48-59, 2016

27. Lamia Zaibi. “Pocomania Rituals and Identity in Andrew Salkey’s a Quality of Violence (1959).”. Global Journal of Human Social Science. Vol. 14, Issue 1, Pages 1-7, 2016

28. Maher Helaoui and Wady Naanaa. Modularity-based Decomposing for Valued CSP. Annals of Mathematics and Artificial Intelligence (AMAI). Vol. 67, Issue 2, Pages 165-187, 2016

29. Zeineb Ayachi. ELT EVALUATION: THE ISSUE OF IN-COMPANY ENGLISH TRAINING IN TUNISIA. Modern Journal of Language Teaching Methods. Vol. 6, Issue 3, Pages 97-106, 2016

30. Zeineb Ayachi. The main sources of language-skills-specific anxiety in Tunsian ESP students. TAYR. Vol. 3, Issue 2, Pages 10-53, 2016

31. Amine Dhraief, Abdelfettah Belghith, and Khalil Drira.. Regular and lightweight mobility management in the HIP-based M2M overlay network. International Jour-nal of Autonomous and Adaptive Communications Systems (IJAACS), Inderscience. Vol. 9, Issue 3/4, Pages 331-352, 2016

32. Imen Mahjri, Amine Dhraief, Abdelfattah Belghith, Khalil Drira, and Hassan Mathkour. A GPS-less Framework for Localization and Coverage Maintenance in Wireless Sensor Networks. KSII Transactions on Internet and Information Systems, JCR 2016, SCI Impact Factor=0.452, Q4. Vol. 10, Issue 1, Pages 96-116, 2016

33. Rafaa Tahar, Amine Dhraief, Abdelfattah Belghith, Hassan Mathkour, and Rafik Braham. Autonomous and adaptive beaconing strategy for multi-interfaced wireless mobile nodes. Wiley Wireless Communications and Mobile Computing, JCR 2016: SCI Impact Factor=1.899, Q2. Vol. 16, Issue 12, Pages 1625-1641, 2016

34. Jallouli R. & Raboudi F.. LES DÉRIVES DE LA DÉLOCALISATION: L'EXEMPLE DES CENTRES D'APPEL EN TUNISIE. Revue française du marketing. Vol. 2, Issue 5, Pages 77-84, 2015

35. Hermassi, H.,Hamdi, M.,Rhouma, R.,Belghith, S.M.. A joint encryption-compression codec for speech signals using the ITU-T G.711 standard and chaotic map. Multimedia Tools and Applications. Vol. , Issue , Pages , 2015

36. Mannai, O.,Bechikh, R.,Hermassi, H.,Rhouma, R.,Belghith, S.. A new image encryption scheme based on a simple first-order time-delay system with appropriate nonlinearity. Nonlinear Dynamics. Vol. , Issue , Pages , 2015

37. Bechikh, R.,Hermassi, H.,Abd El-Latif, A.A.,Rhouma, R.,Belghith, S.. Breaking an image encryption scheme based on a spatiotemporal chaotic system. Signal Processing: Image Communication. Vol. , Issue , Pages , 2015

38. Elmi, S., Benouaret, K., HadhjAli, A., Bach Tobji, M-A., Ben Yaghlane, B. Requêtes Skyline en présence des données évidentielles. Revue des Nouvelles Technologies de l'Information, Extraction et Gestion des Connaissances. Vol. RNTI-E-, Issue 28, Pages 215-220, 2015

39. Lamia Ketari and Mohammadi Akheela Khanum. Impact of Facebook Usage on the Academic Grades: A case study. Journal of Computing. Vol. 5, Issue 1, Pages 44-49, 2015

40. Lamia Ketari and Akheela Khanum. A Review of Malicious Code Detection Techniques for Mobile Devices. International Journal of Com- puter Theory and Engineering. Vol. 4, Issue 2, Pages 212-216, 2015

41. Manel Hamouda et Rym Srarfi Tabbane. Impacte du BAO électronique sur l’intention d’achat du consommateur: le role modérateur de l’âge et du genre. La Revue Gestion et Organisation. Vol. 6, Issue 1, Pages 39-46, 2015

42. Ben N'Cir Chiheb-Eddine , Essoussi Nadia. Using Sequences of Words for Non-Disjoint Grouping of Documents.,. International journal of Pattern Recognition and Artificial Intelligence (IJPRAI),. Vol. 29, Issue (3), Pages 1-20, 2015

43. Ben N'Cir Chiheb-Eddine , Essoussi Nadia , Mohamed Limam. Kernel-Based Methods to Identify Overlapping Clusters with Linear and Nonlinear Boundaries. Journal of classification. Vol. 32, Issue (2), Pages 176-211, 2015

44. Raéf BAHRINI. Productivity of MENA Islamic banks: a bootstrapped Malmquist Index approach. International Journal of Islamic and Middle Eastern Finance and Management. Vol. 8, Issue 4, Pages 508-528, 2015

45. Amdouni Hamida et Gammoudi Mohamed Mohsen. Semi-Automatic Method to Assist Expert for Association Rules Validation. International Journal of Computer, Electrical, Automation, Control and Information Engineering. Vol. 9, Issue 8, Pages 1888-1896, 2015

46. Zeineb Ayachi. Adult Learning Strategies in an Onsite Training Program in Tunisia. The Reading Matrix. Vol. 15, Issue 2, Pages 80-100, 2015

47. imen Jemili, Dhouha Ghrab, Amine Dhraief, Abdelfettah Belghith, Bilel Derbel, Ah- med Al-Mogren, and Hassan Mathkour. CHRA - a coloring based hierarchical routing algorithm. Journal of Ambient Intelligence and Humanized Computing, Springer Berlin Heidelberg. 2015 JCR, SCI Impact Factor=0.835, Q4. Vol. 6, Issue 1, Pages 69-82, 2015

48. Raik Aissaoui, Amine Dhraief, Abdelfettah Belghith, Hamid Menouer, Hassan I. Mathkour, Fethi Filali, and Adnan Abu-Dayya. HCBLS - A Hierarchical Cluster-Based Location Service in Urban Environment. Mobile Information Systems. JCR 2015, SCI Impact Factor=1.462, Q2. Vol. 2015, Issue 2015, Pages 1-16, 2015

49. Abdelfettah Belghith, Mohamed Belhassen, Amine Dhraief, NourElhouda Dougui, and Hassan Mathkour. Autonomic Obstacle Detection and Avoidance in MANETs Driven by Cartography Enhanced OLSR. Mobile Information Systems. 2015 JCR, SCI Impact Factor=1.462, Q2. Vol. 2015, Issue 2015, Pages 1-18, 2015

50. Yassine SLAMA. Le rôle des salariés locaux dans le processus d'adaptation des expatriés dans le cadre de la multinationalisation des firmes. Revue Française de Gestion. Vol. 40, Issue 239, Pages 51-63, 2014

51. Koubaâ Y.,Tabbane R. & Jallouli R. On the use of structural equation modeling in marketing image research. Asia Pacific Journal of Marketing and Logistics. Vol. 26, Issue 2, Pages 315-338, 2014

52. Belazi, A.,Hermassi, H.,Rhouma, R.,Belghith, S.. Algebraic analysis of a RGB image encryption algorithm based on DNA encoding and chaotic map. Nonlinear Dynamics. Vol. , Issue , Pages , 2014

53. Yamen Koubaa, Rym Srarfi Tabbane et Rim Jallouli Chaabouni. On the Use of Structural Equations Modeling in Marketing Image Research. Asia Pacific Journal of Marketing and Logistics. Vol. 26, Issue 2, Pages 315-338, 2014

54. Ben N'Cir Chiheb-Eddine , Guillaume Cleuziou , Essoussi Nadia. Generalization of c-means for identifying non-disjoint clusters with overlap regulation,. Pattern Recognition Letters. Vol. 45, Issue (1), Pages 92-98, 2014

55. El Ghali M., Saied Ben Rached K. et Brée J.,. « Le processus d’Appropriation de l’Expérience Télévisuelle des Enfants. Cas de l’Emission de la « Star Academy ». International Journal of Business & EconomicStrategy (IJBES). Vol. 2, Issue -, Pages -, 2014

56. Hermassi, H.,Rhouma, R.,Belghith, S.. Improvement of an image encryption algorithm based on hyper-chaos. Telecommunication Systems. Vol. , Issue , Pages , 2013

57. Hermassi, H.,Belazi, A.,Rhouma, R.,Belghith, S.M.. Security analysis of an image encryption algorithm based on a DNA addition combining with chaotic maps. Multimedia Tools and Applications. Vol. , Issue , Pages , 2013

58. Manel Hamouda et Rym Srarfi Tabbane. Impact of Electronic Word of Mouth Evaluation on Purchase Intention: The Mediating Role of Attitude toward the Product. International Journal of Online Marketing. Vol. 3, Issue 2, Pages 20-37, 2013

59. Maher Helaoui, Wady Naanaa, and Béchir El Ayeb. Submodularity-based Decomposing for Valued CSP.. International Journal on Artificial Intelligence Tools (IJAIT). Vol. 22, Issue 2, Pages 1-20, 2013

60. Jean-Marc Bardet, Hatem Bibi.. Adaptive semiparametric wavelet estimator and goodness-of-fit test for long memory linear processes. Electronic Journal of Statistics, Institute of Mathematical Statistics and Bernoulli Society,. Vol. 6, Issue 0, Pages 2382-2419, 2012

61. KS Søilen, MA Kovacevic, R Jallouli. Key success factors for Ericsson mobile platforms using the value grid model. Journal of Business Research JBR. Vol. 65, Issue 9, Pages 1335-1345, 2012

62. Jallouli R., Raboudi F. and Koubâa Y.. Customer knowledge management: Implementation and added-value. ecch the case for learning UK and USA. Vol. Ref., Issue Ref. 912-007-1, Pages 17p, 2012

63. Hermassi, H.,Rhouma, R.,Belghith, S.. Security analysis of image cryptosystems only or partially based on a chaotic permutation. Journal of Systems and Software. Vol. , Issue , Pages , 2012

64. BAHRINI Raéf. Efficiency and productivity analysis of Tunisian banks during a recent deregulation period. The Journal of Management and Business Research. Vol. 2, Issue 2, Pages 68-82, 2012

65. K. Kamoun and S. Ben Yahia,. content similarity measure to assess stability during ontology enrichment. International Review on Computer and Software (IRECOS). Vol. 7, Issue 3, Pages 1020-1027, 2012

66. K. Kamoun and S. Ben Yahia. A Novel Global Measure Approach based on Ontology Spectrum to Evaluate Ontology Enrichment. International Journal of Computer Applications. Vol. 39, Issue 17, Pages 23-30, 2012

67. Ben N'Cir Chiheb-Eddine , Essoussi Nadia. Recognition of overlapping Patterns with Linear and Non-Linear Separations using Positive Definite Kernels.. International Journal of Computer Application (IJCA),. Vol. Volume 53, Issue (1), Pages 1-8, 2012

68. Amine Dhraief, Imen Mahjri, and Abdelfettah Belghith. A Performance Evaluation of the Coverage Configuration Protocol Under Location Errors, Irregular Sensing Patterns, and a Noisy Channel. International Journal of Business Data Communications and Networking, IGI. Vol. 8, Issue 3, Pages 28-41, 2012

69. Amine Dhraief and Abdelfettah Belghith. An Experimental Investigation of the Impact of Mobile IPv6 Handover on Transport Protocols. Smart Computing Review, KAIS. Vol. 2, Issue 1, Pages 1-17, 2012

70. Solak, E.,Rhouma, R.,Belghith, S.. Breaking an orbit-based symmetric cryptosystem. Mathematical and Computer Modelling. Vol. , Issue , Pages , 2011

71. Kumar, A.,Rhouma, R.,Wang, Y.,Sklavos, N.,Ghose, M.K.. Comments on, " A blind source separation-based method for multiple images encryption". Communications in Nonlinear Science and Numerical Simulation. Vol. , Issue , Pages , 2011

72. Rhouma, R.,Belghith, S.. Cryptanalysis of a chaos-based cryptosystem on DSP. Communications in Nonlinear Science and Numerical Simulation. Vol. , Issue , Pages , 2011

73.  BAHRINI Raéf. Empirical analysis of non-performing loans in the case of Tunisian banks. Journal of Business Studies Quarterly. Vol. 3, Issue 1, Pages 230-245, 2011

74. Amdouni Hamida et Gammoudi Mohamed Mohsen. CondClose: A new algorithm of association rules extraction. International Journal of Computer Science Issues (IJCSI). Vol. 8, Issue 4, Pages 550-560, 2011

75. Bach Tobji, M-A., Ben Yaghlane, B. Extraction des itemsets fréquents à partir de données imparfaites : application à une base de données éducationnelles. Revue des Nouvelles Technologies de l'Information, Fouille de données complexes-Complexité liée aux données multiples. Vol. RNTI-E-, Issue 21, Pages 211-231, 2011

76. Amine Dhraief and Abdelfettah Belghith. Mobility Impact on Session Survivability under the SHIM6 Protocol and Enhancement of its Rehoming Procedure. Journal of Networks, Academy Publisher. Vol. 6, Issue 11, Pages 1521-1532, 2011

77. Arroyo, D.,Li, S.,Amigó, J.M.,Alvarez, G.,Rhouma, R.. Comment on "Image encryption with chaotically coupled chaotic maps". Physica D: Nonlinear Phenomena. Vol. , Issue , Pages , 2010

78. Solak, E.,Rhouma, R.,Belghith, S.. Cryptanalysis of a multi-chaotic systems based image cryptosystem. Optics Communications. Vol. , Issue , Pages , 2010

79. Rhouma, R.,Solak, E.,Belghith, S.. Cryptanalysis of a new substitution-diffusion based image cipher. Communications in Nonlinear Science and Numerical Simulation. Vol. , Issue , Pages , 2010

80. Hermassi, H.,Rhouma, R.,Belghith, S.. Joint compression and encryption using chaotically mutated Huffman trees. Communications in Nonlinear Science and Numerical Simulation. Vol. , Issue , Pages , 2010

81. Tawfik Ben Amor and Mohamed Goaied. "Stochastic Varying Coefficient Frontier Model in the Estimation of Technical Efficiency and Technical Efficiency of Specific Input". Agricultural Journal. Vol. Vol 5, Issue 6, Pages p 329-337, 2010

82. Tawfik Ben Amor and Christophe Muller. "Application of Stochastic Production Frontier in the Estimation of Technical Efficiency of Irrigated Agriculture in Tunisia". Agricultural Journal. Vol. 5, Issue 2, Pages p50-56., 2010

83. Rhouma, R.,Solak, E.,Arroyo, D.,Li, S.,Alvarez, G.,Belghith, S.. Comment on "Modified Baptista type chaotic cryptosystem via matrix secret key" [Phys. Lett. A 372 (2008) 5427]. Physics Letters, Section A: General, Atomic and Solid State Physics. Vol. , Issue , Pages , 2009

84. Rhouma, R.,Belghith, S.. Cryptanalysis of a spatiotemporal chaotic cryptosystem. Chaos, Solitons and Fractals. Vol. , Issue , Pages , 2009

85. Rhouma, R.,Meherzi, S.,Belghith, S.. OCML-based colour image encryption. Chaos, Solitons and Fractals. Vol. , Issue , Pages , 2009

86. Jean-Marc Bardet, Hatem Bibi, Abdellatif Jouini.. Adaptive wavelet based estimator of the memory parameter for stationary Gaussian processes. Bernoulli Society for Mathematical Statistics and Probability. Vol. 14, Issue 3, Pages .691-724., 2008

87. Hatem Bibi, Abdellatif Jouini, M. Kratou. More general constructions of wavelets on the interval. Communications in Mathematical Analysis. Vol. 4, Issue 1, Pages 45-47, 2008

88. Rhouma, R.,Belghith, S.. Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Physics Letters, Section A: General, Atomic and Solid State Physics. Vol. , Issue , Pages , 2008

89. Rhouma, R.,Belghith, S.. Cryptanalysis of a spatiotemporal chaotic image/video cryptosystem. Physics Letters, Section A: General, Atomic and Solid State Physics. Vol. , Issue , Pages , 2008

90. Arroyo, D.,Rhouma, R.,Alvarez, G.,Li, S.,Fernandez, V.. On the security of a new image encryption scheme based on chaotic map lattices. Chaos. Vol. , Issue , Pages , 2008

91. Rhouma, R.,Safya, B.. On the security of a spatiotemporal chaotic cryptosystem. Chaos. Vol. , Issue , Pages , 2007

92. . Performance of a new Chaos-based Communication Scheme: The Reduced-Delay-Masked-DCSK. European Signal Processing Conference. Vol. , Issue , Pages , 2007

93. . A multidimensional map for a chaotic cryptosystem. European Signal Processing Conference. Vol. , Issue , Pages , 2006

94. Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Nadia Tawbi, Hamdi Yahyaoui, and Sami Zhioua. E-Bunny: A Dynamic Compiler for Embedded Java Virtual Machines.. Journal of Object Technology. Vol. 4, Issue 1, Pages 83-108, 2005

Articles de conférence

1. . Antecedents of Trust toward Islamic Banks: a proposal of an explanatory Model. ATM Hammamet. Pages , 2018

2. Bousnina, F.E., Chebbah, M., Tobji, M.A.B., Hadjali, A., Yaghlane, B.B. Evidential Top-k Queries Evaluation - Algorithms and Experiments.. IPMU. Pages 407-417, 2018

3. Saidi, M., Hermassi, H., Rhouma, R., Belghith, S. Uniformly Spread Embedding Based Steganography.. ICDEc. Pages 162-172, 2017

4. . The impact of social professional category on consumers’ acceptance level towards Islamic banking window.. GBATA Vienna. Pages , 2017

5. Elmi, S., Hadjali, A., Tobji, M.A.B., Yaghlane, B.B. Skyline Computation and Maintenance over Imperfect Databases - A Marginal-Points-Based Approach.. ICTAI. Pages 1234-1242, 2017

6. Bousnina, F.E., Elmi, S., Chebbah, M., Tobji, M.A.B., HadjAli, A., Yaghlane, B.B. Skyline Operator over Tripadvisor Reviews Within the Belief Functions Framework.. ICDEc. Pages 186-197, 2017

7. Abidi, A., Tobji, M.A.B., Hadjali, A., Yaghlane, B.B. Skyline Modeling and Computing over Trust RDF Data.. ICEIS. Pages 634-643, 2017

8. Abidi, A., Bahri, N., Tobji, M.A.B., HadjAli, A., Yaghlane, B.B. First Steps Towards an Electronic Meta-journal Platform Based on Crowdsourcing.. ICDEc. Pages 175-185, 2017

9. Zeineb Ayachi. Speaking anxiety, order or disorder?. Jendouba, Tunisia. Pages 199-220, 2017

10. Bousnina, F.E., Chebbah, M., Tobji, M.A.B., Hadjali, A., Yaghlane, B.B. On Top-K Queries Over Evidential Data.. ICEIS, Portugal. Pages 106-113, 2017

11. Maroua Meddeb, Amine Dhraief, Abdelfettah Belghith, Thierry Monteil, and Khalil Drira. Producer Mobility support in Named Data Internet of Things Network. International Conference on Ambient Systems, Networks and Techno- logies (ANT’17), volume 109 of Procedia Computer Science, Madeira, Portugal. Pages 1067 – 1073, 2017

12. Maroua Meddeb, Amine Dhraief, Abdelfettah Belghith, Thierry Monteil, and Khalil Drira. How to cache in ICN/IoT environments ?. 17th IEEE/ACS International Conference of Computer Systems and Applications (AICCSA’17) Hammamet, Tunisia. Pages 1-8, 2017

13. Vidal, G., Bechikh, R., Rhouma, R., Belghith, S. A commercial application of a chaos-based-stream cipher - Performance and Security analysis.. ICITST. Pages 39-44, 2016

14. Ounifi Mohamed Sami, Amdouni Hamida, Ben Elhoussine Rafika et Slimane Hammoudi. New 3D Visualization and Validation Tool for Displaying Association Rules and Their Associated Classifiers. 20th International Conference Information Visualisation, Universidade NOVA de Lisboa, Lisbon, July 19-22, Portugal. Pages 152-158, 2016

15. Jallouli, R., Jallouli, M., Rekik, J., Bach Tobji, M-A., Abdi, A., Bahri, N. The CEVEP medical application for innovative management of central venous port (CVP): Technical issues and research challenges. International Conference on Digital Economy (ICDEc 2016), Tunisia, Carthage. Pages 68-73, 2016

16. Bousnina, F-E., Elmi, S., Bach Tobji, Chebbah, M., HadjAli, A., Ben Yaghlane, B. Object-relational implementation of evidential databases. International Conference on Digital Economy (ICDEc 2016), Tunisia, Carthage. Pages 80-87, 2016

17. Elmi, S., HadjAli, A., Bach Tobji, M-A., Ben Yaghlane, B. Efficient Skyline Maintenance over Frequently Updated Evidential Databases. Information Processing and Management of Uncertainty in Knowledge-Based Systems, Netherlands, Eindhoven. Pages 199-210, 2016

18. Maher Helaoui and Wady Naanaa. A submodular-based decomposition strategy for valued CSPs. Proceedings of the Sixth Starting AI Researchers' Symposium (STAIRS), Montpellier, France. Pages 149-161, 2016

19. Mguiris Imen, Amdouni Hamida and Gammoudi Mohamed Mohsen. Fuzzy association rules mining: State of the Art. International Business Information Management Conference (28th IBIMA) 9-10 November 2016 in Seville, Spain. Pages --, 2016

20. . Trust levels toward Islamic banks in Tunisia: Users or not users it does matter?. GBATA Dubai. Pages , 2016

21. Elmi, S., HadhjAli, A., Bach Tobji, M-A., Ben Yaghlane, B. Efficient distributed skyline over imperfect data modeled by the evidence theory. IEEE 28th International Conference on Tools with Artificial Intelligence (ICTAI). Pages 335-342, 2016

22. El Ghali M. et Jammeli A.. "Les dimensions de l'expérience médiatique vécue par les enfants : étude exploratoire avec les enfants tunisiens",. Actes de 28th IBIMA Conference , Séville 2016.. Pages -, 2016

23. Raik Aissaoui, Amine Dhraief, Abdelfattah Belghith, Hamid Menouer, Fethi Filali, and Hassan Mathkour. VALS: Vehicle-Aided location service in urban environment. IEEE Wireless Communications and Networking Conference (WCNC’16), Doha, Qatar. Pages 1-6, 2016

24. Imen Mahjri, Amine Dhraief, and Abdelfattah Belghith.. A three dimensional scalable and distributed conflict detection algorithm for unmanned aerial vehicles. IEEE Wireless Communications and Networking Conference (WCNC’16), Doha, Qatar. Pages 1-7, 2016

25. Belazi, A.,Rhouma, R.,Belghith, S.. A novel approach to construct S-box based on Rossler system. IWCMC 2015 - 11th International Wireless Communications and Mobile Computing Conference. Pages , 2015

26. Belazi, A.,Abd El-Latif, A.A.,Rhouma, R.,Belghith, S.. Selective image encryption scheme based on DWT, AES S-box and chaotic permutation. IWCMC 2015 - 11th International Wireless Communications and Mobile Computing Conference. Pages , 2015

27. K. Kamoun and S. Ben Yahia. Stability assess based on enhanced information content similarity measure for ontology enrichment.. 4th International conference of Model and Data Engineering, Springer, Laranaca,Cyprus.. Pages 146-153, 2015

28. Aymen HajKacem , Ben N'Cir Chiheb-Eddine , Essoussi Nadia. Parallel K-prototypes for Clustering Big Data. ICCI 2015, Madrid, ESP. Pages 627-638, 2015

29. Aymen HajKacem , Ben N'Cir Chiheb-Eddine , Essoussi Nadia. MapReduce-based K-Prototypes Clustering Method for Big Data. DSAA, IEEE, Paris, France. Pages ..., 2015

30. Mguiris Imen, Amdouni Hamida et Gammoudi Mohamed Mohsen. New validation method of fuzzy association rules based on structural equation modeling. 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD'15), August 15-17, China. Pages 624-633, 2015

31. Bousnina, F-E., Bach Tobji, Chebbah, M., Liétard, L., Ben Yaghlane, B. A New Formalism for Evidential Databases. International Symposium on Methodologies for Intelligent Systems, Lyon, France. Pages 31-40, 2015

32. . Sustainable development and education: a Tunisian case study.. GBATA Péniche/lisbon. Pages , 2015

33. El Ghali M., Saied Ben Rached K. et Brée J.,. « L’expérience de la Téléréalité Vécue par les Enfants : les Motivations et les Freins à l’Egard de « La Star Academy »,. Actes de 25th IBIMA Conference , Amesterdam 2015.. Pages -, 2015

34. Maroua Meddeb, Amine Dhraief, Abdelfettah Belghith, Thierry Monteil, and Khalil Drira. Cache coherence in Machine-To-Machine Information Centric Networks. the 40th IEEE Conference on Local Computer Networks (LCN’15), Clearwater Beach, FL, USA. Pages 430–433, 2015

35. Mohamed Belhassen, Amine Dhraief, and Abdelfettah Belghith. City-Obstacles Im- pact on OLSR-Based Routing Protocols. Communication Technologies for Vehicles 8th International Workshop Nets4Cars/Nets4Trains/Nets4Aircraft, volume 9066 of Lecture Notes in Computer Science (LNCS), Sousse, Tunisia. Pages 47-59, 2015

36. Imen Mahjri, Amine Dhraief, and Abdelfettah Belghith. A Review on Collision Avoidance Systems for Unmanned Aerial Vehicles. Proceedings of the Communication Technologies for Vehicles : 8th International Workshop Nets4Cars/Nets4Trains/Nets4Aircraft, volume 9066 of Lecture Notes in Computer Science (LNCS), Sousse, Tunisia. Pages 203-214, 2015

37. Hajer Souri, Amine Dhraief, and Abdelfettah Belghith. TCP Application Recovery Improvement After Handover in Mobile Networks. Communication Technologies for Vehicles : 8th International Workshop Nets4Cars/Nets4Trains/Nets4Aircraft, volume 9066 of Lecture Notes in Computer Science (LNCS), Sousse, Tunisia. Pages 60-71, 2015

38. Yassine SLAMA. La responsabilité sociale des entreprises en Tunisie : état des lieux après la révolution. 16ème Université de Printemps de l’Audit Social, organisée par l’Institut d'Audit Sociale (IAS) et l’Université de Pékin, Pékin, Chine. Pages 699-705, 2014

39. Jammali, A., Bach Tobji, M-A., Martin, A., Ben Yaghlane, B. Indexing evidential data. The IEEE second World Conference on Complex Systems 2014, Agadir, Morocco. Pages 196 - 201, 2014

40. Elmi, S., Benouaret, K., HadjAli, A., Bach Tobji, M-A., Ben Yaghlane, B. Computing skyline from evidential data. International Conference on Scalable Uncertainty Management 2014, Oxford, UK. Lecture Notes in Artificial Intelligence, vol. 8720. Springer-Verlag. Pages 148—161, 2014

41. Hamdi, M.,Hermassi, H.,Rhouma, R.,Belghith, S.. A new secure and efficient scheme of ADPCM encoder based on chaotic encryption. 2014 1st International Conference on Advanced Technologies for Signal and Image Processing, ATSIP 2014. Pages , 2014

42. Yamen Koubaa, Rym Srarfi Tabbane et Manel Hamouda. A multiple Criteria Senior Segmentation : Case of the French market. Administrative Science Association of Canada 2014 Conference Muskoka, Ontario, Canada. Pages 00, 2014

43. Manel Hamouda et Rym Srarfi Tabbane. Gender Mediating Role in Electronic WOM Relationship and Purchase Intention: Proposal of a Conceptual Model. International Marketing Trends Conference 2014, Venice, Italy.. Pages 00, 2014

44. Hela masmoudi , Ben N'Cir Chiheb-Eddine , Essoussi Nadia. Identification de classes non-disjointes ayants des densités différentes. EGC 2014, Rennes, France. Pages 257-268, 2014

45. Rezgui Amira , Ben N'Cir Chiheb-Eddine , Essoussi Nadia. Généralisation des k-moyennes pour produire des recouvrements ajustables,. EGC 2014, Rennes, France. Pages 221-232, 2014

46. . A Tunisian pioneer Islamic bank:a case study of the quality of the website.. GBATA Baku. Pages , 2014

47. El Ghali M., Saied Ben Rached K. et Brée J.,. « Le processus d’Appropriation de l’Expérience Télévisuelle des Enfants. Cas de l’Emission de la « Star Academy »,. Actes de l’International Conference on Innovation in Business, Economics & Marketing Research (IBEM’14), Monastir 2014.-. Pages -, 2014

48. Raik Aissaoui, Hamid Mnaouer, Amine Dhraief, Fethi Filali, Abdelfettah Belghith, and Adnan Abu-Dayya. Advanced real-time traffic monitoring system based on V2X communications. IEEE International Conference on Communi- cations (ICC’14), Sydney, Australia. Pages 2713–2718, 2014

49. Imen Mahjri, Amine Dhraief, Issam Mabrouki, Abdelfettah Belghith, and Khalil Drira.. The coverage configuration protocol under AT-Dist localization. the 5th International Conference on Ambient Systems, Networks and Technologies (ANT’14), volume 32 of Procedia Computer Science, Hasselt, Belgium. Pages 141–148, 2014

50. Maroua Meddeb, Mehdi Ben Alaya, Thierry Monteil, Amine Dhraief, and Khalil Drira. M2M Platform with Autonomic Device Management Service. the 5th International Conference on Ambient Systems, Networks and Technologies (ANT’14), volume 32 of Procedia Computer Science, Hasselt, Belgium. Pages 1063-1070, 2014

51. Hajer Souri, Amine Dhraief, Syrine Tlili, Khalil Drira, and Abdelfettah Belghith. Smart Metering Privacy-preserving Techniques in a Nutshell.. the 5th International Conference on Ambient Systems, Networks and Technologies (ANT’14), volume 32 of Procedia Computer Science, Hasselt, Belgium. Pages 1087-1094, 2014

52. Imen Mahjri, Amine Dhraief, Issam Mabrouki, Abdelfettah Belghith, and Khalil Drira. An integrated framework for localization and coverage maintenance in wireless sensor networks. the 10th International Wireless Communications and Mobile Computing Conference (IWCMC’14), Nicosia, Cyprus. Pages 287-292, 2014

53. Zaghbani, S.,Rhouma, R.. Data hiding in spatial domain image using chaotic map. 2013 5th International Conference on Modeling, Simulation and Applied Optimization, ICMSAO 2013. Pages , 2013

54. Rym Srarfi Tabbane et Mohsen Debabi. Effects of eWOM on Consumer Behavior: a Stimulus-Organism-Response Model Proposition. Direct / Interactive Marketing Research Summit, Marketing EDGE, Chicago, USA. Pages 00, 2013

55. Rym Srarfi Tabbane et Manel Hamouda. Exposure to eWOM and Consumer Behavior: Does Gender Matter?. 15th Annual International Conference on Globalizing Businesses for the Next Century: Visualizing and Developing Contemporary Approach to Harness Future Opportunities, GBATA 2013, Helsinki, Finland. Pages 00, 2013

56. Rym Srarfi Tabbane et Manel Hamouda. Impact of eWOM on the Tunisian Consumer’s Attitude towards the Product. Advances in Business-Related Scientific Research Conference, Venice, Italy. Pages 00, 2013

57. Amine Dhraief, Hajer Souri, and Abdelfettah Belghith. Explicit MIPv6 handover cross-layer triggers and its impact on TCP Application recovery time. the International Conference on Computer Applications Technology (ICCAT’13),Sousse, Tunisia. Pages 1–8, 2013

58. Ben N'Cir Chiheb-Eddine , Guillaume Cleuziou , Essoussi Nadia. Detecting overlapping clustering with small and parameterizable overlaps,,. ICCAT, IEEE, Sousse, Tunisia. Pages 1-6, 2013

59. Ben N'Cir Chiheb-Eddine , Guillaume Cleuziou , Essoussi Nadia. Un modèle générique pour les k-moyennes à recouvrements ajustables,. EGC-FDC, Toulouse, France. Pages 81-92, 2013

60. Ben N'Cir Chiheb-Eddine , Zenned Afef , Essoussi Nadia. Non-disjoint grouping of text documents based Word Sequence Kernel.,. EGC2013, Toulouse, France. Pages 253-262, 2013

61. Ben N'Cir Chiheb-Eddine , Essoussi Nadia. Non-Disjoint Cluster Analysis with Non-Uniform Density.,. MIKE2013, Tamil Nadu, India.. Pages 100-111, 2013

62. Ben N'Cir Chiheb-Eddine , Essoussi Nadia. On the Extension of k-means for Overlapping Clustering: Average or Sum of clusters' representatives ?.,. KDIR2013. Pages 208-213, 2013

63. Amdouni Hamida et Gammoudi Mohamed Mohsen. Visualization of a Synthetic Representation of Association Rules to Assist Expert Validation. Computer Science and Information Technology (CS & IT-CSCP 2013), DOI: 10.5121/csit.2013.3819, Sundarapandian et al. (Eds): ICAITA, SAI, SEAS, CDKP, CMCA. Pages 229–242, 2013

64. . Consumer trust determinants in a Tunisian Bank: an exploratory study.. GBATA Helsinki. Pages , 2013

65. Amine Dhraief, Abdelfettah Belghith, Khalil Drira, Tarek Bouali, and Mohamed Amine Ghorbali. Autonomic management of the HIP-based M2M overlay network. Proceedings of the 4th International Conference on Ambient Systems, Networks and Technologies (ANT’13), volume 19 of Procedia Computer Science, Halifax, NS, Canada. Pages 98–105, 2013

66. Imen Jemili, Dhouha Ghrab, Abdelfettah Belghith, Bilel Derbel, and Amine Dh-raief. Collision aware coloring algorithm for wireless sensor networks. the 9th International Wireless Communications and Mobile Computing Conference (IWCMC’13), Cagliari, Sardinia, Italy. Pages 1546–1553, 2013

67. Issam Mabrouki, Nesrine Ben Khalifa, Amine Dhraief, and Abdelfettah Belghith. CrossWalk: A novel cross-layer random walk data dissemination in wireless sensor networks. the 24th IEEE International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC’13), London, United Kingdom. Pages 2474–2478, 2013

68. Amine Dhraief, Mohamed Amine Ghorbali, Tarek Bouali, and Abdelfettah Belghith. Mobility management in the HIP-based M2M overlay network. the 22nd IEEE International Workshop on Enabling Technologies : Infrastructure for Colla- borative Enterprises (WETICE’13), Hammamet, Tunisia. Pages 50–55, 2013

69. Amine Dhraief, Khalil Drira, Abdelfettah Belghith, Tarek Bouali, and Mohamed Amine Ghorbali. Self-healing and Optimizing of the HIP-based M2M Overlay Network. the 10th International Conference on Autonomic Computing (ICAC’13), San Jose, CA, USA. Pages 183–192, 2013

70. Rafaa Tahar, Amine Dhraief, Abdelfettah Belghith, and Rafik Braham. TCP performance evaluation over multihomed networks. the International Conference on Computer Applications Technology (ICCAT’13), Sousse, Tunisia. Pages 1–6, 2013

71. Amine Dhraief, Mohamed Amine Ghorbali, Tarek Bouali, Abdelfettah Belghith, and Khalil Drira. Simultaneous mobility management in the HIP-based M2M overlay network. the 9th International Wireless Communications and Mobile Computing Conference (IWCMC’13), Cagliari, Italy. Pages 219-224, 2013

72. Dhouha Ghrab, Bilel Derbel, Imen Jemili, Amine Dhraief, Abdelfettah Belghith, and El-Ghazali Talbi. Coloring based hierarchical routing approach. Proceedings of the 4th International Conference on Ambient Systems, Networks and Technologies (ANT’13), Halifax, NS, Canada,. Pages 188-196, 2013

73. Jallouli R. & Kasraoui A.. Business Intelligence et Management des Universités. ISKO-Maghreb, 3-4 nov, Hammamet. Pages -, 2012

74. Lamia Ketari, Munesh Chandra and Akheela Khanum. A Study of Image Spam Filtering Techniques. 4th IEEE International Conference on Com- putational Intelligence and Communication Networks, CICN 2012, Mathura, India. Pages 245-250, 2012

75. Rym Srarfi Tabbane et Manel Hamouda. Impact of Electronic Word-of-Mouth on Purchase Intention: Tunisian Consumer’s Case. 2nd International Symposium ISKO-Maghreb, Hammamet, Tunisie. Pages 00, 2012

76. K. Kamoun and S. Ben Yahia. Automatic Approach for Ontology Evolution based on Stability Evaluation.. 8th International Conference on Web Information Systems and Technologies (WEBIST 2012),Porto, Portugal. Pages 452-459, 2012

77. Ben N'Cir Chiheb-Eddine , Essoussi Nadia. Improved overlapping k-means for detecting overlapping clusters.,. MSDM2012, Hammamet, Tunisia. Pages 1-6, 2012

78. Ben N'Cir Chiheb-Eddine , Guillaume Cleuziou , Essoussi Nadia. Identification of Overlapping Clusters with Small Overlaps.,. EGC-Maghreb, Hammamet, Tunisia. Pages 26-32, 2012

79. . The combined effect of strength and favourability of associations as a source of brand equity: A survey on Tunisian women.. ICIMB london. Pages , 2012

80. Amine Dhraief, Mohamed Amine Ghorbali, Tarek Bouali, Abdelfettah Belghith, and Khalil Drira. A service-oriented framework for mobility and multihoming support. The 16th IEEE Mediterra- nean Electrotechnical Conference (MELECON’12), Hammamet, Tunisia. Pages 489–493, 2012

81. Amine Dhraief, Mohamed Amine Ghorbali, Tarek Bouali, Abdelfettah Belghith, and Khalil Drira. HBMON : A HIP based M2M overlay network. The 3rd International Conference on the Network of the Future (NOF’12), Tunis, Tunisia. Pages 1–8, 2012

82. Jallouli R. et Nahdi E.. Impact of Search Engine Marketing SEM on the Website Success. Information Systems and artificial intelligence SIIE, Casablanca, 17-19th February. Pages -, 2011

83. Mohammadi Akheela Khanum and Lamia Ketari. Trends in Combating Image Spam E-mails. In International Proceedings of Computer Science and Information Technology, CSIT 2011, Singapore. Pages 78-84, 2011

84. Lamia Ketari. Online Library for Graduation Projects Management: The OGPL System. In Proceedings of World Conference on Educational Multimedia, Hypermedia and Telecommunications, EdMedia 2011, Lisbon, Portugal. Pages 2017-2020, 2011

85. Ben N'Cir Chiheb-Eddine , Essoussi Nadia. Classification Recouvrante Bassée sur les Méthodes à Noyau,. JDS2011, Gammart, Tunisia. Pages 1-6, 2011

86. Amdouni Hamida et Gammoudi Mohamed Mohsen. Algorithms of association rules extraction: State of the Art. IEEE 3rd International Conference on Communication Software and Networks (ICCSN), May 27-29, China. Pages 333-339, 2011

87. Maher Helaoui and Wady Naanaa. Domain permutation reduction for valued CSPs. 11th Workshop on Preferences and Soft Constraints, Perugia, Italy. Pages 76-90, 2011

88. Amine Dhraief, Raik Aissaoui, and Abdelfettah Belghith. Parallel Computing the Longest Common Subsequence (LCS) on GPUs: Efficiency and Language Suitability. the 1st International Conference on Advanced Communications and Computation (INFOCOMP’11), Barcelona, Spain. Pages 143–148, 2011

89. Jallouli R.. Interaction between International Retailers and local Retailers in Tunisia: Investment opportunities and strategic partnerships. 8 th Conference of the Society of Asian Retailing and Distribution SARD, University of Marketing and Distribution Sciences, Kobe, Japan, 26-28 november. Pages -, 2010

90. Bach Tobji, M-A., Ben Yaghlane, B. Maintaining Evidential Frequent Itemsets in Case of Data Deletion. The International Conference on Information Processing and Management of Uncertainty in Knowledge-based System 2010, Dortmund, Germany. Pages 218-227, 2010

91. Amira, H.,Rhouma, R.,Belghith, S.. An eigen value based watermarking scheme for tamper detection in gray level images. 2010 7th International Multi-Conference on Systems, Signals and Devices, SSD-10. Pages , 2010

92. K. Kamoun and S. Ben Yahia. Evolution des ontologies : un panorama,. 10ème Conférence Internationale Francophone « Extraction et Gestion des Connaissances » (EGC’10), Hammamet, Tunisie. Pages 20-29, 2010

93. Ben N'Cir Chiheb-Eddine , Essoussi Nadia , Patrice Bertrand. Overlapping clustering based on kernel similarity metric.,. MSDM2010, Hammamet, Tunisia. Pages 130-136, 2010

94. Amine Dhraief and Abdelfettah Belghith. Multihoming support in the Internet : A state of the art. Proceedings of the International Conference on Models of Information and Communication Systems (MICS’10), Rabat, Morocco. Pages 1-8, 2010

95. Ben N'Cir Chiheb-Eddine , Essoussi Nadia , Patrice Bertrand. Kernel overlapping k-means for clustering in feature space.,. KDIR2010, Valencia, ESP. Pages 250-256, 2010

96. Amdouni Hamida et Gammoudi Mohamed Mohsen. A customer profile extraction using Conceptual Decomposition of a Binary relation Algorithm. 3rd International Conference on Information Systems and Economic Intelligence (SIIE'2010), 18-20 February, Sousse. Pages **, 2010

97. Amdouni Hamida et Gammoudi Mohamed Mohsen. An Automatic Method for Ontology Construction based on Formal Concept Analysis. Proceedings of Workshop en Informatique et Applications (WIA) – February 12-14, Tozeur, Tunisia.. Pages --, 2010

98. Wady Naanaa, Maher Helaoui and Béchir El Ayeb. A decomposition method for valued CSPs. 10th International Workshop on Preferences and Soft Constraints, Saint Andrews, Scotland. Pages 143-159, 2010

99. Brée J., EL Ghali M. et Saied Ben Rached K.,. « La Star Academy libanaise : une expérience de consommation multidimensionnelle pour les enfants »,. Actes de 9ème congrès international de marketing des tendances. Pages -, 2010

100. El Ghali M., Saied Ben Rached K. et Brée J., (2010). La Star Academy comme objet de regroupement pour les enfants tunisiens : la naissance de la communauté « Star Academy ». Actes de 8ème Colloque International De L’association Tunisienne De Marketing, Sousse le 2 et 3 Avril 2010.. Pages -, 2010

101. Amine Dhraief and Abelfettah. Belghith. Suitability analysis of mobility and multihoming unification. the International Conference on Communication in Wireless Environments and Ubiquitous Systems : New Challenges (ICWUS’10), Sousse, Tunisia. Pages 1-6, 2010

102. Amine Dhraief, Zied Chedly, and Abdelfettah Belghith. The impact of mobile IPv6 on transport protocols an experimental investigation. the International Conference on Communication in Wireless Environments and Ubiquitous Systems: New Challenges (ICWUS), Sousse, Tunisia. Pages 1-6, 2010

103. Jallouli R., Khlif H. & Brahmi S.. Tunisian Call centers defy the crisis!,. 7th Conference of the Society of Asian Retailing and Distribution SARD, University of Marketing and Distribution Sciences, Chung Ang University, Seoul, Korea , 20-22 november. Pages -, 2009

104. Bach Tobji, M-A., Ben Yaghlane, B., Mellouli, K. Incremental Maintenance of Frequent Itemsets in Evidential Databases. the European Conference on Symbolic and Quantitative Approaches to Reasoning with Uncertainty 2009, Verona, Italy. Lecture Notes in Computer Science, vol. 5590. Springer Berlin/Heidelberg. Pages 457-468, 2009

105. Hermassi, H.,Rhouma, R.,Belghith, S.. A modified hyperchaos based image cryptosystem. 2009 6th International Multi-Conference on Systems, Signals and Devices, SSD 2009. Pages , 2009

106. Rhouma, R.,Arroyo, D.,Belghith, S.. A new color image cryptosystem based on a piecewise linear chaotic map. 2009 6th International Multi-Conference on Systems, Signals and Devices, SSD 2009. Pages , 2009

107. Hassine, A.,Rhouma, R.,Belghith, S.. A novel method for tamper detection and recovery resistant to vector quantization attak. 2009 6th International Multi-Conference on Systems, Signals and Devices, SSD 2009. Pages , 2009

108. Sébastien Barre, Amine Dhraief, Nicolas Montavont, and Olivier Bonaventure. MipShim6 : une approche combinée pour la mobilité et la multidomiciliation. 14ème Colloque Francophone sur l’Ingénierie des Protocoles (CFIP’09), Strasbourg, France. Pages 1-8, 2009

109. Wady Naanaa, Maher Helaoui and Béchir El Ayeb. Algorithme de décomposition de domaine pour la satisfaction et l'optimisation de contraintes. Les Cinquièmes Journées Francophones de Programmation par contraintes, Orléans, France. Pages 375-384, 2009

110. Amine Dhraief and Nicolas Montavont. Rehoming decision algorithm: Design and empirical evaluation. the International Conference on Computational Science and Engineering (CSE ’09), Vancouver, Canada. Pages 464–469, 2009

111. Bach Tobji, M-A., Ben Yaghlane, B., Mellouli, K. Frequent Itemset Mining from Databases Including One Evidential Attribute. Tthe Second International Conference on Scalable Uncertainty Management 2008, Napoli, Italia. Lecture Notes in Artificial Intelligence, vol. 5291. Springer-Verlag. Pages 19—32, 2008

112. Bach Tobji, M-A., Ben Yaghlane, B., Mellouli, K. A New Algorithm for Mining Frequent Itemsets from Evidential Databases. Tthe International Conference on Information Processing and Management of Uncertainty in Knowledge-based System 2008, Malaga, Spain. Pages 1535-1542, 2008

113. Bach Tobji, M-A., Abrougui, A., Ben Yaghlane, B. GUFI: a new algorithm for General Updating of Frequent Itemsets. Tthe 11th IEEE International Conference on Computational Science and Engineering – Workshops 2008, São Paulo, Brazil. Pages 45-52, 2008

114. Bach Tobji, M-A. Comparative Study Of Data Mining Query Languages. Tthe International Conference on Applied Computer 2008, Algavre, Portugal. Pages 259-268, 2008

115. Amine Dhraief and Nicolas Montavont. Toward Mobility and Multihoming Unification- The SHIM6 Protocol : A Case Study. Proceedings of the IEEE Wi- reless Communications and Networking Conference (WCNC’08), Las Vegas, USA. Pages 2840–2845, 2008

116. Saied Ben Rached K. et EL GHALI M.,. «La Star Academy : une expérience de consommation pour les jeunes enfants et préadolescents tunisiens »,. Actes de 7ème journées normandes de la consommation, colloque consommation et société, Rouen, le 27 et 28 Mars 2008. . Pages -, 2008

117. Saied Ben Rached K. et El Ghali M.,. Le comportement des enfants et préadolescents face aux émissions de la téléréalité cas de la « Star Academy » : étude exploratoire »,. Actes de 7ème congrès international de marketing des tendances à Venise, du 17 au 19 Janvier 2008.. Pages -, 2008

118. Amine Dhraief, Tanguy Ropitault, and Nicolas Montavont. Mobility and multihoming management and strategies. the 14th Eunice Open European Summer School, Brest, France. Pages 1-8, 2008

119. Rhouma, R.,Belghith, S.. Performance of a new Chaos-based Communication Scheme: The Reduced-Delay-Masked-DCSK. European Signal Processing Conference. Pages , 2007

120. S. Zghal, K. Kamoun, S. Ben Yahia, E. M. Nguifo et Y. Slimani. EDOLA : Une nouvelle méthode d'alignement d'ontologies OWL-Lite.. 4ième Conférence en Recherche d’Information et Applications (CORIA’07), St-Etienne, France. Pages 351-367, 2007

121. Amine Dhraief, Nicolas Montavont, Romain Kuntz, and Manabu Tsukada.. E-Bicycle Demonstration on the Tour De France. the International Multi- Conference on Computing in the Global Information Technology (ICCGI’07), Guadeloupe, France. Pages 56– 56, 2007

122. S. Zghal, K. Kamoun, S. Ben Yahia, E. M. Nguifo and Y. Slimani. A new alignment method for OWL-Lite ontologies using propagation of similarity over the graph. 18th International Conference on Database and Expert Systems Applications (DEXA’07), Regensburg, Germany. Pages 524-528, 2007

123. S. Zghal, K. Kamoun, S. Ben Yahia, E. M. Nguifo et Y. Slimani. Une nouvelle méthode d'alignement et de visualisation d'ontologies OWL-Lite.. Conférence d’Extraction et Gestion des Connaissances (EGC’07), Namur, Belgique. Pages 197-198, 2007

124. Amine Dhraief, Abdelfattah Belghith, Nicolas Montavont, Jean-Marie Bonnin, and Mohamed Kassab. NS2 based simulation framework to evaluate the performance of wireless distribution systems. The 2007 Spring Simulaiton Multiconference - Volume 1, SpringSim ’07, Norfolk, Virginia, USA. Pages 264–271, 2007

125. Jallouli R.. The e-learning in Tunisia, How to succeed the implementation process?. Colloque international « les ruptures dans les sociétés d’information et l’économie de savoir», University Tunis El Manar, 15-16 february. Pages -, 2006

126. Jallouli R. et Zghal M.. Web and market orientation, The case of art product,. International Conference « Marketing in the area of ICT », Higher Institute of Management Tunis, 2- 3 november. Pages -, 2006

127. Bach Tobji, M-A., Gouider, M-S. Incremental Maintenance Of Association Rules Under Support Threshold Change. the International Conference on Applied Computer 2006, San Sebastian, Spain. Pages 91-98, 2006

128. Rhouma, R.,Safya, B.. A multidimensional map for a chaotic cryptosystem. European Signal Processing Conference. Pages , 2006

129. Belaid Ajroud Henda et Amdouni Hamida. Incremental Clustering as a Tool for CRM. Proceedings of the 5th WSEAS International Conference on Telecommunications and Informatics, Istanbul, Turkey, May 27-29. Pages 260-266, 2006

130. Saied Ben Rached K. et El Ghali M.,. «L’influence de la couleur et des personnages sur la mémorisation du packaging par les enfants : Cas des petits gâteaux et des macaronis ». Actes du 4ème colloque international de l’ATM à Tunis, du 31Mars et 1er Avril 2006.. Pages -, 2006

131. Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Nadia Tawbi, Hamdi Yahyaoui, and Sami Zhioua. A Dynamic Compiler for Embedded Java Virtual Machines. In Proceedings of the 3rd Inter- national Conference on the Principles and Practice of Programming in Java, ACM PPPJ'2004, Las Vegas, Nevada, USA, ACM Press. Pages 100-107, 2004

132. Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Nadia Tawbi, Hamdi Yahyaoui, and Sami Zhioua. A Synergy between Efficient Interpretation and Fast Selective Dynamic Compilation for the Acceleration of Embedded Java Virtual Machines. In Pro- ceedings of the 3rd International Conference on the Principles and Practice of Programming in Java, ACM PPPJ'2004, Las Vegas, Nevada, USA, ACM Press. Pages 108-115, 2004

133. Mourad Debbabi, Lamia Ketari, and Hamdi Yahyaoui. A Java SIP Inter- face for Limited Connected Devices. In Proceedings of Wireless and Optical Communications Conference, IASTED' WOC'2003, Banff, Canada, IASTED Proceedings. Pages 560-565, 2003

134. Mourad Debbabi, Mourad Erhioui, Lamia Ketari, Nadia Tawbi, Hamdi Yah- yaoui, and Sami Zhioua. Method Call Acceleration in Embedded Java Virtual Machines. In Proceedings of the International Conference on Com- putational Science, ICCS'03, Lecture Notes in Computer Science, LNCS, Volume 2659, Melbourne, Australia, Springer Verlag. Pages 750-759, 2003

135. . Transcending boundaries: Kwame Dawes’s Digital Collaborations. . Pages , 0

Articles de conférence (sans cimité de lecture)

1. Jallouli R.. Marketing Research and democracy in Tunisia. 9th international seminar of the Tunisian Association of Marketing, 8-9 April 2011, Hammamet. Pages -, 2015

2. Jallouli R.. NFC Technology, The case of cultural products »,. 6ème Journée sur les stratégies de développement culturel et création artistique : Enjeux défis et nouvelles perspectives, Laboratory of Research in Culture, New Technologies and development, Higher institute of Music, University of Tunis, 24 June. Pages -, 2010

3. Jallouli, R. Marketing & E-learning,. 5th International Conference of Tunisian association of Marketing, University El Manar, Hammamet, 13-14 April. Pages -, 2007