Search For:

Displaying 1-8 out of 8 total
Engagement factors and motivation in e-Learning and blended-learning projects
Found in: Proceedings of the First International Conference on Technological Ecosystem for Enhancing Multiculturality (TEEM '13)
By Azahara García Peralta, Rubén Gutiérrez Priego
Issue Date:November 2013
pp. 453-460
Virtual education is one of the most significant tools in what EU Commission calls Lifelong Learning (LLL), and learners' engagement is a capital aspect to succeed in any online formative activities. Therefore, this paper is devoted to reach three main obj...
     
IaaS Cloud Architecture: From Virtualized Datacenters to Federated Cloud Infrastructures
Found in: Computer
By Rafael Moreno-Vozmediano,Rubén S. Montero,Ignacio M. Llorente
Issue Date:December 2012
pp. 65-72
As a key component in a modern datacenter, the cloud operating system is responsible for managing the physical and virtual infrastructure, orchestrating and commanding service provisioning and deployment, and providing federation capabilities for accessing...
 
From the π-calculus to flat GHC
Found in: Proceedings of the 14th symposium on Principles and practice of declarative programming (PPDP '12)
By Julio Mariño, Rubén Monjaraz
Issue Date:September 2012
pp. 163-172
We formalize a translation of an asynchronous Pi-calculus into Flat GHC which does not disrupt too much the intuitive correspondence between them, specially in which regards names vs. logical variables. However, our approach depends on the introduction of ...
     
Study of 3D web technologies for industrial applications
Found in: Proceedings of the 17th International Conference on 3D Web Technology (Web3D '12)
By David Oyarzun, Jairo R. Sánchez, Rubén Díaz
Issue Date:August 2012
pp. 184-184
This work presents the first steps of an active applied research project whose objective is to use 3D Web technologies in order to support the stages of the on-demand industrial products life-cycle (product customization, processes setup, and training). Th...
     
User-Oriented Analysis of Interactions in Online Social Networks
Found in: IEEE Intelligent Systems
By Rubén Fuentes-Fernández,Jorge J. Gómez-Sanz,Juan Pavón
Issue Date:July 2012
pp. 18-25
Online-behavior analysis must integrate people and systems. Activity theory provides a way to describe patterns of social interactions as properties with descriptions for automated processing.
 
Query session detection as a cascade
Found in: Proceedings of the 20th ACM international conference on Information and knowledge management (CIKM '11)
By Benno Stein, Matthias Hagen, Tino Rub
Issue Date:October 2011
pp. 147-152
We propose a cascading method for query session detection, the problem of identifying series of consecutive queries a user submits with the same information need. While the existing session detection research mostly deals with effectiveness, our focus also...
     
Multiple Subclass Pattern Recognition: A Maximin Correlation Approach
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Hadar I. Avi-Itzhak, Jan A. Van Mieghem, Leonardo Rub
Issue Date:April 1995
pp. 418-431
<p><it>Abstract</it>—This paper addresses a correlation based nearest neighbor pattern recognition problem where each class is given as a collection of subclass templates. The recognition is performed in two stages. In the first stage the...
 
Issues in Discretionary Access Control
Found in: Security and Privacy, IEEE Symposium on
By Deborah D. Downs, Jerzy R. Rub, Kenneth C. Kung, Carole S. Jordan
Issue Date:April 1985
pp. 208
This paper discusses the types of mechanisms that can be used to implement Discretionary Access Control (DAC). It also covers the access types that can be controlled by a DAC mechanism. and includes a brief discussion of related topics including protected ...
 
 1