Ara mostrant els elements 80-99 de 114

    Modelado y análisis de sistemas fotovoltaicos 

    Guasch Murillo, Daniel (Data de defensa: 2003-06-26)

    Bajo la etiqueta de "Modelado y análisis de sistemas fotovoltaicos" se presentan los trabajos realizados a lo largo del doctorado. Estos estudios centran su aplicación en el área de los sistemas fotovoltaicos. Tienen por ...

    Network resource allocation policies with energy transfer capabilities 

    Piovesan, Nicola (Data de defensa: 2020-06-05)

    During the last decades, mobile network operators have witnessed an exponential increase in the traffic demand, mainly due to the high request of services from a huge amount of users. The trend is of a further increase in ...

    New Architectures for ubiquitous networks : use and adaptation of internet protocols over wireless sensor networks 

    Ludovici, Alessandro (Data de defensa: 2014-07-07)

    This thesis focuses on the study of low-resource demanding protocols, communication techniques and software solutions to evaluate, optimise and implement Web service in WSNs. We start analysing the Web service architectures ...

    On codes for traceability schemes: constructions and bounds 

    Moreira Sánchez, José (Data de defensa: 2013-11-13)

    A traceability or fingerprinting scheme is a cryptographic scheme that facilitates the identification of the source of leaked information. In a fingerprinting setting, a distributor delivers copies of a given content to a ...

    Optimizing IETF multimedia signaling protocols and architectures in 3GPP networks : an evolutionary approach 

    Viamonte Solé, David (Data de defensa: 2019-06-16)

    Signaling in Next Generation IP-based networks heavily relies in the family of multimedia signaling protocols defined by IETF. Two of these signaling protocols are RTSP and SIP, which are text-based, client-server, ...

    Performance improvements for multi-radio dual connectivity in mobile networks 

    Pupiales Yépez, Carlos (Data de defensa: 2022-11-24)

    (English) Initial 5G networks were deployed to satisfy the users with higher data rates. Hence, to reduce the time to market and maximize the value of already deployed infrastructure, such deployments used the Non-Standalone ...

    Power aware resource allocation and virtualization algorithms for 5G core networks 

    Hejja, Khaled (Data de defensa: 2019-07-15)

    Most of the algorithms that solved the resource allocation problem, used to apply greedy algorithms to select the physical nodes and shortest paths to select the physical edges, without sufficient coordination between ...

    Predicción del alcance de propagación de información e influencia en redes sociales online 

    Ortiz-Gaona, Raúl (Data de defensa: 2020-09-16)

    Online social networks (OSNs) are increasinglyused by different sectors of societywith the purpose of informing and influencing people. These sectors are: govemments, political parties, non-govemmental organizations, ...

    Privacy in online advertising platforms 

    Estrada Jiménez, José Antonio (Data de defensa: 2020-10-02)

    Online advertising is consistently considered as the pillar of the "free• content on the Web since it is commonly the funding source of websites. Furthermore, the option of delivering personalizad ads has tumed advertising ...

    Privacy protection of user profiles in personalized information systems 

    Parra Arnau, Javier (Data de defensa: 2013-12-02)

    In recent times we are witnessing the emergence of a wide variety of information systems that tailor the information-exchange functionality to meet the specific interests of their users. Most of these personalized information ...

    Private user-centric management of electronic services in smart communities 

    Robles González, Antonio (Data de defensa: 2023-10-05)

    (English) Smart community services are reaching nearly every area of our daily life, often requiring private information from their users. The scope of all contributors to these services is to collaboratively share information ...

    Proposal of an adaptive infotainment system depending on driving scenario complexity 

    Galarza Osio, Miguel Ángel (Data de defensa: 2020-01-31)

    The PhD research project is framed within the plan of industrial doctorates of the “Generalitat de Catalunya”. During the investigation, most of the work was carried out at the facilities of the vehicle manufacturer SEAT, ...

    Resource allocation and management techniques for network slicing in WiFi networks 

    Richart, Matías (Data de defensa: 2019-11-01)

    Network slicing has recently been proposed as one of the main enablers for 5G networks; it is bound to cope with the increasing and heterogeneous performance requirements of these systems. To "slice'' a network is to ...

    Resource allocation and management under priorities based on the squatting-kicking model for multi-slice 5G networks 

    Hamouda, Ahmed Mohamed Abdelaty Elmekkawi (Data de defensa: 2021-09-30)

    The upcoming Beyond Fifth Generation networks aim to meet network services characterized by low latency and high reliability among others in different slices to provide a high-quality user experience. However, existing ...

    Resource management research in ethernet passive optical networks 

    Garfias Hernández, Paola (Data de defensa: 2013-11-25)

    The last decades, we have witnessed different phenomenology in the telecommunications sector. One of them is the widespread use of the Internet, which has brought a sharp increase in traffic, forcing suppliers to continuously ...

    Resource optimization in passive optical networks: dynamic bandwidth Allocation, Evolution, and Cost-Effective Capacity Upgrades 

    Andrade Jardín, Marilet de (Data de defensa: 2010-11-23)

    This thesis is a result of contributions to optimize or improve resource allocation in Passive Optical Networks (PON). The contributions are related with resource allocation during PON operation and with the upgrade process ...

    Scalability and robustness in software-defined networking (SDN) 

    Jiménez Agudelo, Yury Andrea (Data de defensa: 2016-07-06)

    The simplicity of Internet design has led to enormous growth and innovation. In recent decades several network technologies, services and applications have appeared, which demand specific network requirements for their ...

    Secure identity management in structured peer-to-peer (P2P) networks 

    Caubet Fernández, Juan (Data de defensa: 2016-01-25)

    Structured Peer-to-Peer (P2P) networks were proposed to solve routing problems of big distributed infrastructures. But the research community has been questioning their security for years. Most prior work in security ...

    Security in peer-to-peer communication systems 

    Suárez Touceda, Diego (Data de defensa: 2011-07-26)

    P2PSIP (Peer-to-Peer Session Initiation Protocol) is a protocol developed by the IETF (Internet Engineering Task Force) for the establishment, completion and modi¿cation of communication sessions that emerges as a complement ...

    Security protocols suite for machine-to-machine systems 

    Bartoli, Andrea (Data de defensa: 2013-06-18)

    Nowadays, the great diffusion of advanced devices, such as smart-phones, has shown that there is a growing trend to rely on new technologies to generate and/or support progress; the society is clearly ready to trust on ...