Search
Now showing items 1-10 of 18
Diabetes Patients' Care based on Mobile Monitoring
(01/01/2009)
In this paper, we propose a new architecture for diabetes patients. These applications allow the monitoring, patient selfcontrol and communication between patient and doctor. Moreover, as an important study case, we present ...
From implicit to touching interaction by identification technologies: Towards tagging context
(07/19/2009)
Intelligent environments need interactions capable of detecting users and providing them with good-quality contextual information. In this sense we adapt technologies, identifying and locating people for supporting their ...
PIViTa: Taxonomy for Displaying Information in Pervasive and Collaborative Environments
(2009-07-01)
In the years ahead, there are increasing demands for ubiquitous and continuous access to information and interactive devices embedded into a physical context are proliferated. Users need support for getting required ...
NFC Approach: Towards a Simple Interaction
(2009-07-01)
Nowadays, there are devices with great computing capabilities and these in different places around us. This technology opens us new possibilities and allows us the simple and easy interaction between user and computer. We ...
Definición y validación de medidas para procesos ETL en almacenes de datos
(01/01/2009)
In data warehousing, ETL (Extract, Transform, and Load) processes are in charge of extracting the data from data sources that will be contained in the data warehouse. Due to their relevance, the quality of these processes ...
Improving the Language Active Learning with Multiagent Systems
(09/23/2009)
Nowadays, there is a growing need for providing novel solutions to facilitate active learning in dependency environments. This paper present a multiagent architecture that incorporates agents specifically designed to provide ...
NFC Approach: Towards a Simple Interaction
(01/01/2009)
Nowadays, there are devices with great computing capabilities and these in different places around us. This technology opens us new possibilities and allows us the simple and easy interaction between user and computer. We ...
A Multiagent Based Strategy for Detecting Attacks in Databases in a Distributed Mode
(2009-07-01)
This paper presents a distributed hierarchical multiagent architecture for detecting SQL injection attacks against databases. It uses a novel strategy, which is supported by a Case-Based Reasoning mechanism, which provides ...
An Attack Detection Mechanism Based on a Distributed Hierarchical Multi-agent Architecture for Protecting Databases
(2009-07-01)
This paper presents an innovative approach to detect and classify SQL injection attacks. The existing approaches are centralized while this proposal is based on a distributed hierarchical architecture to provide a robust ...
A Multiagent Solution to Adaptively Classify SOAP Message and Protect against DoS Attack
(11/09/2009)
SOAP messages use XML code, which makes them vulnerable to denial of service (DoS) attacks and puts the availability of web services at risk. This article presents an adaptive solution for dealing with DoS attacks in web ...