Now showing items 21-40 of 77

    • Detection of dependence based on kernel signal processing 

      Cabrera Estanyol, Ferran de (Universitat Politècnica de Catalunya, 2017-02)
      Master thesis
      Open Access
    • Development and evaluation of a semi-automatic anonymization tool for textual data 

      Brull Corretger, Hèlia (Universitat Politècnica de Catalunya, 2019-07-10)
      Bachelor thesis
      Open Access
      Despite its undeniable advantages, the exponential growth of data analytic capabilities implies a significant increase in the risk of personal privacy loss and re-identification of the individuals appearing in databases. ...
    • Dynamic m-class angle compression for cursor control in 2D using brain interfaces 

      Garau Burguera, Pere (Universitat Politècnica de Catalunya, 2017-10-16)
      Bachelor thesis
      Open Access
      The purpose of this project is to present an environment where a cursor can be controlled on a 2D screen by using a brain computer interface (BCI). For this purpose, and by using a probability model that determines which ...
    • Edge-partitioning regular graphs for ring traffic grooming with a priori placement od the ADMs 

      Muñoz López, Francisco Javier; Zhentao, Li; Sau Valls, Ignasi (2011)
      Article
      Open Access
      We study the following graph partitioning problem: Given two positive integers C and Δ, find the least integer M(C,Δ) such that the edges of any graph with maximum degree at most Δ can be partitioned into subgraphs with ...
    • Efficient coding in dolphin surface behavioral patterns 

      Ferrer Cancho, Ramon; Lusseau, David (2009-05)
      Article
      Open Access
      We show that the law of brevity, i.e. the tendency of words to shorten as their frequency increases, is also found in dolphin surface behavioral patterns. As far as we know, this is the first evidence of the law in another ...
    • Extending Brickell-Davenport theorem to non-perfect secret sharing schemes 

      Farràs Ventura, Oriol; Padró Laimon, Carles (2015-02)
      Article
      Open Access
      One important result in secret sharing is the Brickell-Davenport Theorem: every ideal perfect secret sharing scheme de nes a matroid that is uniquely determined by the access structure. Even though a few attempts have been ...
    • Fluid flow queue models for fixed-mobile network evaluation 

      Bernal Escribano, Álvaro (Universitat Politècnica de Catalunya, 2019-07)
      Master thesis
      Open Access
      A methodology for fast and accurate end-to-end KPI, like throughput and delay, estimation is proposed based on the service-centric traffic flow analysis and the fluid flow queuing model named CURSA-SQ. Mobile network ...
    • From qualitative absolute order-of-magnitude to the extended set of Hesitant Fuzzy Linguistic Term Sets 

      Montserrat Adell, Jordi; Sánchez Soler, Monica; Ruiz Vegas, Francisco Javier; Agell Jané, Núria (2016)
      Conference report
      Restricted access - publisher's policy
      Hesitant fuzzy linguistic term sets were introduced to grasp the uncertainty existing in human reasoning. In this paper, inspired by absolute order-of-magnitude qualitative reasoning techniques, an extension of the set ...
    • From t-closeness-like privacy to postrandomization via information theory 

      Rebollo Monedero, David; Forné Muñoz, Jorge; Domingo Ferrer, Josep (2010)
      Article
      Restricted access - publisher's policy
      t-Closeness is a privacy model recently defined for data anonymization. A data set is said to satisfy t-closeness if, for each group of records sharing a combination of key attributes, the distance between the distribution ...
    • Fuzzy short-run control charts 

      Fonseca, D. J.; Elam, M. E.; Tibbs, L. (Universitat Politècnica de Catalunya. Secció de Matemàtiques i Informàtica, 2007)
      Article
      Open Access
      Statistical control charts are useful tools in monitoring the state of a manufacturing process. Control charts are used to plot process data and compare it to the limits set for the process. Points plotting outside these ...
    • Homomorphic cryptosystems for electronic voting 

      Cusell Sánchez, Enric (Universitat Politècnica de Catalunya, 2014-01)
      Bachelor thesis
      Open Access
      This bachelor's degree thesis deals with homomorphic public-key cryptography, or in other words cryptosystems with special addition properties. Such cryptosystems are widely used in real life situations, for instance to ...
    • Improved existence bounds on IPP codes using the Clique Lovász Local Lemma 

      Aranda, Castor; Fernández Muñoz, Marcel (Institute of Electrical and Electronics Engineers (IEEE), 2017)
      Conference report
      Restricted access - publisher's policy
      Nowadays, one of the biggest problems that challenges distributors of digital content is, precisely, protecting such content against redistribution. Those who trade with any of the multiple digital information formats ...
    • Impulse response recovery of linear systems through weighted cumulant slice 

      Vidal Manzano, José; Rodríguez Fonollosa, José Adrián (IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 1996-10-01)
      Article
      Open Access
      Identifiability of the so-called ω-slice algorithm is proven for ARMA linear systems. Although proofs were developed in the past for the simpler cases of MA and AR models, they were not extendible to general exponential ...
    • Incremental capacity planning in flexgrid optical networks 

      Morales Alcaide, Fernando (Universitat Politècnica de Catalunya, 2015-02)
      Bachelor thesis
      Open Access
      Les xarxes de comunicacions de fibra òptica necessiten adaptar-se com a resposta a l'evolució del tràfic de dades que han de transportar. Aquesta evolució inclou l'extensió periòdica de la seva capacitat per tal de millorar ...
    • Islas improbables en un mar de información: el espacio en la época de la globalización 

      Pedragosa Bofarull, Pau (2012-12-12)
      Article
      Restricted access - publisher's policy
    • Lattice-based threshold cryptography 

      Alborch Escobar, Ferran (Universitat Politècnica de Catalunya, 2020-07)
      Bachelor thesis
      Open Access
      Ever since the appearance of quantum computers, prime factoring and discrete logarithm based cryptography has been put in question, giving birth to the so called post-quantum cryptography. The goal of this bachelor's degree ...
    • Linguistic laws in chimpanzee gestural communication 

      Heesen, Raphaela; Hobaiter, Catherine; Ferrer Cancho, Ramon; Semple, Stuart (2019-02-13)
      Article
      Open Access
      Studies testing linguistic laws outside language have provided important insights into the organization of biological systems. For example, patterns consistent with Zipf's law of abbreviation (which predicts a negative ...
    • Local maximum-entropy approximation schemes: a seamless bridge between finite elements and meshfree methods 

      Arroyo Balaguer, Marino; Ortiz, Michael (Wiley and Sons, 2006-03)
      Article
      Open Access
      We present a one-parameter family of approximation schemes, which we refer to as local maximum-entropy approximation schemes, that bridges continuously two important limits: Delaunay triangulation and maximum-entropy ...
    • Machine Learning Applied to Network Traffic 

      Rodríguez Segado, David (Universitat Politècnica de Catalunya / Universitat de Barcelona, 2019-06)
      Master thesis
      Restricted access - author's decision
      The appliance of machine learning to TCP/IP traffic flows is not new. However, this projects aims to use it to predict the congestion avoidance algorithm at the first second of a data transference. Being able to recognize ...
    • Mathematical and Technological Aspects of Quantum Information Processing 

      Tura i Brugués, Jordi (Universitat Politècnica de Catalunya, 2011-03)
      Master thesis
      Open Access
      Since its genesis, quantum mechanics has proved to be a very accurate model for predicting the behavior of the world below the nanoscale. However, crucial breakthroughs in technology were needed in order to be able to e ...