Recent Submissions

  • On the optimal NFVI-PoP placement for SDN-enabled 5G networks 

    Santoyo González, Alejandro; Cervelló Pastor, Cristina (Springer, 2017-07-17)
    Part of book or chapter of book
    Restricted access - publisher's policy
    5G stringent requirements entail numerous challenges to overcome. Optimizing Network Function Virtualization Infrastructure Point of Presence (NFVI-PoP) placement in a Fog Computing/5G environment is one of these challenges. ...
  • El cambio tecnológico, digitalización, satélites, fibra óptica e irrupción de la informática y de las redes de telecomunicaciones 

    Elias Fusté, Antonio; Berenguer Sau, Jordi; Mataix Oltra, Jordi (Fundación Telefónica, 2016-12)
    Part of book or chapter of book
    Open Access
    Este segundo volumen de la historia de Telefónica arroja una mirada de gran angular sobre el desarrollo de la compañía desde los años 70 hasta los primeros años del siglo xxi, unas décadas marcadas por la apertura de ...
  • New trends in mobility modelling and handover prediction 

    Barceló Arroyo, Francisco; Gorawski, Michal; Grochla, Krzysztof; Martín Escalona, Israel; Polys, Konrad; Ribeiro, Andrea G.; Sofia, Rute; Zola, Enrica Valeria (Springer, 2014)
    Part of book or chapter of book
    Restricted access - publisher's policy
    Wireless networks of moving objects have drawn significant attention recently. These types of networks consist of a number of autonomous or semi-autonomous wireless nodes/objects moving with diverse patterns and speeds ...
  • MHT-based mechanism for certificate revocation in VANETs 

    Muñoz Tapia, José Luis; Esparza Martín, Óscar; Hernández Gañán, Carlos; Mata Diaz, Jorge; Alins Delgado, Juan José; Ganchev, Ivan (Springer, 2014-07)
    Part of book or chapter of book
    Restricted access - publisher's policy
    Vehicular Ad Hoc Networks (VANETs) require mechanisms to authenticate messages, identify valid vehicles, and remove misbehaving vehicles. A Public Key Infrastructure (PKI) can be utilized to provide these functionalities ...
  • Robust association for multi-radio devices under coverage of multiple networks 

    Zola, Enrica Valeria; Dely, Peter; Kassler, Andreas; Barceló Arroyo, Francisco (Springer, 2013)
    Part of book or chapter of book / Conference lecture
    Restricted access - publisher's policy
    Many devices are nowadays equipped with multiple wireless network interfaces such as GSM, HSPA+ and WLAN. This requires a mechanism for identifying which access network to use at a given time so to provide best user ...
  • Optimizing the delivery chain in heterogenous networks 

    Sánchez Loro, Xavier; Paradells Aspas, Josep; Casademont Serra, Jordi; Ferrer, Josep Lluís (2011)
    Part of book or chapter of book
    Restricted access - publisher's policy
    Herein, we will focus on proposing a service taxonomy and classification for RBA/SOA architectures aiming to model a common framework for the description and composition of possible Atomic Ser- vices or networking ...
  • Middleware for positioning in cellular networks 

    Martín Escalona, Israel; Barceló Arroyo, Francisco; Ciurana Adell, Marc (2011-04-23)
    Part of book or chapter of book
    Restricted access - author's decision
  • Problems in dynamic bandwidth allocation in connection oriented networks 

    Hesselbach Serra, Xavier (Springer, 2009)
    Part of book or chapter of book
    Restricted access - publisher's policy
  • Chapter 4: Mobility Support 

    Barceló Arroyo, Francisco; Aguayo-Torres, M.C.; Al Begain, K.; Martín Escalona, Israel; Vassilou, V. (SPRINGER-VERLAG., 2009)
    Part of book or chapter of book
    Restricted access - publisher's policy
    Wireless access allows independency between the user’s position and the physical bearer used to access services from the network. However, this independency does not imply that wireless networks show a full ability to cope ...
  • Discrete event simulation of wireless cellular networks 

    Zola, Enrica Valeria; Martín Escalona, Israel; Barceló Arroyo, Francisco (Sciyo.com, 2010-09)
    Part of book or chapter of book
    Open Access
  • Genetic algorithms for designing network security protocols 

    Zarza, Luis; Forné Muñoz, Jorge; Pegueroles Vallés, Josep R.; Soriano Ibáñez, Miguel (World Scientífic, 2010)
    Part of book or chapter of book
    Restricted access - publisher's policy
    The design of cryptographic and security protocols for new scenarios and applications can be computationally expensive. Examples of these can be sensor or mobile ad-hoc networks where thousands of nodes can be involved. ...
  • Next Generation Optical Access Networks: from TDM to WDM 

    Gutiérrez González, Lluís; Garfias Hernandez, Paola; Andrade Jardín, Marilet de; Cervelló Pastor, Cristina; Sallent Ribes, Sebastián (INTECH, 2010-03)
    Part of book or chapter of book
    Open Access

View more