Ara es mostren els items 41-60 de 71

    • Ideal hierarchical secret sharing schemes 

      Farràs Ventura, Oriol; Padró Laimon, Carles (Springer, 2010)
      Text en actes de congrés
      Accés obert
      Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, and it has attracted a lot of attention from the invention of secret sharing until nowadays. Several constructions of ideal ...
    • Image data compression based of HPA and FAPEC 

      Iudica, Riccardo (Universitat Politècnica de Catalunya, 2014-03-05)
      Projecte Final de Màster Oficial
      Accés obert
      We present the results of a new compression algorithm, Hierarchical Pixel Averaging (HPA), espcifically designed to compress images. Our results indicate that the compression ratios obtained with HPA are equivalent to those ...
    • Incremental capacity planning in flexgrid optical networks 

      Morales Alcaide, Fernando (Universitat Politècnica de Catalunya, 2015-02)
      Treball Final de Grau
      Accés obert
      Les xarxes de comunicacions de fibra òptica necessiten adaptar-se com a resposta a l'evolució del tràfic de dades que han de transportar. Aquesta evolució inclou l'extensió periòdica de la seva capacitat per tal de millorar ...
    • Lattice-based threshold cryptography 

      Alborch Escobar, Ferran (Universitat Politècnica de Catalunya, 2020-07)
      Treball Final de Grau
      Accés obert
      Ever since the appearance of quantum computers, prime factoring and discrete logarithm based cryptography has been put in question, giving birth to the so called post-quantum cryptography. The goal of this bachelor's degree ...
    • Machine Learning Applied to Network Traffic 

      Rodríguez Segado, David (Universitat Politècnica de Catalunya / Universitat de Barcelona, 2019-06)
      Projecte Final de Màster Oficial
      Accés restringit per decisió de l'autor
      Realitzat a/amb:   Starflow Networks
      The appliance of machine learning to TCP/IP traffic flows is not new. However, this projects aims to use it to predict the congestion avoidance algorithm at the first second of a data transference. Being able to recognize ...
    • Machine-to-machine (M2M) communications for e-health applications 

      Kartsakli, Elli; Lalos, Aristeidis; Antonopoulos, Angelos; Tennina, Stefano; Di Renzo, Marco; Alonso Zárate, Luis Gonzaga; Verikoukis, Christos (Elsevier, 2015)
      Capítol de llibre
      Accés obert
      The emerging technology of machine-to-machine (M2M) communications is bringing a paradigm shift in healthcare delivery. A broad range of e-health applications can be conceived, with considerable benefits for both patients ...
    • Mathematical and Technological Aspects of Quantum Information Processing 

      Tura i Brugués, Jordi (Universitat Politècnica de Catalunya, 2011-03)
      Projecte Final de Màster Oficial
      Accés obert
      Since its genesis, quantum mechanics has proved to be a very accurate model for predicting the behavior of the world below the nanoscale. However, crucial breakthroughs in technology were needed in order to be able to e ...
    • Mathematical methods of signal processing 

      Sayols Baixeras, Narcís (Universitat Politècnica de Catalunya, 2011-11)
      Projecte Final de Màster Oficial
      Accés obert
      The aim of this project is to present in a systematic way the more relevant mathematical methods of signal processing, and to explore how they are applied to speech and image precessing. After explaining the more common ...
    • Mixed-signal test band guarding using digitally coded indirect measurements 

      Gómez Pau, Álvaro; Balado Suárez, Luz María; Figueras Pàmies, Joan (Institute of Electrical and Electronics Engineers (IEEE), 2015)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      Testing analog and mixed-signal circuits is a costly task due to the required test time targets and high end technical resources. Indirect testing methods partially address these issues providing an efficient solution using ...
    • Monomial codes seen as invariant subspaces 

      García Planas, María Isabel; Magret Planas, Maria dels Dolors; Um, Laurence Emilie (2017)
      Article
      Accés obert
      It is well known that cyclic codes are very useful because of their applications, since they are not computationally expensive and encoding can be easily implemented. The relationship between cyclic codes and invariant ...
    • Multi-criteria decision making with linguistic labels: a comparison of two methodologies applied to energy planning 

      Afsordegan, Arayeh; Sánchez Soler, Monica; Agell Jané, Núria; Cremades Oliver, Lázaro Vicente; Zahedi, Siamak (2014)
      Text en actes de congrés
      Accés obert
      This paper compares two multi-criteria decision making (MCDM) approaches based on linguistic label assessment. The first approach consists of a modified fuzzy TOPSIS methodology introduced by Kaya and Kahraman in 2011. ...
    • NCMOB-MAC: a network coding-based MAC protocol with mobility support 

      Torres, Pol; Antonopoulos, Angelos; Alonso Zárate, Luis Gonzaga; Schulte, Gerrit (Institute of Electrical and Electronics Engineers (IEEE), 2014)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      In this paper, a novel Network Coding (NC)-aided Medium Access Control (MAC) protocol with mobility support (NCMOB-MAC) is presented. The proposed protocol is compatible with Automatic Repeat reQuest (ARQ) techniques ...
    • Notes on betweenness centrality of a graph 

      Gago Álvarez, Silvia; Hurajová, Jana; Madaras, Tomas (2009-05-19)
      Report de recerca
      Accés obert
      The betweenness centrality of a vertex of a graph is the portion of shortest paths between all pairs of vertices passing through that vertex. We study selected general properties of this invariant and its relations to ...
    • On fuzzy-qualitative descriptions and entropy 

      Prats Duaygues, Francesc; Roselló Saurí, Llorenç; Sánchez Soler, Monica; Agell Jané, Núria (2016-08-01)
      Article
      Accés obert
      This paper models the assessments of a group of experts when evaluating different magnitudes, features or objects by using linguistic descriptions. A new general representation of linguistic descriptions is provided by ...
    • On ratio and product methods with certain known population parameters of auxiliary variable in sample surveys 

      Singh, Housila. P.; Tailor, Ritesh; Tailor, Rajesh (Institut d'Estadística de Catalunya, 2010)
      Article
      Accés obert
      This paper proposes two ratio and product-type estimators using transformation based on known minimum and maximum values of auxiliary variable. The biases and mean squared errors of the suggested estimators are obtained ...
    • On the information ratio of non-perfect secret sharing schemes 

      Farràs Ventura, Oriol; Hansen, Torben; Kaced, Tarik; Padró Laimon, Carles (2017-12-01)
      Article
      Accés obert
      A secret sharing scheme is non-perfect if some subsets of players that cannot recover the secret value have partial information about it. The information ratio of a secret sharing scheme is the ratio between the maximum ...
    • On the optimization of bipartite secret sharing schemes 

      Farràs Ventura, Oriol; Metcalf-Burton, Jessica Ruth; Padró Laimon, Carles; Vázquez González, Leonor (2012-05-01)
      Article
      Accés obert
      Optimizing the ratio between the maximum length of the shares and the length of the secret value in secret sharing schemes for general access structures is an extremely difficult and long-standing open problem. In this ...
    • Optimal non-perfect uniform secret sharing schemes 

      Farràs Ventura, Oriol; Hansen, Torben; Kaced, Tarik; Padró Laimon, Carles (Springer, 2014)
      Text en actes de congrés
      Accés obert
      A secret sharing scheme is non-perfect if some subsets of participants that cannot recover the secret value have partial information about it. The information ratio of a secret sharing scheme is the ratio between the maximum ...
    • Parallelization of the interpolation process in the Koetter-Vardy soft-decision list decoding algorithm 

      Moreira Sánchez, José; Fernández Muñoz, Marcel; Soriano Ibáñez, Miguel (2012)
      Comunicació de congrés
      Accés obert
      List decoding is a decoding strategy that provides a set of codewords at the output of the channel decoder. Since this technique corrects errors beyond the correcting bound of the code, upper layers in the application or ...
    • Polar coding for confidential broadcasting 

      Olmo Alòs, Jaume del; Rodríguez Fonollosa, Javier (2020-01-27)
      Article
      Accés obert
      A polar coding scheme is proposed for the Wiretap Broadcast Channel with two legitimate receivers and one eavesdropper. We consider a model in which the transmitter wishes to send the same private (non-confidential) message ...