Mostrando 10 resultados de: 35
Filtros aplicados
Publisher
RISTI - Revista Iberica de Sistemas e Tecnologias de Informacao(10)
Associacao Iberica de Sistemas e Tecnologias de Informacao(3)
Iberian Conference on Information Systems and Technologies, CISTI(3)
Associacao Iberica de Sistemas e Tecnologias de Informacaoaisti@aisti.eu(2)
Communications in Computer and Information Science(2)
Área temáticas
Ciencias de la computación(23)
Física aplicada(8)
Métodos informáticos especiales(5)
Economía de la tierra y la energía(2)
Otras ramas de la ingeniería(2)
Área de conocimiento
Ciencias de la computación(16)
Red informática(10)
Comunicación(6)
Simulación por computadora(4)
Telecomunicaciones(4)
Evaluating the Impact of Data Transfer Time and Mobility Patterns in Opportunistic Networks
Conference ObjectAbstract: The Epidemic protocol is an effective way to achieve information diffusion in opportunistic networksPalabras claves:Evaluating opportunistic networks, Wireless Ad-hoc networks, wireless networksAutores:Calafate C.T., Cano J.C., Hernández-Orallo E., Jorge Herrera-Tapia, Manzoni P., Tomás A.Fuentes:googlescopusEvaluating the Impact of Data Transfer Time in Contact-Based Messaging Applications
ArticleAbstract: In this letter, we propose an analytical model based on delay differential equations (DDEs) to evaluPalabras claves:Contact-based Messaging, Epidemic diffusion, opportunistic networks, Performance evaluationAutores:Calafate C.T., Cano J.C., Hernández-Orallo E., Jorge Herrera-Tapia, Manzoni P.Fuentes:googlescopusEvaluating the use of sub-gigahertz wireless technologies to improve message delivery in opportunistic networks
Conference ObjectAbstract: The message delivery ratio of mobile opportunistic networks strongly depends on the transmission timPalabras claves:Autores:Calafate C.T., Cano J.C., Hernández-Orallo E., Jorge Herrera-Tapia, Manzoni P., Tomás A., Zennaro M.Fuentes:googlescopusEvaluation of routing protocols for opportunistic networks in scenarios with high degree of people renewal
Conference ObjectAbstract: The performance of Opportunistic Networks relies mainly on users mobility. It is in fact mobility thPalabras claves:Ad hoc Network, Delay Tolerant Network, DTN, OppNets, Opportunistic Network, Routing protocolsAutores:Calafate C.T., Cano J.C., Hernández-Orallo E., Jorge Herrera-Tapia, Leonardo Chancay-García, Manzoni P.Fuentes:scopusFriendly-drop: A social-based buffer management algorithm for opportunistic networks
Conference ObjectAbstract: In the last five years, the integration of social relationships in algorithms for Opportunistic NetwPalabras claves:Autores:Calafate C.T., Cano J.C., Hernández-Orallo E., Jorge Herrera-Tapia, Manzoni P., Mota E., Souza C.Fuentes:googlescopusFriendly-sharing: Improving the performance of city sensoring through contact-based messaging applications
ArticleAbstract: Regular citizens equipped with smart devices are being increasingly used as “sensors” by Smart CitiePalabras claves:Enabling communication technology, Human sensors, opportunistic networks, Smart citiesAutores:Calafate C.T., Cano J.C., Hernández-Orallo E., Jorge Herrera-Tapia, Manzoni P., Tomás A.Fuentes:googlescopusEarly Detection of Business Failure by Selecting Attributes
Conference ObjectAbstract: Financial ratios are the most historically used attribute types for predicting business failure whenPalabras claves:attribute selection, business failure, financial reasons, Methods, RAutores:Jorge Herrera-Tapia, Juan Carlos Sendón-Varela, Lytyet Fernández-Capestany, Washington Xavier Garcia-QuilachaminFuentes:googlescopus5G and the Internet of Things: Systematic Review
ArticleAbstract: In the 21st century, the structure, and guidelines in different countries, such as the use of artifiPalabras claves:5G Technology, Artificial Intelligence, internet of things, wireless networksAutores:Isaac Alcivar-Hebkp_redia, Jorge Herrera-Tapia, Juan Carlos Sendón-Varela, Karina Pilozo-Pin, Marco Wellington Ayoví-Ramírez, Washington Xavier Garcia-QuilachaminFuentes:scopusA Computational Framework for Cyber Threats in Medical IoT Systems
ArticleAbstract: Smart social systems are ones where a number of individuals share and interact with each other via vPalabras claves:artificial model in social systems, Cyber Security, Intrusion detection system, SOCIAL NETWORKS, social system threatsAutores:Jorge Herrera-Tapia, Kerrache C.A., Rathee G., Saini H.Fuentes:googlescopusComparative analysis between different methodologies for performing computer security audits, applying the hierarchical analytical process (Ahp).
ArticleAbstract: Due to the threats and risks to which IT assets are exposed in organizations, it becomes very importPalabras claves:AHP, availability, Confidentiality, Integrity, Methodology, OsstmmAutores:Jorge Herrera-Tapia, Juan Carlos Sendón-Varela, Leonardo Chancay-García, Lytyet Fernández-Capestany, Marely Del Rosario Cruz-Felipe, Washington Xavier Garcia-QuilachaminFuentes:scopus