Exploració per autor "Soriano Ibáñez, Miguel"
Ara es mostren els items 28-47 de 48
-
p-probabilistic k-anonymous microaggregation for the anonymization of surveys with uncertain participation
Rebollo Monedero, David; Forné Muñoz, Jorge; Soriano Ibáñez, Miguel; Puiggalí Allepuz, Jordi (2016-12-13)
Article
Accés obertWe develop a probabilistic variant of k-anonymous microaggregation which we term p-probabilistic resorting to a statistical model of respondent participation in order to aggregate quasi-identifiers in such a manner that ... -
Parallelization of the interpolation process in the Koetter-Vardy soft-decision list decoding algorithm
Moreira Sánchez, José; Fernández Muñoz, Marcel; Soriano Ibáñez, Miguel (2012)
Comunicació de congrés
Accés obertList decoding is a decoding strategy that provides a set of codewords at the output of the channel decoder. Since this technique corrects errors beyond the correcting bound of the code, upper layers in the application or ... -
Private audio streaming for an automated phone assistance system
Vera del Campo, Juan Victoriano; Gómez Muro, Ana; Soriano Ibáñez, Miguel (IEEE, 2012)
Comunicació de congrés
Accés restringit per política de l'editorialIn a question-driven phone assistance system, if the answer to one question decides the next one, hiding user's answers is not enough to protect her privacy. In this work, we explore an audio streaming mechanism where the ... -
Problemes Tema 1 (Xarxes Commutades)
Aguilar Igartua, Mónica; Alins Delgado, Juan José; Altés Bosch, Jorge; Barceló Arroyo, Francisco; Cruz Llopis, Luis Javier de la; Esparza Martín, Óscar; Forné Muñoz, Jorge; Martín Escalona, Israel; Martín Faus, Isabel Victoria; Mata Diaz, Jorge; Muñoz Tapia, José Luis; Pallarès Segarra, Esteve; Serrat Fernández, Juan; Soriano Ibáñez, Miguel; Postigo Boix, Marcos; Casademont Serra, Jordi (Universitat Politècnica de Catalunya, 2023-04-08)
Problema, exercici
Accés obert -
Problemes Tema 1 (xarxes commutades): introducció a les xarxes telemàtiques (IXT)
Aguilar Igartua, Mónica; Alins Delgado, Juan José; Altés Bosch, Jorge; Barceló Arroyo, Francisco; Cruz Llopis, Luis Javier de la; Esparza Martín, Óscar; Forné Muñoz, Jorge; Martín Escalona, Israel; Martín Faus, Isabel Victoria; Mata Díaz, Jorge; Muñoz Tapia, José Luis; Pallarès Segarra, Esteve; Postigo Boix, Marcos; Serrat Fernández, Juan; Soriano Ibáñez, Miguel (2015)
Report de recerca
Accés obert -
Problemes Tema 2 (MAC i LLC)
Aguilar Igartua, Mónica; Alins Delgado, Juan José; Altés Bosch, Jorge; Barceló Arroyo, Francisco; Calveras Augé, Anna M.; Casademont Serra, Jordi; Cruz Llopis, Luis Javier de la; Esparza Martín, Óscar; Forné Muñoz, Jorge; Hesselbach Serra, Xavier; Martín Escalona, Israel; Martín Faus, Isabel Victoria; Mata Diaz, Jorge; Muñoz Tapia, José Luis; Pallarès Segarra, Esteve; Paradells Aspas, Josep; Pegueroles Vallés, Josep R.; Rojas Espinosa, Alfonso; Serrat Fernández, Juan; Soriano Ibáñez, Miguel; Postigo Boix, Marcos; Casademont Serra, Jordi (Universitat Politècnica de Catalunya, 2023-04-08)
Problema, exercici
Accés obert -
Problemes Tema 3 (LAN i WLAN)
Aguilar Igartua, Mónica; Alins Delgado, Juan José; Altés Bosch, Jorge; Barceló Arroyo, Francisco; Calveras Augé, Anna M.; Casademont Serra, Jordi; Cruz Llopis, Luis Javier de la; Esparza Martín, Óscar; Forné Muñoz, Jorge; Hesselbach Serra, Xavier; Martín Escalona, Israel; Mata Diaz, Jorge; Muñoz Tapia, José Luis; Pallarès Segarra, Esteve; Paradells Aspas, Josep; Pegueroles Vallés, Josep R.; Rojas Espinosa, Alfonso; Serrat Fernández, Juan; Soriano Ibáñez, Miguel; Postigo Boix, Marcos; Casademont Serra, Jordi; Martín Faus, Isabel Victoria (Universitat Politècnica de Catalunya, 2023-04-08)
Problema, exercici
Accés obert -
Problemes Tema 4 (IP - 1a part)
Aguilar Igartua, Mónica; Alins Delgado, Juan José; Altés Bosch, Jorge; Barceló Arroyo, Francisco; Cruz Llopis, Luis Javier de la; Esparza Martín, Óscar; Forné Muñoz, Jorge; Martín Escalona, Israel; Mata Diaz, Jorge; Muñoz Tapia, José Luis; Pallarès Segarra, Esteve; Serrat Fernández, Juan; Soriano Ibáñez, Miguel; Calveras Augé, Anna M.; Casademont Serra, Jordi; Paradells Aspas, Josep; Casademont Serra, Jordi; Postigo Boix, Marcos; Martín Faus, Isabel Victoria (Universitat Politècnica de Catalunya, 2023-04-08)
Problema, exercici
Accés obert -
Problemes Tema 4 (IP - 2a part)
Aguilar Igartua, Mónica; Alins Delgado, Juan José; Altés Bosch, Jorge; Barceló Arroyo, Francisco; Cruz Llopis, Luis Javier de la; Esparza Martín, Óscar; Forné Muñoz, Jorge; Martín Escalona, Israel; Martín Faus, Isabel Victoria; Mata Diaz, Jorge; Muñoz Tapia, José Luis; Pallarès Segarra, Esteve; Serrat Fernández, Juan; Soriano Ibáñez, Miguel; Calveras Augé, Anna M.; Casademont Serra, Jordi; Paradells Aspas, Josep; Postigo Boix, Marcos; Casademont Serra, Jordi (Universitat Politècnica de Catalunya, 2023-04-08)
Problema, exercici
Accés obert -
Providing k-anonymity and revocation in ubiquitous VANETs
Caballero Gil, Cándido; Molina Gil, Jezabel; Hernández Serrano, Juan; León Abarca, Olga; Soriano Ibáñez, Miguel (Elsevier, 2016-01)
Article
Accés obertAbstract Vehicular ad hoc networks (VANETs) is considered a milestone in improving the safety and efficiency in transportation. Nevertheless, when information from the vehicular communications is combined with data from ... -
Reconciling privacy and efficient utility management in smart cities
Rebollo Monedero, David; Bartoli, Andrea; Hernández Serrano, Juan; Forné Muñoz, Jorge; Soriano Ibáñez, Miguel (2014-01-01)
Article
Accés restringit per política de l'editorialA key aspect in the design of smart cities is, undoubtedly, a plan for the efficient management of utilities, enabled by technologies such as those entailing smart metering of the residential consumption of electricity, ... -
Robust detection of primary user emulation attacks in IEEE 802.22 networks
León Abarca, Olga; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (ACM Press, NY, 2011)
Text en actes de congrés
Accés obertCognitive Radio (CR) technology constitutes a new paradigm where wireless devices can access the spectrum left unused by licensed or primary users in an opportunistic way. This feature opens the door to a main new threat: ... -
Secure lossless aggregation for Smart Grid M2M networks
Bartoli, Andrea; Hernández Serrano, Juan; Soriano Ibáñez, Miguel; Dohler, Mischa; Kountouris, Apostolous; Barthel, Dominique (IEEE Computer Society Publications, 2010)
Text en actes de congrés
Accés obertWhilst security is generally perceived as an important constituent of communication systems, this paper offers a viable security-communication-tradeoff particularly tailored to Advanced Metering Infrastructures (AMIs) in ... -
Securing cognitive radio networks
León Abarca, Olga; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2010-05)
Article
Accés restringit per política de l'editorial -
Securing identity assignment using implicit certificates in P2P overlays
Caubet Fernández, Juan; Esparza Martín, Óscar; Alins Delgado, Juan José; Mata Diaz, Jorge; Soriano Ibáñez, Miguel (Springer International Publishing, 2013)
Text en actes de congrés
Accés restringit per política de l'editorialThe security of the Peer-to-Peer (P2P) overlays networks has been questioned for years. Many works have been proposed to provide secure routing, anonymity, reputation systems, confidentiality, etc. However, the identity ... -
Simplified probabilistic model for maximum traffic load from weigh-in-motion data
Soriano Ibáñez, Miguel; Casas Rius, Joan Ramon; Ghosn, Michel (Routledge/Taylor and Francis Group, 2018)
Capítol de llibre
Accés restringit per política de l'editorialThis paper reviews the simplified procedure proposed by Ghosn and Sivakumar to model the maximum expected traffic load effect on highway bridges and illustrates the methodology using a set of Weigh-In-Motion (WIM) data ... -
Supporting mobility in GKM over ad-hoc network using a decentralized and spontaneous algorithm
Hernández Serrano, Juan; Pegueroles Vallés, Josep R.; Soriano Ibáñez, Miguel (Springer, 2007)
Text en actes de congrés
Accés restringit per política de l'editorialRecently there have been a noticeable growth of ad-hoc environments with peer-to-peer relations. Such environments decentralize the services in order to share their cost between their members. As a result, a decentralized ... -
Tracing traitors by guessing secrets. The q-ary case
Fernández Muñoz, Marcel; Soriano Ibáñez, Miguel; Cotrina Navau, Josep (Springer, 2005)
Text en actes de congrés
Accés restringit per política de l'editorialIn this paper we present, by solving a variant of the guessing secrets problem defined by Chung, Graham and Leighton [3], a sequential traitor tracing scheme equipped with an efficient identification algorithm. Sequential ... -
Transmisión de datos : problemas resueltos
Aguilar Igartua, Mónica; Forné Muñoz, Jorge; Mata Diaz, Jorge; Rico Novella, Francisco José; Rojas Espinosa, Alfonso; Soriano Ibáñez, Miguel (Iniciativa Digital Politècnica, 2010)
Llibre
Accés obertLos profesores de la asignatura Transmisión de Datos, impartida en la UPC, hemos elaborado este libro de problemas resueltos representativos de la misma. El libro se estructura en tres temas: codificación de fuente, ... -
Un nuevo ataque a TCP para redes de radios cognitivas
León Abarca, Olga; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2009)
Text en actes de congrés
Accés restringit per política de l'editorialLos dispositivos de radios cognitivas emergen como una prometedora tecnología que ha de permitir un mejor uso del espectro electro-magnético. Estos dispositivos se caracterizan por ser capaces de observar y entender su ...