Ara mostrant els elements 61-80 de 111
Machado Sánchez, Sergio (Data de defensa: 2016-02-03)
The peer-to-peer (P2P) overlay networks are distribution topologies that take advantage of the ability that their nodes have to forward the information that they receive. For the particular case of video transmission using ...
Guasch Castelló, Sandra (Data de defensa: 2016-02-05)
This PhD Thesis is the fruit of the job of the author as a researcher at Scytl Secure Electronic Voting, as well as the collaboration with Paz Morillo, from the Department of Applied Mathematics at UPC and Alex Escala, PhD ...
Catalán Cid, Miguel (Data de defensa: 2016-02-10)
The IEEE 802.11 standard was not initially designed to provide multi-hop capabilities. Therefore, providing a proper traffic performance in Multi-Hop IEEE 802.11 Wireless Networks (MIWNs) becomes a significant challenge. ...
Mezher, Ahmad Mohamad (Data de defensa: 2016-04-22)
Ad hoc networks have attracted much attention from the research community over the last years and important technical advances have risen as a consequence. These networks are foreseen as an important kind of next generation ...
Ferrer Riera, Jordi (Data de defensa: 2016-01-20)
Virtualization is defined as the process consisting of building a virtual resource on top of one or several physical resources, depending on the selected paradigm: aggregation or partitioning. From the net- working ...
Betzler, August (Data de defensa: 2015-07-07)
Over the last decades, wireless technologies have become an important part of our daily lives. A plentitude of new types of networks based on wireless technologies have emerged, often replacing wired solutions. In this ...
Reñé Vicente, Sergi (Data de defensa: 2015-06-26)
Intelligent Transportation Systems (ITS) has impulsed the vehicular communications at the present time. The vehicular communications field is a hot research topic and is attracting a great interest in the automotive industry ...
Oller i Bosch, Joaquim (Data de defensa: 2015-03-06)
During the recent years, the research related to Wake-up Radio (WuR) systems has gained noticeable interest. In WuR systems, a node initiating a communication first sends a Wake-up Call (WuC) by means of its Wake-up ...
Vázquez Rodas, Andrés Marcelo (Data de defensa: 2015-02-13)
Nowadays, people expectations for ubiquitous connectivity is continuously growing. Cities are now moving towards the smart city paradigm. Electricity companies aims to become part of smart grids. Internet is no longer ...
Hernández Gañán, Carlos (Data de defensa: 2013-09-04)
Vehicular ad hoc networks (VANETs) are emerging as an functional technology for providing a wide range of applications to vehicles and passengers. Ensuring secure functioning is one of the prerequisites for deploying ...
Kermajani, Hamidreza (Data de defensa: 2014-09-03)
Wireless Sensor Networks (WSNs) have become increasingly important. These networks comprise sensor and actuator nodes that enable intelligent monitoring and control applications in a wide spectrum of environments including ...
Ludovici, Alessandro (Data de defensa: 2014-07-07)
This thesis focuses on the study of low-resource demanding protocols, communication techniques and software solutions to evaluate, optimise and implement Web service in WSNs. We start analysing the Web service architectures ...
Ferragut Martínez-Vara de Rey, Jaime (Data de defensa: 2014-07-29)
The growth in user demand for higher mobile data rates is driving Mobile Network Operators (MNOs) and network infrastructure vendors towards the adoption of innovative solutions in areas that span from physical layer ...
Parra Arnau, Javier (Data de defensa: 2013-12-02)
In recent times we are witnessing the emergence of a wide variety of information systems that tailor the information-exchange functionality to meet the specific interests of their users. Most of these personalized information ...
Moreira Sánchez, José (Data de defensa: 2013-11-13)
A traceability or fingerprinting scheme is a cryptographic scheme that facilitates the identification of the source of leaked information. In a fingerprinting setting, a distributor delivers copies of a given content to a ...
Garfias Hernández, Paola (Data de defensa: 2013-11-25)
The last decades, we have witnessed different phenomenology in the telecommunications sector. One of them is the widespread use of the Internet, which has brought a sharp increase in traffic, forcing suppliers to continuously ...
Camps Mur, Daniel (Data de defensa: 2012-01-19)
The Wi-Fi technology has been in the recent years fostering the proliferation of attractive mobile computing devices with broadband capabilities. Current Wi-Fi radios though severely impact the battery duration of these ...
Beltrán Martínez, Victoria (Data de defensa: 2011-12-16)
Next-Generation Networks (NGNs) will converge the existing fixed and wireless networks. These networks rely on the IMS (IP Multimedia Subsystem), introduced by the 3GPP. The presence service came into being in instant ...
León Abarca, Olga (Data de defensa: 2012-01-31)
The increasing emergence of wireless applications along with the static spectrum allocation followed by regulatory bodies has led to a high inefficiency in spectrum usage, and the lack of spectrum for new services. In this ...
Bartoli, Andrea (Data de defensa: 2013-06-18)
Nowadays, the great diffusion of advanced devices, such as smart-phones, has shown that there is a growing trend to rely on new technologies to generate and/or support progress; the society is clearly ready to trust on ...