Mostrando ítems 21-40 de 648
Delgado Durán, Marc
Treball de Fi de Grau en Criminologia i Polítiques Públiques de Prevenció. Curs 2012-2013/n Tutor: Antoni Forcadell Berenguer
Ballesté, Francesc; Torras, C.
Recent developments in social robotics, intelligent prosthetics, brain-computer interfaces, and implants pose new questions as to the effects of technology on identity, society, and the future of humankind. The authors' ...
Esplugas Segú, Xènia
Treball de Fi de Grau en Criminologia i Polítiques Públiques de Prevenció. Curs 2014-2015
Foutel, Nathalie
The Free Open Source Software (FOSS) seem far from the military field but in some cases, some technologies normally used for civilian purposes may have military applications. These products and technologies are called ...
Rifà Pous, Helena; Herrera Joancomartí, Jordi
An efficient approach for organizing large ad hoc networks is to divide the nodes into multiple clusters and designate, for each cluster, a clusterhead which is responsible for holding intercluster control information. The ...
Miguel Moneo, Jorge; Caballé Llobet, Santi; Xhafa, Fatos; Prieto Blázquez, Josep
Peer-reviewed
Ferrer Biosca, Albert; Guimarans, Daniel; Ramalhinho, Helena; Juan Pérez, Ángel Alejandro
This paper analyzes a realistic variant of the Permutation Flow-Shop Problem (PFSP) by considering a non-smooth objective function that takes into account not only the traditional makespan cost but also failure-risk costs ...
Gutiérrez Carreón, Gustavo; Jorba i Esteve, Josep; Daradoumis Haralabus, Atanasi
In the implementation of e-learning frameworks, a problem still unsolved is how to use and integrate low-level learning services to compose more complex high-level services or tools that make sense to both tutors and ...
Guitart Hormigo, María Isabel; Conesa Caralt, Jordi; Bañeres Besora, David; Moré López, Joaquim; Duran i Cals, Jordi; Gañán Jiménez, David
Nowadays, universities (on-site and online) have a large competition in order to attract more students. In this panorama, learning analytics can be a very useful tool since it allows instructors (and university managers) ...
Rifà Pous, Helena; Herrera Joancomartí, Jordi
This paper describes the state of the art of secure ad hoc routing protocols and presents SEDYMO, a mechanism to secure a dynamic multihop ad hoc routing protocol. The proposed solution defeats internal and external attacks ...
Cosentino, Valerio; Gérard, Sébastien; Cabot Sagrera, Jordi
Conceptual modeling is an essential activity in the development of any information system. But at the same time, it is a difficult one which may discourage some professionals that may be tempted to skip it altogether in ...
Olsen, Morten Goodwin; Martínez Normand, Loïc; Casado Martínez, Carlos
The most adequate approach for benchmarking web accessibility is manual expert evaluation supplemented by automatic analysis tools. But manual evaluation has a high cost and is impractical to be applied on large websites. ...
Sabillon, Regner; Cano, Jeimy; Reyes, Víctor; Serra Ruiz, Jordi
The increasing expansion and diversification in the strategies and practices of cybercrime has become a difficult obstacle in order both to understand the extent of embedded risks and to define efficient policies of ...
Gañán Jiménez, David; Caballé Llobet, Santi; Conesa Caralt, Jordi; Xhafa, Fatos
This contribution proposes software infrastructure to support new types of learning methodologies and resources based on collaborative knowledge engineering by means of an innovative application framework called the ...
Toral, Antonio; Way, Andy
This paper proposes to enrich RBMT dictionaries with Named Entities (NEs) automatically acquired from Wikipedia. The method is applied to the Apertium English-Spanish system and its performance compared to that of Apertium ...
Steels, Luc
Flow theory is a way to explain how humans can be self-motivated and reach a state of high focus and intense, very effective learning. Usually this theory is merely descriptive but recently it has also been operationalized ...
Macrocells are expected to be densely overlaid by small cells (SCs) to meet increasing capacity demands. Due to their dense deployment, some SCs will not be connected directly to the core network, and thus, they may forward ...
Romero Fernández-Bravo, Miguel Ángel
Peer-reviewed
Arnedo-Moreno, Joan; Gómez Miralles, Luis
Open Access Document
Esplugas Segú, Xènia
Treball de Fi de Grau en Criminologia i Polítiques Públiques de Prevenció. Curs 2014-2015