Ara es mostren els items 1-20 de 72

    • A cloud-assisted random linear network coding medium access control protocol for healthcare applications 

      Kartsakli, Elli; Antonopoulos, Angelos; Alonso Zárate, Luis Gonzaga; Verikoukis, Christos (2014-03)
      Article
      Accés obert
      Relay sensor networks are often employed in end-to-end healthcare applications to facilitate the information flow between patient worn sensors and the medical data center. Medium access control (MAC) protocols, based on ...
    • A comparative analysis of trajectory similarity measures 

      Tao, Yaguang; Both, Alan; Silveira, Rodrigo Ignacio; Sijben, Stef; Buchin, Kevin; Purves, Ross S.; Laube, Patrick; Peng, Dongliang; Toohey, Kevin; Duckham, Matt (2021-06-23)
      Article
      Accés obert
      Computing trajectory similarity is a fundamental operation in movement analytics, required in search, clustering, and classification of trajectories, for example. Yet the range of different but interrelated trajectory ...
    • A contribution to the theory of convolutional codes from systems theory piont of view 

      Um, Laurence Emilie (Universitat Politècnica de Catalunya, 2015-05-25)
      Tesi
      Accés obert
      Realitzat a/amb:   Jāmiʻat Muḥammad al-Khāmis
      Information is such a valuable good of our time. Given that the transmission of information has always been subject to precision problems, knowing the obstacles existing between the transmitter and the receiver, eventual ...
    • A study of the separating property in Reed-Solomon codes by bounding the minimum distance 

      Fernández Muñoz, Marcel; Jiménez Urroz, Jorge (2022-02)
      Article
      Accés obert
      According to their strength, the tracing properties of a code can be categorized as frameproof, separating, IPP and TA. It is known that, if the minimum distance of the code is larger than a certain threshold then the TA ...
    • A tool for the design of public transportation services 

      Codina Sancho, Esteve; Marín, Ángel; Montero Mercadé, Lídia (2012)
      Text en actes de congrés
      Accés obert
      In this paper a model is described in order to determine the number of lines of a public transportation service, the layout of their lines amongst a set of candidates, their service capacity, and the resulting assignment ...
    • Absolute order-of-magnitude reasoning applied to a social multi-criteria evaluation framework 

      Afsordegan, Arayeh; Sánchez Soler, Monica; Agell Jané, Núria; Aguado Chao, Juan Carlos; Gamboa Jimenez, Gonzalo (2016-01)
      Article
      Accés obert
      A social multi-criteria evaluation framework for solving a real-case problem of selecting a wind farm location in the regions of Urgell and Conca de Barberá in Catalonia (northeast of Spain) is studied. This paper applies ...
    • Adaptive energy management in 5G network slicing: Requirements, architecture, and strategies 

      Tipantuña Tenelema, Christian José; Hesselbach Serra, Xavier (2020-08-02)
      Article
      Accés obert
      Energy consumption is a critical issue for the communications network operators, impacting deeply the cost of the services, as well as the ecological footprint. Network slicing architecture for 5G mobile communications ...
    • Additive MDS codes 

      Ball, Simeon Michael; Adriaensen, Sam (2022)
      Text en actes de congrés
      Accés obert
      We prove that an additive code over a finite field which has a few projections which are equivalent to a linear code is itself equivalent to a linear code, providing the code is not too short.
    • Advanced Interfaces for the development of music-therapy in people with disabilities 

      Valenzuela Ramírez, Andrea (Universitat Politècnica de Catalunya, 2019-06-25)
      Treball Final de Grau
      Accés restringit per decisió de l'autor
    • Almost separating and almost secure frameproof codes 

      Fernández Muñoz, Marcel; Kabatiansky, Grigory; Moreira Sánchez, José (2011)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      The theory of separating codes has been applied in several areas of science ranging from automata synthesis to the protection of distribution rights. In this paper, we introduce a relaxed version of separating and secure ...
    • An efficient implementation of the FAPEC compression algorithm in the CCSDS image standard 

      Artigues Aguiló, Gabriel (Universitat Politècnica de Catalunya, 2012-06-26)
      Projecte/Treball Final de Carrera
      Accés obert
      [ANGLÈS] The implementation of an efficient image compressor using the FAPEC coder in the CCSDS image data compression standard (122.0).
    • Analog circuits testing using digitally coded indirect measurements 

      Gómez Pau, Álvaro; Balado Suárez, Luz María; Figueras Pàmies, Joan (Institute of Electrical and Electronics Engineers (IEEE), 2015)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      Testing mixed-signal circuits is a challenging task requiring high amounts of human and technical resources. To overcome these drawbacks, indirect testing methods have been adopted as an efficient solution to perform ...
    • Análisis y simulación de un sistema de distribución de datos en tiempo real utilizando Network Coding 

      Vivar Fernández, Pau (Universitat Politècnica de Catalunya, 2013-02-12)
      Treball Final de Grau
      Accés obert
      Este trabajo tiene como objetivo analizar y simular un sistema que utilice Network Coding (más concretamente Random Linear Network Coding), en un escenario de tiempo real. En una primera parte del documento se explica ...
    • Anonymous threshold signatures 

      Hlad Colic, Petar (Universitat Politècnica de Catalunya, 2018-07)
      Projecte Final de Màster Oficial
      Accés obert
      Aquest treball tenia l'objectiu de trobar un esquema de llindar de signatura an\`onima compacte. Tot i no haver-ne trobat cap, s'analitzen diverses solucions que s'acosten a l'objectiu publicades per altres autors i es ...
    • Combination of intra-flow network coding and opportunistic routing: reliable communications over wireless mesh networks 

      Garrido Torres, Pablo; Gómez, David; Agüero Calvo, Ramón; Serrat Fernández, Juan (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (ICST), 2015)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      Opportunistic routing has recently appeared as a technique aimed to increase the performance of wireless mesh networks, by taking advantage of the broadcast nature of the wireless medium. Despite the remarkable attention ...
    • Combining cooperation and physical layer network coding to achieve reliable multicast 

      Miliotis, Vasileios; Alonso Zárate, Luis Gonzaga; Verikoukis, Christos (Bentham Science Publishers, 2013-07)
      Article
      Accés restringit per política de l'editorial
      A novel cooperative scheme based on Physical layer Network Coding (PNC) for short range communication (SRC) networks is presented in this paper. We investigate a scenario of overlapping networks with multicast traffic and ...
    • Common information, matroid representation, and secret sharing for matroid ports 

      Michael, Bamiloshin; Ben-Efraim, Aner; Farràs Ventura, Oriol; Padró Laimon, Carles (2020-09-28)
      Article
      Accés obert
      Linear information and rank inequalities as, for instance, Ingleton inequality, are useful tools in information theory and matroid theory. Even though many such inequalities have been found, it seems that most of them ...
    • Constant size ciphertexts in threshold attribute-based encryption 

      Herranz Sotoca, Javier; Laguillaumie, Fabien; Ràfols Salvador, Carla (Springer Verlag, 2010)
      Text en actes de congrés
      Accés obert
      Attribute-based cryptography has emerged in the last years as a promising primitive for digital security. For instance, it provides good solutions to the problem of anonymous access control. In a ciphertextpolicy attribute-based ...
    • Convolutional code theory based steganography technique 

      García Planas, María Isabel; Um, Laurence Emilie (2022-03-11)
      Article
      Accés obert
      Steganography, as it is known, is a technique to hide a secret message within a message or collection of data that is not secret, and a problem in mathematics is to decipher the secret included in the message, to solve ...
    • Convolutional codes and steganography under linear systems theoretical point of view 

      García Planas, María Isabel; Um, Laurence Emilie; Soudi, El Mamoun; El Jouhari, Houda (2020-11)
      Article
      Accés obert
      In this work, we introduce an application of convolutional coding theory in steganography. As it is known, block codes are largely used for dissimulation of information using the steganographic process. Here, we suggest a ...