Listar AD - CTG – Informática por título
Mostrando ítems 57-76 de 76
-
Shielding IoT against Cyber-Attacks: An Event-Based Approach Using SIEM
(Guest Editor: Constantinos KoliasEgiptoInglaterra, 2018)Due to the growth of IoT (Internet of Tings) devices in diferent industries and markets in recent years and considering the currently insufcient protection for these devices, a security solution safeguarding IoT architectures ... -
SIMULADOR PARA EL APOYO AL PROCESO DE MEJORAMIENTO CONTINUO DE PYMES CON TOC
(Congresso Nacional de Excelência em Gestão, 2014)Una gran parte de las pequeñas y medianas empresas Colombianas han mostrado, de acuerdo con cifras oficiales, unos muy bajos índices de supervivencia tras sus primeros años de creación. Esto es especialmente grave dado que ... -
Simulation and Verification of Synchronous Set Relations in Rewriting Logic
(NASA Langley Research CenterHampton, Virginia., 2011)This paper presents a mathematical foundation and a rewriting logic infrastructure for the execution and property verification of synchronous set relations. The mathematical foundation is given in the language of abstract ... -
Sistema de extracción de cuerpos de texto de la web para tareas lingüísticas
(ScieloColombia, 2009)En este artículo se describe un sistema desarrollado para la extracción de grandes cuerpos de texto de Internet, teniendo como motivación el valor que ofrecen los ejemplos de lenguaje natural disponibles en la red para ... -
A Survey on the Interplay between Software Engineering and Systems Engineering during SoS Architecting
(The ACM Digital Library is published by the Association for Computing MachineryBari, Italy., 2020)Background: The Systems Engineering and Software Engineering disciplines are highly intertwined in most modern Systems of Systems (SoS), and particularly so in industries such as defense, transportation, energy and health ... -
Synchronous set relations in rewriting logic
(Elsevier, 2014)This paper presents a mathematical foundation and a rewriting logic infrastructure for the execution and property verification of synchronous set relations. The mathematical foundation is given in the language of abstract ... -
Tecnologías de Información como apoyo a la Estrategia De las Instituciones Prestadoras de Salud en Colombia
(Colombia., 2015)La tecnología al servicio del negocio, no el negocio al servicio de la tecnología. Es importante tener clara esta relación para que las tecnologías de Información (TI) son un generador de beneficios en las organizaciones. ... -
Tecnologías de Información como apoyo a la estrategia de las instituciones prestadoras de salud en Colombia
(Orlando, Florida, E.E.U.U., 2015)La tecnología al servicio del negocio, no el negocio al servicio de la tecnología. Es importante tener clara esta relación para que las tecnologías de Información (TI) son un generador de beneficios en las organizaciones. ... -
Tecnologías de Información como apoyo a la Estrategia De las Instituciones Prestadoras de Salud en Colombia
(Colombia., 2019)La tecnología al servicio del negocio, no el negocio al servicio de la tecnología. Es importante tener clara esta relación para que las tecnologías de Información (TI) son un generador de beneficios en las organizaciones. ... -
Theorem Proving Modulo Based on Boolean Equational Procedures
(Springer, 2008)Deduction with inference rules modulo computation rules plays an important role in automated deduction as an effective method for scaling up. We present four equational theories that are isomorphic to the traditional Boolean ... -
Tool Interoperability in the Maude Formal Environment
(SpringerBerlín, 2011)We present the Maude Formal Environment (MFE), an executable formal specification in Maude within which a user can seamlessly interact with the Maude Termination Tool, the Maude Sufficient Completeness Checker, the ... -
Towards a Maude Formal Environment
(SpringerBerlín, 2011)Maude is a declarative and reflective language based on rewriting logic in which computation corresponds to efficient deduction by rewriting. Because of its reflective capabilities, Maude has been useful as a metatool in ... -
Towards a measuring framework for knowledge creation in smart cities
(Colombia, 2020)This article investigates the implications of general models of smart sustainable cities (SSC) on the indicators and measurement frameworks that we use to study them. We first investigate the mainstream theory of SSC and ... -
Towards a Smart Farming Platform: From IoT-Based Crop Sensing to Data Analytics
(Springer NatureSwitzerland., 2018)Colombia is a country with a huge agricultural potential, thanks to its size and geography diversity. Unfortunately, it is far from using it efficiently: 65% of its farmland is either unused or underused due to political ... -
Towards Real-Time Semantics for a Distributed Event-Based MOP Language
(Springer NatureSwitzerland., 2018)This paper investigates rewriting logic as a suitable means to model the semantics of distributed and concurrent systems implemented using Monitoring Oriented Programming (MOP) frameworks. MOP tools close the gap between ... -
TRANSFORMACIÓN DE PRÁCTICAS PEDAGÓGICAS USANDO TIC Y RENATA: CONTEXTO Y CASOS DE ESTUDIO EN BIOMEDICINA Y ECONOMÍA
(© 2013 Asociación Colombiana de Facultades de Ingeniería (ACOFI), International Federation of Engineering Education Societies (IFEES), 2013)Este artículo presenta dos propuestas de transformación de las prácticas pedagógicas con apoyo de tecnología, diseñadas como parte del proyecto de investigación “Diseño de un modelo de transformación de prácticas educativas ... -
TRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-Threats
(IEEE XploreSpain, 2018)The Internet of Things (IoT) is considered as an emerging technology with considerable potentialities. Its paradigm of everything connected together invaded the real world, with smart objects located in several daily ... -
TRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-Threats
(IEEE XploreValencia, España., 2018-10)The Internet of Things (IoT) is considered as an emerging technology with considerable potentialities. Its paradigm of everything connected together invaded the real world, with smart objects located in several daily ... -
Using Reverse Engineering to Handle Malware
(EDICIONES UCC PRODUCTSBogotá, 2019)Introduction: This paper is a product of the research Project “Cyber Security Architecture for Incident Management” developed in the Colombian School of Engineering Julio Garavito in the year 2018. Objetive: Reverse ... -
El valor de la Inteligencia Artificial en el Servicio al Cliente EciBot
(Estados Unidos, 2018)En el presente artículo se muestran resultados de los avances obtenidos como resultado de un proyecto de grado realizado por estudiantes de pregrado del programa de Ingeniería de Sistemas de la Escuela Colombiana de ...