f A Clustering Approach for Collaborative Filtering Recommendation Using Social Network Analysis By www.jucs.org Published On :: 2011-07-08T12:31:46+02:00 Collaborative Filtering(CF) is a well-known technique in recommender systems. CF exploits relationships between users and recommends items to the active user according to the ratings of his/her neighbors. CF suffers from the data sparsity problem, where users only rate a small set of items. That makes the computation of similarity between users imprecise and consequently reduces the accuracy of CF algorithms. In this article, we propose a clustering approach based on the social information of users to derive the recommendations. We study the application of this approach in two application scenarios: academic venue recommendation based on collaboration information and trust-based recommendation. Using the data from DBLP digital library and Epinion, the evaluation shows that our clustering technique based CF performs better than traditional CF algorithms. Full Article
f Bio-Inspired Mechanisms for Coordinating Multiple Instances of a Service Feature in Dynamic Software Product Lines By www.jucs.org Published On :: 2011-05-06T16:03:21+02:00 One of the challenges in Dynamic Software Product Line (DSPL) is how to support the coordination of multiple instances of a service feature. In particular, there is a need for a decentralized decision-making capability that will be able to seamlessly integrate new instances of a service feature without an omniscient central controller. Because of the need for decentralization, we are investigating principles from self-organization in biological organisms. As an initial proof of concept, we have applied three bio-inspired techniques to a simple smart home scenario: quorum sensing based service activation, a firefly algorithm for synchronization, and a gossiping (epidemic) protocol for information dissemination. In this paper, we first explain why we selected those techniques using a set of motivating scenarios of a smart home and then describe our experiences in adopting them. Full Article
f Automatically Checking Feature Model Refactorings By www.jucs.org Published On :: 2011-05-06T16:03:26+02:00 A feature model (FM) defines the valid combinations of features, whose combinations correspond to a program in a Software Product Line (SPL). FMs may evolve, for instance, during refactoring activities. Developers may use a catalog of refactorings as support. However, the catalog is incomplete in principle. Additionally, it is non-trivial to propose correct refactorings. To our knowledge, no previous analysis technique for FMs is used for checking properties of general FM refactorings (a transformation that can be applied to a number of FMs) containing a representative number of features. We propose an efficient encoding of FMs in the Alloy formal specification language. Based on this encoding, we show how the Alloy Analyzer tool, which performs analysis on Alloy models, can be used to automatically check whether encoded general and specific FM refactorings are correct. Our approach can analyze general transformations automatically to a significant scale in a few seconds. In order to evaluate the analysis performance of our encoding, we evaluated in automatically generated FMs ranging from 500 to 2,000 features. Furthermore, we analyze the soundness of general transformations. Full Article
f QoS-based Approach for Dynamic Web Service Composition By www.jucs.org Published On :: 2011-05-06T16:03:31+02:00 Web Services have become a standard for integration of systems in distributed environments. By using a set of open interoperability standards, they allow computer-computer interaction, regardless the programming languages and operating systems used. The Semantic Web Services, by its turn, make use of ontologies to describe their functionality in a more structural manner, allowing computers to reason about the information required and provided by them. Such a description also allows dynamic composition of several Web Services, when only one is not able to provide the desired functionality. There are scenarios, however, in which only the functional correctness is not enough to fulfill the user requirements, and a minimum level of quality should be guaranteed by their providers. In this context, this work presents an approach for dynamic Web Service composition that takes into account the composition overall quality. The proposed approach relies on a heuristics to efficiently perform the composition. In order to show the feasibility of the proposed approach, a Web Service composition application prototype was developed and experimented with public test sets, along with another approach that does not consider quality in the composition process. The results have shown that the proposed approach in general finds compositions with more quality, within a reasonable processing time. Full Article
f An Aspect-Oriented Framework for Weaving Domain-Specific Concerns into Component-Based Systems By www.jucs.org Published On :: 2011-05-06T16:03:36+02:00 Software components are used in various application domains, and many component models and frameworks have been proposed to fulfill domain-specific requirements. The general trend followed by these approaches is to provide ad-hoc models and tools for capturing these requirements and for implementing their support within dedicated runtime platforms, limited to features of the targeted domain. The challenge is then to propose more flexible solutions, where components reuse is domain agnostic. In this article, we present a framework supporting compositional construction and development of applications that must meet various extra-functional/domain-specific requirements. The key points of our contribution are: i) We target development of component-oriented applications where extra-functional requirements are expressed as annotations on the units of composition in the application architecture. ii) These annotations are implemented as open and extensible component-based containers, achieving full separation of functional and extra-functional concerns. iii) Finally, the full machinery is implemented using the Aspect-Oriented Programming paradigm. We validate our approach with two case studies: the first is related to real-time and embedded applications, while the Full Article
f Context-Aware Composition and Adaptation based on Model Transformation By www.jucs.org Published On :: 2011-05-06T16:03:43+02:00 Using pre-existing software components (COTS) to develop software systems requires the composition and adaptation of the component interfaces to solve mismatch problems. These mismatches may appear at different interoperability levels (signature, behavioural, quality of service and semantic). In this article, we define an approach which supports composition and adaptation of software components based on model transformation by taking into account the four levels. Signature and behavioural levels are addressed by means of transition systems. Context-awareness and semanticbased techniques are used to tackle quality of service and semantic, respectively, but also both consider the signature level. We have implemented and validated our proposal for the design and application of realistic and complex systems. Here, we illustrate the need to support the variability of the adaptation process in a context-aware pervasive system through a real-world case study, where software components are implemented using Windows Workflow Foundation (WF). We apply our model transformation process to extract transition systems (CA-STS specifications) from WF components. These CA-STSs are used to tackle the composition and adaptation. Then, we generate a CASTS adaptor specification, which is transformed into its corresponding WF adaptor component with the purpose of interacting with all the WF components of the system, thereby avoiding mismatch problems. Full Article
f An Approach for Feature Modeling of Context-Aware Software Product Line By www.jucs.org Published On :: 2011-05-06T16:03:50+02:00 Feature modeling is an approach to represent commonalities and variabilities among products of a product line. Context-aware applications use context information to provide relevant services and information for their users. One of the challenges to build a context-aware product line is to develop mechanisms to incorporate context information and adaptation knowledge in a feature model. This paper presents UbiFEX, an approach to support feature analysis for context-aware software product lines, which incorporates a modeling notation and a mechanism to verify the consistency of product configuration regarding context variations. Moreover, an experimental study was performed as a preliminary evaluation, and a prototype was developed to enable the application of the proposed approach. Full Article
f Software Components, Architectures and Reuse By www.jucs.org Published On :: 2011-05-06T16:03:55+02:00 Full Article
f A Framework to Evaluate Interface Suitability for a Given Scenario of Textual Information Retrieval By www.jucs.org Published On :: 2011-07-04T16:04:41+02:00 Visualization of search results is an essential step in the textual Information Retrieval (IR) process. Indeed, Information Retrieval Interfaces (IRIs) are used as a link between users and IR systems, a simple example being the ranked list proposed by common search engines. Due to the importance that takes visualization of search results, many interfaces have been proposed in the last decade (which can be textual, 2D or 3D IRIs). Two kinds of evaluation methods have been developed: (1) various evaluation methods of these interfaces were proposed aiming at validating ergonomic and cognitive aspects; (2) various evaluation methods were applied on information retrieval systems (IRS) aiming at measuring their effectiveness. However, as far as we know, these two kinds of evaluation methods are disjoint. Indeed, considering a given IRI associated to a given IRS, what happens if we associate this IRI to another IRS not having the same effectiveness. In this context, we propose an IRI evaluation framework aimed at evaluating the suitability of any IRI to different IR scenarios. First of all, we define the notion of IR scenario as a combination of features related to users, IR tasks and IR systems. We have implemented the framework through a specific evaluation platform that enables performing IRI evaluations and that helps end-users (e.g. IRS developers or IRI designers) in choosing the most suitable IRI for a specific IR scenario. Full Article
f Descriptional Complexity of Ambiguity in Symmetric Difference NFAs By www.jucs.org Published On :: 2011-07-04T16:04:44+02:00 We investigate ambiguity for symmetric difference nondeterministic finite automata. We show the existence of unambiguous, finitely ambiguous, polynomially ambiguous and exponentially ambiguous symmetric difference nondeterministic finite automata. We show that, for each of these classes, there is a family of n-state nondeterministic finite automata such that the smallest equivalent deterministic finite automata have O(2n) states. Full Article
f Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS By www.jucs.org Published On :: 2011-07-04T16:04:45+02:00 Recently, IEEE 802.16 Worldwide Interoperability for Microwave Access (WiMAX for short) has provided us with low-cost, high efficiency and high bandwidth network services. However, as with the WiFi, the radio wave transmission also makes the WiMAX face the wireless transmission security problem. To solve this problem, the IEEE802.16Std during its development stage defines the Privacy Key Management (PKM for short) authentication process which offers a one-way authentication. However, using a one-way authentication, an SS may connect to a fake BS. Mutual authentication, like that developed for PKMv2, can avoid this problem. Therefore, in this paper, we propose an authentication key management approach, called Diffie-Hellman-PKDS-based authentication method (DiHam for short), which employs a secret door asymmetric one-way function, Public Key Distribution System (PKDS for short), to improve current security level of facility authentication between WiMAX's BS and SS. We further integrate the PKMv1 and the DiHam into a system, called PKM-DiHam (P-DiHam for short), in which the PKMv1 acts as the authentication process, and the DiHam is responsible for key management and delivery. By transmitting securely protected and well-defined parameters for SS and BS, the two stations can mutually authenticate each other. Messages including those conveying user data and authentication parameters can be then more securely delivered. Full Article
f Least Slack Time Rate first: an Efficient Scheduling Algorithm for Pervasive Computing Environment By www.jucs.org Published On :: 2011-07-04T16:04:46+02:00 Real-time systems like pervasive computing have to complete executing a task within the predetermined time while ensuring that the execution results are logically correct. Such systems require intelligent scheduling methods that can adequately promptly distribute the given tasks to a processor(s). In this paper, we propose LSTR (Least Slack Time Rate first), a new and simple scheduling algorithm, for a multi-processor environment, and demonstrate its efficient performance through various tests. Full Article
f Hierarchical Graph-Grammar Model for Secure and Efficient Handwritten Signatures Classification By www.jucs.org Published On :: 2011-07-04T16:04:47+02:00 One important subject associated with personal authentication capabilities is the analysis of handwritten signatures. Among the many known techniques, algorithms based on linguistic formalisms are also possible. However, such techniques require a number of algorithms for intelligent image analysis to be applied, allowing the development of new solutions in the field of personal authentication and building modern security systems based on the advanced recognition of such patterns. The article presents the approach based on the usage of syntactic methods for the static analysis of handwritten signatures. The graph linguistic formalisms applied, such as the IE graph and ETPL(k) grammar, are characterised by considerable descriptive strength and a polynomial membership problem of the syntactic analysis. For the purposes of representing the analysed handwritten signatures, new hierarchical (two-layer) HIE graph structures based on IE graphs have been defined. The two-layer graph description makes it possible to take into consideration both local and global features of the signature. The usage of attributed graphs enables the storage of additional semantic information describing the properties of individual signature strokes. The verification and recognition of a signature consists in analysing the affiliation of its graph description to the language describing the specimen database. Initial assessments display a precision of the method at a average level of under 75%. Full Article
f Cost-Sensitive Spam Detection Using Parameters Optimization and Feature Selection By www.jucs.org Published On :: 2011-07-04T16:04:49+02:00 E-mail spam is no more garbage but risk since it recently includes virus attachments and spyware agents which make the recipients' system ruined, therefore, there is an emerging need for spam detection. Many spam detection techniques based on machine learning techniques have been proposed. As the amount of spam has been increased tremendously using bulk mailing tools, spam detection techniques should counteract with it. To cope with this, parameters optimization and feature selection have been used to reduce processing overheads while guaranteeing high detection rates. However, previous approaches have not taken into account feature variable importance and optimal number of features. Moreover, to the best of our knowledge, there is no approach which uses both parameters optimization and feature selection together for spam detection. In this paper, we propose a spam detection model enabling both parameters optimization and optimal feature selection; we optimize two parameters of detection models using Random Forests (RF) so as to maximize the detection rates. We provide the variable importance of each feature so that it is easy to eliminate the irrelevant features. Furthermore, we decide an optimal number of selected features using two methods; (i) only one parameters optimization during overall feature selection and (ii) parameters optimization in every feature elimination phase. Finally, we evaluate our spam detection model with cost-sensitive measures to avoid misclassification of legitimate messages, since the cost of classifying a legitimate message as a spam far outweighs the cost of classifying a spam as a legitimate message. We perform experiments on Spambase dataset and show the feasibility of our approaches. Full Article
f Knowledge Extraction from RDF Data with Activation Patterns By www.jucs.org Published On :: 2011-07-20T10:20:30+02:00 RDF data can be analyzed with various query languages such as SPARQL. However, due to their nature these query languages do not support fuzzy queries that would allow us to extract a broad range of additional information. In this article we present a new method that transforms the information presented by subject-relationobject relations within RDF data into Activation Patterns. These patterns represent a common model that is the basis for a number of sophisticated analysis methods such as semantic relation analysis, semantic search queries, unsupervised clustering, supervised learning or anomaly detection. In this article, we explain the Activation Patterns concept and apply it to an RDF representation of the well known CIA World Factbook. Full Article
f Algorithms for the Evaluation of Ontologies for Extended Error Taxonomy and their Application on Large Ontologies By www.jucs.org Published On :: 2011-07-20T10:20:31+02:00 Ontology evaluation is an integral and important part of the ontology development process. Errors in ontologies could be catastrophic for the information system based on those ontologies. As per our experiments, the existing ontology evaluation systems were unable to detect many errors (like, circulatory error in class and property hierarchy, common class and property in disjoint decomposition, redundancy of sub class and sub property, redundancy of disjoint relation and disjoint knowledge omission) as defined in the error taxonomy. We have formulated efficient algorithms for the evaluation of these and other errors as per the extended error taxonomy. These algorithms are implemented (named as OntEval) and the implementations are used to evaluate well-known ontologies including Gene Ontology (GO), WordNet Ontology and OntoSem. The ontologies are indexed using a variant of already proposed scheme Ontrel. A number of errors and warnings in these ontologies have been discovered using the OntEval. We have also reported the performance of our implementation, OntEval. Full Article
f Towards Classification of Web Ontologies for the Emerging Semantic Web By www.jucs.org Published On :: 2011-07-20T10:20:32+02:00 The massive growth in ontology development has opened new research challenges such as ontology management, search and retrieval for the entire semantic web community. These results in many recent developments, like OntoKhoj, Swoogle, OntoSearch2, that facilitate tasks user have to perform. These semantic web portals mainly treat ontologies as plain texts and use the traditional text classification algorithms for classifying ontologies in directories and assigning predefined labels rather than using the semantic knowledge hidden within the ontologies. These approaches suffer from many types of classification problems and lack of accuracy, especially in the case of overlapping ontologies that share common vocabularies. In this paper, we define an ontology classification problem and categorize it into many sub-problems. We present a new ontological methodology for the classification of web ontologies, which has been guided by the requirements of the emerging Semantic Web applications and by the lessons learnt from previous systems. The proposed framework, OntClassifire, is tested on 34 ontologies with a certain degree of overlapping domain, and effectiveness of the ontological mechanism is verified. It benefits the construction, maintenance or expansion of ontology directories on the semantic web that help to focus on the crawling and improving the quality of search for the software agents and people. We conclude that the use of a context specific knowledge hidden in the structure of ontologies gives more accurate results for the ontology classification. Full Article
f A Ranking Tool Exploiting Semantic Descriptions for the Comparison of EQF-based Qualifications By www.jucs.org Published On :: 2011-07-20T10:20:35+02:00 Nowadays, one of the main issues discussed at the Community level is represented by the mobility of students and workers across Europe. During the last years, in order to deal with the above picture, several initiatives have been carried out: one of them is the definition of the European Qualification Framework (EQF), a common architecture for the description of qualifications. At the same time, several research activities were established with the aim of finding how semantic technologies could be exploited for qualifications comparison in the field of human resources acquisition. In this paper, the EQF specifications are taken into account and they are applied in a practical scenario to develop a ranking algorithm for the comparison of qualifications expressed in terms of knowledge, skill and competence concepts, potentially aimed at supporting European employers during the recruiting phase. Full Article
f Ontology-based User Interface Development: User Experience Elements Pattern By www.jucs.org Published On :: 2011-07-20T10:20:36+02:00 The user experience of any software or website consists of elements from the conceptual to the concrete level. These elements of user experience assist in the design and development of user interfaces. On the other hand, ontologies provide a framework for computable representation of user interface elements and underlying data. This paper discusses strategies of introducing ontologies at different user interface layers adapted from user experience elements. These layers range from abstract levels (e.g. User needs/Application Objectives) to concrete levels (e.g. Application User Interface) in terms of data representation. The proposed ontological framework enables device independent, semi-automated GUI construction which we will demonstrate at a personal information management example. Full Article
f Ontology-based Competency Management: the Case Study of the Mihajlo Pupin Institute By www.jucs.org Published On :: 2011-07-20T10:20:38+02:00 Semantic-based technologies have been steadily increasing their relevance in recent years in both the research world and business world. Considering this, the present article discusses the process of design and implementation of a competency management system in information and communication technologies domain utilizing the latest Semantic Web tools and technologies including D2RQ server, TopBraid Composer, OWL 2, SPARQL, SPARQL Rules and common human resources related public vocabularies. In particular, the paper discusses the process of building individual and enterprise competence models in a form of ontology database, as well as different ways of meaningful search and retrieval of expertise data on the Semantic Web. The ontological knowledge base aims at storing the extracted and integrated competences from structured, as well as unstructured sources. By using the illustrative case study of deployment of such a system in the Human Resources sector at the Mihajlo Pupin Institute, this paper shows an example of new approaches to data integration and information management. The proposed approach extends the functionalities of existing enterprise information systems and offers possibilities for development of future Internet services. This allows organizations to express their core competences and talents in a standardized, machine processable and understandable format, and hence, facilitates their integration in the European Research Area and beyond. Full Article
f A Comparison of Different Retrieval Strategies Working on Medical Free Texts By www.jucs.org Published On :: 2011-07-20T10:20:39+02:00 Patient information in health care systems mostly consists of textual data, and free text in particular makes up a significant amount of it. Information retrieval systems that concentrate on these text types have to deal with the different challenges these medical free texts pose to achieve an acceptable performance. This paper describes the evaluation of four different types of information retrieval strategies: keyword search, search performed by a medical domain expert, a semantic based information retrieval tool, and a purely statistical information retrieval method. The different methods are evaluated and compared with respect to its appliance in medical health care systems. Full Article
f An Ontology based Agent Generation for Information Retrieval on Cloud Environment By www.jucs.org Published On :: 2011-07-20T10:35:16+02:00 Retrieving information or discovering knowledge from a well organized data center in general is requested to be familiar with its schema, structure, and architecture, which against the inherent concept and characteristics of cloud environment. An effective approach to retrieve desired information or to extract useful knowledge is an important issue in the emerging information/knowledge cloud. In this paper, we propose an ontology-based agent generation framework for information retrieval in a flexible, transparent, and easy way on cloud environment. While user submitting a flat-text based request for retrieving information on a cloud environment, the request will be automatically deduced by a Reasoning Agent (RA) based on predefined ontology and reasoning rule, and then be translated to a Mobile Information Retrieving Agent Description File (MIRADF) that is formatted in a proposed Mobile Agent Description Language (MADF). A generating agent, named MIRA-GA, is also implemented to generate a MIRA according to the MIRADF. We also design and implement a prototype to integrate these agents and show an interesting example to demonstrate the feasibility of the architecture. Full Article
f Abstentionniste, dois tu fermer ta gueule ? By marc-vasseur.over-blog.com Published On :: Thu, 22 Jun 2017 18:15:00 +0200 Non, Fred, t’es pas tout seul… toi et tes copains abstentionnistes, vous êtes 27.125.535… soit 57,36% des français en âge de voter pour les législatives. Une paille quoi. Ce chiffre affolant permet à certains de dire que, les nouveaux députés ne sont... Full Article
f Black Friday, bloody Friday By marc-vasseur.over-blog.com Published On :: Fri, 23 Nov 2018 17:35:40 +0100 On est enfin à ce jour qui magnifie la contradiction de nos sociétés. A lors qu’on nous met en garde tous les jours contre l’obsolescence programmée de notre unique planète, notre société de sur-consommation nous intime l’ordre de consommer jusqu’à plus... Full Article
f Gilets Jaunes… des fachos-gauchistes et pis c’est tout ? By marc-vasseur.over-blog.com Published On :: Wed, 05 Dec 2018 18:08:00 +0100 Les images sont « belles », elles tournent en boucle sur les réseaux sociaux, elles tendent à vouloir accréditer la thèse d’un mouvement composé d’ultra des deux extrêmes. La chose devrait donc être entendue, pour les « bons » militants ; rassurons-nous... Full Article
f Le Référendum d'Initiative Citoyenne ou le sexe des anges... By marc-vasseur.over-blog.com Published On :: Tue, 18 Dec 2018 15:31:55 +0100 Mine de rien les Gilets jaunes, quoiqu'on en pense, on réussit à faire bouger les lignes sur des éléments qu'on nous disait impossible jusqu'à présent. Au delà de certaines applications qui peuvent être laissées au débat, en matière de pouvoir d'achat,... Full Article
f Intelligence Artificielle : vers le grand déclassement des Classes Moyennes ? By marc-vasseur.over-blog.com Published On :: Thu, 20 Dec 2018 18:00:00 +0100 Depuis quelques années, la théorie du grand remplacement, popularisée par Michel Houellbecq dans Soumissions ou par un Eric Zemmour, a fait son chemin dans les arcanes les moins visibles du Net. Pourtant, le danger n’est pas là, loin s’en faut, il est... Full Article
f Houellebecq, Génie ou Faussaire ? By marc-vasseur.over-blog.com Published On :: Fri, 04 Jan 2019 18:15:00 +0100 L'évènement est là, l'écrivain maudit et adulé - qu'on mérite - sort son dernier ouvrage, son nouveau chef d'oeuvre. Houellebecq a ça de bien, c'est qu'il permettra une nouvelle hystérisation du débat littéraire. Génie pour les uns, faussaire pour les... Full Article
f Les nouvelles formes d'escroquerie sur le Net. By marc-vasseur.over-blog.com Published On :: Thu, 14 Mar 2019 18:15:00 +0100 Présent sur le Net depuis deux bonnes décennies, j’ai pu constater l’évolution des arnaques pour le simple quidam webonautes que nous sommes. Au départ, on a connu le fameux pishing via des mails grossièrement rédigés avec des entêtes de tel ou tel fournisseur... Full Article
f Bravo François Hollande !!! encore un effort. By marc-vasseur.over-blog.com Published On :: Mon, 01 Apr 2019 12:18:50 +0200 Je n’avais pas vu venir cette analyse de haut vol de l’ancien Président de la République et l’ancien Premier Secrétaire du Pati Socialiste, je cite « La reconquête des classes populaires est donc, pour la gauche, un impératif démocratique ». Je salue... Full Article
f L’info du jour | 9 novembre - Soir By fr.euronews.com Published On :: Sat, 09 Nov 2024 18:00:03 +0100 L’info du jour | 9 novembre - Soir Full Article
f L’info du jour | 10 novembre - Matin By fr.euronews.com Published On :: Sun, 10 Nov 2024 07:00:03 +0100 L’info du jour | 10 novembre - Matin Full Article
f L’info du jour | 10 novembre - Mi-journée By fr.euronews.com Published On :: Sun, 10 Nov 2024 12:00:03 +0100 L’info du jour | 10 novembre - Mi-journée Full Article
f Des frappes de Tsahal ont fait plus de 50 morts au Liban et à Gaza, tirs de roquettes sur Israël By fr.euronews.com Published On :: Sun, 10 Nov 2024 15:08:06 +0100 Des frappes de Tsahal ont fait plus de 50 morts au Liban et à Gaza, tirs de roquettes sur Israël Full Article
f L’info du jour | 10 novembre - Soir By fr.euronews.com Published On :: Sun, 10 Nov 2024 18:00:02 +0100 L’info du jour | 10 novembre - Soir Full Article
f La police arrête des dizaines de personnes à Amsterdam après l'interdiction de manifestations By fr.euronews.com Published On :: Sun, 10 Nov 2024 21:20:39 +0100 La police arrête des dizaines de personnes à Amsterdam après l'interdiction de manifestations Full Article
f Netanyahu s’est entretenu 3 fois avec Trump depuis sa réélection à propos de la "menace iranienne" By fr.euronews.com Published On :: Sun, 10 Nov 2024 22:24:01 +0100 Netanyahu s’est entretenu 3 fois avec Trump depuis sa réélection à propos de la "menace iranienne" Full Article
f L’info du jour | 11 novembre - Matin By fr.euronews.com Published On :: Mon, 11 Nov 2024 07:00:02 +0100 L’info du jour | 11 novembre - Matin Full Article
f Trump et Poutine auraient discuté de la guerre en Ukraine, "une pure fiction", selon le Kremlin By fr.euronews.com Published On :: Mon, 11 Nov 2024 08:22:47 +0100 Trump et Poutine auraient discuté de la guerre en Ukraine, "une pure fiction", selon le Kremlin Full Article
f Trump confie l'immigration à Tom Homan, le "tsar des frontières" By fr.euronews.com Published On :: Mon, 11 Nov 2024 09:41:25 +0100 Trump confie l'immigration à Tom Homan, le "tsar des frontières" Full Article
f L’info du jour | 11 novembre - Mi-journée By fr.euronews.com Published On :: Mon, 11 Nov 2024 12:00:03 +0100 L’info du jour | 11 novembre - Mi-journée Full Article
f Des scientifiques découvrent un "troisième état" entre la vie et la mort By fr.euronews.com Published On :: Mon, 11 Nov 2024 12:43:09 +0100 Des scientifiques découvrent un "troisième état" entre la vie et la mort Full Article
f No Comment : des slackliners se balancent entre des montgolfières à 2 500 mètres d'altitude By fr.euronews.com Published On :: Mon, 11 Nov 2024 15:40:10 +0100 No Comment : des slackliners se balancent entre des montgolfières à 2 500 mètres d'altitude Full Article
f Gaza : au moins trois morts après une frappe israélienne sur le camp de réfugiés de Nouseirat By fr.euronews.com Published On :: Mon, 11 Nov 2024 16:11:19 +0100 Gaza : au moins trois morts après une frappe israélienne sur le camp de réfugiés de Nouseirat Full Article
f L’info du jour | 11 novembre - Soir By fr.euronews.com Published On :: Mon, 11 Nov 2024 18:00:04 +0100 L’info du jour | 11 novembre - Soir Full Article
f No Comment : manifestation pour la paix à la COP 29 By fr.euronews.com Published On :: Mon, 11 Nov 2024 20:05:42 +0100 No Comment : manifestation pour la paix à la COP 29 Full Article
f L’info du jour | 12 novembre - Matin By fr.euronews.com Published On :: Tue, 12 Nov 2024 07:00:03 +0100 L’info du jour | 12 novembre - Matin Full Article
f Serbie : des manifestants demandent la démission du gouvernement après le drame de Novi Sad By fr.euronews.com Published On :: Tue, 12 Nov 2024 08:49:28 +0100 Serbie : des manifestants demandent la démission du gouvernement après le drame de Novi Sad Full Article
f Au moins 22 personnes tuées dans des frappes au Liban et à Gaza, et le cessez-le-feu au point mort By fr.euronews.com Published On :: Tue, 12 Nov 2024 11:33:33 +0100 Au moins 22 personnes tuées dans des frappes au Liban et à Gaza, et le cessez-le-feu au point mort Full Article
f L’info du jour | 12 novembre - Mi-journée By fr.euronews.com Published On :: Tue, 12 Nov 2024 12:00:03 +0100 L’info du jour | 12 novembre - Mi-journée Full Article