Soriano Salvador, Enrique enrique.soriano@urjc.es

Publications

Plan B: Using files instead of middleware

  • Ballesteros, Francisco J.
  • Soriano, Enrique
  • Guardiola, Gorka
  • Leal, Katia;

Ieee Pervasive Computing (p. 58-65) - 1/9/2007

10.1109/mprv.2007.65 View at source

  • ISSN 15361268

Human-to-Human authorization for resource sharing in SHAD: Roles and protocols

  • Soriano, Enrique
  • Ballesteros, Francisco J.
  • Guardiola, Gorka;

Pervasive And Mobile Computing (p. 677-697) - 1/12/2007

10.1016/j.pmcj.2007.07.001 View at source

  • ISSN 15741192

The Plan B OS for ubiquitous computing. Voice control, security, and terminals as case studies

  • Ballesteros, Francisco J.
  • Soriano, Enrique
  • Guardiola, Gorka
  • Leal, Katia;

Pervasive And Mobile Computing (p. 472-488) - 1/11/2006

10.1016/j.pmcj.2006.08.001 View at source

  • ISSN 15741192

Plan B: Boxes for networked resources

  • Ballesteros F
  • Muzquiz G
  • Algara K
  • Soriano E
  • de las Heras Quirós P
  • Castro E
  • Leonardo A
  • Arévalo S
... View more Collapse

Journal Of The Brazilian Computer Society (p. 33-44) - 1/1/2004

10.1007/bf03192352 View at source

  • ISSN 01046500

This researcher has no books.

This researcher has no book chapters.

Pervasive user interface elements as synthetic networked files

  • Ballesteros FJ
  • Guardiola G
  • Soriano-Salvador E

Lecture Notes In Computer Science (p. 78-85) - 1/1/2013

10.1007/978-3-319-03176-7_11 View at source

  • ISSN 03029743

Mayordomo and Octopus: A case study in ambient intelligence environments

  • Ábalos N
  • Espejo G
  • López-Cózar R
  • Ballesteros FJ
  • Soriano E
  • Guardiola G

Lecture Notes In Computer Science (p. 153-160) - 1/1/2012

10.1007/978-3-642-35377-2_21 View at source

  • ISSN 03029743

AngryEmail? Emotion-based e-mail tool adaptation

  • Ortigosa Juarez, Alvaro Manuel
  • Carro Salas, Rosa Maria

Lecture Notes In Computer Science (p. 399-406) - 1/1/2012

10.1007/978-3-642-35395-6_54 View at source

  • ISBN 978-3-642-35394-9
  • ISSN 03029743

UpperWare: Bringing resources back to the system

  • Ballesteros FJ
  • Guardiola G
  • Soriano E

2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2010 (p. 511-516) - 1/1/2010

10.1109/percomw.2010.5470592 View at source

SHAD: A human-centered security architecture for the plan B operating system

  • Soriano, Enrique
  • Ballesteros, Francisco J.
  • Guardiola, Gorka;

FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS (p. 272-+) - 1/1/2007

10.1109/percom.2007.31 View at source

Plan B: An operating system for ubiquitous computing environments

  • Ballesteros FJ
  • Soriano E
  • Leal K
  • Guardiola G

PERCOM 2006: FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS (p. 126-+) - 1/1/2006

10.1109/percom.2006.43 View at source

Omero: Ubiquitous user interfaces in the plan B operating system

  • Ballesteros FJ
  • Guardiola G
  • Leal K
  • Soriano E

PERCOM 2006: FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS (p. 77-+) - 1/1/2006

10.1109/percom.2006.39 View at source

UbiTerm: A hand-held control-center for user's activity mobility

  • Leal, K
  • Ballesteros, F
  • Soriano, E
  • Guardiola, G;

INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES 2005, PROCEEDINGS (p. 127-135) - 1/1/2005

10.1109/perser.2005.1506401 View at source

Traditional systems can work well for pervasive applications a case study: Plan 9 from Bell Labs becomes ubiquitous.

  • Ballesteros, FJ
  • Guardiola, G
  • Soriano, E
  • Leal, K;

THIRD IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS (p. 295-299) - 1/1/2005

10.1109/percom.2005.49 View at source

SHAD: A human centered security architecture for partitionable, dynamic and heterogeneous distributed systems

  • Salvador ES

ACM International Conference Proceeding Series (p. 294-298) - 1/1/2004

10.1145/1028480.1028483 View at source

This researcher has no working papers.

This researcher has no technical reports.

This researcher has no research projects.

This researcher has no supervised thesis.

This researcher has no patents or software licenses.

Last data update: 3/5/24 2:06 PM