Antonio F. Skarmeta

According to our database1, Antonio F. Skarmeta authored at least 496 papers between 1994 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Enabling Virtual AAA Management in SDN-Based IoT Networks .
Sensors, 2019

LPWAN-Based Vehicular Monitoring Platform with a Generic IP Network Interface.
Sensors, 2019

PLUG-N-HARVEST Architecture for Secure and Intelligent Management of Near-Zero Energy Buildings.
Sensors, 2019

Toward a Cybersecurity Certification Framework for the Internet of Things.
IEEE Security & Privacy, 2019

An open IoT platform for the management and analysis of energy data.
Future Generation Comp. Syst., 2019

Architecture of security association establishment based on bootstrapping technologies for enabling secure IoT infrastructures.
Future Generation Comp. Syst., 2019

Preface.
Electr. Notes Theor. Comput. Sci., 2019

Risk-based automated assessment and testing for the cybersecurity certification and labelling of IoT devices.
Computer Standards & Interfaces, 2019

Overview of Device Access Control in the IoT and its Challenges.
IEEE Communications Magazine, 2019

2018
Offloading Positioning onto Network Edge.
Wireless Communications and Mobile Computing, 2018

BEATS: Blocks of Eigenvalues Algorithm for Time Series Segmentation.
IEEE Trans. Knowl. Data Eng., 2018

Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach.
Sensors, 2018

Performance Evaluation of LoRa Considering Scenario Conditions.
Sensors, 2018

5G NB-IoT: Efficient Network Traffic Filtering for Multitenant IoT Cellular Networks.
Security and Communication Networks, 2018

Enhancing IoT security through network softwarization and virtual security appliances.
Int. Journal of Network Management, 2018

Special issue on management of IoT.
Int. Journal of Network Management, 2018

Matching federation identities, the eduGAIN and STORK approach.
Future Generation Comp. Syst., 2018

Evolving IoT networks by the confluence of MEC and LP-WAN paradigms.
Future Generation Comp. Syst., 2018

Protecting personal data in IoT platform scenarios through encryption-based selective disclosure.
Computer Communications, 2018

Integration of Anonymous Credential Systems in IoT Constrained Environments.
IEEE Access, 2018

A Lightweight and Flexible Encryption Scheme to Protect Sensitive Data in Smart Building Scenarios.
IEEE Access, 2018

Machine learning based electric load forecasting for short and long-term period.
Proceedings of the 4th IEEE World Forum on Internet of Things, 2018

Towards privacy preserving data provenance for the Internet of Things.
Proceedings of the 4th IEEE World Forum on Internet of Things, 2018

IPv6 communications over LoRa for future IoV services.
Proceedings of the 4th IEEE World Forum on Internet of Things, 2018

Test-based risk assessment and security certification proposal for the Internet of Things.
Proceedings of the 4th IEEE World Forum on Internet of Things, 2018

Empirical Study of Massive Set-Point Behavioral Data: Towards a Cloud-Based Artificial Intelligence that Democratizes Thermostats.
Proceedings of the 2018 IEEE International Conference on Smart Computing, 2018

Classification of Spatio-Temporal Trajectories Based on Support Vector Machines.
Proceedings of the Advances in Practical Applications of Agents, Multi-Agent Systems, and Complexity: The PAAMS Collection, 2018

Leveraging OTT and ISP Cooperation to Enhance End to End QoS by Exchanging Valuable Resources.
Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018

Managing AAA in NFV/SDN-enabled IoT scenarios.
Proceedings of the 2018 Global Internet of Things Summit (GIoTS), 2018

Detaching the design, development and execution of big data analysis processes: A case study based on energy and behavioral analytics.
Proceedings of the 2018 Global Internet of Things Summit (GIoTS), 2018


Internet Access for LoRaWAN Devices Considering Security Issues.
Proceedings of the 2018 Global Internet of Things Summit (GIoTS), 2018

2017
An ARM-Compliant Architecture for User Privacy in Smart Cities: SMARTIE - Quality by Design in the IoT.
Wireless Communications and Mobile Computing, 2017

SecRBAC: Secure data in the Clouds.
IEEE Trans. Services Computing, 2017

Applicability of Big Data Techniques to Smart Cities Deployments.
IEEE Trans. Industrial Informatics, 2017

Providing Personalized Energy Management and Awareness Services for Energy Efficiency in Smart Buildings.
Sensors, 2017

Fuzzy Modelling for Human Dynamics Based on Online Social Networks.
Sensors, 2017

Holistic Privacy-Preserving Identity Management System for the Internet of Things.
Mobile Information Systems, 2017

Towards Interoperabilty in Identity Federation Systems.
JoWUA, 2017

Integrating LP-WAN Communications within the Vehicular Ecosystem.
J. Internet Serv. Inf. Secur., 2017

A user-centric Internet of Things platform to empower users for managing security and privacy concerns in the Internet of Energy.
IJDSN, 2017

ARIES: Reliable European Identity Ecosystem.
ERCIM News, 2017

Towards seamless inter-technology handovers in vehicular IPv6 communications.
Computer Standards & Interfaces, 2017

Adaptation of Ontology Sets for Water Related Scenarios Management with IoT Systems for a More Productive and Sustainable Agriculture Systems.
Proceedings of the Joint Proceedings of SEMANTiCS 2017 Workshops co-located with the 13th International Conference on Semantic Systems (SEMANTiCS 2017), 2017

Transmission Technologies Comparison for IoT Communications in Smart-Cities.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

ANASTACIA: Advanced networked agents for security and trust assessment in CPS IoT architectures.
Proceedings of the Global Internet of Things Summit, 2017

A digital envelope approach using attribute-based encryption for secure data exchange in IoT scenarios.
Proceedings of the Global Internet of Things Summit, 2017

Integration of serious games and IoT data management platforms to motivate behavioural change for energy efficient lifestyles.
Proceedings of the Global Internet of Things Summit, 2017

Data aggregation, fusion and recommendations for strengthening citizens energy-aware behavioural profiles.
Proceedings of the Global Internet of Things Summit, 2017

Human mobility analysis based on social media and fuzzy clustering.
Proceedings of the Global Internet of Things Summit, 2017

User-centric access control for efficient security in smart cities.
Proceedings of the Global Internet of Things Summit, 2017

Towards provisioning of SDN/NFV-based security enablers for integrated protection of IoT systems.
Proceedings of the IEEE Conference on Standards for Communications and Networking, 2017

Data driven modeling for energy consumption prediction in smart buildings.
Proceedings of the 2017 IEEE International Conference on Big Data, BigData 2017, 2017

Towards a Privacy-Preserving Reliable European Identity Ecosystem.
Proceedings of the Privacy Technologies and Policy - 5th Annual Privacy Forum, 2017

2016
Securing Vehicular IPv6 Communications.
IEEE Trans. Dependable Sec. Comput., 2016

Big data: the key to energy efficiency in smart buildings.
Soft Comput., 2016

TACIoT: multidimensional trust-aware access control system for the Internet of Things.
Soft Comput., 2016

Vehicle Maneuver Detection with Accelerometer-Based Classification.
Sensors, 2016

Mobility and security in a real VANET deployed in a heterogeneous networks.
Security and Communication Networks, 2016

Human Mobility Modelling Based on Dense Transit Areas Detection with Opportunistic Sensing.
Mobile Information Systems, 2016

Enabling end-to-end CoAP-based communications for the Web of Things.
J. Network and Computer Applications, 2016

A complex event processing approach to detect abnormal behaviours in the marine environment.
Information Systems Frontiers, 2016

Human Mobility Prediction Based on Social Media with Complex Event Processing.
IJDSN, 2016

DCapBAC: embedding authorization logic into smart things through ECC optimizations.
Int. J. Comput. Math., 2016

Online route prediction based on clustering of meaningful velocity-change areas.
Data Min. Knowl. Discov., 2016

Extending SIP to support payments in a generic way.
Computer Standards & Interfaces, 2016

ARMY: architecture for a secure and privacy-awar e lifecycle of smar t objects in the internet of my things.
IEEE Communications Magazine, 2016

Message from the workshop co-chairs.
Proceedings of the 17th IEEE International Symposium on A World of Wireless, 2016

ARMOUR: Large-scale experiments for IoT security & trust.
Proceedings of the 3rd IEEE World Forum on Internet of Things, 2016

An overview on delegated authorization for CoAP: Authentication and authorization for Constrained Environments (ACE).
Proceedings of the 3rd IEEE World Forum on Internet of Things, 2016

Security certification and labelling in Internet of Things.
Proceedings of the 3rd IEEE World Forum on Internet of Things, 2016

Opportunistic smart object aggregation based on clustering and event processing.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

A semantic approach towards implementing energy efficient lifestyles through behavioural change.
Proceedings of the 12th International Conference on Semantic Systems, 2016

An ARM-compliant IoT platform: Security by design for the smart home.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

Towards Energy Efficiency Smart Buildings Models Based on Intelligent Data Analytics.
Proceedings of the 7th International Conference on Ambient Systems, 2016

2015
Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things.
Sensors, 2015

MagicFinger: 3D Magnetic Fingerprints for Indoor Location.
Sensors, 2015

Toward a Lightweight Authentication and Authorization Framework for Smart Objects.
IEEE Journal on Selected Areas in Communications, 2015

Guest Editorial: Smart Things, Big Data Technology and Ubiquitous Computing solutions for the future Internet of Things.
JoWUA, 2015

Real Experience with IPv6 Communications in Highways.
JoWUA, 2015

SAFIR: Secure access framework for IoT-enabled services on smart buildings.
J. Comput. Syst. Sci., 2015

CEP-traj: An event-based solution to process trajectory data.
Inf. Syst., 2015

A complex event processing approach to perceive the vehicular context.
Information Fusion, 2015

An IoT based framework for user-centric smart building services.
IJWGS, 2015

Intercloud Trust and Security Decision Support System: an Ontology-based Approach.
J. Grid Comput., 2015

Building integrated business environments: analysing open-source ESB.
Enterprise IS, 2015

Evaluation and recommendations on IPv6 for the Internet of Things.
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015

Towards human mobility extraction based on social media with Complex Event Processing.
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015

Dynamic security credentials PANA-based provisioning for IoT smart objects.
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015

Context sensitive indoor temperature forecast for energy efficient operation of smart buildings.
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015

Big data for IoT services in smart cities.
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015

MagicFinger: A New Approach to Indoor Localization.
Proceedings of the Ubiquitous Computing and Ambient Intelligence. Sensing, Processing, and Using Environmental Information, 2015

An indoor localization system based on 3D magnetic fingerprints for smart buildings.
Proceedings of the 2015 IEEE RIVF International Conference on Computing & Communication Technologies, 2015

How to intelligently make sense of real data of smart cities.
Proceedings of the International Conference on Recent Advances in Internet of Things, 2015

SMARTIE project: Secure IoT data management for smart cities.
Proceedings of the International Conference on Recent Advances in Internet of Things, 2015

Integrating an identity-based control plane with the HIMALIS network architecture.
Proceedings of the 1st IEEE Conference on Network Softwarization, 2015

Using an Identity Plane for Adapting Network Behavior to User and Service Requirements.
Proceedings of the Mobile Networks and Management - 7th International Conference, 2015

A required security and privacy framework for smart objects.
Proceedings of the 2015 ITU Kaleidoscope: Trust in the Information Society, 2015

Tram-Based Mobility Mining with Event Processing of Transit-Card Transactions.
Proceedings of the IEEE 18th International Conference on Intelligent Transportation Systems, 2015

A vehicular network mobility framework: Architecture, deployment and evaluation.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Certificateless and Privacy-Enhancing Group Sharing Mechanism for the Future Internet.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Exploiting IoT-based sensed data in smart buildings to model its energy consumption.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Online Urban Mobility Detection Based on Velocity Features.
Proceedings of the Big Data Analytics and Knowledge Discovery, 2015

Security and Privacy in Vehicular Communications with INTER-TRUST.
Proceedings of the Cyber Security and Privacy, 2015

Enabling SDN Experimentation with Wired and Wireless Resources: The SmartFIRE Facility.
Proceedings of the Cloud Computing - 6th International Conference, 2015

Design and Deployment of Federation Testbed in EU-KR for Identifier-based communications.
Proceedings of the 10th International Conference on Future Internet, 2015

Managing Context Information for Adaptive Security in IoT Environments.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

2014
Taxonomy of trust relationships in authorization domains for cloud computing.
The Journal of Supercomputing, 2014

A soft computing based location-aware access control for smart buildings.
Soft Comput., 2014

How can We Tackle Energy Efficiency in IoT BasedSmart Buildings?
Sensors, 2014

GNSS Autonomous Localization: NLOS Satellite Detection Based on 3-D Maps.
IEEE Robot. Automat. Mag., 2014

Drug identification and interaction checker based on IoT to minimize adverse drug reactions and improve drug compliance.
Personal and Ubiquitous Computing, 2014

Participative marketing: extending social media marketing through the identification and interaction capabilities from the Internet of things.
Personal and Ubiquitous Computing, 2014

Mobile digcovery: discovering and interacting with the world through the Internet of things.
Personal and Ubiquitous Computing, 2014

Extending the Internet of Things to the Future Internet through IPv6 support.
Mobile Information Systems, 2014

Lightweight MIPv6 with IPSec support.
Mobile Information Systems, 2014

Building a reputation-based bootstrapping mechanism for newcomers in collaborative alert systems.
J. Comput. Syst. Sci., 2014

Communication Protocol for Enabling Continuous Monitoring of Elderly People through Near Field Communications.
Interacting with Computers, 2014

IPv6 Communication Stack for Deploying Cooperative Vehicular Services.
Int. J. Intelligent Transportation Systems Research, 2014

A Framework for Supporting Network Continuity in Vehicular IPv6 Communications.
IEEE Intell. Transport. Syst. Mag., 2014

Semantic Web of Things: an analysis of the application semantics for the IoT moving towards the IoT convergence.
IJWGS, 2014

Empowering Security and Mobility in Future Networks with an Identity-Based Control Plane.
IEICE Transactions, 2014

Semantic-aware multi-tenancy authorization system for cloud architectures.
Future Generation Comp. Syst., 2014

User-centric smart buildings for energy sustainable smart cities.
Trans. Emerging Telecommunications Technologies, 2014

Trustworthy placements: Improving quality and resilience in collaborative attack detection.
Computer Networks, 2014

A process-based Internet of Things.
Proceedings of the IEEE World Forum on Internet of Things, 2014

A decentralized approach for security and privacy challenges in the Internet of Things.
Proceedings of the IEEE World Forum on Internet of Things, 2014

User role in IoT-based systems.
Proceedings of the IEEE World Forum on Internet of Things, 2014

Co-creation as the Key to a Public, Thriving, Inclusive and Meaningful EU IoT.
Proceedings of the Ubiquitous Computing and Ambient Intelligence. Personalisation and User Adapted Services, 2014

Privacy-Preserving Security Framework for a Social-Aware Internet of Things.
Proceedings of the Ubiquitous Computing and Ambient Intelligence. Personalisation and User Adapted Services, 2014

Towards Privacy-Preserving Data Sharing in Smart Environments.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

A network access control solution based on PANA for intelligent transportation systems.
Proceedings of the International Conference on Connected Vehicles and Expo, 2014

A holistic IoT-based management platform for smart environments.
Proceedings of the IEEE International Conference on Communications, 2014

Design of an Event-based architecture for the intra-vehicular context perception.
Proceedings of the 17th International Conference on Information Fusion, 2014

A Framework for Citizen Participation in the Internet of Things.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014

A New Location-Aware Authorization Mechanism for Indoor Environments.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014

2013
Teaching Advanced Concepts in Computer Networks: VNUML-UM Virtualization Tool.
TLT, 2013

PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices.
Sensors, 2013

IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6).
Sensors, 2013

Shifting primes: Optimizing elliptic curve cryptography for 16-bit devices without hardware multiplier.
Mathematical and Computer Modelling, 2013

Multiplication and Squaring with Shifting Primes on OpenRISC Processors with Hardware Multiplier.
J. UCS, 2013

Evaluation of Bluetooth Low Energy Capabilities for Tele-mobile Monitoring in Home-care.
J. UCS, 2013

Interconnection Framework for mHealth and Remote Monitoring Based on the Internet of Things.
IEEE Journal on Selected Areas in Communications, 2013

The Internet of Everything through IPv6: An Analysis of Challenges, Solutions and Opportunities.
JoWUA, 2013

RepCIDN: A Reputation-based Collaborative Intrusion Detection Network to Lessen the Impact of Malicious Alarms.
J. Network Syst. Manage., 2013

Distributed Capability-based Access Control for the Internet of Things.
J. Internet Serv. Inf. Secur., 2013

An indoor localization system based on artificial neural networks and particle filters applied to intelligent buildings.
Neurocomputing, 2013

KAMU: providing advanced user privacy in Kerberos multi-domain scenarios.
Int. J. Inf. Sec., 2013

Comprehensive Vehicular Networking Platform for V2I and V2V Communications within the Walkie-Talkie Project.
IJDSN, 2013

Secure and scalable mobility management scheme for the Internet of Things integration in the future internet architecture.
IJAHUC, 2013

SCTP as scalable video coding transport.
EURASIP J. Adv. Sig. Proc., 2013

Beyond the separation of identifier and locator: Building an identity-based overlay network architecture for the Future Internet.
Computer Networks, 2013

Vehicle-to-infrastructure messaging proposal based on CAM/DENM specifications.
Proceedings of the IFIP Wireless Days, 2013

Context-Aware Energy Efficiency in Smart Buildings.
Proceedings of the Ubiquitous Computing and Ambient Intelligence. Context-Awareness and Context-Driven Interaction, 2013

Improving Kerberos Ticket Acquisition during Application Service Access Control.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2013

Internet of Things - Security, Privacy and Trust Considerations.
Proceedings of the Secure Data Management - 10th VLDB Workshop, 2013

A Global Perspective of Smart Cities: A Survey.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Evaluating Video Streaming in Network Architectures for the Internet of Things.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Evaluation Framework for IEEE 802.15.4 and IEEE 802.11 for Smart Cities.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Evolution Towards Better AAL Environments.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Shifting Primes on OpenRISC Processors with Hardware Multiplier.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Lightweight Mobile IPv6: A mobility protocol for enabling transparent IPv6 mobility in the Internet of Things.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

An overlay network approach to find objects in the future internet.
Proceedings of the 2013 Future Network & Mobile Summit, Lisboa, Portugal, July 3-5, 2013, 2013

IoT6 - Moving to an IPv6-Based Future IoT.
Proceedings of the Future Internet, 2013

Towards a Secure Network Virtualization Architecture for the Future Internet.
Proceedings of the Future Internet, 2013

Survey of Internet of Things Technologies for Clinical Environments.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

Mobile Digcovery: A Global Service Discovery for the Internet of Things.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

Enabling Participative Marketing through the Internet of Things.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

IEEE AINA 2013 Keynote Talk II: The impact of internet of things in big data approach and future internet.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

Smart Lighting Solutions for Smart Cities.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
Automatic Design of an Indoor User Location Infrastructure Using a Memetic Multiobjective Approach.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2012

A Cooperative Approach to Traffic Congestion Detection With Complex Event Processing and VANET.
IEEE Trans. Intelligent Transportation Systems, 2012

A Two-Layers Based Approach of an Enhanced-Mapfor Urban Positioning Support.
Sensors, 2012

A Real-Time Measurement System for Long-Life Flood Monitoring and Warning Applications.
Sensors, 2012

Architecture for Improving Terrestrial Logistics Based on the Web of Things.
Sensors, 2012

Evaluation of the Impact of Furniture on Communications Performance for Ubiquitous Deployment of Wireless Sensor Networks in Smart Homes.
Sensors, 2012

Glowbal IP: An adaptive and transparent IPv6 integration in the Internet of Things.
Mobile Information Systems, 2012

A Non-monotonic Expressiveness Extension on the Semantic Web Rule Language.
J. Web Eng., 2012

A Novel Identity-based Network Architecture for Next Generation Internet.
J. UCS, 2012

Secure and Robust Framework for ID/Locator Mapping System.
IEICE Transactions, 2012

Payment frameworks for the purchase of electronic products and services.
Computer Standards & Interfaces, 2012

Network access security for the internet: protocol for carrying authentication for network access.
IEEE Communications Magazine, 2012

Using identities to achieve enhanced privacy in future content delivery networks.
Computers & Electrical Engineering, 2012

Responsive on-line gateway load-balancing for wireless mesh networks.
Ad Hoc Networks, 2012

Extending Near Field Communications to Enable Continuous Data Transmission in Clinical Environments.
Proceedings of the Ubiquitous Computing and Ambient Intelligence, 2012

Knowledge Acquisition and Management Architecture for Mobile and Personal Health Environments Based on the Internet of Things.
Proceedings of the 11th IEEE International Conference on Trust, 2012

GAIA Extended Research Infrastructure: Sensing, Connecting, and Processing the Real World.
Proceedings of the Testbeds and Research Infrastructure. Development of Networks and Communities, 2012

YOAPY: A Data Aggregation and Pre-processing Module for Enabling Continuous Healthcare Monitoring in the Internet of Things.
Proceedings of the Ambient Assisted Living and Home Care - 4th International Workshop, 2012

Building Network-aware Composite Services with the GEMBus Framework.
Proceedings of the 10th IEEE International Symposium on Parallel and Distributed Processing with Applications, 2012

An Indoor Localization Mechanism Based on RFID and IR Data in Ambient Intelligent Environments.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

A Lightweight and Identity-Based Network Architecture for the Internet of Things.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Shifting Primes: Optimizing Elliptic Curve Cryptography for Smart Things.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Home Telehealth Interventions for People with Asthma.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Marketing 4.0: A New Value Added to the Marketing through the Internet of Things.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Light-Weight Multicast DNS and DNS-SD (lmDNS-SD): IPv6-Based Resource and Service Discovery for the Web of Things.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Interaction of Patients with Breathing Problems through NFC in Ambient Assisted Living Environments.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Evaluation of Bluetooth Low Energy Capabilities for Continuous Data Transmission from a Wearable Electrocardiogram.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

An Analysis of M2M Platforms: Challenges and Opportunities for the Internet of Things.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Web of Things as a Product Improvement tool: Furniture as Case Study.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Ubiquitous deployment configuration of indoor location services.
Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN), 2012

An adaptive learning fuzzy logic system for indoor localisation using Wi-Fi in Ambient Intelligent Environments.
Proceedings of the FUZZ-IEEE 2012, 2012

Research and experimentation with the HIMALIS network architecture for future internet.
Proceedings of the 2012 Future Network & Mobile Summit, Berlin, Germany, July 4-6, 2012, 2012

Heterogeneous Testbeds, Tools and Experiments -Measurement Requirements Perspective.
Proceedings of the Measurement Methodology and Tools - First European Workshop, 2012

Multi-sensor Multi-target Tracking for Infrastructure Protection.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012

Using a gateway overlay network to achieve secure and scalable network interconnection.
Proceedings of the 2nd Baltic Congress on Future Internet Communications, 2012

2011
Mobile IP-Based Protocol for Wireless Personal Area Networks in Critical Environments.
Wireless Personal Communications, 2011

An advanced certificate validation service and architecture based on XKMS.
Softw., Pract. Exper., 2011

An internet of things-based personal device for diabetes therapy management in ambient assisted living (AAL).
Personal and Ubiquitous Computing, 2011

Semantic Web-Based Management of Routing Configurations.
J. Network Syst. Manage., 2011

Creating Context-Aware Collaborative Working Environments.
International Journal on Artificial Intelligence Tools, 2011

Semantic-based authorization architecture for Grid.
Future Generation Comp. Syst., 2011

Formal description of the SWIFT identity management framework.
Future Generation Comp. Syst., 2011

Using cognitive agents in social simulations.
Eng. Appl. of AI, 2011

PrivaKERB: A user privacy framework for Kerberos.
Computers & Security, 2011

Multipath routing with spatial separation in wireless multi-hop networks without location information.
Computer Networks, 2011

Towards a Semantic-Aware Collaborative Working Environment.
Computing and Informatics, 2011

Combining Web 2.0 and Web Services in Collaborative Working Environments.
Computing and Informatics, 2011

Towards an Authorization System for Cloud Infrastructure Providers.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Evaluation of the electromagnetic absorption in furniture for the integration of UHF-RFID tags.
Proceedings of the 2011 IEEE International Conference on RFID-Technologies and Applications, 2011

Mobility in Collaborative Alert Systems: Building Trust through Reputation.
Proceedings of the NETWORKING 2011 Workshops - International IFIP TC 6 Workshops, PE-CRN, 2011

TCP Flow-Aware Channel Re-Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

An Ambient Assisted Living Platform to Integrate Biometric Sensors to Detect Respiratory Failures for Patients with Serious Breathing Problems.
Proceedings of the Ambient Assisted Living - Third International Workshop, 2011

GPS multipath detection and exclusion with elevation-enhanced maps.
Proceedings of the 14th International IEEE Conference on Intelligent Transportation Systems, 2011

Mobility Modeling and Security Validation of a Mobility Management Scheme Based on ECC for IP-based Wireless Sensor Networks (6LoWPAN).
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Secure Mobility Management Scheme for 6LoWPAN ID/Locator Split Architecture.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Real-Time Monitoring System for Watercourse Improvement and Flood Forecast.
Proceedings of the Convergence and Hybrid Information Technology, 2011

Analysis of the Future Internet of Things Capabilities for Continuous Temperature Monitoring of Blood Bags in Terrestrial Logistic Systems.
Proceedings of the Convergence and Hybrid Information Technology, 2011

Oxygen Cylinders Management Architecture Based on Internet of Things.
Proceedings of the International Conference on Computational Science and Its Applications, 2011

Distributed multi-sensor multi-target tracking with a low-cost wireless sensor network: an application to intruder detection.
Proceedings of the Informatik 2011: Informatik schafft Communities, 2011

Protecting digital identities in future networks.
Proceedings of the 2011 Future Network & Mobile Summit, Warsaw, Poland, June 15-17, 2011, 2011

Providing security using IKEv2 in a vehicular network based on WiMAX technology.
Proceedings of the Consumer Communications and Networking Conference, 2011

IMS and Presence Service Integration on Intelligent Transportation Systems for Future Services.
Proceedings of the Advances in Computing and Communications, 2011

Shifting Primes: Extension of Pseudo-Mersenne Primes to Optimize ECC for MSP430-Based Future Internet of Things Devices.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011

2010
An Integral and Networked Home Automation Solution for Indoor Ambient Intelligence.
IEEE Pervasive Computing, 2010

A Kerberized Architecture for Fast Re-authentication in Heterogeneous Wireless Networks.
MONET, 2010

An Initial Approach to Support Mobility in Hospital Wireless Sensor Networks based on 6LoWPAN (HWSN6).
JoWUA, 2010

Towards a Reference Architecture for Collaborative Work Environments.
IJeC, 2010

Providing Adapted Contextual Information in an Overlay Vehicular Network.
Int. J. Digital Multimedia Broadcasting, 2010

Event-driven architecture based on patterns for detecting complex attacks.
IJCCBS, 2010

Towards an authorisation model for distributed systems based on the Semantic Web.
IET Information Security, 2010

Detection of semantic conflicts in ontology and rule-based information systems.
Data Knowl. Eng., 2010

Analysis of Handover Key Management schemes under IETF perspective.
Computer Standards & Interfaces, 2010

PKI-based trust management in inter-domain scenarios.
Computers & Security, 2010

Privacy-enhanced fast re-authentication for EAP-based next generation network.
Computer Communications, 2010

Secure three-party key distribution protocol for fast network access in EAP-based wireless networks.
Computer Networks, 2010

A feedback-based adaptive online algorithm for Multi-Gateway load-balancing in wireless mesh networks.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010

An IMS Based Vehicular Service Platform.
Proceedings of the 72nd IEEE Vehicular Technology Conference, 2010

A Pharmaceutical Intelligent Information System to detect allergies and Adverse Drugs Reactions based on internet of things.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

Modeling and analysis of the packet-level loss process in wireless channels.
Proceedings of the 13th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2010

Key Distribution Mechanisms for IEEE 802.21-Assisted Wireless Heterogeneous Networks.
Proceedings of the Mobile Networks and Management - Second International ICST Conference, 2010

An analysis of positioning and map-matching issues for GNSS-based road user charging.
Proceedings of the 13th International IEEE Conference on Intelligent Transportation Systems, 2010

A service oriented architecture for basic autonomic network management.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

Drugs interaction checker based on IoT.
Proceedings of the 2010 Internet of Things (IOT), IoT for a green Planet, Tokyo, Japan, November 29, 2010

Semantic description of multimedia contents for the optimization of the advertising impact on TV program grids.
Proceedings of the International Joint Conference on Neural Networks, 2010

Evaluating Open Source Enterprise Service Bus.
Proceedings of the IEEE 7th International Conference on e-Business Engineering, 2010

Identity based architecture for secure communication in future internet.
Proceedings of the 6th Workshop on Digital Identity Management, 2010

Deployment of a Secure Wireless Infrastructure Oriented to Vehicular Networks.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
TACS, a Trust Model for P2P Networks.
Wireless Personal Communications, 2009

Sharing Context-Aware Road and Safety Information.
IEEE Pervasive Computing, 2009

Towards the homogeneous access and use of PKI solutions: Design and implementation of a WS-XKMS server.
Journal of Systems Architecture - Embedded Systems Design, 2009

Performance analysis of a cross-layer SSO mechanism for a roaming infrastructure.
J. Network and Computer Applications, 2009

Design and implementation of a generic per-fee-link framework.
Internet Research, 2009

Assessment of VANET multi-hop routing over an experimental platform.
IJIPT, 2009

Towards a lightweight content-based publish/subscribe services for peer-to-peer systems.
IJGUC, 2009

A SWIFT Take on Identity Management.
IEEE Computer, 2009

Multi-layer framework for analysing and managing routing configurations.
Computers & Electrical Engineering, 2009

A Trust and Reputation Model as Adaptive Mechanism for Multi-Agent Systems.
Inteligencia Artificial, Revista Iberoamericana de Inteligencia Artificial, 2009

Achieving spatial disjointness in multipath routing without location information.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

Experimental analysis of multi-hop routing in vehicular ad-hoc networks.
Proceedings of the 5th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2009

Trusted Network Access Control in the Eduroam Federation.
Proceedings of the Third International Conference on Network and System Security, 2009

An Ambient Assisted Living System for Telemedicine with Detection of Symptoms.
Proceedings of the Bioinspired Applications in Artificial and Natural Computation, 2009

An Architecture for Ambient Assisted Living and Health Environments.
Proceedings of the Distributed Computing, 2009

NFC/RFID applications in medicine: security challenges and solutions.
Proceedings of the Workshops Proceedings of the 5th International Conference on Intelligent Environments, 2009

HWSN6: Hospital Wireless Sensor Networks Based on 6LoWPAN Technology: Mobility and Fault Tolerance Management.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Payment Annotations for Web Service Description Language (PA-WSDL).
Proceedings of the Computer and Information Science [outstanding papers from IEEE/ACIS ICIS/IWEA 2008], 2008

Towards interoperability: a wrapper model for integrating remote laboratories in a collaborative discovery learning environment.
Softw., Pract. Exper., 2008

A novel vehicle communication paradigm based on Cellular Networks for improving the safety in roads.
IJIIDS, 2008

OpenIKEv2: Design and Implementation of an IKEv2 Solution.
IEICE Transactions, 2008

A proposal for extending the eduroam infrastructure with authorization mechanisms.
Computer Standards & Interfaces, 2008

Architecture and evaluation of a unified V2V and V2I communication system based on cellular networks.
Computer Communications, 2008

TR-clustering: Alleviating the impact of false clustering on P2P overlay networks.
Computer Networks, 2008

Secure overlay networks for federated service provision and management.
Computers & Electrical Engineering, 2008

Towards semantic web-based management of security services.
Annales des Télécommunications, 2008

A Context-Sware Data Sharing Service over MANet to Enable Spontaneous Collaboration.
Proceedings of the 17th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2008

Towards the Definition of a Web Service Based Management Framework.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Event-Driven Architecture for Intrusion Detection Systems Based on Patterns.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Design-Time Learning for Operational Planning Improvement.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Managing the lifecycle of XACML delegation policies in federated environments.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Design of a Cluster-Based Peer to Peer Architecture for MANETs.
Proceedings of the XXVII International Conference of the Chilean Computer Science Society (SCCC 2008), 2008

Building and Managing Policy-Based Secure Overlay Networks.
Proceedings of the 16th Euromicro International Conference on Parallel, 2008

On the Feasibility of Dynamic Superpeer Ratio Maintenance.
Proceedings of the Proceedings P2P'08, 2008

Security Analysis and Security Optimizations for the Context Transfer Protocol.
Proceedings of the NTMS 2008, 2008

Spatially Disjoint Multipath Routing protocol without location information.
Proceedings of the LCN 2008, 2008

Supporting geographical queries onto DHTs.
Proceedings of the LCN 2008, 2008

Hybridized GPS/DR Positioning System With Unknown Initial Heading For Land Vehicles.
Proceedings of the 11th International IEEE Conference on Intelligent Transportation Systems, 2008

Ubiquitous information provision in the vehicle domain.
Proceedings of the Third International Symposium on Wireless Pervasive Computing, 2008

Bypass: Providing secure DHT routing through bypassing malicious peers.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

ACVS: An Advanced Certificate Validation Service in Service-Oriented Architectures.
Proceedings of the Third International Conference on Internet and Web Applications and Services, 2008

Towards e-Government: The security SOA approach of the University of Murcia.
Proceedings of the Third IEEE International Conference on Digital Information Management (ICDIM), 2008

Subrange Caching: Handling Popular Range Queries in DHTs.
Proceedings of the Data Management in Grid and Peer-to-Peer Systems, 2008

Levels of Assurance and Reauthentication in Federated Environments.
Proceedings of the Public Key Infrastructure, 2008

Secure Forwarding in DHTs - Is Redundancy the Key to Robustness?.
Proceedings of the Euro-Par 2008, 2008

LightPS: Lightweight Content-Based Publish/Subscribe for Peer-to-Peer Systems.
Proceedings of the Second International Conference on Complex, 2008

Adaptability of the TRSIM Model to Some Changes in Agents Behaviour.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

A wearable system for Tele-monitoring and Tele-assistance of patients with integration of solutions from chronobiology for prediction of illness.
Proceedings of the Ambient Intelligence Perspectives, 2008

Towards a Generic Payment Framework for Internet Media-on-Demand Services Based on RTSP.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
High-Integrity IMM-EKF-Based Road Vehicle Navigation With Low-Cost GPS/SBAS/INS.
IEEE Trans. Intelligent Transportation Systems, 2007

Towards semantic-aware management of security services in GT4.
Multiagent and Grid Systems, 2007

A Survey of Electronic Signature Solutions in Mobile Devices.
JTAER, 2007

A network access control approach based on the AAA architecture and authorization attributes.
J. Network and Computer Applications, 2007

Deploying authorisation mechanisms for federated services in eduroam (DAMe).
Internet Research, 2007

Managing semantic-aware policies in a distributed firewall scenario.
Internet Research, 2007

Improving interpretability in approximative fuzzy models via multiobjective evolutionary algorithms.
Int. J. Intell. Syst., 2007

Editorial Wireless Mobile Networks: Cross-Layer Communication.
IET Communications, 2007

SCOMET: Adapting Collaborative Working Environments to the MANET Scenario.
Proceedings of the 16th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE 2007), 2007

Smartcard-Based e-Coin for Electronic Payments on the (Mobile) Internet.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

A Proposal for Extending the Eduroam Infrastructure with Authorization Mechanisms.
Proceedings of the Security in Information Systems, 2007

POSITIF: A Policy-Based Security Management System.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

3-Party Approach for Fast Handover in EAP-Based Wireless Networks.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

Aspect-Oriented Programing Techniques to support Distribution, Fault Tolerance, and Load Balancing in the CORBA-LC Component Model.
Proceedings of the Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007), 12, 2007

Cryptographic identity based solution for fast handover on EAP wireless networks.
Proceedings of the 9th IFIP International Conference on Mobile Wireless Communications Networks, 2007

Network-Layer Assisted Mechanism to Optimize Authentication Delay during Handoff in 802.11 Networks.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

On the Behaviour of the TRSIM Model for Trust and Reputation.
Proceedings of the Multiagent System Technologies, 5th German Conference, 2007

A Comparative Study of Hierarchical DHT Systems.
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007

Multiple Model based Lane Change Prediction for Road Vehicles with Low Cost GPS/IMU.
Proceedings of the IEEE Intelligent Transportation Systems Conference, 2007

Pre-Authentication Based Enhancement for Access Control in Hybrid MANETs.
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007

SQS: Similarity Query Scheme for Peer-to-Peer Databases.
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007

Designing a Generic Collaborative Working Environment.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

Adaptive Peer-to-Peer Web Clustering using Distributed Aspect Middleware (Damon).
Proceedings of the 2nd International Workshop on Adaptation and Evolution in Web Systems Engineering AEWSE'07, 2007

Towards a Semantically Augmented Collaborative Working Environment - Designing a Service Oriented Architecture Environment for eProfesionals.
Proceedings of the ICE-B 2007, 2007

Towards a generic per-fee-link framework.
Proceedings of the Second IEEE International Conference on Digital Information Management (ICDIM), 2007

A Context-Aware Solution for Personalized En-route Information Through a P2P Agent-Based Architecture.
Proceedings of the Computational Science and Its Applications, 2007

Secure Protocol for Fast Authentication in EAP-Based Wireless Networks.
Proceedings of the Computational Science and Its Applications, 2007

On the Relationship between Caching and Routing in DHTs.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2007

Bootstrapping a Global SSO from Network Access Control Mechanisms.
Proceedings of the Public Key Infrastructure, 2007

Extending the Common Services of eduGAIN with a Credential Conversion Service.
Proceedings of the Computer Security, 2007

Filling the Gap Between Middleware and User Interactions in a Discovery Learning Environment.
Proceedings of the Technologies for E-Learning and Digital Entertainment, 2007

A Proposal for the Definition of Operational Plans to Provide Dependability and Security.
Proceedings of the Critical Information Infrastructures Security, 2007

Designing an interoperable infrastructure for synchronous collaboration.
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007

SIP extensions to support (micro)payments.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Multicast ad hoc routing through mobility-aware Steiner tree meshes with consistency across different mobility models.
IJPEDS, 2006

Information and Hybrid Architecture Model of the OCP Contextual Information Management System.
J. UCS, 2006

Performance Evaluation of Interconnection Mechanisms for Ad Hoc Networks across Mobility Models.
JNW, 2006

Multi-objective evolutionary computation and fuzzy optimization.
Int. J. Approx. Reasoning, 2006

Dynamic and secure management of VPNs in IPv6 multi-domain scenarios.
Computer Communications, 2006

Dynamic Policy-Based Network Management for a Secure Coalition Environment.
IEEE Communications Magazine, 2006

Enabling Wide-Area Service Oriented Architecture through the p2pWeb Model.
Proceedings of the 15th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE 2006), 2006

Monitoring the Position Integrity in Road Transport Localization Based Services.
Proceedings of the 64th IEEE Vehicular Technology Conference, 2006

Grid Authorization Based on Existing AAA Architectures.
Proceedings of the Security in Information Systems, 2006

Using Microsoft Office Infopath to Generate XACML Policies.
Proceedings of the SECRYPT 2006, 2006

Combination of a Smartcard E-Purse and E-Coin to Make Electronic Payments on the Internet.
Proceedings of the SECRYPT 2006, 2006

A new fair non-repudiation protocol for secure negotiation and contract signing.
Proceedings of the 2006 International Conference on Privacy, 2006

Virtual identities in authentication and authorization scenarios.
Proceedings of the 2006 International Conference on Privacy, 2006

On the Application of Clustering Techniques to Support Debugging Large-Scale Multi-Agent Systems.
Proceedings of the Programming Multi-Agent Systems, 4th International Workshop, 2006

Distributed Provision and Management of Security Services in Globus Toolkit 4.
Proceedings of the On the Move to Meaningful Internet Systems 2006: CoopIS, 2006

IMM-EKF based Road Vehicle Navigation with Low Cost GPS/INS.
Proceedings of the 2006 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, 2006

A New Model for Trust and Reputation Management with an Ontology Based Approach for Similarity Between Tasks.
Proceedings of the Multiagent System Technologies, 4th German Conference, 2006

Improved EAP keying framework for a secure mobility access service.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006

An application of uncertain variables to the implementation of an interacting multi-model based filter for the navigation system of a road vehicle.
Proceedings of the IEEE Intelligent Transportation Systems Conference, 2006

Advanced certificate validation service for secure Service-Oriented Architectures.
Proceedings of the ISSE 2006, 2006

Using Microsoft Office InfoPath to Generate XACML Policies.
Proceedings of the E-Business and Telecommunication Networks, 2006

An Access Control System for Multimedia Content Distribution.
Proceedings of the Public Key Infrastructure, 2006

Damon: a decentralized aspect middleware built on top of a peer-to-peer overlay network.
Proceedings of the 6th International Workshop on Software Engineering and Middleware, 2006

DECA: A Hierarchical Framework for DECentralized Aggregation in DHTs.
Proceedings of the Large Scale Management of Distributed Systems, 2006

Multidomain Virtual Security Negotiation over the Session Initiation Protocol (SIP).
Proceedings of the Critical Information Infrastructures Security, 2006

ECOSPACE - Towards an Integrated Collaboration Space for eProfessionals.
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006

Towards Interoperability in Collaborative Environments.
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006

2005
A Novel Methodology for Constructing Secure Multipath Overlays.
IEEE Internet Computing, 2005

Toward a framework for the specification of hybrid fuzzy modeling.
Int. J. Intell. Syst., 2005

Providing advanced authentication services in IPv6 muti-domain scenarios.
IJIPT, 2005

Providing AAA services in IPv6 networks.
IJIPT, 2005

Towards Engineering a Location-Aware Wireless Multi-agent System.
IJCSA, 2005

Towards new load-balancing schemes for structured peer-to-peer grids.
Future Generation Comp. Syst., 2005

Towards and approach for debugging multi-agent systems through the analysis of agent messages.
Comput. Syst. Sci. Eng., 2005

Internet connectivity for mobile ad hoc networks: solutions and challenges.
IEEE Communications Magazine, 2005

Design of web-based collaborative learning environments. Translating the pedagogical learning principles to human computer interface.
Computers & Education, 2005

Adaptive Gateway Discovery Mechanisms to Enhance Internet Connectivity for Mobile Ad Hoc Networks.
Ad Hoc & Sensor Wireless Networks, 2005

Building Wide-Area Collaborative Applications on top of Structured Peer-to- Peer Overlays.
Proceedings of the 14th IEEE International Workshops on Enabling Technologies (WETICE 2005), 2005

An IPv6 Internet Exchange Model: Lessons from Euro6IX Project.
Proceedings of the 2005 IEEE/IPSJ International Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops), 31 January, 2005

Deployment of AAA Infrastructures in IPv6 Networks.
Proceedings of the 2005 IEEE/IPSJ International Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops), 31 January, 2005

Deployment of a Policy-Based Management System for the Dynamic Provision of IPsec-Based VPNs in IPv6 Networks.
Proceedings of the 2005 IEEE/IPSJ International Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops), 31 January, 2005

Cyclone: A Novel Design Schema for Hierarchical DHTs.
Proceedings of the Fifth IEEE International Conference on Peer-to-Peer Computing (P2P 2005), 31 August, 2005

On the Application of the Semantic Web Rule Language in the Definition of Policies for System Security Management.
Proceedings of the On the Move to Meaningful Internet Systems 2005: OTM 2005 Workshops, 2005

Performance Evaluation of Existing Approaches for Hybrid Ad Hoc Networks Across Mobility Models.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005

Policy-Driven Routing Management Using CIM.
Proceedings of the Computer Network Security, 2005

An XML-Seamless Policy Based Management Framework.
Proceedings of the Computer Network Security, 2005

Mobility-Aware Adaptive Counter-Based Forwarding Elimination to Reduce Data Overhead in Multicast Ad Hoc Routing.
Proceedings of the Challenges in Ad Hoc Networking, 2005

Use of XACML Policies for a Network Access Control Service.
Proceedings of the Applied Public Key Infrastructure, 2005

Approximating Optimal Multicast Trees in Wireless Multihop Networks.
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005

A Network Access Control Approach Based on the AAA Architecture and Authorization Attributes.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

p2pCM: A Structured Peer-to-Peer Grid Component Model.
Proceedings of the Computational Science, 2005

Security Extensions to MMARP Through Cryptographically Generated Addresses.
Proceedings of the INFORMATIK 2005, 2005

Some Applications of Hybrid Fuzzy Modeling.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2005

A Building-Block Approach to Hybrid Fuzzy Modeling.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2005

Fuzzy Modeling in the Agro-Climatic Domain.
Proceedings of the Joint 4th Conference of the European Society for Fuzzy Logic and Technology and the 11th Rencontres Francophones sur la Logique Floue et ses Applications, 2005

A Heterogeneous Network Access Service Based on PERMIS and SAML.
Proceedings of the Public Key Infrastructure, 2005

Distributed Contextual Information Storage Using Content-Centric Hash Tables.
Proceedings of the Embedded and Ubiquitous Computing, 2005

A Service-Based Architecture for Integrating Globus 2 and Globus 3.
Proceedings of the Advances in Grid Computing, 2005

Designing collaborative environments and their application in learning.
Proceedings of the 1st International Conference on Collaborative Computing: Networking, 2005

The Planet Project: collaborative educational content repositories on structured peer-to-peer grids.
Proceedings of the 5th International Symposium on Cluster Computing and the Grid (CCGrid 2005), 2005

A Semantically-Rich Management System Based on CIM for the OGSA Security Services.
Proceedings of the Advances in Web Intelligence Third International Atlantic Web IntelligenceConference, 2005

Deploying Secure Cryptographic Services in Multi-Domain IPv6 Networks.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

Implementing RADIUS and Diameter AAA Systems in IPv6-Based Scenarios.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

Heuristic Algorithms for Minimum Bandwith Consumption Multicast Routing in Wireless Mesh Networks.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 4th International Conference, 2005

2004
Providing QoS through machine-learning-driven adaptive multimedia applications.
IEEE Trans. Systems, Man, and Cybernetics, Part B, 2004

METALA: a J2EE Technology Based Framework for Web Mining.
Revista Colombiana de Computación, 2004

Mobility-aware mesh construction algorithm for low data-overhead multicast ad hoc routing.
Journal of Communications and Networks, 2004

Dermi: A New Distributed Hash Table-Based Middleware Framework.
IEEE Internet Computing, 2004

A fuzzy language.
Fuzzy Sets and Systems, 2004

Policy-based dynamic provision of IP services in a secure VPN coalition scenario.
IEEE Communications Magazine, 2004

Towards a Peer-to-Peer Object Middleware for Wide-Area Collaborative Application Development.
Inteligencia Artificial, Revista Iberoamericana de Inteligencia Artificial, 2004

COLAB: A Collaborative platform for simulations in virtual laboratories.
Inteligencia Artificial, Revista Iberoamericana de Inteligencia Artificial, 2004

Seamless Multimedia Communications in Heterogeneous Mobile Access Networks.
Proceedings of the One step ahead, 2004

A multi-objective evolutionary approach for nonlinear constrained optimization with fuzzy costs.
Proceedings of the IEEE International Conference on Systems, 2004

Reducing data-overhead of mesh-based ad hoc multicast routing protocols by Steiner tree meshes.
Proceedings of the First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004

Integrated IP multicast in mobile ad hoc networks with multiple attachments to wired IP networks.
Proceedings of the IEEE 15th International Symposium on Personal, 2004

A Proposal of a CIM-Based Policy Management Model for the OGSA Security Architecture.
Proceedings of the On the Move to Meaningful Internet Systems 2004: OTM 2004 Workshops: OTM Confederated International Workshops and Posters, 2004

Querying Virtual Worlds. A Fuzzy Approach.
Proceedings of the MICAI 2004: Advances in Artificial Intelligence, 2004

Towards an Approach for Debugging MAS Through the Analysis of ACL Messages.
Proceedings of the Multiagent System Technologies, Second German Conference, 2004

Enhanced Internet Connectivity for Hybrid Ad hoc Networks Through Adaptive Gateway Discovery.
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004

Giving Embodied Agents a Grid-Boost.
Proceedings of the Intelligent Virtual Environments and Virtual Agents, 2004

DERMI: A Decentralized Peer-to-Peer Event-Based Object Middleware.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

Achieving Load Balancing in Structured Peer-to-Peer Grids.
Proceedings of the Computational Science, 2004

Self-Configuration of Grid Nodes Using a Policy-Based Management Architecture.
Proceedings of the Computational Science, 2004

A J2EE Technology Based Distributed Software Architecture for Web Usage Mining.
Proceedings of the International Conference on Internet Computing, 2004

User-Aware Videoconference Session Control using Software Agents.
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 2004), 2004

User-Aware Adaptive Applications for Enhanced Multimedia Quality in Heterogeneous Networking Environments.
Proceedings of the High Speed Networks and Multimedia Communications, 2004

Adaptive Multimedia Multi-Party Communication in Ad Hoc Environments.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

On the Use of Modular Routers for Implementing Multicast Communications in Hybrid Ad hoc Networks.
Proceedings of the INFORMATIK 2004, 2004

Nonlinear Optimization with Fuzzy Constraints by Multi-Objective Evolutionary Algorithms.
Proceedings of the Computational Intelligence, Theory and Applications, International Conference 8th Fuzzy Days, Dortmund, Germany, Sept. 29, 2004

A Credential Conversion Service for SAML-based Scenarios.
Proceedings of the Public Key Infrastructure, 2004

Implementation and Evaluation of a Location-Aware Wireless Multi-agent System.
Proceedings of the Embedded and Ubiquitous Computing, 2004

ACLAnalyser: A Tool for Debugging Multi-Agent Systems.
Proceedings of the 16th Eureopean Conference on Artificial Intelligence, 2004

Maximal Source Coverage Adaptive Gateway Discovery for Hybrid Ad Hoc Networks.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks: Third International Conference, 2004

2003
PKI Services for IPv6.
IEEE Internet Computing, 2003

New security services based on PKI.
Future Generation Comp. Syst., 2003

ANTS Framework for Cooperative Work Environments.
IEEE Computer, 2003

Using genetic algorithms to optimize the behaviour of adaptive multimedia applications in wireless and mobile scenarios.
Proceedings of the 2003 IEEE Wireless Communications and Networking, 2003

Multi-objective Evolutionary Algorithms based fuzzy optimization.
Proceedings of the IEEE International Conference on Systems, 2003

Intelligent and adaptive middleware to improve user-perceived QoS in multimedia applications.
Proceedings of the IEEE 14th International Symposium on Personal, 2003

Grid-aware Component-based development in CORBA Lightweight Components.
Proceedings of the VIII Jornadas Ingeniería del Software y Bases de Datos (JISBD 2003), 2003

Neuro-fuzzy Modeling Applied to GIS: A Case Study for Solar Radiation.
Proceedings of the Artificial Neural Nets Problem Solving Methods, 2003

METALA: A Distributed System for Web Usage Mining.
Proceedings of the Artificial Neural Nets Problem Solving Methods, 2003

DJ-boids: emergent collective behavior as multichannel radio station programming.
Proceedings of the 8th International Conference on Intelligent User Interfaces, 2003

i-Fork: a flexible AGV system using topological and grid maps.
Proceedings of the 2003 IEEE International Conference on Robotics and Automation, 2003

Towards a formal framework for the specification hybrid fuzzy modeling.
Proceedings of the 12th IEEE International Conference on Fuzzy Systems, 2003

Improving interpretability in approximative fuzzy models via multi-objective evolutionary algorithms.
Proceedings of the 3rd Conference of the European Society for Fuzzy Logic and Technology, 2003

Current issues and future directions in evolutionary fuzzy systems research.
Proceedings of the 3rd Conference of the European Society for Fuzzy Logic and Technology, 2003

Design and Implementation of a Grid-Enabled Component Container for CORBA Lightweight Components.
Proceedings of the Grid Computing, 2003

Delegation in Distributed Systems: Challenges and Open Issues.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

Adaptive P2P Multimedia Communication Using Hybrid Learning.
Proceedings of the Current Topics in Artificial Intelligence, 2003

DJ-Boids: Flocks of DJ's to Program Internet Multichannel Radio Stations.
Proceedings of the Web Intelligence, 2003

Improving User-Perceived QoS in Mobile Ad Hoc Networks Using Decision Rules Induction.
Proceedings of the Advances in Artificial Intelligence, 2003

Extending Seamless IP Multicast Edge-Coverage through Mobile Ad Hoc Access Networks.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, Second International Conference, 2003

2002
A framework for defining and learning fuzzy behaviors for autonomous mobile robots.
Int. J. Intell. Syst., 2002

Mimics: Exploiting Satellite Technology for an Intelligent Convoy.
IEEE Intelligent Systems, 2002

A Multi-Objective Neuro-Evolutionary Algorithm for Fuzzy Modeling.
Proceedings of the 6th Joint Conference on Information Science, 2002

A Pareto-Evolutionary Approach for Goal and Priority Based Multi-Objective Optimization Problems.
Proceedings of the 6th Joint Conference on Information Science, 2002

Different Smartcard-Based Approaches to Physical Access Control.
Proceedings of the Infrastructure Security, International Conference, 2002

MOVE: : component groupware foundations for collaborative virtual environments.
Proceedings of the 4th International Conference on Collaborative Virtual Environments 2002, Bonn, Germany, September 30, 2002

2001
Approximative fuzzy rules approaches for classification with hybrid-GA techniques.
Inf. Sci., 2001

A regression methodology to induce a fuzzy model.
Int. J. Intell. Syst., 2001

CORBA Lightweight Compontents: An Early Report.
Proceedings of the VI Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2001), 2001

Data Mining Applied to Irrigation Water Management.
Proceedings of the Bio-inspired Applications of Connectionism, 2001

SPEED Protocol: Smartcard-Based Payment with Encrypted Electronic Delivery.
Proceedings of the Information Security, 4th International Conference, 2001

Design and Implementation Requirements for CORBA Lightweight Components.
Proceedings of the 30th International Workshops on Parallel Processing (ICPP 2001 Workshops), 2001

AMBAR Protocol: Access Management Based on Authorization Reduction.
Proceedings of the Information and Communications Security, Third International Conference, 2001

METALA: A Meta-learning Architecture.
Proceedings of the Computational Intelligence, 2001

Navigation of a Mobile Robot With Fuzzy Segments.
Proceedings of the 10th IEEE International Conference on Fuzzy Systems, 2001

Fuzzy and Hybrid Methods Applied to GIS Interpolation.
Proceedings of the 10th IEEE International Conference on Fuzzy Systems, 2001

CORBA Lightweight Components : A Model for Distributed Component-BasedHeterogeneous Computation.
Proceedings of the Euro-Par 2001: Parallel Processing, 2001

Accurate, Transparent, and Compact Fuzzy Models for Function Approximation and Dynamic Modeling through Multi-objective Evolutionary Optimization.
Proceedings of the Evolutionary Multi-Criterion Optimization, 2001

2000
Data mining for text categorization with semi-supervised agglomerative hierarchical clustering.
Int. J. Intell. Syst., 2000

An approach to collaboration in Learning Environments.
Proceedings of WebNet 2000 - World Conference on the WWW and Internet, San Antonio, Texas, USA, October 30, 2000

IGMPv3-Based Method for Avoiding DoS Attacks in Multicast-Enabled Networks.
Proceedings of the Proceedings 27th Conference on Local Computer Networks, 2000

Time series prediction using crisp and fuzzy neural networks: a comparative study.
Proceedings of the IEEE/IAFE/INFORMS 2000 Conference on Computational Intelligence for Financial Engineering, 2000

A Proposal for Meta-Learning Through a Multi-Agent System.
Proceedings of the Infrastructure for Agents, 2000

SUMA Project (Open Murcia University Services).
Computers and Education in the 21st Century, 2000

1999
Pattern recognition with evidential knowledge.
Int. J. Intell. Syst., 1999

A multiagent architecture for fuzzy modeling.
Int. J. Intell. Syst., 1999

Fuzzy modeling with hybrid systems.
Fuzzy Sets and Systems, 1999

About the use of fuzzy clustering techniques for fuzzy model identification.
Fuzzy Sets and Systems, 1999

Access Control In Multicast Environments: An Approach to Senders Authentication.
Proceedings of the 1st Latin American Network Operations and Management Symposium, 1999

Pareto-optimality in Scheduling Problems.
Proceedings of the Computational Intelligence, 1999

Fuzzy local regression models with fuzzy clustering.
Proceedings of the EUSFLAT-ESTYLF Joint Conference, 1999

Learning behaviour fusion in autonomous mobile robots.
Proceedings of the EUSFLAT-ESTYLF Joint Conference, 1999

Semántica denotacional de lenguajes con datos borrosos.
Proceedings of the EUSFLAT-ESTYLF Joint Conference, 1999

1998
A methodology to model fuzzy systems using fuzzy clustering in a rapid-prototyping approach.
Fuzzy Sets and Systems, 1998

Fuzzy Hybrid Techniques in Modeling.
Proceedings of the Methodology and Tools in Knowledge-Based Systems, 1998

1997
A fuzzy clustering-based rapid prototyping for fuzzy rule-based modeling.
IEEE Trans. Fuzzy Systems, 1997

Some methods to model fuzzy systems for inference purposes.
Int. J. Approx. Reasoning, 1997

Fuzzy Clustering and Images Reduction.
Proceedings of the Computational Intelligence, 1997

1996
On the use of hierarchical clustering in fuzzy modeling.
Int. J. Approx. Reasoning, 1996

Report on the Spanish association of fuzzy logic and technologies.
Fuzzy Sets and Systems, 1996

1995
Distributed Ray Tracing System.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1995

1994
A frequency model in a fuzzy environment.
Int. J. Approx. Reasoning, 1994


  Loading...