Browsing Facultad de Ingeniería de Sistemas Computacionales by Title
Now showing items 31-50 of 191
-
Automatic construction of mobile social networks on Moodle
(01/01/2016)The traditional teaching methods of Learning Management Systems (or LMS) are rigid in nature and impose limitations on the teaching process. By having a closed pattern, these tools end up hurting the students, by preventing ... -
Automatic generation of ETL processes from conceptual models
(11/06/2009)Data warehouses (DW) integrate different data sources in order to give a multidimensional view of them to the decision-maker. To this aim, the ETL (Extraction, Transformation and Load) processes are responsible for extracting ... -
Automatic OSPF Topology map generation using information of the OSPF database
(02/11/2018)Nowadays, different technologies provide support to different areas of our diverse lifestyles around the world. Highly reputable companies are doing important research on the connectivity of multiple devices to the different ... -
Automatic semantic maps generation from lexical annotations
(03/15/2018)The generation of semantic environment representations is still an open problem in robotics. Most of the current proposals are based on metric representations, and incorporate semantic information in a supervised fashion. ... -
Automatización de bajo costo utilizada en la producción agrícola en invernaderos y huertos caseros
(07/29/2015)Actualmente existen en el mercado productos comerciales para la automatización de invernaderos y huertos. Sin embargo, dichas tecnologías son costosas y son utilizadas en estructuras para la producción agrícola a gran ... -
Casos de uso para el desarrollo de una aplicación de aprendizaje movil
(2017-07-04)Este artículo presenta los casos de uso desarrollados en una aplicación para el aprendizaje móvil, denominada MLEA (Mobile Learning Adapter), desarrollado en colaboración con la Universidad do Vale do Rio dos Sinos-UNISINOS, ... -
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
(06/23/2010)One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injection attacks. The agent incorporates a ... -
Classification Agent-Based Techniques for Detecting Intrusions in Databases
(09/24/2008)This paper presents an agent specially designed for the prevention and detection of SQL injection at the database layer of an application. The agent incorporates a Case-based reasoning mechanism whose main characteristic ... -
CODILA: A Collaborative and Distributed Learning Activity applied to software engineering courses in Latin American Universities
(10/09/2010)Software engineering is a highly relevant area in the academia and also in the industry. Typically, there is an important demand for well-trained software engineers, since the code in consumer products is doubling every ... -
Computing Image Descriptors from Annotations Acquired from External Tools
(11/28/2015)Visual descriptors are widely used in several recognition and classification tasks in robotics. The main challenge for these tasks is to find a descriptor that could represent the image content without losing representative ... -
Construção Automática de Redes Sociais Móveis no Ambiente Moodle (Automatic construction of mobile social networks on Moodle)
(01/01/2016)Os métodos de ensino tradicionais dos sistemas de gerenciamento de aprendizagem (ou LMS do termo em inglês (Learning Management System) são rígidos por natureza e imp ō em limitações ao processo de ensino. Por terem um ... -
Context Cookies
(09/03/2008)In an ambient intelligence world, devices work in order to support people carrying out their everyday life activities in a natural way. Therefore, it is necessary to know the entities in the environment and to consider new ... -
Definición y validación de medidas para procesos ETL en almacenes de datos
(01/01/2009)In data warehousing, ETL (Extract, Transform, and Load) processes are in charge of extracting the data from data sources that will be contained in the data warehouse. Due to their relevance, the quality of these processes ... -
Demultiplexers for ultranarrow channel spacing based on Mach-Zehnders and ring resonators
(09/01/2004)Novel demultiplexer configurations based on concatenated Mach-Zehnders and a ring resonator are presented. These new devices exhibit high channel isolation, flexibility, no loss, and megahertz-adjustable full width at half ... -
Desarrollo de una aplicación educativa basada en Android para dispositivos móviles
(2012-05-24)Este artículo presenta el desarrollo de MLEA, una plataforma que facilita, a través del uso de celulares y tablets con sistema operativo Android, la movilidad de usuarios de ambientes virtuales de aprendizaje. Es una ... -
Design and tolerance analysis of a router with an amplified resonator and Bragg gratings
(04/20/2000)A novel ring resonator configuration with Bragg gratings is presented. The stability of this configuration is studied by a z-transform technique. A router design with a FWHM of 17 MHz, a -40-dB rejection ratio, and a 15-dB ... -
Detecting DoS Attack in Web Services by Using an Adaptive Multiagent Solution
(07/01/2013)One of the most frequent techniques of a DoS attack is to exhaust available resources (memory, CPU cycles, and bandwidth) on the host server. A SOAP message can be affected by a DoS attack if the incoming message has been ... -
Developing an Interactive Environment Through the Teaching of Mathematics with Small Robots
(2020-03-30)The article is the product of the study “Development of innovative resources to improve logical-mathematical skills in primary school, through educational robotics”, developed during the 2019 school year in three public ... -
Diabetes Patients' Care based on Mobile Monitoring
(01/01/2009)In this paper, we propose a new architecture for diabetes patients. These applications allow the monitoring, patient selfcontrol and communication between patient and doctor. Moreover, as an important study case, we present ... -
Diabetes Patients´ Care based on Mobile Monitoring
(2009-07-01)In this paper, we propose a new architecture for diabetes patients. These applications allow the monitoring, patient selfcontrol and communication between patient and doctor. Moreover, as an important study case, we present ...