Now showing items 1-20 of 45

  • Absolute order-of-magnitude reasoning applied to a social multi-criteria evaluation framework 

    Afsordegan, Arayeh; Sánchez Soler, Monica; Agell Jané, Núria; Aguado Chao, Juan Carlos; Gamboa Jimenez, Gonzalo (2016-01)
    Article
    Open Access
    A social multi-criteria evaluation framework for solving a real-case problem of selecting a wind farm location in the regions of Urgell and Conca de Barberá in Catalonia (northeast of Spain) is studied. This paper applies ...
  • A consensus degree for hesitant fuzzy linguistic decision making 

    Montserrat Adell, Jordi; Agell Jané, Núria; Sánchez Soler, Monica; Ruiz Vegas, Francisco Javier (Institute of Electrical and Electronics Engineers (IEEE), 2017)
    Conference lecture
    Restricted access - publisher's policy
    This paper proposes a measure of consensus for group decision making in the hesitant fuzzy linguistic term sets framework. An extension of the set of hesitant fuzzy linguistic term sets is considered to capture differences ...
  • Adaptive beamforming with temporal and spatial references in satellite communications 

    Fernández Rubio, Juan Antonio (1990)
    Conference report
    Open Access
  • A framework for joint design of pilot sequence and linear precoder 

    Pastore, Adriano; Joham, Michael; Rodríguez Fonollosa, Javier (2016-09-01)
    Article
    Open Access
    Most performance measures of pilot-assisted multiple-input multiple-output systems are functions of the linear precoder and the pilot sequence. A framework for the optimization of these two parameters is proposed, based ...
  • Almost IPP-codes or provably secure digital fingerprinting codes 

    Fernández Muñoz, Marcel; Kabatiansky, Grigory; Moreira Sánchez, José (Institute of Electrical and Electronics Engineers (IEEE), 2015)
    Conference report
    Restricted access - publisher's policy
    Codes with the Identifiable Parent Property (IPP codes) form a very useful tool in traitor tracing schemes since they guarantee (with probability 1) identification of at least one of the traitors. We consider a natural ...
  • Almost separating and almost secure frameproof codes 

    Fernández Muñoz, Marcel; Kabatiansky, Grigory; Moreira Sánchez, José (2011)
    Conference report
    Restricted access - publisher's policy
    The theory of separating codes has been applied in several areas of science ranging from automata synthesis to the protection of distribution rights. In this paper, we introduce a relaxed version of separating and secure ...
  • A measure of perceived performance to assess resource allocation 

    Sayeras, Josep M.; Agell, Nuria; Rovira Llobera, Xari; Sánchez Soler, Monica; Dawson, John A. (Springer, 2016-08-01)
    Article
    Open Access
    Performance measurement is a key issue when a company is designing new strategies to improve resource allocation. This paper offers a new methodology inspired by classic importance-performance analysis (IPA) that provides ...
  • Anonymous threshold signatures 

    Hlad Colic, Petar (Universitat Politècnica de Catalunya, 2018-07)
    Master thesis
    Open Access
    Aquest treball tenia l'objectiu de trobar un esquema de llindar de signatura an\`onima compacte. Tot i no haver-ne trobat cap, s'analitzen diverses solucions que s'acosten a l'objectiu publicades per altres autors i es ...
  • Assessing the direction of climate interactions by means of complex networks and information theoretic tools 

    Deza, Juan Ignacio; Barreiro, Marcelo; Masoller Alonso, Cristina (Institute of Physics (IOP), 2015-03-01)
    Article
    Open Access
    An estimate of the net direction of climate interactions in different geographical regions is made by constructing a directed climate network from a regular latitude-longitude grid of nodes, using a directionality index ...
  • A tool for the design of public transportation services 

    Codina Sancho, Esteve; Marín, Ángel; Montero Mercadé, Lídia (2012)
    Conference report
    Open Access
    In this paper a model is described in order to determine the number of lines of a public transportation service, the layout of their lines amongst a set of candidates, their service capacity, and the resulting assignment ...
  • Búsqueda activa y recepción pasiva de información sobre ciencia y tecnología 

    Revuelta, Gemma; Corchero García, Cristina (Fundación Española para la Ciencia y la Tecnología, FECYT, 2011, 2011-12)
    Part of book or chapter of book
    Open Access
    Nos encontramos en una sociedad que tiene como motor un cambio tecnológico que permite comunicarse mucho más rápido y mucho más lejos que nunca antes en la historia, pero los cambios tecnológicos son a su vez consecuencia ...
  • Characterizing approximate-matching dependencies in formal concept analysis with pattern structures 

    Baixeries i Juvillà, Jaume; Codocedo, Victor; Kaytoue, Mehdi; Napoli, Amedeo (2018-04-26)
    Article
    Open Access
    Functional dependencies (FDs) provide valuable knowledge on the relations between attributes of a data table. A functional dependency holds when the values of an attribute can be determined by another. It has been shown ...
  • Constant size ciphertexts in threshold attribute-based encryption 

    Herranz Sotoca, Javier; Laguillaumie, Fabien; Ràfols Salvador, Carla (Springer Verlag, 2010)
    Conference report
    Open Access
    Attribute-based cryptography has emerged in the last years as a promising primitive for digital security. For instance, it provides good solutions to the problem of anonymous access control. In a ciphertextpolicy attribute-based ...
  • Coprivacy: an introduction to the theory and applications of co-operative privacy 

    Domingo-Ferrer, Josep (Institut d'Estadística de Catalunya, 2011)
    Article
    Open Access
    We introduce the novel concept of coprivacy or co-operative privacy to make privacy preservation attractive. A protocol is coprivate if the best option for a player to preserve her privacy is to help another player in ...
  • Development and evaluation of a semi-automatic anonymization tool for textual data 

    Brull Corretger, Hèlia (Universitat Politècnica de Catalunya, 2019-07-10)
    Bachelor thesis
    Open Access
    Despite its undeniable advantages, the exponential growth of data analytic capabilities implies a significant increase in the risk of personal privacy loss and re-identification of the individuals appearing in databases. ...
  • Dynamic m-class angle compression for cursor control in 2D using brain interfaces 

    Garau Burguera, Pere (Universitat Politècnica de Catalunya, 2017-10-16)
    Bachelor thesis
    Open Access
    The purpose of this project is to present an environment where a cursor can be controlled on a 2D screen by using a brain computer interface (BCI). For this purpose, and by using a probability model that determines which ...
  • Extending Brickell-Davenport theorem to non-perfect secret sharing schemes 

    Farràs Ventura, Oriol; Padró Laimon, Carles (2015-02)
    Article
    Open Access
    One important result in secret sharing is the Brickell-Davenport Theorem: every ideal perfect secret sharing scheme de nes a matroid that is uniquely determined by the access structure. Even though a few attempts have been ...
  • Fluid flow queue models for fixed-mobile network evaluation 

    Bernal Escribano, Álvaro (Universitat Politècnica de Catalunya, 2019-07)
    Master thesis
    Open Access
    A methodology for fast and accurate end-to-end KPI, like throughput and delay, estimation is proposed based on the service-centric traffic flow analysis and the fluid flow queuing model named CURSA-SQ. Mobile network ...
  • From qualitative absolute order-of-magnitude to the extended set of Hesitant Fuzzy Linguistic Term Sets 

    Montserrat Adell, Jordi; Sánchez Soler, Monica; Ruiz Vegas, Francisco Javier; Agell Jané, Núria (2016)
    Conference report
    Restricted access - publisher's policy
    Hesitant fuzzy linguistic term sets were introduced to grasp the uncertainty existing in human reasoning. In this paper, inspired by absolute order-of-magnitude qualitative reasoning techniques, an extension of the set ...
  • From t-closeness-like privacy to postrandomization via information theory 

    Rebollo Monedero, David; Forné Muñoz, Jorge; Domingo Ferrer, Josep (2010)
    Article
    Restricted access - publisher's policy
    t-Closeness is a privacy model recently defined for data anonymization. A data set is said to satisfy t-closeness if, for each group of records sharing a combination of key attributes, the distance between the distribution ...