Now showing items 1-20 of 72

    • 5G and the Internet of everyone: motivation, enablers, and research agenda 

      Maccari, Leonardo; Karaliopoulos, Merkouris; Koutsopoulos, Iordanis; Navarro Moldes, Leandro; Freitag, Fèlix; Lo Cigno, Renato (Institute of Electrical and Electronics Engineers (IEEE), 2018)
      Conference report
      Open Access
      As mobile broadband subscriptions grow twice as fast as the fixed ones and the Internet of Things comes forth, the 5G vision of the Internet of Everything (people, devices, and things), becomes a substantial and credible ...
    • A GRASP-based algorithm for the optimised DIF allocation in the RINA network architecture 

      Keshavarz, Pegah (Universitat Politècnica de Catalunya, 2013-12-13)
      Master thesis
      Open Access
      [ANGLÈS] Reviewing the current internet and its problems and introducing the new architecture of internet RINA, and find a minimized cost route to allocate demands in the network by using the GRASP algorithm.
    • A privacy-preserving architecture for the semantic web based on tag suppression 

      Parra Arnau, Javier; Rebollo Monedero, David; Forné Muñoz, Jorge (Springer, 2010)
      Conference report
      Restricted access - publisher's policy
      We propose an architecture that preserves user privacy in the semantic Web via tag suppression. In tag suppression, users may wish to tag some resources and refrain from tagging some others in order to hinder privacy ...
    • A review of trust modeling in ad hoc networks 

      Mejia, M; Peña, N; Muñoz Tapia, José Luis; Esparza Martín, Óscar (2009-01)
      Article
      Restricted access - publisher's policy
      Findings The study identifies the main components that a trust model must provide, and compares the way they are implemented. It finds that the lack of unity in the different proposed approaches makes it difficult to ...
    • A survey and taxonomy of ID/Locator Split Architectures 

      Ramirez Almonte, Wilson; Masip Bruin, Xavier; Yannuzzi, Marcelo; Serral Gracià, René; Martínez Manzanilla, Anny Gabriela; Siddiqui, Muhammad Shuaib (2014-02-26)
      Article
      Restricted access - publisher's policy
      The IP-based addressing scheme currently supporting the whole routing architecture embeds some well-known limitations that may significantly hinder the deployment of new applications and services on the Internet. Indeed, ...
    • A user-centric mobility management scheme for high-density fog computing deployments 

      Rejiba, Zeineb; Masip Bruin, Xavier; Marín Tordera, Eva (2019)
      Conference report
      Open Access
      The inherent mobility characterizing users in fog computing environments along with the limited wireless range of their serving fog nodes (FNs) drives the need for designing efficient mobility management (MM) mechanisms. ...
    • A viewpoint of the network management paradigm for future Internet networks 

      Rubio Loyola, Javier; Serrat Fernández, Juan; Astorga Rivera, José Antonio; Fischer, Andreas; Berl, Andreas; de Meer, Hermann; Koumoutsos, Giannis (2009)
      Conference report
      Restricted access - publisher's policy
      This paper presents a viewpoint of the management for the Future Internet. For this description we consider the architectural model developed by the EU IST Autonomic Internet – AUTOI – consortium for the management ...
    • ACCHER Sistema de control de consumo de energías domésticas 

      Revilla Velarde, Luis (Universitat Politècnica de Catalunya, 2018-01)
      Bachelor thesis
      Restricted access - author's decision
      Covenantee:   Everis
      The name ACCHER comes from the abbreviations of the project's name (Automation of Consumption Control of Household Energy Resources). This project is carried out in collaboration with Everis (Company dedicated to consulting), ...
    • Analysis and practice of micro-services deployments technologies based on containers 

      López Pocino, Jesús (Universitat Politècnica de Catalunya, 2021-01)
      Bachelor thesis
      Open Access
      El objetivo de este proyecto es la investigación y práctica del despliegue de micro tecnologías basadas en contenedores desde el punto de vista de una organización en crecimiento que nunca antes había ...
    • Analyzing the deployment challenges of beacon stuffing as a discovery enabler in Fog-to-Cloud systems 

      Rejiba, Zeineb; Masip Bruin, Xavier; Marín Tordera, Eva (Institute of Electrical and Electronics Engineers (IEEE), 2018)
      Conference lecture
      Restricted access - publisher's policy
      In order to meet the needs of emerging IoT applications having tight QoS constraints, new computing paradigms have been proposed, bringing computation resources closer to the edge of the network, where IoT resides. One of ...
    • Arquitectura en la Red 

      Oliveras Samitier, Jordi (2012-05-17)
      Audiovisual
      Open Access
    • Cellular internet service: advanced front-end for FDSS 

      Pérez Neira, Ana Isabel; Lagunas Hernandez, Miguel A. (1999)
      Conference report
      Open Access
    • Centrality metrics and line-graph to measure the importance of links in online social networks 

      Ortiz Gaona, Raúl; Postigo Boix, Marcos; Melus Moreno, José Luis (2016-12)
      Article
      Open Access
      Importance of nodes and tie strength are necessary elements to characterize and analyze networks, as well as to study the processes that occur in their interior. We believe that it is also necessary to know the importance ...
    • Collaborative informed gateway selection in large-scale and heterogeneous 

      Batbayar, Khulan; Dimogerontakis, Emmanouil; Meseguer Pallarès, Roc; Navarro Moldes, Leandro; Sadre, Ramin (Institute of Electrical and Electronics Engineers (IEEE), 2019)
      Conference report
      Restricted access - publisher's policy
      In wireless community access networks, clients tend to reach the Internet through multiple gateway nodes instead of a single default gateway. The mapping of gateways to clients should take into account the perception of ...
    • Comparison of flow classication methods for Load Balancing 

      Viñas, Marc (Universitat Politècnica de Catalunya, 2020-01-07)
      Bachelor thesis
      Open Access
      Covenantee:   Kungliga Tekniska högskolan
      Load Balancers with different stateful methods have been implemented in a multi-core environment and compared with a stateless implementation. Furthermore, a state-of-the-art method for managing flow tables has been studied ...
    • Comparison of flow tables algorithms for stateful load balancers 

      Fernandez-Rajal Sabala, Anna (Universitat Politècnica de Catalunya, 2021-01)
      Bachelor thesis
      Open Access
      Load balancers enable a high number of parallel requests to a web application by distributing the requests to multiple backend servers. Stateful load balancers keep track of the selected server for a request in the flow ...
    • Computation task assignment in vehicular fog computing: a learning approach via neighbor advice 

      Rejiba, Zeineb; Masip Bruin, Xavier; Marín Tordera, Eva (Institute of Electrical and Electronics Engineers (IEEE), 2019)
      Conference report
      Restricted access - publisher's policy
      In the recent years, fog computing has been proposed as a promising paradigm to enhance the performance of latency-critical applications by hosting them within idle computation nodes (Fog Nodes, FNs) at the edge of the ...
    • Computer sound card provides simple Internet-based appliance remote control 

      Miguel López, José María (2016-03-03)
      Article
      Open Access
      Using a standard PC-Sounnd card and straightforward circuit,you can implement low cost on/off control of home appliances.
    • Contributions to efficient resource management in virtual networks 

      Mijumbi, Rashid; Gorricho Moreno, Juan Luis; Serrat Fernández, Juan (2014-06-30)
      Article
      Restricted access - publisher's policy
      Network virtualisation is a promising technique for a better future Internet by allowing for network resource sharing. However, resource sharing requires that virtual nodes and links be embedded onto substrate nodes and ...
    • Definición de una metodología Red Team de evaluación de la seguridad en una corporación 

      Valiente Catalán, Mario (Universitat Politècnica de Catalunya, 2020-06)
      Bachelor thesis
      Restricted access - confidentiality agreement