Listar ITIS - Artículos por título
Mostrando ítems 1-20 de 84
-
A model-driven framework for developing android-based classic multiplayer 2D board games
(Springer, 2021)Mobile applications and game development are attractive fields in software engineering. Despite the advancement of programming languages and integrated development environments, there have always been many challenges for ... -
A network application approach towards 5G and beyond critical communications use cases.
(Frontiers, 2024-02-21)Low latency and high bandwidth heralded with 5G networks will allow transmission of large amounts of Mission-Critical data over a short time period. 5G hence unlocks several capabilities for novel Public Protection and ... -
A Performance-Oriented Monitoring System for Security Properties in Cloud Computing Applications
(Oxford Press - The Computer Journal, 2011)Este artículo presenta una arquitectura robusta para el monitoreo dinámico de propiedades de seguridad en entornos de computación en la nube. Reconociendo que, a pesar de los avances en medidas preventivas, siempre existe ... -
A procedural and flexible approach for specification, modeling, definition, and analysis for self-adaptive systems.
(Wiley, 2021)An adaptive system can modify its settings at runtime as a response to changes in its operational environment. To analyse this kind of systems at design time is a difficult task since it requires considering the system ... -
A Secure Auditable Remote Registry Pattern for IoT Systems
(MDPI, 2024-11-04)In software engineering, pattern papers serve the purpose of providing a description of 1 a generalized, reusable solution to recurring design problems, based on practical experience and 2 established best practices. This ... -
A swarm algorithm for collaborative traffic in vehicular networks.
(Elsevier, 2018-04-19)Vehicular ad hoc networks (VANETs) allow vehicles to exchange warning messages with each other. These specific kinds of networks help reduce hazardous traffic situations and improve safety, which are two of the main ... -
Adversarial Genetic Programming for Cyber Security: A Rising Application Domain Where GP Matters
(Springer, 2020-04)Cyber security adversaries and engagements are ubiquitous and ceaseless. We delineate Adversarial Genetic Programming for Cyber Security, a research topic that, by means of genetic programming (GP), replicates and studies ... -
An Architecture for Creating Slices to Experiment on Wireless Networks.
(Springer Nature, 2020-10-09)Researchers in mobile technologies and services are currently requesting testbeds to validate their proposals in a realistic large-scale and controlled environment. Such demands are some times satisfied with private ad-hoc ... -
An immersive view approach by secure interactive multimedia proof-of-concept implementation.
(Springer-Verlag, 2013-09-11)El artículo aborda el creciente interés en la transmisión de medios en vivo, particularmente en el ámbito de los medios interactivos. El equipo de investigación propone una arquitectura que permite un control avanzado de ... -
Ant-colony optimization for automating test model generation in model transformation testing.
(Elsevier, 2023-11-04)In model transformation (MT) testing, test data generation is of key importance. However, test suites are not available out of the box, and existing approaches to generate them require to provide not only the metamodel to ... -
AutomAdapt: Zero Touch Configuration of 5G QoS Flows Extended for Time-Sensitive Networking.
(IEEE, 2023)The aim of IEEE Time-Sensitive Networking (TSN) standards is to grant deterministic communication in traditional Ethernet networks for Industry 4.0. Insofar as the use cases in the Factory need some mobility, the extension ... -
Automatic tuning of communication protocols for vehicular ad hoc networks using metaheuristics.
(Elsevier, 2010-08)The emerging field of vehicular ad hoc networks (VANETs) deals with a set of communicating vehicles which are able to spontaneously interconnect without any pre-existing infrastructure. In such kind of networks, it is ... -
Automatizing Software Cognitive Complexity Reduction
(IEEE Access, 2022-01-20)We model the cognitive complexity reduction of a method as an optimization problem where the search space contains all sequences of Extract Method refactoring opportunities. We then propose a novel approach that searches ... -
AVISPA in the Validation of Ambient Intelligence Scenarios.
(IEEE, 2009)El artículo presenta una investigación centrada en la validación de escenarios de inteligencia ambiental (AmI) utilizando AVISPA, una herramienta de modelado y verificación automática de protocolos de seguridad. Los entornos ... -
BiPred: A Bilevel Evolutionary Algorithm for Prediction in Smart Mobility.
(MDPI, 2018-11-24)This article develops the design, installation, exploitation, and final utilization of intelligent techniques, hardware, and software for understanding mobility in a modern city. We focus on a smart-campus initiative in ... -
Business processes resource management using rewriting logic and deep-learning-based predictive monitoring
(Elsevier, 2024)A significant task in business process optimization is concerned with streamlining the allocation and sharing of resources. This paper presents an approach for analyzing business process provisioning under a resource ... -
Clinical Considerations Derived From the Administration of Melatonin to Children With Sleep Disorders
(Elsevier, 2019)El artículo analiza el uso de la melatonina en el tratamiento de trastornos del sueño en niños. A pesar de la abundante investigación sobre la melatonina, aún existen preguntas sin resolver sobre sus patrones de secreción ... -
Continuous QoS-compliant Orchestration in the Cloud-Edge Continuum.
(Wiley, 2024)The problem of managing multi-service applications on top of Cloud-Edge networks in a quality of service (QoS)-aware manner has been thoroughly studied in recent years from a decision-making perspective. However, only a ... -
Dealing with Belief Uncertainty in Domain Models
(ACM, 2023)There are numerous domains in which information systems need to deal with uncertain information. These uncertainties may originate from different reasons such as vagueness, imprecision, incompleteness, or inconsistencies, ... -
Deep Memetic Models for Combinatorial Optimization Problems: Application to the Tool Switching Problem
(Springer, 2020)Memetic algorithms are techniques that orchestrate the interplay between population-based and trajectory-based algorithmic components. In particular, some memetic models can be regarded under this broad interpretation as ...