Publicacions

Llista de publicacions extreta de DBLP(Digital Bibliography & Library Project), lloc web de referència pel que fa a les publicacions més rellevants de la nostra àrea de recerca.

2010

, , :
Improving the Usability of HL7 Information Models by Automatic Filtering. SERVICES : 16-23
, , :
A Methodology for Solving Logistic Optimization Problems through Simulation. Simulation 86(5-6): 369-389 ()
, , , , , :
An interoperability system for authentication and authorisation in VANETs. IJAACS 3(2): 115-135 ()
, :
Extending the Methods for Computing the Importance of Entity Types in Large Conceptual Schemas. J. UCS 16(20): 3138-3162 ()

2009

, , , , :
Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009. ACM , ISBN 978-1-60558-778-3 [contents]
, , , :
MVT: a schema mapping validation tool. EDBT : 1120-1123
, , , , , :
Expressive policy analysis with enhanced system dynamicity. ASIACCS : 239-250
, , :
D-algebra for composing access control policy decisions. ASIACCS : 298-309
, , , , :
An algebra for fine-grained integration of XACML policies. SACMAT : 63-72
, , , , :
Usability meets access control: challenges and research opportunities. SACMAT : 73-74
, , , , :
Automating role-based provisioning by learning from examples. SACMAT : 75-84
, , , , , :
Evaluating role mining algorithms. SACMAT : 95-104
, , , , , , :
Access control policy combining: theory meets practice. SACMAT : 135-144
, , , , :
Carrier sense multiple access with enhanced collision avoidance: a performance analysis. IWCMC : 733-738
, , , :
Discovering functional dependencies for multidimensional design. DOLAP : 1-8
, , , :
Discovering functional dependencies for multidimensional design. DOLAP : 1-8
, , , , :
Security policy refinement using data integration: a position paper. SafeConfig : 25-28
, :
On-Line Analytical Processing. Encyclopedia of Database Systems : 1949-1954
, , :
Using ACCPM in a simplicial decomposition algorithm for the traffic assignment problem. Comp. Opt. and Appl. 44(2): 289-313 ()
, :
A Survey of Multidimensional Modeling Methodologies. IJDWM 5(2): 1-23 ()
, , :
Assessing the uncertainty in knn Data Fusion. EGC : 441-442
Using ACCPM in a simplicial decomposition algorithm for the traffic assignment p...
Combining two zoning systems in network equilibrium models
Modelos de optimización en la planificación operativa y multimodal de infraestru...
Link restoration for rapid transit network incidences
An elastic demand transit assignment model for congested transit networks
An integrated GPS/PDA/GIS telegeoprocessing system for traffic & environment
Microscopic simulation assessment of emissions based traffic management strategi...
Real-time traffic information and time-dependent travel times in a simulation ba...
Detección de parámetros de tráfico mediante tecnologias bluetooth y wifi
Nueva generación de sistemas de detección: realidad y posibilidades
Arquitecturas para ATIS y nuevas tecnologías de detección, jornadas its en autopistas
Noves tecnologies per la recollida de dades de trànsit: aplicacions a l’estimació de temps de recorregut
A perspective on traffic modeling: from strategic to operational planning
An OR perspective on traffic modeling and its role on decision making: from strategic to operational planning
, :
On-Line Analytical Processing. Encyclopedia of Database Systems : 1949-1954
, , , :
A Novel MAC Protocol for Event-Based Wireless Sensor Networks: Improving the Collective QoS. WWIC : 1-12
, :
Reasoning on UML Conceptual Schemas with Operations. CAiSE : 47-62
, :
On Computing the Importance of Entity Types in Large Conceptual Schemas. ER Workshops : 22-32
, , :
Web Sessions Anomaly Detection in Dynamic Environments. ISSE : 216-220
, , :
Web Sessions Anomaly Detection in Dynamic Environments. ISSE : 216-220
, , :
Using ACCPM in a simplicial decomposition algorithm for the traffic assignment problem. Comp. Opt. and Appl. 44(2): 289-313 ()
, :
Incremental integrity checking of UML/OCL conceptual schemas. Journal of Systems and Software 82(9): 1459-1478 ()
, , :
Extending the CIM-SPL policy language with RBAC for distributed management systems in the WBEM infrastructure. Integrated Network Management : 145-148
, , , :
A low power listening MAC with scheduled wake up after transmissions for WSNs. IEEE Communications Letters 13(4): 221-223 ()
, , , :
Privacy-Aware Role-Based Access Control. IEEE Security & Privacy 7(4): 35-43 ()
, , , :
Visualization for Access Control Policy Analysis Results Using Multi-level Grids. POLICY : 25-28
, , , , :
CSMA with Enhanced Collision Avoidance: A Performance Assessment. VTC Spring
, :
JGPSS, An Open Source GPSS Framework to Teach Simulation. Winter Simulation Conference : 256-267

Pàgines