Homepage of Samia Saad-Bouzefrane

Homepage of Samia Saad-Bouzefrane

Homepage of Samia Saad-Bouzefrane

Homepage of Samia Saad-Bouzefrane

Menu

  • Home
  • Research
  • Teaching
  • Publications
  • Education
  • Events
  • Kabyle activities

Chapitre 5 : Gestion des Fichiers

LES SYSTEMES D’EXPLOITATION: COURS ET EXERCICES CORRIGES UNIX, LINUX et WINDOWS XP avec C et JAVA

  1. ==> Programmes en C
    • Programme tube.c
    • Programme verrou1.c et Programme verrou2.c
    • Programme verrou.c et Programme lirefichier.c
    • Programme deadlock.c
    • Programme detect.c

  2. ==> Programmes en Java
    • Programme LireFichierTexte.java
    • Programme MoyenneNbFichier.java
    • Programme MoyenneStreamTokenizer.java
    • Programme EcrireDansFichier.java
    • Programme EcritureBufferisee.java
    • Programme EcritureBufferiseePrint.java
    • Programme MoyenneStream.java
    • Programme EcrireFichierOctets.java
    • Programme MoyenneNbBuffer.java
    • Programme EcrireOctetsPrintWriter.java
    • Programme ClasseFile.java
    • Programme AccesDirect.java

Recent Posts

  • Médaille Femme Cyber Chercheuse Europe 2024
  • WiMob’2024 Conference organized in Cnam
  • Second best paper (PEMWN’2024 conference)
  • SI of SN Computer Science (deadline oct. 30, 2024)
  • EMSICC/FiCloud Conference (August 2024)
  • 14th WISTP International Conference (Feb. 2024)
  • MSPN’2023 International Conference (Oct. 2023)
  • EMSICC’2022 Workshop co-located with IEEE Ficloud conference (23-25 August 2022)
  • EMSICC’2021 workshop co-located with IEEE FiCloud conference – Rome (Italy) 23-25 August 2021 (online conference)
  • “2020 Best paper Award” in the International Journal of Cyber security and Mobilty

Latest publications

  • Supervised Machine Learning for Matchmaking in Digital Business Ecosystems and Platforms
  • Improving NDN Resilience: A Novel Mitigation Mechanism Against Cache Pollution Attack
  • Enhancing privacy in VANETs through homomorphic encryption in machine learning applications
  • Security Challenges and Countermeasures in Blockchain’s Peer-to-Peer Architecture
  • Privacy Preserving Federated Learning: A Novel Approach for Combining Differential Privacy and Homomorphic Encryption
  • A Bitcoin-Based Digital Identity Model for the Internet of Things
  • Enhancing Security in Blockchain Enabled IoT Networks Empowered with zk-SNARKs and Physically Unclonable Functions
  • Information Security Theory and Practice
  • Liability and Trust Analysis Framework for Multi-Actor Dynamic Microservices
  • iTEVAC: an enhanced trusted evacuation system leveraging fog computing and IoT
Copyright © 2025 Homepage of Samia Saad-Bouzefrane. Powered by WordPress. Theme: Spacious by ThemeGrill.