Contribution to the traffc engineering in wireless mesh networks 

    Astudillo León, Juan Pablo (Date of defense: 2020-06-09)

    Nowadays, we live in a modern society in which people and devices are interconnected anywhere and anytime. Under this premise, both the infrastructure and the services offered have evolved and diversified in a drastic way. ...

    Contributions to presence-based systems for deploying ubiquitous communication services 

    Beltrán Martínez, Victoria (Date of defense: 2011-12-16)

    Next-Generation Networks (NGNs) will converge the existing fixed and wireless networks. These networks rely on the IMS (IP Multimedia Subsystem), introduced by the 3GPP. The presence service came into being in instant ...

    Efficient sharing mechanisms for virtualized multi-tenant heterogeneous networks 

    Vincenzi, Matteo (Date of defense: 2022-07-18)

    The explosion in data traffic, the physical resource constraints, and the insufficient financial incentives for deploying 5G networks, stress the need for a paradigm shift in network upgrades. Typically, operators are also ...

    On codes for traceability schemes: constructions and bounds 

    Moreira Sánchez, José (Date of defense: 2013-11-13)

    A traceability or fingerprinting scheme is a cryptographic scheme that facilitates the identification of the source of leaked information. In a fingerprinting setting, a distributor delivers copies of a given content to a ...

    Privacy in online advertising platforms 

    Estrada Jiménez, José Antonio (Date of defense: 2020-10-02)

    Online advertising is consistently considered as the pillar of the "free• content on the Web since it is commonly the funding source of websites. Furthermore, the option of delivering personalizad ads has tumed advertising ...

    Resource allocation and management techniques for network slicing in WiFi networks 

    Richart, Matías (Date of defense: 2019-11-01)

    Network slicing has recently been proposed as one of the main enablers for 5G networks; it is bound to cope with the increasing and heterogeneous performance requirements of these systems. To "slice'' a network is to ...