Recent Submissions

  • Modeling the network convergence time in RPL in error-prone, IEEE 802.15.4 chain topology multihop networks 

    Kermajani, Hamidreza; Gómez Montenegro, Carlos (2014)
    Conference lecture
    Restricted access - publisher's policy
    This paper presents an analytical model for estimating the network convergence time of IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) in a static chain topology network of IEEE 802.15.4 nodes, in the presence ...
  • Infrastructureless smart cities. Use cases and performance 

    Paradells Aspas, Josep; Gómez Montenegro, Carlos; Seyfettin Demirkol, Ilker; Oller Bosch, Joaquim; Catalán Cid, María Luisa (Institute of Electrical and Electronics Engineers (IEEE), 2014)
    Conference report
    Restricted access - publisher's policy
    Smart cities are a hot topic nowadays for several reasons. For city managers and citizens a smart city is a concept that should allow providing better services and/or with more efficiency. For technicians a smart city ...
  • Tracing traitors by guessing secrets. The q-ary case 

    Fernández Muñoz, Marcel; Soriano Ibáñez, Miguel; Cotrina Navau, Josep (Springer, 2005)
    Conference report
    Restricted access - publisher's policy
    In this paper we present, by solving a variant of the guessing secrets problem defined by Chung, Graham and Leighton [3], a sequential traitor tracing scheme equipped with an efficient identification algorithm. Sequential ...
  • A note about the traceability properties of linear codes 

    Fernández Muñoz, Marcel; Cotrina Navau, Josep; Soriano Ibáñez, Miguel; Domingo, Neus (Springer, 2007)
    Conference report
    Restricted access - publisher's policy
    We characterize the traceability properties of linear codes. It is well known that any code of length n and minimum distance d is a c-TA code if c 2¿<¿n/(n¿-¿d). In this paper, we show that a less restrictive condition can ...
  • A new class of codes for fingerprinting schemes 

    Fernández Muñoz, Marcel; Soriano Ibáñez, Miguel; Cotrina Navau, Josep (Springer, 2005)
    Conference report
    Restricted access - publisher's policy
    In this paper we discuss the problem of collusion secure fingerprinting. In the first part of our contribution we prove the existence of equidistant codes that can be used as fingerprinting codes. Then we show that by ...
  • Wake-up radio as an energy-efficient alternative to conventional wireless sensor networks MAC protocols 

    Oller Bosch, Joaquim; Seyfettin Demirkol, Ilker; Casademont Serra, Jordi; Paradells Aspas, Josep; Gamm, Gerd Ulrich; Reindl, Leonhard (Association for Computing Machinery (ACM), 2013)
    Conference report
    Restricted access - publisher's policy
    The use of duty-cycling in Medium Access Control (MAC) protocols effectively helps improving the energy efficiency of wireless networks. However, while the benefits of these protocols are unquestionable, most of them still ...
  • Congestion control in reliable CoAP communication 

    Betzler, August; Gómez Montenegro, Carlos; Seyfettin Demirkol, Ilker; Paradells Aspas, Josep (Association for Computing Machinery (ACM), 2013)
    Conference report
    Restricted access - publisher's policy
    The development of IPv6 stacks for wireless constrained devices that have limited hardware resources has paved the way for many new areas of applications and protocols. The Constrained Application Protocol (CoAP) has been ...
  • Energy efficient wireless networking of sensor nodes 

    Seyfettin Demirkol, Ilker; Paradells Aspas, Josep; Oller Bosch, Joaquim; Casademont Serra, Jordi; Calveras Augé, Anna M.; Catalán Cid, María Luisa (2013)
    Conference report
    Open Access
    Wireless sensor networks have paved the way to a new era in user applications, where information can be sensed, processed, and distributed from remote environments with minimal or no human interaction. As the sensor nodes ...
  • Time-Knocking: a novel addressing mechanism for wake-up receivers 

    Oller Bosch, Joaquim; Seyfettin Demirkol, Ilker; Paradells Aspas, Josep; Casademont Serra, Jordi; Heinzelman, Wendi (Institute of Electrical and Electronics Engineers (IEEE), 2012)
    Conference report
    Restricted access - publisher's policy
    Wake-up radios present a promising alternative to traditional duty-cycle approaches, by reducing overhearing and by eliminating idle listening completely. However, energy-efficient operation of the wake-up mechanism is ...
  • Uso de canales solapados en una red de área de campus inalámbrica con IEEE 802.11 

    Mengual Pérez, Ester; García Villegas, Eduard; Vidal Ferré, Rafael (2013)
    Conference lecture
    Open Access
    Las redes de área local inalámbricas (WLAN) basadas en la familia de estándares IEEE 802.11 utilizan mayoritariamente la banda industrial científica y médica (ISM) de 2,4GHz en la que compiten con un número cada vez mayor ...

View more