Search
Now showing items 31-40 of 118
Automatic construction of mobile social networks on Moodle
(01/01/2016)
The traditional teaching methods of Learning Management Systems (or LMS) are rigid in nature and impose limitations on the teaching process. By having a closed pattern, these tools end up hurting the students, by preventing ...
Using a Communication Model to Collect Measurement Data through Mobile Devices
(07/05/2012)
Wireless systems and services have undergone remarkable development since the first mobile phone system was introduced in the early 1980s. The use of sensors in an Ambient Intelligence approach is a great solution in a ...
Mobile system for medical control of chronic diseases through intelligent devices
(12/12/2012)
The ageing of the population is a factor that in the future will increase the percentage of dependent people, given that there is a close relationship between dependence and age. When patients are in a health care environment, ...
A social software for mobile learning
(2012-07-04)
The traditional teaching methods of the Learning Management Systems (or LMS) are rigid in nature and impose limitations on the teaching process. By having a closed pattern, these tools end up hurting the student, for ...
Protecting Web Services against DoS Attacks: A Case-Based Reasoning Approach
(06/23/2010)
The real-time detection is a key factor to detect and block DoS attacks within Web services. DoS attacks can be generated for different techniques that take advantage of points vulnerable within Web services. This paper ...
A Security Proposal Based on a Real Time Agent to Protect Web Services Against DoS Attack
(2012-07-02)
This paper describes a novel proposal based on a real time agent to detect and block denial of service attacks within web services environments. The real time agent incorporates a classification mechanism based on a Case-Base ...
SCMAS: A distributed hierarchical multi-agent architecture for blocking attacks to databases
(04/04/2010)
One of the main attacks on databases is the SQL injection attack which causes severe damage both in the commercial aspect and the confidence of users. This paper presents a novel strategy for detecting and preventing SQL ...
Red Iberoamericana de apoyo a los procesos de enseñanza-aprendizaje de competencias profesionales a través de entornos Ubicuos y Colaborativos
(06/01/2014)
La nueva economía supone nuevos retos para los trabajadores, ya que se requieren niveles más elevados de conocimiento, actualización continua y permanente de la información, adquisición de nuevas competencias tecnológicas, ...
Análisis y diseño centrado en la experiencia de usuario: red académica y de investigadores
(Congreso Internacional de Educación Superior, CubaCongreso Internacional de Educación Superior, Cuba, 2014-05)
Muchos proyectos de software presentan deficiencias: retraso de entrega, coste excesivo, ineficiencia, mantenimiento problemático, escasa portabilidad. Debidos en mayor medida a una propagación de los errores que comienzan ...
Diagnóstico y seguimiento de la fragilidad en ancianos mediante el uso de dispositivos móviles
(11/03/2011)
Con la edad, la resistencia y las reservas fisiológicas de una persona adulta disminuyen, provocando un mayor riesgo de sufrir efectos adversos para la salud. Estos factores llevan al conocido estado de fragilidad. El ...