Mostrando 5 resultados de: 5
Filtros aplicados
Publisher
2018 14th International Wireless Communications and Mobile Computing Conference, IWCMC 2018(1)
2020 IEEE 17th Annual Consumer Communications and Networking Conference, CCNC 2020(1)
Computer Communications(1)
IEEE Access(1)
Lecture Notes in Networks and Systems(1)
Evaluating and enhancing information dissemination in urban areas of interest using opportunistic networks
ArticleAbstract: Opportunistic networks can provide an alternative way to support the diffusion of information in spePalabras claves:mobile computing, network performance evaluation, opportunistic networksAutores:Calafate C.T., Cano J.C., Hernández-Orallo E., Leonardo Chancay-García, Manzoni P.Fuentes:scopusOptimising message broadcasting in opportunistic networks
ArticleAbstract: Message Broadcasting in Opportunistic Networks is based on the opportunity of establishing contactsPalabras claves:Epidemic diffusion, opportunistic networks, Population processesAutores:Calafate C.T., Cano J.C., Hernández-Orallo E., Leonardo Chancay-García, Loscrì V., Manzoni P., Vegni A.M.Fuentes:scopusImproving Information Dissemination in Vehicular Opportunistic Networks
Conference ObjectAbstract: The goal of this paper is to evaluate the dissemination of information using traces of real vehiclesPalabras claves:mobile computing, opportunistic networks, vehicular networks, Vehicular Opportunistic NetworksAutores:Calafate C.T., Cano J.C., Hernández-Orallo E., Jorge Herrera-Tapia, Leonardo Chancay-García, Manzoni P.Fuentes:googlescopusInformation Dissemination using Opportunistic Networks in Scenarios with People Renewal
Conference ObjectAbstract: The diffusion of information using Opportunistic Networks relies mainly on users mobility. In fact,Palabras claves:mobile computing, network performance evaluation, opportunistic networksAutores:Calafate C.T., Cano J.C., Hernández-Orallo E., Leonardo Chancay-García, Manzoni P.Fuentes:scopusSecurity Mechanisms and Log Correlation Systems
Conference ObjectAbstract: This study proposes several security measures to protect the integrity of the information and avoidPalabras claves:CYBERSECURITY, Cybersecurity strategy, Cyberspace, log, SIEMAutores:Cesar Moreira-Zambrano, Jose Villacreses-Chancay, Josselyn Pita-Valencia, Josselyn Stefania Pita Valencia, Leonardo Chancay-García, Mora-Cruzatty A.Fuentes:googlescopus