Buscar
Mostrando ítems 21-30 de 68
Tesis Doctoral
Informe
Reflexiones sobre la Gestión de Riesgos en la Evaluación Telemática dentro del contexto de la E.T.S.I de la Universidad de Sevilla
(2020-04-30)
Es imposible suprimir el riesgo en un examen telemático, como también lo es en un examen presencial. De forma natural, lo exámenes telemáticos abren un mayor número de oportunidades a quién desea sortear las normas ...
Artículo
Designing Cost-Effective Reliable Networks from a Risk Analysis Perspective: A Case Study for a Hospital Campus
(Institute of Electrical and Electronics Engineers, 2019)
The unavailability of information and communication services due to network-related incidents may have a significant impact on large organizations. Network incidents can hence be viewed as a risk for organizations whose ...
Tesis Doctoral
Artículo
Privilege Management Infrastructure for Virtual Organizations in Healthcare Grids
(Institute of Electrical and Electronics Engineers Inc., 2011-03)
This paper is focused on the management of virtual organizations (VO) inside healthcare environments where grid technology is used as middleware for a healthcare services-oriented architecture (HSOA). Some of the main tasks ...
Ponencia
Operativa de buque en las terminales marítimas de contenedores: estado del arte
(Asociación para el Desarrollo de la Ingeniería de Organización (ADINGOR), 2011)
Artículo
Dynamic fuzzy logic elevator group control system for energy optimization
(World Scientific Publishing Company, 2013)
High-rise buildings with a considerable number of elevators represent a major logistic problem concerning saving space and time due to economic reasons. For this reason, complex Elevator Group Control Systems are developed ...
Artículo
Artículo
Deployment of UAV-mounted Access Points for VoWiFi Service with guaranteed QoS
(Elsevier, 2022-09-01)
Unmanned Aerial Vehicle (UAV) networks have emerged as a promising means to provide wireless coverage in open geographical areas. Nevertheless, in wireless networks such as WiFi, signal coverage alone is insufficient to ...
Ponencia
Generación automática de firmas para detección de ciberataques basados en URI
(Universidade da Coruña, 2021)
La mayor parte de los sistemas de detección de intrusiones (IDS) operativos se basan en el uso de firmas que permiten identificar ataques conocidos. La dependencia de estos IDS con la actualización de las bases de ...