Publicacions

Llista de publicacions extreta de DBLP(Digital Bibliography & Library Project), lloc web de referència pel que fa a les publicacions més rellevants de la nostra àrea de recerca.

2010

Diseño de líneas auxiliares de autobuses para situaciones de ruptura de los servicios de cercanías
:
Using specification and description language to define and implement discrete simulation models. SummerSim : 419-426
, , :
Towards a Representation of Enviromental Models using Specification and Description Language - From the Fibonacci Model to a Wildfire Model. KEOD : 343-346
, , :
Towards a Representation of Enviromental Models using Specification and Description Language - From the Fibonacci Model to a Wildfire Model. KEOD : 343-346
, , , , , , :
A MPEG-Based Architecture for Generic Distributed Multimedia Scenarios. JDIM 8(1): 47-53 ()
, , , , :
Query by Image Medical Training - Optical Biopsy with Confocal Endoscopy (OB-CEM). HEALTHINF : 166-172
, , , :
Procesos de Negocio e Ingeniería de Servicios (PNIS, 3ª ed.). JISBD : 351
, :
XV Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2010), Valencia, Spain, September 7-10, 2010. Actas. IBERGARCETA Pub. S.L. , ISBN 978-84-92812-51-6 [contents]
, , :
Master data management: A proof of concept. ICIQ
, , :
The Catalan Government Prequalification Strategy for Software Development Suppliers. SEAFOOD : 71-78
, , , , :
Dynamic Parameter Adjustment in CSMA/ECA. MACOM : 13-24
, :
A Method for Filtering Large Conceptual Schemas. ER : 247-260
, , , , :
AuRUS: Automated Reasoning on UML/OCL Schemas. ER : 438-444
, , :
A Policy-based Authorization Scheme for Resource Sharing in Pervasive Environments. ISSE : 271-279
, , , , :
EXAM: a comprehensive environment for the analysis of access control policies. Int. J. Inf. Sec. 9(4): 253-273 ()
, , :
Aligned texture map creation for pose invariant face recognition. Multimedia Tools Appl. 49(3): 545-565 ()
, , , , , :
Nationale Forschung und internationale Wettbewerbsfähigkeit - ein Widerspruch? Wirtschaftsinformatik 52(4): 243-253 ()
, , , , , :
National Research and International Competitiveness - An Antinomy? Business & Information Systems Engineering 2(4): 249-258 ()
, , , :
Tuning the EDCA parameters in WLANs with heterogeneous traffic: A flow-level analysis. Computer Networks 54(13): 2199-2214 ()
, :
Data warehousing and OLAP (DOLAP'08). Data Knowl. Eng. 69(1): 1-2 ()
, :
An approach to testing conceptual schemas. Data Knowl. Eng. 69(6): 598-618 ()
, :
Automatic validation of requirements to support multidimensional design. Data Knowl. Eng. 69(9): 917-942 ()
, :
A framework for multidimensional design of data warehouses from ontologies. Data Knowl. Eng. 69(11): 1138-1157 ()
, , :
A simulation study of the fleet sizing problem arising in offshore anchor handling operations. European Journal of Operational Research 203(1): 230-240 ()
, , :
Revisiting state space exploration of timed coloured petri net models to optimize manufacturing system's performance. Simulation Modelling Practice and Theory 18(9): 1225-1241 ()
, , , , :
Decomposition techniques for policy refinement. CNSM : 72-79
, , , :
Fairness and Convergence of CSMA with Enhanced Collision Avoidance (ECA). ICC : 1-6
, , , :
CARMA: Composable-Adaptive Resource Management Authorization for ubiquitous environments. IAS : 234-239
, , , , , , , :
A Platform for Context-Aware and Digital Rights Management-Enabled Content Adaptation. IEEE MultiMedia 17(2): 74-89 ()
, , , , :
A Negotiation Framework for Negotiation of Coalition Policies. POLICY : 133-136
, , :
Improving the Usability of HL7 Information Models by Automatic Filtering. SERVICES : 16-23
, , :
A Methodology for Solving Logistic Optimization Problems through Simulation. Simulation 86(5-6): 369-389 ()
, , , , , :
An interoperability system for authentication and authorisation in VANETs. IJAACS 3(2): 115-135 ()
, :
Extending the Methods for Computing the Importance of Entity Types in Large Conceptual Schemas. J. UCS 16(20): 3138-3162 ()

2009

, , , , :
Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009. ACM , ISBN 978-1-60558-778-3 [contents]
, , , :
MVT: a schema mapping validation tool. EDBT : 1120-1123
, , , , , :
Expressive policy analysis with enhanced system dynamicity. ASIACCS : 239-250
, , :
D-algebra for composing access control policy decisions. ASIACCS : 298-309
, , , , :
An algebra for fine-grained integration of XACML policies. SACMAT : 63-72
, , , , :
Usability meets access control: challenges and research opportunities. SACMAT : 73-74
, , , , :
Automating role-based provisioning by learning from examples. SACMAT : 75-84
, , , , , :
Evaluating role mining algorithms. SACMAT : 95-104
, , , , , , :
Access control policy combining: theory meets practice. SACMAT : 135-144
, , , , :
Carrier sense multiple access with enhanced collision avoidance: a performance analysis. IWCMC : 733-738
, , , :
Discovering functional dependencies for multidimensional design. DOLAP : 1-8
, , , :
Discovering functional dependencies for multidimensional design. DOLAP : 1-8
, , , , :
Security policy refinement using data integration: a position paper. SafeConfig : 25-28
, :
On-Line Analytical Processing. Encyclopedia of Database Systems : 1949-1954
, , :
Using ACCPM in a simplicial decomposition algorithm for the traffic assignment problem. Comp. Opt. and Appl. 44(2): 289-313 ()

Pàgines