Browsing by Subject "Information theory"
Now showing items 1-20 of 78
-
A consensus degree for hesitant fuzzy linguistic decision making
(Institute of Electrical and Electronics Engineers (IEEE), 2017)
Conference lecture
Restricted access - publisher's policyThis paper proposes a measure of consensus for group decision making in the hesitant fuzzy linguistic term sets framework. An extension of the set of hesitant fuzzy linguistic term sets is considered to capture differences ... -
A framework for joint design of pilot sequence and linear precoder
(2016-09-01)
Article
Open AccessMost performance measures of pilot-assisted multiple-input multiple-output systems are functions of the linear precoder and the pilot sequence. A framework for the optimization of these two parameters is proposed, based ... -
A measure of perceived performance to assess resource allocation
(Springer, 2016-08-01)
Article
Open AccessPerformance measurement is a key issue when a company is designing new strategies to improve resource allocation. This paper offers a new methodology inspired by classic importance-performance analysis (IPA) that provides ... -
A tool for the design of public transportation services
(2012)
Conference report
Open AccessIn this paper a model is described in order to determine the number of lines of a public transportation service, the layout of their lines amongst a set of candidates, their service capacity, and the resulting assignment ... -
Absolute order-of-magnitude reasoning applied to a social multi-criteria evaluation framework
(2016-01)
Article
Open AccessA social multi-criteria evaluation framework for solving a real-case problem of selecting a wind farm location in the regions of Urgell and Conca de Barberá in Catalonia (northeast of Spain) is studied. This paper applies ... -
Acoustic sequences in non-human animals: a tutorial review and prospectus
(2016-02)
Article
Open AccessAnimal acoustic communication often takes the form of complex sequences, made up of multiple distinct acoustic units. Apart from the well-known example of birdsong, other animals such as insects, amphibians, and mammals ... -
Adaptive beamforming with temporal and spatial references in satellite communications
(1990)
Conference report
Open Access -
Almost IPP-codes or provably secure digital fingerprinting codes
(Institute of Electrical and Electronics Engineers (IEEE), 2015)
Conference report
Restricted access - publisher's policyCodes with the Identifiable Parent Property (IPP codes) form a very useful tool in traitor tracing schemes since they guarantee (with probability 1) identification of at least one of the traitors. We consider a natural ... -
Almost separating and almost secure frameproof codes
(2011)
Conference report
Restricted access - publisher's policyThe theory of separating codes has been applied in several areas of science ranging from automata synthesis to the protection of distribution rights. In this paper, we introduce a relaxed version of separating and secure ... -
Anonymous threshold signatures
(Universitat Politècnica de Catalunya, 2018-07)
Master thesis
Open AccessAquest treball tenia l'objectiu de trobar un esquema de llindar de signatura an\`onima compacte. Tot i no haver-ne trobat cap, s'analitzen diverses solucions que s'acosten a l'objectiu publicades per altres autors i es ... -
Assessing the direction of climate interactions by means of complex networks and information theoretic tools
(Institute of Physics (IOP), 2015-03-01)
Article
Open AccessAn estimate of the net direction of climate interactions in different geographical regions is made by constructing a directed climate network from a regular latitude-longitude grid of nodes, using a directionality index ... -
Asymptotic equivalence between the unconditional maximum likelihood and the square-law nonlinearity symbol timing estimation
(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2006-01-31)
Article
Open AccessThis paper provides a systematic approach to the problem of nondata aided symbol-timing estimation for linear modulations. The study is performed under the unconditional maximum likelihood framework where the ... -
Automatic view selection using viewpoint entropy and its application to image-based modelling
(North Holland, 2003)
Article
Restricted access - publisher's policyIn the last decade a new family of methods, namely Image-Based Rendering, has appeared. These techniques rely on the use of precomputed images to totally or partially substitute the geometric representation of the scene. ... -
Bandwidth reduction for remote navigation systems through view prediction and progressive transmission
(Elsevier Science Direct, 2004)
Article
Restricted access - publisher's policyRemote navigation systems, such as exploration of virtual 3D worlds or remote surgery, usually require higher bandwidth than the Internet connection commonly available at home. In this paper,we explore a set of techniques ... -
Búsqueda activa y recepción pasiva de información sobre ciencia y tecnología
(Fundación Española para la Ciencia y la Tecnología, FECYT, 2011, 2011-12)
Part of book or chapter of book
Open AccessNos encontramos en una sociedad que tiene como motor un cambio tecnológico que permite comunicarse mucho más rápido y mucho más lejos que nunca antes en la historia, pero los cambios tecnológicos son a su vez consecuencia ... -
Characterizing ordering in liquids: An information theoretic approach
(2015-01-01)
Article
Open AccessThe determination of special molecular arrangements in disordered phases such as liquids is inherently difficult due to its lack of periodicity, in contrast to the crystalline solids. We have already settled a general ... -
Classifier selection with permutation tests
(IOS Press, 2017)
Conference report
Open AccessThis work presents a content-based recommender system for machine learning classifier algorithms. Given a new data set, a recommendation of what classifier is likely to perform best is made based on classifier performance ... -
Comparison of the Achievable Rates in OFDM and Single Carrier modulations with I.I.D. Inputs
(Universitat Politècnica de Catalunya, 2016-02-06)
Master thesis (pre-Bologna period)
Open AccessStudy based on the original article of the same name. Within concave / convex function of mutual information is studied, in order to apply the results on two different digital modulation techniques (Single-Carrier and ... -
Constant size ciphertexts in threshold attribute-based encryption
(Springer Verlag, 2010)
Conference report
Open AccessAttribute-based cryptography has emerged in the last years as a promising primitive for digital security. For instance, it provides good solutions to the problem of anonymous access control. In a ciphertextpolicy attribute-based ... -
Coprivacy: an introduction to the theory and applications of co-operative privacy
(Institut d'Estadística de Catalunya, 2011)
Article
Open AccessWe introduce the novel concept of coprivacy or co-operative privacy to make privacy preservation attractive. A protocol is coprivate if the best option for a player to preserve her privacy is to help another player in ...