Mostrando ítems 41-50 de 315
Perera Bel, Enric (Fecha de defensa: 2021-12-17)
Diverses teràpies mèdiques es basen en l’electroporació. Entre d’altres, l’electroporació s'usa per al tractament de tumors sòlids. Com que només afecta les cèl·lules i la matriu extracel·lular queda ...
Faraldo Pérez, Ángel (Fecha de defensa: 2018-03-19)
This dissertation revolves around the task of computational key estimation in electronic dance music, upon which we perform three interrelated operations. First, we attempt to detect possible misconceptions ...
Silva Velón, Javier (Fecha de defensa: 2021-03-11)
In this thesis, we present some public-key cryptographic schemes. This work is divided in two halves. The rst half deals with zero-knowledge proofs in the classical setting and under falsi able ...
Mangado López, Nerea (Fecha de defensa: 2017-11-16)
Recent innovations in computational modeling have led to important advances towards the development of predictive tools to simulate and optimize surgery outcomes. This thesis is focused on cochlear ...
Liao, Ruizhi (Fecha de defensa: 2014-10-06)
IEEE 802.11 based wireless networks, especially the infrastructure based Wireless Local Area Networks (WLANs) or Wi-Fi networks, are hugely successful, and have become an indispensable part of our life ...
Ramirez-Ruiz, Jorge (Fecha de defensa: 2023-06-22)
The idea of optimal decision-making presupposes certain features about the agent and their environment. This thesis examines two common assumptions in disciplines that study natural and artificial ...
Urru, Andrea (Fecha de defensa: 2022-07-28)
Perinatal medicine has drawn increasing attention by the neuroscientific research community, as an early detection of most pathologies leads to more effective therapies and treatments. Monitoring fetal ...
López Raventós, Álvaro (Fecha de defensa: 2022-10-26)
The next Wi-Fi generation poses in front of a massive challenge as the main enabler for new services and applications. Traffic requirements are expected to keep rising year over year, challenging Wi-Fi ...
Makriyannis, Nikolaos (Fecha de defensa: 2016-09-20)
Secure two-party computation is a classic problem in cryptography. It involves two parties computing a function of their private inputs, and only revealing what the output suggests. Additional security ...
Yoshimura, Yuji (Fecha de defensa: 2016-11-25)
The goal of this dissertation is to provide insights into spatial analysis for architecture and urban studies through examining human mobility in the built environment based on large-scale datasets. ...