Ara mostrant els elements 61-80 de 116

    Contributions to the algorithms and methodologies for virtual infrastructure provisioning 

    Ferrer Riera, Jordi (Data de defensa: 2016-01-20)

    Virtualization is defined as the process consisting of building a virtual resource on top of one or several physical resources, depending on the selected paradigm: aggregation or partitioning. From the net- working ...

    Improvements to end-to-end performance of low-power wireless networks 

    Betzler, August (Data de defensa: 2015-07-07)

    Over the last decades, wireless technologies have become an important part of our daily lives. A plentitude of new types of networks based on wireless technologies have emerged, often replacing wired solutions. In this ...

    Handoff management for infotainment services over vehicular networks 

    Reñé Vicente, Sergi (Data de defensa: 2015-06-26)

    Intelligent Transportation Systems (ITS) has impulsed the vehicular communications at the present time. The vehicular communications field is a hot research topic and is attracting a great interest in the automotive industry ...

    Wake-up radio systems : design, development, performance evaluation and comparison to conventional medium access control protocols for wireless sensor networks 

    Oller i Bosch, Joaquim (Data de defensa: 2015-03-06)

    During the recent years, the research related to Wake-up Radio (WuR) systems has gained noticeable interest. In WuR systems, a node initiating a communication first sends a Wake-up Call (WuC) by means of its Wake-up ...

    Contribution to the improvement of the performance of wireless mesh networks providing real time services 

    Vázquez Rodas, Andrés Marcelo (Data de defensa: 2015-02-13)

    Nowadays, people expectations for ubiquitous connectivity is continuously growing. Cities are now moving towards the smart city paradigm. Electricity companies aims to become part of smart grids. Internet is no longer ...

    Certificate status information distribution and validation in vehicular networks 

    Hernández Gañán, Carlos (Data de defensa: 2013-09-04)

    Vehicular ad hoc networks (VANETs) are emerging as an functional technology for providing a wide range of applications to vehicles and passengers. Ensuring secure functioning is one of the prerequisites for deploying ...

    Contributions to the performance evaluation and improvement of the IPv6 routing protocol for low-power and lossy networks 

    Kermajani, Hamidreza (Data de defensa: 2014-09-03)

    Wireless Sensor Networks (WSNs) have become increasingly important. These networks comprise sensor and actuator nodes that enable intelligent monitoring and control applications in a wide spectrum of environments including ...

    New Architectures for ubiquitous networks : use and adaptation of internet protocols over wireless sensor networks 

    Ludovici, Alessandro (Data de defensa: 2014-07-07)

    This thesis focuses on the study of low-resource demanding protocols, communication techniques and software solutions to evaluate, optimise and implement Web service in WSNs. We start analysing the Web service architectures ...

    Traffic and mobility management in large-scale networks of small cells 

    Ferragut Martínez-Vara de Rey, Jaime (Data de defensa: 2014-07-29)

    The growth in user demand for higher mobile data rates is driving Mobile Network Operators (MNOs) and network infrastructure vendors towards the adoption of innovative solutions in areas that span from physical layer ...

    Privacy protection of user profiles in personalized information systems 

    Parra Arnau, Javier (Data de defensa: 2013-12-02)

    In recent times we are witnessing the emergence of a wide variety of information systems that tailor the information-exchange functionality to meet the specific interests of their users. Most of these personalized information ...

    On codes for traceability schemes: constructions and bounds 

    Moreira Sánchez, José (Data de defensa: 2013-11-13)

    A traceability or fingerprinting scheme is a cryptographic scheme that facilitates the identification of the source of leaked information. In a fingerprinting setting, a distributor delivers copies of a given content to a ...

    Resource management research in ethernet passive optical networks 

    Garfias Hernández, Paola (Data de defensa: 2013-11-25)

    The last decades, we have witnessed different phenomenology in the telecommunications sector. One of them is the widespread use of the Internet, which has brought a sharp increase in traffic, forcing suppliers to continuously ...

    Contributions to QoS and energy efficiency in wi-fi networks 

    Camps Mur, Daniel (Data de defensa: 2012-01-19)

    The Wi-Fi technology has been in the recent years fostering the proliferation of attractive mobile computing devices with broadband capabilities. Current Wi-Fi radios though severely impact the battery duration of these ...

    Contributions to presence-based systems for deploying ubiquitous communication services 

    Beltrán Martínez, Victoria (Data de defensa: 2011-12-16)

    Next-Generation Networks (NGNs) will converge the existing fixed and wireless networks. These networks rely on the IMS (IP Multimedia Subsystem), introduced by the 3GPP. The presence service came into being in instant ...

    Contributions to the security of cognitive radio networks 

    León Abarca, Olga (Data de defensa: 2012-01-31)

    The increasing emergence of wireless applications along with the static spectrum allocation followed by regulatory bodies has led to a high inefficiency in spectrum usage, and the lack of spectrum for new services. In this ...

    Security protocols suite for machine-to-machine systems 

    Bartoli, Andrea (Data de defensa: 2013-06-18)

    Nowadays, the great diffusion of advanced devices, such as smart-phones, has shown that there is a growing trend to rely on new technologies to generate and/or support progress; the society is clearly ready to trust on ...

    Study, evaluation and contributions to new algorithms for the embedding problem in a network virtualization environment 

    Botero Vega, Juan Felipe (Data de defensa: 2013-06-21)

    Network virtualization is recognized as an enabling technology for the future Internet. It aims to overcome the resistance of the current Internet to architectural change and to enable a new business model decoupling the ...

    Contribution to design a communication framework for vehicular ad hoc networks in urban scenarios 

    Tripp Barba, Carolina (Data de defensa: 2013-06-20)

    The constant mobility of people, the growing need to be always connected, the large number of vehicles that nowadays can be found in the roads and the advances in technology make Vehicular Ad hoc Networks (VANETs) be a ...

    Contributions based on cross-layer design for quality-of-service provisioning over DVB-S2/RCS broadband satellite system 

    Rendón Morales, Elizabeth (Data de defensa: 2013-03-21)

    Contributions based on cross-layer design for Quality-of-Service provisioning over DVB-S2/RCS Broadband Satellite Systems Nowadays, geostationary (GEO) satellite infrastructure plays a crucial role for the provisioning of ...

    Contributions to security and privacy protection in recommendation systems 

    Vera del Campo, Juan (Data de defensa: 2012-10-29)

    A recommender system is an automatic system that, given a customer model and a set of available documents, is able to select and offer those documents that are more interesting to the customer. From the point of view of ...