Listar LCC - Artículos por centro "E.T.S.I. Informática"
Mostrando ítems 1-20 de 164
-
A cluster of patterns for trusted computing
(Springer Nature, 2025-02)The proliferation of Internet of Things and cyberphysical systems has introduced unprecedented challenges in ensuring the integrity and confidentiality of critical data, making robust security mechanisms essential. There ... -
A comprehensive analysis based on GIS-AHP to minimise the social and environmental impact of the installation of large-scale photovoltaic plants in south Spain
(Elsevier, 2024)This article aims to propose a methodology to assess and prioritise the territorial factors considered when selecting the location of large-scale photovoltaic plants. It therefore seeks to answer the current social ... -
A Convolutional Autoencoder and a Neural Gas model based on Bregman Divergences for Hierarchical Color Quantization
(Elsevier, 2023)Color quantization (CQ) is one of the most common and important procedures to be performed on digital images. In this paper, a new approach to hierarchical color quantization is described, presenting a novel neural network ... -
A fast robust geometric fitting method for parabolic curves.
(Elsevier, 2018-07-18)Fitting discrete data obtained by image acquisition devices to a curve is a common task in many fields of science and engineering. In particular, the parabola is some of the most employed shape features in electrical ... -
A formal approach to automatically analyse extra-functionalproperties in mobile applications.
(Wiley, 2019-06-14)This paper presents an integrated approach for testing mobile applications (apps) against a set of extra-functional properties to be used by app developers. The approach starts with the (manual ... -
A GRASP-based memetic algorithm with path relinking for the far from most string problem.
(Elsevier, 2015)The FAR FROM MOST STRING PROBLEM (FFMSP) is a string selection problem. The objective is to find a string whose distance to other strings in a certain input set is above a given threshold for as many of those strings as ... -
A guided interface for web interaction.
(ScitePress, 2008)Many Web sites are for one use only and need to guide users through paths of decisions and data entering. Users use to feel insecure entering data in not well-known sites and don’t mind at all being guided in their first ... -
A methodology to find the elementary landscape decomposition of combinatorial optimization problems
(2014-10-03)A small number of combinatorial optimization problems have search spaces that correspond to elementary landscapes, where the objective function f is an eigenfunction of the Laplacian that describes the neighborhood structure ... -
A model-driven approach to ensure trust in the IoT
(Springer Link, 2020-12-14)The Internet of Things (IoT) is a paradigm that permits smart entities to be interconnected anywhere and anyhow. IoT opens new opportunities but also rises new issues. In this dynamic environment, trust is useful to mitigate ... -
A multi-objective approach for communication reduction in federated learning under devices heterogeneity constraints
(Elsevier, 2024-02-24)Federated learning is a paradigm that proposes protecting data privacy by sharing local models instead of raw data during each iteration of model training. However, these models can be large, with many parameters, provoking ... -
A novel clustering based method for characterizing household electricity consumption profiles
(Elsevier, 2023-12-12)A new methodology based on expert knowledge and data mining is proposed to obtain data-driven models that characterize household consumption profiles. These profiles are useful for electricity marketers to understand their ... -
A scoping review and a taxonomy of the use of motion-based technology centered on the end user. A special focus on elderly health
(Springer, 2023)Motion-based technology (MBT) has been applied in the last decades with enormous success in a high number of applications. Its use continues growing and is specially interesting in the health area. Nowadays, its employment ... -
A similarity measure for cyclic unary regular languages
(IOS Press, 2009)A cyclic unary regular language is a regular language over a unary alphabet that is represented by a cyclic automaton. We propose a similarity measure for cyclic unary regular languages by modifying the Jaccard similarity ... -
A takeover time-driven adaptive evolutionary algorithm for mobile user tracking in pre-5G cellular networks
(ELSEVIER, 2022-02)Cellular networks are one of today’s most popular means of communication. This fact has made the mobile phone industry subject to a huge scientific and economic competition, where the quality of service is key. Such a ... -
A trust model for popular smart home devices
(Springer, 2021-08)Nowadays, smart home devices like Amazon Echo and Google Home have reached mainstream popularity. Being in the homes of users, these devices are intrinsically intrusive, being able to access details such as users’ name, ... -
Adaptive Global WASF-GA to Handle. Many-objective Optimization Problems
(Elsevier, 2020)In this paper, a new version of the aggregation-based evolutionary algorithm Global WASF-GA (GWASF-GA) for many-objective optimization is proposed, called Adaptive Global WASF-GA (A-GWASF-GA). The fitness function of ... -
Adaptive music: Automated music composition and distribution
(2016)Creativity, or the ability to produce new useful ideas, is commonly associated to the human being; but there are many other examples in nature where this phenomenon can be observed. Inspired by this fact, in engineering, ... -
AI Methods in Algorithmic Composition: A Comprehensive Survey
(AI Access Foundation, 2013)Algorithmic composition is the partial or total automation of the process of music composition by using computers. Since the 1950s, different computational techniques related to Artificial Intelligence have been used for ... -
An app performance optimization advisor for mobile device app marketplaces
(Elsevier, 2018)On mobile phones, users and developers use apps official marketplaces serving as repositories of apps. The Google Play Store and Apple Store are the official marketplaces of Android and Apple products which offer more than ... -
An approach for deploying and monitoring dynamic security policies.
(Elsevier, 2016-05)Security policies are enforced through the deployment of certain security functionalities within the applications. When the security policies dynamically change, the associated security functionalities currently deployed ...