Publications (193)
ARTICLE
Finding the best compromise between design quality and testing eort during refactoring
Rodrigo Morales; Aminata Sabane; Pooya Musavi; Foutse Khomh; Francisco Chicano; Giuliano Antoniol
Anti-patterns are poor design choices that hinder code evolution, and understandability. Practitioners perform refactoring, that are semantic-preserving-code transformations, to correct anti-patterns and to improve design quality. However, manual refactoring is a consuming task and a heavy burden for developers who have to struggle to complete(...)
Mots clés non renseignés
ARTICLE
Découverte de motifs fréquents guidée par une ontologie
Y. Traoré, C. T. Diop, S. Malo, M. Lo, S. Ouaro
L’extraction des motifs fréquents en fouille de données génère une quantité énorme de motifs fréquents et requiert par conséquent la mise en place d'un post-traitement efficace afin de cibler les motifs fréquents les plus utiles. Cet article propose une approche de découverte de motifs fréquents utiles qui intègre les connaissances décrites pa(...)
Ontologie, Motifs fréquents, fouille de données
ARTICLE
Empirical assessment of machine learning-based malware detectors for Android
T. BISSYANDE
To address the issue of malware detection through large sets of applications, researchers have recently started to investigate the capabilities of machine-learning techniques for proposing effective approaches. So far, several promising results were recorded in the literature, many approaches being assessed with what we call in the lab validat(...)
Mots clés non renseignés
ARTICLE
Évaluation de l’impact de fautes matérielles sur le logiciel par Model Checking.
Didier Bassole, Jean-Louis Lanet, and Axel Legay
A compléter
Mots clés non renseignés
ARTICLE
Implementing the Information Access Assistant Service (IAAS) for an evaluation
Kisito Kaboré, Oumarou Sie, Florence Sèdes, André Péninou
The increasing of multimedia information great diffusion on the web
generates cognitive users’ overload and plenty of solutions are proposed to
solve it. Despite the multitude of solutions, web users are still looking for more
and simpler assistant in web using. In this paper, we present an information
adaptation system using characteristi(...)
adaptative access; relevance feedbacks; user group customisation; group-based recommendation; web services; information access
ARTICLE
Deployment of a WiMAX Solution in a Rural Remote Region of Burkina Faso
Yélémou Tiguiane, Guinko Ferdinand, Sabané Aminata
WiMAX maybe the solution to open up remote landlocked areas in Africa and particularly in Burkina Faso. In this study, we examine an implementation plan for this technology to open up the Mouhoun administrative region of Burkina Faso, a high agricultural potential area. The opening up of such an area may contribute to the development of the ec(...)
WiMAX · Wireless networks · Community network
ARTICLE
Thoughts on 3D Digital Subplane Recognition and Minimum-Maximum of a Bilinear Congruence Sequence
E Andres, D Ouattara, G Largeteau-Skapin, R Zrour
In this paper we take first steps in addressing the 3D Digital Subplane Recognition Problem. Let us consider a digital plane (w.l.o.g. ) and a finite subplane S of P defined as the points (x, y, z) of P such that . The Digital Subplane Recognition Problem consists in determining the characteristics of the subplane S in less than linear (in the(...)
discrete subplane, image recognition, discrete geometry
COMMUNICATION
Energy-free Security in Wireless Sensor Networks
Adel Elgaber (1) , Julien Bernard (1) , Yacouba Ouattara (1)
Wireless sensor networks are often deployed in open and uncontrolled environments that make them more vulnerable to security attacks. Cryptographic algorithms can be used to protect the data collected by the sensors against an intruder. The cost in terms of energy to provide enough security can be quite large as these algorithms may be very co(...)
Mots clés non renseignés
ARTICLE
How to take pedagogical requirements into account to design e-learning platforms by using patterns?
Tonguim Ferdinand Guinko, Laurence Capus Hatem Ben Sta
Pattern concept is often used to design educational systems. On the one hand, educational team uses patterns to describe pedagogical scenarios and on the other hand software engineers apply them in e-learning software development process. However, there is no any synergic framework between these two uses of patterns, that could allow pedagogic(...)
Engineering Instructional Design Software
ARTICLE
Energy-free Security in Wireless Sensor Networks
Adel Elgaber, Julien Bernard, Yacouba Ouattara
Wireless sensor networks are often deployed in open and uncontrolled environments that make them more vulnerable
to security attacks. Cryptographic algorithms can be used to protect the data collected by the sensors against an intruder. The cost in terms of energy to provide enough security can be quite large as these algorithms may be very c(...)
Wireless sensor networks; security; compression; energy
ARTICLE
Approche de découverte de nouvelles catégories dans un wiki sémantique basée sur les motifs fréquents
Y. Traoré, S. Malo, C. T. Diop, M. Lo, S. Ouaro
Dans cet article, nous proposons une approche de découverte de nouvelles catégories potentiellement utiles dans un wiki sémantique. Les pages du wiki sont sémantiquement annotées et des tags (mots clés) peuvent être associés librement à celles-ci. Les pages sont créées par les utilisateurs autorisés à partager des informations sur le wiki. Les(...)
Wiki sémantique, Ontologie, Motifs fréquents
ARTICLE
Évaluation de l’impact de fautes matérielles sur le logiciel par Model Checking
D. BASSOLE, Jean-Louis Lanet, and Axel Legay
La mutation de programme dû à un défaut d'environnement est susceptible de générer des problèmes de sécurité comme la non exécution de procédure de vérification, le saut de bloc d'instruction etc.. Pour les éradiquer il est nécessaire de comprendre les effets de ces perturbations sur le logiciel. Souvent les travaux explorent les effets au niv(...)
Mots clés non renseignés
ARTICLE
Toward a Pattern-based e-learning software design approach
Tonguim Ferdinand Guinko, Laurence Capus, Hatem Ben Sta
Enthusiasm for educational software sometimes hides some real problems, which have some negative repercussions on the efficiency and the quality of learning undertaken by learners. Among those problems are the poor analysis, the poor design and the ignorance of the pedagogical theoretical aspects in the design process. This work proposes an e-(...)
Engineering Instructional Design Software
ARTICLE
Three Thresholds for the Efficiency in Energy Management in WSN
Yacouba Ouattara, Christophe Lang, and Adel Elgaber
Nowadays, the domain of sensor networks constitutes a very active research field. People are using a lot of
low cost networks. As a result, they are facing an important energy management problem. Consequently, Researchers have tried to ensure long life to networks [1]-[8]. LEACH, PEGASUS, TEEN and APTEEN are pioneers in the reduction of WSN e(...)
Wirless, WSN
ARTICLE
Three Thresholds for the Efficiency in Energy Management in WSN
Yacouba Ouattara, Christophe Lang, and Adel Elgaber
Nowadays, the domain of sensor networks constitutes a very active research field. People are using a lot of
low cost networks. As a result, they are facing an important energy management problem. Consequently, Researchers have tried to ensure long life to networks [1]-[8]. LEACH, PEGASUS, TEEN and APTEEN are pioneers in the reduction of WSN e(...)
Wirless, WSN, Routing