Enviaments recents

  • Semantic validation of affinity constrained service function chain requests 

    Bouten, Niels; Claeys, Maxim; Mijumbi, Rashid; Famaey, Jeroen; Latré, Steven; Serrat Fernández, Juan (Institute of Electrical and Electronics Engineers (IEEE), 2016)
    Text en actes de congrés
    Accés restringit per política de l'editorial
    Network Function Virtualization (NFV) has been proposed as a paradigm to increase the cost-efficiency, flexibility and innovation in network service provisioning. By leveraging IT virtualization techniques in combination ...
  • Multi-beam zooming: an enabler for energy efficient 5G networks 

    Molluru, S. K.; Seyfettin Demirkol, Ilker; Wei-Ho, Chung (Institute of Electrical and Electronics Engineers (IEEE), 2016)
    Text en actes de congrés
    Accés restringit per política de l'editorial
    The demand for electrical power is growing tremendously, which poses grand challenges to modern energy systems. The telecommunications industry takes a significant part in the global power consumption. In this work we ...
  • Scalability of passive and active solutions for time-based ranging in IEEE 802.11 networks 

    Martín Escalona, Israel; Malpartida, Marta; Zola, Enrica Valeria; Barceló Arroyo, Francisco (Springer, 2016)
    Text en actes de congrés
    Accés restringit per política de l'editorial
    Wireless positioning systems have become popular in recent years. Outdoor positioning has been addressed successfully, but location indoors still presents some open issues. One of them is related with the scalability of ...
  • A dynamic pricing algorithm for a network of virtual resources 

    Naudts, Bram; Flores Méndez, Mario Rogelio; Mijumbi, Rashid; Verbrugge, Sofie; Serrat Fernández, Juan; Colle, Didier (Institute of Electrical and Electronics Engineers (IEEE), 2016)
    Text en actes de congrés
    Accés restringit per política de l'editorial
    A service chain is a combination of network services (e.g. network address translation (NAT), a firewall, etc.) that are interconnected to support an application (e.g. video-on-demand). Building a service chain requires a ...
  • gSLM: the initial steps for the specification of a service management standard for federated e-Infrastructures 

    Serrat Fernández, Juan; Szepieniec, Tomasz; Belloum, Adam S.Z.; Rubio-Loyola, Javier; Appleton, Owen; Schaaf, Thomas; Kocot, Joanna (2014)
    Text en actes de congrés
    Accés restringit per política de l'editorial
    This paper presents a methodology used to create a site independent assessment process of the capabilities of service management systems in federated e-infrastructures that can contribute to introduce or improve service ...
  • Potential mass surveillance and privacy violations in proximity-based social applications 

    Puglisi, Silvia; Rebollo Monedero, David; Forné Muñoz, Jorge (IEEE Press, 2016)
    Comunicació de congrés
    Accés obert
    Proximity-based social applications let users interact with people that are currently close to them, by revealing some information about their preferences and whereabouts. This information is acquired through passive ...
  • On Web user tracking: how third-party http requests track users' browsing patterns for personalised advertising 

    Puglisi, Silvia; Rebollo Monedero, David; Forné Muñoz, Jorge (2016)
    Text en actes de congrés
    Accés obert
    On today's Web, users trade access to their private data for content and services. Advertising sustains the business model of many websites and applications. Efficient and successful advertising relies on predicting ...
  • Management of resources under priorities in EON using a modified RDM based on the squatting-kicking approach 

    Hesselbach Serra, Xavier; Dantas, Joana; Amazonas, José Roberto de Almeida; Botero Vega, Juan Felipe; Piney da Silva, José Ramón (Institute of Electrical and Electronics Engineers (IEEE), 2016)
    Text en actes de congrés
    Accés restringit per política de l'editorial
    The paper proposes a resources allocation method for EON based on a modified RDM using squatting and kicking strategies in order to prioritise the usage of channels and enhancing the total utilisation. It can also be used ...
  • Enabling secure multicast using a new java LKH rekeying tool 

    Pegueroles Vallés, Josep R.; Rico Novella, Francisco José (2003)
    Text en actes de congrés
    Accés restringit per política de l'editorial
    The most promising protocols for multicast key management are those based on multilevel logical binary trees of Key Encryption Keys (KEKs). One of these protocols, Logical Key Hierarchy (LKH) has become a standard de facto ...
  • A system approach on power distribution supervisory control catalog 

    Delgado Penin, José A.; Serrat Fernández, Juan (Institute of Electrical and Electronics Engineers (IEEE), 1982)
    Text en actes de congrés
    Accés obert
    The electrical energy distribution networks need remote control systems that are centralised and integrated as far as the functions they can develop are concerned. The need for a thinking unit at the line head for managing ...

Mostra'n més