Publicaciones

Lista de publicaciones extraída de DBLP(Digital Bibliography & Library Project), sitio web de referencia de las publicaciones más relevantes en nuestra área de investigación.

2010

Diseño de líneas auxiliares de autobuses para situaciones de ruptura de los servicios de cercanías
:
Using specification and description language to define and implement discrete simulation models. SummerSim : 419-426
, , :
Towards a Representation of Enviromental Models using Specification and Description Language - From the Fibonacci Model to a Wildfire Model. KEOD : 343-346
, , :
Towards a Representation of Enviromental Models using Specification and Description Language - From the Fibonacci Model to a Wildfire Model. KEOD : 343-346
, , , , , , :
A MPEG-Based Architecture for Generic Distributed Multimedia Scenarios. JDIM 8(1): 47-53 ()
, , , , :
Query by Image Medical Training - Optical Biopsy with Confocal Endoscopy (OB-CEM). HEALTHINF : 166-172
, , , :
Procesos de Negocio e Ingeniería de Servicios (PNIS, 3ª ed.). JISBD : 351
, :
XV Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2010), Valencia, Spain, September 7-10, 2010. Actas. IBERGARCETA Pub. S.L. , ISBN 978-84-92812-51-6 [contents]
, , :
Master data management: A proof of concept. ICIQ
, , :
The Catalan Government Prequalification Strategy for Software Development Suppliers. SEAFOOD : 71-78
, , , , :
Dynamic Parameter Adjustment in CSMA/ECA. MACOM : 13-24
, :
A Method for Filtering Large Conceptual Schemas. ER : 247-260
, , , , :
AuRUS: Automated Reasoning on UML/OCL Schemas. ER : 438-444
, , :
A Policy-based Authorization Scheme for Resource Sharing in Pervasive Environments. ISSE : 271-279
, , , , :
EXAM: a comprehensive environment for the analysis of access control policies. Int. J. Inf. Sec. 9(4): 253-273 ()
, , :
Aligned texture map creation for pose invariant face recognition. Multimedia Tools Appl. 49(3): 545-565 ()
, , , , , :
Nationale Forschung und internationale Wettbewerbsfähigkeit - ein Widerspruch? Wirtschaftsinformatik 52(4): 243-253 ()
, , , , , :
National Research and International Competitiveness - An Antinomy? Business & Information Systems Engineering 2(4): 249-258 ()
, , , :
Tuning the EDCA parameters in WLANs with heterogeneous traffic: A flow-level analysis. Computer Networks 54(13): 2199-2214 ()
, :
Data warehousing and OLAP (DOLAP'08). Data Knowl. Eng. 69(1): 1-2 ()
, :
An approach to testing conceptual schemas. Data Knowl. Eng. 69(6): 598-618 ()
, :
Automatic validation of requirements to support multidimensional design. Data Knowl. Eng. 69(9): 917-942 ()
, :
A framework for multidimensional design of data warehouses from ontologies. Data Knowl. Eng. 69(11): 1138-1157 ()
, , :
A simulation study of the fleet sizing problem arising in offshore anchor handling operations. European Journal of Operational Research 203(1): 230-240 ()
, , :
Revisiting state space exploration of timed coloured petri net models to optimize manufacturing system's performance. Simulation Modelling Practice and Theory 18(9): 1225-1241 ()
, , , , :
Decomposition techniques for policy refinement. CNSM : 72-79
, , , :
Fairness and Convergence of CSMA with Enhanced Collision Avoidance (ECA). ICC : 1-6
, , , :
CARMA: Composable-Adaptive Resource Management Authorization for ubiquitous environments. IAS : 234-239
, , , , , , , :
A Platform for Context-Aware and Digital Rights Management-Enabled Content Adaptation. IEEE MultiMedia 17(2): 74-89 ()
, , , , :
A Negotiation Framework for Negotiation of Coalition Policies. POLICY : 133-136
, , :
Improving the Usability of HL7 Information Models by Automatic Filtering. SERVICES : 16-23
, , :
A Methodology for Solving Logistic Optimization Problems through Simulation. Simulation 86(5-6): 369-389 ()
, , , , , :
An interoperability system for authentication and authorisation in VANETs. IJAACS 3(2): 115-135 ()
, :
Extending the Methods for Computing the Importance of Entity Types in Large Conceptual Schemas. J. UCS 16(20): 3138-3162 ()

2009

, , , , :
Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009. ACM , ISBN 978-1-60558-778-3 [contents]
, , , :
MVT: a schema mapping validation tool. EDBT : 1120-1123
, , , , , :
Expressive policy analysis with enhanced system dynamicity. ASIACCS : 239-250
, , :
D-algebra for composing access control policy decisions. ASIACCS : 298-309
, , , , :
An algebra for fine-grained integration of XACML policies. SACMAT : 63-72
, , , , :
Usability meets access control: challenges and research opportunities. SACMAT : 73-74
, , , , :
Automating role-based provisioning by learning from examples. SACMAT : 75-84
, , , , , :
Evaluating role mining algorithms. SACMAT : 95-104
, , , , , , :
Access control policy combining: theory meets practice. SACMAT : 135-144
, , , , :
Carrier sense multiple access with enhanced collision avoidance: a performance analysis. IWCMC : 733-738
, , , :
Discovering functional dependencies for multidimensional design. DOLAP : 1-8
, , , :
Discovering functional dependencies for multidimensional design. DOLAP : 1-8
, , , , :
Security policy refinement using data integration: a position paper. SafeConfig : 25-28
, :
On-Line Analytical Processing. Encyclopedia of Database Systems : 1949-1954
, , :
Using ACCPM in a simplicial decomposition algorithm for the traffic assignment problem. Comp. Opt. and Appl. 44(2): 289-313 ()

Páginas