Search
Now showing items 61-70 of 236
A social software for mobile learning
(2012-07-04)
The traditional teaching methods of the Learning Management Systems (or LMS) are rigid in nature and impose limitations on the teaching process. By having a closed pattern, these tools end up hurting the student, for ...
Protecting Web Services against DoS Attacks: A Case-Based Reasoning Approach
(06/23/2010)
The real-time detection is a key factor to detect and block DoS attacks within Web services. DoS attacks can be generated for different techniques that take advantage of points vulnerable within Web services. This paper ...
A Security Proposal Based on a Real Time Agent to Protect Web Services Against DoS Attack
(2012-07-02)
This paper describes a novel proposal based on a real time agent to detect and block denial of service attacks within web services environments. The real time agent incorporates a classification mechanism based on a Case-Base ...
Systematic review and comparison of modeling ETL processes in data warehouse
(08/23/2010)
Abstract:
In a Data Warehouse (DW), ETL processes (Extraction, Transformation, Load) are responsible for extracting, transforming and loading data from the data sources into the DW. A good design of these processes in the ...
ICT: Improving processes in rural areas
(04/28/2016)
The Information and Communication Technologies (ICT) are the foundation for the Administration to achieve lower costs, streamline processes and provide better service to citizens; but above all they allow you to convert ...
SCMAS: A distributed hierarchical multi-agent architecture for blocking attacks to databases
(04/04/2010)
One of the main attacks on databases is the SQL injection attack which causes severe damage both in the commercial aspect and the confidence of users. This paper presents a novel strategy for detecting and preventing SQL ...
Red Iberoamericana de apoyo a los procesos de enseñanza-aprendizaje de competencias profesionales a través de entornos Ubicuos y Colaborativos
(06/01/2014)
La nueva economía supone nuevos retos para los trabajadores, ya que se requieren niveles más elevados de conocimiento, actualización continua y permanente de la información, adquisición de nuevas competencias tecnológicas, ...
Análisis y diseño centrado en la experiencia de usuario: red académica y de investigadores
(Congreso Internacional de Educación Superior, CubaCongreso Internacional de Educación Superior, Cuba, 2014-05)
Muchos proyectos de software presentan deficiencias: retraso de entrega, coste excesivo, ineficiencia, mantenimiento problemático, escasa portabilidad. Debidos en mayor medida a una propagación de los errores que comienzan ...
Diagnóstico y seguimiento de la fragilidad en ancianos mediante el uso de dispositivos móviles
(11/03/2011)
Con la edad, la resistencia y las reservas fisiológicas de una persona adulta disminuyen, provocando un mayor riesgo de sufrir efectos adversos para la salud. Estos factores llevan al conocido estado de fragilidad. El ...
Mitigation of the ground reflection effect in real-time locating systems based on wireless sensor networks by using artificial neural networks
(01/01/2013)
Wireless sensor networks (WSNs) have become much more relevant in recent years, mainly because they can be used in a wide diversity of applications. Real-time locating systems (RTLSs) are one of the most promising applications ...