scispace - formally typeset
Search or ask a question
Author

Sergi Robles

Bio: Sergi Robles is an academic researcher from Autonomous University of Barcelona. The author has contributed to research in topics: Mobile agent & Mobile computing. The author has an hindex of 15, co-authored 69 publications receiving 825 citations. Previous affiliations of Sergi Robles include University of Alabama at Birmingham.


Papers
More filters
Journal ArticleDOI
TL;DR: A Room Escape teaching experience developed in the Engineering School at Universitat Autonoma de Barcelona is explained to increase student’s motivation and to improve their learning on two courses of the second year in the Computer Engineering degree: Computer Networks and Information and Security.
Abstract: Real-life room-escape games are ludic activities in which participants enter a room in order to get out of it only after solving some riddles. In this paper, we explain a Room Escape teaching experience developed in the Engineering School at Universitat Autonoma de Barcelona. The goal of this activity is to increase student’s motivation and to improve their learning on two courses of the second year in the Computer Engineering degree: Computer Networksand Information and Security.

145 citations

Journal ArticleDOI
TL;DR: By using this low-budget system, the number of casualties during the triage stage of an emergency is expected to drop off, and the feasibility of the proposal is shown.

63 citations

Journal ArticleDOI
TL;DR: The proposed system can securely gather, integrate, and display distributed medical information using mobile-agent technology and agent-driven security.
Abstract: Healthcare is information driven and knowledge driven. Good healthcare depends on making decisions at the right time and place, using the right patient data and applicable knowledge. Communication is of utmost relevance in today's healthcare settings, in that delivery of care, research, and management all depend on sharing information. The proposed system can securely gather, integrate, and display distributed medical information using mobile-agent technology and agent-driven security

61 citations

Journal ArticleDOI
TL;DR: This paper presents a floor plan database, named CVC-FP, that is annotated for the architectural objects and their structural relations and implemented a groundtruthing tool, the SGT tool, that allows to make specific this sort of information in a natural manner.
Abstract: Recent results on structured learning methods have shown the impact of structural information in a wide range of pattern recognition tasks. In the field of document image analysis, there is a long experience on structural methods for the analysis and information extraction of multiple types of documents. Yet, the lack of conveniently annotated and free access databases has not benefited the progress in some areas such as technical drawing understanding. In this paper, we present a floor plan database, named CVC-FP, that is annotated for the architectural objects and their structural relations. To construct this database, we have implemented a groundtruthing tool, the SGT tool, that allows to make specific this sort of information in a natural manner. This tool has been made for general purpose groundtruthing: It allows to define own object classes and properties, multiple labeling options are possible, grants the cooperative work, and provides user and version control. We finally have collected some of the recent work on floor plan interpretation and present a quantitative benchmark for this database. Both CVC-FP database and the SGT tool are freely released to the research community to ease comparisons between methods and boost reproducible research.

52 citations

Proceedings ArticleDOI
19 Jul 2004
TL;DR: In this paper, a new solution for the implementation of flexible protection mechanisms in the context of mobile agent systems, where security problems are currently a major issue is presented.
Abstract: In this paper, we present a new solution for the implementation of flexible protection mechanisms in the context of mobile agent systems, where security problems are currently a major issue. In our scheme, agents protect their code and data by carrying their own protection mechanisms. This approach improves traditional solutions, where protection was managed by the platform. The implementation is far from trivial. We have implemented this scheme in the JADE framework, using Java. Any application using mobile agents can incorporate these mechanisms to implement agent protection with a minimum impact in the its existing code base.

51 citations


Cited by
More filters
Journal Article
TL;DR: In this paper, the ATLAS experiment is described as installed in i ts experimental cavern at point 1 at CERN and a brief overview of the expec ted performance of the detector is given.
Abstract: This paper describes the ATLAS experiment as installed in i ts experimental cavern at point 1 at CERN. It also presents a brief overview of the expec ted performance of the detector.

2,798 citations

01 Apr 1997
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Abstract: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind. The emphasis is on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity. Topics covered includes an introduction to the concepts in cryptography, attacks against cryptographic systems, key use and handling, random bit generation, encryption modes, and message authentication codes. Recommendations on algorithms and further reading is given in the end of the paper. This paper should make the reader able to build, understand and evaluate system descriptions and designs based on the cryptographic components described in the paper.

2,188 citations

Proceedings ArticleDOI
23 Aug 2015
TL;DR: A new Challenge 4 on Incidental Scene Text has been added to the Challenges on Born-Digital Images, Focused Scene Images and Video Text and tasks assessing End-to-End system performance have been introduced to all Challenges.
Abstract: Results of the ICDAR 2015 Robust Reading Competition are presented. A new Challenge 4 on Incidental Scene Text has been added to the Challenges on Born-Digital Images, Focused Scene Images and Video Text. Challenge 4 is run on a newly acquired dataset of 1,670 images evaluating Text Localisation, Word Recognition and End-to-End pipelines. In addition, the dataset for Challenge 3 on Video Text has been substantially updated with more video sequences and more accurate ground truth data. Finally, tasks assessing End-to-End system performance have been introduced to all Challenges. The competition took place in the first quarter of 2015, and received a total of 44 submissions. Only the tasks newly introduced in 2015 are reported on. The datasets, the ground truth specification and the evaluation protocols are presented together with the results and a brief summary of the participating methods.

1,224 citations

Proceedings ArticleDOI
25 Aug 2013
TL;DR: The datasets and ground truth specification are described, the performance evaluation protocols used are details, and the final results are presented along with a brief summary of the participating methods.
Abstract: This report presents the final results of the ICDAR 2013 Robust Reading Competition. The competition is structured in three Challenges addressing text extraction in different application domains, namely born-digital images, real scene images and real-scene videos. The Challenges are organised around specific tasks covering text localisation, text segmentation and word recognition. The competition took place in the first quarter of 2013, and received a total of 42 submissions over the different tasks offered. This report describes the datasets and ground truth specification, details the performance evaluation protocols used and presents the final results along with a brief summary of the participating methods.

1,191 citations