Mostrando ítems 161-180 de 361

    A Petri Nets-based Scheduling Methodology forMultipurpose Batch Plants. 

    Riera Terrén, Daniel; Benqlilou, Chouaib; Narciso, Mercedes

    This article presents an optimization methodology of batch production processes assembled by shared resources which rely on a mapping of state-events into time-events allowing in this way the straightforward use of a well ...

    Scheduling airline reserve crew using a probabilistic crew absence and recovery model 

    Airlines require reserve crew to replace delayed or absent crew, with the aim of preventing consequent flight cancellations. A reserve crew schedule specifies the duty periods for which different reserve crew will be on ...

    Enabling SDN in VANETs: What is the impact on security? 

    Di Maio, Antonio; Palattella, Maria Rita; Soua, Ridha; Lamorte, Luca; Vilajosana i Guillén, Xavier; Alonso Zarate, Jesús; Engel, Thomas

    The demand for safe and secure journeys over roads and highways has been growing at a tremendous pace over recent decades. At the same time, the smart city paradigm has emerged to improve citizens' quality of life by ...

    Combining biased random sampling with metaheuristics for the facility location problem in distributed computer systems 

    Cabrera Añon, Guillem; González Martín, Sergio; Juan Pérez, Ángel Alejandro; Grasman, Scott Erwin; Marquès Puig, Joan Manuel

    This paper introduces a probabilistic algorithm for solving the well-known Facility Location Problem (FLP), an optimization problem frequently encountered in practical applications in fields such as Logistics or ...

    A methodological approach for trustworthiness assessment and prediction in mobile online collaborative learning 

    Miguel Moneo, Jorge; Caballé Llobet, Santi; Xhafa, Fatos; Prieto Blázquez, Josep; Barolli, Leonard

    Trustworthiness and technological security solutions are closely related to online collaborative learning and they can be combined with the aim of reaching information security requirements for e-Learning participants and ...

    Traceability mappings as a fundamental instrument in model transformations 

    Diskin, Zinovy; Gómez Llana, Abel; Cabot Sagrera, Jordi

    Technological importance of traceability mappings for model transformations is well-known, but they have often been considered as an auxiliary element generated during the transformation execution and providing accessory ...

    Teaching communication technologies and standards for the industrial IoT? Use 6TiSCH! 

    Watteyne, Thomas; Tuset Peiró, Pere; Vilajosana i Guillén, Xavier; Pollin, Sofie; Krishnamachari, Bhaskar

    The IETF 6TiSCH stack encompasses IEEE802.15.4 TSCH, IETF 6LoWPAN, RPL and CoAP. It is one of the key standards-based technology to enable industrial process monitoring and control, and unleash the Industrial Internet of ...

    Recipients' anonymity in multihop ad-hoc networks 

    Rifà Pous, Helena; Panaousis, Emmanouil A.; Politis, Christos

    Multihop ad-hoc networks have a dynamic topology. Retrieving a route towards a remote peer requires the execution of a recipient lookup, which can publicly reveal sensitive information about him. Within this context, we ...

    The coming of MOOCs 

    Steels, Luc

    A MOOC is a Massively Online Open Course. It is massive because there are many students (sometimes hundreds of thousands). It is online because it uses the Internet for course delivery. It is open because it is publically ...

    Z2Z4-Additive Perdect Codes in Steganography 

    Rifà Pous, Helena; Ronquillo, Lorena; Rifà Coma, Josep

    Steganography is an information hiding application which aims to hide secret data imperceptibly into a cover object. In this paper, we describe a novel coding method based on Z2Z4-additive codes in which data is embedded by ...

    Unsupervised steganalysis based on artificial training sets 

    Lerch Hostalot, Daniel; Megías Jiménez, David

    In this paper, an unsupervised steganalysis method that combines artificial training sets and supervised classification is proposed. We provide a formal framework for unsupervised classification of stego and cover images ...

    Using a real internet-scale environment for protocol testing in undergraduate courses: students' behaviour and feedback 

    Marquès Puig, Joan Manuel; Juan Pérez, Ángel Alejandro; Pérez Bonilla, Alejandra; Daradoumis Haralabus, Atanasi; Lázaro Iglesias, Daniel; Mondéjar Andreu, Rubén

    This paper presents a five-semester experience regarding the use of a real Internet-scale environment for testing protocols and services under realistic conditions. The paper discusses the convenience of using such real ...

    Scalable RAN virtualization in multitenant LTE-A heterogeneous networks 

    Tseliou, Georgia; Adelantado Freixer, Ferran; Verikoukis, Christos

    Cellular communications are evolving to facilitate the current and expected increasing needs of quality of service, high data rates, and diversity of offered services. Toward this direction, radio access network (RAN) ...

    Robust gait-based gender classification using depth cameras 

    Igual, Laura; Lapedriza Garcia, Àgata; Borràs, Ricard

    This article presents a new approach for gait-based gender recognition using depth cameras, that can run in real time. The main contribution of this study is a new fast feature extraction strategy that uses the 3D point ...

    Debate about the concept of value in commons-based peer production 

    Fuster Morell, Mayo; Salcedo Maldonado, Jorge Luis; Berlinguer, Marco

    We describe a new model of collaborative production called Commons-based peer production (CBPP). This model is frequently supported by digital platforms characterized by peer to peer relationships, resulting in the provision ...

    Simulation of the Airbus 380 evacuation 

    Estany de Millan, Pau; Juan Pérez, Ángel Alejandro; Fonseca Casas, Pau; Montañola Sales, Cristina

    A minute and a half, this is the given time to evacuate the aircraft in case of need after an emergency landing. This period is fixed no matter how many passengers are on board, no matter other considerations. The aircraft ...

    Sim-RandSharp: A Hybrid Algorithm for solving the Arc Routing Problem with Stochastic Demands 

    González Martín, Sergio; Juan Pérez, Ángel Alejandro; Riera Terrén, Daniel; Elizondo, Mónica; Fonseca Casas, Pau

    This paper proposes a new hybrid algorithm for solving the Arc Routing Problem with Stochastic Demands (ARPSD). Our approach combines Monte Carlo simulation (MCS) with the RandSHARP algorithm, which is designed for solving ...

    Protecting mobile agents from external replay attacks 

    Garrigues Olivella, Carles; Migas, Nikos; Buchanan, William; Robles Martínez, Sergi; Borrell Viader, Joan

    Peer-reviewed

    Static analysis of complex event processing programs 

    Complex Event Processing (CEP) provides a mechanism to efficiently correlate and infer conclusions about systems by means of analyzing the events they process. In areas such as the Internet of Things (IoT), Cyber Physical ...

    JXTA resource access control by means of advertisement encryption 

    Herrera Joancomartí, Jordi; Arnedo-Moreno, Joan

    Open Access Document