Ara mostrant els elements 81-100 de 648

    Older people and the use of ICTs to communicate with children and grandchildren 

    Ivan, Loredana; Fernández Ardèvol, Mireia

    In this research we explore older people's incentives to use Internet services to communicate with their children and grandchildren, and the factors that make older individuals stop using (or even reject) Internet-mediated ...

    An iterative biased-randomized heuristic for the fleet size and mix vehicle-routing problem with backhauls 

    Belloso Ezcurra, Javier; Juan Pérez, Ángel Alejandro; Faulin Fajardo, Francisco Javier

    This paper analyzes the fleet mixed vehicle-routing problem with backhauls, a rich and realistic variant of the popular vehicle-routing problem in which both delivery and pick-up customers are served from a central depot ...

    Simple distributed scheduling with collision detection in TSCH networks 

    Muraoka, Kazushi; Watteyne, Thomas; Accettura, Nicola; Vilajosana i Guillén, Xavier; Pister, Kristofer

    The IETF IPv6 over the time synchronized channel hopping mode of IEEE 802.15.4e (6TiSCH) working group standardizes a distributed mechanism for neighbor motes to agree on a schedule to communicate, driven by a scheduling ...

    A Forwarding Spurring Protocol for Multihop Ad Hoc Networks (FURIES) 

    Herrera Joancomartí, Jordi; Rifà Pous, Helena

    The functioning of an ad hoc network is based on the supportive contributions of all of its members. Nodes behave as routers and take part in route discovery and maintenance. In this paper, a forwarding protocol is presented ...

    Actitudes punitivas : diferentes preguntas, diferentes respuestas 

    Martí Barrachina, Marta

    Treball de Fi de Grau en Criminologia i Polítiques Públiques de Prevenció. Curs 2012-2013

    Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices 

    Herrera Joancomartí, Jordi; Rifà Pous, Helena

    Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the ...

    Solving the deterministic and stochastic uncapacitated facility location problem: From a heuristic to a simheuristic 

    The uncapacitated facility location problem (UFLP) is a popular combinatorial optimization problem with practical applications in different areas, from logistics to telecommunication networks. While most of the existing ...

    Efficient validation of large models using the Mogwaï tool 

    Scalable model persistence frameworks have been proposed to handle large (potentially generated) models involved in current industrial processes. They usually rely on databases to store and access the underlying models, ...

    Automated gesture tracking in head-fixed mice 

    Giovannucci, Andrea; Pnevmatikakis, Eftychios A.; Deverett, Ben; Pereira, Talmo D.; Fondriest, James; Brady, M.J.; Wang, Samuel S.H; Abbas, Waseem; Parés Casellas, Pere; Masip Rodo, David

    The preparation consisting of a head-fixed mouse on a spherical or cylindrical treadmill offers unique advantages in a variety of experimental contexts. Head fixation provides the mechanical stability necessary for optical ...

    A simheuristic for routing electric vehicles with limited driving ranges and stochastic travel times 

    Reyes Rubiano, Lorena Silvana; Ferone, Daniele; Juan Pérez, Ángel Alejandro; Faulin Fajardo, Francisco Javier

    Green transportation is becoming relevant in the context of smart cities, where the use of electric vehicles represents a promising strategy to support sustainability policies. However the use of electric vehicles shows ...

    Performance analysis of a cognitive radio contention-aware channel selection algorithm 

    Mesodiakaki, Agapi; Adelantado Freixer, Ferran; Alonso Zarate, Luis; Verikoukis, Christos

    In cognitive radio (CR) networks, due to the ever increasing traffic demands and the limited spectrum resources, it is very likely for several secondary networks (SNs) to coexist and opportunistically use the same primary ...

    Spectral efficient and energy aware clustering in cellular networks 

    Kollias, Georgios; Adelantado Freixer, Ferran; Verikoukis, Christos

    The current and envisaged increase of cellular traffic poses new challenges to mobile network operators (MNO), who must densify their radio access networks (RAN) while maintaining low capital expenditure and operational ...

    Analyzing the educational design, use and effect of spatial games for cultural heritage: A literature review 

    Malegiannaki, Irini; Daradoumis Haralabus, Atanasi

    Integrating game-based approaches with learning constitutes a prevailing trend in education and training, applied in several domains, one of which is cultural heritage. The present paper attempts a literature review of ...

    Applications of discrete-event simulation to reliability and availability assessment in civil engineering structures 

    Juan Pérez, Ángel Alejandro; Monteforte, Arai; Ferrer Biosca, Albert; Serrat Piè, Carles; Faulin Fajardo, Francisco Javier

    This paper discusses the convenience of predicting, quantitatively, time-dependent reliability and availability levels associated with most building or civil engineering structures. Then, the paper reviews different ...

    Maintaining connections. Octo- and nonagenarians on digital 'use and non-use' 

    Fernández Ardèvol, Mireia; Sawchuk, Kim; Grenier, Line

    The concepts of user and non-user are frequently deployed within media and communications literature. What do these terms mean if examined regarding age and ageing? In this article we explore and trouble these notions ...

    Prevention of Cross-Site Scripting Attacks on Current Web Applications 

    García Alfaro, Joaquín; Navarro Arribas, Guillermo

    Security is becoming one of the major concerns for web applications and other Internet based services, which are becoming pervasive in all kinds of business models and organizations. Web applications must therefore include, ...

    Exploring Tehran with excitable medium 

    Adamatzky, Andrew; Dehshibi, Mohammad Mahdi

    An excitable chemical medium --- Belousov-Zhabotinsky (BZ) reaction --- is proven to be a fruitful substrate for prototyping unconventional computing devices. These include image processors, logical circuits, and robot ...

    A novel semi-fragile forensic watermarking scheme for remote sensing images 

    Serra Ruiz, Jordi; Megías Jiménez, David

    Peer-reviewed

    Total order in opportunistic networks 

    Costea, Mihail; Ciobanu, Rado-Ioan; Marin, Radu-Corneliu; Dobre, Ciprian; Mavromoustakis, Constandinos X.; Xhafa, Fatos; Mastorakis, George

    Opportunistic network applications are usually assumed to work only with unordered immutable messages, like photos, videos, or music files, while applications that depend on ordered or mutable messages, like chat or shared ...

    Jxta-Overlay : an interface for Efficient Peer Selection in P2P JXTA-based Systems 

    Xhafa, Fatos; Barolli, Leonard; Daradoumis Haralabus, Atanasi; Fernández Correa, Raúl; Caballé Llobet, Santi

    In this paper we address the problem of the efficient peer selection in P2P distributed platforms. To this end, we have developed a P2P distributed platform using Sun's JXTA technology, which is endowed with resource ...