Antonio F. Skarmeta

Orcid: 0000-0002-5525-1259

Affiliations:
  • University of Murcia, Department of Information and Communication Engineering


According to our database1, Antonio F. Skarmeta authored at least 626 papers between 1994 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Misbehavior detection in intelligent transportation systems based on federated learning.
Internet Things, April, 2024

MultiBEATS: Blocks of eigenvalues algorithm for multivariate time series dimensionality reduction.
Inf. Fusion, April, 2024

Integrating the manufacturer usage description standard in the modelling of cyber-physical systems.
Comput. Stand. Interfaces, January, 2024

FedRDF: A Robust and Dynamic Aggregation Function against Poisoning Attacks in Federated Learning.
CoRR, 2024

PhenoLinker: Phenotype-Gene Link Prediction and Explanation using Heterogeneous Graph Neural Networks.
CoRR, 2024

2023
A privacy-preserving attribute-based framework for IoT identity lifecycle management.
Comput. Networks, November, 2023

Sim-PowerCS: An extensible and simplified open-source energy simulator.
SoftwareX, July, 2023

SmartWatcher©: A Solution to Automatically Assess the Smartness of Buildings.
Comput., April, 2023

Building an interoperable space for smart agriculture.
Digit. Commun. Networks, February, 2023

Intrusion Detection Based on Privacy-Preserving Federated Learning for the Industrial IoT.
IEEE Trans. Ind. Informatics, 2023

Intelligent and Efficient IoT Through the Cooperation of TinyML and Edge Computing.
Informatica, 2023

A multi-layer guided reinforcement learning-based tasks offloading in edge computing.
Comput. Networks, 2023

European 5G Security in the Wild: Reality versus Expectations.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

By-default Security Orchestration on distributed Edge/Cloud Computing Framework.
Proceedings of the 9th IEEE International Conference on Network Softwarization, 2023

Federated Transfer Learning for Energy Efficiency in Smart Buildings.
Proceedings of the IEEE INFOCOM 2023, 2023

Service-oriented Architecture Evolution towards 6G Networks.
Proceedings of the IEEE Conference on Standards for Communications and Networking, 2023

Multi-agent Reinforcement Learning-Based Energy Orchestrator for Cyber-Physical Systems.
Proceedings of the Algorithmic Aspects of Cloud Computing - 8th International Symposium, 2023



DJM-CYBER: A Joint Master in Advanced Cybersecurity.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
PLEIAData:consumption, HVAC (Heating, Ventilation & Air Conditioning), temperature, weather and motion sensor data for smart buildings applications.
Dataset, September, 2022

PLEIAData:consumption, HVAC (Heating, Ventilation & Air Conditioning), temperature, weather and motion sensor data for smart buildings applications.
Dataset, September, 2022

PLEIAData: real data from the Pleiades building for smart applications.
Dataset, September, 2022

QoS and Resource-Aware Security Orchestration and Life Cycle Management.
IEEE Trans. Mob. Comput., 2022

Who is wearing me? TinyDL-based user recognition in constrained personal devices.
IET Comput. Digit. Tech., 2022

Intrinsic and extrinsic quality of data for open data repositories.
ICT Express, 2022

Machine learning-based zero-touch network and service management: a survey.
Digit. Commun. Networks, 2022

Federated Cyberattack Detection for Internet of Things-Enabled Smart Cities.
Computer, 2022

Evaluating Federated Learning for intrusion detection in Internet of Things: Review and challenges.
Comput. Networks, 2022

Automatic, verifiable and optimized policy-based security enforcement for SDN-aware IoT networks.
Comput. Networks, 2022

Architecture Framework for Intelligence Orchestration in AIoT and IoT.
Proceedings of the International Conference on Smart Applications, 2022

Dynamic Risk Assessment and Certification in the Power Grid: A Collaborative Approach.
Proceedings of the 8th IEEE International Conference on Network Softwarization, 2022

Implementing a holistic approach to facilitate the onboarding, deployment and validation of NetApps.
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2022

The Computing Fleet: Managing Microservices-based Applications on the Computing Continuum.
Proceedings of the IEEE 19th International Conference on Software Architecture Companion, 2022


GAIA 5G: A Multi-access Smart-Campus Architecture.
Proceedings of the Internet of Things, 2022

Task Offloading in Computing Continuum Using Collaborative Reinforcement Learning.
Proceedings of the Internet of Things, 2022

Privacy-Preserving Cyber Threat Information Sharing Leveraging FL-Based Intrusion Detection in the Financial Sector.
Proceedings of the Digital Sovereignty in Cyber Security: New Challenges in Future Vision, 2022

Defining the Threat Manufacturer Usage Description Model for Sharing Mitigation Actions.
Proceedings of the 1st International Conference on 6G Networking, 2022

Deployment of 5G Network Applications over Multidomain and Dynamic Platforms.
Proceedings of the 2022 IEEE Future Networks World Forum, 2022

Dynamic Deployment and Testing of Virtual On-board Units in 5G.
Proceedings of the 2022 IEEE Future Networks World Forum, 2022

ETSI ZSM Driven Security Management in Future Networks.
Proceedings of the 2022 IEEE Future Networks World Forum, 2022

2021
CIoTVID: Towards an Open IoT-Platform for Infective Pandemic Diseases such as COVID-19.
Sensors, 2021

Climate-Aware and IoT-Enabled Selection of the Most Suitable Stone Fruit Tree Variety.
Sensors, 2021

IoTCrawler: Challenges and Solutions for Searching the Internet of Things.
Sensors, 2021

Data Protection by Design in the Context of Smart Cities: A Consent and Access Control Proposal.
Sensors, 2021

Distributed real-time SlowDoS attacks detection over encrypted traffic using Artificial Intelligence.
J. Netw. Comput. Appl., 2021

Implementation and evaluation of a privacy-preserving distributed ABC scheme based on multi-signatures.
J. Inf. Secur. Appl., 2021

Missing Data Imputation With Bayesian Maximum Entropy for Internet of Things Applications.
IEEE Internet Things J., 2021

Security and Privacy in Internet of Things-Enabled Smart Cities: Challenges and Future Directions.
IEEE Secur. Priv., 2021

The Challenges of Software Cybersecurity Certification [Building Security In].
IEEE Secur. Priv., 2021

A Survey of Cybersecurity Certification for the Internet of Things.
ACM Comput. Surv., 2021

Defining the Behavior of IoT Devices Through the MUD Standard: Review, Challenges, and Research Directions.
IEEE Access, 2021

A Trusted Approach for Decentralised and Privacy-Preserving Identity Management.
IEEE Access, 2021

Architecture for Orchestrating Dynamic DNN-Powered Image Processing Tasks in Edge and Cloud Devices.
IEEE Access, 2021

Holistic IoT Architecture for Secure Lightweight Communication, Firmware Update, and Trust Monitoring.
Proceedings of the IEEE International Conference on Smart Internet of Things, 2021

Interoperable and Intelligent Architecture for Smart Buildings.
Proceedings of the IEEE International Conference on Smart Internet of Things, 2021

Privacy-Preserving Identity Management and Applications to Academic Degree Verification.
Proceedings of the Privacy and Identity Management. Between Data Protection and Security, 2021

An automated CI/CD process for testing and deployment of Network Applications over 5G infrastructure.
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2021

BIGcoldTRUCKS: a BIG data dashboard for the management of COLD chain logistics in refrigerated TRUCKS.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

Towards a standardized model for privacy-preserving Verifiable Credentials.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

Enhancing trust and liability assisted mechanisms for ZSM 5G architectures.
Proceedings of the 4th IEEE 5G World Forum, 2021

2020
Semantic-Aware Security Orchestration in SDN/NFV-Enabled IoT Systems.
Sensors, 2020

An Artificial Intelligence-Based Collaboration Approach in Industrial IoT Manufacturing: Key Concepts, Architectural Extensions and Potential Applications.
Sensors, 2020

A Comprehensive Survey about Thermal Comfort under the IoT Paradigm: Is Crowdsensing the New Horizon?
Sensors, 2020

Impact of SCHC Compression and Fragmentation in LPWAN: A Case Study with LoRaWAN.
Sensors, 2020

Secure Authentication and Credential Establishment in Narrowband IoT and 5G.
Sensors, 2020

The OLYMPUS Architecture - Oblivious Identity Management for Private User-Friendly Services.
Sensors, 2020

Security Architecture for Defining and Enforcing Security Profiles in DLT/SDN-Based IoT Systems.
Sensors, 2020

Evaluation of the Use of Compressed Sensing in Data Harvesting for Vehicular Sensor Networks.
Sensors, 2020

Digital Transformation of Agriculture through the Use of an Interoperable Platform.
Sensors, 2020

Lightweight Data-Security Ontology for IoT.
Sensors, 2020

Enhancing Extensive and Remote LoRa Deployments through MEC-Powered Drone Gateways.
Sensors, 2020

Distributed Security Framework for Reliable Threat Intelligence Sharing.
Secur. Commun. Networks, 2020

Virtual IoT HoneyNets to Mitigate Cyberattacks in SDN/NFV-Enabled IoT Networks.
IEEE J. Sel. Areas Commun., 2020

Application Layer Key Establishment for End-to-End Security in IoT.
IEEE Internet Things J., 2020

An Interledger Blockchain Platform for Cross-Border Management of Cybersecurity Information.
IEEE Internet Comput., 2020

ARIES: Evaluation of a reliable and privacy-preserving European identity management framework.
Future Gener. Comput. Syst., 2020

SDN enabled Information Centric Networking (ICN) as a Service prefetching mechanism for HyperText Transfer Protocol (HTTP) based services. The scalable video streaming case.
CoRR, 2020

Evaluation of a zone encryption scheme for vehicular networks.
Comput. Networks, 2020

Classification of spatio-temporal trajectories from Volunteer Geographic Information through fuzzy rules.
Appl. Soft Comput., 2020

Users Supporting Multiple (Mobile) Electronic Payment Systems in Online Purchases: An Empirical Study of Their Payment Transaction Preferences.
IEEE Access, 2020

Enabling Roaming Across Heterogeneous IoT Wireless Networks: LoRaWAN MEETS 5G.
IEEE Access, 2020

MIGRATE: Mobile Device Virtualisation Through State Transfer.
IEEE Access, 2020

Security Orchestration and Enforcement in NFV/SDN-Aware UAV Deployments.
IEEE Access, 2020

A Machine Learning Security Framework for Iot Systems.
IEEE Access, 2020

Quality Criteria for Cyber Security MOOCs.
Proceedings of the Information Security Education. Information Security in Action, 2020

Applying Security Service Level Agreements in V2X Network Slices.
Proceedings of the 2020 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2020

Domain Agnostic Quality of Information Metrics in IoT-Based Smart Environments.
Proceedings of the Intelligent Environments 2020, 2020

Dependable Content-Aware Prefetching for HTTP Applications over ICN as a Service.
Proceedings of the 46th Annual Conference of the IEEE Industrial Electronics Society, 2020

QoS and Resource aware Security Orchestration System.
Proceedings of the IEEE Global Communications Conference, 2020

Secure bootstrapping and header compression for IoT constrained networks.
Proceedings of the 2020 Global Internet of Things Summit, 2020

Updating IoT devices: challenges and potential approaches.
Proceedings of the 2020 Global Internet of Things Summit, 2020

OLYMPUS: A distributed privacy-preserving identity management system.
Proceedings of the 2020 Global Internet of Things Summit, 2020

Agri-food Research Centres as Drivers of Digital Transformation for Smart Agriculture.
Proceedings of the 2020 Global Internet of Things Summit, 2020

Adaptation of EAP-NOOB Method for LoRaWAN with LO-CoAP-EAP and CBOR.
Proceedings of the 2020 Global Internet of Things Summit, 2020


Enforcing GDPR regulation to vehicular 5G communications using edge virtual counterparts.
Proceedings of the 3rd IEEE 5G World Forum, 2020

2019
IoTCrawler. Managing Security and Privacy for IoT.
Proceedings of the Security and Privacy in the Internet of Things: Challenges and Solutions, 2019

USEIT Project: Empowering the Users to Protect Their Data.
Proceedings of the Security and Privacy in the Internet of Things: Challenges and Solutions, 2019

Enabling Virtual AAA Management in SDN-Based IoT Networks.
Sensors, 2019

LPWAN-Based Vehicular Monitoring Platform with a Generic IP Network Interface.
Sensors, 2019

Empowering the Internet of Vehicles with Multi-RAT 5G Network Slicing.
Sensors, 2019

PLUG-N-HARVEST Architecture for Secure and Intelligent Management of Near-Zero Energy Buildings.
Sensors, 2019

Security Management Architecture for NFV/SDN-Aware IoT Systems.
IEEE Internet Things J., 2019

Toward a Cybersecurity Certification Framework for the Internet of Things.
IEEE Secur. Priv., 2019

An open IoT platform for the management and analysis of energy data.
Future Gener. Comput. Syst., 2019

Architecture of security association establishment based on bootstrapping technologies for enabling secure IoT infrastructures.
Future Gener. Comput. Syst., 2019

Risk-based automated assessment and testing for the cybersecurity certification and labelling of IoT devices.
Comput. Stand. Interfaces, 2019

Overview of Device Access Control in the IoT and its Challenges.
IEEE Commun. Mag., 2019

Extending MUD Profiles Through an Automated IoT Security Testing Methodology.
IEEE Access, 2019

Privacy-Preserving Solutions for Blockchain: Review and Challenges.
IEEE Access, 2019

On the Automation of Security Testing for IoT Constrained Scenarios.
Proceedings of the Information Security Applications - 20th International Conference, 2019

IoT for Water Management: Towards Intelligent Anomaly Detection.
Proceedings of the 5th IEEE World Forum on Internet of Things, 2019

EAP-Based Bootstrapping for Secondary Service Authentication to Integrate IoT into 5G Networks.
Proceedings of the Mobile Internet Security - 4th International Symposium, 2019

MEC-Assisted End-to-End 5G-Slicing for IoT.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

OLYMPUS: towards Oblivious identitY Management for Private and User-friendly Services.
Proceedings of the 2019 Global IoT Summit, 2019

An interoperable platform for the digital transformation of the agricultural sector.
Proceedings of the 2019 Global IoT Summit, 2019

Towards an Ontology for IoT Context-Based Security Evaluation.
Proceedings of the 2019 Global IoT Summit, 2019

Virtual IoT Systems: Boosting IoT Innovation by Decoupling Things Providers and Applications Developers.
Proceedings of the 2019 Global IoT Summit, 2019

Toward a Blockchain-based Platform to Manage Cybersecurity Certification of IoT devices.
Proceedings of the 2019 IEEE Conference on Standards for Communications and Networking, 2019

Performance Study of LoRaWAN for Smart-City Applications.
Proceedings of the 2nd IEEE 5G World Forum, 5GWF 2019, Dresden, Germany, September 30, 2019

Information-Centric Networking Future Internet Video Delivery.
Proceedings of the User-Centric and Information-Centric Networking and Services: Access Networks, 2019

2018
Offloading Positioning onto Network Edge.
Wirel. Commun. Mob. Comput., 2018

BEATS: Blocks of Eigenvalues Algorithm for Time Series Segmentation.
IEEE Trans. Knowl. Data Eng., 2018

Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach.
Sensors, 2018

Performance Evaluation of LoRa Considering Scenario Conditions.
Sensors, 2018

5G NB-IoT: Efficient Network Traffic Filtering for Multitenant IoT Cellular Networks.
Secur. Commun. Networks, 2018

Enhancing IoT security through network softwarization and virtual security appliances.
Int. J. Netw. Manag., 2018

Special issue on management of IoT.
Int. J. Netw. Manag., 2018

Matching federation identities, the eduGAIN and STORK approach.
Future Gener. Comput. Syst., 2018

Evolving IoT networks by the confluence of MEC and LP-WAN paradigms.
Future Gener. Comput. Syst., 2018

Preface.
Proceedings of the 1st Workshop on Behavioral Change and Ambient Intelligence for Sustainability, 2018

Protecting personal data in IoT platform scenarios through encryption-based selective disclosure.
Comput. Commun., 2018

Integration of Anonymous Credential Systems in IoT Constrained Environments.
IEEE Access, 2018

A Lightweight and Flexible Encryption Scheme to Protect Sensitive Data in Smart Building Scenarios.
IEEE Access, 2018

Machine learning based electric load forecasting for short and long-term period.
Proceedings of the 4th IEEE World Forum on Internet of Things, 2018

Towards privacy preserving data provenance for the Internet of Things.
Proceedings of the 4th IEEE World Forum on Internet of Things, 2018

IPv6 communications over LoRa for future IoV services.
Proceedings of the 4th IEEE World Forum on Internet of Things, 2018

Test-based risk assessment and security certification proposal for the Internet of Things.
Proceedings of the 4th IEEE World Forum on Internet of Things, 2018

Empirical Study of Massive Set-Point Behavioral Data: Towards a Cloud-Based Artificial Intelligence that Democratizes Thermostats.
Proceedings of the 2018 IEEE International Conference on Smart Computing, 2018

Classification of Spatio-Temporal Trajectories Based on Support Vector Machines.
Proceedings of the Advances in Practical Applications of Agents, Multi-Agent Systems, and Complexity: The PAAMS Collection, 2018

Leveraging OTT and ISP Cooperation to Enhance End to End QoS by Exchanging Valuable Resources.
Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018

Managing AAA in NFV/SDN-enabled IoT scenarios.
Proceedings of the 2018 Global Internet of Things Summit, 2018

Detaching the design, development and execution of big data analysis processes: A case study based on energy and behavioral analytics.
Proceedings of the 2018 Global Internet of Things Summit, 2018


Internet Access for LoRaWAN Devices Considering Security Issues.
Proceedings of the 2018 Global Internet of Things Summit, 2018

2017
An ARM-Compliant Architecture for User Privacy in Smart Cities: SMARTIE - Quality by Design in the IoT.
Wirel. Commun. Mob. Comput., 2017

SecRBAC: Secure data in the Clouds.
IEEE Trans. Serv. Comput., 2017

Applicability of Big Data Techniques to Smart Cities Deployments.
IEEE Trans. Ind. Informatics, 2017

Providing Personalized Energy Management and Awareness Services for Energy Efficiency in Smart Buildings.
Sensors, 2017

Fuzzy Modelling for Human Dynamics Based on Online Social Networks.
Sensors, 2017

Holistic Privacy-Preserving Identity Management System for the Internet of Things.
Mob. Inf. Syst., 2017

Towards Interoperabilty in Identity Federation Systems.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2017

Integrating LP-WAN Communications within the Vehicular Ecosystem.
J. Internet Serv. Inf. Secur., 2017

A user-centric Internet of Things platform to empower users for managing security and privacy concerns in the Internet of Energy.
Int. J. Distributed Sens. Networks, 2017

ARIES: Reliable European Identity Ecosystem.
ERCIM News, 2017

Towards seamless inter-technology handovers in vehicular IPv6 communications.
Comput. Stand. Interfaces, 2017

Adaptation of Ontology Sets for Water Related Scenarios Management with IoT Systems for a More Productive and Sustainable Agriculture Systems.
Proceedings of the Joint Proceedings of SEMANTiCS 2017 Workshops co-located with the 13th International Conference on Semantic Systems (SEMANTiCS 2017), 2017

Transmission Technologies Comparison for IoT Communications in Smart-Cities.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

ANASTACIA: Advanced networked agents for security and trust assessment in CPS IoT architectures.
Proceedings of the Global Internet of Things Summit, 2017

A digital envelope approach using attribute-based encryption for secure data exchange in IoT scenarios.
Proceedings of the Global Internet of Things Summit, 2017

Integration of serious games and IoT data management platforms to motivate behavioural change for energy efficient lifestyles.
Proceedings of the Global Internet of Things Summit, 2017

Data aggregation, fusion and recommendations for strengthening citizens energy-aware behavioural profiles.
Proceedings of the Global Internet of Things Summit, 2017

Human mobility analysis based on social media and fuzzy clustering.
Proceedings of the Global Internet of Things Summit, 2017

User-centric access control for efficient security in smart cities.
Proceedings of the Global Internet of Things Summit, 2017

Towards provisioning of SDN/NFV-based security enablers for integrated protection of IoT systems.
Proceedings of the IEEE Conference on Standards for Communications and Networking, 2017

Data driven modeling for energy consumption prediction in smart buildings.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

Towards a Privacy-Preserving Reliable European Identity Ecosystem.
Proceedings of the Privacy Technologies and Policy - 5th Annual Privacy Forum, 2017

2016
Securing Vehicular IPv6 Communications.
IEEE Trans. Dependable Secur. Comput., 2016

Big data: the key to energy efficiency in smart buildings.
Soft Comput., 2016

TACIoT: multidimensional trust-aware access control system for the Internet of Things.
Soft Comput., 2016

Vehicle Maneuver Detection with Accelerometer-Based Classification.
Sensors, 2016

Mobility and security in a real VANET deployed in a heterogeneous networks.
Secur. Commun. Networks, 2016

Human Mobility Modelling Based on Dense Transit Areas Detection with Opportunistic Sensing.
Mob. Inf. Syst., 2016

Enabling end-to-end CoAP-based communications for the Web of Things.
J. Netw. Comput. Appl., 2016

A complex event processing approach to detect abnormal behaviours in the marine environment.
Inf. Syst. Frontiers, 2016

Human Mobility Prediction Based on Social Media with Complex Event Processing.
Int. J. Distributed Sens. Networks, 2016

DCapBAC: embedding authorization logic into smart things through ECC optimizations.
Int. J. Comput. Math., 2016

Online route prediction based on clustering of meaningful velocity-change areas.
Data Min. Knowl. Discov., 2016

Extending SIP to support payments in a generic way.
Comput. Stand. Interfaces, 2016

ARMY: architecture for a secure and privacy-awar e lifecycle of smar t objects in the internet of my things.
IEEE Commun. Mag., 2016

Message from the workshop co-chairs.
Proceedings of the 17th IEEE International Symposium on A World of Wireless, 2016

ARMOUR: Large-scale experiments for IoT security & trust.
Proceedings of the 3rd IEEE World Forum on Internet of Things, 2016

An overview on delegated authorization for CoAP: Authentication and authorization for Constrained Environments (ACE).
Proceedings of the 3rd IEEE World Forum on Internet of Things, 2016

Security certification and labelling in Internet of Things.
Proceedings of the 3rd IEEE World Forum on Internet of Things, 2016

Opportunistic smart object aggregation based on clustering and event processing.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

A semantic approach towards implementing energy efficient lifestyles through behavioural change.
Proceedings of the 12th International Conference on Semantic Systems, 2016

An ARM-compliant IoT platform: Security by design for the smart home.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

Towards Energy Efficiency Smart Buildings Models Based on Intelligent Data Analytics.
Proceedings of the 7th International Conference on Ambient Systems, 2016

2015
Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things.
Sensors, 2015

MagicFinger: 3D Magnetic Fingerprints for Indoor Location.
Sensors, 2015

Toward a Lightweight Authentication and Authorization Framework for Smart Objects.
IEEE J. Sel. Areas Commun., 2015

Guest Editorial: Smart Things, Big Data Technology and Ubiquitous Computing solutions for the future Internet of Things.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2015

Real Experience with IPv6 Communications in Highways.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2015

SAFIR: Secure access framework for IoT-enabled services on smart buildings.
J. Comput. Syst. Sci., 2015

CEP-traj: An event-based solution to process trajectory data.
Inf. Syst., 2015

A complex event processing approach to perceive the vehicular context.
Inf. Fusion, 2015

An IoT based framework for user-centric smart building services.
Int. J. Web Grid Serv., 2015

Intercloud Trust and Security Decision Support System: an Ontology-based Approach.
J. Grid Comput., 2015

Building integrated business environments: analysing open-source ESB.
Enterp. Inf. Syst., 2015

Evaluation and recommendations on IPv6 for the Internet of Things.
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015

Towards human mobility extraction based on social media with Complex Event Processing.
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015

Dynamic security credentials PANA-based provisioning for IoT smart objects.
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015

Context sensitive indoor temperature forecast for energy efficient operation of smart buildings.
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015

Big data for IoT services in smart cities.
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015

MagicFinger: A New Approach to Indoor Localization.
Proceedings of the Ubiquitous Computing and Ambient Intelligence. Sensing, Processing, and Using Environmental Information, 2015

An indoor localization system based on 3D magnetic fingerprints for smart buildings.
Proceedings of the 2015 IEEE RIVF International Conference on Computing & Communication Technologies, 2015

How to intelligently make sense of real data of smart cities.
Proceedings of the International Conference on Recent Advances in Internet of Things, 2015

SMARTIE project: Secure IoT data management for smart cities.
Proceedings of the International Conference on Recent Advances in Internet of Things, 2015

Integrating an identity-based control plane with the HIMALIS network architecture.
Proceedings of the 1st IEEE Conference on Network Softwarization, 2015

Using an Identity Plane for Adapting Network Behavior to User and Service Requirements.
Proceedings of the Mobile Networks and Management - 7th International Conference, 2015

A required security and privacy framework for smart objects.
Proceedings of the 2015 ITU Kaleidoscope: Trust in the Information Society, 2015

Tram-Based Mobility Mining with Event Processing of Transit-Card Transactions.
Proceedings of the IEEE 18th International Conference on Intelligent Transportation Systems, 2015

A vehicular network mobility framework: Architecture, deployment and evaluation.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Certificateless and Privacy-Enhancing Group Sharing Mechanism for the Future Internet.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Exploiting IoT-based sensed data in smart buildings to model its energy consumption.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Online Urban Mobility Detection Based on Velocity Features.
Proceedings of the Big Data Analytics and Knowledge Discovery, 2015

Security and Privacy in Vehicular Communications with INTER-TRUST.
Proceedings of the Cyber Security and Privacy, 2015

Enabling SDN Experimentation with Wired and Wireless Resources: The SmartFIRE Facility.
Proceedings of the Cloud Computing - 6th International Conference, 2015

Design and Deployment of Federation Testbed in EU-KR for Identifier-based communications.
Proceedings of the 10th International Conference on Future Internet, 2015

Managing Context Information for Adaptive Security in IoT Environments.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

2014
Taxonomy of trust relationships in authorization domains for cloud computing.
J. Supercomput., 2014

A soft computing based location-aware access control for smart buildings.
Soft Comput., 2014

How can We Tackle Energy Efficiency in IoT BasedSmart Buildings?
Sensors, 2014

GNSS Autonomous Localization: NLOS Satellite Detection Based on 3-D Maps.
IEEE Robotics Autom. Mag., 2014

Drug identification and interaction checker based on IoT to minimize adverse drug reactions and improve drug compliance.
Pers. Ubiquitous Comput., 2014

Participative marketing: extending social media marketing through the identification and interaction capabilities from the Internet of things.
Pers. Ubiquitous Comput., 2014

Mobile digcovery: discovering and interacting with the world through the Internet of things.
Pers. Ubiquitous Comput., 2014

Extending the Internet of Things to the Future Internet through IPv6 support.
Mob. Inf. Syst., 2014

Lightweight MIPv6 with IPSec support.
Mob. Inf. Syst., 2014

Building a reputation-based bootstrapping mechanism for newcomers in collaborative alert systems.
J. Comput. Syst. Sci., 2014

Communication Protocol for Enabling Continuous Monitoring of Elderly People through Near Field Communications.
Interact. Comput., 2014

IPv6 Communication Stack for Deploying Cooperative Vehicular Services.
Int. J. Intell. Transp. Syst. Res., 2014

A Framework for Supporting Network Continuity in Vehicular IPv6 Communications.
IEEE Intell. Transp. Syst. Mag., 2014

Semantic Web of Things: an analysis of the application semantics for the IoT moving towards the IoT convergence.
Int. J. Web Grid Serv., 2014

Empowering Security and Mobility in Future Networks with an Identity-Based Control Plane.
IEICE Trans. Commun., 2014

Semantic-aware multi-tenancy authorization system for cloud architectures.
Future Gener. Comput. Syst., 2014

User-centric smart buildings for energy sustainable smart cities.
Trans. Emerg. Telecommun. Technol., 2014

Trustworthy placements: Improving quality and resilience in collaborative attack detection.
Comput. Networks, 2014

A process-based Internet of Things.
Proceedings of the IEEE World Forum on Internet of Things, 2014

A decentralized approach for security and privacy challenges in the Internet of Things.
Proceedings of the IEEE World Forum on Internet of Things, 2014

User role in IoT-based systems.
Proceedings of the IEEE World Forum on Internet of Things, 2014

Co-creation as the Key to a Public, Thriving, Inclusive and Meaningful EU IoT.
Proceedings of the Ubiquitous Computing and Ambient Intelligence. Personalisation and User Adapted Services, 2014

Privacy-Preserving Security Framework for a Social-Aware Internet of Things.
Proceedings of the Ubiquitous Computing and Ambient Intelligence. Personalisation and User Adapted Services, 2014

Towards Privacy-Preserving Data Sharing in Smart Environments.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

A network access control solution based on PANA for intelligent transportation systems.
Proceedings of the International Conference on Connected Vehicles and Expo, 2014

A holistic IoT-based management platform for smart environments.
Proceedings of the IEEE International Conference on Communications, 2014

Design of an Event-based architecture for the intra-vehicular context perception.
Proceedings of the 17th International Conference on Information Fusion, 2014

A Framework for Citizen Participation in the Internet of Things.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014

A New Location-Aware Authorization Mechanism for Indoor Environments.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014

2013
Teaching Advanced Concepts in Computer Networks: VNUML-UM Virtualization Tool.
IEEE Trans. Learn. Technol., 2013

PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices.
Sensors, 2013

IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6).
Sensors, 2013

Shifting primes: Optimizing elliptic curve cryptography for 16-bit devices without hardware multiplier.
Math. Comput. Model., 2013

Multiplication and Squaring with Shifting Primes on OpenRISC Processors with Hardware Multiplier.
J. Univers. Comput. Sci., 2013

Evaluation of Bluetooth Low Energy Capabilities for Tele-mobile Monitoring in Home-care.
J. Univers. Comput. Sci., 2013

Interconnection Framework for mHealth and Remote Monitoring Based on the Internet of Things.
IEEE J. Sel. Areas Commun., 2013

The Internet of Everything through IPv6: An Analysis of Challenges, Solutions and Opportunities.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

RepCIDN: A Reputation-based Collaborative Intrusion Detection Network to Lessen the Impact of Malicious Alarms.
J. Netw. Syst. Manag., 2013

Distributed Capability-based Access Control for the Internet of Things.
J. Internet Serv. Inf. Secur., 2013

An indoor localization system based on artificial neural networks and particle filters applied to intelligent buildings.
Neurocomputing, 2013

KAMU: providing advanced user privacy in Kerberos multi-domain scenarios.
Int. J. Inf. Sec., 2013

Comprehensive Vehicular Networking Platform for V2I and V2V Communications within the Walkie-Talkie Project.
Int. J. Distributed Sens. Networks, 2013

Secure and scalable mobility management scheme for the Internet of Things integration in the future internet architecture.
Int. J. Ad Hoc Ubiquitous Comput., 2013

SCTP as scalable video coding transport.
EURASIP J. Adv. Signal Process., 2013

Scalable Oriented-Service Architecture for Heterogeneous and Ubiquitous IoT Domains.
CoRR, 2013

Beyond the separation of identifier and locator: Building an identity-based overlay network architecture for the Future Internet.
Comput. Networks, 2013

Vehicle-to-infrastructure messaging proposal based on CAM/DENM specifications.
Proceedings of the IFIP Wireless Days, 2013

Context-Aware Energy Efficiency in Smart Buildings.
Proceedings of the Ubiquitous Computing and Ambient Intelligence. Context-Awareness and Context-Driven Interaction, 2013

Improving Kerberos Ticket Acquisition during Application Service Access Control.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2013

Internet of Things - Security, Privacy and Trust Considerations.
Proceedings of the Secure Data Management - 10th VLDB Workshop, 2013

A Global Perspective of Smart Cities: A Survey.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Evaluating Video Streaming in Network Architectures for the Internet of Things.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Evaluation Framework for IEEE 802.15.4 and IEEE 802.11 for Smart Cities.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Evolution Towards Better AAL Environments.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Shifting Primes on OpenRISC Processors with Hardware Multiplier.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Lightweight Mobile IPv6: A mobility protocol for enabling transparent IPv6 mobility in the Internet of Things.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

An overlay network approach to find objects in the future internet.
Proceedings of the 2013 Future Network & Mobile Summit, Lisboa, Portugal, July 3-5, 2013, 2013

IoT6 - Moving to an IPv6-Based Future IoT.
Proceedings of the Future Internet, 2013

Towards a Secure Network Virtualization Architecture for the Future Internet.
Proceedings of the Future Internet, 2013

Survey of Internet of Things Technologies for Clinical Environments.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

Mobile Digcovery: A Global Service Discovery for the Internet of Things.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

Enabling Participative Marketing through the Internet of Things.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

IEEE AINA 2013 Keynote Talk II: The impact of internet of things in big data approach and future internet.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

Smart Lighting Solutions for Smart Cities.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
Automatic Design of an Indoor User Location Infrastructure Using a Memetic Multiobjective Approach.
IEEE Trans. Syst. Man Cybern. Part C, 2012

A Cooperative Approach to Traffic Congestion Detection With Complex Event Processing and VANET.
IEEE Trans. Intell. Transp. Syst., 2012

A Two-Layers Based Approach of an Enhanced-Mapfor Urban Positioning Support.
Sensors, 2012

A Real-Time Measurement System for Long-Life Flood Monitoring and Warning Applications.
Sensors, 2012

Architecture for Improving Terrestrial Logistics Based on the Web of Things.
Sensors, 2012

Evaluation of the Impact of Furniture on Communications Performance for Ubiquitous Deployment of Wireless Sensor Networks in Smart Homes.
Sensors, 2012

Glowbal IP: An adaptive and transparent IPv6 integration in the Internet of Things.
Mob. Inf. Syst., 2012

A Non-monotonic Expressiveness Extension on the Semantic Web Rule Language.
J. Web Eng., 2012

A Novel Identity-based Network Architecture for Next Generation Internet.
J. Univers. Comput. Sci., 2012

Secure and Robust Framework for ID/Locator Mapping System.
IEICE Trans. Inf. Syst., 2012

Payment frameworks for the purchase of electronic products and services.
Comput. Stand. Interfaces, 2012

Network access security for the internet: protocol for carrying authentication for network access.
IEEE Commun. Mag., 2012

Using identities to achieve enhanced privacy in future content delivery networks.
Comput. Electr. Eng., 2012

Responsive on-line gateway load-balancing for wireless mesh networks.
Ad Hoc Networks, 2012

Extending Near Field Communications to Enable Continuous Data Transmission in Clinical Environments.
Proceedings of the Ubiquitous Computing and Ambient Intelligence, 2012

Knowledge Acquisition and Management Architecture for Mobile and Personal Health Environments Based on the Internet of Things.
Proceedings of the 11th IEEE International Conference on Trust, 2012

GAIA Extended Research Infrastructure: Sensing, Connecting, and Processing the Real World.
Proceedings of the Testbeds and Research Infrastructure. Development of Networks and Communities, 2012

YOAPY: A Data Aggregation and Pre-processing Module for Enabling Continuous Healthcare Monitoring in the Internet of Things.
Proceedings of the Ambient Assisted Living and Home Care - 4th International Workshop, 2012

Building Network-aware Composite Services with the GEMBus Framework.
Proceedings of the 10th IEEE International Symposium on Parallel and Distributed Processing with Applications, 2012

An Indoor Localization Mechanism Based on RFID and IR Data in Ambient Intelligent Environments.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

A Lightweight and Identity-Based Network Architecture for the Internet of Things.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Shifting Primes: Optimizing Elliptic Curve Cryptography for Smart Things.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Home Telehealth Interventions for People with Asthma.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Marketing 4.0: A New Value Added to the Marketing through the Internet of Things.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Light-Weight Multicast DNS and DNS-SD (lmDNS-SD): IPv6-Based Resource and Service Discovery for the Web of Things.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Interaction of Patients with Breathing Problems through NFC in Ambient Assisted Living Environments.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Evaluation of Bluetooth Low Energy Capabilities for Continuous Data Transmission from a Wearable Electrocardiogram.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

An Analysis of M2M Platforms: Challenges and Opportunities for the Internet of Things.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Web of Things as a Product Improvement tool: Furniture as Case Study.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Ubiquitous deployment configuration of indoor location services.
Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN), 2012

An adaptive learning fuzzy logic system for indoor localisation using Wi-Fi in Ambient Intelligent Environments.
Proceedings of the FUZZ-IEEE 2012, 2012

Research and experimentation with the HIMALIS network architecture for future internet.
Proceedings of the 2012 Future Network & Mobile Summit, Berlin, Germany, July 4-6, 2012, 2012

Heterogeneous Testbeds, Tools and Experiments -Measurement Requirements Perspective.
Proceedings of the Measurement Methodology and Tools - First European Workshop, 2012

Multi-sensor Multi-target Tracking for Infrastructure Protection.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012

Using a gateway overlay network to achieve secure and scalable network interconnection.
Proceedings of the 2nd Baltic Congress on Future Internet Communications, 2012

2011
Mobile IP-Based Protocol for Wireless Personal Area Networks in Critical Environments.
Wirel. Pers. Commun., 2011

An advanced certificate validation service and architecture based on XKMS.
Softw. Pract. Exp., 2011

An internet of things-based personal device for diabetes therapy management in ambient assisted living (AAL).
Pers. Ubiquitous Comput., 2011

Semantic Web-Based Management of Routing Configurations.
J. Netw. Syst. Manag., 2011

Creating Context-Aware Collaborative Working Environments.
Int. J. Artif. Intell. Tools, 2011

Semantic-based authorization architecture for Grid.
Future Gener. Comput. Syst., 2011

Formal description of the SWIFT identity management framework.
Future Gener. Comput. Syst., 2011

Using cognitive agents in social simulations.
Eng. Appl. Artif. Intell., 2011

PrivaKERB: A user privacy framework for Kerberos.
Comput. Secur., 2011

Multipath routing with spatial separation in wireless multi-hop networks without location information.
Comput. Networks, 2011

Towards a Semantic-Aware Collaborative Working Environment.
Comput. Informatics, 2011

Combining Web 2.0 and Web Services in Collaborative Working Environments.
Comput. Informatics, 2011

Towards an Authorization System for Cloud Infrastructure Providers.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Evaluation of the electromagnetic absorption in furniture for the integration of UHF-RFID tags.
Proceedings of the 2011 IEEE International Conference on RFID-Technologies and Applications, 2011

Mobility in Collaborative Alert Systems: Building Trust through Reputation.
Proceedings of the NETWORKING 2011 Workshops - International IFIP TC 6 Workshops, PE-CRN, 2011

TCP Flow-Aware Channel Re-Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

An Ambient Assisted Living Platform to Integrate Biometric Sensors to Detect Respiratory Failures for Patients with Serious Breathing Problems.
Proceedings of the Ambient Assisted Living - Third International Workshop, 2011

GPS multipath detection and exclusion with elevation-enhanced maps.
Proceedings of the 14th International IEEE Conference on Intelligent Transportation Systems, 2011

Mobility Modeling and Security Validation of a Mobility Management Scheme Based on ECC for IP-based Wireless Sensor Networks (6LoWPAN).
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Secure Mobility Management Scheme for 6LoWPAN ID/Locator Split Architecture.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Real-Time Monitoring System for Watercourse Improvement and Flood Forecast.
Proceedings of the Convergence and Hybrid Information Technology, 2011

Analysis of the Future Internet of Things Capabilities for Continuous Temperature Monitoring of Blood Bags in Terrestrial Logistic Systems.
Proceedings of the Convergence and Hybrid Information Technology, 2011

Oxygen Cylinders Management Architecture Based on Internet of Things.
Proceedings of the International Conference on Computational Science and Its Applications, 2011

Distributed multi-sensor multi-target tracking with a low-cost wireless sensor network: an application to intruder detection.
Proceedings of the 41. Jahrestagung der Gesellschaft für Informatik, 2011

Protecting digital identities in future networks.
Proceedings of the 2011 Future Network & Mobile Summit, Warsaw, Poland, June 15-17, 2011, 2011

Providing security using IKEv2 in a vehicular network based on WiMAX technology.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

IMS and Presence Service Integration on Intelligent Transportation Systems for Future Services.
Proceedings of the Advances in Computing and Communications, 2011

Shifting Primes: Extension of Pseudo-Mersenne Primes to Optimize ECC for MSP430-Based Future Internet of Things Devices.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011

2010
An Integral and Networked Home Automation Solution for Indoor Ambient Intelligence.
IEEE Pervasive Comput., 2010

A Kerberized Architecture for Fast Re-authentication in Heterogeneous Wireless Networks.
Mob. Networks Appl., 2010

An Initial Approach to Support Mobility in Hospital Wireless Sensor Networks based on 6LoWPAN (HWSN6).
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010

Towards a Reference Architecture for Collaborative Work Environments.
Int. J. e Collab., 2010

Providing Adapted Contextual Information in an Overlay Vehicular Network.
Int. J. Digit. Multim. Broadcast., 2010

Event-driven architecture based on patterns for detecting complex attacks.
Int. J. Crit. Comput. Based Syst., 2010

Towards an authorisation model for distributed systems based on the Semantic Web.
IET Inf. Secur., 2010

Detection of semantic conflicts in ontology and rule-based information systems.
Data Knowl. Eng., 2010

Analysis of Handover Key Management schemes under IETF perspective.
Comput. Stand. Interfaces, 2010

PKI-based trust management in inter-domain scenarios.
Comput. Secur., 2010

Privacy-enhanced fast re-authentication for EAP-based next generation network.
Comput. Commun., 2010

Secure three-party key distribution protocol for fast network access in EAP-based wireless networks.
Comput. Networks, 2010

A feedback-based adaptive online algorithm for Multi-Gateway load-balancing in wireless mesh networks.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010

An IMS Based Vehicular Service Platform.
Proceedings of the 72nd IEEE Vehicular Technology Conference, 2010

A Pharmaceutical Intelligent Information System to detect allergies and Adverse Drugs Reactions based on internet of things.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

Modeling and analysis of the packet-level loss process in wireless channels.
Proceedings of the 13th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2010

Key Distribution Mechanisms for IEEE 802.21-Assisted Wireless Heterogeneous Networks.
Proceedings of the Mobile Networks and Management - Second International ICST Conference, 2010

Performance testing of distributed block-oriented storage over IP networks.
Proceedings of the 11th Latin American Test Workshop, 2010

An analysis of positioning and map-matching issues for GNSS-based road user charging.
Proceedings of the 13th International IEEE Conference on Intelligent Transportation Systems, 2010

A service oriented architecture for basic autonomic network management.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

Drugs interaction checker based on IoT.
Proceedings of the 2010 Internet of Things (IOT), IoT for a green Planet, Tokyo, Japan, November 29, 2010

Semantic description of multimedia contents for the optimization of the advertising impact on TV program grids.
Proceedings of the International Joint Conference on Neural Networks, 2010

Evaluating Open Source Enterprise Service Bus.
Proceedings of the IEEE 7th International Conference on e-Business Engineering, 2010

Identity based architecture for secure communication in future internet.
Proceedings of the 6th Workshop on Digital Identity Management, 2010

An Architecture Based on Internet of Things to Support Mobility and Security in Medical Environments.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

Deployment of a Secure Wireless Infrastructure Oriented to Vehicular Networks.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
TACS, a Trust Model for P2P Networks.
Wirel. Pers. Commun., 2009

Sharing Context-Aware Road and Safety Information.
IEEE Pervasive Comput., 2009

A New Fair Non-repudiation Protocol for Secure Negotiation and Contract Signing.
J. Univers. Comput. Sci., 2009

Towards the homogeneous access and use of PKI solutions: Design and implementation of a WS-XKMS server.
J. Syst. Archit., 2009

Performance analysis of a cross-layer SSO mechanism for a roaming infrastructure.
J. Netw. Comput. Appl., 2009

Design and implementation of a generic per-fee-link framework.
Internet Res., 2009

Assessment of VANET multi-hop routing over an experimental platform.
Int. J. Internet Protoc. Technol., 2009

Towards a lightweight content-based publish/subscribe services for peer-to-peer systems.
Int. J. Grid Util. Comput., 2009

A SWIFT Take on Identity Management.
Computer, 2009

Multi-layer framework for analysing and managing routing configurations.
Comput. Electr. Eng., 2009

A Trust and Reputation Model as Adaptive Mechanism for Multi-Agent Systems.
Inteligencia Artif., 2009

Achieving spatial disjointness in multipath routing without location information.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

Experimental analysis of multi-hop routing in vehicular ad-hoc networks.
Proceedings of the 5th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2009

Trusted Network Access Control in the Eduroam Federation.
Proceedings of the Third International Conference on Network and System Security, 2009

An Ambient Assisted Living System for Telemedicine with Detection of Symptoms.
Proceedings of the Bioinspired Applications in Artificial and Natural Computation, 2009

An Architecture for Ambient Assisted Living and Health Environments.
Proceedings of the Distributed Computing, 2009

Penetration of ITS concepts at the university level and willingness to their introduction.
Proceedings of the 12th International IEEE Conference on Intelligent Transportation Systems, 2009

NFC/RFID applications in medicine: security challenges and solutions.
Proceedings of the Workshops Proceedings of the 5th International Conference on Intelligent Environments, 2009

HWSN6: Hospital Wireless Sensor Networks Based on 6LoWPAN Technology: Mobility and Fault Tolerance Management.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

A Cluster-Based Framework for Spontaneous Collaboration without Infrastructure.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2008
Payment Annotations for Web Service Description Language (PA-WSDL).
Proceedings of the Computer and Information Science [outstanding papers from IEEE/ACIS ICIS/IWEA 2008], 2008

Towards interoperability: a wrapper model for integrating remote laboratories in a collaborative discovery learning environment.
Softw. Pract. Exp., 2008

A novel vehicle communication paradigm based on Cellular Networks for improving the safety in roads.
Int. J. Intell. Inf. Database Syst., 2008

OpenIKEv2: Design and Implementation of an IKEv2 Solution.
IEICE Trans. Inf. Syst., 2008

A proposal for extending the eduroam infrastructure with authorization mechanisms.
Comput. Stand. Interfaces, 2008

Architecture and evaluation of a unified V2V and V2I communication system based on cellular networks.
Comput. Commun., 2008

TR-clustering: Alleviating the impact of false clustering on P2P overlay networks.
Comput. Networks, 2008

Secure overlay networks for federated service provision and management.
Comput. Electr. Eng., 2008

Towards semantic web-based management of security services.
Ann. des Télécommunications, 2008

A Context-Sware Data Sharing Service over MANet to Enable Spontaneous Collaboration.
Proceedings of the 17th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2008

A distributed algorithm for gateway load-balancing in Wireless Mesh Networks.
Proceedings of the 1st IFIP Wireless Days, 2008

Towards the Definition of a Web Service Based Management Framework.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Event-Driven Architecture for Intrusion Detection Systems Based on Patterns.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Design-Time Learning for Operational Planning Improvement.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Managing the lifecycle of XACML delegation policies in federated environments.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Design of a Cluster-Based Peer to Peer Architecture for MANETs.
Proceedings of the XXVII International Conference of the Chilean Computer Science Society (SCCC 2008), 2008

Building and Managing Policy-Based Secure Overlay Networks.
Proceedings of the 16th Euromicro International Conference on Parallel, 2008

On the Feasibility of Dynamic Superpeer Ratio Maintenance.
Proceedings of the Proceedings P2P'08, 2008

Security Analysis and Security Optimizations for the Context Transfer Protocol.
Proceedings of the NTMS 2008, 2008

Spatially Disjoint Multipath Routing protocol without location information.
Proceedings of the LCN 2008, 2008

Supporting geographical queries onto DHTs.
Proceedings of the LCN 2008, 2008

Hybridized GPS/DR Positioning System With Unknown Initial Heading For Land Vehicles.
Proceedings of the 11th International IEEE Conference on Intelligent Transportation Systems, 2008

Ubiquitous information provision in the vehicle domain.
Proceedings of the Third International Symposium on Wireless Pervasive Computing, 2008

Bypass: Providing secure DHT routing through bypassing malicious peers.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

ACVS: An Advanced Certificate Validation Service in Service-Oriented Architectures.
Proceedings of the Third International Conference on Internet and Web Applications and Services, 2008

Towards e-Government: The security SOA approach of the University of Murcia.
Proceedings of the Third IEEE International Conference on Digital Information Management (ICDIM), 2008

Subrange Caching: Handling Popular Range Queries in DHTs.
Proceedings of the Data Management in Grid and Peer-to-Peer Systems, 2008

Levels of Assurance and Reauthentication in Federated Environments.
Proceedings of the Public Key Infrastructure, 2008

Secure Forwarding in DHTs - Is Redundancy the Key to Robustness?.
Proceedings of the Euro-Par 2008, 2008

LightPS: Lightweight Content-Based Publish/Subscribe for Peer-to-Peer Systems.
Proceedings of the Second International Conference on Complex, 2008

Adaptability of the TRSIM Model to Some Changes in Agents Behaviour.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

Building a distributed AOP middleware for large scale systems.
Proceedings of the 2008 Workshop on Next Generation Aspect Oriented Middleware, 2008

A wearable system for Tele-monitoring and Tele-assistance of patients with integration of solutions from chronobiology for prediction of illness.
Proceedings of the Ambient Intelligence Perspectives, 2008

Towards a Generic Payment Framework for Internet Media-on-Demand Services Based on RTSP.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
High-Integrity IMM-EKF-Based Road Vehicle Navigation With Low-Cost GPS/SBAS/INS.
IEEE Trans. Intell. Transp. Syst., 2007

Towards semantic-aware management of security services in GT4.
Multiagent Grid Syst., 2007

A Survey of Electronic Signature Solutions in Mobile Devices.
J. Theor. Appl. Electron. Commer. Res., 2007

A network access control approach based on the AAA architecture and authorization attributes.
J. Netw. Comput. Appl., 2007

Deploying authorisation mechanisms for federated services in eduroam (DAMe).
Internet Res., 2007

Managing semantic-aware policies in a distributed firewall scenario.
Internet Res., 2007

Improving interpretability in approximative fuzzy models via multiobjective evolutionary algorithms.
Int. J. Intell. Syst., 2007

Editorial Wireless Mobile Networks: Cross-Layer Communication.
IET Commun., 2007

SCOMET: Adapting Collaborative Working Environments to the MANET Scenario.
Proceedings of the 16th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE 2007), 2007

Smartcard-Based e-Coin for Electronic Payments on the (Mobile) Internet.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

A Proposal for Extending the Eduroam Infrastructure with Authorization Mechanisms.
Proceedings of the Security in Information Systems, 2007

POSITIF: A Policy-Based Security Management System.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

3-Party Approach for Fast Handover in EAP-Based Wireless Networks.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

Aspect-Oriented Programing Techniques to support Distribution, Fault Tolerance, and Load Balancing in the CORBA-LC Component Model.
Proceedings of the Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007), 12, 2007

Cryptographic identity based solution for fast handover on EAP wireless networks.
Proceedings of the 9th IFIP International Conference on Mobile Wireless Communications Networks, 2007

Network-Layer Assisted Mechanism to Optimize Authentication Delay during Handoff in 802.11 Networks.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

On the Behaviour of the TRSIM Model for Trust and Reputation.
Proceedings of the Multiagent System Technologies, 5th German Conference, 2007

A Comparative Study of Hierarchical DHT Systems.
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007

Multiple Model based Lane Change Prediction for Road Vehicles with Low Cost GPS/IMU.
Proceedings of the IEEE Intelligent Transportation Systems Conference, 2007

Pre-Authentication Based Enhancement for Access Control in Hybrid MANETs.
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007

SQS: Similarity Query Scheme for Peer-to-Peer Databases.
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007

Designing a Generic Collaborative Working Environment.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

Adaptive Peer-to-Peer Web Clustering using Distributed Aspect Middleware (Damon).
Proceedings of the 2nd International Workshop on Adaptation and Evolution in Web Systems Engineering AEWSE'07, 2007

Towards a Semantically Augmented Collaborative Working Environment - Designing a Service Oriented Architecture Environment for eProfesionals.
Proceedings of the ICE-B 2007, 2007

Towards a generic per-fee-link framework.
Proceedings of the Second IEEE International Conference on Digital Information Management (ICDIM), 2007

A Context-Aware Solution for Personalized En-route Information Through a P2P Agent-Based Architecture.
Proceedings of the Computational Science and Its Applications, 2007

Secure Protocol for Fast Authentication in EAP-Based Wireless Networks.
Proceedings of the Computational Science and Its Applications, 2007

On the Relationship between Caching and Routing in DHTs.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2007

Bootstrapping a Global SSO from Network Access Control Mechanisms.
Proceedings of the Public Key Infrastructure, 2007

Extending the Common Services of eduGAIN with a Credential Conversion Service.
Proceedings of the Computer Security, 2007

Filling the Gap Between Middleware and User Interactions in a Discovery Learning Environment.
Proceedings of the Technologies for E-Learning and Digital Entertainment, 2007

A Proposal for the Definition of Operational Plans to Provide Dependability and Security.
Proceedings of the Critical Information Infrastructures Security, 2007

Designing an interoperable infrastructure for synchronous collaboration.
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007

A Multiplatform OSGi Based Architecture for Developing Road Vehicle Services.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

A Payment Framework for Internet Media-on-Demand Services based on RTSP.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

SIP extensions to support (micro)payments.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Fuzzy approach to the intelligent management of virtual spaces.
IEEE Trans. Syst. Man Cybern. Part B, 2006

Multicast <i>ad hoc</i> routing through mobility-aware Steiner tree meshes with consistency across different mobility models.
Int. J. Parallel Emergent Distributed Syst., 2006

Information and Hybrid Architecture Model of the OCP Contextual Information Management System.
J. Univers. Comput. Sci., 2006

Performance Evaluation of Interconnection Mechanisms for Ad Hoc Networks across Mobility Models.
J. Networks, 2006

Multi-objective evolutionary computation and fuzzy optimization.
Int. J. Approx. Reason., 2006

Dynamic and secure management of VPNs in IPv6 multi-domain scenarios.
Comput. Commun., 2006

Dynamic Policy-Based Network Management for a Secure Coalition Environment.
IEEE Commun. Mag., 2006

Enabling Wide-Area Service Oriented Architecture through the p2pWeb Model.
Proceedings of the 15th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE 2006), 2006

Monitoring the Position Integrity in Road Transport Localization Based Services.
Proceedings of the 64th IEEE Vehicular Technology Conference, 2006

Grid Authorization Based on Existing AAA Architectures.
Proceedings of the Security in Information Systems, 2006

Using Microsoft Office Infopath to Generate XACML Policies.
Proceedings of the SECRYPT 2006, 2006

Combination of a Smartcard E-Purse and E-Coin to Make Electronic Payments on the Internet.
Proceedings of the SECRYPT 2006, 2006

Virtual identities in authentication and authorization scenarios.
Proceedings of the 2006 International Conference on Privacy, 2006

On the Application of Clustering Techniques to Support Debugging Large-Scale Multi-Agent Systems.
Proceedings of the Programming Multi-Agent Systems, 4th International Workshop, 2006

Distributed Provision and Management of Security Services in Globus Toolkit 4.
Proceedings of the On the Move to Meaningful Internet Systems 2006: CoopIS, 2006

IMM-EKF based Road Vehicle Navigation with Low Cost GPS/INS.
Proceedings of the 2006 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, 2006

A New Model for Trust and Reputation Management with an Ontology Based Approach for Similarity Between Tasks.
Proceedings of the Multiagent System Technologies, 4th German Conference, 2006

Improved EAP keying framework for a secure mobility access service.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006

An application of uncertain variables to the implementation of an interacting multi-model based filter for the navigation system of a road vehicle.
Proceedings of the IEEE Intelligent Transportation Systems Conference, 2006

Advanced certificate validation service for secure Service-Oriented Architectures.
Proceedings of the ISSE 2006, 2006

An Access Control System for Multimedia Content Distribution.
Proceedings of the Public Key Infrastructure, 2006

Damon: a decentralized aspect middleware built on top of a peer-to-peer overlay network.
Proceedings of the 6th International Workshop on Software Engineering and Middleware, 2006

DECA: A Hierarchical Framework for DECentralized Aggregation in DHTs.
Proceedings of the Large Scale Management of Distributed Systems, 2006

Multidomain Virtual Security Negotiation over the Session Initiation Protocol (SIP).
Proceedings of the Critical Information Infrastructures Security, 2006

ECOSPACE - Towards an Integrated Collaboration Space for eProfessionals.
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006

Towards Interoperability in Collaborative Environments.
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006

2005
A Novel Methodology for Constructing Secure Multipath Overlays.
IEEE Internet Comput., 2005

Toward a framework for the specification of hybrid fuzzy modeling.
Int. J. Intell. Syst., 2005

Providing advanced authentication services in IPv6 muti-domain scenarios.
Int. J. Internet Protoc. Technol., 2005

Providing AAA services in IPv6 networks.
Int. J. Internet Protoc. Technol., 2005

Towards Engineering a Location-Aware Wireless Multi-agent System.
Int. J. Comput. Sci. Appl., 2005

Towards new load-balancing schemes for structured peer-to-peer grids.
Future Gener. Comput. Syst., 2005

Towards and approach for debugging multi-agent systems through the analysis of agent messages.
Comput. Syst. Sci. Eng., 2005

Internet connectivity for mobile ad hoc networks: solutions and challenges.
IEEE Commun. Mag., 2005

Design of web-based collaborative learning environments. Translating the pedagogical learning principles to human computer interface.
Comput. Educ., 2005

Adaptive Gateway Discovery Mechanisms to Enhance Internet Connectivity for Mobile Ad Hoc Networks.
Ad Hoc Sens. Wirel. Networks, 2005

Building Wide-Area Collaborative Applications on top of Structured Peer-to- Peer Overlays.
Proceedings of the 14th IEEE International Workshops on Enabling Technologies (WETICE 2005), 2005

An IPv6 Internet Exchange Model: Lessons from Euro6IX Project.
Proceedings of the 2005 IEEE/IPSJ International Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops), 31 January, 2005

Deployment of AAA Infrastructures in IPv6 Networks.
Proceedings of the 2005 IEEE/IPSJ International Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops), 31 January, 2005

Deployment of a Policy-Based Management System for the Dynamic Provision of IPsec-Based VPNs in IPv6 Networks.
Proceedings of the 2005 IEEE/IPSJ International Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops), 31 January, 2005

Cyclone: A Novel Design Schema for Hierarchical DHTs.
Proceedings of the Fifth IEEE International Conference on Peer-to-Peer Computing (P2P 2005), 31 August, 2005

On the Application of the Semantic Web Rule Language in the Definition of Policies for System Security Management.
Proceedings of the On the Move to Meaningful Internet Systems 2005: OTM 2005 Workshops, 2005

Performance Evaluation of Existing Approaches for Hybrid Ad Hoc Networks Across Mobility Models.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005

Policy-Driven Routing Management Using CIM.
Proceedings of the Computer Network Security, 2005

An XML-Seamless Policy Based Management Framework.
Proceedings of the Computer Network Security, 2005

Mobility-Aware Adaptive Counter-Based Forwarding Elimination to Reduce Data Overhead in Multicast Ad Hoc Routing.
Proceedings of the Challenges in Ad Hoc Networking, 2005

Use of XACML Policies for a Network Access Control Service.
Proceedings of the Applied Public Key Infrastructure, 2005

Approximating Optimal Multicast Trees in Wireless Multihop Networks.
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005

A Network Access Control Approach Based on the AAA Architecture and Authorization Attributes.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

p2pCM: A Structured Peer-to-Peer Grid Component Model.
Proceedings of the Computational Science, 2005

Security Extensions to MMARP Through Cryptographically Generated Addresses.
Proceedings of the 35. Jahrestagung der Gesellschaft für Informatik, 2005

Some Applications of Hybrid Fuzzy Modeling.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2005

A Building-Block Approach to Hybrid Fuzzy Modeling.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2005

Fuzzy Modeling in the Agro-Climatic Domain.
Proceedings of the Joint 4th Conference of the European Society for Fuzzy Logic and Technology and the 11th Rencontres Francophones sur la Logique Floue et ses Applications, 2005

A Heterogeneous Network Access Service Based on PERMIS and SAML.
Proceedings of the Public Key Infrastructure, 2005

Distributed Contextual Information Storage Using Content-Centric Hash Tables.
Proceedings of the Embedded and Ubiquitous Computing, 2005

A Service-Based Architecture for Integrating Globus 2 and Globus 3.
Proceedings of the Advances in Grid Computing, 2005

Designing collaborative environments and their application in learning.
Proceedings of the 1st International Conference on Collaborative Computing: Networking, 2005

The Planet Project: collaborative educational content repositories on structured peer-to-peer grids.
Proceedings of the 5th International Symposium on Cluster Computing and the Grid (CCGrid 2005), 2005

A Semantically-Rich Management System Based on CIM for the OGSA Security Services.
Proceedings of the Advances in Web Intelligence Third International Atlantic Web IntelligenceConference, 2005

Deploying Secure Cryptographic Services in Multi-Domain IPv6 Networks.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

Implementing RADIUS and Diameter AAA Systems in IPv6-Based Scenarios.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

Heuristic Algorithms for Minimum Bandwith Consumption Multicast Routing in Wireless Mesh Networks.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 4th International Conference, 2005

2004
Providing QoS through machine-learning-driven adaptive multimedia applications.
IEEE Trans. Syst. Man Cybern. Part B, 2004

METALA: a J2EE Technology Based Framework for Web Mining.
Rev. Colomb. de Computación, 2004

Mobility-aware mesh construction algorithm for low data-overhead multicast ad hoc routing.
J. Commun. Networks, 2004

Dermi: A New Distributed Hash Table-Based Middleware Framework.
IEEE Internet Comput., 2004

A fuzzy language.
Fuzzy Sets Syst., 2004

Policy-based dynamic provision of IP services in a secure VPN coalition scenario.
IEEE Commun. Mag., 2004

Towards a Peer-to-Peer Object Middleware for Wide-Area Collaborative Application Development.
Inteligencia Artif., 2004

COLAB: A Collaborative platform for simulations in virtual laboratories.
Inteligencia Artif., 2004

Seamless Multimedia Communications in Heterogeneous Mobile Access Networks.
Proceedings of the One step ahead, 2004

A multi-objective evolutionary approach for nonlinear constrained optimization with fuzzy costs.
Proceedings of the IEEE International Conference on Systems, 2004

Reducing data-overhead of mesh-based ad hoc multicast routing protocols by Steiner tree meshes.
Proceedings of the First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004

Integrated IP multicast in mobile ad hoc networks with multiple attachments to wired IP networks.
Proceedings of the IEEE 15th International Symposium on Personal, 2004

A Proposal of a CIM-Based Policy Management Model for the OGSA Security Architecture.
Proceedings of the On the Move to Meaningful Internet Systems 2004: OTM 2004 Workshops: OTM Confederated International Workshops and Posters, 2004

Querying Virtual Worlds. A Fuzzy Approach.
Proceedings of the MICAI 2004: Advances in Artificial Intelligence, 2004

Towards an Approach for Debugging MAS Through the Analysis of ACL Messages.
Proceedings of the Multiagent System Technologies, Second German Conference, 2004

Enhanced Internet Connectivity for Hybrid Ad hoc Networks Through Adaptive Gateway Discovery.
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004

Giving Embodied Agents a Grid-Boost.
Proceedings of the Intelligent Virtual Environments and Virtual Agents, 2004

DERMI: A Decentralized Peer-to-Peer Event-Based Object Middleware.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

Achieving Load Balancing in Structured Peer-to-Peer Grids.
Proceedings of the Computational Science, 2004

Self-Configuration of Grid Nodes Using a Policy-Based Management Architecture.
Proceedings of the Computational Science, 2004

A J2EE Technology Based Distributed Software Architecture for Web Usage Mining.
Proceedings of the International Conference on Internet Computing, 2004

User-Aware Videoconference Session Control using Software Agents.
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 2004), 2004

User-Aware Adaptive Applications for Enhanced Multimedia Quality in Heterogeneous Networking Environments.
Proceedings of the High Speed Networks and Multimedia Communications, 2004

Adaptive Multimedia Multi-Party Communication in Ad Hoc Environments.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

On the Use of Modular Routers for Implementing Multicast Communications in Hybrid Ad hoc Networks.
Proceedings of the 34. Jahrestagung der Gesellschaft für Informatik, 2004

Nonlinear Optimization with Fuzzy Constraints by Multi-Objective Evolutionary Algorithms.
Proceedings of the Computational Intelligence, Theory and Applications, International Conference 8th Fuzzy Days, Dortmund, Germany, Sept. 29, 2004

A Credential Conversion Service for SAML-based Scenarios.
Proceedings of the Public Key Infrastructure, 2004

Implementation and Evaluation of a Location-Aware Wireless Multi-agent System.
Proceedings of the Embedded and Ubiquitous Computing, 2004

ACLAnalyser: A Tool for Debugging Multi-Agent Systems.
Proceedings of the 16th Eureopean Conference on Artificial Intelligence, 2004

Maximal Source Coverage Adaptive Gateway Discovery for Hybrid Ad Hoc Networks.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks: Third International Conference, 2004

2003
PKI Services for IPv6.
IEEE Internet Comput., 2003

New security services based on PKI.
Future Gener. Comput. Syst., 2003

ANTS Framework for Cooperative Work Environments.
Computer, 2003

Using genetic algorithms to optimize the behaviour of adaptive multimedia applications in wireless and mobile scenarios.
Proceedings of the 2003 IEEE Wireless Communications and Networking, 2003

Multi-objective Evolutionary Algorithms based fuzzy optimization.
Proceedings of the IEEE International Conference on Systems, 2003

Intelligent and adaptive middleware to improve user-perceived QoS in multimedia applications.
Proceedings of the IEEE 14th International Symposium on Personal, 2003

Grid-aware Component-based development in CORBA Lightweight Components.
Proceedings of the VIII Jornadas Ingeniería del Software y Bases de Datos (JISBD 2003), 2003

Neuro-fuzzy Modeling Applied to GIS: A Case Study for Solar Radiation.
Proceedings of the Artificial Neural Nets Problem Solving Methods, 2003

METALA: A Distributed System for Web Usage Mining.
Proceedings of the Artificial Neural Nets Problem Solving Methods, 2003

DJ-boids: emergent collective behavior as multichannel radio station programming.
Proceedings of the 8th International Conference on Intelligent User Interfaces, 2003

i-Fork: a flexible AGV system using topological and grid maps.
Proceedings of the 2003 IEEE International Conference on Robotics and Automation, 2003

Towards a formal framework for the specification hybrid fuzzy modeling.
Proceedings of the 12th IEEE International Conference on Fuzzy Systems, 2003

Improving interpretability in approximative fuzzy models via multi-objective evolutionary algorithms.
Proceedings of the 3rd Conference of the European Society for Fuzzy Logic and Technology, 2003

Current issues and future directions in evolutionary fuzzy systems research.
Proceedings of the 3rd Conference of the European Society for Fuzzy Logic and Technology, 2003

Design and Implementation of a Grid-Enabled Component Container for CORBA Lightweight Components.
Proceedings of the Grid Computing, 2003

Delegation in Distributed Systems: Challenges and Open Issues.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

Adaptive P2P Multimedia Communication Using Hybrid Learning.
Proceedings of the Current Topics in Artificial Intelligence, 2003

DJ-Boids: Flocks of DJ's to Program Internet Multichannel Radio Stations.
Proceedings of the Web Intelligence, 2003

Improving User-Perceived QoS in Mobile Ad Hoc Networks Using Decision Rules Induction.
Proceedings of the Advances in Artificial Intelligence, 2003

Extending Seamless IP Multicast Edge-Coverage through Mobile Ad Hoc Access Networks.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, Second International Conference, 2003

2002
A framework for defining and learning fuzzy behaviors for autonomous mobile robots.
Int. J. Intell. Syst., 2002

Mimics: Exploiting Satellite Technology for an Intelligent Convoy.
IEEE Intell. Syst., 2002

A Multi-Objective Neuro-Evolutionary Algorithm for Fuzzy Modeling.
Proceedings of the 6th Joint Conference on Information Science, 2002

A Pareto-Evolutionary Approach for Goal and Priority Based Multi-Objective Optimization Problems.
Proceedings of the 6th Joint Conference on Information Science, 2002

Different Smartcard-Based Approaches to Physical Access Control.
Proceedings of the Infrastructure Security, International Conference, 2002

Towards a modeling framework for integrating hybrid techniques.
Proceedings of the 2002 IEEE International Conference on Fuzzy Systems, 2002

MOVE: : component groupware foundations for collaborative virtual environments.
Proceedings of the 4th International Conference on Collaborative Virtual Environments 2002, Bonn, Germany, September 30, 2002

An evolutionary algorithm for constrained multi-objective optimization.
Proceedings of the 2002 Congress on Evolutionary Computation, 2002

2001
Approximative fuzzy rules approaches for classification with hybrid-GA techniques.
Inf. Sci., 2001

A regression methodology to induce a fuzzy model.
Int. J. Intell. Syst., 2001

CORBA Lightweight Compontents: An Early Report.
Proceedings of the VI Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2001), 2001

Data Mining Applied to Irrigation Water Management.
Proceedings of the Bio-inspired Applications of Connectionism, 2001

SPEED Protocol: Smartcard-Based Payment with Encrypted Electronic Delivery.
Proceedings of the Information Security, 4th International Conference, 2001

Design and Implementation Requirements for CORBA Lightweight Components.
Proceedings of the 30th International Workshops on Parallel Processing (ICPP 2001 Workshops), 2001

AMBAR Protocol: Access Management Based on Authorization Reduction.
Proceedings of the Information and Communications Security, Third International Conference, 2001

METALA: A Meta-learning Architecture.
Proceedings of the Computational Intelligence, 2001

Navigation of a Mobile Robot With Fuzzy Segments.
Proceedings of the 10th IEEE International Conference on Fuzzy Systems, 2001

Fuzzy and Hybrid Methods Applied to GIS Interpolation.
Proceedings of the 10th IEEE International Conference on Fuzzy Systems, 2001

CORBA Lightweight Components : A Model for Distributed Component-BasedHeterogeneous Computation.
Proceedings of the Euro-Par 2001: Parallel Processing, 2001

Accurate, Transparent, and Compact Fuzzy Models for Function Approximation and Dynamic Modeling through Multi-objective Evolutionary Optimization.
Proceedings of the Evolutionary Multi-Criterion Optimization, 2001

2000
Data mining for text categorization with semi-supervised agglomerative hierarchical clustering.
Int. J. Intell. Syst., 2000

An approach to collaboration in Learning Environments.
Proceedings of WebNet 2000 - World Conference on the WWW and Internet, San Antonio, Texas, USA, October 30, 2000

IGMPv3-Based Method for Avoiding DoS Attacks in Multicast-Enabled Networks.
Proceedings of the Proceedings 27th Conference on Local Computer Networks, 2000

From approximative to descriptive models.
Proceedings of the Ninth IEEE International Conference on Fuzzy Systems, 2000

Soft computing applied to irrigation in farming environments.
Proceedings of the Ninth IEEE International Conference on Fuzzy Systems, 2000

Time series prediction using crisp and fuzzy neural networks: a comparative study.
Proceedings of the IEEE/IAFE/INFORMS 2000 Conference on Computational Intelligence for Financial Engineering, 2000

Evolutionary computation techniques for behaviour fusion in autonomous mobile robots.
Proceedings of the 2000 Congress on Evolutionary Computation, 2000

A Proposal for Meta-Learning Through a Multi-Agent System.
Proceedings of the Infrastructure for Agents, 2000

SUMA Project (Open Murcia University Services).
Proceedings of the Computers and Education in the 21st Century, 2000

1999
Pattern recognition with evidential knowledge.
Int. J. Intell. Syst., 1999

A multiagent architecture for fuzzy modeling.
Int. J. Intell. Syst., 1999

Fuzzy modeling with hybrid systems.
Fuzzy Sets Syst., 1999

About the use of fuzzy clustering techniques for fuzzy model identification.
Fuzzy Sets Syst., 1999

Access Control In Multicast Environments: An Approach to Senders Authentication.
Proceedings of the 1st Latin American Network Operations and Management Symposium, 1999

Pareto-optimality in Scheduling Problems.
Proceedings of the Computational Intelligence, 1999

Fuzzy local regression models with fuzzy clustering.
Proceedings of the EUSFLAT-ESTYLF Joint Conference, 1999

Learning behaviour fusion in autonomous mobile robots.
Proceedings of the EUSFLAT-ESTYLF Joint Conference, 1999

Semántica denotacional de lenguajes con datos borrosos.
Proceedings of the EUSFLAT-ESTYLF Joint Conference, 1999

1998
A methodology to model fuzzy systems using fuzzy clustering in a rapid-prototyping approach.
Fuzzy Sets Syst., 1998

Fuzzy Hybrid Techniques in Modeling.
Proceedings of the Methodology and Tools in Knowledge-Based Systems, 1998

1997
A fuzzy clustering-based rapid prototyping for fuzzy rule-based modeling.
IEEE Trans. Fuzzy Syst., 1997

Some methods to model fuzzy systems for inference purposes.
Int. J. Approx. Reason., 1997

Fuzzy Clustering and Images Reduction.
Proceedings of the Computational Intelligence, 1997

1996
On the use of hierarchical clustering in fuzzy modeling.
Int. J. Approx. Reason., 1996

Report on the Spanish association of fuzzy logic and technologies.
Fuzzy Sets Syst., 1996

Towards Qualitative Fuzzy Modeling using Fuzzy Clusters and Knowledge Acquisition Tools.
Proceedings of the Modelling and Simulation, 1996

1995
Distributed Ray Tracing System.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1995

1994
A frequency model in a fuzzy environment.
Int. J. Approx. Reason., 1994


  Loading...