• A section of the landscapes of the Mediterranean along the route of a thread of water: from the Pre-Pyrenees, inland, to the edges and coasts of delta de l'Ebre, Ribera del Xúquer, the Islands, and offshore to Venice 

      Llop Torné, Carles Joan; Maldonado Moreno, Josep; Milà, Gemma; Sisó Almirall, Ramón; Tudela, Artur (LetteraVentidue, 2022-10-27)
      Capítulo de libro
      Acceso restringido por política de la editorial
      This book is an open and potentially infinite interdisciplinary atlas of Mediterranean Routes: systems of material or immaterial relationships that somehow leave a trace in the landscape. The Open Atlas aims to put them ...
    • A secure broadcast service for LDACS with an application to secure GBAS 

      Maurer, Nils; Caamaño Albuerne, María; Gerbeth, Daniel; Graupl, Thomas; Schmitt, Corinna (Institute of Electrical and Electronics Engineers (IEEE), 2021)
      Texto en actas de congreso
      Acceso abierto
      The VHF Data Broadcast (VDB) data link is responsible for transmitting Ground Based Augmentation System (GBAS) corrections from the GBAS ground station to the aircraft. Thus, it is a major bottleneck for the evolution and ...
    • A secure communication design based on the chaotic logistic map: an experimental realization using Arduino microcontrollers 

      Zapateiro De La Hoz, Mauricio Fabian; Acho Zuppa, Leonardo; Vidal Seguí, Yolanda (Springer, 2015)
      Capítulo de libro
      Acceso restringido por política de la editorial
    • A secure communication system based on a modified chaotic chua oscillator 

      Zapateiro, Mauricio; Acho Zuppa, Leonardo; Vidal Seguí, Yolanda (2014)
      Comunicación de congreso
      Acceso abierto
      In this paper we propose a new scheme for secure communications us- ing a modified Chua oscillator. A modification of the oscillator is proposed in order to facilitate the decryption. The communication system requires two ...
    • A secure dual-layer fault protection strategy for distribution network with DERs: enhancing security in the face of communication challenges 

      Al Hanaineh, Wael Hasan Ahmad; Matas Alcalá, José; Guerrero Zapata, Josep Maria; Bakkar, Mostafa (Multidisciplinary Digital Publishing Institute (MDPI), 2024-02-01)
      Artículo
      Acceso abierto
      Earlier protection methods mainly focused on using communication channels to transmit trip signals between the protective devices (PDs), with no solutions provided in the case of communication failure. Therefore, this paper ...
    • A secure JXTA-overlay platform for robot control 

      Spaho, Evjola; Matsuo, Keita; Barolli, Leonard; Arnedo Moreno, Joan; Xhafa Xhafa, Fatos; Kolici, Vladi (Institute of Electrical and Electronics Engineers (IEEE), 2010)
      Texto en actas de congreso
      Acceso abierto
      Due to the improvement of connections capabilities of end-devices there is an increasing interest to design and implement full featured P2P networks that integrate end-devices. In this paper, we use JXTA-Overlay for the ...
    • A secure vault setup for a crypto wallet 

      Ruiz Alcalá, Alexis (Universitat Politècnica de Catalunya, 2022-10-27)
      Projecte Final de Màster Oficial
      Acceso abierto
      In today's digital world, every user needs to store sensitive data, including personal information, cryptographic keys and/or passwords. For user convenience, this data is usually backed up on a cloud hosting so that users ...
    • A security framework for JXTA-overlay 

      Arnedo Moreno, Joan; Matsuo, Keita; Barolli, Leonard; Xhafa Xhafa, Fatos (Institute of Electrical and Electronics Engineers (IEEE), 2009)
      Texto en actas de congreso
      Acceso abierto
      At present time, the maturity of P2P research field has pushed through new problems such us those related with security. For that reason, security starts to become one of the key issues when evaluating a P2P system and it ...
    • A security model for randomization-based protected caches 

      Ribes González, Jordi; Farràs Ventura, Oriol; Hernández Luz, Carles; Kostalabros, Vatistas; Moretó Planas, Miquel (2022)
      Artículo
      Acceso abierto
      Cache side-channel attacks allow adversaries to learn sensitive information about co-running processes by using only access latency measures and cache contention. This vulnerability has been shown to lead to several ...
    • A security-aware approach to JXTA-overlay primitives 

      Arnedo Moreno, Joan; Matsuo, Keita; Barolli, Leonard; Xhafa Xhafa, Fatos (Institute of Electrical and Electronics Engineers (IEEE), 2009)
      Texto en actas de congreso
      Acceso abierto
      The JXTA-Overlay project is an effort to use JXTA technology to provide a generic set of functionalities that can be used by developers to deploy P2P applications. Since its design mainly focuses on issues such as scalability ...
    • A segmentation algorithm based on acoustical features using a self organizing neural network. 

      Monte Moreno, Enrique (. EUROSPEECH, 1993)
      Texto en actas de congreso
      Acceso abierto
      In this paper we investigate the use of a self-organizing map in an acoustic segmentation task. The aim is to obtain a limited number of acoustic classes and to segment whenever a change in the class between two adjacent ...
    • A segmentation-based coding system allowing manipulation of objects (sesame) 

      Marqués Acosta, Fernando; Salembier Clairon, Philippe Jean; Pardàs Feliu, Montse; Marcotegui Iturmendi, Beatriz (IEEE, 1996)
      Texto en actas de congreso
      Acceso abierto
      We present a coding scheme that achieves, for each image in the sequence, the best segmentation in terms of rate-distortion theory. It is obtained from a set of initial regions and a set of available coding techniques. The ...
    • A segmented total energy detector (sTED) optimized for (n, ¿) cross-section measurements at n_TOF EAR2 

      Alcayne Aicua, Víctor; Cano Ott, Daniel; García Alvarado, Jose Maria; González Romero, Enrique Miguel; Martínez, T.; Pérez de Rada Fiol, Alberto; Casanovas Hoste, Adrià; Calviño Tavares, Francisco; Cortés Rossell, Guillem Pere; Tarifeño Saldivia, Ariel Esteban (Elsevier, 2024-04-01)
      Artículo
      Acceso abierto
      The neutron time-of-flight facility n_TOF at CERN is a spallation source dedicated to measurements of neutron- induced reaction cross-sections of interest in nuclear technologies, astrophysics, and other applications. Since ...
    • A segregação planejada: o plano de modernização de Teresina 

      Leal Junior, Jose Hamilton L.; Portilho Bueno, Ayrton (Departament d'Urbanisme i Ordenació del Territori. Universitat Politècnica de Catalunya / Instituto del Conourbano. Universidad Nacional General Sarmiento / Instituto de Arte Americano. Universidad de Buenos Aires, 2013-06)
      Texto en actas de congreso
      Acceso abierto
      A cidade de Teresina, fundada em 1852, com o traçado inicial planejado pelo governo da Província já para tornar-se capital do Piauí, restringia-se inicialmente ao bairro que hoje é denominado de Centro. Atualmente, a ...
    • A selection of lessons learned from phase C/D of CubeSat projects of the Fly Your Satellite! programme 

      Kinnaird, Alexander; Del Castillo, Cristina; Hansen, Hasse; Palma, David; Grassi, Gilberto (Universitat Politècnica de Catalunya, 2022-04-29)
      Comunicación de congreso
      Acceso abierto
      Fly Your Satellite!” (FYS) is a recurring programme part of ESA Academy’s portfolio of “hands-on” activities. The programme was established to support University student teams in the development of their own CubeSat missions ...
    • A selective logging mechanism for hardware transactional memory systems 

      Lupon Navazo, Marc; Magklis, Grigorios; González Colás, Antonio María (2011-09-19)
      Report de investigación
      Acceso abierto
      Log-based Hardware Transactional Memory (HTM) systems offer an elegant solution to handle speculative data that overflow transactional L1 caches. By keeping the pre-transactional values on a software-resident log, speculative ...
    • A self organizing feature map based on the fisher discriminant 

      Monte Moreno, Enrique (1994)
      Texto en actas de congreso
      Acceso abierto
      In this paper we propose a modification of the Self Organising map, where we is train the units using a transformation related to the Fisher Discriminant, in order to maximise the discrimination between units. The algorithm ...
    • A self-adaptive hardware architecture with fault tolerance capabilities 

      Soto, Javier; Moreno Aróstegui, Juan Manuel; Cabestany Moncusí, Joan (2013-12-09)
      Artículo
      Acceso restringido por política de la editorial
      This paper describes a Fault Tolerance System (FTS) implemented in a new self-adaptive hardware architecture. This architecture is based on an array of cells that implements in a distributed way self-adaptive capabilities. ...
    • A self-adaptive strategy for the time integration of navier-stokes equations 

      Trias Miquel, Francesc Xavier; Lehmkuhl Barba, Oriol (2011-08)
      Artículo
      Acceso restringido por política de la editorial
      An efficient self-adaptive strategy for the explicit time integration of Navier-Stokes equations is presented. Unlike the conventional explicit integration schemes, it is not based on a standard CFL condition. Instead, the ...
    • A self-branched lamination of hierarchical patronite nanoarchitectures on carbon fiber cloth as novel electrode for ionic liquid electrolyte-based high energy density supercapacitors 

      Manikandan, Ramu; Justin Raj, Chellan; Nagaraju, Goli; Puigdollers i González, Joaquim; Voz Sánchez, Cristóbal (2019-11-14)
      Artículo
      Acceso abierto
      The developments of rationally designed binder-free metal chalcogenides decorated flexible electrodes are of paramount importance for advanced energy storage devices. Herein, binder-free patronite (VS4) flower-like ...