Zobrazeno 1 - 10
of 174
pro vyhledávání: '"Mohand Said Hacid"'
Autor:
Geertruida H De Bock, Delphine Maucort-Boulch, Clémence Leyrat, Amélie Anota, Stephane Dalle, Susana Puig, Marie Préau, Mohammad S Jalali, Marie-Jose Kersten, Martijn GH van Oijen, Mathieu Fauvernier, Petra C. Vinke, Marc Combalia, Anne Mea Spanjaart, Maria Gomes da Silva, Aurore Fouda Essongue, Aurélie Rabier, Myriam Pannard, Amal Elgammal, Mike Papazoglou, Mohand-Said Hacid, Catherine Rioufol, Erick Suazo-Zepeda, Ananya Malhotra, Emmanuel Coquery, Elsa Coz
Publikováno v:
BMJ Open, Vol 13, Iss 4 (2023)
Introduction Immunotherapies, such as immune checkpoint inhibitors and chimeric antigen receptor T-cell therapy, have significantly improved the clinical outcomes of various malignancies. However, they also cause immune-related adverse events (irAEs)
Externí odkaz:
https://doaj.org/article/f0459fb57ecf4fbf88aa688bc3bf3ad3
Autor:
Sara Makki, Zainab Assaghir, Yehia Taher, Rafiqul Haque, Mohand-Said Hacid, Hassan Zeineddine
Publikováno v:
IEEE Access, Vol 7, Pp 93010-93022 (2019)
Credit card fraud is a criminal offense. It causes severe damage to financial institutions and individuals. Therefore, the detection and prevention of fraudulent activities are critically important to financial institutions. Fraud detection and preve
Externí odkaz:
https://doaj.org/article/aa591261121b49bc828609a41c73f36d
Autor:
Laurent d'Orazio, Jalil Boukhobza, Omer Rana, Juba Agoun, Le Gruenwald, Herve Rannou, Elisa Bertino, Mohand-Said Hacid, Taofik Saidi, Georges Bossert, Van Long Nguyen Huu, Dimitri Tombroff, Makoto Onizuka
Publikováno v:
2022 IEEE International Conference on Big Data (Big Data)
Workshop on Big Data for CyberSecurity (BigCyber-2022)
Workshop on Big Data for CyberSecurity (BigCyber-2022), Dec 2022, Osaka, Japan. pp.2960-2969, ⟨10.1109/BigData55660.2022.10020852⟩
Workshop on Big Data for CyberSecurity (BigCyber-2022)
Workshop on Big Data for CyberSecurity (BigCyber-2022), Dec 2022, Osaka, Japan. pp.2960-2969, ⟨10.1109/BigData55660.2022.10020852⟩
International audience; During the last decade, big data management has attracted increasing interest from both the industrial and academic communities. In parallel, Cyber Security has become mandatory due to various and more intensive threats. In Ju
Publikováno v:
Cluster Computing. 24:3311-3336
Nowadays, cloud computing environments have become a natural choice to host and process a huge volume of data. The combination of cloud computing and big data frameworks is an effective way to run data-intensive applications and tasks. Also, an optim
Publikováno v:
2022 International Joint Conference on Neural Networks (IJCNN).
Autor:
Petra C. Vinke, Marc Combalia, Geertruida H de Bock, Clémence Leyrat, Anne Mea Spanjaart, Stephane Dalle, Maria Gomes da Silva, Aurore Fouda Essongue, Aurélie Rabier, Myriam Pannard, Mohammad S Jalali, Amal Elgammal, Mike Papazoglou, Mohand-Said Hacid, Catherine Rioufol, Marie-José Kersten, Martijn GH van Oijen, Erick Suazo-Zepeda, Ananya Malhotra, Emmanuel Coquery, Amélie Anota, Marie Preau, Mathieu Fauvernier, Elsa Coz, Susana Puig, Delphine Maucort-Boulch
Publikováno v:
BMJ Open. 13:e069090
IntroductionImmunotherapies, such as immune checkpoint inhibitors and chimeric antigen receptor T-cell therapy, have significantly improved the clinical outcomes of various malignancies. However, they also cause immune-related adverse events (irAEs)
Autor:
Francois Hantry, Mohand-Said Hacid
Publikováno v:
Electronic Proceedings in Theoretical Computer Science, Vol 68, Iss Proc. FLACOS 2011, Pp 39-53 (2011)
Providing adequate tools to tackle the problem of inconsistent compliance rules is a critical research topic. This problem is of paramount importance to achieve automatic support for early declarative design and to support evolution of rules in contr
Externí odkaz:
https://doaj.org/article/1f5847a1c3884661b765a25f46effc42
Publikováno v:
Future Generation Computer Systems
Future Generation Computer Systems, Elsevier, 2019, 97, pp.792-804. ⟨10.1016/j.future.2019.02.044⟩
Future Generation Computer Systems, Elsevier, 2019, 97, pp.792-804. ⟨10.1016/j.future.2019.02.044⟩
International audience; Internet of Things (IoT) is leading to a paradigm shift within the logistics industry. Logistics services providers use sensor technologies such as GPS or telemetry to track and manage their shipment processes. Additionally, t
Publikováno v:
Greedy Algorithms
In our current approach we employ a greedy strategy tackle the re-coloring problem defined in Section 4.1. The major reasons for utilizing a greedy strategy is, as in other many approaches based on some greedy algorithms, we believe that it is useful
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7427b601ccd5567657a7e9ff4ebc5218
http://www.intechopen.com/articles/show/title/toward_improving_b-coloring_based_clustering_using_a_greedy_re-coloring_algorithm
http://www.intechopen.com/articles/show/title/toward_improving_b-coloring_based_clustering_using_a_greedy_re-coloring_algorithm
This book constitutes the proceedings of the 27th International Symposium on Methodologies for Intelligent Systems, ISMIS 2024, held in Poitiers, France, in June 2024. The 18 full papers, 6 short papers and 5 industrial papers presented in this vo