Articles de revista
Recent Submissions
-
Optimized provisioning technique of future services with different QoS requirements in multi-access edge computing
(Elsevier, 2024-08)
Article
Open AccessWith the present trend towards the use of microservices instead of monolithic software, future applications with diverse computational and delay-sensitive requirements, such as virtual reality (VR) or holographic communications ... -
Enhancing satellite non-terrestrial networks through advanced constellation management: optimizing in-orbit resources for NB-IoT
(Institute of Electrical and Electronics Engineers (IEEE), 2024-04-02)
Article
Open AccessThis paper presents a novel autonomous management system for satellite-based Non-Terrestrial Networks (NTN). It addresses the challenges of managing the operations of Low Earth Orbit (LEO) constellations for the Internet ... -
m-Eligibility with minimum counterfeits and deletions for privacy protection in continuous data publishing
(2024-01-15)
Article
Open AccessContinuous data publishing consists in the republication of updating microdata. The most relevant syntactic notions in continuous data publishing are based on m-invariance. This notion enforces that no user can be distinguished ... -
A taxonomy of syntactic privacy notions for continuous data publishing
(Institute of Electrical and Electronics Engineers (IEEE), 2024)
Article
Open AccessContinuous data publishing aims to anonymise the next publication of changing microdata while preserving privacy. The microdata can change between publications via additions, deletions, insertions, and updates. There are ... -
An artificial intelligence strategy for the deployment of future microservice-based applications in 6G networks
(Springer, 2024-03-28)
Article
Open AccessFuture applications to be supported by 6G networks are envisaged to be realized by loosely-coupled and independent microservices. In order to achieve an optimal deployment of applications, smart resource management strategies ... -
Can we run our Ethereum nodes at home?
(Institute of Electrical and Electronics Engineers (IEEE), 2024)
Article
Open AccessScalability is a common issue among the most used permissionless blockchains, and several approaches have been proposed to solve it. However, tackling scalability while preserving the security and decentralization of the ... -
Deployment of future services in a multi-access edge computing environment using intelligence at the edge
(2023-08)
Article
Open AccessThe transition to beyond fifth generation (B5G) and sixth generation (6G) networks will lead to the support of new and future services, like virtual reality, vehicle colli-sion avoidance or Internet-of-Things applications, ... -
Evaluation of TCP congestion control algorithms with traffic control policies in a PEP-based geosynchronous satellite scenario
(Elsevier, 2024-02-01)
Article
Open AccessMuch work has been done in recent years comparing TCP variants in many scenarios, including the satellite one. Some of these studies were carried out with the ns-2 and ns-3 simulators, which may give a good idea of the ... -
A distance-weighted dynamic bandwidth allocation algorithm for improved performance in long-reach passive optical networks for next generation networks
(2023-08-11)
Article
Open AccessIn recent years, there has been an increasing trend towards extending the coverage of passive optical networks (PONs) over large geographical areas. Long-reach PONs (LRPONs) are capable of extending the distance covered ... -
Privacy-centered authentication: a new framework and analysis
(2023-09)
Article
Open AccessThe usage of authentication schemes is increasing in our daily life with the ubiquitous spreading Internet services. The verification of user’s identity is still predominantly password-based, despite of being susceptible ... -
SoK: differentially private publication of trajectory data
(2023-04)
Article
Open AccessTrajectory analysis holds many promises, from improvements in traffic management to routing advice or infrastructure development. However, learning users’ paths is extremely privacy-invasive. Therefore, there is a necessity ... -
An adversarial-risk-analysis approach to counterterrorist online surveillance
(Multidisciplinary Digital Publishing Institute (MDPI), 2019-01-24)
Article
Open AccessThe Internet, with the rise of the IoT, is one of the most powerful means of propagating a terrorist threat, and at the same time the perfect environment for deploying ubiquitous online surveillance systems.This paper ...