Name
Papers
Collaborators
RAMIRO LISCANO
64
108
Citations 
PageRank 
Referers 
247
51.58
660
Referees 
References 
906
399
Search Limit
100906
Title
Citations
PageRank
Year
Differential Evolution Optimization of TSCH Scheduling for Heterogeneous Sensor Networks00.342022
Implementation and Test of DSRC Standard on a Wireless Communication-Based Active Safety System.00.342019
Fixed Node Assisted Collection Tree Protocol For Mobile Wireless Sensor Networks00.342019
Inside out - A study of users’ perceptions of password memorability and recall20.372019
Improving Localization in Sensor Networks by Leveraging Inter-node Ranking of Received Signal Strength and Clustering.00.342019
Have We Met Before? Using Consumer-Grade Brain-Computer Interfaces to Detect Unaware Facial Recognition20.422018
Integrating Access Control Obligations in the Session Initiation Protocol for Pervasive Computing Environments.00.342017
An efficient intrusion detection system based on hypergraph - Genetic algorithm for parameter optimization and feature selection in support vector machine.170.562017
What Your Brain Says About Your Password: Using Brain-Computer Interfaces to Predict Password Memorability10.352017
Evaluating Hamming Distance as a Metric for the Detection of CRC-based Side-channel Communications in MANETs.00.342016
Comparative Analysis of Prominent Middleware Platforms in the Domain of Ambient Assisted Living (AAL) for an Older Adults with Dementia (OAwD) Scenario.10.362016
Evaluating Hamming Distance as a CRC-based Side-channel Detection Measure in Wi-Fi Networks.00.342016
Challenges in the Effectiveness of Image Tagging Using Consumer-Grade Brain-Computer Interfaces.00.342016
Tinypolicy: A Distributed Policy Based Management Framework For Wireless Sensor Networks00.342015
Hamming distance as a metric for the detection of CRC-based side-channel communications in 802.11 wireless networks30.482015
3d Localization In Large-Scale Wireless Sensor Networks: A Micro-Differential Evolution Approach20.392014
Distributed policy based management for wireless sensor networks to support the internet of things environment00.342014
Determining Fuzzy Link Quality Membership Functions in Wireless Sensor Networks00.342014
Bloom Filter Supporting Distributed Policy-Based Management in Wireless Sensor Networks.00.342013
Integrated Development Environment for Debugging Policy-based Applications in Wireless Sensor Networks.00.342013
Enhancing Collection Tree Protocol for Mobile Wireless Sensor Networks.00.342013
UML Modelling of Design Patterns for Wireless Sensor Networks.10.362013
Framework for Distributed Policy-Based Management in Wireless Sensor Networks to Support Autonomic Behavior.50.442012
Distributed Policy-Based Management for Wireless Sensor Networks.00.342012
Challenges in the Implementation and Simulation for Wireless Side-Channel based on Intentionally Corrupted FCS.60.642011
Wireless Sensor Actor Network Simulation for a Fire Extinguishing System.10.372011
Simulation of DDOS Attacks on P2P Networks30.462011
Network performance of a wireless sensor network for temperature monitoring in vineyards20.482011
Ubiquitous Intelligence and Computing - 7th International Conference, UIC 2010, Xi'an, China, October 26-29, 2010. Proceedings492.742010
Utilizing Semantic Knowledge for Access Control in Pervasive and Ubiquitous Systems60.622010
Design of a Wireless Sensor Network from an Energy Management Perspective30.652010
Vehicle traffic congestion management in vehicular ad-hoc networks201.612009
A Frame Handler Module For A Side-Channel In Mobile Ad Hoc Networks70.782009
Dynamic Role Assignment Using Semantic Contexts10.362009
IP address configuration in VANET using centralized DHCP140.802008
A Context-Based Delegation Access Control Model for Pervasive Computing20.372007
Performance Measurement of XML Compression Algorithms for DSRC Messages00.342007
User-credential based role mapping in multi-domain environment40.482006
Personalization of internet telephony services for presence with SIP and extended CPL20.492006
Managing Access Control for Presence-Based Services10.392005
A SIP-based Architecture model for Contextual Coalition Access Control for Ubiquitous Computing50.722005
Projecting Web services using presence communication protocols for pervasive computing10.462005
Integrating Service Discovery Protocols with Presence-Based Communications for Ad Hoc Collaborative Scenarios20.422004
Session-Based Service Discovery and Access Control in Peer-to-Peer Communications00.342004
Context and Intent in Call Processing51.272003
Indoor Ad Hoc Proximity-Location Sensing for Service Provider Selection20.402003
Agent-Based Context-Aware Ad hoc Communication40.952002
Software modeling for embedded and mobile sensor system00.342001
A multi-agent system for personal messaging10.382000
Toward a Mobile Work Environment10.372000
  • 1
  • 2