Abderrazak JEMAI
Abderrazak JEMAI
Institut National des Sciences Appliquées et de Technologie
Verified email at insat.rnu.tn
Title
Cited by
Cited by
Year
Phoabe: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted iot
S Belguith, N Kaaniche, M Laurent, A Jemai, R Attia
Computer Networks 133, 141-156, 2018
572018
Two stage particle swarm optimization to solve the flexible job shop predictive scheduling problem considering possible machine breakdowns
M Nouiri, A Bekrar, A Jemai, D Trentesaux, AC Ammari, S Niar
Computers & Industrial Engineering 112, 595-606, 2017
452017
A survey on security of IoT in the context of eHealth and clouds
IB Ida, A Jemai, A Loukil
2016 11th International Design & Test Symposium (IDT), 25-30, 2016
372016
Enhancing data security in cloud computing using a lightweight cryptographic algorithm
S Belguith, A Jemai, R Attia
The Eleventh International Conference on Autonomic and Autonomous Systems, 2015
362015
A hybrid genetic algorithm for Golomb ruler problem
N Ayari, T Van Luong, A Jemai
ACS/IEEE International Conference on Computer Systems and Applications …, 2010
252010
Pabac: a privacy preserving attribute based framework for fine grained access control in clouds
S Belguith, N Kaaniche, A Jemai, M Laurent, R Attia
232016
Constant-size threshold attribute based signcryption for cloud applications
S Belguith, N Kaaniche, M Laurent, A Jemai, R Attia
212017
ELPA: A new key agreement scheme based on linear prediction of ECG features for WBAN
EK Zaghouani, A Jemai, A Benzina, R Attia
2015 23rd European Signal Processing Conference (EUSIPCO), 81-85, 2015
202015
Performance improvement of the particle swarm optimisation algorithm for the flexible job shop problem under machines breakdown
R Zarrouk, IE Bennour, J Abderrazak
International Journal of Intelligent Engineering Informatics 6 (3-4), 396-416, 2018
62018
A new rescheduling heuristic for flexible job shop problem with machine disruption
M Nouiri, A Bekrar, A Jemai, AC Ammari, S Niar
Service Orientation in Holonic and Multi-Agent Manufacturing, 461-476, 2018
62018
A survey of IoT security based on a layered architecture of sensing and data analysis
H Mrabet, S Belguith, A Alhomoud, A Jemai
Sensors 20 (13), 3625, 2020
52020
Evaluation of the disydent co-design flow for an MJPEG case study
K Smiri, A Jemai, AC Ammari
International Review on Computers and Software, I. RE. CO. S, 2008
52008
Towards an Embedded Distributed Implementations of PSO Solutions for the Flexible Job Shop Problem
R Zarrouk, M Ettouil, I Bennour, A Jemai
Procedia Computer Science 73, 146-153, 2015
42015
Dynamic slack reclamation strategy for multiprocessor systems
I Mhedhbi, RB Atitallah, A Jemai
2012 16th IEEE Mediterranean Electrotechnical Conference, 979-984, 2012
42012
Parallel hybrid evolutionary search for Golomb ruler problem
N Ayari, A Jemai
International Conference on Metaheuristics and Nature Inspired Computing, 1-10, 2010
42010
Migration methodology in MPSoC based on performance analysis via SDF graph
K Smiri, A Jemai
Advances in Computational Sciences and Technology (ACST), 149-166, 2009
42009
Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds
S Belguith, N Kaaniche, M Laurent, A Jemai, R Attia
Journal of Parallel and Distributed Computing 135, 1-20, 2020
32020
A list of FSM Algorithms and available Implementations in Centralized Graph Transaction Databases
R Ayed, MS HACID, R HAQUE, A JEMAI
Technical Report. Université Claude Bernard Lyon, 2016
32016
An improved multi agent particle swarm optimization to solve flexible job shop scheduling problem
M Nouiri, A Bekrar, A Jemai, D Trentesaux, AC Ammari, S Niar
CIE45 Proceedings, 2015
32015
NoC-MPSoC performance estimation with synchronous data flow (SDF) graphs
K Smiri, A Jemai
International Conference on Autonomous and Intelligent Systems, 406-415, 2011
32011
The system can't perform the operation now. Try again later.
Articles 1–20