Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Villadangos-Alonso, Jesus
Universidad Pzblica de Navarra
Pamplona, Spain
 
   Featured Reviewer
   Reviewer Selected
   Highlighted
Follow this Reviewer
 
 
 

Jesús Villadangos-Alonso is a lecturer at the Universidad Pública de Navarra (Spain). He is interested in the design of distributed algorithms in different scenarios, including wireless sensor networks and vehicular networks, and in the practical deployment of software engineering best practices following the CMMI model in small and medium enterprises.

He studied physics at the Universidad del País Vasco (Spain), and worked as a software engineer at CIM-Fabrik Hannover (Germany) and the Institut für Fertigungstechnik at Universität Hannover (Germany). He obtained his PhD in computer science at the Universidad Pública de Navarra (Spain), where he designed a distributed algorithm to resolve deadlocks under the OR resource request model. Jesús’ current research focuses on the integration of ontologies and distributed algorithms to adapt algorithm decisions to expert knowledge.

Additionally, Jesús is a SCAMPI Lead Appraiser candidate for the CMMI model, and his current activities center on the adoption of CMMI best practices in the software development management process at the Universidad Pública de Navarra.

He has authored 30 international publications and two patents, and participated in 15 projects supported by European, Spanish, and local administrations and enterprises.

He is member of the ACM and ISACA.

 
 
Options:
Date Reviewed  
 
1
- 10 of 35 reviews

   
   Multiple threats sense and avoid algorithm for static and dynamic obstacles
Melega M., Lazarus S., Savvaris A., Tsourdos A. Journal of Intelligent and Robotic Systems 77(1): 215-228, 2015.  Type: Article

Sense and avoid systems are a relevant topic at both the commercial and research levels. As the paper states, such systems will be compulsory for unmanned aerial vehicles (UAVs). The next regulation proposed by the European Aviation Sa...

Jul 8 2016  
   What camera motion reveals about shape with unknown BRDF
Chandraker M.  CVPR 2014 (Proceedings of the 2014 IEEE Conference on Computer Vision and Pattern Recognition,Jun 23-28, 2014) 2179-2186, 2014.  Type: Proceedings

The authors propose a mechanism to characterize object shape from differential motion of the camera with unknown bidirectional reflectance distribution functions (BRDFs). They based their proposal on psychophysical studies, establishin...

Aug 31 2015  
  Videocent: a quality-oriented incentive mechanism for video delivery in opportunistic networks
Wu H., Ma H., Zhao D. Wireless Networks 21(3): 769-781, 2015.  Type: Article

Videocent, a novel incentive mechanism that could not only provide incentives for selfish nodes but also maximize the delivery quality of video, is proposed in this paper. Its effectiveness is also validated through extensive simulatio...

Aug 18 2015  
  Security testing methodology for vulnerabilities detection of XSS in web services and WS-Security
Salas M., Martins E. Electronic Notes in Theoretical Computer Science (ENTCS) 302133-154, 2014.  Type: Article

Websites, like most other software components, are vulnerable to attacks. Cross-site scripting (XSS) attacks are a type of malicious code injection in which malicious scripts are injected into websites. Currently, many websites are use...

Feb 13 2015  
  Designing green network architectures using the ten commandments for a mature ecosystem
Drouant N., Rondeau É., Georges J., Lepage F. Computer Communications 4238-46, 2014.  Type: Article

Drouant et al. clarify from the beginning of the paper that their goal is to check if philosophical concepts from ecology make sense when considering a technical system, which takes into account all requirements and constraints of the ...

Jul 22 2014  
  Dealing with software model quality in practice: experience in a research project
de la Vara J., Espinoza H.  QSIC 2013 (Proceedings of the 2013 13th International Conference on Quality Software,Jul 29-30, 2013) 396-405, 2013.  Type: Proceedings

In this paper, the authors present the conclusions extracted from their collaboration in a European software development project, in which actors from different environments (academia and industry) participated....

May 20 2014  
  Access control in multi-party wireless sensor networks
Maerien J., Michiels S., Huygens C., Hughes D., Joosen W.  EWSN 2013 (Proceedings of the 10th European Conference on Wireless Sensor Networks, Ghent, Belgium, Feb 13-15, 2013) 34-49, 2013.  Type: Proceedings

This paper presents an access control infrastructure for resource-constrained wireless sensor nodes. The infrastructure uses a protocol based on symmetrical encryption for authentication and a role-based access control framework for au...

Oct 9 2013  
  Efficient spectrum allocation and time of arrival based localization in cognitive networks
Wang D., Leung H., Fattouche M., Ghannouchi F. Wireless Personal Communications: An International Journal 66(4): 813-831, 2012.  Type: Article

Wang et al. review the concept of cognitive networks (CN), and propose spectrum allocation based on orthogonal frequency division multiplexing (OFDM) and localization based on time of arrival (TOA) for such networks. The paper compares...

Mar 28 2013  
  Trust-based minimum cost opportunistic routing for ad hoc networks
Bo W., Chuanhe H., Layuan L., Wenzhong Y. Journal of Systems and Software 84(12): 2107-2122, 2011.  Type: Article

Mobile ad hoc networks (MANETs) are an active research field. Routing in such networks is an important problem, and nowadays opportunistic routing is an alternative. Opportunistic routing is well adapted for MANETs because both assume ...

Dec 27 2011  
  Show me how you move and I will tell you who you are
Gambs S., Killijian M., del Prado Cortez M.  SPRINGL 2010 (Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, San Jose, CA, Nov 2, 2010) 34-41, 2010.  Type: Proceedings

Sanitization algorithms and methods for preserving geoprivacy are evaluated in this paper. It is motivated by actual situations where a large amount of geolocation information is available, and the analysis of it could compromise perso...

Feb 7 2011  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy