Enviaments recents

  • Multi-beam zooming: an enabler for energy efficient 5G networks 

    Molluru, S. K.; Seyfettin Demirkol, Ilker; Wei-Ho, Chung (Institute of Electrical and Electronics Engineers (IEEE), 2016)
    Text en actes de congrés
    Accés restringit per política de l'editorial
    The demand for electrical power is growing tremendously, which poses grand challenges to modern energy systems. The telecommunications industry takes a significant part in the global power consumption. In this work we ...
  • Large-scale performance evaluation of the IETF Internet of Things protocol suite for smart city solutions 

    Isern, Javier; Betzler, August; Gómez Montenegro, Carlos; Seyfettin Demirkol, Ilker; Paradells Aspas, Josep (2015)
    Comunicació de congrés
    Accés restringit per política de l'editorial
    The Internet of Things (IoT) intends to interconnect massive amount of heterogeneous, smart devices, with the goal of interweaving the virtual world with the physical world. Smart Cities are typical IoT application domains, ...
  • Evaluation of advanced congestion control mechanisms for unreliable CoAP communications 

    Betzler, August; Gómez Montenegro, Carlos; Seyfettin Demirkol, Ilker (2015)
    Text en actes de congrés
    Accés restringit per política de l'editorial
    Networks of constrained devices play an important role in the Internet of Things (IoT). In such networks congestion may lead to significant performance decrease and is a recurring phenomenon given the restricted hardware ...
  • Evaluation of dynamic sensitivity control algorithm for IEEE 802.11ax 

    Afaqui, Muhammad Shahwaiz Iqbal; García Villegas, Eduard; López Aguilera, M. Elena; Smith, Graham; Camps Mur, Daniel (2015)
    Text en actes de congrés
    Accés restringit per política de l'editorial
    The explosive growth in the usage of IEEE 802.11 network has resulted in dense deployments in diverse environments. Most recently, the IEEE working group has triggered the IEEE 802.11ax project, which aims to amend the ...
  • Modeling the network convergence time in RPL in error-prone, IEEE 802.15.4 chain topology multihop networks 

    Kermajani, Hamidreza; Gómez Montenegro, Carlos (2014)
    Comunicació de congrés
    Accés restringit per política de l'editorial
    This paper presents an analytical model for estimating the network convergence time of IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) in a static chain topology network of IEEE 802.15.4 nodes, in the presence ...
  • Infrastructureless smart cities. Use cases and performance 

    Paradells Aspas, Josep; Gómez Montenegro, Carlos; Seyfettin Demirkol, Ilker; Oller Bosch, Joaquim; Catalán Cid, María Luisa (Institute of Electrical and Electronics Engineers (IEEE), 2014)
    Text en actes de congrés
    Accés restringit per política de l'editorial
    Smart cities are a hot topic nowadays for several reasons. For city managers and citizens a smart city is a concept that should allow providing better services and/or with more efficiency. For technicians a smart city ...
  • Tracing traitors by guessing secrets. The q-ary case 

    Fernández Muñoz, Marcel; Soriano Ibáñez, Miguel; Cotrina Navau, Josep (Springer, 2005)
    Text en actes de congrés
    Accés restringit per política de l'editorial
    In this paper we present, by solving a variant of the guessing secrets problem defined by Chung, Graham and Leighton [3], a sequential traitor tracing scheme equipped with an efficient identification algorithm. Sequential ...
  • A note about the traceability properties of linear codes 

    Fernández Muñoz, Marcel; Cotrina Navau, Josep; Soriano Ibáñez, Miguel; Domingo, Neus (Springer, 2007)
    Text en actes de congrés
    Accés restringit per política de l'editorial
    We characterize the traceability properties of linear codes. It is well known that any code of length n and minimum distance d is a c-TA code if c 2¿<¿n/(n¿-¿d). In this paper, we show that a less restrictive condition can ...
  • A new class of codes for fingerprinting schemes 

    Fernández Muñoz, Marcel; Soriano Ibáñez, Miguel; Cotrina Navau, Josep (Springer, 2005)
    Text en actes de congrés
    Accés restringit per política de l'editorial
    In this paper we discuss the problem of collusion secure fingerprinting. In the first part of our contribution we prove the existence of equidistant codes that can be used as fingerprinting codes. Then we show that by ...
  • Wake-up radio as an energy-efficient alternative to conventional wireless sensor networks MAC protocols 

    Oller Bosch, Joaquim; Seyfettin Demirkol, Ilker; Casademont Serra, Jordi; Paradells Aspas, Josep; Gamm, Gerd Ulrich; Reindl, Leonhard (Association for Computing Machinery (ACM), 2013)
    Text en actes de congrés
    Accés restringit per política de l'editorial
    The use of duty-cycling in Medium Access Control (MAC) protocols effectively helps improving the energy efficiency of wireless networks. However, while the benefits of these protocols are unquestionable, most of them still ...

Mostra'n més