406 Nabila Labraoui, Mourad Gueroui, and Larbi Sekhri A Real-Time PE-Malware Detection System Based on CHI-Square Test and PE-File Features, 416 Mohamed Belaoued and Smaine Mazouzi Security and Network Technologies: Wireless Sensor Networks Balanced and Safe Weighted Clustering Algorithm for Mobile Wireless Sensor Networks, p.429 ,
442 Abdelkader Khelil and Rachid Beghdad Optimizing Deployment Cost in Camera-Based Wireless Sensor Networks, p.454 ,
Energy and Synchronisation High Velocity Aware Clocks Synchronization Approach in Vehicular Ad Hoc Networks, 479 Khedidja Medani, Makhlouf Aliouat, and Zibouda Aliouat Contents XXV ,
Abdelouahab Belazoui, and Randa Megulati Genetic Centralized Dynamic Clustering in Wireless Sensor Networks, p.503 ,
Potpourri Region-Edge Cooperation for Image Segmentation Using Game Theory, p.515 ,
Parameters Updating Algorithm for the Detection of Moving Objects, p.527 ,
Akdag Towards Real-Time Co-authoring of Linked-Data on the Web, p.538 ,
and Abdessamad Imine Software Engineering: Modeling and Meta Modeling A High Level Net for Modeling and Analysis Reconfigurable Discrete Event Control Systems, p.551 ,
JiaFeng Zhang, and Malika Ioualalen Hybrid Approach for Metamodel and Model Co-evolution, p.563 ,
Bounour Extracting and Modeling Design Defects Using Gradual Rules and, 574 Mohamed Maddeh and Sarra Ayouni ,
Checking and Verification On the Optimum Checkpointing Interval Selection for Variable Size Checkpoint Dumps, 599 Samy Sadi and Belabbas Yagoubi Monitoring Checklist for Ceph Object Storage Infrastructure, p.611 ,
Gupta XXVI Contents Towards a Formalization of Real-Time Patterns-Based Designs, p.624 ,