Now showing items 21-40 of 55

    • Exploiting network coding for smart healthcare: scenarios and challenges sensor networks for sustainable development 

      Kartsakli, Elli; Antonopoulos, Angelos; Verikoukis, Christos (Taylor & Francis Group, 2014)
      Part of book or chapter of book
      Restricted access - publisher's policy
    • Extending small arcs to large arcs 

      Ball, Simeon Michael (2018-03-01)
      Article
      Open Access
      An arc is a set of vectors of the k-dimensional vector space over the finite field with q elements Fq , in which every subset of size k is a basis of the space, i.e. every k-subset is a set of linearly independent vectors. ...
    • Families of convolutional codes over finite fields: a survey 

      García Planas, María Isabel (Springer, 2017-03-09)
      Part of book or chapter of book
      Restricted access - publisher's policy
      The goal of this work is to give explicit interconnections between control theory and coding. It is well-known the existence of a closed relation between linear systems over finite fields and convolutional codes that allow ...
    • Fluid flow queue models for fixed-mobile network evaluation 

      Bernal Escribano, Álvaro (Universitat Politècnica de Catalunya, 2019-07)
      Master thesis
      Open Access
      A methodology for fast and accurate end-to-end KPI, like throughput and delay, estimation is proposed based on the service-centric traffic flow analysis and the fluid flow queuing model named CURSA-SQ. Mobile network ...
    • Fuchsian codes with arbitrarily high code rates 

      Blanco Chacón, Iván; Hollanti, Camilla; Alsina Aubach, Montserrat; Remón Adell, Dionís (2016-01-01)
      Article
      Open Access
      Recently, Fuchsian codes have been proposed in Blanco-Chacon et al. (2014) [2] for communication over channels subject to additive white Gaussian noise (AWGN). The two main advantages of Fuchsian codes are their ability ...
    • High-Throughput Multi-Source Cooperation via Complex-Field Network Codin 

      Li, Guobing; Cano, Alfonso; Gómez Vilardebó, Jesús; Giannakis, Georgios G.; Pérez Neira, Ana Isabel (2011-05)
      Article
      Restricted access - publisher's policy
      Physical-layer network coding over wireless networks can provide considerable throughput gains with respect to traditional cooperative relaying strategies at no loss of diversity gain. In this paper, a novel cooperation ...
    • Homomorphic cryptosystems for electronic voting 

      Cusell Sánchez, Enric (Universitat Politècnica de Catalunya, 2014-01)
      Bachelor thesis
      Open Access
      This bachelor's degree thesis deals with homomorphic public-key cryptography, or in other words cryptosystems with special addition properties. Such cryptosystems are widely used in real life situations, for instance to ...
    • Ideal hierarchical secret sharing schemes 

      Farràs Ventura, Oriol; Padró Laimon, Carles (Springer, 2010)
      Conference report
      Open Access
      Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, and it has attracted a lot of attention from the invention of secret sharing until nowadays. Several constructions of ideal ...
    • Incremental capacity planning in flexgrid optical networks 

      Morales Alcaide, Fernando (Universitat Politècnica de Catalunya, 2015-02)
      Bachelor thesis
      Open Access
      Les xarxes de comunicacions de fibra òptica necessiten adaptar-se com a resposta a l'evolució del tràfic de dades que han de transportar. Aquesta evolució inclou l'extensió periòdica de la seva capacitat per tal de millorar ...
    • Informació i codis 

      Brunat Blay, Josep Maria; Ventura Capell, Enric (Edicions UPC, 2001)
      Book
      Restricted access to the UPC academic community
      La teoria de la comunicació té els orígens a mitjan segle XX i cada vegada té més rellevància científica, tecnològica i social. Aquest llibre és una introducció a la matèria i en tracta els dos aspectes principals, la ...
    • Introducción a los códigos Turbo 

      Calvo Page, Eduard; Ribot Caner, Jaume (Escola Tècnica Superior d'Enginyers de Telecomunicació de Barcelona, 2003)
      Article
      Open Access
      El objetivo de este artículo es dar al lector una visión global de los Códigos Turbo a modo de tutoriaI. No pretende introducir ninguna innovación en el campo, sino evitar la tarea de tener que recurrir a muchas fuentes ...
    • Isometries of the hamming space and equivalence relations of linear codes over a finite field 

      García Planas, María Isabel; Magret Planas, Maria dels Dolors (Springer, 2016)
      Part of book or chapter of book
      Restricted access - publisher's policy
      Detection and error capabilities are preserved when applying to a linear code an isomorphism which preserves Hamming distance. We study here two such isomorphisms: permutation isometries and monomial isometries
    • Lattice-based threshold cryptography 

      Alborch Escobar, Ferran (Universitat Politècnica de Catalunya, 2020-07)
      Bachelor thesis
      Open Access
      Ever since the appearance of quantum computers, prime factoring and discrete logarithm based cryptography has been put in question, giving birth to the so called post-quantum cryptography. The goal of this bachelor's degree ...
    • Los "Turbo códigos", nuevos subsistemas de codificación de canal para mejorar la transmisión digital de gran capacidad 

      Armengol Roig, Enric; Delgado Penin, José Antonio (Escola Tècnica Superior d'Enginyers de Telecomunicació de Barcelona, 1996)
      Article
      Open Access
    • Machine Learning Applied to Network Traffic 

      Rodríguez Segado, David (Universitat Politècnica de Catalunya / Universitat de Barcelona, 2019-06)
      Master thesis
      Restricted access - author's decision
      The appliance of machine learning to TCP/IP traffic flows is not new. However, this projects aims to use it to predict the congestion avoidance algorithm at the first second of a data transference. Being able to recognize ...
    • Machine-to-machine (M2M) communications for e-health applications 

      Kartsakli, Elli; Lalos, Aristeidis; Antonopoulos, Angelos; Tennina, Stefano; Di Renzo, Marco; Alonso Zárate, Luis Gonzaga; Verikoukis, Christos (Elsevier, 2015)
      Part of book or chapter of book
      Open Access
      The emerging technology of machine-to-machine (M2M) communications is bringing a paradigm shift in healthcare delivery. A broad range of e-health applications can be conceived, with considerable benefits for both patients ...
    • Mathematical and Technological Aspects of Quantum Information Processing 

      Tura i Brugués, Jordi (Universitat Politècnica de Catalunya, 2011-03)
      Master thesis
      Open Access
      Since its genesis, quantum mechanics has proved to be a very accurate model for predicting the behavior of the world below the nanoscale. However, crucial breakthroughs in technology were needed in order to be able to e ...
    • Mathematical methods of signal processing 

      Sayols Baixeras, Narcís (Universitat Politècnica de Catalunya, 2011-11)
      Master thesis
      Open Access
      The aim of this project is to present in a systematic way the more relevant mathematical methods of signal processing, and to explore how they are applied to speech and image precessing. After explaining the more common ...
    • Mixed-signal test band guarding using digitally coded indirect measurements 

      Gómez Pau, Álvaro; Balado Suárez, Luz María; Figueras Pàmies, Joan (Institute of Electrical and Electronics Engineers (IEEE), 2015)
      Conference report
      Restricted access - publisher's policy
      Testing analog and mixed-signal circuits is a costly task due to the required test time targets and high end technical resources. Indirect testing methods partially address these issues providing an efficient solution using ...
    • Monomial codes seen as invariant subspaces 

      García Planas, María Isabel; Magret Planas, Maria dels Dolors; Um, Laurence Emilie (2017)
      Article
      Open Access
      It is well known that cyclic codes are very useful because of their applications, since they are not computationally expensive and encoding can be easily implemented. The relationship between cyclic codes and invariant ...