Browsing by Subject "Informació, Teoria de la"
Now showing items 1-20 of 54
-
A consensus degree for hesitant fuzzy linguistic decision making
(Institute of Electrical and Electronics Engineers (IEEE), 2017)
Conference lecture
Restricted access - publisher's policyThis paper proposes a measure of consensus for group decision making in the hesitant fuzzy linguistic term sets framework. An extension of the set of hesitant fuzzy linguistic term sets is considered to capture differences ... -
A framework for joint design of pilot sequence and linear precoder
(2016-09-01)
Article
Open AccessMost performance measures of pilot-assisted multiple-input multiple-output systems are functions of the linear precoder and the pilot sequence. A framework for the optimization of these two parameters is proposed, based ... -
A measure of perceived performance to assess resource allocation
(Springer, 2016-08-01)
Article
Open AccessPerformance measurement is a key issue when a company is designing new strategies to improve resource allocation. This paper offers a new methodology inspired by classic importance-performance analysis (IPA) that provides ... -
A tool for the design of public transportation services
(2012)
Conference report
Open AccessIn this paper a model is described in order to determine the number of lines of a public transportation service, the layout of their lines amongst a set of candidates, their service capacity, and the resulting assignment ... -
Absolute order-of-magnitude reasoning applied to a social multi-criteria evaluation framework
(2016-01)
Article
Open AccessA social multi-criteria evaluation framework for solving a real-case problem of selecting a wind farm location in the regions of Urgell and Conca de Barberá in Catalonia (northeast of Spain) is studied. This paper applies ... -
Adaptive beamforming with temporal and spatial references in satellite communications
(1990)
Conference report
Open Access -
Almost IPP-codes or provably secure digital fingerprinting codes
(Institute of Electrical and Electronics Engineers (IEEE), 2015)
Conference report
Restricted access - publisher's policyCodes with the Identifiable Parent Property (IPP codes) form a very useful tool in traitor tracing schemes since they guarantee (with probability 1) identification of at least one of the traitors. We consider a natural ... -
Almost separating and almost secure frameproof codes
(2011)
Conference report
Restricted access - publisher's policyThe theory of separating codes has been applied in several areas of science ranging from automata synthesis to the protection of distribution rights. In this paper, we introduce a relaxed version of separating and secure ... -
Anonymous threshold signatures
(Universitat Politècnica de Catalunya, 2018-07)
Master thesis
Open AccessAquest treball tenia l'objectiu de trobar un esquema de llindar de signatura an\`onima compacte. Tot i no haver-ne trobat cap, s'analitzen diverses solucions que s'acosten a l'objectiu publicades per altres autors i es ... -
Assessing the direction of climate interactions by means of complex networks and information theoretic tools
(Institute of Physics (IOP), 2015-03-01)
Article
Open AccessAn estimate of the net direction of climate interactions in different geographical regions is made by constructing a directed climate network from a regular latitude-longitude grid of nodes, using a directionality index ... -
Búsqueda activa y recepción pasiva de información sobre ciencia y tecnología
(Fundación Española para la Ciencia y la Tecnología, FECYT, 2011, 2011-12)
Part of book or chapter of book
Open AccessNos encontramos en una sociedad que tiene como motor un cambio tecnológico que permite comunicarse mucho más rápido y mucho más lejos que nunca antes en la historia, pero los cambios tecnológicos son a su vez consecuencia ... -
Characterizing approximate-matching dependencies in formal concept analysis with pattern structures
(2018-04-26)
Article
Open AccessFunctional dependencies (FDs) provide valuable knowledge on the relations between attributes of a data table. A functional dependency holds when the values of an attribute can be determined by another. It has been shown ... -
Constant size ciphertexts in threshold attribute-based encryption
(Springer Verlag, 2010)
Conference report
Open AccessAttribute-based cryptography has emerged in the last years as a promising primitive for digital security. For instance, it provides good solutions to the problem of anonymous access control. In a ciphertextpolicy attribute-based ... -
Coprivacy: an introduction to the theory and applications of co-operative privacy
(Institut d'Estadística de Catalunya, 2011)
Article
Open AccessWe introduce the novel concept of coprivacy or co-operative privacy to make privacy preservation attractive. A protocol is coprivate if the best option for a player to preserve her privacy is to help another player in ... -
Development and evaluation of a semi-automatic anonymization tool for textual data
(Universitat Politècnica de Catalunya, 2019-07-10)
Bachelor thesis
Open AccessDespite its undeniable advantages, the exponential growth of data analytic capabilities implies a significant increase in the risk of personal privacy loss and re-identification of the individuals appearing in databases. ... -
Dynamic m-class angle compression for cursor control in 2D using brain interfaces
(Universitat Politècnica de Catalunya, 2017-10-16)
Bachelor thesis
Open AccessThe purpose of this project is to present an environment where a cursor can be controlled on a 2D screen by using a brain computer interface (BCI). For this purpose, and by using a probability model that determines which ... -
Extending Brickell-Davenport theorem to non-perfect secret sharing schemes
(2015-02)
Article
Open AccessOne important result in secret sharing is the Brickell-Davenport Theorem: every ideal perfect secret sharing scheme de nes a matroid that is uniquely determined by the access structure. Even though a few attempts have been ... -
Fluid flow queue models for fixed-mobile network evaluation
(Universitat Politècnica de Catalunya, 2019-07)
Master thesis
Open AccessA methodology for fast and accurate end-to-end KPI, like throughput and delay, estimation is proposed based on the service-centric traffic flow analysis and the fluid flow queuing model named CURSA-SQ. Mobile network ... -
From qualitative absolute order-of-magnitude to the extended set of Hesitant Fuzzy Linguistic Term Sets
(2016)
Conference report
Restricted access - publisher's policyHesitant fuzzy linguistic term sets were introduced to grasp the uncertainty existing in human reasoning. In this paper, inspired by absolute order-of-magnitude qualitative reasoning techniques, an extension of the set ... -
From t-closeness-like privacy to postrandomization via information theory
(2010)
Article
Restricted access - publisher's policyt-Closeness is a privacy model recently defined for data anonymization. A data set is said to satisfy t-closeness if, for each group of records sharing a combination of key attributes, the distance between the distribution ...