Now showing items 83-102 of 114

    On codes for traceability schemes: constructions and bounds 

    Moreira Sánchez, José (Date of defense: 2013-11-13)

    A traceability or fingerprinting scheme is a cryptographic scheme that facilitates the identification of the source of leaked information. In a fingerprinting setting, a distributor delivers copies of a given content to a ...

    Optimizing IETF multimedia signaling protocols and architectures in 3GPP networks : an evolutionary approach 

    Viamonte Solé, David (Date of defense: 2019-06-16)

    Signaling in Next Generation IP-based networks heavily relies in the family of multimedia signaling protocols defined by IETF. Two of these signaling protocols are RTSP and SIP, which are text-based, client-server, ...

    Performance improvements for multi-radio dual connectivity in mobile networks 

    Pupiales Yépez, Carlos (Date of defense: 2022-11-24)

    (English) Initial 5G networks were deployed to satisfy the users with higher data rates. Hence, to reduce the time to market and maximize the value of already deployed infrastructure, such deployments used the Non-Standalone ...

    Power aware resource allocation and virtualization algorithms for 5G core networks 

    Hejja, Khaled (Date of defense: 2019-07-15)

    Most of the algorithms that solved the resource allocation problem, used to apply greedy algorithms to select the physical nodes and shortest paths to select the physical edges, without sufficient coordination between ...

    Predicción del alcance de propagación de información e influencia en redes sociales online 

    Ortiz-Gaona, Raúl (Date of defense: 2020-09-16)

    Online social networks (OSNs) are increasinglyused by different sectors of societywith the purpose of informing and influencing people. These sectors are: govemments, political parties, non-govemmental organizations, ...

    Privacy in online advertising platforms 

    Estrada Jiménez, José Antonio (Date of defense: 2020-10-02)

    Online advertising is consistently considered as the pillar of the "free• content on the Web since it is commonly the funding source of websites. Furthermore, the option of delivering personalizad ads has tumed advertising ...

    Privacy protection of user profiles in personalized information systems 

    Parra Arnau, Javier (Date of defense: 2013-12-02)

    In recent times we are witnessing the emergence of a wide variety of information systems that tailor the information-exchange functionality to meet the specific interests of their users. Most of these personalized information ...

    Private user-centric management of electronic services in smart communities 

    Robles González, Antonio (Date of defense: 2023-10-05)

    (English) Smart community services are reaching nearly every area of our daily life, often requiring private information from their users. The scope of all contributors to these services is to collaboratively share information ...

    Proposal of an adaptive infotainment system depending on driving scenario complexity 

    Galarza Osio, Miguel Ángel (Date of defense: 2020-01-31)

    The PhD research project is framed within the plan of industrial doctorates of the “Generalitat de Catalunya”. During the investigation, most of the work was carried out at the facilities of the vehicle manufacturer SEAT, ...

    Resource allocation and management techniques for network slicing in WiFi networks 

    Richart, Matías (Date of defense: 2019-11-01)

    Network slicing has recently been proposed as one of the main enablers for 5G networks; it is bound to cope with the increasing and heterogeneous performance requirements of these systems. To "slice'' a network is to ...

    Resource allocation and management under priorities based on the squatting-kicking model for multi-slice 5G networks 

    Hamouda, Ahmed Mohamed Abdelaty Elmekkawi (Date of defense: 2021-09-30)

    The upcoming Beyond Fifth Generation networks aim to meet network services characterized by low latency and high reliability among others in different slices to provide a high-quality user experience. However, existing ...

    Resource management research in ethernet passive optical networks 

    Garfias Hernández, Paola (Date of defense: 2013-11-25)

    The last decades, we have witnessed different phenomenology in the telecommunications sector. One of them is the widespread use of the Internet, which has brought a sharp increase in traffic, forcing suppliers to continuously ...

    Resource optimization in passive optical networks: dynamic bandwidth Allocation, Evolution, and Cost-Effective Capacity Upgrades 

    Andrade Jardín, Marilet de (Date of defense: 2010-11-23)

    This thesis is a result of contributions to optimize or improve resource allocation in Passive Optical Networks (PON). The contributions are related with resource allocation during PON operation and with the upgrade process ...

    Scalability and robustness in software-defined networking (SDN) 

    Jiménez Agudelo, Yury Andrea (Date of defense: 2016-07-06)

    The simplicity of Internet design has led to enormous growth and innovation. In recent decades several network technologies, services and applications have appeared, which demand specific network requirements for their ...

    Secure identity management in structured peer-to-peer (P2P) networks 

    Caubet Fernández, Juan (Date of defense: 2016-01-25)

    Structured Peer-to-Peer (P2P) networks were proposed to solve routing problems of big distributed infrastructures. But the research community has been questioning their security for years. Most prior work in security ...

    Security in peer-to-peer communication systems 

    Suárez Touceda, Diego (Date of defense: 2011-07-26)

    P2PSIP (Peer-to-Peer Session Initiation Protocol) is a protocol developed by the IETF (Internet Engineering Task Force) for the establishment, completion and modi¿cation of communication sessions that emerges as a complement ...

    Security protocols suite for machine-to-machine systems 

    Bartoli, Andrea (Date of defense: 2013-06-18)

    Nowadays, the great diffusion of advanced devices, such as smart-phones, has shown that there is a growing trend to rely on new technologies to generate and/or support progress; the society is clearly ready to trust on ...

    Seguridad en los procesos de voto electrónico remoto: registro, votación, consolidación de resultados y auditoria 

    Morales Rocha, Víctor Manuel (Date of defense: 2009-03-13)

    En los últimos años se han estado utilizando medios electrónicos para automatizar y hacer más eficientes los diferentes procesos de una elección. Aún cuando esta automatización se ha presentado de manera gradual, el propósito ...

    Seguridad en redes de banda ancha: contribución al diseño evaluación de un sistema de seguridad para la RDSI-BA 

    Forné Muñoz, Jordi (Date of defense: 1997-01-23)

    El estudio de arquitecturas de seguridad para redes de transmisión de datos adquiere cada día mayor importancia.<br/><br/>Por otra parte, es un hecho constatado que el mundo de las telecomunicaciones camina decididamente ...

    Seguridad en redes de computación ubicua: contribución a la validación de credenciales 

    Hinarejos Campos, M. Francisca (Date of defense: 2010-06-30)

    Technology progress in both user devices and networks allows communications anytime and anywhere. New communication environments offer a wide range of possibilities to users, but also generate new threats. For this reason, ...