Listar Lenguajes y Ciencias de la Computación - (LCC) por título
Mostrando ítems 532-551 de 662
-
Reliable simulation-optimization of traffic lights in a real-world city.
(2019-03-14)In smart cities, when the real-time control of traffic lights is not possible, the global optimization of traffic-light programs (TLPs) requires the simulation of a traffic scenario (traffic flows across the whole city) ... -
Un repositorio RDF para la Integración de Flujos de Datos de Analítica Web y Comercio Electrónico
(Ediciones Universidad Salamanca, 2016)La Analítica Web supone hoy en día una tarea ineludible para las empresas de comercio electrónico, ya que les permite analizar el comportamiento de sus clientes. El proyecto Europeo SME-Ecompass tiene como objetivo ... -
Reputación Corporativa: Modelos para el Análisis y Valoración de la Dimensión Financiera de Entes Públicos y Privados
(UMA Editorial, 2021-05-05)Los activos intangibles representan actualmente un importante componente estratégico de las organizaciones y están orientados a la gestión del conocimiento y del capital intelectual. Uno de los principales activos intangibles ... -
Rewriting Modulo SMT and Open System Analysis
(2018-11-26)Rewriting modulo SMT is a new technique that combines the power of SMT solving, rewriting modulo theories, and model checking. Rewriting modulo SMT is ideally suited to model and analyze reachability properties of ... -
Road pollution estimation from vehicle tracking in surveillance videos by deep convolutional neural networks
(ELSEVIER, 2021-12)Air quality and reduction of emissions in the transport sector are determinant factors in achieving a sustainable global climate. The monitoring of emissions in traffic routes can help to improve route planning and to ... -
Road pollution estimation using static cameras and neural networks
(2018-07-19)Este artículo presenta una metodología para estimar la contaminación en carreteras mediante el análisis de secuencias de video de tráfico. El objetivo es aprovechar la gran red de cámaras IP existente en el sistema de ... -
Robust computational intelligence techniques for visual information processing
(UMA Editorial, 2021-05-12)This Ph.D. thesis is about image processing by computational intelligence techniques. Firstly, a general overview of this book is carried out, where the motivation, the hypothesis, the objectives, and the methodology ... -
Robust Off- and Online Separation of Intracellularly Recorded Up and Down Cortical States
(2007)Background. The neuronal cortical network generates slow (<1 Hz) spontaneous rhythmic activity that emerges from the recurrent connectivity. This activity occurs during slow wave sleep or anesthesia and also in cortical ... -
Robust optimization of algorithmic trading systems
(UMA Editorial, 2017-05-25)GAs (Genetic Algorithms) and GP (Genetic Programming) are investigated for finding robust Technical Trading Strategies (TTSs). TTSs evolved with standard GA/GP techniques tend to suffer from over-fitting as the solutions ... -
Run-time Adaptation of Mobile Applications using Genetic Algorithms
(IEEE Press, 2013)Mobile applications run in environments where the context is continuously changing. Therefore, it is necessary to provide support for the run-time adaptation of these applications. This support is usually achieved by ... -
Run-time Support to Manage Architectural Variability Speci ed with CVL
(Springer, 2013)The execution context in which pervasive systems or mobile computing run changes continuously. Hence, applications for these systems should be adapted at run-time according to the current context. In order to implement ... -
Running Genetic Algorithms in the Edge: A First Analysis
(2018-11-26)Nowadays, the volume of data produced by different kinds of devices is continuously growing, making even more difficult to solve the many optimization problems that impact directly on our living quality. For instance, ... -
SafeWalks: aplicación móvil de supervisión de pacientes de Alzheimer
(2015-09-23)El principal objetivo de Internet of Things (IoT) es integrar las tecnologías informáticas en el quehacer cotidiano de las personas, facilitando su interacción con un entorno de dispositivos interconectados, pero el estado ... -
SAMGRID: Security Authorization and Monitoring Module Based on SealedGRID Platform
(IOAP-MPDI, 2022-08-30)IoT devices present an ever-growing domain with multiple applicability. This technology has favored and still favors many areas by creating critical infrastructures that are as profitable as possible. This paper presents ... -
Scalable Inference of Gene Regulatory Networks with the Spark Distributed Computing Platform Cristo
(2018-11-05)Inference of Gene Regulatory Networks (GRNs) remains an important open challenge in computational biology. The goal of bio-model inference is to, based on time-series of gene expression data, obtain the sparse topological ... -
SeaClouds: An Open Reference Architecture for Multi-Cloud Governance
(2016-12-12)We present the open reference architecture of the SeaClouds solution. It aims at enabling a seamless adaptive multi-cloud management of complex applications by supporting the distribution, monitoring and reconfiguration ... -
Search based algorithms for test sequence generation in functional testing
(2014-10-03)The generation of dynamic test sequences from a formal specification, complementing traditional testing methods in order to find errors in the source code. Objective In this paper we extend one specific combinatorial ... -
Search-Based Model Transformations
(2016-04-18)Huge efforts have been invested in the last decade concerning the establishment of dedicated analysis methods and techniques for model transformations. The analysis of general properties such as termination and confluence ... -
Secure Mobile Agents on Embedded Boards: a TPM based solution
(ACM - ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security August 2022 Article No.: 104 Pages 1–7 https://doi.org/10.1145/3538969.3544419ARES 2022, 2022-08-26)La seguridad puede considerarse uno de los aspectos esenciales de cualquier sistema informático actual. El panorama actual evoluciona constantemente y aparecen nuevos modelos informáticos al mismo tiempo que surgen diferentes ... -
Security Analysis of Separation Kernels Specifications and a Framework for the Verification of Concurrent Implementations
(2017-05-11)Due to the new trend of integrating safe and secure functionalities into one separation kernel, security analysis of ARINC 653 as well as a formal specification with security proofs are thus significant for the ...