default search action
Maher Ben Jemaa
Person information
- affiliation: University of Sfax, Tunisia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Abdennaceur Ghandri, Houssem Eddine Nouri, Maher Ben Jemaa:
Deep Learning for VBR Traffic Prediction-Based Proactive MBSFN Resource Allocation Approach. IEEE Trans. Netw. Serv. Manag. 21(1): 463-476 (2024) - 2021
- [j28]Amir Guidara, Ghofrane Fersi, Maher Ben Jemaa, Faouzi Derbel:
A new deep learning-based distance and position estimation model for range-based indoor localization systems. Ad Hoc Networks 114: 102445 (2021) - [j27]Ameni Hbaieb, Mahdi Khemakhem, Maher Ben Jemaa:
Virtual Machine Placement with Disk Anti-colocation Constraints Using Variable Neighborhood Search Heuristic. Inf. Syst. Frontiers 23(5): 1245-1271 (2021)
2010 – 2019
- 2019
- [j26]Issam Jabri, Tesnim Mekki, Abderrezak Rachedi, Maher Ben Jemaa:
Vehicular fog gateways selection on the internet of vehicles: A fuzzy logic with ant colony optimization based approach. Ad Hoc Networks 91 (2019) - [j25]Amir Guidara, Faouzi Derbel, Ghofrane Fersi, Sadok Bdiri, Maher Ben Jemaa:
Energy-efficient on-demand indoor localization platform based on wireless sensor networks using low power wake up receiver. Ad Hoc Networks 93 (2019) - [j24]Yomna Ben Jmaa, Rabie Ben Atitallah, David Duvivier, Maher Ben Jemaa:
A Comparative Study of Sorting Algorithms with FPGA Acceleration by High Level Synthesis. Computación y Sistemas 23(1): 213 (2019) - [j23]Tesnim Mekki, Issam Jabri, Abderrezak Rachedi, Maher Ben Jemaa:
Vehicular cloud networking: evolutionary game with reinforcement learning-based access approach. Int. J. Bio Inspired Comput. 13(1): 45-58 (2019) - [j22]Nesrine Masmoudi, Hanene Azzag, Mustapha Lebbah, Cyrille Bertelle, Maher Ben Jemaa:
An ant-based new clustering model for graph proximity construction. Int. J. Bio Inspired Comput. 14(4): 213-226 (2019) - [j21]Ghofrane Fersi, Maher Ben Jemaa:
An analytical study of the main characteristics of Cluster-based Energy-aware Virtual Ring Routing (CLEVER): Number of clusters, number of hops and cluster diameter. Peer-to-Peer Netw. Appl. 12(4): 777-788 (2019) - [j20]Ameni Hbaieb, Mahdi Khemakhem, Maher Ben Jemaa:
A survey and taxonomy on virtual data center embedding. J. Supercomput. 75(10): 6324-6360 (2019) - 2018
- [j19]Abdennaceur Ghandri, Yassine Boujelben, Maher Ben Jemaa:
Adaptive MBSFN subframe allocation scheme for VBR video streaming over LTE-A networks. Trans. Emerg. Telecommun. Technol. 29(12) (2018) - [j18]Fatma Abdennadher, Maher Ben Jemaa:
Performance efficiency of a predictive scheme into publish/subscribe. Int. J. Commun. Networks Distributed Syst. 21(1): 115-129 (2018) - [j17]Hajer Ayadi, Mouna Torjmen Khemakhem, Mariam Daoud, Jimmy Xiangji Huang, Maher Ben Jemaa:
MF-Re-Rank: A modality feature-based Re-Ranking model for medical image retrieval. J. Assoc. Inf. Sci. Technol. 69(9): 1095-1108 (2018) - [j16]Nasreddine Hajlaoui, Issam Jabri, Maher Ben Jemaa:
An accurate two dimensional Markov chain model for IEEE 802.11n DCF. Wirel. Networks 24(4): 1019-1031 (2018) - [c49]Tesnim Mekki, Issam Jabri, Abderrezak Rachedi, Maher Ben Jemaa:
Towards Multi-Access Edge Based Vehicular Fog Computing Architecture. GLOBECOM 2018: 1-6 - [c48]Hatem Aouadi, Mouna Torjmen Khemakhem, Maher Ben Jemaa:
Building Contextual Implicit Links for Image Retrieval. ICEIS (1) 2018: 81-91 - [c47]Hatem Aouadi, Mouna Torjmen Khemakhem, Maher Ben Jemaa:
Uncovering Hidden Links Between Images Through Their Textual Context. ICEIS (Revised Selected Papers) 2018: 370-395 - [c46]Abdennaceur Ghandri, Yassine Boujelben, Maher Ben Jemaa:
A Low-Complexity Scheduling for Joint Unicast and Multicast Transmissions in LTE-A Network. IWCMC 2018: 136-141 - [c45]Ben Ltaifa Ibtihel, Hlaoua Lobna, Maher Ben Jemaa:
A Semantic Approach for Tweet Categorization. KES 2018: 335-344 - [c44]Amir Guidara, Ghofrane Fersi, Faouzi Derbel, Maher Ben Jemaa:
Impacts of Temperature and Humidity variations on RSSI in indoor Wireless Sensor Networks. KES 2018: 1072-1081 - [c43]Abdennaceur Ghandri, Yassine Boujelben, Maher Ben Jemaa:
Dynamic MBSFN subframe allocation algorithm for bursty video traffic in LTE-Advanced network. WCNC 2018: 1-6 - 2017
- [j15]Hajer Ayadi, Mouna Torjmen Khemakhem, Mariam Daoud, Jimmy Xiangji Huang, Maher Ben Jemaa:
Mining correlations between medically dependent features and image retrieval models for query classification. J. Assoc. Inf. Sci. Technol. 68(5): 1323-1334 (2017) - [j14]Tesnim Mekki, Issam Jabri, Abderrezak Rachedi, Maher Ben Jemaa:
Vehicular cloud networks: Challenges, architectures, and future directions. Veh. Commun. 9: 268-280 (2017) - [c42]Yomna Ben Jmaa, Rabie Ben Atitallah, Maher Ben Jemaa:
An Optimized Software Radio Application Using a Dynamic Slack Reclamation Technique on a Real Platform OMAP 3530. AICCSA 2017: 637-644 - [c41]Ameni Hbaieb, Mahdi Khemakhem, Maher Ben Jemaa:
Using Decomposition and Local Search to Solve Large-Scale Virtual Machine Placement Problems with Disk Anti-Colocation Constraints. AICCSA 2017: 688-695 - [c40]Hajer Ayadi, Mouna Torjmen Khemakhem, Jimmy Xiangji Huang, Mariam Daoud, Maher Ben Jemaa:
Learning to Re-rank Medical Images Using a Bayesian Network-Based Thesaurus. ECIR 2017: 160-172 - [c39]Yomna Ben Jmaa, Karim M. A. Ali, David Duvivier, Maher Ben Jemaa, Rabie Ben Atitallah:
An Efficient Hardware Implementation of TimSort and MergeSort Algorithms Using High Level Synthesis. HPCS 2017: 580-587 - [c38]Tesnim Mekki, Issam Jabri, Abderrezak Rachedi, Maher Ben Jemaa:
Proactive and hybrid wireless network access strategy for Vehicle Cloud networks: An evolutionary game approach. IWCMC 2017: 1108-1113 - [c37]Fatma Abdennadher, Maher Ben Jemaa:
Towards an Optimized Scheme for Mobile Subscribers Based on Cloud Computing. KES 2017: 751-760 - [c36]Fatma Abdennadher, Maher Ben Jemaa:
Resource Management for Mobile Publish/Subscribe Systems. PDP 2017: 191-198 - 2016
- [j13]Ghofrane Fersi, Wassef Louati, Maher Ben Jemaa:
CLEVER: Cluster-based Energy-aware Virtual Ring Routing in randomly deployed wireless sensor networks. Peer-to-Peer Netw. Appl. 9(4): 640-655 (2016) - [j12]Monia Ben Brahim, Tarak Chaari, Maher Ben Jemaa, Mohamed Jmaiel:
The SemSPM approach: fine integration of WS-SecurityPolicy semantics to enhance matching security policies in SOA. Serv. Oriented Comput. Appl. 10(3): 337-364 (2016) - [c35]Amir Guidara, Faouzi Derbel, Maher Ben Jemaa:
Energy-efficient model for indoor localization process based on wireless sensor networks. SSD 2016: 512-517 - [c34]Nesrine Masmoudi, Hanane Azzag, Mustapha Lebbah, Cyrille Bertelle, Maher Ben Jemaa:
CL-AntInc Algorithm for Clustering Binary Data Streams Using the Ants Behavior. KES 2016: 187-196 - 2015
- [c33]Nesrine Masmoudi, Hanane Azzag, Mustapha Lebbah, Cyrille Bertelle, Maher Ben Jemaa:
How to use ants for data stream clustering. CEC 2015: 656-663 - [c32]Rym Teyeb, Mouna Torjmen, Nathalie Hernandez, Ollivier Haemmerlé, Maher Ben Jemaa:
Vers une annotation sémantique des images web fondée sur des patrons RDF. CORIA 2015: 285-300 - [c31]Hatem Aouadi, Mouna Torjmen Khemakhem, Maher Ben Jemaa:
An LDA Topic Model Adaptation for Context-Based Image Retrieval. EC-Web 2015: 69-80 - [c30]Rim Teyeb Jaouachi, Mouna Torjmen Khemakhem, Nathalie Hernandez, Ollivier Haemmerlé, Maher Ben Jemaa:
Semantic Annotation of Images Extracted from the Web using RDF Patterns and a Domain Ontology. ICEIS (2) 2015: 137-144 - [c29]Rim Teyeb Jaouachi, Mouna Torjmen Khemakhem, Maher Ben Jemaa, Ollivier Haemmerlé, Nathalie Hernandez:
Taking Contextual Parameters into Account and Using RDF Patterns for the Semantic Web Image Annotation. ICEIS (Revised Selected Papers) 2015: 328-344 - [c28]Nesrine Masmoudi, Hanane Azzag, Mustapha Lebbah, Cyrille Bertelle, Maher Ben Jemaa:
Clustering of Binary Data Sets Using Artificial Ants Algorithm. ICONIP (1) 2015: 716-723 - [c27]Karim Gasmi, Mouna Torjmen Khemakhem, Lynda Tamine, Maher Ben Jemaa:
Graph-based Methods for Significant Concept Selection. KES 2015: 488-497 - 2014
- [c26]Karim Gasmi, Mouna Torjmen Khemakhem, Lynda Tamine, Maher Ben Jemaa:
A New Combination Method Based on Adaptive Genetic Algorithm for Medical Image Retrieval. AIRS 2014: 289-301 - [c25]Amal Abid, Mouna Torjmen Khemakhem, Soumaya Marzouk, Maher Ben Jemaa, Thierry Monteil, Khalil Drira:
Toward Antifragile Cloud Computing Infrastructures. ANT/SEIT 2014: 850-855 - [c24]Hajer Ayadi, Mouna Torjmen Khemakhem, Mariam Daoud, Jimmy Xiangji Huang, Maher Ben Jemaa:
Apprentissage de classification des requêtes basée sur la confiance et la couverture. CORIA-CIFED 2014: 303-318 - [c23]Fatma Abdennadher, Maher Ben Jemaa:
A Selective Predictive Subscriber Mobility Using the Closest Criterion. MobiWIS 2014: 126-136 - 2013
- [j11]Ghofrane Fersi, Wassef Louati, Maher Ben Jemaa:
Handling Nodes Mobility and Failure During Bootstrapping in Randomly Deployed Ring-based Wireless Sensor Networks. Int. J. Recent Contributions Eng. Sci. IT 1(1): 28-34 (2013) - [j10]Fatma Abdennadher, Maher Ben Jemaa:
Mobility Management in Publish/Subscribe Middleware. Int. J. Adapt. Resilient Auton. Syst. 4(1): 101-112 (2013) - [j9]Nasreddine Hajlaoui, Issam Jabri, Maher Ben Jemaa:
Experimental Performance Evaluation and Frame Aggregation Enhancement in IEEE 802.11n WLANs. Int. J. Commun. Networks Inf. Secur. 5(1) (2013) - [j8]Ghofrane Fersi, Wassef Louati, Maher Ben Jemaa:
Distributed Hash table-based routing and data management in wireless sensor networks: a survey. Wirel. Networks 19(2): 219-236 (2013) - [c22]Karim Gasmi, Mouna Torjmen Khemakhem, Maher Ben Jemaa:
A Conceptual Model for Word Sense Disambiguation in Medical Image Retrieval. AIRS 2013: 296-307 - [c21]Chiraz Chaabane, Alain Pegatoquet, Michel Auguin, Maher Ben Jemaa:
Mobility Management Approach for IEEE802.15.4/ZigBee Nodes in a Noisy Environment. ARCS Workshops 2013 - [c20]Hajer Ayadi, Mouna Torjmen, Mariam Daoud, Maher Ben Jemaa, Jimmy Xiangji Huang:
Correlating medical-dependent query features with image retrieval models using association rules. CIKM 2013: 299-308 - [c19]Ghofrane Fersi, Wassef Louati, Maher Ben Jemaa:
Consistent and efficient bootstrapping ring-based protocol in randomly deployed wireless sensor networks. ICT 2013: 1-5 - [c18]Ghofrane Fersi, Wassef Louati, Maher Ben Jemaa:
Energy-Aware Distributed Hash Table-Based Bootstrapping Protocol for Randomly Deployed Heterogeneous Wireless Sensor Networks. ISCIS 2013: 273-283 - [c17]Ghofrane Fersi, Wassef Louati, Maher Ben Jemaa:
The optimal transmitting power in randomly deployed heterogeneous Wireless Sensor Networks for predetermined average node degree. IWCMC 2013: 125-130 - [c16]Nasreddine Hajlaoui, Issam Jabri, Maher Ben Jemaa:
Analytical study of frame aggregation in error-prone channels. IWCMC 2013: 237-242 - [c15]Fatma Abdennadher, Maher Ben Jemaa:
Accurate prediction of mobility into publish/subscribe. MOBIWAC 2013: 101-106 - [i2]Achraf Karray, Rym Teyeb, Maher Ben Jemaa:
A Heuristic Approach for Web-Service Discovery and Selection. CoRR abs/1305.2684 (2013) - 2012
- [j7]Hatem Aouadi, Mouna Torjmen Khemakhem, Maher Ben Jemaa:
Combination of document structure and links for multimedia object retrieval. J. Inf. Sci. 38(5): 442-458 (2012) - [c14]Hatem Awadi, Mouna Torjmen Khemakhem, Maher Ben Jemaa:
Applying LDA in Contextual Image Retrieval - ReDCAD participation at ImageCLEF Flickr Photo Retrieval 2012. CLEF (Online Working Notes/Labs/Workshop) 2012 - [c13]Karim Gasmi, Mouna Torjmen Khemakhem, Maher Ben Jemaa:
Word Indexing Versus Conceptual Indexing in Medical Image Retrieval. CLEF (Online Working Notes/Labs/Workshop) 2012 - [c12]Monia Ben Brahim, Tarak Chaari, Maher Ben Jemaa, Mohamed Jmaiel:
Semantic matching of web services security policies. CRiSIS 2012: 1-8 - [c11]Chiraz Chaabane, Alain Pegatoquet, Michel Auguin, Maher Ben Jemaa:
An Efficient Mobility Management Approach for IEEE 802.15.4/ZigBee Nodes. HPCC-ICESS 2012: 897-902 - [c10]Nasreddine Hajlaoui, Issam Jabri, Malek Taieb, Maher Ben Jemaa:
A frame aggregation scheduler for QoS-sensitive applications in IEEE 802.11n WLANs. ICCIT 2012: 221-226 - [c9]Khlifi Nesrine, Maher Ben Jemaa:
HEERP: Hierarchical energy efficient routing protocol for Wireless Sensor Networks. ICCIT 2012: 308-313 - [c8]Rim Teyeb Jaouachi, Maher Ben Jemaa, Achraf Karray:
Adaptation of Bees Algorithm for QOS-based Selection and Replacement of Web Services. ICSOFT 2012: 459-462 - [c7]Nasreddine Hajlaoui, Issam Jabri, Maher Ben Jemaa:
Experimental study of IEEE 802.11n protocol. WiNTECH 2012: 93-94 - 2011
- [j6]Maher Ben Jemaa:
A fault tolerant platform of web services based on service composition. Multiagent Grid Syst. 7(4-5): 147-158 (2011) - [c6]Hatem Awadi, Mouna Torjmen Khemakhem, Maher Ben Jemaa:
Evaluating Some Contextual Factors for Image Retrieval - ReDCAD Participation at ImageCLEF Wikipedia 2011. CLEF (Notebook Papers/Labs/Workshop) 2011 - [c5]Monia Ben Brahim, Tarak Chaari, Maher Ben Jemaa, Mohamed Jmaiel:
Semantic Matching of WS-SecurityPolicy Assertions. ICSOC Workshops 2011: 114-130 - 2010
- [j5]Omar Cheikhrouhou, Maryline Laurent, Amin Ben Abdallah, Maher Ben Jemaa:
An EAP-EHash authentication method adapted to resource constrained terminals. Ann. des Télécommunications 65(5-6): 271-284 (2010) - [j4]Ghofrane Fersi, Wassef Louati, Maher Ben Jemaa:
Energy-aware Virtual Ring Routing in Wireless Sensor Networks. Netw. Protoc. Algorithms 2(4): 16-29 (2010) - [c4]Monia Ben Brahim, Maher Ben Jemaa, Mohamed Jmaiel:
Security Mapping to Enhance Matching Fine-Grained Security Policies. NDT (1) 2010: 183-196
2000 – 2009
- 2009
- [j3]Maher Ben Jemaa, Nahla Abid, Maryline Laurent-Maknavicius, Hakima Chaouchi:
Experimental Measurements of Host Identity Protocol for Mobile Nodes' Networks. J. Comput. Networks Commun. 2009: 383517:1-383517:6 (2009) - [i1]Maher Ben Jemaa, Maryam Kallel Zouari, Bachar Zouari:
A new approach to services differentiation between mobile terminals of a wireless LAN. CoRR abs/0908.1220 (2009) - 2007
- [j2]Fakhreddine Ghaffari, Michel Auguin, Mohamed Abid, Maher Ben Jemaa:
Dynamic and On-Line Design Space Exploration for Reconfigurable Architectures. Trans. High Perform. Embed. Archit. Compil. 1: 179-193 (2007) - [c3]Soumaya Marzouk, Maher Ben Jemaa, Mohamed Jmaiel:
A Serialisation Based Approach for Processes Strong Mobility. DAIS 2007: 153-166 - [c2]Soumaya Marzouk, Maher Ben Jemaa, Mohamed Jmaiel:
A serialization based approach for strong mobility of shared object. PPPJ 2007: 237-242 - 2005
- [c1]Ines Ben Brahim, Maher Ben Jemaa:
Multicast routing protocol for Ad Hoc Networks with a Quality of Service. ICECS 2005: 1-5
1990 – 1999
- 1997
- [j1]Mohamed Chtourou, Maher Ben Jemaa, Raouf Ketata:
A learning-automaton-based method for fuzzy inference system identification. Int. J. Syst. Sci. 28(9): 889-896 (1997)
Coauthor Index
aka: Mouna Torjmen
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-09 21:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint