Ara mostrant els elements 51-60 de 372
Silva Velón, Javier (Data de defensa: 2021-03-11)
In this thesis, we present some public-key cryptographic schemes. This work is divided in two halves. The rst half deals with zero-knowledge proofs in the classical setting and under falsi able ...
Mangado López, Nerea (Data de defensa: 2017-11-16)
Recent innovations in computational modeling have led to important advances towards the development of predictive tools to simulate and optimize surgery outcomes. This thesis is focused on cochlear ...
Cabral, Joana R. B. (Data de defensa: 2012-07-18)
La actividad cerebral exhibe complejos fenómenos oscilatorios similares a los que se observan en modelos de redes artificiales con osciladores acoplados. Por un lado, estudios sobre la actividad cerebral ...
Liao, Ruizhi (Data de defensa: 2014-10-06)
IEEE 802.11 based wireless networks, especially the infrastructure based Wireless Local Area Networks (WLANs) or Wi-Fi networks, are hugely successful, and have become an indispensable part of our life ...
Gil Iranzo, Rosa María (Data de defensa: 2005-02-04)
La arquitectura semántica diseñada ha sido probada dentro del entorno de la gestión de los derechos de la propiedad intelectual. Esta permite asimilar nuevos módulos y cambios en la estructura. Se ha ...
Ramirez-Ruiz, Jorge (Data de defensa: 2023-06-22)
The idea of optimal decision-making presupposes certain features about the agent and their environment. This thesis examines two common assumptions in disciplines that study natural and artificial ...
Urru, Andrea (Data de defensa: 2022-07-28)
Perinatal medicine has drawn increasing attention by the neuroscientific research community, as an early detection of most pathologies leads to more effective therapies and treatments. Monitoring fetal ...
López Raventós, Álvaro (Data de defensa: 2022-10-26)
The next Wi-Fi generation poses in front of a massive challenge as the main enabler for new services and applications. Traffic requirements are expected to keep rising year over year, challenging Wi-Fi ...
Pérez Sanagustín, Maria del Mar (Data de defensa: 2011-07-01)
Portable and interactive technologies are changing the nature of collaborative learning practices. Learning can now occur both in and beyond the classroom and furthermore combine formal and informal ...
Makriyannis, Nikolaos (Data de defensa: 2016-09-20)
Secure two-party computation is a classic problem in cryptography. It involves two parties computing a function of their private inputs, and only revealing what the output suggests. Additional security ...