Ara mostrant els elements 85-104 de 114

    Performance improvements for multi-radio dual connectivity in mobile networks 

    Pupiales Yépez, Carlos (Data de defensa: 2022-11-24)

    (English) Initial 5G networks were deployed to satisfy the users with higher data rates. Hence, to reduce the time to market and maximize the value of already deployed infrastructure, such deployments used the Non-Standalone ...

    Power aware resource allocation and virtualization algorithms for 5G core networks 

    Hejja, Khaled (Data de defensa: 2019-07-15)

    Most of the algorithms that solved the resource allocation problem, used to apply greedy algorithms to select the physical nodes and shortest paths to select the physical edges, without sufficient coordination between ...

    Predicción del alcance de propagación de información e influencia en redes sociales online 

    Ortiz-Gaona, Raúl (Data de defensa: 2020-09-16)

    Online social networks (OSNs) are increasinglyused by different sectors of societywith the purpose of informing and influencing people. These sectors are: govemments, political parties, non-govemmental organizations, ...

    Privacy in online advertising platforms 

    Estrada Jiménez, José Antonio (Data de defensa: 2020-10-02)

    Online advertising is consistently considered as the pillar of the "free• content on the Web since it is commonly the funding source of websites. Furthermore, the option of delivering personalizad ads has tumed advertising ...

    Privacy protection of user profiles in personalized information systems 

    Parra Arnau, Javier (Data de defensa: 2013-12-02)

    In recent times we are witnessing the emergence of a wide variety of information systems that tailor the information-exchange functionality to meet the specific interests of their users. Most of these personalized information ...

    Private user-centric management of electronic services in smart communities 

    Robles González, Antonio (Data de defensa: 2023-10-05)

    (English) Smart community services are reaching nearly every area of our daily life, often requiring private information from their users. The scope of all contributors to these services is to collaboratively share information ...

    Proposal of an adaptive infotainment system depending on driving scenario complexity 

    Galarza Osio, Miguel Ángel (Data de defensa: 2020-01-31)

    The PhD research project is framed within the plan of industrial doctorates of the “Generalitat de Catalunya”. During the investigation, most of the work was carried out at the facilities of the vehicle manufacturer SEAT, ...

    Resource allocation and management techniques for network slicing in WiFi networks 

    Richart, Matías (Data de defensa: 2019-11-01)

    Network slicing has recently been proposed as one of the main enablers for 5G networks; it is bound to cope with the increasing and heterogeneous performance requirements of these systems. To "slice'' a network is to ...

    Resource allocation and management under priorities based on the squatting-kicking model for multi-slice 5G networks 

    Hamouda, Ahmed Mohamed Abdelaty Elmekkawi (Data de defensa: 2021-09-30)

    The upcoming Beyond Fifth Generation networks aim to meet network services characterized by low latency and high reliability among others in different slices to provide a high-quality user experience. However, existing ...

    Resource management research in ethernet passive optical networks 

    Garfias Hernández, Paola (Data de defensa: 2013-11-25)

    The last decades, we have witnessed different phenomenology in the telecommunications sector. One of them is the widespread use of the Internet, which has brought a sharp increase in traffic, forcing suppliers to continuously ...

    Resource optimization in passive optical networks: dynamic bandwidth Allocation, Evolution, and Cost-Effective Capacity Upgrades 

    Andrade Jardín, Marilet de (Data de defensa: 2010-11-23)

    This thesis is a result of contributions to optimize or improve resource allocation in Passive Optical Networks (PON). The contributions are related with resource allocation during PON operation and with the upgrade process ...

    Scalability and robustness in software-defined networking (SDN) 

    Jiménez Agudelo, Yury Andrea (Data de defensa: 2016-07-06)

    The simplicity of Internet design has led to enormous growth and innovation. In recent decades several network technologies, services and applications have appeared, which demand specific network requirements for their ...

    Secure identity management in structured peer-to-peer (P2P) networks 

    Caubet Fernández, Juan (Data de defensa: 2016-01-25)

    Structured Peer-to-Peer (P2P) networks were proposed to solve routing problems of big distributed infrastructures. But the research community has been questioning their security for years. Most prior work in security ...

    Security in peer-to-peer communication systems 

    Suárez Touceda, Diego (Data de defensa: 2011-07-26)

    P2PSIP (Peer-to-Peer Session Initiation Protocol) is a protocol developed by the IETF (Internet Engineering Task Force) for the establishment, completion and modi¿cation of communication sessions that emerges as a complement ...

    Security protocols suite for machine-to-machine systems 

    Bartoli, Andrea (Data de defensa: 2013-06-18)

    Nowadays, the great diffusion of advanced devices, such as smart-phones, has shown that there is a growing trend to rely on new technologies to generate and/or support progress; the society is clearly ready to trust on ...

    Seguridad en los procesos de voto electrónico remoto: registro, votación, consolidación de resultados y auditoria 

    Morales Rocha, Víctor Manuel (Data de defensa: 2009-03-13)

    En los últimos años se han estado utilizando medios electrónicos para automatizar y hacer más eficientes los diferentes procesos de una elección. Aún cuando esta automatización se ha presentado de manera gradual, el propósito ...

    Seguridad en redes de banda ancha: contribución al diseño evaluación de un sistema de seguridad para la RDSI-BA 

    Forné Muñoz, Jordi (Data de defensa: 1997-01-23)

    El estudio de arquitecturas de seguridad para redes de transmisión de datos adquiere cada día mayor importancia.<br/><br/>Por otra parte, es un hecho constatado que el mundo de las telecomunicaciones camina decididamente ...

    Seguridad en redes de computación ubicua: contribución a la validación de credenciales 

    Hinarejos Campos, M. Francisca (Data de defensa: 2010-06-30)

    Technology progress in both user devices and networks allows communications anytime and anywhere. New communication environments offer a wide range of possibilities to users, but also generate new threats. For this reason, ...

    Self-optimization of Radio Resources on IEEE 802.11 Networks 

    García Villegas, Eduardo (Data de defensa: 2010-02-18)

    Les xarxes d'àrea local sense fils (WLANs), principalment les basades en les diverses versions de les normes IEEE 802.11, i més concretament, aquelles operant en mode infraestructura (ús de punts d'accés o APs), són avui ...

    Strategies for improving resilience in distributed communication systems 

    Llorens Carrodeguas, Alejandro (Data de defensa: 2023-01-26)

    (English) With the development of industry and society, new verticals have emerged such as Industry 4.0, cooperative sensing, and massive IoT. These verticals require network robustness and availability to maintain high ...