Enviaments recents

  • Opportunistic sensor data collection with bluetooth low energy 

    Aguilar, Sergio; Vidal Ferre, Rafael; Gómez Montenegro, Carlos (2017-01-23)
    Article
    Accés obert
    Bluetooth Low Energy (BLE) has gained very high momentum, as witnessed by its widespread presence in smartphones, wearables and other consumer electronics devices. This fact can be leveraged to carry out opportunistic ...
  • CoAP congestion control for the Internet of Things 

    Betzler, August; Gómez Montenegro, Carlos; Seyfettin Demirkol, Ilker; Paradells Aspas, Josep (2016-07)
    Article
    Accés obert
    CoAP is a lightweight RESTful application layer protocol devised for the IoT. Operating on top of UDP, CoAP must handle congestion control by itself. The core CoAP specification defines a basic congestion control mechanism, ...
  • Experimental evaluation of congestion control for CoAP communications without end-to-end reliability 

    Betzler, August; Isern, Javier; Gómez Montenegro, Carlos; Seyfettin Demirkol, Ilker; Paradells Aspas, Josep (Elsevier, 2016-12-01)
    Article
    Accés restringit per política de l'editorial
    The Constrained Application Protocol (CoAP) has been designed by the Internet Engineering Task Force (IETF) for Internet of Things (IoT) communications. CoAP is a lightweight, request/response-based RESTful protocol that ...
  • p-probabilistic k-anonymous microaggregation for the anonymization of surveys with uncertain participation 

    Rebollo Monedero, David; Forné Muñoz, Jorge; Soriano Ibáñez, Miguel; Puiggalí Allepuz, Jordi (2016-12-13)
    Article
    Accés restringit per política de l'editorial
    We develop a probabilistic variant of k-anonymous microaggregation which we term p-probabilistic resorting to a statistical model of respondent participation in order to aggregate quasi-identifiers in such a manner that ...
  • Shall I post this now? Optimized, delay-based privacy protection in social networks 

    Parra Arnau, Javier; Gómez Mármol, Félix; Rebollo Monedero, David; Forné Muñoz, Jorge (2016-11-16)
    Article
    Accés obert
    Despite the several advantages commonly attributed to social networks such as easiness and immediacy to communicate with acquaintances and friends, significant privacy threats provoked by unexperienced or even irresponsible ...
  • IEEE 802.11ah: a technology to face the IoT challenge 

    Baños González, Víctor Hugo; Afaqui, Muhammad Shahwaiz Iqbal; López Aguilera, M. Elena; García Villegas, Eduard (2016-11-22)
    Article
    Accés obert
    Since the conception of the Internet of things (IoT), a large number of promising applications and technologies have been developed, which will change different aspects in our daily life. This paper explores the key ...
  • Energy-aware routing in multiple domains software defined networks 

    Fernández Fernández, Adriana; Cervelló Pastor, Cristina; Ochoa Aday, Leonardo (2016-12)
    Article
    Accés obert
    The growing energy consumption of communication networks has attracted the attention of the networking researchers in the last decade. In this context, the new architecture of Software-Defined Networks (SDN) allows a ...
  • Discovering the network topology: an efficient approach for SDN 

    Ochoa Aday, Leonardo; Cervelló Pastor, Cristina; Fernández Fernández, Adriana (2016-11)
    Article
    Accés obert
    Network topology is a physical description of the overall resources in the network. Collecting this information using efficient mechanisms becomes a critical task for important network functions such as routing, network ...
  • Almost separating and almost secure frameproof codes over q-ary alphabets 

    Moreira Sánchez, José; Fernández Muñoz, Marcel; Kabatiansky, Grigory (2015-03-27)
    Article
    Accés obert
    In this paper we discuss some variations of the notion of separating code for alphabets of arbitrary size. We show how the original definition can be relaxed in two different ways, namely almost separating and almost secure ...
  • Predicting expected TCP throughput using genetic algorithm 

    Hernandez Benet, Cristian; Kassler, Andreas; Zola, Enrica Valeria (2016-10-24)
    Article
    Accés obert
    Predicting the expected throughput of TCP is important for several aspects such as e.g. determining handover criteria for future multihomed mobile nodes or determining the expected throughput of a given MPTCP subflow for ...

Mostra'n més