4 documents found, page 1 of 1

Sort by Issue Date

Extreme, wintertime Saharan dust intrusion in the Iberian Peninsula: Lidar moni...

Fernández, Alfonso; Sicard, Michael; Costa, Maria João; Guerrero-Rascado, J. L.; Gómez-Amo, J.L.; Molero, F.; Barragán, R.; Basart, S.; Bortoli, Daniele

An unprecedented extreme Saharan dust event was registered in winter time from 20 to 23 February 2017 over the Iberian Peninsula (IP). We report on aerosol optical properties observed under this extreme dust intrusion through passive and active remote sensing techniques. For that, AERONET (AErosol RObotic NETwork) and EARLINET (European Aerosol Research LIdar NETwork) databases are used. The sites considered ar...


Variability of carbonaceous aerosols in remote, rural, urban and industrial env...

Querol, X.; Alastuey, A.; Viana, M.; Moreno, T.; Reche, C.; Minguillón, M. C.; Ripoll, A.; Pandolfi, M.; Amato, F.; Karanasiou, A.; Pérez, N.; Pey, J.

We interpret here the variability of levels of carbonaceous aerosols based on a 12 yr database from 78 monitoring stations across Spain specially compiled for this article. Data did not evidence any spatial trends of carbonaceous aerosols across the country. Conversely, results show marked differences in average concentrations from the cleanest, most remote sites (around 1 μg m-3 of non-mineral carbon (nmC), mo...


Nota de Boas-vindas

Aguiar, R.; Martins, A.; Gomes, D.; Salvador, P.; Pedreiras, P.; Nogueira, A.

Foi com particular entusiasmo que o Departamento de Electrónica e Telecomunicações da Universidade de Aveiro, com o apoio do Instituto de Telecomunicações, organizou esta 12ª Conferência sobre Redes de Computadores – CRC’2012! (...)


Can multiscale traffic analysis be used to differentiate Internet applications

Rocha, E.; Salvador, P.; Nogueira, A.

An accurate mapping of Internet traffic to applications can be important for a broad range of network management and measurement tasks, including traffic engineering, service differentiation, performance/failure monitoring and security. Traditional mapping approaches have become increasingly inaccurate because many applications use nondefault or ephemeral port numbers, use well-known port numbers associated wit...


4 Results

Queried text

Refine Results

Author





















Date





Document Type


Access rights



Resource




Subject