LCC - Contribuciones a congresos científicos
Envíos recientes
-
Experimental analysis of peer-to-peer streaming in cellular networks
(IEEE, 2007)In this paper, we study the adequacy of applying peer-to- peer techniques to mobile networks by conducting a series of experiments using smart phones as peers. We measure important parameters, such as jitter and packet ... -
Evaluating the Performance of Copula-Based Item Response Theory Models for Interpretable Assessment
(2024)This paper describes a study evaluating the performance of copula-based Item Response Theory in real-world settings. To achieve this, we used a dataset containing information about 152 students who took a test on first-degree ... -
History Slicing: Assisting Code-Evolution Tasks.
(Association for Computing Machinery (ACM), 2012)Many software-engineering tasks require developers to understand the history and evolution of source code. However, today’s software-development techniques and tools are not well suited for the easy and efficient procurement ... -
WHOSEFAULT: Automatic Developer-to-Fault Assignment through Fault Localization.
(2012)This paper describes a new technique, which automatically selects the most appropriate developers for fixing the fault represented by a failing test case, and provides a diagnosis of where to look for the fault. This ... -
Fuzzy Fine-grained Code-history Analysis
(2017)Existing software-history techniques represent source-code evolution as an absolute and unambiguous mapping of lines of code in prior revisions to lines of code in subsequent revisions. However, the true evolutionary lineage ... -
An Empirical Study of Activity, Popularity, Size, Testing, and Stability in Continuous Integration.
(2017)A good understanding of the practices followed by software development projects can positively impact their success — particularly for attracting talent and on-boarding new members. In this paper, we perform a cluster ... -
History Slicing.
(2011)To perform a number of tasks such as inferring design rationale from past code changes or assessing developer expertise for a software feature or bug, the evolution of a set of lines of code can be assessed by mining ... -
From SMOG to Fog: A security perspective.
(IEEE, 2017)Cloud computing has some major limitations that hinder its application to some specific scenarios (e.g., Industrial IoT and remote surgery) where there are particularly stringent requirements, such as extremely low latency. ... -
Clasificación de historias clínicas reales según CIE-10-ES para localización de neoplasias mediante modelos transformers.
(2024-06-19)La mayoría de la información clínica almacenada en los sistemas sanitarios españoles se encuentra como texto no estructurado en las historias clínicas electrónicas. La extracción automática de información valiosa contenida ... -
A segregated architecture for a trust-based network of internet of things
(IEEE, 2019-02-28)With the ever-increasing number of smart home devices, the issues related to these environments are also growing. With an ever-growing attack surface, there is no standard way to protect homes and their inhabitants from ... -
A trust-by-design framework for the internet of things
(IEEE, 2018-02-26)The Internet of Things (IoT) is an environment of interconnected entities, that are identifiable, usable and controllable via the Internet. Trust is necessary in a system such as IoT as the entities involved should know ... -
λ-CoAP: An Internet of Things and Cloud Computing Integration based on the Lambda Architecture and CoAP
(Springer Nature, 2016-01-26)The Internet of Things (IoT) is an emerging technology that is growing continuously thanks to the number of devices deployed and data generated. Nevertheless, an upper layer to abstract the limitations of storing, processing, ... -
An edge computing architecture in the Internet of Things
(IEEE, 2018)In the last few years, the Internet of Things (IoT) has emerged as the new disruptive technology to change the world. Cloud computing has accompanied this field to overcome its processing and storage limitations. However, ... -
Runtime enforcement of dynamic security policies.
(Springer Nature, 2014-08)The security policies of an application can change at runtime due to several reasons, as for example the changes on the user preferences, the lack of enough resources in mobile environments or the negotiation of security ... -
Enhanced Cellular Detection Using Convolutional Neural Networks and Sliding Window Super-Resolution Inference.
(Springer, 2024)Histopathology currently serves as the standard for breast cancer diagnosis, but its manual execution demands time and expertise from pathologists. Artificial intelligence, particularly in digital pathology, has made ... -
Prediction of Optimal Locations for 5G Base Stations in Urban Environments Using Neural Networks and Satellite Image Analysis.
(Springer, 2024)Deploying 5G networks in urban areas is crucial for meeting the increasing demand for high-speed, low-latency wireless communications. However, the complex topography and diverse building structures in urban environments ... -
Exploiting medical-expert knowledge via a novel memetic algorithm for the inference of gene regulatory networks.
(2024)This study introduces an innovative memetic algorithm for optimizing the consensus of well-adapted techniques for the inference of gene regulation networks. Building on the methodology of a previous proposal (GENECI), this ... -
Using energy consumption for self-adaptation in FaaS.
(Springer Nature, 2024)One of the programming models that has been developing the most in recent years is Function as a Service (FaaS). The growing concern over data centre energy footprints has driven sustainable software development. In ... -
Análisis y evaluación de procesos de desarrollo en empresas como actividad docente y evaluativa.
(2024)El estudiantado de grados de Ingeniería Informática y relacionados no suele tener experiencia en el desarrollo de sistemas medianos o grandes, lo que provoca que no sea consciente de los problemas a los que se enfrentarán ... -
Mitigating Carlini & Wagner attacks with Encoding Generative Adversarial Network.
(2024)Deep Learning models are experiencing a significant surge in popularity, expanding into various domains, including critical applications like object recognition in autonomous vehicles, where any failure could have fatal ...