Now showing items 1-20 of 20

    • A context-based surveillance framework for large infrastructures 

      Ripolles, O.; Silla, J.; Pegueroles Vallés, Josep R.; Saenz, J.; Simó, J.; Sandoval, Cristina; Viktorov, M.; Gómez Muro, Ana (2012)
      Conference report
      Restricted access - publisher's policy
      In this paper we present the control and surveillance platform that is currently being developed within the ViCoMo project. This project is aimed at developing a context modeling system which can reconstruct the events ...
    • A methodology to introduce sustainability into the Final Year Project to foster sustainable engineering projects 

      López Álvarez, David; Sánchez Carracedo, Fermín; Vidal López, Eva María; Pegueroles Vallés, Josep R.; Alier Forment, Marc; Cabré Garcia, José M.; García Almiñana, Jordi; García, Helena (Institute of Electrical and Electronics Engineers (IEEE), 2014)
      Conference report
      Open Access
      The introduction of sustainability skills into higher education curricula is a natural effect of the increasing importance of sustainability in our daily lives. Topics like green computing, sustainable design or environmental ...
    • Building hierarchical public key infrastructures in mobile ad-hoc networks 

      Satizábal Echavarría, Isabel Cristina; Forné Muñoz, Jorge; Hernández Serrano, Juan; Pegueroles Vallés, Josep R. (Springer, 2006)
      Conference report
      Restricted access - publisher's policy
      Dynamism of mobile ad-hoc networks implies changing trust relationships among their nodes that can be established using peer-to-peer PKIs. Here, certification paths can be built although part of the infrastructure is ...
    • Contribución a la seguridad en servicios multimedia. Aplicación a entornos multicast 

      Pegueroles Vallés, Josep R. (Universitat Politècnica de Catalunya, 2003-11-21)
      Doctoral thesis
      Open Access
      Usually multimedia services can be divided into two different phases: access to the service and content distribution. The first phase usually takes place over reliable transport protocols and unicast connections. The second ...
    • Design of a P2P content recommendation system using affinity networks 

      Vera del Campo, Juan Victoriano; Pegueroles Vallés, Josep R.; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2012-08)
      Article
      Restricted access - publisher's policy
      The success and intensive use of social networks makes strategies for efficient document location a hot topic of research. In this paper, we propose a common vector space to describe documents and users to create a social ...
    • Designing CDIO capstone projects: a systems thinking approach 

      Alarcón Cot, Eduardo José; Bou Balust, Elisenda; Camps Carmona, Adriano José; Bragós Bardia, Ramon; Oliveras Vergés, Albert; Pegueroles Vallés, Josep R.; Sayrol Clols, Elisa; Marqués Acosta, Fernando (2013)
      Conference report
      Open Access
      Given the all-pervasiveness of Systems thinking -which consists of thinking about things as systemsas a way of reasoning, in this work we will describe its application to make an interpretation of how to conceive and ...
    • DocCloud: a document recommender system on cloud computing with plausible deniability 

      Vera del Campo, Juan Victoriano; Pegueroles Vallés, Josep R.; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2013-04-16)
      Article
      Restricted access - publisher's policy
      Recommender systems select the most interesting products for costumers based on their interests. The move of a recommender system to a cloud faces many challenges from the perspective of the protection of the participants. ...
    • Enabling secure multicast using a new java LKH rekeying tool 

      Pegueroles Vallés, Josep R.; Rico Novella, Francisco José (2003)
      Conference report
      Restricted access - publisher's policy
      The most promising protocols for multicast key management are those based on multilevel logical binary trees of Key Encryption Keys (KEKs). One of these protocols, Logical Key Hierarchy (LKH) has become a standard de facto ...
    • Genetic algorithms for designing network security protocols 

      Zarza, Luis; Forné Muñoz, Jorge; Pegueroles Vallés, Josep R.; Soriano Ibáñez, Miguel (World Scientífic, 2010)
      Part of book or chapter of book
      Restricted access - publisher's policy
      The design of cryptographic and security protocols for new scenarios and applications can be computationally expensive. Examples of these can be sensor or mobile ad-hoc networks where thousands of nodes can be involved. ...
    • Implementación y primeros resultados de la asignatura de introducción a la ingeniería en los nuevos grados de la ETSETB-UPC 

      Sayrol Clols, Elisa; Onrubia, Raúl; García Hernández, Miguel J.; Oliveras Vergés, Albert; Bragós Bardia, Ramon; Pegueroles Vallés, Josep R.; Alarcón Cot, Eduardo José; Camps Carmona, Adriano José; Sardà Ferrer, Joan; Consolación Segura, Carolina María; Mussons Sellés, Jaume; Pons Peregort, Olga (IEEE, 2011)
      Conference report
      Restricted access - publisher's policy
      En este trabajo se describe la asignatura "Introducción a la Ingeniería de las TIC" que, basándose en restricciones y especificaciones iniciales, ha sido concebida, diseñada e implementada en la ETSETB de la UPC. Es la ...
    • Knowledge sharing in the health scenario 

      LLuch Ariet, Magi; Brugues de la Torre, Albert; Vallverdú Bayés, Sisco; Pegueroles Vallés, Josep R. (2014-11-28)
      Article
      Open Access
      The understanding of certain data often requires the collection of similar data from different places to be analysed and interpreted. Interoperability standards and ontologies, are facilitating data interchange around the ...
    • Low-cost group rekeying for unattended wireless sensor networks 

      Hernández Serrano, Juan; Vera del Campo, Juan Victoriano; Pegueroles Vallés, Josep R.; Gañán, Carlos (2012)
      Article
      Restricted access - publisher's policy
      Wireless sensor networks (WSNs) are made up of large groups of nodes that perform distributed monitoring services. Since sensor measurements are often sensitive data acquired in hostile environments, securing WSN becomes ...
    • Mixed integration of CDIO skills into telecommunication engineering curricula 

      Sayrol Clols, Elisa; Bragós Bardia, Ramon; Alarcón Cot, Eduardo José; Cabrera-Bean, Margarita; Calveras Augé, Anna M.; Comellas Colomé, Jaume; O'Callaghan Castellà, Juan Manuel; Pegueroles Vallés, Josep R.; Pla, Enrique; Prat Viñas, Lluís; Sáez Moreno, Germán; Sardà Ferrer, Joan; Tallon Montoro, Carme (2010)
      Article
      Open Access
      Spain has been intensively involved in designing engineering curricula for the last two years and next academic year all engineering schools will be deploying all bachelor programs adapted to the EHEA and to the Spanish ...
    • Multimedia copyright protection platform demonstrator 

      Soriano Ibáñez, Miguel; Fernández Muñoz, Marcel; Sayrol Clols, Elisa; Tomás Buliart, Joan; Casanellas, Joan; Pegueroles Vallés, Josep R.; Hernández Serrano, Juan (Springer, 2005)
      Conference report
      Restricted access - publisher's policy
      The work presented in this paper consists in the development of a portable platform to protect the copyright and distribution rights of digital contents, and empirically demonstrate the capacity of several marking and ...
    • Proceso de inversión de competencias genéricas en los nuevos planes de estudios de grado de la ETSETB de acuerdo con el modelo CDIO 

      Sayrol Clols, Elisa; Sardà Ferrer, Joan; Sáez Moreno, Germán; Bragós Bardia, Ramon; Alarcón Cot, Eduardo José; Cabrera-Bean, Margarita; Calveras Augé, Anna M.; Comellas Colomé, Jaume; O'Callaghan Castellà, Juan Manuel; Pegueroles Vallés, Josep R.; Prat Viñas, Lluís (2010)
      Conference report
      Open Access
      Los distintos marcos normativos que fijan las condiciones de contorno en la elaboración de los nuevos planes de estudios ponen especial énfasis en el aprendizaje basado en competencias y en la inclusión de determinadas ...
    • Processing Diabetes mellitus composite events in MAGPIE 

      Brugues de la Torre, Albert; Bromuri, Stefano; Barry, Michael; Jimenez Del Toro, Oscar; Mazurkiewicz, Maciej R.; Kardas, Przemyslaw; Pegueroles Vallés, Josep R.; Schumacher, Michael (2016-02-01)
      Article
      Open Access
      The focus of this research is in the definition of programmable expert Personal Health Systems (PHS) to monitor patients affected by chronic diseases using agent oriented programming and mobile computing to represent the ...
    • QUALITEL: qualitat docent als estudis de telecomunicació 

      Sayrol Clols, Elisa; Prat Viñas, Lluís; O'Callaghan Castellà, Juan Manuel; Pegueroles Vallés, Josep R.; Vallverdú Vallés, Francesc; Alarcón Cot, Eduardo José; Sáez Moreno, Germán; Calveras Augé, Anna M.; Bragós Bardia, Ramon (Universitat Politècnica de Catalunya. Institut de Ciències de l'Educació, 2010-02-11)
      Conference lecture / Conference report
      Open Access
      El projecte consisteix en una sèrie d'actuacions de caràcter metodològic i organitzatiu portades a terme a primer curs (fase selectiva) dels estudis d'enginyeria de telecomunicació de l'ETSETB per millorar el rendiment ...
    • Security analysis of a protocol based on multiagents systems for clinical data exchange 

      Brugues de la Torre, Albert; LLuch Ariet, Magi; Pegueroles Vallés, Josep R. (Institute of Electrical and Electronics Engineers (IEEE), 2013)
      Conference report
      Restricted access - publisher's policy
      This work describes the security architecture of MOSAIC, a protocol for clinical data exchange with multilateral agreement support. The blocks of the architecture are derived from a series of common attacks that can be ...
    • Supporting mobility in GKM over ad-hoc network using a decentralized and spontaneous algorithm 

      Hernández Serrano, Juan; Pegueroles Vallés, Josep R.; Soriano Ibáñez, Miguel (Springer, 2007)
      Conference report
      Restricted access - publisher's policy
      Recently there have been a noticeable growth of ad-hoc environments with peer-to-peer relations. Such environments decentralize the services in order to share their cost between their members. As a result, a decentralized ...
    • The TAMESIS project: enabling technologies for the health status monitoring and secure exchange of clinical record 

      Pegueroles Vallés, Josep R.; Cruz Llopis, Luis Javier de la; Vera del Campo, Juan Victoriano; Hernández Serrano, Juan; León Abarca, Olga (Institute of Electrical and Electronics Engineers (IEEE), 2013)
      Conference report
      Restricted access - publisher's policy
      Personal Health Systems (PHS) allow to move the point of care from hospitals to the patient's home. Moreover, a PHS usually handles much more information and provides more appropriate diagnostic and personalized treatments ...