Conference lectures 67

Ponències, comunicacions i pòsters a congressos, etc.
Ponencias, comunicaciones y pósters en congresos, etc.
Conference papers, contributed papers and posters, etc.
Browse
Subscribe to this collection to receive daily e-mail notification of new additions
Collection's Items (Sorted by Submit Date in Descending order): 41 to 60 of 67

Issue DateTitleAuthor(s)
2007-08-14An interdomain PKI model based on trust listsRifà-Pous, Helena; Herrera-Joancomartí, Jordi
2007-05-14Secure dynamic MANET on-demand (SEDYMO) routing protocolRifà-Pous, Helena; Herrera-Joancomartí, Jordi
2009-11-06A Secure Mobile-based Authentication SystemRifà-Pous, Helena
2010-09-07A Secure Cooperative Sensing Protocol for Cognitive Radio NetworksGarrigues, Carles; Rifà-Pous, Helena
2010-09-07Detección Robusta por Grupos de Señales PrimariasJimenez Blasco, Mercedes; Rifà-Pous, Helena; Mut Rojas, Jose Carlos
2010-09-07Técnicas de Anonimato para Securizar Redes Móviles Ad HocManso Cortés, Óscar; Rifà-Pous, Helena
2011-10-01Spectrum sharing models in cognitive radio networksRifà-Pous, Helena; Rifà Coma, Josep
2008Developing an information system for monitoring student's activity in online collaborative learningJuan, Angel A.; Daradoumis, Thanasis; Faulin, Javier; XHAFA, FATOS
2010-02-16Exploring semantic description and matching technologies for enhancing the automatic composition of grid based learning servicesGutierrez-Carreon, Gustavo; Jorba, Josep; Daradoumis, Thanasis
2008Expanding the customer relationship management scope to the non-profit organizations: an analysis focused on the e-university domainDaradoumis, Thanasis; Faulin, Javier; Juan, Angel A.; Martínez López, Francisco José; Rodriguez-Ardura, Inma; XHAFA, FATOS
2007An experimental study on peer selection in a P2P network over PlanetLabXHAFA, FATOS; Barolli, Leonard; Fernández Correa, Raúl; Daradoumis, Thanasis
2008Subject recognition using a new approach for feature extractionMasip Rodó, David; Lapedriza, Agata; Vitrià Marca, Jordi
2008Multitask learning : An application to incremental face recognitionMasip Rodó, David; Lapedriza, Agata; Vitrià Marca, Jordi
2008Analysis of threats to the security of EPC networksGarcia-Alfaro, Joaquin; Barbeau, Michel; Krakanis, Evangelos; Universitat Oberta de Catalunya. K-ryptography and Information Security for Open Networks (KISON)
2007Reliable process for security policy deploymentPreda, Stere; Cuppens, Nora; Cuppens, Frederic; Garcia-Alfaro, Joaquin; Tourain, Laurent; Universitat Oberta de Catalunya. K-ryptography and Information Security for Open Networks (KISON)
2010-02-16Security threats on EPC based RFID systemsGarcia-Alfaro, Joaquin; Krakanis, Evangelos; Barbeau, Michel; Universitat Oberta de Catalunya. K-ryptography and Information Security for Open Networks (KISON)
2008Distributed exchange of alerts for the detection of coordinated attacksGarcia-Alfaro, Joaquin; Barrera, Ignasi; Borrell Viader, Joan; Jaeger, Michael A.; Mühl, Gero; Universitat Oberta de Catalunya. K-ryptography and Information Security for Open Networks (KISON)
2007Aggregating and deploying network access control policiesGarcia-Alfaro, Joaquin; Cuppens, Nora; Cuppens, Frederic; Universitat Oberta de Catalunya. K-ryptography and Information Security for Open Networks (KISON)
2010-02-16Management of exceptions on access control policiesGarcia-Alfaro, Joaquin; Cuppens, Frederic; Cuppens, Nora; Universitat Oberta de Catalunya. K-ryptography and Information Security for Open Networks (KISON)
2007Where is the teacher in a virtual learning environment?Prieto Blázquez, Josep; Herrera-Joancomartí, Jordi; Universitat Oberta de Catalunya. K-ryptography and Information Security for Open Networks (KISON)
Collection's Items (Sorted by Submit Date in Descending order): 41 to 60 of 67