Alejandro Quintero

ORCID: 0000-0003-0917-8027
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Wireless Communication Networks Research
  • Mobile Ad Hoc Networks
  • IPv6, Mobility, Handover, Networks, Security
  • Opportunistic and Delay-Tolerant Networks
  • Energy Efficient Wireless Sensor Networks
  • Software-Defined Networks and 5G
  • Cloud Computing and Resource Management
  • Vehicular Ad Hoc Networks (VANETs)
  • Advanced MIMO Systems Optimization
  • Mobile Agent-Based Network Management
  • Wireless Networks and Protocols
  • Advanced Wireless Network Optimization
  • Distributed and Parallel Computing Systems
  • Network Security and Intrusion Detection
  • IoT and Edge/Fog Computing
  • Advanced Malware Detection Techniques
  • Cooperative Communication and Network Coding
  • Advanced Optical Network Technologies
  • Service-Oriented Architecture and Web Services
  • Caching and Content Delivery
  • Electric Power System Optimization
  • Multi-Agent Systems and Negotiation
  • Cryptography and Data Security
  • Indoor and Outdoor Localization Technologies
  • Distributed systems and fault tolerance

Polytechnique Montréal
2015-2024

Toronto Metropolitan University
2020

Université de Montréal
2018

Centro Internacional de Mejoramiento de Maíz Y Trigo
2013-2017

Austral University of Chile
2012-2017

École Normale Supérieure - PSL
2006-2014

École Polytechnique
2003-2014

Concordia University
2010

Universidad de Los Andes
1999

Vehicular Ad-hoc NETworks (VANET) can efficiently detect traffic congestion, but detection is not enough because congestion be further classified as recurrent and non-recurrent (NRC). In particular, NRC in an urban network mainly caused by incidents, workzones, special events adverse weather. We propose a framework for the real-time distributed classification of into its components on heterogeneous road using VANET. present models built understanding spatial temporal causality measures...

10.1109/tits.2016.2641903 article EN IEEE Transactions on Intelligent Transportation Systems 2017-01-31

Distributed denial of service attacks are cyber-attacks that target the availability servers. As a result, legitimate users no longer have access to service. This can negative impact on an organization, such as lack reputation and economic losses. Therefore, it is important design defense mechanisms against these attacks. There systems for detecting distributed in literature, which still various shortcomings. Some detect presence attack traffic without identifying packets or flows. Others...

10.1109/tnsm.2022.3142254 article EN IEEE Transactions on Network and Service Management 2022-01-26

Mobile devices are becoming an essential part of many users' lives. Users exchange sometimes very sensitive data with remote servers. This raises a security problem in terms the confidentiality and integrity these data, privacy. Mutual authentication protocols allow user server to confirm each other's legitimacy share session key encrypt subsequent communications. Several have been proposed achieve this goal. However, certain weaknesses, such as impersonation, lack anonymity, use additional...

10.1109/tnsm.2021.3071087 article EN IEEE Transactions on Network and Service Management 2021-04-05

Third-generation mobile systems provide access to a wide range of services and enable users communicate regardless their geographical location roaming characteristics. Due the growing number users, global connectivity, small size cells, one most critical issues regarding these networks is management. In recent years, several strategies have been proposed improve performance management procedure in 3G networks. this paper, we present user pattern learning strategy (UPL) using neural reduce...

10.1109/tmc.2005.75 article EN IEEE Transactions on Mobile Computing 2005-10-12

10.1016/j.vehcom.2017.04.004 article EN Vehicular Communications 2017-04-26

Assigning cells to switches in cellular mobile networks is an NP-hard problem which, for real size networks, could not be solved using exact methods. In this context, heuristic approaches like memetic algorithms can used. This paper proposes a algorithm (MA) solve problem. The implementation of has been subject extensive tests. results obtained confirm the efficiency and effectiveness MA provide good solutions moderate- large-sized comparison with tabu search Merchant Sengupta's heuristics....

10.1109/lcomm.2002.805515 article EN IEEE Communications Letters 2002-11-01

The deregulated electricity industry is characterized by structural change and strategic behaviors of market participants. There a need novel model for medium long term planning that could include games theoretical assumptions as well other more complex assumptions. This paper proposes new agent-based designed to support decentralized activities in supply industry, with certain level flexibility. In this model, the expansion method developed around multiagent simulation system where...

10.1109/psce.2004.1397588 article EN IEEE PES Power Systems Conference and Exposition 2005-04-19

The main concern of the next generation mobile networks is integration heterogeneous wireless technologies around an IP backbone. However this invokes many challenges such as mobility management and handoff decision making. Various approaches have been proposed to deal with handover problem, yet initiation network destination selection remain critical issues which are widely based on traditional RSS measurements. In paper, we propose a new fuzzy making approach that considers variety context...

10.1109/ccece.2008.4564602 article EN Conference proceedings - Canadian Conference on Electrical and Computer Engineering 2008-05-01

We developed a distributed data mining system to elaborate on decision concerning the cause of urban traffic congestion via emerging connected vehicle (CV) technology. observe this complex phenomena through interactions between vehicles exchanging messages communication. Results are based real-time simulation generated scenarios extended from real-world travel and activity patterns cologne scenario. evaluate voting procedure that provides deeper insights using cooperation vehicles, belief...

10.1109/tits.2018.2886699 article EN IEEE Transactions on Intelligent Transportation Systems 2019-01-15

The task of finding and maintaining routes in a Wireless Sensor Networks is nontrivial since energy restrictions sudden changes node status (e.g. failure) cause frequent unpredictable topological changes. This work introduces novel location routing protocol that uses smart antennas to estimate nodes positions into the network deliver information basing decisions on neighbor’s connection relative position, named LBRA. main purpose LBRA eliminate control overhead as much possible. To achieve...

10.17485/ijst/2015/v8i11/71788 article EN Indian Journal of Science and Technology 2015-06-16

In cloud computing, a fundamental management problem with the Infrastructure as Service (IaaS) model lies in efficient embedding of computational and networking resources onto distributed virtualized infrastructures owned by independent providers (CPs). such context, this issue usually referred to Virtual Network Embedding (VNE) problem, adds more complexity since entire process requires two mayor phases operation: multicloud virtual network requests (VNRs) splitting, followed intracloud VNR...

10.1109/tcc.2019.2904227 article EN IEEE Transactions on Cloud Computing 2019-03-11

Selecting the most stable partner on a vehicular ad hoc network (VANET) is challenging task due to its unique mobility, driver behavior, and networking requirements. Although new selection protocols are introduced for mobile networks general there lack of protocol that suitable VANET. This paper discusses requirements such presents handoff tailored VANET We leverage use partner-assisted by introducing vehicle link expiration time (VLET) metric designed maximize intervehicular connections....

10.1109/tvt.2018.2872824 article EN IEEE Transactions on Vehicular Technology 2018-10-15

We propose a Short-term Traffic flow Prediction (STP) framework so that transportation authorities take early actions to control and prevent congestion.We anticipate at future time frames on target road segment based historical data innovative features such as real feeds trajectory provided by Connected Vehicles (CV) technology.To cope with the fact existing approaches do not adapt variation in traffic, we show how this novel approach allows advanced modelling integrating into forecasting of...

10.1109/tmc.2020.3006713 article EN IEEE Transactions on Mobile Computing 2020-01-01
Coming Soon ...