Miguel Jimeno

Orcid: 0000-0001-5398-7070

According to our database1, Miguel Jimeno authored at least 21 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Language learning apps for visually impaired users: a systematic review.
Res. Pract. Technol. Enhanc. Learn., March, 2024

2023
Continuous and Secure Integration Framework for Smart Contracts.
Sensors, 2023

Design of a micro-learning framework and mobile application using design-based research.
PeerJ Comput. Sci., 2023

2021
Provisioning Computational Resources for Cloud-Based e-Learning Platforms Using Deep Learning Techniques.
IEEE Access, 2021

2020
Spiral-Based Model for Software Architecture in Bio-image Analysis: A Case Study in RSV Cell Infection.
Proceedings of the Computer Information Systems and Industrial Management, 2020

2019
Diamante digital, una apuesta territorial por el desarrollo a partir de las TIC.
Rev. Colomb. de Computación, 2019

Container-based architecture for optimal face-recognition tasks in edge computing.
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 2019

2018
NRand-K: Minimizing the impact of location obfuscation in spatial analysis.
Trans. GIS, 2018

2017
Applications Based on Service-Oriented Architecture (SOA) in the Field of Home Healthcare.
Sensors, 2017

A Service-Oriented Architecture for Bioinformatics: An Application in Cell Image Analysis.
Proceedings of the Recent Advances in Information Systems and Technologies, 2017

Definition and validation of an energy savings process for computers based on user behaviors and profiles.
Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, 2017

2014
EnergyAware - Mobile-based Architecture for Maximizing Energy Savings during Computer Idle Times.
Proceedings of the SMARTGREENS 2014, 2014

Sensitivity analysis and countermeasures for transformation-based location obfuscation.
Proceedings of the International Carnahan Conference on Security Technology, 2014

2012
Neural Networks and Hausdorff Distance Applied to Number Recognition in Electrical Meters.
Appl. Artif. Intell., 2012

Matlock: A location obfuscation technique for accuracy-restricted applications.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

2011
Empirical Approach to Network Sizing for Connectivity in Wireless Sensor Networks with Realistic Radio Propagation Models.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 10th International Conference, 2011

2010
A new analysis of the false positive rate of a Bloom filter.
Inf. Process. Lett., 2010

2008
P2P directory search: Signature Array Hash Table.
Proceedings of the LCN 2008, 2008

A Network Connection Proxy to Enable Hosts to Sleep and Save Energy.
Proceedings of the 2008 IEEE International Performance, 2008

2007
A Prototype Power Management Proxy for Gnutella Peer-to-Peer File Sharing.
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007

A Power Management Proxy with a New Best-of-N Bloom Filter Design to Reduce False Positives.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007


  Loading...