Puglisi, Silvia (Date of defense: 2017-06-20)
Online communications generate a consistent amount of data flowing between users, services and applications. This information results from the interactions among different parties, and once collected, ...
Afaqui, Muhammad Shahwaiz (Date of defense: 2017-06-28)
The explosive growth in usage of IEEE 802.11 based WLAN networks has resulted in dense deployments in diverse environments and has made the concept of anytime - anywhere data connectivity a realm of ...
Ochoa Aday, Leonardo (Date of defense: 2019-01-30)
The evolution of information and communication technologies (e.g. cloud computing, the Internet of Things (IoT) and 5G, among others) has enabled a large market of applications and network services for ...
Ludovici, Alessandro (Date of defense: 2014-07-07)
This thesis focuses on the study of low-resource demanding protocols, communication techniques and software solutions to evaluate, optimise and implement Web service in WSNs. We start analysing the Web ...
González Cela, Alberto José (Date of defense: 2012-09-26)
Nowadays, video streaming applications are the most bandwidth-hungry applications and this tendency is envisaged to grow exponentially. With the proliferation of multimedia capable devices, multimedia ...
Viamonte Solé, David (Date of defense: 2019-06-16)
Signaling in Next Generation IP-based networks heavily relies in the family of multimedia signaling protocols defined by IETF. Two of these signaling protocols are RTSP and SIP, which are text-based, ...
Vera del Campo, Juan (Date of defense: 2012-10-29)
A recommender system is an automatic system that, given a customer model and a set of available documents, is able to select and offer those documents that are more interesting to the customer. From ...
Botero Vega, Juan Felipe (Date of defense: 2013-06-21)
Network virtualization is recognized as an enabling technology for the future Internet. It aims to overcome the resistance of the current Internet to architectural change and to enable a new business ...
Caubet Fernández, Juan (Date of defense: 2016-01-25)
Structured Peer-to-Peer (P2P) networks were proposed to solve routing problems of big distributed infrastructures. But the research community has been questioning their security for years. Most prior ...
Hejja, Khaled (Date of defense: 2019-07-15)
Most of the algorithms that solved the resource allocation problem, used to apply greedy algorithms to select the physical nodes and shortest paths to select the physical edges, without sufficient ...