default search action
Miguel Jimeno
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Karen Villalba, Miguel Jimeno, Heydy Robles, Leonardo Vergara, Camilo Sinning, Leonardo Lizcano, Breynner Hurtado, Wilson Nieto:
Eyeland: A Visually-Impaired Accessible English Learning Application Using a Design-Based Research Framework. IEEE Access 12: 142275-142290 (2024) - [j9]Heydy Robles, Adriana Perez, Karen Villalba, M. C. Delgado-Cañas, Elkin Villanueva, Conor Keogh, Miguel Jimeno:
Language learning apps for visually impaired users: a systematic review. Res. Pract. Technol. Enhanc. Learn. 19: 12 (2024) - [c13]Mauricio Barrios Barrios, Adriana Iglesias, Fernando Mendez, Miguel Jimeno, Daladier Jabba, Nadim Tellez, Yamid Hernandez:
Developing Comfort Monitoring Prototype Using IoT and Cloud Computing. CISIM 2024: 109-124 - 2023
- [j8]Heydy Robles, Miguel Jimeno, Karen Villalba, Ivan Mardini, César Viloria-Nuñez, Wendy Florian:
Design of a micro-learning framework and mobile application using design-based research. PeerJ Comput. Sci. 9: e1223 (2023) - [j7]Alvaro Reyes, Miguel Jimeno, Ricardo Villanueva-Polanco:
Continuous and Secure Integration Framework for Smart Contracts. Sensors 23(1): 541 (2023) - 2021
- [j6]Jorge Ariza, Miguel Jimeno, Ricardo Villanueva-Polanco, Jose Capacho:
Provisioning Computational Resources for Cloud-Based e-Learning Platforms Using Deep Learning Techniques. IEEE Access 9: 89798-89811 (2021) - 2020
- [c12]Margarita Gamarra, Eduardo E. Zurek, Wilson Nieto-Bernal, Miguel Jimeno, Deibys Sierra:
Spiral-Based Model for Software Architecture in Bio-image Analysis: A Case Study in RSV Cell Infection. CISIM 2020: 25-38
2010 – 2019
- 2019
- [j5]Pedro M. Wightman, Wilson Nieto-Bernal, Jaider Vega, Miguel Jimeno, Lucy E. García, Mauricio Pardo, Diego Gómez, Emyle Britton, José Andrés Moreno-Pérez:
Diamante digital, una apuesta territorial por el desarrollo a partir de las TIC. Rev. Colomb. de Computación 20(1) (2019) - [c11]Nadim Tellez, Miguel Jimeno, Augusto Salazar, Elias David Niño Ruiz:
Container-based architecture for optimal face-recognition tasks in edge computing. SEC 2019: 301-303 - 2018
- [j4]Mayra Zurbarán, Pedro M. Wightman, Maria A. Brovelli, Daniele Oxoli, Mark Iliffe, Miguel Jimeno, Augusto Salazar:
NRand-K: Minimizing the impact of location obfuscation in spatial analysis. Trans. GIS 22(5): 1257-1274 (2018) - 2017
- [j3]Karen Avila, Paul Sanmartin, Daladier Jabba, Miguel Jimeno:
Applications Based on Service-Oriented Architecture (SOA) in the Field of Home Healthcare. Sensors 17(8): 1703 (2017) - [c10]Martin Diaz-Mora, Martin Diaz-Rodriguez, Miguel Jimeno:
Definition and validation of an energy savings process for computers based on user behaviors and profiles. WiMob 2017: 9-16 - [c9]Margarita Gamarra, Eduardo E. Zurek, Wilson Nieto-Bernal, Miguel Jimeno, Deibys Sierra:
A Service-Oriented Architecture for Bioinformatics: An Application in Cell Image Analysis. WorldCIST (1) 2017: 724-734 - 2014
- [c8]Liliana Gonzalez, Mayra Zurbarán, Pedro M. Wightman, Daladier Jabba, Miguel Jimeno, Eduardo E. Zurek:
Sensitivity analysis and countermeasures for transformation-based location obfuscation. ICCST 2014: 1-6 - [c7]Miguel Jimeno, Martín Diaz, John E. Candelo, Pedro M. Wightman:
EnergyAware - Mobile-based Architecture for Maximizing Energy Savings during Computer Idle Times. SMARTGREENS 2014: 141-149 - 2012
- [j2]Miguel E. Rodríguez, Geovanni Berdugo, Daladier Jabba, Maria Calle, Miguel Jimeno, Juan P. Tello, Eileen Triana, Laura Zapata:
Neural Networks and Hausdorff Distance Applied to Number Recognition in Electrical Meters. Appl. Artif. Intell. 26(10): 921-940 (2012) - [c6]Pedro M. Wightman, Miguel Jimeno, Daladier Jabba, Miguel A. Labrador:
Matlock: A location obfuscation technique for accuracy-restricted applications. WCNC 2012: 1829-1834 - 2011
- [c5]Pedro M. Wightman, Miguel Jimeno, Daladier Jabba, Miguel A. Labrador, Mayra Zurbarán, César Córdoba, Armando Guerrero:
Empirical Approach to Network Sizing for Connectivity in Wireless Sensor Networks with Realistic Radio Propagation Models. ADHOC-NOW 2011: 72-85 - 2010
- [j1]Kenneth J. Christensen, Allen Roginsky, Miguel Jimeno:
A new analysis of the false positive rate of a Bloom filter. Inf. Process. Lett. 110(21): 944-949 (2010)
2000 – 2009
- 2008
- [c4]Miguel Jimeno, Ken Christensen, Bruce Nordman:
A Network Connection Proxy to Enable Hosts to Sleep and Save Energy. IPCCC 2008: 101-110 - [c3]Miguel Jimeno, Kenneth J. Christensen:
P2P directory search: Signature Array Hash Table. LCN 2008: 506-508 - 2007
- [c2]Miguel Jimeno, Kenneth J. Christensen, Allen Roginsky:
A Power Management Proxy with a New Best-of-N Bloom Filter Design to Reduce False Positives. IPCCC 2007: 125-133 - [c1]Miguel Jimeno, Kenneth J. Christensen:
A Prototype Power Management Proxy for Gnutella Peer-to-Peer File Sharing. LCN 2007: 210-212
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint