Search
Now showing items 31-40 of 131
idMAS-SQL: Intrusion Detection Based on MAS to Detect and Block SQL injection through data mining
(05/10/2013)
This study presents a multiagent architecture aimed at detecting SQL injection attacks, which are one of the most prevalent threats for modern databases. The proposed architecture is based on a hierarchical and distributed ...
Achieving Adaptive Augmented Reality through Ontological Context-Awareness applied to AAL Scenarios
(01/05/2013)
This paper presents a proposal for supporting daily user needs by simple interactions with the environment through an augmented-reality perspective that applies proactive adaptation through knowledge representation using ...
Automatic construction of mobile social networks on Moodle
(01/01/2016)
The traditional teaching methods of Learning Management Systems (or LMS) are rigid in nature and impose limitations on the teaching process. By having a closed pattern, these tools end up hurting the students, by preventing ...
Using a Communication Model to Collect Measurement Data through Mobile Devices
(07/05/2012)
Wireless systems and services have undergone remarkable development since the first mobile phone system was introduced in the early 1980s. The use of sensors in an Ambient Intelligence approach is a great solution in a ...
Mobile system for medical control of chronic diseases through intelligent devices
(12/12/2012)
The ageing of the population is a factor that in the future will increase the percentage of dependent people, given that there is a close relationship between dependence and age. When patients are in a health care environment, ...
Low power consumption silicon photonics tuning filters based on compound microring resonators
(03/14/2013)
Scalable integrated optics platforms based on silicon-on-insulator allow to develop optics and electronics functions on the same chip. Developments in this area are fostered by its potential as an I/O technology that can ...
A social software for mobile learning
(2012-07-04)
The traditional teaching methods of the Learning Management Systems (or LMS) are rigid in nature and impose limitations on the teaching process. By having a closed pattern, these tools end up hurting the student, for ...
Protecting Web Services against DoS Attacks: A Case-Based Reasoning Approach
(06/23/2010)
The real-time detection is a key factor to detect and block DoS attacks within Web services. DoS attacks can be generated for different techniques that take advantage of points vulnerable within Web services. This paper ...
A Security Proposal Based on a Real Time Agent to Protect Web Services Against DoS Attack
(2012-07-02)
This paper describes a novel proposal based on a real time agent to detect and block denial of service attacks within web services environments. The real time agent incorporates a classification mechanism based on a Case-Base ...
Systematic review and comparison of modeling ETL processes in data warehouse
(08/23/2010)
Abstract:
In a Data Warehouse (DW), ETL processes (Extraction, Transformation, Load) are responsible for extracting, transforming and loading data from the data sources into the DW. A good design of these processes in the ...