Ara es mostren els items 1-12 de 97

    • A taxonomy of syntactic privacy notions for continuous data publishing 

      Tobar Nicolau, Adrián; Parra Arnau, Javier; Forné Muñoz, Jorge (Institute of Electrical and Electronics Engineers (IEEE), 2024)
      Article
      Accés obert
      Continuous data publishing aims to anonymise the next publication of changing microdata while preserving privacy. The microdata can change between publications via additions, deletions, insertions, and updates. There are ...
    • An artificial intelligence strategy for the deployment of future microservice-based applications in 6G networks 

      Ssemakula, John Bosco; Gorricho Moreno, Juan Luis; Kibalya, Godfrey Mirondo; Serrat Fernández, Juan (Springer, 2024-03-28)
      Article
      Accés restringit per política de l'editorial
      Future applications to be supported by 6G networks are envisaged to be realized by loosely-coupled and independent microservices. In order to achieve an optimal deployment of applications, smart resource management strategies ...
    • Can we run our Ethereum nodes at home? 

      Cortes Goicoechea, Mikel; Mohandas Daryanani, Tarun; Muñoz Tapia, José Luis; Bautista Gómez, Leonardo (Institute of Electrical and Electronics Engineers (IEEE), 2024)
      Article
      Accés obert
      Scalability is a common issue among the most used permissionless blockchains, and several approaches have been proposed to solve it. However, tackling scalability while preserving the security and decentralization of the ...
    • Deployment of future services in a multi-access edge computing environment using intelligence at the edge 

      Ssemakula, John Bosco; Gorricho Moreno, Juan Luis; Kibalya, Godfrey Mirondo; Serrat Fernández, Juan (2023-08)
      Article
      Accés obert
      The transition to beyond fifth generation (B5G) and sixth generation (6G) networks will lead to the support of new and future services, like virtual reality, vehicle colli-sion avoidance or Internet-of-Things applications, ...
    • Evaluation of TCP congestion control algorithms with traffic control policies in a PEP-based geosynchronous satellite scenario 

      Ramos López, Daniel; Esparza Martín, Óscar; Mata Diaz, Jorge; Alins Delgado, Juan José (Elsevier, 2024-02-01)
      Article
      Accés obert
      Much work has been done in recent years comparing TCP variants in many scenarios, including the satellite one. Some of these studies were carried out with the ns-2 and ns-3 simulators, which may give a good idea of the ...
    • A distance-weighted dynamic bandwidth allocation algorithm for improved performance in long-reach passive optical networks for next generation networks 

      Haastrup, Adebanjo; Zehri, Mohammad Habib; Rincón Rivera, David; Piney da Silva, José Ramón; Bazzi, Ali (2023-08-11)
      Article
      Accés obert
      In recent years, there has been an increasing trend towards extending the coverage of passive optical networks (PONs) over large geographical areas. Long-reach PONs (LRPONs) are capable of extending the distance covered ...
    • Privacy-centered authentication: a new framework and analysis 

      Robles González, Antonio; Arias Cabarcos, Patricia; Parra Arnau, Javier (2023-09)
      Article
      Accés obert
      The usage of authentication schemes is increasing in our daily life with the ubiquitous spreading Internet services. The verification of user’s identity is still predominantly password-based, despite of being susceptible ...
    • SoK: differentially private publication of trajectory data 

      Miranda Pascual, Àlex; Guerra Balboa, Patricia; Parra Arnau, Javier; Forné Muñoz, Jorge; Strufe, Thorsten (2023-04)
      Article
      Accés obert
      Trajectory analysis holds many promises, from improvements in traffic management to routing advice or infrastructure development. However, learning users’ paths is extremely privacy-invasive. Therefore, there is a necessity ...
    • An adversarial-risk-analysis approach to counterterrorist online surveillance 

      Gil Espinasa, César; Parra Arnau, Javier (Multidisciplinary Digital Publishing Institute (MDPI), 2019-01-24)
      Article
      Accés obert
      The Internet, with the rise of the IoT, is one of the most powerful means of propagating a terrorist threat, and at the same time the perfect environment for deploying ubiquitous online surveillance systems.This paper ...
    • Energy consumption model of SCHC packet fragmentation over Sigfox LPWAN 

      Aguilar Romero, Sergio; Platis, Antonio; Vidal Ferré, Rafael; Gómez Montenegro, Carlos (Multidisciplinary Digital Publishing Institute (MDPI), 2022-03-09)
      Article
      Accés obert
      The Internet Engineering Task Force (IETF) has standardized a new framework, called Static Context Header Compression and fragmentation (SCHC), which offers adaptation layer functionality designed to support IPv6 over Low ...
    • Stochastic simulation of successive waves of COVID-19 in the province of Barcelona 

      Bosman, Martine; Esteve Palos, Albert; Gabbanelli, Luciano; Jordán Parra, Javier; López Gay, Antonio; Manera, Marc; Martínez Rodríguez, Manel; Masjuan Queralt, Pere; Mir Martínez, Lluïsa Maria; Paradells Aspas, Josep; Pignatelli, Alessio; Riu, Imma; Vitagliano, Vincenzo (2023-03)
      Article
      Accés obert
      Analytic compartmental models are currently used in mathematical epidemiology to forecast the COVID-19 pandemic evolution and explore the impact of mitigation strategies. In general, such models treat the population as a ...
    • Deep learning and 5G and beyond for child drowning prevention in swimming pools 

      Cepeda Pacheco, Juan Carlos; Domingo Aladrén, Mari Carmen (2022-10-10)
      Article
      Accés obert
      Drowning is a major health issue worldwide. The World Health Organization’s global report on drowning states that the highest rates of drowning deaths occur among children aged 1–4 years, followed by children aged 5–9 ...