45 results on '"Sevillano, José L."'
Search Results
2. ECG Pre-processing and Feature Extraction Tool for Intelligent Simulation Systems
3. Open Source Virtual Worlds and Low Cost Sensors for Physical Rehab of Patients with Chronic Diseases
4. Performance analysis of CSMA networks with deterministic collision resolution
5. Network traffic analysis and evaluation of a multi-user virtual environment
6. Special Issue on ‘Performance Evaluation, Modeling and Optimization of Computer Systems’
7. Five Years of Designing Wireless Sensor Networks in the Doñana Biological Reserve (Spain): An Applications Approach.
8. A study of bus emulation. Application to M68000 based systems
9. Small and Large Vocabulary Speech Recognition of MP3 Data under Real-Word Conditions: Experimental Study
10. Successive Interference Cancellation for Multi-user MIMO-OFDM Ad-Hoc Networks: A Performance-Complexity Tradeoff
11. Unidirectional Traffic Flow to Protect Wireless Sensor Networks against Byzantine Attacks
12. Experimental Detection and Synchronisation Validation for a TR-UWB System Based on the Time Delayed Sampling and Correletion Scheme
13. Link Adaptation in Ad Hoc Networks Based on Interference Minimization
14. Weight Based Fast Mode Decision for H.264/AVC Video Coding Standard
15. A Framework for Dynamic Optimization of Security and Performances
16. Revocation and Tracing Based on Ternary Tree: Towards Optimal Broadcast Encryption Scheme
17. Experience in Deploying a Wireless Sensor Network in a Vineyard
18. Downlink Multiuser MIMO-OFDM Systems
19. Investigation and Improved Configuration Settings for H.264 CGS/MGS Quality Scalable Coding
20. A Comparative Evaluation of Gaussian Multiscale Aggregation for Hand Biometrics
21. Touching Character Segmentation Method of Archaic Lanna Script
22. Decoding of LDPC-Based 2D-Barcodes Using a 2D-Hidden-Markov-Model
23. A Method of Real-Time Non-uniform Speech Stretching
24. Efficiently Managing Multimedia Hierarchical Data with the WINDSURF Library
25. Broadcast Authentication in a Low Speed Controller Area Network
26. Attack Interference: A Path to Defending Security Protocols
27. Byte Slicing Grøstl: Improved Intel AES-NI and Vector-Permute Implementations of the SHA-3 Finalist Grøstl
28. A Related-Key Attack against Multiple Encryption Based on Fixed Points
29. Accelerating Reduction for Enabling Fast Multiplication over Large Binary Fields
30. On the Feasibility of Malware Attacks in Smartphone Platforms
31. Spam Filtering through Anomaly Detection
32. Application of Metamorphic Testing to a Case Study in Web Services Compositions
33. Territorial Safety Networks
34. Time Stretching of UWB Radio Signals Using a Photonic Analogue-to-Digital Converter System Based on Wavelength Division Multiplexing
35. Killer Applications for Fiber to the Home Networks: Market Potential, Time Horizons and User Groups
36. Selection of Information-Intensive Services: A Multi-criteria Decision Model
37. An Answer to 'Who Needs a Stylus?' on Handwriting Recognition on Mobile Devices
38. A Wildfire Prediction Based on Fuzzy Inference System for Wireless Sensor Networks
39. To Bid or Not To Bid? Investigating Retail-Brand Keyword Performance in Sponsored Search Advertising
40. Client-Oriented Preferences Model for QoS Aggregation in Service-Based Applications
41. Shared Security: How Wireless Sensor Networks Can Benefit from Threshold Cryptography
42. Evaluating Super Node Selection and Load Balancing in P2P VoIP Networks Using Stochastic Graph Transformation
43. Paradigms of Distributed Software Systems: Services, Processes and Self-organization
44. Face Recognition in Uncontrolled Environments, Experiments in an Airport
45. Biometric Privacy Protection: Guidelines and Technologies
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.