Enrique Soriano

Orcid: 0000-0002-4265-4577

Affiliations:
  • Universidad Rey Juan Carlos, Móstoles (Madrid), Spain


According to our database1, Enrique Soriano authored at least 25 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Detecting and bypassing frida dynamic function call tracing: exploitation and mitigation.
J. Comput. Virol. Hacking Tech., November, 2023

SealFSv2: combining storage-based and ratcheting for tamper-evident logging.
Int. J. Inf. Sec., April, 2023

2021
SealFS: Storage-based tamper-evident logging.
Comput. Secur., 2021

2018
ZX: A network file system for high-latency networks.
Softw. Pract. Exp., 2018

Quantitative analysis of security in distributed robotic frameworks.
Robotics Auton. Syst., 2018

2015
Optimistic semaphores with non-deterministic choice operation for heterogeneous manycore systems.
Concurr. Comput. Pract. Exp., 2015

2014
O/live: Transparent Distribution, Persistence, and Partial Replication for Ubiquitous User Interfaces.
Int. J. Hum. Comput. Interact., 2014

2013
Pervasive User Interface Elements as Synthetic Networked Files.
Proceedings of the Ubiquitous Computing and Ambient Intelligence. Context-Awareness and Context-Driven Interaction, 2013

2012
Personal Pervasive Environments: Practice and Experience.
Sensors, 2012

Octopus: An Upperware based system for building personal pervasive environments.
J. Syst. Softw., 2012

NIX: A Case for a Manycore System for Cloud Computing.
Bell Labs Tech. J., 2012

Mayordomo and Octopus: A Case Study in Ambient Intelligence Environments.
Proceedings of the Ubiquitous Computing and Ambient Intelligence, 2012

Multimodal Dialogue System for Interaction in AmI Environment by Means of File-Based Services.
Proceedings of the Natural Interaction with Robots, 2012

AngryEmail? Emotion-Based E-mail Tool Adaptation.
Proceedings of the Ambient Assisted Living and Home Care - 4th International Workshop, 2012

2010
UpperWare: Bringing resources back to the system.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

2007
Plan B: Using Files instead of Middleware Abstractions.
IEEE Pervasive Comput., 2007

Human-to-Human authorization for resource sharing in SHAD: Roles and protocols.
Pervasive Mob. Comput., 2007

SHAD: A Human-Centered Security Architecture for the Plan B Operating System.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2007), 2007

2006
The Plan B OS for ubiquitous computing. Voice control, security, and terminals as case studies.
Pervasive Mob. Comput., 2006

Plan B: An Operating System for Ubiquitous Computing Environments.
Proceedings of the 4th IEEE International Conference on Pervasive Computing and Communications (PerCom 2006), 2006

Omero: Ubiquitous User Interfaces in the Plan B Operating System.
Proceedings of the 4th IEEE International Conference on Pervasive Computing and Communications (PerCom 2006), 2006

2005
Traditional Systems Can Work Well for Pervasive Applications. A Case Study: Plan 9 from Bell Labs Becomes Ubiquitous.
Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom 2005), 2005

UbiTerm: a hand-held control-center for user's activity mobility.
Proceedings of the International Conference on Pervasive Services 2005, 2005

2004
Plan B: Boxes for networked resources.
J. Braz. Comput. Soc., 2004

SHAD: a human centered security architecture for partitionable, dynamic and heterogeneous distributed systems.
Proceedings of the 1st International Doctoral Symposium on Middleware, 2004


  Loading...