Articles de revista
Recent Submissions
-
A distance-weighted dynamic bandwidth allocation algorithm for improved performance in long-reach passive optical networks for next generation networks
(2023-08-11)
Article
Open AccessIn recent years, there has been an increasing trend towards extending the coverage of passive optical networks (PONs) over large geographical areas. Long-reach PONs (LRPONs) are capable of extending the distance covered ... -
Design and validation of a dual-band circular polarization patch antenna and stripline combiner for the FSSCat mission
(2023-07)
Article
Open AccessThe FMPL-2 payload on board the 3Cat-5/A 6 Unit CubeSat, part of the FSSCat CubeSat mission, includes a dual L-Band Microwave Radiometer and a Global Navigation Satellite System Reflectometer, in one instrument, implemented ... -
A machine learning based Distributed Congestion Control Protocol for multi-hop wireless networks
(2023-07-01)
Article
Open AccessThe application areas of multi-hop wireless networks are expected to experience sustained growth in the next years. This growth will be further supported by the current possibility of providing low-cost communication ... -
Machine learning requirements for energy-efficient virtual network embedding
(2023-05-31)
Article
Open AccessNetwork virtualization is a technology proven to be a key enabling a family of strategies in different targets, such as energy efficiency, economic revenue, network usage, adaptability or failure protection. Network ... -
Deep learning TCP for mitigating NLoS impairments in 5G mmWave
(2023-08-01)
Article
Open Access5G and beyond 5G are revolutionizing cellular and ubiquitous networks with new features and capabilities. The new millimeter-wave frequency band can provide high data rates for the new generations of mobile networks but ... -
IPv6 over cross-technology communication with wake-up radio
(Elsevier, 2023-07)
Article
Open AccessA variety of wireless (and wired) technologies are being used to enable Internet of Things (IoT) device connectivity. Two examples of popular technologies in some crucial IoT domains (e.g., smart home, smart factories and ... -
Privacy-centered authentication: a new framework and analysis
(2023-09)
Article
Open AccessThe usage of authentication schemes is increasing in our daily life with the ubiquitous spreading Internet services. The verification of user’s identity is still predominantly password-based, despite of being susceptible ... -
Prototipos para el telecontrol de una red de energía eléctrica
(1985-06)
Article
Open AccessSe describe en este artículo el funcionamiento y la realización de unos prototipos para el telecontrol de una red de energía eléctrica. Para ello, se dan las especificaciones del sistema y se desglosa éste en bloques ... -
SoK: differentially private publication of trajectory data
(2023-04)
Article
Open AccessTrajectory analysis holds many promises, from improvements in traffic management to routing advice or infrastructure development. However, learning users’ paths is extremely privacy-invasive. Therefore, there is a necessity ... -
Fine-grained control over tracking to support the ad-based web economy
(2018-09-30)
Article
Open AccessThe intrusiveness of Web tracking and the increasing invasiveness of digital advertising have raised serious concerns regarding user privacy and Web usability, leading a substantial chunk of the populace to adopt ad-blocking ... -
MyAdChoices: bringing transparency and control to online advertising
(2017-03)
Article
Open AccessThe intrusiveness and the increasing invasiveness of online advertising have, in the last few years, raised serious concerns regarding user privacy and Web usability. As a reaction to these concerns, we have witnessed the ... -
Genetic algorithm-based grouping strategy for IEEE 802.11ah networks
(Multidisciplinary Digital Publishing Institute (MDPI), 2023-01-12)
Article
Open AccessThe IEEE 802.11ah standard is intended to adapt the specifications of IEEE 802.11 to the Internet of Things (IoT) scenario. One of the main features of IEEE 802.11ah consists of the Restricted Access Window (RAW) mechanism, ...