DSpace Repository
Search
Login
DSpace Home
→
E- Faculté des Sciences Exactes
→
Search
JavaScript is disabled for your browser. Some features of this site may not work without it.
Search
Filters
Use filters to refine the search results.
Current Filters:
Title
Author
Subject
Date issued
Contains
Equals
ID
Not Contains
Not Equals
Not ID
Title
Author
Subject
Date issued
Contains
Equals
ID
Not Contains
Not Equals
Not ID
Title
Author
Subject
Date issued
Contains
Equals
ID
Not Contains
Not Equals
Not ID
New Filters:
Title
Author
Subject
Date issued
Contains
Equals
ID
Not Contains
Not Equals
Not ID
Showing 3 out of a total of 3 results for community: E- Faculté des Sciences Exactes.
(0.047 seconds)
Now showing items 1-3 of 3
1
Sort Options:
Relevance
Title Asc
Title Desc
Issue Date Asc
Issue Date Desc
Results Per Page:
5
10
20
40
60
80
100
Contrôle d’un groupe d’avions sans pilote UAVs
Ben Boudaoud, Lynda
;
Albane, Saadia
;
Hamouma, Moumen ; promoteur
(
Université abderrahmane mira béjaia
,
2013
)
Le problème du k-Accord Byzantin dans les systèmes distribués asynchrones
Belilita, Hocine
;
Belakbir, Rekia
;
Hamouma, Moumen ; promoteur
(
Université abderrahmane mira béjaia
,
2013
)
Mise en œuvre d’une solution de sécurité basée sur les VPN et SNORT Cas d’étude Entreprise NAFTAL GPL
Ouatmani, Amina
;
Zaouche, Rahima
;
Hamouma, Moumen ; promoteur
(
Université abderrahmane mira béjaia
,
2013
)
Now showing items 1-3 of 3
1
Sort Options:
Relevance
Title Asc
Title Desc
Issue Date Asc
Issue Date Desc
Results Per Page:
5
10
20
40
60
80
100
Browse
All of DSpace
Communities & Collections
By Issue Date
Authors
Titles
Subjects
This Community
By Issue Date
Authors
Titles
Subjects
My Account
Login
Register
Discover
Author
Hamouma, Moumen ; promoteur (3)
Albane, Saadia (1)
Belakbir, Rekia (1)
Belilita, Hocine (1)
Ben Boudaoud, Lynda (1)
Ouatmani, Amina (1)
Zaouche, Rahima (1)
Subject
K-accord byzantin : Tolérance aux intrusions : Systèmes distribués asynchrones : Tolérance aux fautes : Protocole (1)
Les UAVs byzantin : Satellite byzantin : Les UAVs : Le sytème gps : Le spoofing : Le système uas : Drone (1)
Réseau Privé Virtuel : Couche De Sockets Sécurisée : SNORT : LDAP (1)
... View More
Date Issued
2013 (3)