Capítols de llibre
Recent Submissions
-
A quality-assuring, combinatorial auction based mechanism for IoT-based crowdsourcing
(2020-03)
Part of book or chapter of book
Restricted access - publisher's policyIn this chapter, we study some research issues from IoT-based crowdsourcing in a strategic setting. We have considered the scenario in IoT-based crowdsourcing, where there are multiple task requesters and multiple IoT ... -
The vision of Edges of Internet as a computing fabric
(2020-03)
Part of book or chapter of book
Restricted access - publisher's policyEdge computing has emerged as a major disrupting technology after Cloud computing to fill in the computational and infrastructural gaps in IoT and Mobile Cloud computing. Indeed, IoT and Mobile Cloud computing are based ... -
Decomposed process discovery and conformance checking
(Springer, 2018)
Part of book or chapter of book
Open AccessDecomposed process discovery and decomposed conformance checking are the corresponding variants of the two monolithic fundamental problems in process mining (van der Aalst 2011): automated process discovery, which considers ... -
On the universality of Zipf's law for word frequencies
(Walter de Gruyter, 2007)
Part of book or chapter of book
Open AccessIt is hard to imagine how the development of quantitative linguistics would have been after G.K. Zipf’s untimely death without the work of G. Altmann. This article aims to honour a living giant of the Zipfian school of ... -
Petri net analysis using boolean manipulation
(Springer, 1994)
Part of book or chapter of book
Open AccessThis paper presents a novel analysis approach for bounded Petri nets. The net behavior is modeled by boolean functions, thus reducing reasoning about Petri nets to boolean calculation. The state explosion problem is managed ... -
Big data analytics for obesity prediction
(IOS Press, 2018)
Part of book or chapter of book
Open AccessFeature selection (FS) is essential for the analysis of genomic datasets with millions of features. In such context, Big Data tools are paramount, but the use of standard machine learning models is limited for data with ... -
A compositional method for the synthesis of asynchronous communication mechanisms
(Springer, 2007-06-30)
Part of book or chapter of book
Open AccessAsynchronous data communication mechanisms (ACMs) have been extensively studied as data connectors between independently timed concurrent processes. In previous work, an automatic ACM synthesis method based on the generation ... -
Using contextual information in music playlist recommendations
(IOSPress, 2017)
Part of book or chapter of book
Open AccessRecommender Systems have become a fundamental part of various applications supporting users when searching for items they could be interested in,at a given moment. However, the majority of Recommender ... -
University teaching culture
(Octaedro, 2018-06)
Part of book or chapter of book
Open AccessThe CIDUI experience has been an unforgettable learning process for us all. At the time of writing these introductory pages, we had doubts about the topics that should be included. Maybe the ideas and great debates about ... -
The Greedy Algorithm and the Cohen-Macaulay property of rings, graphs and toric projective curves
(Springer, 2018)
Part of book or chapter of book
Open AccessIt is shown in this paper how a solution for a combinatorial problem obtained from applying the greedy algorithm is guaranteed to be optimal for those instances of the problem that, under an appropriate algebraic representation, ... -
Parallel memetic algorithms for independent job scheduling in computational grids
(Springer, 2008)
Part of book or chapter of book
Open AccessIn this chapter we present parallel implementations of Memetic Algorithms (MAs) for the problem of scheduling independent jobs in computational grids. The problem of scheduling in computational grids is known for its high ... -
Nature inspired meta-heuristics for grid scheduling: single and multi-objective optimization approaches
(Springer, 2008)
Part of book or chapter of book
Open AccessIn this chapter, we review a few important concepts from Grid computing related to scheduling problems and their resolution using heuristic and meta-heuristic approaches. Scheduling problems are at the heart of any Grid-like ...