Descomposicions de grafs en arbres. 

    López Masip, Susana-Clara (Date of defense: 2003-02-20)

    Digrafs línia: alguns aspectes en comunicacions: Broadcasting i Vulnerabilitat. 

    Muñoz López, Xavier (Date of defense: 1996-12-05)

    El objetivo de la tesis es el estudio de diversosaspectos de redes de interconexión que pueden sermodeladas mediante la teoría de grafos, y masconcretamente, mediante dígrafos línea iterados enparticular se presentan, para ...

    Geometrical structures of higher-order dynamical systems and field theories 

    Prieto Martínez, Pere Daniel (Date of defense: 2014-10-02)

    Geometrical physics is a relatively young branch of applied mathematics that was initiated by the 60's and the 70's when A. Lichnerowicz, W.M. Tulczyjew and J.M. Souriau, among many others, began to study various topics ...

    Multipartite secret sharing schemes 

    Farràs Ventura, Oriol (Date of defense: 2010-07-27)

    This thesis is dedicated to the study of secret sharing schemes, which are cryptographic methods to share information in a secure way. The topics that are considered in the thesis are two of the main open problems in secret ...

    Optimization in graphs under degree constraints. application to telecommunication networks 

    Sau Valls, Ignasi (Date of defense: 2009-10-16)

    La premi ere partie de cette th ese s'int eresse au groupage de tra c dans les r eseaux de t el ecommunications. La notion de groupage de tra c correspond a l'agr egation de ux de faible d ebit dans des conduits de ...

    Problemas Geométricos en Morfología Computacional 

    Claverol Aguas, Mercè (Date of defense: 2004-07-16)

    Esta tesis se divide en dos partes. La primera parte contiene el estudio de tres pesos o profundidades, asociados a conjuntos finitos de puntos en el plano: el peso definido por las capas convexas, convex depth (introducido ...

    Some Digital Signature Schemes with Collective Signers 

    Herranz Sotoca, Javier (Date of defense: 2005-04-15)

    Digital signatures are one of the most important consequences of the appearance of public key cryptography, in 1976. These schemes provide authentication, integrity and non-repudiation to digital communications. <br/>Some ...