Recent Submissions

  • A novel dynamic programming inspired algorithm for embedding of virtual networks in future networks 

    Kibalya, Godfrey Mirondo; Serrat, Joan; Gorricho Moreno, Juan Luis; Yao, Haipeng; Zhang, Peiying (2020-06-06)
    Article
    Restricted access - publisher's policy
    Network virtualization is envisioned to support flexible, cost effective and on-demand deployment of multiple Virtual Networks (VNs) on a shared underlying infrastructure. A key challenge under the virtualization paradigm ...
  • Extent prediction of the information and influence propagation in online social networks 

    Ortiz Gaona, Raúl Marcelo; Postigo Boix, Marcos; Melus Moreno, José Luis (2020-03-27)
    Article
    Restricted access - publisher's policy
    We present a new mathematical model that predicts the number of users informed and influenced by messages that are propagated in an online social network. Our model is based on a new way of quantifying the tie-strength, ...
  • A LINDDUN-based framework for privacy threat analysis on identification and authentication processes 

    Robles González, Antonio; Parra Arnau, Javier; Forné Muñoz, Jorge (2020)
    Article
    Restricted access - publisher's policy
    Identification and authentication (IA) are security procedures that are ubiquitous in our online life, and that constantly require disclosing personal, sensitive information to non-fully trusted service providers, or to ...
  • IPv6 over LPWANs: connecting Low Power Wide Area Networks to the Internet (of Things) 

    Gómez Montenegro, Carlos; Minaburo, Ana; Toutain, Laurent; Barthel, Dominique; Zúñiga, Juan Carlos (2020-02-11)
    Article
    Open Access
    LPWANs have recently emerged as a promising solution for enabling industrial IoT applications. To fully exploit their potential, LPWANs need to be connected to the Internet. However, the severe capacity constraints of LPWAN ...
  • Network-aware Placement Optimization for Edge Computing infrastructure under 5G 

    Santoyo González, Alejandro; Cervelló Pastor, Cristina (Institute of Electrical and Electronics Engineers (IEEE), 2020-03-20)
    Article
    Open Access
    Edge Computing has grown into a key solution for coping with the stringent latency requirements of 5G scenarios. Nevertheless, the edge node placement problem raises critical concerns regarding deployment and operational ...
  • Risk-based decision-making for public key infrastructures using fuzzy logic 

    Hernández Gañán, Carlos; Muñoz Tapia, José Luis; Esparza Martín, Óscar; Mata Diaz, Jorge; Alins Delgado, Juan José (2012-11-01)
    Article
    Restricted access - publisher's policy
    Public key infrastructures (PKIs) are complex systems that are responsible for giving users enough information to make reasonable trust judgments about one another. The validation of public keys is hence of great importance. ...
  • QoSatAr: a cross-layer architecture for E2E QoS provisioning over DVB-S2 broadband satellite systems 

    Rendón Morales, Elizabeth; Mata Diaz, Jorge; Alins Delgado, Juan José; Muñoz Tapia, José Luis; Esparza Martín, Óscar (2012-10-01)
    Article
    Open Access
    This article presents QoSatAr, a cross-layer architecture developed to provide end-to-end quality of service (QoS) guarantees for Internet protocol (IP) traffic over the Digital Video Broadcasting-Second generation (DVB-S2) ...
  • DECADE: Distributed Emergent Cooperation through ADaptive Evolution in mobile ad hoc networks 

    Mejía Fajardo, Marcela; Peña Traslaviña, Néstor; Muñoz Tapia, José Luis; Esparza Martín, Óscar; Alzate Monroy, Marco (Elsevier, 2012-09)
    Article
    Restricted access - publisher's policy
    The scarce resources of a mobile ad hoc network (MANET) should not be wasted attending selfish nodes (those nodes that use resources from other nodes to send their own packets, without offering their own resources to forward ...
  • Design and implementation of a lightweight online certificate validation service 

    Muñoz Tapia, José Luis; Esparza Martín, Óscar; Forné Muñoz, Jorge; Pallarès Segarra, Esteve (2009-07)
    Article
    Restricted access - publisher's policy
    A PKI (public key infrastructure) provides for a digital certificate that can identify an individual or an organization. However, the existence of a certificate is a necessary but not sufficient evidence for its validity. ...
  • A review of trust modeling in ad hoc networks 

    Mejia, M; Peña, N; Muñoz Tapia, José Luis; Esparza Martín, Óscar (2009-01)
    Article
    Restricted access - publisher's policy
    Findings The study identifies the main components that a trust model must provide, and compares the way they are implemented. It finds that the lack of unity in the different proposed approaches makes it difficult to ...
  • An energy-efficient distributed dynamic bandwidth allocation algorithm for Passive Optical Access Networks 

    Khalili, Hamzeh; Rincón Rivera, David; Sallent Ribes, Sebastián; Piney da Silva, José Ramón (2020-03-13)
    Article
    Open Access
    The rapid deployment of passive optical access networks (PONs) increases the global energy consumption of networking infrastructure. This paper focuses on the minimization of energy consumption in Ethernet PONs (EPONs). ...
  • IEEE 802.11-Enabled Wake-Up Radio: use cases and applications 

    López Aguilera, M. Elena; Seyfettin Demirkol, Ilker; García Villegas, Eduard; Paradells Aspas, Josep (Multidisciplinary Digital Publishing Institute (MDPI), 2019-12-21)
    Article
    Open Access
    IEEE 802.11 is one of the most commonly used radio access technologies, being present in almost all handheld devices with networking capabilities. However, its energy-hungry communication modes are a challenge for the ...

View more