Patricio Galdames

Patricio Galdames
Verified
Patricio verified their affiliation via an institutional email.
Verified
Patricio verified their affiliation via an institutional email.
  • PhD in Computer Science
  • Part time Researcher & Lecturer at San Sebastián University

About

22
Publications
1,183
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
94
Citations
Current institution
San Sebastián University
Current position
  • Part time Researcher & Lecturer
Additional affiliations
March 2013 - August 2023
University of Bío-Bío
Position
  • Lecturer

Publications

Publications (22)
Article
Full-text available
This paper addresses the challenge of preserving user privacy in location-based services (LBSs) by proposing a novel, complementary approach to existing privacy-preserving techniques such as k-anonymity and l-diversity. Our approach implements collaborative caching strategies within a mobile ad hoc network (MANET), exploiting the geographic of loca...
Article
Full-text available
Deriving insight from data is a challenging task for researchers and practitioners, especially when working on spatio-temporal domains. If pattern searching is involved, the complications introduced by temporal data dimensions create additional obstacles, as traditional data mining techniques are insufficient to address spatio-temporal databases (S...
Article
Full-text available
Social networks such as Twitter provide thousands of terabytes per day, which can be exploited to find relevant information. This relevant information is used to promote marketing strategies, analyze current political issues, and track market trends, to name a few examples. One instance of relevant information is finding cyclic behavior patterns (i...
Article
Full-text available
This paper focuses on adopting cybersecurity procedures in Chilean manufacturing companies in the context of the Fourth Industrial Revolution’s data-driven demands, which have exposed vulnerabilities in cybersecurity. This analysis is based on data from the Fifth Longitudinal Survey of Companies - ELE 5 - conducted by the National Institute of Stat...
Article
Full-text available
Nowadays, people can access a wide range of applications and services for mobile device users. Among them, location-based services (LBS), where the application needs the user’s position to provide the service. Some examples of these applications are Uber and Waze. Nevertheless, the repetitive use of an LBS can reveal confidential user information;...
Article
Full-text available
Location-based services (LBSs) have become a profitable market because they offer real-time and local information to their users. Although several benefits are obtained from the usage of LBSs, they have opened up many privacy and safety challenges because a user needs to release his/her location. To tackle these challenges, many location-cloaking t...
Article
Full-text available
Location-based services (LBSs) assume that users are willing to release trustworthy and useful details about their whereabouts. However, many location privacy concerns have arisen. For location privacy protection, several algorithms build a cloaking region to hide a user’s location. However, many applications may not operate adequately on cloaked l...
Conference Paper
This paper presents a subscription-based overlay network that supports file parallel downloading for cloud collaboration. First, our system lets users to register to a central server and allows this server to incrementally build a topology graph containing the network connections among the subscribers. With this topology graph in place, we plan to...
Conference Paper
Full-text available
When requesting location-based services, users can associate their queries with a purposely blurred location such as a circular or rectangular geographic region instead of their exact position. This strategy makes it possible for privacy protection, but presents problems in query processing. Since the server does not know a user's exact position, i...
Conference Paper
This paper presents a subscription-based overlay network that supports efficient any-source multicast. The system lets users register to a central server and allows the server to incrementally build a topology graph that contains the network connections among the subscribers. With this topology graph in place, we address the challenges of minimizin...
Conference Paper
Full-text available
A spatial monitoring query (SMQ) retrieves the set of mobile nodes that satisfy some spatial constraints, and provides real-time updates whenever this set of nodes changes. Efficient processing of such queries is essential to moving objects database management. Existing techniques rely on one or more central servers for query management and assume...
Conference Paper
Full-text available
Overlay multicast streaming is built out of loosely cou- pled end-hosts (peers) that contribute resources to stream media to other peers. Peers, however, can be malicious. They may intentionally wish to disrupt the multicast ser- vice or cause confusions to other peers. We propose two new schemes to detect malicious peers in overlay multicast strea...
Conference Paper
Full-text available
In a cluster of many servers containing heterogeneous multimedia learning material and serving users with different backgrounds (e.g. language, interests, previous knowledge, hardware and connectivity) it may be difficult for the learners to find a piece of material which fit their needs. This is the case of the COLDEX project. Recommender systems...

Network

Cited By