Exploració per tema "Coding theory"
Ara es mostren els items 1-20 de 71
-
A cloud-assisted random linear network coding medium access control protocol for healthcare applications
(2014-03)
Article
Accés obertRelay sensor networks are often employed in end-to-end healthcare applications to facilitate the information flow between patient worn sensors and the medical data center. Medium access control (MAC) protocols, based on ... -
A cloud-assisted random linear network coding medium access control protocol for healthcare applications
(MDPI, 2014-03-10)
Article
Accés obertRelay sensor networks are often employed in end-to-end healthcare applications to facilitate the information flow between patient worn sensors and the medical data center. Medium access control (MAC) protocols, based on ... -
A comparative analysis of trajectory similarity measures
(2021-06-23)
Article
Accés obertComputing trajectory similarity is a fundamental operation in movement analytics, required in search, clustering, and classification of trajectories, for example. Yet the range of different but interrelated trajectory ... -
A study of the separating property in Reed-Solomon codes by bounding the minimum distance
(2022-02)
Article
Accés obertAccording to their strength, the tracing properties of a code can be categorized as frameproof, separating, IPP and TA. It is known that, if the minimum distance of the code is larger than a certain threshold then the TA ... -
A tool for the design of public transportation services
(2012)
Text en actes de congrés
Accés obertIn this paper a model is described in order to determine the number of lines of a public transportation service, the layout of their lines amongst a set of candidates, their service capacity, and the resulting assignment ... -
Absolute order-of-magnitude reasoning applied to a social multi-criteria evaluation framework
(2016-01)
Article
Accés obertA social multi-criteria evaluation framework for solving a real-case problem of selecting a wind farm location in the regions of Urgell and Conca de Barberá in Catalonia (northeast of Spain) is studied. This paper applies ... -
Adaptive energy management in 5G network slicing: Requirements, architecture, and strategies
(2020-08-02)
Article
Accés obertEnergy consumption is a critical issue for the communications network operators, impacting deeply the cost of the services, as well as the ecological footprint. Network slicing architecture for 5G mobile communications ... -
Additive MDS codes
(2022)
Text en actes de congrés
Accés obertWe prove that an additive code over a finite field which has a few projections which are equivalent to a linear code is itself equivalent to a linear code, providing the code is not too short. -
Advanced Interfaces for the development of music-therapy in people with disabilities
(Universitat Politècnica de Catalunya, 2019-06-25)
Treball Final de Grau
Accés restringit per decisió de l'autor -
Almost separating and almost secure frameproof codes
(2011)
Text en actes de congrés
Accés restringit per política de l'editorialThe theory of separating codes has been applied in several areas of science ranging from automata synthesis to the protection of distribution rights. In this paper, we introduce a relaxed version of separating and secure ... -
An efficient implementation of the FAPEC compression algorithm in the CCSDS image standard
(Universitat Politècnica de Catalunya, 2012-06-26)
Projecte/Treball Final de Carrera
Accés obert[ANGLÈS] The implementation of an efficient image compressor using the FAPEC coder in the CCSDS image data compression standard (122.0). -
Analog circuits testing using digitally coded indirect measurements
(Institute of Electrical and Electronics Engineers (IEEE), 2015)
Text en actes de congrés
Accés restringit per política de l'editorialTesting mixed-signal circuits is a challenging task requiring high amounts of human and technical resources. To overcome these drawbacks, indirect testing methods have been adopted as an efficient solution to perform ... -
Análisis y simulación de un sistema de distribución de datos en tiempo real utilizando Network Coding
(Universitat Politècnica de Catalunya, 2013-02-12)
Treball Final de Grau
Accés obertEste trabajo tiene como objetivo analizar y simular un sistema que utilice Network Coding (más concretamente Random Linear Network Coding), en un escenario de tiempo real. En una primera parte del documento se explica ... -
Anonymous threshold signatures
(Universitat Politècnica de Catalunya, 2018-07)
Projecte Final de Màster Oficial
Accés obertAquest treball tenia l'objectiu de trobar un esquema de llindar de signatura an\`onima compacte. Tot i no haver-ne trobat cap, s'analitzen diverses solucions que s'acosten a l'objectiu publicades per altres autors i es ... -
Combination of intra-flow network coding and opportunistic routing: reliable communications over wireless mesh networks
(Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (ICST), 2015)
Text en actes de congrés
Accés restringit per política de l'editorialOpportunistic routing has recently appeared as a technique aimed to increase the performance of wireless mesh networks, by taking advantage of the broadcast nature of the wireless medium. Despite the remarkable attention ... -
Combining cooperation and physical layer network coding to achieve reliable multicast
(Bentham Science Publishers, 2013-07)
Article
Accés restringit per política de l'editorialA novel cooperative scheme based on Physical layer Network Coding (PNC) for short range communication (SRC) networks is presented in this paper. We investigate a scenario of overlapping networks with multicast traffic and ... -
Common information, matroid representation, and secret sharing for matroid ports
(2020-09-28)
Article
Accés obertLinear information and rank inequalities as, for instance, Ingleton inequality, are useful tools in information theory and matroid theory. Even though many such inequalities have been found, it seems that most of them ... -
Constant size ciphertexts in threshold attribute-based encryption
(Springer Verlag, 2010)
Text en actes de congrés
Accés obertAttribute-based cryptography has emerged in the last years as a promising primitive for digital security. For instance, it provides good solutions to the problem of anonymous access control. In a ciphertextpolicy attribute-based ... -
Construcción de códigos lineal simétricos
(Universitat Politècnica de Catalunya, 2009-07-09)
Treball Final de Grau
Accés obert -
Convolutional code theory based steganography technique
(2022-03-11)
Article
Accés obertSteganography, as it is known, is a technique to hide a secret message within a message or collection of data that is not secret, and a problem in mathematics is to decipher the secret included in the message, to solve ...