Now showing items 21-40 of 53

    • Homomorphic cryptosystems for electronic voting 

      Cusell Sánchez, Enric (Universitat Politècnica de Catalunya, 2014-01)
      Bachelor thesis
      Open Access
      This bachelor's degree thesis deals with homomorphic public-key cryptography, or in other words cryptosystems with special addition properties. Such cryptosystems are widely used in real life situations, for instance to ...
    • Improved existence bounds on IPP codes using the Clique Lovász Local Lemma 

      Aranda, Castor; Fernández Muñoz, Marcel (Institute of Electrical and Electronics Engineers (IEEE), 2017)
      Conference report
      Restricted access - publisher's policy
      Nowadays, one of the biggest problems that challenges distributors of digital content is, precisely, protecting such content against redistribution. Those who trade with any of the multiple digital information formats ...
    • Incremental capacity planning in flexgrid optical networks 

      Morales Alcaide, Fernando (Universitat Politècnica de Catalunya, 2015-02)
      Bachelor thesis
      Open Access
      Les xarxes de comunicacions de fibra òptica necessiten adaptar-se com a resposta a l'evolució del tràfic de dades que han de transportar. Aquesta evolució inclou l'extensió periòdica de la seva capacitat per tal de millorar ...
    • Informació i codis 

      Brunat Blay, Josep Maria; Ventura Capell, Enric (Edicions UPC, 2001)
      Book
      Restricted access to the UPC academic community
      La teoria de la comunicació té els orígens a mitjan segle XX i cada vegada té més rellevància científica, tecnològica i social. Aquest llibre és una introducció a la matèria i en tracta els dos aspectes principals, la ...
    • Islas improbables en un mar de información: el espacio en la época de la globalización 

      Pedragosa Bofarull, Pau (2012-12-12)
      Article
      Restricted access - publisher's policy
    • Lattice-based threshold cryptography 

      Alborch Escobar, Ferran (Universitat Politècnica de Catalunya, 2020-07)
      Bachelor thesis
      Open Access
      Ever since the appearance of quantum computers, prime factoring and discrete logarithm based cryptography has been put in question, giving birth to the so called post-quantum cryptography. The goal of this bachelor's degree ...
    • Machine Learning Applied to Network Traffic 

      Rodríguez Segado, David (Universitat Politècnica de Catalunya / Universitat de Barcelona, 2019-06)
      Master thesis
      Restricted access - author's decision
      The appliance of machine learning to TCP/IP traffic flows is not new. However, this projects aims to use it to predict the congestion avoidance algorithm at the first second of a data transference. Being able to recognize ...
    • Mathematical and Technological Aspects of Quantum Information Processing 

      Tura i Brugués, Jordi (Universitat Politècnica de Catalunya, 2011-03)
      Master thesis
      Open Access
      Since its genesis, quantum mechanics has proved to be a very accurate model for predicting the behavior of the world below the nanoscale. However, crucial breakthroughs in technology were needed in order to be able to e ...
    • Mathematical methods of signal processing 

      Sayols Baixeras, Narcís (Universitat Politècnica de Catalunya, 2011-11)
      Master thesis
      Open Access
      The aim of this project is to present in a systematic way the more relevant mathematical methods of signal processing, and to explore how they are applied to speech and image precessing. After explaining the more common ...
    • Measuring the Consensus in Group Decision by means of Qualitative Reasoning 

      Roselló Saurí, Llorenç; Prats Duaygues, Francesc; Sánchez Soler, Monica; Agell Jané, Núria (2009-11-09)
      Conference report
      Restricted access - publisher's policy
      This paper presents a mathematical framework to assess the consensus found among different evaluators who use ordinal scales in group decision-making and evaluation processes. This framework is developed on the basis of ...
    • Modeling group assessments by means of hesitant fuzzy linguistic term sets 

      Montserrat Adell, Jordi; Agell, Nuria; Sánchez Soler, Monica; Prats Duaygues, Francesc; Ruiz Vegas, Francisco Javier (2017-09)
      Article
      Open Access
      Hesitant linguistic term sets have been introduced to capture the human way of reasoning using linguistic expressions involving different levels of precision. In this paper, a lattice structure is provided to the set of ...
    • Multi-criteria decision making with linguistic labels: a comparison of two methodologies applied to energy planning 

      Afsordegan, Arayeh; Sánchez Soler, Monica; Agell Jané, Núria; Cremades Oliver, Lázaro Vicente; Zahedi, Siamak (2014)
      Conference report
      Open Access
      This paper compares two multi-criteria decision making (MCDM) approaches based on linguistic label assessment. The first approach consists of a modified fuzzy TOPSIS methodology introduced by Kaya and Kahraman in 2011. ...
    • Noise subspace communication: waveform optimization and interference management 

      Borràs Pino, Jordi (Universitat Politècnica de Catalunya, 2016-07-14)
      Bachelor thesis
      Open Access
      Nowadays, the increasing demand for high data-rate services increases the interest of spectral efficiency. As it is well-known, the spectrum is a limited resource. Thus, those newest techniques should exploit it efficiently. ...
    • Non-linear graph-based codes for source coding 

      Matas Navarro, David; Lamarca Orozco, M. Meritxell; García Frías, Javier (2009)
      Conference report
      Open Access
      We introduce a new family of graph-based source codes that can be regarded as a nonlinear generalization of LDPC codes, and apply them to the compression of asymmetric binary memoryless sources. Simulation results and the ...
    • Notes on betweenness centrality of a graph 

      Gago Álvarez, Silvia; Hurajová, Jana; Madaras, Tomas (2009-05-19)
      External research report
      Open Access
      The betweenness centrality of a vertex of a graph is the portion of shortest paths between all pairs of vertices passing through that vertex. We study selected general properties of this invariant and its relations to ...
    • On ratio and product methods with certain known population parameters of auxiliary variable in sample surveys 

      Singh, Housila. P.; Tailor, Ritesh; Tailor, Rajesh (Institut d'Estadística de Catalunya, 2010)
      Article
      Open Access
      This paper proposes two ratio and product-type estimators using transformation based on known minimum and maximum values of auxiliary variable. The biases and mean squared errors of the suggested estimators are obtained ...
    • On the inverse windowed Fourier transform 

      Rebollo Neira, Laura; Fernández Rubio, Juan Antonio (IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 1999-11-30)
      Article
      Open Access
      The inversion problem concerning the windowed Fourier transform is considered. It is shown that, out of the infinite solutions that the problem admits, the windowed Fourier transform is the "optimal" solution according to ...
    • One-shot capacity bounds on the simultaneous transmission of classical and quantum information 

      Salek Shishavan, Farzin; Anshu, Anurag; Hsieh, Min-Hsiu; Jain, Rahul; Rodríguez Fonollosa, Javier (2019-10-07)
      Article
      Open Access
      We study the communication capabilities of a quan- tum channel under the most general channel model known as the one-shot model. Unlike classical channels that can only be used to transmit classical information (bits), a ...
    • One-shot capacity bounds on the simultaneous transmission of public and private information over quantum channels 

      Salek Shishavan, Farzin; Anshu, Anurag; Hsieh, Min-Hsiu; Jain, Rahul; Rodríguez Fonollosa, Javier (Institute of Electrical and Electronics Engineers (IEEE), 2018)
      Conference lecture
      Restricted access - publisher's policy
      We aim to study the optimal rates of transmission of public and private classical information over a quantum channel in the most general channel model. To this end, we discuss a scenario in which a quantum channel is being ...
    • Online graph coloring against a randomized adversary 

      Burjons Pujol, Elisabet; Hromkovic, Juraj; Kralovic, Rastislav; Kralovic, Richard; Muñoz López, Francisco Javier; Unger, Walter (2018-06-01)
      Article
      Open Access
      We consider an online model where an adversary constructs a set of 2s instances S instead of one single instance. The algorithm knows S and the adversary will choose one instance from S at random to present to the algorithm. ...