Now showing items 61-80 of 111
Machado Sánchez, Sergio (Date of defense: 2016-02-03)
The peer-to-peer (P2P) overlay networks are distribution topologies that take advantage of the ability that their nodes have to forward the information that they receive. For the particular case of video transmission using ...
Guasch Castelló, Sandra (Date of defense: 2016-02-05)
This PhD Thesis is the fruit of the job of the author as a researcher at Scytl Secure Electronic Voting, as well as the collaboration with Paz Morillo, from the Department of Applied Mathematics at UPC and Alex Escala, PhD ...
Catalán Cid, Miguel (Date of defense: 2016-02-10)
The IEEE 802.11 standard was not initially designed to provide multi-hop capabilities. Therefore, providing a proper traffic performance in Multi-Hop IEEE 802.11 Wireless Networks (MIWNs) becomes a significant challenge. ...
Mezher, Ahmad Mohamad (Date of defense: 2016-04-22)
Ad hoc networks have attracted much attention from the research community over the last years and important technical advances have risen as a consequence. These networks are foreseen as an important kind of next generation ...
Ferrer Riera, Jordi (Date of defense: 2016-01-20)
Virtualization is defined as the process consisting of building a virtual resource on top of one or several physical resources, depending on the selected paradigm: aggregation or partitioning. From the net- working ...
Betzler, August (Date of defense: 2015-07-07)
Over the last decades, wireless technologies have become an important part of our daily lives. A plentitude of new types of networks based on wireless technologies have emerged, often replacing wired solutions. In this ...
Reñé Vicente, Sergi (Date of defense: 2015-06-26)
Intelligent Transportation Systems (ITS) has impulsed the vehicular communications at the present time. The vehicular communications field is a hot research topic and is attracting a great interest in the automotive industry ...
Oller i Bosch, Joaquim (Date of defense: 2015-03-06)
During the recent years, the research related to Wake-up Radio (WuR) systems has gained noticeable interest. In WuR systems, a node initiating a communication first sends a Wake-up Call (WuC) by means of its Wake-up ...
Vázquez Rodas, Andrés Marcelo (Date of defense: 2015-02-13)
Nowadays, people expectations for ubiquitous connectivity is continuously growing. Cities are now moving towards the smart city paradigm. Electricity companies aims to become part of smart grids. Internet is no longer ...
Hernández Gañán, Carlos (Date of defense: 2013-09-04)
Vehicular ad hoc networks (VANETs) are emerging as an functional technology for providing a wide range of applications to vehicles and passengers. Ensuring secure functioning is one of the prerequisites for deploying ...
Kermajani, Hamidreza (Date of defense: 2014-09-03)
Wireless Sensor Networks (WSNs) have become increasingly important. These networks comprise sensor and actuator nodes that enable intelligent monitoring and control applications in a wide spectrum of environments including ...
Ludovici, Alessandro (Date of defense: 2014-07-07)
This thesis focuses on the study of low-resource demanding protocols, communication techniques and software solutions to evaluate, optimise and implement Web service in WSNs. We start analysing the Web service architectures ...
Ferragut Martínez-Vara de Rey, Jaime (Date of defense: 2014-07-29)
The growth in user demand for higher mobile data rates is driving Mobile Network Operators (MNOs) and network infrastructure vendors towards the adoption of innovative solutions in areas that span from physical layer ...
Parra Arnau, Javier (Date of defense: 2013-12-02)
In recent times we are witnessing the emergence of a wide variety of information systems that tailor the information-exchange functionality to meet the specific interests of their users. Most of these personalized information ...
Moreira Sánchez, José (Date of defense: 2013-11-13)
A traceability or fingerprinting scheme is a cryptographic scheme that facilitates the identification of the source of leaked information. In a fingerprinting setting, a distributor delivers copies of a given content to a ...
Garfias Hernández, Paola (Date of defense: 2013-11-25)
The last decades, we have witnessed different phenomenology in the telecommunications sector. One of them is the widespread use of the Internet, which has brought a sharp increase in traffic, forcing suppliers to continuously ...
Camps Mur, Daniel (Date of defense: 2012-01-19)
The Wi-Fi technology has been in the recent years fostering the proliferation of attractive mobile computing devices with broadband capabilities. Current Wi-Fi radios though severely impact the battery duration of these ...
Beltrán Martínez, Victoria (Date of defense: 2011-12-16)
Next-Generation Networks (NGNs) will converge the existing fixed and wireless networks. These networks rely on the IMS (IP Multimedia Subsystem), introduced by the 3GPP. The presence service came into being in instant ...
León Abarca, Olga (Date of defense: 2012-01-31)
The increasing emergence of wireless applications along with the static spectrum allocation followed by regulatory bodies has led to a high inefficiency in spectrum usage, and the lack of spectrum for new services. In this ...
Bartoli, Andrea (Date of defense: 2013-06-18)
Nowadays, the great diffusion of advanced devices, such as smart-phones, has shown that there is a growing trend to rely on new technologies to generate and/or support progress; the society is clearly ready to trust on ...