Filters: First Letter Of Last Name is S  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R [S] T U V W X Y Z   [Show ALL]
[1132] SABER MASI, Bayati A, Nguyen K-K, Cheriet M. "Featuring Real-Time imbalanced network traffic classification.". In: 2018 IEEE Confs on Internet of Things, Green Computing and Communications, Cyber, Physical and Social Computing, Smart Data, Blockchain, Computer and Information Technology, Congress on Cybermatics.; 2018. Download: 6wB19ko3R3pdeOLHEFfjOF.pdf (249.4 KB)
[614] Said JN, Cheriet M, Suen CY. "Processing of Business Forms : System Overview.". In: Proc. 13th Int. Conf. on Pattern Recognition. Vienne; 1996:.
[617] Said JN, Cheriet M, Suen CY. "Processing of Business Forms : System Overview,.". In: Proc. 9th Vision Interface. Toronto; 1996:.
[pena-saldarriaga_wcn-2011] Saldarriaga PS, Cheriet M. "Indexing On-Line Handwritten Texts Using Word Confusion Networks.". In: Proceedings of the 11th Int Conference on Document Analysis and Recognition (ICDAR 2011). Beijing, China; 2011:.
[560] Sayadi M, Sakrane S, Fnaiech F, Cheriet M. "A New Non-Linear Exponential 2-D Adaptive Filter and Its Application in Texture Characterization.". In: The IEEE Intl. Conf. On Acoustics and Signal Processing (ICASSP’04). Montreal; 2004:.
[573] Sayadi M, Fnaiech F, Mathlouthi A, Chaari A, Cheriet M. "Texture Characterization Based on a Chandrasekhar Fast Adaptive filter.". In: Conférence SETIT : Sciences, Electronique, Technologie de l’Information et des Télécommunications. Sousse, Tunisia; 2003.
[542] Sehad, Mezai L, Laskri MT, Cheriet M. "Fast method for skew detection of printed Arabic documents using linear regression.". In: International Computer Systems & Information Technology Conference ICSIT’05. Hilton Hotel, Algiers, Algeria; 2005.
[550] Sehad A, Mezai L, Laskri MT, Cheriet M. "Détection de l’'inclinaison des documents arabes imprimés.". In: Huitième Colloque International Francophone sur l’Ecrit et le Document, CIFED. La Rochelle, France; 2004.
[1025] Shameli-Sendi A, Jarraya Y, Fekih-Ahmed M, Pourzandi M, Talhi C, Cheriet M. "Optimal Placement of Sequentially Ordered Virtual Security Appliances in the Cloud.". In: The 14th IFIP/IEEE Symposium on Integrated Network Management (IM 2015). IEEE; 2015. Download: MOC3.pdf (1.58 MB)
[968] Shameli-Sendi A, Cheriet M. "Cloud Computing: A Risk Assessment Model.". In: IEEE International Conference on Cloud Engineering (IC2E 2014). Boston, MA, USA; 2014. Download: RAaaS.pdf (387.5 KB)
[1066] Shameli-Sendi A, Louafi H, He W, Cheriet M. "Dynamic Optimal Countermeasure Selection for Intrusion Response System." IEEE Transactions on Dependable and Secure Computing. 2016. Download: CICS.pdf (4.73 MB)
[1035] Shameli-Sendi A, Louafi H, He W, Cheriet M. "A defense-centric model for multi-step attack damage cost evaluation.". In: The 3rd International Conference on Future Internet of Things and Cloud (FiCloud-2015). Italy: IEEE; 2015. Download: DefenseCentric.pdf (1.96 MB)
[1115] Shameli-Sendi A, Louafi H, Cheriet M. "Payless Monitoring Service for Tenants in Cloud with Traffic and Energy-aware Function Deployment.". In: 9th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2017). Hong-Kong, China: IEEE; 2017. Download: HLouafi-CloudCom2017.pdf (358.15 KB)
Civimetrix Telecom logo
risq logo
University of Torontologo
MDEIE logo