Articles de revista
Recent Submissions
-
Simplicial degree in complex networks. Applications of topological data analysis to network science
(2020-08)
Article
Restricted access - publisher's policyNetwork Science provides a universal formalism for modelling and studying complex systems based on pairwise interactions between agents. However, many real networks in the social, biological or computer sciences involve ... -
Adaptive IP scheduler design to support QoS guarantees over satellite systems
(2012-06)
Article
Open AccessThis paper presents an adaptive algorithm for man-aging the weight values of the Weighted Round Robin (WRR)scheduler to provide End-to-End (E2E) Quality of Service (QoS)guarantees for Broadband satellite ... -
Signature codes for weighted noisy adder channel, multimedia fingerprinting and compressed sensing
(2019-03-01)
Article
Open AccessWe propose a new approach to construct noise-resistant multimedia fingerprinting codes. Our approach is based on the theory of the signature codes for multiple access channels, mainly, for a weighted noisy adder channel. ... -
On non-binary traceability set systems
(2020-03-19)
Article
Open AccessWe introduce non-binary IPP set systems with traceability properties that have IPP codes and binary IPP set systems with traceability capabilities as particular cases. We prove an analogue of the Gilbert–Varshamov bound ... -
An architecture for easy onboarding and key life-cycle management in blockchain applications
(Institute of Electrical and Electronics Engineers (IEEE), 2020-06-22)
Article
Open AccessNew manufacturing paradigms require a large number of business interactions between multiple cyber-physical systems with different owners. In this context, public distributed ledgers are disruptive because they make it ... -
Mixed integration of CDIO skills into telecommunication engineering curricula
(2010)
Article
Open AccessSpain has been intensively involved in designing engineering curricula for the last two years and next academic year all engineering schools will be deploying all bachelor programs adapted to the EHEA and to the Spanish ... -
Cifrado en flujo basado en NLFSR
(Asociación de Técnicos de Informática, 1998-07)
Article
Open AccessLos mecanismos de cifrado en flujo constituyen una alternativa interesante para proporcionar confidencialidad en distintos entornos como comunicaciones móviles y redes de alta velocidad. En la literatura se han estudiado ... -
Esquemas de fingerprinting para la protección de derechos de distribución
(Asociación de Técnicos de Informática, 2002-12)
Article
Open Access -
Risk-based decision-making for public key infrastructures using fuzzy logic
(2012-11-01)
Article
Restricted access - publisher's policyPublic key infrastructures (PKIs) are complex systems that are responsible for giving users enough information to make reasonable trust judgments about one another. The validation of public keys is hence of great importance. ... -
QoSatAr: a cross-layer architecture for E2E QoS provisioning over DVB-S2 broadband satellite systems
(2012-10-01)
Article
Open AccessThis article presents QoSatAr, a cross-layer architecture developed to provide end-to-end quality of service (QoS) guarantees for Internet protocol (IP) traffic over the Digital Video Broadcasting-Second generation (DVB-S2) ... -
DECADE: Distributed Emergent Cooperation through ADaptive Evolution in mobile ad hoc networks
(Elsevier, 2012-09)
Article
Restricted access - publisher's policyThe scarce resources of a mobile ad hoc network (MANET) should not be wasted attending selfish nodes (those nodes that use resources from other nodes to send their own packets, without offering their own resources to forward ... -
Design and implementation of a lightweight online certificate validation service
(2009-07)
Article
Restricted access - publisher's policyA PKI (public key infrastructure) provides for a digital certificate that can identify an individual or an organization. However, the existence of a certificate is a necessary but not sufficient evidence for its validity. ...