Antonio Guzmán

Learn More
The success of different computing models, performance analysis, and load balancing algorithms depends on the processor availability information because there is a strong relationship between a process response time and the processor time available for its execution. Therefore, predicting the processor availability for a new process or task in a computer(More)
UNLABELLED Gamma aminobutyric acid (GABA)A receptor modulators constitute the majority of clinically used sedative-hypnotics. These compounds have the capacity to initiate and maintain sleep, but decrease REM sleep and delta activity within NREM sleep. In order to avoid such sleep adverse effects, the development of novel compounds remains of interest. (More)
Cluster heterogeneity increases the difficulty of balancing the load across the system nodes. Although the relationship between heterogeneity and load balancing is difficult to describe analytically, in this paper an exhaustive analysis of the effects of this system feature on load balancing algorithms performance is presented. Considering the performed(More)
BACKGROUND AND PURPOSE There is a need for empirical studies to define criteria for vascular cognitive impairment (VCI) subtypes. In this paper, we report the predictive validity of a subtype classification scheme based on clinical and radiographic features. METHODS Nine Canadian memory clinics participated in the Consortium to Investigate Vascular(More)
The workload on a cluster system can be highly variable, increasing the difficulty of balancing the load across its nodes. And the general rule is that high variability leads to wrong load balancing decisions taken with out-of-date information and difficult to correct in real-time during applications execution.In this work the workload variability is(More)
The increase in the number of databases accessed only by some applications has made code injection attacks an important threat to almost any current system. If one of these applications accepts inputs from a client and executes these inputs without first validating them, the attackers are free to execute their own queries and therefore, to extract, modify(More)
Android malware has emerged in the last decade as a consequence of the increasing popularity of smartphones and tablets. While most previous work focuses on inherent characteristics of Android apps to detect malware, this study analyses indirect features to identify patterns often observed in malware applications. We show that modern Machine Learning(More)
Helicobacter pylori adhere to Kato III and Hela S3 cells in monolayer cultures. To explore whether cell surface glycoconjugates on these two cell lines mediate binding of H. pylori, various carbohydrates, glycoproteins, and glycolipids were tested to inhibit H. pylori cell adhesion. The adhesion was measured (i) with a urease-based assay and (ii) by cells(More)
Conditions of marked and long-lasting hypothermia have been shown to increase the formation of micronucleated polychromatic erythrocyte (MNPCE) in mouse bone-marrow. Stimulation of erythropoiesis as a consequence of anoxic conditions associated with decreased body temperature has been suggested as a possible mechanism for hypothermia-induced micronucleus(More)