Now showing items 341-360 of 361

    The use of computational intelligence for security in named data networking 

    Karami, Amin (Date of defense: 2015-02-16)

    Information-Centric Networking (ICN) has recently been considered as a promising paradigm for the next-generation Internet, shifting from the sender-driven end-to-end communication paradigma to a receiver-driven content ...

    A time-predictable many-core processor design for critical real-time embedded systems 

    Panić, Miloš (Date of defense: 2018-05-25)

    Critical Real-Time Embedded Systems (CRTES) are in charge of controlling fundamental parts of embedded system, e.g. energy harvesting solar panels in satellites, steering and breaking in cars, or flight management systems ...

    A time-predictable parallel programing model for real-time systems 

    Serrano, Maria A. (Date of defense: 2019-03-13)

    The recent technological advancements and market trends are causing an interesting phenomenon towards the convergence of the high-performance and the embedded computing domains. Critical real-time embedded systems are ...

    Towards cognitive in-operation network planning 

    Morales Alcaide, Fernando (Date of defense: 2018-06-15)

    Next-generation internet services such as live TV and video on demand require high bandwidth and ultra-low latency. The ever-increasing volume, dynamicity and stringent requirements of these services’ demands are generating ...

    Towards instantaneous performance analysis using coarse-grain sampled and instrumented data 

    Servat Gelabert, Harald (Date of defense: 2015-07-31)

    Nowadays, supercomputers deliver an enormous amount of computation power; however, it is well-known that applications only reach a fraction of it. One limiting factor is the single processor performance because it ultimately ...

    Towards lightweight and high-performance hardware transactional memory 

    Tomić, Sasa (Date of defense: 2012-07-13)

    Conventional lock-based synchronization serializes accesses to critical sections guarded by the same lock. Using multiple locks brings the possibility of a deadlock or a livelock in the program, making parallel programming ...

    Towards LoRa mesh networks for the IoT 

    Pueyo Centelles, Roger (Date of defense: 2021-11-12)

    There are several LPWAN radio technologies providing wireless communication to the billions of connected devices that form the so-called IoT. Among them, LoRa has emerged in recent years as a popular solution for low power ...

    Towards multiprogrammed GPUs 

    Tanasić, Ivan (Date of defense: 2017-02-17)

    Programmable Graphics Processing Units (GPUs) have recently become the most pervasitheve massively parallel processors. They have come a long way, from fixed function ASICs designed to accelerate graphics tasks to a ...

    Towards resilient wireless networks: mesh backhauls for 5G ultra-dense networks and rural Internet service provision 

    Gemmi, Gabriele (Date of defense: 2024-02-22)

    (English) This thesis aims to investigate the efficacy and applicability of Wireless Backhaul Network (WBN) in two divergent contexts: ultra-dense urban networks for 5G and connectivity solutions for rural or digitally ...

    Towards resource-aware computing for task-based runtimes and parallel architectures 

    Chasapis, Dimitrios (Date of defense: 2019-04-24)

    Current large scale systems show increasing power demands, to the point that it has become a huge strain on facilities and budgets. The increasing restrictions in terms of power consumption of High Performance Computing ...

    Trade-off among timeliness, messages and accuracy for large-Ssale information management 

    Brunner, René (Date of defense: 2011-11-18)

    The increasing amount of data and the number of nodes in large-scale environments require new techniques for information management. Examples of such environments are the decentralized infrastructures of Computational ...

    Traffic Management of the ABR. Service Category in ATM Networks 

    Cerdà Alabern, Llorenç (Date of defense: 2000-01-13)

    Data traffic has emerged as a big challenge for the standardization of traffic management mechanisms in ATM networks. In April 1996 the ATM Forum published the first version of the Available Bit Rate Service Category (ABR) ...

    Transparent management of scratchpad memories in shared memory programming models 

    Álvarez Martí, Lluc (Date of defense: 2015-12-16)

    Cache-coherent shared memory has traditionally been the favorite memory organization for chip multiprocessors thanks to its high programmability. In this organization the cache hierarchy is in charge of moving the data and ...

    Ultra low-power, high-performance accelerator for speech recognition 

    Yazdani Aminabadi, Reza (Date of defense: 2019-07-25)

    Automatic Speech Recognition (ASR) is undoubtedly one of the most important and interesting applications in the cutting-edge era of Deep-learning deployment, especially in the mobile segment. Fast and accurate ASR comes ...

    Una contribució al càlcul de valors i vectors propis i a l'anàlisi de l'escalabilitat 

    Royo Vallés, Dolors (Date of defense: 1999-01-27)

    El càlcul de valors i vectors propis és un nucli computacional que forma part de diverses aplicacions de tipus científic i tècnic que requereixen una potència de càlcul molt gran. Aquestes aplicacions no poden resoldre's ...

    Use of locator/identifier separation to improve the future internet routing system 

    Jakab, Loránd (Date of defense: 2011-07-04)

    The Internet evolved from its early days of being a small research network to become a critical infrastructure many organizations and individuals rely on. One dimension of this evolution is the continuous growth of the ...

    Variational multiscale stabilization and local preconditioning for compressible flow 

    Moragues Ginard, Margarida (Date of defense: 2016-01-22)

    This thesis is about the stabilization of the numerical solution of the Euler and Navier- Stokes equations of compressible flow. When simulating numerically the flow equations, if no stabilization is added, the solution ...

    "Virtual malleability" applied to MPI jobs to improve their execution in a multiprogrammed environment" 

    Utrera Iglesias, Gladys Miriam (Date of defense: 2007-12-10)

    This work focuses on scheduling of MPI jobs when executing in shared-memory multiprocessors (SMPs). <br/>The objective was to obtain the best performance in response time in multiprogrammed multiprocessors systems using ...

    Virtualization techniques for memory resource exploitation 

    Garrido Platero, Luis Angel (Date of defense: 2019-11-26)

    Cloud infrastructures have become indispensable in our daily lives with the rise of cloud-based services offered by companies like Facebook, Google, Amazon and many others. These cloud infrastructures use a large numbers ...

    Visible, near infrared and thermal hand-based image biometric recognition 

    Font Aragonès, Xavier (Date of defense: 2013-05-30)

    Biometric Recognition refers to the automatic identification of a person based on his or her anatomical characteristic or modality (i.e., fingerprint, palmprint, face) or behavioural (i.e., signature) characteristic. It ...