Now showing items 41-60 of 114

    Contributions based on cross-layer design for quality-of-service provisioning over DVB-S2/RCS broadband satellite system 

    Rendón Morales, Elizabeth (Date of defense: 2013-03-21)

    Contributions based on cross-layer design for Quality-of-Service provisioning over DVB-S2/RCS Broadband Satellite Systems Nowadays, geostationary (GEO) satellite infrastructure plays a crucial role for the provisioning of ...

    Security protocols suite for machine-to-machine systems 

    Bartoli, Andrea (Date of defense: 2013-06-18)

    Nowadays, the great diffusion of advanced devices, such as smart-phones, has shown that there is a growing trend to rely on new technologies to generate and/or support progress; the society is clearly ready to trust on ...

    Contribution to design a communication framework for vehicular ad hoc networks in urban scenarios 

    Tripp Barba, Carolina (Date of defense: 2013-06-20)

    The constant mobility of people, the growing need to be always connected, the large number of vehicles that nowadays can be found in the roads and the advances in technology make Vehicular Ad hoc Networks (VANETs) be a ...

    Study, evaluation and contributions to new algorithms for the embedding problem in a network virtualization environment 

    Botero Vega, Juan Felipe (Date of defense: 2013-06-21)

    Network virtualization is recognized as an enabling technology for the future Internet. It aims to overcome the resistance of the current Internet to architectural change and to enable a new business model decoupling the ...

    Certificate status information distribution and validation in vehicular networks 

    Hernández Gañán, Carlos (Date of defense: 2013-09-04)

    Vehicular ad hoc networks (VANETs) are emerging as an functional technology for providing a wide range of applications to vehicles and passengers. Ensuring secure functioning is one of the prerequisites for deploying ...

    On codes for traceability schemes: constructions and bounds 

    Moreira Sánchez, José (Date of defense: 2013-11-13)

    A traceability or fingerprinting scheme is a cryptographic scheme that facilitates the identification of the source of leaked information. In a fingerprinting setting, a distributor delivers copies of a given content to a ...

    Resource management research in ethernet passive optical networks 

    Garfias Hernández, Paola (Date of defense: 2013-11-25)

    The last decades, we have witnessed different phenomenology in the telecommunications sector. One of them is the widespread use of the Internet, which has brought a sharp increase in traffic, forcing suppliers to continuously ...

    Privacy protection of user profiles in personalized information systems 

    Parra Arnau, Javier (Date of defense: 2013-12-02)

    In recent times we are witnessing the emergence of a wide variety of information systems that tailor the information-exchange functionality to meet the specific interests of their users. Most of these personalized information ...

    New Architectures for ubiquitous networks : use and adaptation of internet protocols over wireless sensor networks 

    Ludovici, Alessandro (Date of defense: 2014-07-07)

    This thesis focuses on the study of low-resource demanding protocols, communication techniques and software solutions to evaluate, optimise and implement Web service in WSNs. We start analysing the Web service architectures ...

    Traffic and mobility management in large-scale networks of small cells 

    Ferragut Martínez-Vara de Rey, Jaime (Date of defense: 2014-07-29)

    The growth in user demand for higher mobile data rates is driving Mobile Network Operators (MNOs) and network infrastructure vendors towards the adoption of innovative solutions in areas that span from physical layer ...

    Contributions to the performance evaluation and improvement of the IPv6 routing protocol for low-power and lossy networks 

    Kermajani, Hamidreza (Date of defense: 2014-09-03)

    Wireless Sensor Networks (WSNs) have become increasingly important. These networks comprise sensor and actuator nodes that enable intelligent monitoring and control applications in a wide spectrum of environments including ...

    Contribution to the improvement of the performance of wireless mesh networks providing real time services 

    Vázquez Rodas, Andrés Marcelo (Date of defense: 2015-02-13)

    Nowadays, people expectations for ubiquitous connectivity is continuously growing. Cities are now moving towards the smart city paradigm. Electricity companies aims to become part of smart grids. Internet is no longer ...

    Wake-up radio systems : design, development, performance evaluation and comparison to conventional medium access control protocols for wireless sensor networks 

    Oller i Bosch, Joaquim (Date of defense: 2015-03-06)

    During the recent years, the research related to Wake-up Radio (WuR) systems has gained noticeable interest. In WuR systems, a node initiating a communication first sends a Wake-up Call (WuC) by means of its Wake-up ...

    Handoff management for infotainment services over vehicular networks 

    Reñé Vicente, Sergi (Date of defense: 2015-06-26)

    Intelligent Transportation Systems (ITS) has impulsed the vehicular communications at the present time. The vehicular communications field is a hot research topic and is attracting a great interest in the automotive industry ...

    Improvements to end-to-end performance of low-power wireless networks 

    Betzler, August (Date of defense: 2015-07-07)

    Over the last decades, wireless technologies have become an important part of our daily lives. A plentitude of new types of networks based on wireless technologies have emerged, often replacing wired solutions. In this ...

    Contributions to the algorithms and methodologies for virtual infrastructure provisioning 

    Ferrer Riera, Jordi (Date of defense: 2016-01-20)

    Virtualization is defined as the process consisting of building a virtual resource on top of one or several physical resources, depending on the selected paradigm: aggregation or partitioning. From the net- working ...

    Secure identity management in structured peer-to-peer (P2P) networks 

    Caubet Fernández, Juan (Date of defense: 2016-01-25)

    Structured Peer-to-Peer (P2P) networks were proposed to solve routing problems of big distributed infrastructures. But the research community has been questioning their security for years. Most prior work in security ...

    Topologías para la distribución de contenidos en redes de comunicación 

    Machado Sánchez, Sergio (Date of defense: 2016-02-03)

    The peer-to-peer (P2P) overlay networks are distribution topologies that take advantage of the ability that their nodes have to forward the information that they receive. For the particular case of video transmission using ...

    Individual verifiability in electronic voting 

    Guasch Castelló, Sandra (Date of defense: 2016-02-05)

    This PhD Thesis is the fruit of the job of the author as a researcher at Scytl Secure Electronic Voting, as well as the collaboration with Paz Morillo, from the Department of Applied Mathematics at UPC and Alex Escala, PhD ...

    Contributions to the routing of traffic flows in multi-hop IEEE 802.11 wireless networks 

    Catalán Cid, Miguel (Date of defense: 2016-02-10)

    The IEEE 802.11 standard was not initially designed to provide multi-hop capabilities. Therefore, providing a proper traffic performance in Multi-Hop IEEE 802.11 Wireless Networks (MIWNs) becomes a significant challenge. ...