Search
Search Results
-
Device Characterization for Opportunistic Networks
When implementing opportunistic networks in real applications, not only connectivity problems need to be addressed, but also device restrictions.... -
Simulation Tools for Opportunistic Networks
In this chapter, we start with an introduction to network simulators and especially to discrete event simulators. We explain how they work and what... -
Security in Opportunistic Networks
Security is of paramount importance in Opportunistic Networks (OppNets) due to its unique characteristics and operational challenges. OppNets are... -
Connectivity Technologies for Opportunistic Networks
This chapter explores the question of how to implement opportunistic networks in practice. The main part of this question considers the connectivity... -
Theoretical Models for Opportunistic Networks
In this chapter, we detail how to use theoretical modeling in opportunistic networks (OppNets) using mathematical and computational methods to... -
Data Dissemination in Opportunistic Networks
Data dissemination is the main research and implementation challenge in opportunistic networks. It addresses the question of how to forward data in a... -
DUXAIT NG: A Software for the Planning and Execution of User Experience Evaluations and Experiments
During the COVID-19 pandemic, conducting UX evaluations was difficult, increasing the pressure to develop usable software. For this objective,... -
Development and Evaluation of a Non-conventional Interaction Wearable Device
Consisting of accessories with embedded electronics aimed at capturing real-time user information, wearable technologies have attracted the interest... -
Scenarios, Shared Understanding, and Group Decision Support to Foster Innovation Networks
Collaborative innovation is a dynamic process that involves diverse individuals and organizations pooling resources and working together to develop... -
Facial Emotion Recognition with AI
The paper presents a work with AI on using computer vision algorithms to detect human emotions in the context of the video when the user looks at... -
Mistakes Hold the Key: Reducing Errors in a Crowdsourced Tumor Annotation Task by Optimizing the Training Strategy
Accurate tumor identification is crucial for diagnosing and treating various diseases. Nevertheless, the limited availability of expert pathologists... -
Design Thinking: Empowering Innovation and Transformation in Industry 4.0 - Lessons Learned from Early Adoption in SMEs
Small and Medium Enterprises [SMEs] have the potential to benefit from Industry 4.0 technologies, but their adoption has been limited, hindering... -
Human-Computer Interaction Research in Ibero-America: A Bibliometric Analysis
Human-computer interaction is a globally significant multidisciplinary field to enhance the usability of electronic devices for work, entertainment,... -
Adaptative Videogames for Education: An Initial Study
The videogames are frequently used in educational contexts because improve in the students their motivational levels and learning performances. There... -
Advancing Multi-actor Graph Convolutions for Skeleton-Based Action Recognition
Human skeleton motion recognition, notable for its lightweight, interference-resistant, and resource-saving properties, plays a crucial role in human... -
A Comparison of Hosting Techniques for Online Cybersecurity Competitions
Online cybersecurity competitions have gained significant traction in the community for educational and evaluative purposes because they offer... -
A Somaesthetics Based Approach to the Design of Multisensory Interactive Systems
This paper aims to analyse the state-of-the-art of somaesthetics, describing the scientific and philosophic basis of the discipline, in order to... -
Exploring Vulnerabilities in Voice Command Skills for Connected Vehicles
Voice assistant platforms have revolutionized user interactions with connected vehicles, providing the convenience of controlling them through simple... -
Enabling Real-Time Restoration of Compromised ECU Firmware in Connected and Autonomous Vehicles
With increasing development of connected and autonomous vehicles, the risk of cyber threats on them is also increasing. Compared to traditional... -
Time Non-Stationary RS-GBSM for UAV Narrowband Channels
To capture the time non-stationarity of UAV narrowband channels, a novel three-dimensional (3D) non-stationary model for non-isotropic unmanned...