Now showing items 1-19 of 19

  • A context-based surveillance framework for large infrastructures 

    Ripolles, O.; Silla, J.; Pegueroles Vallés, Josep R.; Saenz, J.; Simó, J.; Sandoval, Cristina; Viktorov, M.; Gómez Muro, Ana (2012)
    Conference report
    Restricted access - publisher's policy
    In this paper we present the control and surveillance platform that is currently being developed within the ViCoMo project. This project is aimed at developing a context modeling system which can reconstruct the events ...
  • A methodology to introduce sustainability into the Final Year Project to foster sustainable engineering projects 

    López Álvarez, David; Sánchez Carracedo, Fermín; Vidal López, Eva María; Pegueroles Vallés, Josep R.; Alier Forment, Marc; Cabré Garcia, José M.; García Almiñana, Jordi; García, Helena (Institute of Electrical and Electronics Engineers (IEEE), 2014)
    Conference report
    Open Access
    The introduction of sustainability skills into higher education curricula is a natural effect of the increasing importance of sustainability in our daily lives. Topics like green computing, sustainable design or environmental ...
  • Building hierarchical public key infrastructures in mobile ad-hoc networks 

    Satizábal Echavarría, Isabel Cristina; Forné Muñoz, Jorge; Hernández Serrano, Juan; Pegueroles Vallés, Josep R. (Springer, 2006)
    Conference report
    Restricted access - publisher's policy
    Dynamism of mobile ad-hoc networks implies changing trust relationships among their nodes that can be established using peer-to-peer PKIs. Here, certification paths can be built although part of the infrastructure is ...
  • Contribución a la seguridad en servicios multimedia. Aplicación a entornos multicast 

    Pegueroles Vallés, Josep R. (Universitat Politècnica de Catalunya, 2003-11-21)
    Doctoral thesis
    Open Access
    Usually multimedia services can be divided into two different phases: access to the service and content distribution. The first phase usually takes place over reliable transport protocols and unicast connections. The second ...
  • Designing CDIO capstone projects: a systems thinking approach 

    Alarcón Cot, Eduardo José; Bou Balust, Elisenda; Camps Carmona, Adriano José; Bragós Bardia, Ramon; Oliveras Vergés, Albert; Pegueroles Vallés, Josep R.; Sayrol Clols, Elisa; Marqués Acosta, Fernando (2013)
    Conference report
    Open Access
    Given the all-pervasiveness of Systems thinking -which consists of thinking about things as systemsas a way of reasoning, in this work we will describe its application to make an interpretation of how to conceive and ...
  • Design of a P2P content recommendation system using affinity networks 

    Vera del Campo, Juan Victoriano; Pegueroles Vallés, Josep R.; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2012-08)
    Article
    Restricted access - publisher's policy
    The success and intensive use of social networks makes strategies for efficient document location a hot topic of research. In this paper, we propose a common vector space to describe documents and users to create a social ...
  • DocCloud: a document recommender system on cloud computing with plausible deniability 

    Vera del Campo, Juan Victoriano; Pegueroles Vallés, Josep R.; Hernández Serrano, Juan; Soriano Ibáñez, Miguel (2013-04-16)
    Article
    Restricted access - publisher's policy
    Recommender systems select the most interesting products for costumers based on their interests. The move of a recommender system to a cloud faces many challenges from the perspective of the protection of the participants. ...
  • Enabling secure multicast using a new java LKH rekeying tool 

    Pegueroles Vallés, Josep R.; Rico Novella, Francisco José (2003)
    Conference report
    Restricted access - publisher's policy
    The most promising protocols for multicast key management are those based on multilevel logical binary trees of Key Encryption Keys (KEKs). One of these protocols, Logical Key Hierarchy (LKH) has become a standard de facto ...
  • Genetic algorithms for designing network security protocols 

    Zarza, Luis; Forné Muñoz, Jorge; Pegueroles Vallés, Josep R.; Soriano Ibáñez, Miguel (World Scientífic, 2010)
    Part of book or chapter of book
    Restricted access - publisher's policy
    The design of cryptographic and security protocols for new scenarios and applications can be computationally expensive. Examples of these can be sensor or mobile ad-hoc networks where thousands of nodes can be involved. ...
  • Implementación y primeros resultados de la asignatura de introducción a la ingeniería en los nuevos grados de la ETSETB-UPC 

    Sayrol Clols, Elisa; Onrubia, Raúl; García Hernández, Miguel J.; Oliveras Vergés, Albert; Bragós Bardia, Ramon; Pegueroles Vallés, Josep R.; Alarcón Cot, Eduardo José; Camps Carmona, Adriano José; Sardà Ferrer, Joan; Consolación Segura, Carolina María; Mussons Sellés, Jaume; Pons Peregort, Olga (IEEE, 2011)
    Conference report
    Restricted access - publisher's policy
    En este trabajo se describe la asignatura "Introducción a la Ingeniería de las TIC" que, basándose en restricciones y especificaciones iniciales, ha sido concebida, diseñada e implementada en la ETSETB de la UPC. Es la ...
  • Knowledge sharing in the health scenario 

    LLuch Ariet, Magi; Brugues de la Torre, Albert; Vallverdú Bayés, Sisco; Pegueroles Vallés, Josep R. (2014-11-28)
    Article
    Open Access
    The understanding of certain data often requires the collection of similar data from different places to be analysed and interpreted. Interoperability standards and ontologies, are facilitating data interchange around the ...
  • Low-cost group rekeying for unattended wireless sensor networks 

    Hernández Serrano, Juan; Vera del Campo, Juan Victoriano; Pegueroles Vallés, Josep R.; Gañán, Carlos (2012)
    Article
    Restricted access - publisher's policy
    Wireless sensor networks (WSNs) are made up of large groups of nodes that perform distributed monitoring services. Since sensor measurements are often sensitive data acquired in hostile environments, securing WSN becomes ...
  • Multimedia copyright protection platform demonstrator 

    Soriano Ibáñez, Miguel; Fernández Muñoz, Marcel; Sayrol Clols, Elisa; Tomás Buliart, Joan; Casanellas, Joan; Pegueroles Vallés, Josep R.; Hernández Serrano, Juan (Springer, 2005)
    Conference report
    Restricted access - publisher's policy
    The work presented in this paper consists in the development of a portable platform to protect the copyright and distribution rights of digital contents, and empirically demonstrate the capacity of several marking and ...
  • Proceso de inversión de competencias genéricas en los nuevos planes de estudios de grado de la ETSETB de acuerdo con el modelo CDIO 

    Sayrol Clols, Elisa; Sardà Ferrer, Joan; Sáez Moreno, Germán; Bragós Bardia, Ramon; Alarcón Cot, Eduardo José; Cabrera-Bean, Margarita; Calveras Augé, Anna M.; Comellas Colomé, Jaume; O'Callaghan Castellà, Juan Manuel; Pegueroles Vallés, Josep R.; Prat Viñas, Lluís (2010)
    Conference report
    Open Access
    Los distintos marcos normativos que fijan las condiciones de contorno en la elaboración de los nuevos planes de estudios ponen especial énfasis en el aprendizaje basado en competencias y en la inclusión de determinadas ...
  • Processing Diabetes mellitus composite events in MAGPIE 

    Brugues de la Torre, Albert; Bromuri, Stefano; Barry, Michael; Jimenez Del Toro, Oscar; Mazurkiewicz, Maciej R.; Kardas, Przemyslaw; Pegueroles Vallés, Josep R.; Schumacher, Michael (2016-02-01)
    Article
    Open Access
    The focus of this research is in the definition of programmable expert Personal Health Systems (PHS) to monitor patients affected by chronic diseases using agent oriented programming and mobile computing to represent the ...
  • QUALITEL: qualitat docent als estudis de telecomunicació 

    Sayrol Clols, Elisa; Prat Viñas, Lluís; O'Callaghan Castellà, Juan Manuel; Pegueroles Vallés, Josep R.; Vallverdú Vallés, Francesc; Alarcón Cot, Eduardo José; Sáez Moreno, Germán; Calveras Augé, Anna M.; Bragós Bardia, Ramon (Universitat Politècnica de Catalunya. Institut de Ciències de l'Educació, 2010-02-11)
    Conference lecture / Conference report
    Open Access
    El projecte consisteix en una sèrie d'actuacions de caràcter metodològic i organitzatiu portades a terme a primer curs (fase selectiva) dels estudis d'enginyeria de telecomunicació de l'ETSETB per millorar el rendiment ...
  • Security analysis of a protocol based on multiagents systems for clinical data exchange 

    Brugues de la Torre, Albert; LLuch Ariet, Magi; Pegueroles Vallés, Josep R. (Institute of Electrical and Electronics Engineers (IEEE), 2013)
    Conference report
    Restricted access - publisher's policy
    This work describes the security architecture of MOSAIC, a protocol for clinical data exchange with multilateral agreement support. The blocks of the architecture are derived from a series of common attacks that can be ...
  • Supporting mobility in GKM over ad-hoc network using a decentralized and spontaneous algorithm 

    Hernández Serrano, Juan; Pegueroles Vallés, Josep R.; Soriano Ibáñez, Miguel (Springer, 2007)
    Conference report
    Restricted access - publisher's policy
    Recently there have been a noticeable growth of ad-hoc environments with peer-to-peer relations. Such environments decentralize the services in order to share their cost between their members. As a result, a decentralized ...
  • The TAMESIS project: enabling technologies for the health status monitoring and secure exchange of clinical record 

    Pegueroles Vallés, Josep R.; Cruz Llopis, Luis Javier de la; Vera del Campo, Juan Victoriano; Hernández Serrano, Juan; León Abarca, Olga (Institute of Electrical and Electronics Engineers (IEEE), 2013)
    Conference report
    Restricted access - publisher's policy
    Personal Health Systems (PHS) allow to move the point of care from hospitals to the patient's home. Moreover, a PHS usually handles much more information and provides more appropriate diagnostic and personalized treatments ...