Miguel Jimeno
Title
Cited by
Cited by
Year
A network connection proxy to enable hosts to sleep and save energy
M Jimeno, K Christensen, B Nordman
2008 IEEE International Performance, Computing and Communications Conference …, 2008
962008
A new analysis of the false positive rate of a Bloom filter
K Christensen, A Roginsky, M Jimeno
Information Processing Letters 110 (21), 944-949, 2010
902010
A prototype power management proxy for gnutella peer-to-peer file sharing
M Jimeno, K Christensen
32nd IEEE Conference on Local Computer Networks (LCN 2007), 210-212, 2007
472007
Evaluation of location obfuscation techniques for privacy in location based information systems
P Wightman, W Coronell, D Jabba, M Jimeno, M Labrador
2011 IEEE Third Latin-American Conference on Communications, 1-6, 2011
402011
Tis-Bad: a time series-based deobfuscation algorithm
M Labrador, P Wightman, A Santander, D Jabba, M Jimeno
Investigación e Innovación en Ingenierías 3 (1), 2015
342015
Tis-Bad: a time series-based deobfuscation algorithm
M Labrador, P Wightman, A Santander, D Jabba, M Jimeno
Investigación e Innovación en Ingenierías 3 (1), 2015
342015
Wireless ECG and PCG portable telemedicine kit for rural areas of Colombia
M Jimeno, Y De la Hoz, J Wilches
Investigación e Innovación en Ingenierías 2 (2), 2014
262014
Wireless ECG and PCG portable telemedicine kit for rural areas of Colombia
M Jimeno, Y De la Hoz, J Wilches
Investigación e Innovación en Ingenierías 2 (2), 2014
262014
Wireless ECG and PCG portable telemedicine kit for rural areas of Colombia
M Jimeno, Y De la Hoz, J Wilches
Investigación e Innovación en Ingenierías 2 (2), 2014
262014
Applications Based on Service-Oriented Architecture (SOA) in the Field of Home Healthcare
K Avila, P Sanmartin, D Jabba, M Jimeno
Sensors 17 (8), 1703, 2017
192017
Matlock: A location obfuscation technique for accuracy-restricted applications
PM Wightman, MA Jimeno, D Jabba, M Labrador
2012 IEEE Wireless Communications and Networking Conference (WCNC), 1829-1834, 2012
182012
Matlock: A location obfuscation technique for accuracy-restricted applications
PM Wightman, MA Jimeno, D Jabba, M Labrador
2012 IEEE Wireless Communications and Networking Conference (WCNC), 1829-1834, 2012
182012
A power management proxy with a new best-of-n bloom filter design to reduce false positives
M Jimeno, K Christensen, A Roginsky
2007 IEEE International Performance, Computing, and Communications …, 2007
162007
A tabu search method for load balancing in fog computing
N Téllez, M Jimeno, A Salazar, E Nino-Ruiz
Int. J. Artif. Intell 16 (2), 2018
112018
HD-MR: a new algorithm for number recognition in electrical meters
M Rodríguez, G Berdugo, D Jabba, M Calle, M Jimeno
Turkish Journal of Electrical Engineering & Computer Sciences 22 (1), 87-96, 2014
102014
Development of a nasogastric tube insertion simulator: a collaborative interdisciplinary effort
L Summer, L Gonzalez, M Jimeno, K Christensen
CIN: Computers, Informatics, Nursing 27 (2), 105-113, 2009
102009
θ-Rand: Random noise-based location obfuscation based on circle sectors
P Wightman, M Zurbaran, E Zurek, A Salazar, D Jabba, M Jimeno
2013 IEEE Symposium on Industrial Electronics & Applications, 100-104, 2013
92013
Two-tier bloom filter to achieve faster membership testing
M Jimeno, KJ Christensen, A Roginsky
Electronics Letters 44 (7), 503-504, 2008
92008
Empirical approach to network sizing for connectivity in wireless sensor networks with realistic radio propagation models
P Wightman, M Jimeno, D Jabba, M Labrador, M Zurbarán, C Córdoba, ...
International Conference on Ad-Hoc Networks and Wireless, 72-85, 2011
62011
P2p directory search: Signature array hash table
M Jimeno, K Christensen
2008 33rd IEEE Conference on Local Computer Networks (LCN), 506-508, 2008
62008
The system can't perform the operation now. Try again later.
Articles 1–20