Now showing items 1-20 of 110
Viejo Galicia, Alexandre (Date of defense: 2008-09-19)
This thesis is about providing security and privacy to new emergent applications which are based on special-purpose networks. More precisely, we study different aspects regarding security and privacy issues related to ...
Amezquita Gómez, Nicolás (Date of defense: 2009-12-04)
Recognition and tracking of multiple objects in video sequences is one of the main challenges in computer vision that currently deserves a lot of attention from researchers. Almost all the reported approaches are very ...
Mondéjar Andreu, Rubén (Date of defense: 2010-04-29)
En aquesta tesi doctoral presentem una proposta de middleware distribuït pel desenvolupament d'aplicacions de gran escala. La nostra motivació principal és permetre que les responsabilitats distribuïdes d'aquestes aplicacions, ...
Zhang, Lei (Date of defense: 2010-07-05)
Los sistemas de redes ad hoc vehiculares (VANET) tienen como objetivo proporcionar una plataforma para diversas aplicaciones que pueden mejorar la seguridad vial, la eficiencia del tráfico, la asistencia a la conducción, ...
Meléndez Rodríguez, Jaime Christian (Date of defense: 2010-10-08)
This thesis proposes new, efficient methodologies for supervised and unsupervised image segmentation based on texture information. For the supervised case, a technique for pixel classification based on a multi-level strategy ...
González Yero, Ismael (Date of defense: 2010-12-13)
Contribution to the study of alliances in graphs.<br/><br/>Resumen<br/><br/><br/>En este trabajo se estudian propiedades matemáticas de las alianzas (defensivas, ofensivas y duales) en grafos. Entre los temas tratados se ...
Borge Holthoefer, Javier (Date of defense: 2011-01-28)
Seguint una concepció clàssica de la Intel•ligència Artificial (aquella que es posava com horitzó una definició dels mecanismes cognitius i la seva implementació en computadors), aquesta tesi s'endinsa en el problema de ...
Batet Sanromà, Montserrat (Date of defense: 2011-02-15)
Els algoritmes de clustering desenvolupats fins al moment s’han centrat en el processat de dades numèriques i categòriques, no considerant dades textuals. Per manegar adequadament aquestes dades, es necessari interpretar ...
Rodenas Pico, David (Date of defense: 2011-07-08)
L'objectiu d'aquesta tesis es crear o adaptar models de programació per a fer els processadors multi-core accessibles per a la majoria de programadors. Aquest objectiu inclou la possibilitat de reusar els algoritmes ...
Pàmies Juárez, Lluís (Date of defense: 2011-07-19)
Durant la última dècada, la demanda d’emmagatzematge de dades ha anat creixent exponencialment any rere any. Apart de demanar més capacitat d’emmagatzematge, el usuaris actualment també demanen poder accedir a les seves ...
Stokes, Klara (Date of defense: 2011-10-18)
This thesis treats a protocol for anonymous database search (or if one prefer, a protocol for user-private information retrieval), that is based on the use of combinatorial configurations. The protocol is called P2P UPIR. ...
Sanromà Güell, Gerard (Date of defense: 2012-02-14)
Encontrar las correspondencias entre dos imágenes es un problema crucial en el campo de la visión por ordenador i el reconocimiento de patrones. Es relevante para un amplio rango de propósitos des de aplicaciones de ...
Trujillo Rasúa, Rolando (Date of defense: 2012-06-21)
Los sistemas RFID permiten la identificación rápida y automática de etiquetas RFID a través de un canal de comunicación inalámbrico. Dichas etiquetas son dispositivos con cierto poder de cómputo y capacidad de almacenamiento ...
Solé Ribalta, Albert (Date of defense: 2012-07-11)
En aplicaciones de reconocimiento de patrones, los grafos con atributos son en gran medida apropiados. Normalmente, los vértices de los grafos representan partes locales de los objetos i las aristas relaciones entre estas ...
Vico Oton, Albert (Date of defense: 2012-10-22)
In this thesis we present a compendium of _ve works where discrete mathematics play a key role. The _rst three works describe di_erent developments and applications of the semigroup theory while the other two have more ...
López Vallverdú, Joan Albert (Date of defense: 2012-12-14)
The current approaches for the induction of medical procedural knowledge suffer from several drawbacks: the structures produced may not be explicit medical structures, they are only based on statistical measures that do ...
Martínez Lluís, Sergio (Date of defense: 2013-02-26)
The exploitation of microdata compiled by statistical agencies is of great interest for the data mining community. However, such data often include sensitive information that can be directly or indirectly related to ...
Hajian, Sara (Date of defense: 2013-06-10)
Data mining is an increasingly important technology for extracting useful knowledge hidden in large collections of data. There are, however, negative social perceptions about data mining, among which potential privacy ...
Soria Comas, Jorge (Date of defense: 2013-06-14)
We deal with SDC from the computer science community perspective. The focus lies on two mainstream privacy models: k-anonymity and differential privacy. Once a privacy model has been selected, the goal is to enforce it ...
Marín Isern, Lucas (Date of defense: 2013-07-09)
In a period of time in which the content available through the Internet increases exponentially and is more easily accessible every day, techniques for aiding the selection and extraction of important and personalised ...