Now showing items 1-20 of 103

    Security and privacy issues in some special-puropse networks 

    Viejo Galicia, Alexandre (Date of defense: 2008-09-19)

    This thesis is about providing security and privacy to new emergent applications which are based on special-purpose networks. More precisely, we study different aspects regarding security and privacy issues related to ...

    A probabilistic integrated object recognition and tracking framework for video sequences 

    Amezquita Gómez, Nicolás (Date of defense: 2009-12-04)

    Recognition and tracking of multiple objects in video sequences is one of the main challenges in computer vision that currently deserves a lot of attention from researchers. Almost all the reported approaches are very ...

    Distributed aop middleware for large-scale scenarios 

    Mondéjar Andreu, Rubén (Date of defense: 2010-04-29)

    En aquesta tesi doctoral presentem una proposta de middleware distribuït pel desenvolupament d'aplicacions de gran escala. La nostra motivació principal és permetre que les responsabilitats distribuïdes d'aquestes aplicacions, ...

    Research on security and privacy in vehicular ad hoc networks 

    Zhang, Lei (Date of defense: 2010-07-05)

    Los sistemas de redes ad hoc vehiculares (VANET) tienen como objetivo proporcionar una plataforma para diversas aplicaciones que pueden mejorar la seguridad vial, la eficiencia del tráfico, la asistencia a la conducción, ...

    Supervised and unsupervised segmentation of textured images by efficient multi-level pattern classification 

    Meléndez Rodríguez, Jaime Christian (Date of defense: 2010-10-08)

    This thesis proposes new, efficient methodologies for supervised and unsupervised image segmentation based on texture information. For the supervised case, a technique for pixel classification based on a multi-level strategy ...

    Contribution to the study of alliances in graphs 

    González Yero, Ismael (Date of defense: 2010-12-13)

    Contribution to the study of alliances in graphs.<br/><br/>Resumen<br/><br/><br/>En este trabajo se estudian propiedades matemáticas de las alianzas (defensivas, ofensivas y duales) en grafos. Entre los temas tratados se ...

    Semantic networks and cognitive dynamics 

    Borge Holthoefer, Javier (Date of defense: 2011-01-28)

    Seguint una concepció clàssica de la Intel•ligència Artificial (aquella que es posava com horitzó una definició dels mecanismes cognitius i la seva implementació en computadors), aquesta tesi s'endinsa en el problema de ...

    Ontology based semantic clustering 

    Batet Sanromà, Montserrat (Date of defense: 2011-02-15)

    Els algoritmes de clustering desenvolupats fins al moment s’han centrat en el processat de dades numèriques i categòriques, no considerant dades textuals. Per manegar adequadament aquestes dades, es necessari interpretar ...

    Algorithms acceleration of pattern-matching in multi-core architectures 

    Rodenas Pico, David (Date of defense: 2011-07-08)

    L'objectiu d'aquesta tesis es crear o adaptar models de programació per a fer els processadors multi-core accessibles per a la majoria de programadors. Aquest objectiu inclou la possibilitat de reusar els algoritmes ...

    On the design and optimization of heterogeneous distributed storage systems 

    Pàmies Juárez, Lluís (Date of defense: 2011-07-19)

    Durant la última dècada, la demanda d’emmagatzematge de dades ha anat creixent exponencialment any rere any. Apart de demanar més capacitat d’emmagatzematge, el usuaris actualment també demanen poder accedir a les seves ...

    Combinatorial structures for anonymous database search 

    Stokes, Klara (Date of defense: 2011-10-18)

    This thesis treats a protocol for anonymous database search (or if one prefer, a protocol for user-private information retrieval), that is based on the use of combinatorial configurations. The protocol is called P2P UPIR. ...

    Graph matching using position coordinates and local features for image analysis 

    Sanromà Güell, Gerard (Date of defense: 2012-02-14)

    Encontrar las correspondencias entre dos imágenes es un problema crucial en el campo de la visión por ordenador i el reconocimiento de patrones. Es relevante para un amplio rango de propósitos des de aplicaciones de ...

    Privacy in rfid and mobile objects 

    Trujillo Rasúa, Rolando (Date of defense: 2012-06-21)

    Los sistemas RFID permiten la identificación rápida y automática de etiquetas RFID a través de un canal de comunicación inalámbrico. Dichas etiquetas son dispositivos con cierto poder de cómputo y capacidad de almacenamiento ...

    Multiple graph matching and applications 

    Solé Ribalta, Albert (Date of defense: 2012-07-11)

    En aplicaciones de reconocimiento de patrones, los grafos con atributos son en gran medida apropiados. Normalmente, los vértices de los grafos representan partes locales de los objetos i las aristas relaciones entre estas ...

    Collected results on semigroups, graphs and codes 

    Vico Oton, Albert (Date of defense: 2012-10-22)

    In this thesis we present a compendium of _ve works where discrete mathematics play a key role. The _rst three works describe di_erent developments and applications of the semigroup theory while the other two have more ...

    Knowledge-based incremental induction of clinical algorithms 

    López Vallverdú, Joan Albert (Date of defense: 2012-12-14)

    The current approaches for the induction of medical procedural knowledge suffer from several drawbacks: the structures produced may not be explicit medical structures, they are only based on statistical measures that do ...

    Ontology based semantic anonymisation of microdata 

    Martínez Lluís, Sergio (Date of defense: 2013-02-26)

    The exploitation of microdata compiled by statistical agencies is of great interest for the data mining community. However, such data often include sensitive information that can be directly or indirectly related to ...

    Simultaneous discrimination prevention and privacy protection in data publishing and mining 

    Hajian, Sara (Date of defense: 2013-06-10)

    Data mining is an increasingly important technology for extracting useful knowledge hidden in large collections of data. There are, however, negative social perceptions about data mining, among which potential privacy ...

    Improving data utility in differential privacy and k-anony mity 

    Soria Comas, Jorge (Date of defense: 2013-06-14)

    We deal with SDC from the computer science community perspective. The focus lies on two mainstream privacy models: k-anonymity and differential privacy. Once a privacy model has been selected, the goal is to enforce it ...

    Dynamic adaptation of user profiles in recommender systems 

    Marín Isern, Lucas (Date of defense: 2013-07-09)

    In a period of time in which the content available through the Internet increases exponentially and is more easily accessible every day, techniques for aiding the selection and extraction of important and personalised ...