Karimi-Haghighi, Marzieh (Date of defense: 2023-01-20)
We try to address some challenges in structured risk assessment tools in two application areas of recidivism risk in criminal justice and dropout risk in higher education domain. Using Machine Learning ...
Perera Bel, Enric (Date of defense: 2021-12-17)
Diverses teràpies mèdiques es basen en l’electroporació. Entre d’altres, l’electroporació s'usa per al tractament de tumors sòlids. Com que només afecta les cèl·lules i la matriu extracel·lular queda ...
Faraldo Pérez, Ángel (Date of defense: 2018-03-19)
This dissertation revolves around the task of computational key estimation in electronic dance music, upon which we perform three interrelated operations. First, we attempt to detect possible misconceptions ...
Silva Velón, Javier (Date of defense: 2021-03-11)
In this thesis, we present some public-key cryptographic schemes. This work is divided in two halves. The rst half deals with zero-knowledge proofs in the classical setting and under falsi able ...
Mangado López, Nerea (Date of defense: 2017-11-16)
Recent innovations in computational modeling have led to important advances towards the development of predictive tools to simulate and optimize surgery outcomes. This thesis is focused on cochlear ...
Liao, Ruizhi (Date of defense: 2014-10-06)
IEEE 802.11 based wireless networks, especially the infrastructure based Wireless Local Area Networks (WLANs) or Wi-Fi networks, are hugely successful, and have become an indispensable part of our life ...
Ramirez-Ruiz, Jorge (Date of defense: 2023-06-22)
The idea of optimal decision-making presupposes certain features about the agent and their environment. This thesis examines two common assumptions in disciplines that study natural and artificial ...
Urru, Andrea (Date of defense: 2022-07-28)
Perinatal medicine has drawn increasing attention by the neuroscientific research community, as an early detection of most pathologies leads to more effective therapies and treatments. Monitoring fetal ...
López Raventós, Álvaro (Date of defense: 2022-10-26)
The next Wi-Fi generation poses in front of a massive challenge as the main enabler for new services and applications. Traffic requirements are expected to keep rising year over year, challenging Wi-Fi ...
Makriyannis, Nikolaos (Date of defense: 2016-09-20)
Secure two-party computation is a classic problem in cryptography. It involves two parties computing a function of their private inputs, and only revealing what the output suggests. Additional security ...