Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Diamante digital, una apuesta territorial por el desarrollo a partir de las TIC., , , , , , , , and . Rev. Colomb. de Computación, (2019)A new analysis of the false positive rate of a Bloom filter., , and . Inf. Process. Lett., 110 (21): 944-949 (2010)A Network Connection Proxy to Enable Hosts to Sleep and Save Energy., , and . IPCCC, page 101-110. IEEE Computer Society, (2008)Definition and validation of an energy savings process for computers based on user behaviors and profiles., , and . WiMob, page 9-16. IEEE Computer Society, (2017)Sensitivity analysis and countermeasures for transformation-based location obfuscation., , , , , and . ICCST, page 1-6. IEEE, (2014)NRand-K: Minimizing the impact of location obfuscation in spatial analysis., , , , , , and . Trans. GIS, 22 (5): 1257-1274 (2018)Matlock: A location obfuscation technique for accuracy-restricted applications., , , and . WCNC, page 1829-1834. IEEE, (2012)A Service-Oriented Architecture for Bioinformatics: An Application in Cell Image Analysis., , , , and . WorldCIST (1), volume 569 of Advances in Intelligent Systems and Computing, page 724-734. Springer, (2017)Continuous and Secure Integration Framework for Smart Contracts., , and . Sensors, 23 (1): 541 (2023)Provisioning Computational Resources for Cloud-Based e-Learning Platforms Using Deep Learning Techniques., , , and . IEEE Access, (2021)