No description
-
November 27, 2014 (v1)PublicationUploaded on: March 27, 2023
-
August 4, 2020 (v1)Publication
The automatic generation of user interfaces based on declarative models achieves a significant reduction of the development effort. In this paper, we analyze the feasibility of using two well-known techniques such as XInclude and Packaging in the new context of reusing user-interface model specifications. After analyzing the suitability of each...
Uploaded on: December 4, 2022 -
August 5, 2020 (v1)Publication
This paper introduces the potential for reusing UI elements in the context of Model-Based UI Development (MBUID) and provides guidance for future MBUID systems with enhanced reutilization capabilities. Our study is based upon the development of six inter-related projects with a specific MBUID environment which supports standard techniques for...
Uploaded on: March 27, 2023 -
April 4, 2023 (v1)Publication
En este trabajo presentamos un sistema de gestión de citas diseñado por el Dpto. de Ingeniería Telemática de la Universidad de Sevilla para satisfacer las necesidades de profesores y alumnos. Este servicio puede ser utilizado para concertar tutorías, seguimientos de proyectos o revisiones de exámenes. Durante un año de operación del...
Uploaded on: April 14, 2023 -
September 1, 2022 (v1)Publication
Drones equipped with wireless network cards can provide communication services in open areas. This paper proposes a hierarchical two-layered network architecture with two types of drones according to their communication equipment: Access and Distribution. While access drones provide WiFi access to ground users, distribution drones act as...
Uploaded on: March 24, 2023 -
May 18, 2020 (v1)Publication
Es imposible suprimir el riesgo en un examen telemático, como también lo es en un examen presencial. De forma natural, lo exámenes telemáticos abren un mayor número de oportunidades a quién desea sortear las normas establecidas. Todos los actores deben ser conscientes de estos riesgos. Los profesores se enfrentan al desafío de implementar...
Uploaded on: March 27, 2023 -
May 3, 2023 (v1)Publication
Voice over IP (VoIP) requires a Call Admission Control (CAC) mechanism in WiFi networks to preserve VoIP packet flows from excessive network delay or packet loss. Ideally, this mechanism should be integrated with the operational scenario, guarantee the quality of service of active calls, and maximize the number of concurrent calls. This paper...
Uploaded on: May 4, 2023 -
October 30, 2024 (v1)Publication
The current IEEE 802.11ax standard enhances Wi-Fi networks with a series of new features, such as multi-user (MU) transmission, an Orthogonal Frequency Division Multiple Access (OFDMA) scheme and the ability to multiplex traffic from different access categories (ACs). These features can be utilized to enhance the QoS support for VoIP traffic...
Uploaded on: October 31, 2024 -
September 6, 2019 (v1)Publication
When telecommunication infrastructure is damaged by natural disasters, creating a network that can handle voice channels can be vital for search and rescue missions. Unmanned Aerial Vehicles (UAV) equipped with WiFi access points could be rapidly deployed to provide wireless coverage to ground users. This WiFi access network can in turn be used...
Uploaded on: December 5, 2022 -
September 19, 2022 (v1)Publication
We propose a novel cross-layer scheme to reduce energy consumption in wireless sensor networks composed of IEEE 802.15.4 IoT devices with adjustable transmit power. Our approach is based on the IETF's Routing Protocol for Low power and lossy networks (RPL). Nodes discover neighbors and keep fresh link statistics for each available transmit...
Uploaded on: December 4, 2022 -
October 15, 2020 (v1)Publication
This paper formulates a new problem for the optimal placement of Unmanned Aerial Vehicles (UAVs) geared towards wireless coverage provision for Voice over WiFi (VoWiFi) service to a set of ground users confined in an open area. Our objective function is constrained by coverage and by VoIP speech quality and minimizes the ratio between the...
Uploaded on: December 4, 2022 -
November 27, 2014 (v1)Publication
No description
Uploaded on: December 4, 2022 -
April 19, 2021 (v1)Publication
Most anomaly-based intrusion detectors rely on models that learn from a training dataset whose quality is crucial in their performance. Albeit the properties of suitable datasets have been formulated, the influence of the dataset size on the performance of the anomaly-based detector has received scarce attention so far. In this work, we...
Uploaded on: March 27, 2023