Now showing items 21-40 of 57

    • Disseny i implementació d’una aplicació de streaming utilitzant Network Coding 

      Llansana Parcerisas, Joan (Universitat Politècnica de Catalunya, 2012-03-20)
      Bachelor thesis
      Open Access
      Actualment el tràfic de vídeo per Internet és el més significatiu. Està previst que aquesta tendència vagi en augment en el futur de manera molt representativa, en part motivat per l’aparició de formats d’alta definició o ...
    • Distributed coding using punctured quasi-arithmetic codes for memory and memoryless sources 

      Malinowski, Simon; Artigas Roca, Javier; Guillemot, Christine; Torres Urgell, Lluís (IEEE Press. Institute of Electrical and Electronics Engineers, 2009-10-01)
      Article
      Open Access
      This correspondence considers the use of punctured quasi-arithmetic (QA) codes for the Slepian–Wolf problem. These entropy codes are defined by finite state machines for memoryless and first-order memory sources. ...
    • Edge-partitioning regular graphs for ring traffic grooming with a priori placement od the ADMs 

      Muñoz López, Francisco Javier; Zhentao, Li; Sau Valls, Ignasi (2011)
      Article
      Open Access
      We study the following graph partitioning problem: Given two positive integers C and Δ, find the least integer M(C,Δ) such that the edges of any graph with maximum degree at most Δ can be partitioned into subgraphs with ...
    • Estudi i simulació de network coding 

      Pericay Vendrell, Pau (Universitat Politècnica de Catalunya, 2010-10-06)
      Bachelor thesis
      Open Access
    • Exploiting network coding for smart healthcare: scenarios and challenges sensor networks for sustainable development 

      Kartsakli, Elli; Antonopoulos, Angelos; Verikoukis, Christos (Taylor & Francis Group, 2014)
      Part of book or chapter of book
      Restricted access - publisher's policy
    • Families of convolutional codes over finite fields: a survey 

      García Planas, María Isabel (Springer, 2017-03-09)
      Part of book or chapter of book
      Restricted access - publisher's policy
      The goal of this work is to give explicit interconnections between control theory and coding. It is well-known the existence of a closed relation between linear systems over finite fields and convolutional codes that allow ...
    • Fluid flow queue models for fixed-mobile network evaluation 

      Bernal Escribano, Álvaro (Universitat Politècnica de Catalunya, 2019-07)
      Master thesis
      Open Access
      A methodology for fast and accurate end-to-end KPI, like throughput and delay, estimation is proposed based on the service-centric traffic flow analysis and the fluid flow queuing model named CURSA-SQ. Mobile network ...
    • Fuchsian codes with arbitrarily high code rates 

      Blanco Chacón, Iván; Hollanti, Camilla; Alsina Aubach, Montserrat; Remón Adell, Dionís (2016-01-01)
      Article
      Open Access
      Recently, Fuchsian codes have been proposed in Blanco-Chacon et al. (2014) [2] for communication over channels subject to additive white Gaussian noise (AWGN). The two main advantages of Fuchsian codes are their ability ...
    • Fuzzy short-run control charts 

      Fonseca, D. J.; Elam, M. E.; Tibbs, L. (Universitat Politècnica de Catalunya. Secció de Matemàtiques i Informàtica, 2007)
      Article
      Open Access
      Statistical control charts are useful tools in monitoring the state of a manufacturing process. Control charts are used to plot process data and compare it to the limits set for the process. Points plotting outside these ...
    • Homomorphic cryptosystems for electronic voting 

      Cusell Sánchez, Enric (Universitat Politècnica de Catalunya, 2014-01)
      Bachelor thesis
      Open Access
      This bachelor's degree thesis deals with homomorphic public-key cryptography, or in other words cryptosystems with special addition properties. Such cryptosystems are widely used in real life situations, for instance to ...
    • Ideal hierarchical secret sharing schemes 

      Farràs Ventura, Oriol; Padró Laimon, Carles (Springer, 2010)
      Conference report
      Open Access
      Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, and it has attracted a lot of attention from the invention of secret sharing until nowadays. Several constructions of ideal ...
    • Image data compression based of HPA and FAPEC 

      Iudica, Riccardo (Universitat Politècnica de Catalunya, 2014-03-05)
      Master thesis
      Open Access
      We present the results of a new compression algorithm, Hierarchical Pixel Averaging (HPA), espcifically designed to compress images. Our results indicate that the compression ratios obtained with HPA are equivalent to those ...
    • Incremental capacity planning in flexgrid optical networks 

      Morales Alcaide, Fernando (Universitat Politècnica de Catalunya, 2015-02)
      Bachelor thesis
      Open Access
      Les xarxes de comunicacions de fibra òptica necessiten adaptar-se com a resposta a l'evolució del tràfic de dades que han de transportar. Aquesta evolució inclou l'extensió periòdica de la seva capacitat per tal de millorar ...
    • Lattice-based threshold cryptography 

      Alborch Escobar, Ferran (Universitat Politècnica de Catalunya, 2020-07)
      Bachelor thesis
      Open Access
      Ever since the appearance of quantum computers, prime factoring and discrete logarithm based cryptography has been put in question, giving birth to the so called post-quantum cryptography. The goal of this bachelor's degree ...
    • Machine Learning Applied to Network Traffic 

      Rodríguez Segado, David (Universitat Politècnica de Catalunya / Universitat de Barcelona, 2019-06)
      Master thesis
      Restricted access - author's decision
      The appliance of machine learning to TCP/IP traffic flows is not new. However, this projects aims to use it to predict the congestion avoidance algorithm at the first second of a data transference. Being able to recognize ...
    • Machine-to-machine (M2M) communications for e-health applications 

      Kartsakli, Elli; Lalos, Aristeidis; Antonopoulos, Angelos; Tennina, Stefano; Di Renzo, Marco; Alonso Zárate, Luis Gonzaga; Verikoukis, Christos (Elsevier, 2015)
      Part of book or chapter of book
      Open Access
      The emerging technology of machine-to-machine (M2M) communications is bringing a paradigm shift in healthcare delivery. A broad range of e-health applications can be conceived, with considerable benefits for both patients ...
    • Mathematical and Technological Aspects of Quantum Information Processing 

      Tura i Brugués, Jordi (Universitat Politècnica de Catalunya, 2011-03)
      Master thesis
      Open Access
      Since its genesis, quantum mechanics has proved to be a very accurate model for predicting the behavior of the world below the nanoscale. However, crucial breakthroughs in technology were needed in order to be able to e ...
    • Mathematical methods of signal processing 

      Sayols Baixeras, Narcís (Universitat Politècnica de Catalunya, 2011-11)
      Master thesis
      Open Access
      The aim of this project is to present in a systematic way the more relevant mathematical methods of signal processing, and to explore how they are applied to speech and image precessing. After explaining the more common ...
    • Mixed-signal test band guarding using digitally coded indirect measurements 

      Gómez Pau, Álvaro; Balado Suárez, Luz María; Figueras Pàmies, Joan (Institute of Electrical and Electronics Engineers (IEEE), 2015)
      Conference report
      Restricted access - publisher's policy
      Testing analog and mixed-signal circuits is a costly task due to the required test time targets and high end technical resources. Indirect testing methods partially address these issues providing an efficient solution using ...
    • Monomial codes seen as invariant subspaces 

      García Planas, María Isabel; Magret Planas, Maria dels Dolors; Um, Laurence Emilie (2017)
      Article
      Open Access
      It is well known that cyclic codes are very useful because of their applications, since they are not computationally expensive and encoding can be easily implemented. The relationship between cyclic codes and invariant ...