Search
Now showing items 11-20 of 37
Remote sensing of temperature changes in Panama canal watershed from landsat
(2010-09)
La temperatura de superficie es un factor central, como variable de control en los estudios de cambio climático, balance de calor y modelos climáticos. El conocimiento de la temperatura de superficie es importante para ...
AIDeM: Agent-Based Intrusion Detection Mechanism
(2010-07-02)
The availability of services can be comprimised if a service request sent to the web services server hides some form of attack within its contents. This article presents AIDeM (An Agent-Based Intrusion Detection Mechanism), ...
Real-time CBR-agent with a mixture of experts in the reuse stage to classify and detect DoS attacks
(10/01/2010)
Security is a major concern when service environments are implemented. This has led to the proposal of a variety of specifications and proposals based on soft computing methods to provide the necessary security for these ...
Synthesis of optical filters using microring resonators with ultra-large FSR
(12/06/2010)
We propose a novel synthesis method for designing flexible, tunable non-periodic filters. It is based on a building block which is presented by first time for these purposes, being the poles position tuned by means of a ...
A Perception System for Accurate Automatic Control of an Articulated Bus
(2010-07-02)
This paper describes the perception system for an automatic articulated bus where an accurate tracking trajectory is desired. Among the most promising transport infrastructures of the autonomous or semi-autonomous ...
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
(06/23/2010)
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injection attacks. The agent incorporates a ...
CODILA: A Collaborative and Distributed Learning Activity applied to software engineering courses in Latin American Universities
(10/09/2010)
Software engineering is a highly relevant area in the academia and also in the industry. Typically, there is an important demand for well-trained software engineers, since the code in consumer products is doubling every ...
The evolution of the observed Hubble sequence over the past 6GYR
(2010-11-01)
During the past years we have confronted serious problems of methodology concerning the morphological and kinematic classification of distant galaxies. This has forced us to create a new simple and effective morphological ...
AIIDA-SQL: An Adaptive Intelligent Intrusion Detector Agent for detecting SQL Injection attacks
(08/23/2010)
SQL Injection attacks on web applications have become one of the most important information security concerns over the past few years. This paper presents a hybrid approach based on the Adaptive Intelligent Intrusion ...
Una propuesta latinoamericana de colaboración en la enseñanza de la usabilidad del software
(2010-07-02)
Este artículo propone un modelo instruccional colaborativo, para la enseñanza de las técnicas más comunes de evaluación de la usabilidad de interfaces de usuario. El modelo facilitó el trabajo colaborativo entre diversas ...