305 research outputs found
RECOMENDACIONES DE SEGURIDAD EN EXÁMENES: ANTES, DURANTE Y DESPUÉS
Este artículo presenta un análisis de los posibles fraudes la realización de exámenes, con especial énfasis en aquellos tipos de fraude que empleen algún mecanismo basado en la tecnología y propone un conjunto de recomendaciones para la mejorar de la seguridad de los mismos. El trabajo se centra en los fraudes relacionados con los exámenes tradicionales. No se abordan las amenazas específicas contra exámenes realizados mediante ordenador o en plataformas online, aunque algunas de las medidas propuestas también suponen mejoras para dichos entornos. This article presents an analysis of the potential frauds related to test realization, focusing on technology-based frauds and establishes a set of recommendations and good practices to improve test security. This work deals with ‘pen and paper’ tests. The specific threats against compute-based or online tests are out of the scope of this work; they could benefit from the application of some of the recommendations outlined here, though
Performance analysis of a security architecture for active networks in Java
Internacional Association of Science and Technology for Development - IASTED, Benalmadena, Spain: 8-10 Septiembre, 2003.Active network technology supports the deployment and execution on the fly of new active services, without interrupting the network operation. Active networks are
composed of special nodes (named Active Router) that are able to execute active code to offer the active services. This technology introduces some security threats that must be solved using a security architecture. We have developed a security architecture (ROSA) for an active network platform (SARA). Java has been used as
programming language in order to provide portability, but it imposes some performance limitations. This paper analyses the penalty of using Java and proposes some mechanisms to improve the performance of cryptographic
implementations in Java.Publicad
Dataset of academic performance evolution for engineering students
This data article presents data on the results in national as- sessments for secondary and university education in engineering students. The data contains academic, social, economic information for 12,411 students. The data were obtained by orderly crossing the databases of the Colombian Institute for the Evaluation of Education (ICFES). The structure of the data allows us to observe the influence of social variables and the evolution of students’ learning skills. In addition to serving as input to develop analysis of academic efficiency, student recommendation systems and educational data mining
A machine learning approach for banks classification and forecast
n this research, a classification model is developed for the banking sector using the machine earning technique GLMNET. In the first place, a clustering process was developed, where 3 clearly differentiated groups were found. Subsequently, a Fuzzy analysis was performed finding the probabilities of transition of the banks to each group found, finally, the GLMNET algorithm was implemented, the automatic classification of the banks according to their financial items, obtaining a result of 95% accuracy. © 2019 International Business Information Management Association (IBIMA)
Hierarchical Clustering and Linguistic Mediation Rules for Multiagent Negotiation
Eleventh International Conference on Autonomous Agents and Multiagent Systems AAMAS 2012, , 04/06/2012-08/06/2012, Valencia, EspañaWe propose a framework based on Hierarchical Clustering (HC) to perform multiagent negotiations where we can specify the type of agreements needed in terms of utility sharing among the agents.The proposed multi-round mediation process is based on the analysis of the agents" offers at each negotiation round and the generation of a social contract at each round as a feedback to the agents, which explore the negotiation space to generate new offers. This mechanism efficiently manages negotiations following predefined consensus policies avoiding zones of no agreemen
Mecanismos de Seguridad para una red ad hoc en un entorno urbano
Las redes ad-hoc representan un paradigma de comunicación\ud
emergente cuya aplicación se ha propuesto en diversos entornos por su\ud
capacidad de autoconfiguración y rápido despliegue. Sin embargo, siguen\ud
planteados importantes desafíos relativos a problemas de seguridad. Uno\ud
de estos problemas es la gestión y distribución de claves. Se propone la\ud
aplicación del protocolo TESLA de distribución de claves a una red adhoc\ud
de servicios en un entorno urbano como la alternativa más adecuada\ud
frente a otras propuestas en el estado del arte. Finalmente, se realizan\ud
pruebas de validación de un estadio preliminar del algoritmo propuesto
A Region-Based Multi-Issue Negotiation Protocol For Non-Monotonic Utility Spaces
Ministerio de Educación y Cienci
- …