default search action
Hakim Bendjenna
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c17]Yacine Belhocine, Abdallah Meraoumia, Hakim Bendjenna, Ameur Khemane:
Beyond Traditional Methods: Feature Fusion for Robust Biometric Identification. PAIS 2024: 1-8 - [c16]Charaf Eddine Ghenai, Mohamed Gasmi, Hakim Bendjenna, Boulechfar Meriem:
Osteosarcoma Pathological Classification using Statistical Features. PAIS 2024: 1-5 - [c15]Abderrazak Khediri, Hamda Slimi, Yahiaoui Ayoub, Makhlouf Derdour, Hakim Bendjenna, Charaf Eddine Ghenai:
Enhancing Machine Learning Model Interpretability in Intrusion Detection Systems through SHAP Explanations and LLM-Generated Descriptions. PAIS 2024: 1-6 - [c14]Sourour Maalem, Hakim Bendjenna:
Deep Learning's Ability to Predict Chaos in a Chaotic System. PAIS 2024: 1-4 - 2023
- [j14]Hakim Bendjenna, Asma Aoun Allah, Abdallah Meraoumia:
Learning-Free Deep Features for Multispectral Palm-Print Classification. Comput. Sci. 24(2) (2023) - 2022
- [j13]Atef Bentahar, Abdallah Meraoumia, Louardi Bradji, Hakim Bendjenna:
Sensing as a service in Internet of Things: Efficient authentication and key agreement scheme. J. King Saud Univ. Comput. Inf. Sci. 34(8 Part A): 5493-5509 (2022) - [c13]Asma Aounallah, Hakim Bendjenna, Abdallah Meraoumia:
Privacy Preservation of Biometrics Used for IoT Systems Security: Brief Review. KGSWC Workshops 2022: 150-160 - [c12]Yasmina Benmabrouk, Mohamed Gasmi, Hakim Bendjenna, Abdelmouiz Nadjah:
Semantic segmentation of breast cancer histopathology images using deep learning. PAIS 2022: 1-7 - [c11]Atef Bentahar, Abdallah Meraoumia, Hakim Bendjenna, Abdelhakim Zeroual, Tarek Bentahar:
Combination of Closed-Set and Open-Set Biometric Identification. PAIS 2022: 1-6 - [c10]Rabah Kenaza, Ameur Khemane, Hakim Bendjenna, Abdallah Meraoumia, Laimeche Lakhdar:
Internet of Things (IoT): Architecture, Applications, and Security Challenges. PAIS 2022: 1-5 - 2020
- [j12]Laimeche Lakhdar, Abdallah Meraoumia, Hakim Bendjenna:
Enhancing LSB embedding schemes using chaotic maps systems. Neural Comput. Appl. 32(21): 16605-16623 (2020)
2010 – 2019
- 2019
- [j11]Abdallah Meraoumia, Hakim Bendjenna, Salim Chitroub:
Towards a robust palmprint representation for person identification. Int. J. Inf. Commun. Technol. 14(1): 89-109 (2019) - 2018
- [j10]Afrah Djeddar, Hakim Bendjenna, Abdelkrim Amirat, Philippe Roose, Lawrence Chung:
An emerging multi-paradigm for representing mobile applications' architectures using heterogeneous conceptual bricks. Int. J. Comput. Appl. Technol. 57(1): 1-13 (2018) - [j9]Abdeldjalil Ledmi, Hakim Bendjenna, Sofiane Mounine Hemam:
Optimizing Both the User Requirements and the Load Balancing in the Volunteer Computing System by using Markov Chain Model. Int. J. Enterp. Inf. Syst. 14(1): 35-62 (2018) - [j8]Hakim Bendjenna, Abdallah Meraoumia, Othaila Chergui:
Pattern recognition system: from classical methods to deep learning techniques. J. Electronic Imaging 27(03): 033008 (2018) - [j7]Othaila Chergui, Hakim Bendjenna, Abdallah Meraoumia, Srikanta Patnaik:
Can a chaos system provide secure communication over insecure networks? - Online automatic teller machine services as a case study. J. Electronic Imaging 27(03): 033045 (2018) - [c9]Atef Bentahar, Abdallah Meraoumia, Hakim Bendjenna, Abdelhakim Zeroual:
IoT Securing System using Fuzzy Commitment for DCT-based Fingerprint Recognition. PAIS 2018: 1-5 - [c8]Abdeldjalil Ledmi, Hakim Bendjenna, Sofiane Mounine Hemam:
Fault Tolerance in Distributed Systems: A Survey. PAIS 2018: 1-5 - [c7]Abdallah Meraoumia, Hakim Bendjenna, Mohamed Amroune, Yahia Dris:
Towards a Secure Online E-voting Protocol Based on Palmprint Features. PAIS 2018: 1-6 - 2017
- [j6]Afrah Djeddar, Hakim Bendjenna, Abdelkrim Amirat, Philippe Roose, Lawrence Chung:
Context-driven composition for mobile applications: a metamodelling approach. Int. J. Embed. Syst. 9(6): 505-522 (2017) - [c6]Yahiaoui Ayoub, Hakim Bendjenna, Philippe Roose:
Patrons temporels pour spécifier les systèmes auto-adaptatifs. INFORSID 2017: 213-228 - 2016
- [j5]Imene Benatia, Mohamed Ridda Laouar, Hakim Bendjenna, Sean B. Eom:
Implementing a Cloud-Based Decision Support System in a Private Cloud: The Infrastructure and the Deployment Process. Int. J. Decis. Support Syst. Technol. 8(1): 25-42 (2016) - [j4]Imene Benatia, Mohamed Ridda Laouar, Sean B. Eom, Hakim Bendjenna:
Incorporating the Negotiation Process in Urban Planning DSS. Int. J. Inf. Syst. Serv. Sect. 8(2): 14-29 (2016) - [c5]Abdallah Meraoumia, Salim Chitroub, Hakim Bendjenna, Ahmed Bouridane:
An Automated Finger-Knuckle-Print Identification System Using Jointly RBF & RFT Classifiers. IUCC-CSS 2016: 17-22 - [c4]Abdallah Meraoumia, Laimeche Lakhdar, Hakim Bendjenna, Salim Chitroub:
Do we have to trust the deep learning methods for palmprints identification? MedPRAI 2016: 85-91 - 2012
- [j3]Hakim Bendjenna, Pierre-Jean Charrel, Nacereddine Zarour:
Using Multi-criteria Analysis to Prioritize Stakeholders. J. Syst. Inf. Technol. 14(3): 264-280 (2012) - 2010
- [j2]Hakim Bendjenna, Pierre-Jean Charrel, Nacereddine Zarour:
Identifying and Modeling Non-Functional Concerns Relationships. J. Softw. Eng. Appl. 3(8): 820-826 (2010) - [j1]Hakim Bendjenna, Nacereddine Zarour, Pierre-Jean Charrel:
Eliciting requirements for an inter-company cooperative information system. J. Syst. Inf. Technol. 12(4): 305-333 (2010)
2000 – 2009
- 2009
- [c3]Hakim Bendjenna, Mohamed Amroune, Nacereddine Zarour, Pierre-Jean Charrel:
Prioritizing Non-functional Concerns in MAMIE Methodology. KSEM 2009: 253-262 - 2008
- [c2]Hakim Bendjenna, Nacereddine Zarour, Pierre-Jean Charrel:
MAMIE: A Methodology to Elicit Requirements in Inter-company Co-operative Information Systems. CIMCA/IAWTIC/ISE 2008: 290-295 - [c1]Hakim Bendjenna, Nacereddine Zarour, Pierre-Jean Charrel:
Enhancing Elicitation Technique Selection Process in a Cooperative Distributed Environment. REFSQ 2008: 23-36
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-12 22:52 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint