Papers by Javier Bustos-Jiménez
The rise of Open Data initiatives has led to the publication of many datasets from different orga... more The rise of Open Data initiatives has led to the publication of many datasets from different organizations and governments. These datasets cover a wide range of knowledge domains, from budget to education to health care. However, not all datasets have the quality, granularity or type of information that is relevant to each user. Moreover, in many cases the description or metadata does not specify clearly the content of a dataset, difficulting the exploration of datasets by stakeholders. In this paper we propose the use of dashboards and visualizations as a way to preview the content of datasets for easier exploration. The use of visualizations can provide a rapid way to select or discard datasets based on their content, reducing the potential datasets that a user may need to look in order to get what she needs.
In order to minimize the accidents, autonomous vehicles are being designed as the future of trans... more In order to minimize the accidents, autonomous vehicles are being designed as the future of transportation. To fulfill this goal, we should look at vehicular intersections, where unfortunately most car accidents take place. In "Automation of a T-intersection using virtual platoons of cooperative autonomous vehicles", the algorithm called "Target Vehicle Assignment(TVA)" was proposed to resolve the problem of deciding an order in which vehicles cross in a 4-way intersection. This article reviews this algorithm and uses it as starting point to propose novel algorithms that fix issues detected in the original algorithm. The newly proposed algorithms are designed to be used with Vehicle To Vehicle (V2V) communications and are descentralized to avoid dependency of specific hardware in any intersection.
Lecture Notes in Computer Science, 2020
The Domain Name System (DNS) is today a fundamental part of Internet's working. Considering that ... more The Domain Name System (DNS) is today a fundamental part of Internet's working. Considering that Internet has grown in the last decades as part of human's culture, user patterns regarding their behavior are present in the network data. As a consequence, some of these human behavior patterns are present as well in DNS data. With real data from the '.cl' ccTLD, this work seeks to detect those human patterns by using Machine Learning techniques. As DNS traffic is described by a time series, particular and complex techniques have to be used in order to process the data and extract this information. The procedure that we apply in order to achieve this goal is divided in two stages. The first one consists of using clustering to group DNS domains basing on the similarity between their users' activity. The second stage establishes a comparison between the obtained groups by using Association Rules. Finding human patterns in the data could be of high interest to researchers that analyze the human behavior regarding Internet's usage. The procedure was able to detect some trends and patterns in the data that are discussed along with proper evaluation measures for further comparison.
Proceedings of the 22nd ACM Internet Measurement Conference
We propose PHISHWEB, a novel approach to website phishing detection, which detects and categorize... more We propose PHISHWEB, a novel approach to website phishing detection, which detects and categorizes malicious websites through a progressive, multi-layered analysis. PHISHWEB combines and extends different detection approaches proposed in the literature, adding robustness to the identification and visibility into the particular type of deception technique employed by the attacker. We present preliminary results on the application of PHISHWEB to multiple open domain-name datasets, showing precision and recall results above 90% for the specific case of lexicographic-based analysis, improving state-of-the-art detection by more than 60% for Domain Generated Algorithms-driven attacks. CCS CONCEPTS • Networks → Web protocol security; Network monitoring.
This thesis aims to set the foundations for the development of load-balancing algorithms for thea... more This thesis aims to set the foundations for the development of load-balancing algorithms for theactive objects model defined by ProActive in the context of large-scale networks (Grids).ProActive is an open-source Java middleware which achieves seamless programming for concurrent,parallel, distributed, and mobile computing, implementing the active-object paradigm. InProActive, each active object has its own control thread and can independently decide in whichorder to serve incoming method calls. Incoming method calls are automatically stored in a queueof pending requests (called a service queue). To add efficiency to the active objects paradigm,ProActive provides a migration mechanism, having automatic location and transparency throughthe use of forwarders. The migration operation comes with a communication penalty: an activeobject must migrate with its complete state, consisting of its pending requests (method calls), futures,and passive (mandatory non-shared) objects. Therefore, Pr...
2018 Network Traffic Measurement and Analysis Conference (TMA), 2018
Global increase in the use of mobile Internet service generates interest in mobile network studie... more Global increase in the use of mobile Internet service generates interest in mobile network studies to determine and forecast the QoS provided by mobile operators. This study proposes different methods to forecast signal strength, one of the most important mobile Internet QoS indicator, based on time series analysis and considering external information about weather conditions as temperature, humidity and precipitations due to the effect they cause on mobile Internet QoS. This work shows the feasibility of forecasting mobile signal strength using crowd data corresponding to mobile devices in Santiago, Chile and that the inclusion of weather information generates more accurate forecast models for a given geographic area, obtaining good performance by all models used at comparing their forecast error values for weekly predictions. To the best of the authors' knowledge this is the first attempt of using weather information together with real data gathered from user devices in order to forecast mobile signal strength.
Sensors, 2021
Due to its huge impact on the overall quality of service (QoS) of wireless networks, both academi... more Due to its huge impact on the overall quality of service (QoS) of wireless networks, both academic and industrial research have actively focused on analyzing the received signal strength in areas of particular interest. In this paper, we propose the improvement of signal-strength aggregation with a special focus on Mobile Crowdsourcing scenarios by avoiding common issues related to the mishandling of log-scaled signal values, and by the proposal of a novel aggregation method based on interpolation. Our paper presents two clear contributions. First, we discuss the misuse of log-scaled signal-strength values, which is a persistent problem within the mobile computing community. We present the physical and mathematical formalities on how signal-strength values must be handled in a scientific environment. Second, we present a solution to the difficulties of aggregating signal strength in Mobile Crowdsourcing scenarios, as a low number of measurements and nonuniformity in spatial distribu...
Since 2013, we have been working on a distributed HSM using threshold cryptography algorithms, ma... more Since 2013, we have been working on a distributed HSM using threshold cryptography algorithms, mainly developing the distributed RSA algorithms proposed by Victor Shoup, where the private key is distributed among n key shares and only k ( k > n/2) of them are need to generate a valid signature. Our first developments were written in C using ZeroMQ as transport layer. Since 2019 we moved the development to GoLang creating the TCRSA which is composed by DTC (the PKCS#11 compliance library) and DTCNode (the key-share signers). Further information can be found at https://niclabs.cl/tchsm/. Nowadays our distributed threshold cryptography library support also RSA and ECDSA like signatures.
Constrained devices are a common factor in the Internet of Things (IoT). These devices have limit... more Constrained devices are a common factor in the Internet of Things (IoT). These devices have limited RAM and ROM memory, reduced battery, processing capacity, and transmission power. In consequence, these devices may not work properly with traditional Internet protocols like TCP and HTTP, which were not created for constrained scenarios. However, in 2015 the Internet Engineering Task Force (IETF) published the newest version of the most popular application protocol on the Internet: HTTP/2. It has significant improvements over the previous version, such as binary frames, multiplexing of streams, priorities, flow control, among others. In this work, the parameter of HTTP/2 window size is evaluated in terms of use of CPU, use of memory, response times, and energy consumption for constrained devices in IoT. With this work, we expect to promote the discussion about the utilization of HTTP/2 for IoT and to contribute to an eventual standardization.
In order to minimize the accidents, autonomous vehicles are being designed as the future of trans... more In order to minimize the accidents, autonomous vehicles are being designed as the future of transportation. To fulfill this goal, we should look at vehicular intersections, where unfortunately most car accidents take place. In “Automation of a T-intersection using virtual platoons of cooperative autonomous vehicles”, the algorithm called “Target Vehicle Assignment(TVA)” was proposed to resolve the problem of deciding an order in which vehicles cross in a 4-way intersection. This article reviews this algorithm and uses it as starting point to propose novel algorithms that fix issues detected in the original algorithm. The newly proposed algorithms are designed to be used with Vehicle To Vehicle (V2V) communications and are descentralized to avoid dependency of specific hardware in any intersection.
To address the needs for future network services, existing network architecture should evolve sig... more To address the needs for future network services, existing network architecture should evolve significantly to provide a higher level of flexibility, resilience and quality of service. This challenge was also the one of computing which has found with " virtualization " a breakthrough approach to bring a high flexibility in existing computing architecture which makes today the success of cloud computing. The next obvious following step is therefore to " cloudify " the networks. We introduce the VNET project, which proposes to study some of the most complex network cloudification problems from a global point of view i.e at radio access networks and the core networks to the service hosting data centers. It will identify the challenges and address the problems related to the visualization of RAN (Radio Access Networks), the problems of service composition and dependability related to the deployment of SDN and NFV, and finally the design a NaaS platform with the assoc...
2019 IEEE 5th World Forum on Internet of Things (WF-IoT), 2019
In this paper we introduce an adaptation to the "driver intent inference algorithm for urban inte... more In this paper we introduce an adaptation to the "driver intent inference algorithm for urban intersections". This algorithm has been proven to detect potential right turns of vehicles by estimating the probability of a driver to turn right, and we propose to use it for reducing the number of cycling deaths at an intersection. We extend this algorithm following the IoT design principles and thus, with this approach, cyclists' safety no longer depends only on actions taken inside the vehicles, but also can use additional safety solutions based on standards and available information shared about the vehicles and drivers in vehicular networks. Our approach proposes to process the inference algorithm outside the vehicle, considering cloud and edge computing. We use predicting models for identifying driver's intention of turning right at intersections and the use of edge connected devices running our algorithm for alerting cyclists of possible collisions, thus preventing as many collisions as possible in intersections.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct, 2016
Mobile devices are becoming increasingly more powerful, offering new possibilities to collect, pr... more Mobile devices are becoming increasingly more powerful, offering new possibilities to collect, process, show, and interact with information visualization data directly on them. Despite the appearance of a plethora of mobile apps with clever InfoVis designs, particularly in the area of personal visualization (e.g., fitness, energy), surprisingly little research has been conducted on information visualization on mobile devices. In this paper, we explore information visualization on mobile devices by presenting a first design iteration and an initial evaluation of the Adkintun Mobile app, which measures the quality of service (QoS) of mobile Internet connections. Based on our findings, strategies to both assist people in making sense of data and designers in creating effective visualizations for mobiles are discussed.
2014 33rd International Conference of the Chilean Computer Science Society (SCCC), 2014
ABSTRACT Almost all of DNS queries that traverse Internet are transported via UDP in self-contain... more ABSTRACT Almost all of DNS queries that traverse Internet are transported via UDP in self-contained small packages. Therefore, with no restriction of packet ordering, the intuition would say that adding thread-parallelism to the servers will increase their performance, but it does not. This paper study the problem of serialization accesses to UDP sockets, and states the problem in the way the packets are enqueued in the socket at kernel level, which introduces high levels of contention in synchronization primitives for thread using. As a naïve solution, we present a multi-queue receiver network stack which improves the performance of processing UDP small packages when multiple threads read from the same socket.
IEEE Latin America Transactions, 2016
IEEE Cloud Computing, 2016
Nowadays, applications are commonly deployed in distributed environments using multiple computati... more Nowadays, applications are commonly deployed in distributed environments using multiple computational resources from elastic cloud infrastructures. Environmental conditions, however, may vary through different providers or even at runtime and the applications must be able to quickly adapt to new conditions. Component based applications plus autonomic computing appear as flexible solutions to make applications reconfigurable and more adaptable. Programming of autonomic behavior, however, is not an easy task. In this work we use a component based framework to build reconfigurable and distributed applications, plus a scripting language to facilitate the programming of autonomic behavior. We show the effectivity of our approach using a distributed master-worker application that is able to self-adjust its load.
JOURNAL OF UNIVERSAL COMPUTER SCIENCE
Many users nowadays work with multiple heterogeneous computing devices, such as desktop computers... more Many users nowadays work with multiple heterogeneous computing devices, such as desktop computers, tablets, laptops and mobile phones. Transferring files between devices is cumbersome and usually done through the internet (e.g. email or cloud computing services) or physical devices such as flash drives. Some solutions for this problem have been proposed, however, they do not allow efficient and easy transferring of several files over medium distances. To facilitate file transfer between different devices, we implemented an augmented-reality based smartphone application that uses "pick-and-drop" and "drag-and-drop" mechanisms to transfer files between devices. This paper presents the implementation and evaluation of the interaction technique, called pick and drag and drop. This technique has two central contributions: it allows transferring several files at once, and it allows file transfer over greater distances than existing alternatives. The technique was teste...
XXV International Conference of the Chilean Computer Science Society (SCCC'05)
We present a contribution on dynamic load balancing for distributed and parallel object-oriented ... more We present a contribution on dynamic load balancing for distributed and parallel object-oriented applications. We specially target on peer to peer systems and its capability to distribute parallel computation, which transfer large amount of data (called intensive-communicated applications) among large number of processors. We explain the relation between active objects and processors load. Using this relation, and defining an order relation among processors, we describe our active object balance algorithm as a dynamic load balance algorithm, focusing on minimizing the time when active objects are waiting for the completion of remote calls. We benchmark a Jacobi parallel application with several load balancing algorithms. Finally, we study results from these experimentation in order to show that a peer to peer load balancing obtains the best performance in terms of migration decisions and scalability.
Proceedings of the 2011 15th International Conference on Computer Supported Cooperative Work in Design (CSCWD), 2011
Nomadic computing often refers to people using computer support working anywhere, anytime and not... more Nomadic computing often refers to people using computer support working anywhere, anytime and not necessarily attached to a specific location or time of the day. Mobile computing and wireless ad-hoc networks are important elements in this kind of scenarios. Nowadays it is common to see architects, engineers, geologists and/or designers working on the field and sharing ideas on a collaborative media using sketches and freehand writing. On this scenario, data overflow among the peer applications often happens, since the sketches have to be distributed among all participants in real time. This paper presents a work on characterization and compression algorithms for sketches, with and without loss of information, to be used on mobile devices, in order to reduce the data traffic. We focused our study on three parameters of the algorithms: time required characterizing and compressing the sketch, size of the resulting information and human perceived of lost information. Our results present algorithms with a compression ratio lower than 1% the size of the original image without information loosing under human perception. Nomadic computing, mobile computing, peer-to-peer collaborative systems I.
Uploads
Papers by Javier Bustos-Jiménez