Graphic summary
  • Show / hide key
  • Information


Scientific and technological production
  •  

1 to 50 of 59 results
  • Atomic Services-based Internet Architecture for Constrained and Ubiquitous Networks (ASIACUN)

     Gomez Montenegro, Carlos; Calveras Auge, Ana M.; Paradells Aspas, Jose; Casademont Serra, Jordi; Lopez Aguilera, Maria Elena; Garcia Villegas, Eduard; Vidal Ferre, Rafael; Demirkol, Ilker Seyfettin; Casals Ibañez, Lluis; Ruiz, Pedro M.; Cotrina Navau, Josep; Oller Bosch, Joaquim; Gorricho Moreno, Juan Luis; BETZLER, AUGUST
    Competitive project

     Share

  • Indoor location on uncoordinated environments

     Gorricho Moreno, Juan Luis; Cotrina Navau, Josep
    Electronics Letters
    Vol. 47, num. 20, p. 1153-1154
    DOI: 10.1049/el.2011.1848
    Date of publication: 2011-09-29
    Journal article

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • Alternatives for indoor location estimation on uncoordinated environments

     Gorricho Moreno, Juan Luis; Cotrina Navau, Josep
    IEEE International Conference on High Performance Computing and Communications
    p. 971-976
    Presentation's date: 2011-09-02
    Presentation of work at congresses

    Read the abstract Read the abstract View View Open in new window  Share Reference managers Reference managers Open in new window

    Approaches based on signal-strength measurements are at present the most popular on indoor location due to their reasonable accuracy and cost effective deployment. In this paper, we present an outlook of our research on different alternatives to implement an indoor location approach based on signal-strength measurements for an uncoordinated environment, an environment where we do not have any control on the number of access points, their location, availability or transmitted power.

  • Monitoring a user activity using a mobile device

     Gorricho Moreno, Juan Luis; Cotrina Navau, Josep; Rersa, Marc; Brezmes, Tomas
    Date of request: 2011-06-29
    Invention patent

     Share Reference managers Reference managers Open in new window

  • NUEVAS ARQUITECTURAS PARA INTERNET UBICUA: DISEÑO Y EVALUACION

     Vidal Ferre, Rafael; Cotrina Navau, Josep; Paradells Aspas, Jose; Casademont Serra, Jordi; Garcia Villegas, Eduard; Casals Ibañez, Lluis; Lopez Aguilera, Maria Elena; Gomez Montenegro, Carlos; Calveras Auge, Ana M.
    Competitive project

     Share

  • Access to the full text
    Surveillance with alert management system using conventional cell phones  Open access

     Gorricho Moreno, Juan Luis; Brezmes, Tomas; Cotrina Navau, Josep; Rersa, Marc
    International Multi-Conference on Computing in the Global Information Technology
    p. 450-455
    DOI: 10.1109/ICCGI.2010.54
    Presentation's date: 2010-09-22
    Presentation of work at congresses

    Read the abstract Read the abstract Access to the full text Access to the full text Open in new window  Share Reference managers Reference managers Open in new window

    In the present paper we expose the development of a real-time monitoring prototype of human activities using a single cell phone equipped with some sensors. The monitoring system is reduced to the minimum expression; no special hardware is required as far as a conventional cell phone will monitor the user, classify the user activities with respect to a customized rule’s set, and finally trigger the corresponding alerts, when necessary.

  • A note about the identifier parent property in Reed-Solomon codes

     Fernandez Muñoz, Marcel; Cotrina Navau, Josep; Soriano Ibáñez, Miguel; Domingo, Neus
    Computers and security
    Vol. 29, num. 5, p. 628-635
    DOI: 10.1016/j.cose.2009.12.012
    Date of publication: 2010-07
    Journal article

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • A family of asymptotically good binary fingerprinting codes

     Cotrina Navau, Josep; Fernandez Muñoz, Marcel
    IEEE transactions on information theory
    Vol. 56, num. 10, p. 5335-5343
    DOI: 10.1109/TIT.2010.2059470
    Date of publication: 2010-10
    Journal article

    Read the abstract Read the abstract View View Open in new window  Share Reference managers Reference managers Open in new window

    A fingerprinting code is a set of codewords that are embedded in each copy of a digital object with the purpose of making each copy unique. If the fingerprinting code is c-secure with error, then the decoding of a pirate word created by a coalition of at most c dishonest users, will expose at least one of the guilty parties with probability 1-ϵ. The Boneh-Shaw fingerprinting codes are n-secure codes with ϵB error, where n also denotes the number of authorized users. Unfortunately, the length the Boneh-Shaw codes should be of order O(n3 log(n/ϵB)), which is prohibitive for practical applications. In this paper, we prove that the Boneh-Shaw codes are (c<; n)-secure for lengths of order O(nc2 log(n/ϵB)). Moreover, in this paper it is also shown how to use these codes to construct binary fingerprinting codes of length L=O(c6 log(c/ϵ) log n), with probability of error ϵ<;ϵB and an identification algorithm of complexity poly(log n)=poly(L). These results improve in some aspects the best known schemes and with a much more simple construction.

  • Propagation delay influence in IEEE 802.11 outdoor networks

     Lopez Aguilera, Maria Elena; Casademont Serra, Jordi; Cotrina Navau, Josep
    Wireless networks
    Vol. 16, num. 4, p. 1123-1142
    DOI: 10.1007/s11276-009-0192-z
    Date of publication: 2010-05
    Journal article

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • User activity monitoring using conventional cell phones  Open access

     Brezmes, Tomas; Gorricho Moreno, Juan Luis; Cotrina Navau, Josep; Rersa, Marc
    The International Multi-Conference on Complexity, Informatics and Cybernetics
    Presentation's date: 2010-04-09
    Presentation of work at congresses

    Read the abstract Read the abstract Access to the full text Access to the full text Open in new window  Share Reference managers Reference managers Open in new window

    User activity monitoring has a considerable potential for a whole range of new applications in different environments: user surveillance, military purposes, health-care, etc. More precisely, in health-care there is an implicit potential application monitoring elderly people or patients suffering an illness. Besides, nowadays our society is more than ever exposed to an aging population, which is one of the main concerns of present administrations. Any technical approach alleviating the ever increasing health-care budget will be welcomed. Thankfully, recent progress in communication technologies and sensor miniaturization has opened the door to new approaches overcoming the above mentioned situation, involving, for example, remote supervision of home-confined elderly people. In particular, a real-time monitoring system of human activities would be an interesting solution to supervise aged people or people deserving medical attention. In the present paper we expose the development of a real-time monitoring system of human activities using a single cell phone equipped with some sensors. This way the monitoring system is reduced to the minimum expression, no especial hardware is required, as far as a conventional cell phone will monitor the user, classify the user activities with respect to a customized rule’s set and finally trigger the corresponding alerts when necessary

  • activity recognition from accelerometer data on a mobile phone

     Gorricho Moreno, Juan Luis; Cotrina Navau, Josep
    Lecture notes in computer science
    Vol. LNCS, num. 5518, p. 796-799
    DOI: 10.1007/978-3-642-02481-8_120
    Date of publication: 2009-06
    Journal article

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • On the IPP Properties of Reed-Solomon Codes

     Fernandez Muñoz, Marcel; Cotrina Navau, Josep; Soriano Ibáñez, Miguel; Domingo, N
    IFIP Advances in Information and Communication Technology
    Vol. 297, num. -, p. 87-97
    DOI: 10.1007/978-3-642-01244-0_8
    Date of publication: 2009-01
    Journal article

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • On the IPP properties of Reed-Solomon codes

     Fernandez Muñoz, Marcel; Cotrina Navau, Josep; Soriano Ibáñez, Miguel; Domingo, Neus
    International Information Security Conference
    p. 87-97
    DOI: 10.1007/978-3-642-01244-0_8
    Presentation's date: 2009-05
    Presentation of work at congresses

    Read the abstract Read the abstract View View Open in new window  Share Reference managers Reference managers Open in new window

    Codes with traceability properties are used in schemes where the identification of users that illegally redistribute content is required. For any code with traceability properties, the Identifiable Parent Property (c-IPP) seems to be less restrictive than the Traceability (c-TA) property. In this paper, we show that for Reed-Solomon codes both properties are in many cases equivalent. More precisely, we show that for an [n,k,d] Reed-Solomon code, defined over a field that contains the n¿-¿d roots of unity, both properties are equivalent. This answers a question posted by Silverberg et al. in [10,11], for a large family of Reed-Solomon codes.

  • Method and system for transmitting dynamic road traffic data to a user terminal

     Gorricho Moreno, Juan Luis; Cotrina Navau, Josep; Brezmes, Tomas; Rersa, Marc
    Date of request: 2009-06-23
    Invention patent

     Share Reference managers Reference managers Open in new window

  • On the traceability properties of linear and Chinese Remainder Theorem codes

     Cotrina Navau, Josep; Fernandez Muñoz, Marcel; Soriano Ibáñez, Miguel; Domingo, N
    10th International Conference on Information Security and Cryptology
    p. 251-258
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Sobre la justicia en las redes IEEE 802.11e: Desincronización de su mecanismo de acceso al medio

     Lopez Aguilera, Maria Elena; Casademont Serra, Jordi; Cotrina Navau, Josep
    Jornadas de Ingeniería Telemática
    p. 305-312
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Diccionari de Telecomunicacions

     Aguilar Igartua, Mónica; Alcober Segura, Jesus Angel; Altes Bosch, Jorge; Aragones Cervera, Xavier; Artigas Garcia, David; Bardes Llorensi, Daniel; Barlabe Dalmau, Antoni; Bragos Bardia, Ramon; Calderer Cardona, Josep; Cardama Aznar, Angel; Casademont Serra, Jordi; Casals Ibañez, Lluis; Comeron Tejero, Adolfo; Cotrina Navau, Josep; Cruz Llopis, Luis Javier de La; Dios Otin, Victor Federico; Duxans Barrobes, Helena; Esparza Martin, Oscar; Esquerra Llucià, Ignasi; Garcia Vizcaino, David; Garcies Salva, Pau; Gomez Montenegro, Carlos; Gorricho Moreno, Juan Luis; Guinjoan Gispert, Francisco; Hesselbach Serra, Xavier; Liria Righetti, Antoni; Lopez Salcedo, Jose Antonio; Madrenas Boadas, Jordi; Madueño Ruiz, María Isabel; Mestre Pons, Francesc Xavier; Monte Moreno, Enrique; Morros Rubió, Josep Ramon; Muñoz Tapia, Jose Luis; Pallares Segarra, Esteve; Pons Nin, Joan; Recolons Martos, Jaume; Rincon Rivera, David; Riu Costa, Pere Joan; Ruiz Vela, Inmaculada; Pradell Cara, Lluis; Pascual Iserte, Antonio; Prat Viñas, Luis; Rey Micolau, Francesc; Villares Piera, N. Javier
    Date of publication: 2007-03
    Book

     Share Reference managers Reference managers Open in new window

  • Access to the full text
    Sobre la justicia en las redes IEEE 802.11e: desincronización de su mecanismo de acceso al medio  Open access

     López-Aguilera, E; Lopez Aguilera, Maria Elena; Casademont Serra, Jordi; Cotrina Navau, Josep
    Revista IEEE América Latina
    Vol. 5, num. 6, p. 471-478
    Date of publication: 2007-10
    Journal article

    Read the abstract Read the abstract Access to the full text Access to the full text Open in new window  Share Reference managers Reference managers Open in new window

    Since the advent of the first IEEE 802.11 standard, several papers have proposed means of providing QoS to IEEE 802.11 networks and evaluate various traffic-prioritization mechanisms. Nevertheless, studies on the assignment of AIFS times defined in IEEE 802.11e reveal that the various priority levels work in a synchronized manner. The studies show that, under large loads of high-priority traffic, EDCA starves low-priority frames, which is undesirable. We argue that QoS traffic needs to be prioritized, but users sending best-effort frames should also obtain the expected service. High-priority traffic can also suffer performance degradation when using EDCA because of heavy loads of low-priority frames. Thus, we have proposed a mechanism based on desynchronizing the IEEE 802.11e working procedure. It prevents stations that belong to different priority classes from attempting simultaneous transmission, prioritizes independent collision groups and achieves better short-term and long-term channel access fairness. We have evaluated the proposal based on extensive analytical and simulation results. It prevents the strangulation of low-priority traffic, and, moreover, reduces the degradation of high-priority traffic with the increased presence of low-priority frames.

  • Tracing illegal redistribution using errors-and-erasures and side information decoding algorithms

     Fernandez Muñoz, Marcel; Soriano Ibáñez, Miguel; Cotrina Navau, Josep
    IET information security
    Vol. 1, num. 2, p. 83-90
    DOI: 10.1049/iet-ifs:20055145
    Date of publication: 2007-06
    Journal article

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • A class of non-linear asymptotic fingerprinting codes with epsilon-error

     Fernandez Muñoz, Marcel; Cotrina Navau, Josep; Soriano Ibáñez, Miguel
    Online information review
    Vol. 31, num. 1, p. 22-37
    DOI: 10.1108/14684520710731010
    Date of publication: 2007-01
    Journal article

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • A Note About the Traceability Properties of Linear Codes

     Fernandez Muñoz, Marcel; Cotrina Navau, Josep; Soriano Ibáñez, Miguel; Domingo, N
    Lecture notes in computer science
    Vol. 4817, p. 251-258
    DOI: 10.1007/978-3-540-76788-6_20
    Date of publication: 2007-11
    Journal article

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • A note about the traceability properties of linear codes

     Fernandez Muñoz, Marcel; Cotrina Navau, Josep; Soriano Ibáñez, Miguel; Domingo, Neus
    International Conference on Information Security and Cryptology
    p. 251-258
    DOI: 10.1007/978-3-540-76788-6_20
    Presentation's date: 2007-11
    Presentation of work at congresses

    Read the abstract Read the abstract View View Open in new window  Share Reference managers Reference managers Open in new window

    We characterize the traceability properties of linear codes. It is well known that any code of length n and minimum distance d is a c-TA code if c 2¿<¿n/(n¿-¿d). In this paper, we show that a less restrictive condition can be derived. In other words, there exists a value Z C , with n¿-¿d¿=¿Z C ¿=¿c(n¿-¿d), such that any linear code is c-TA if c¿<¿n/Z C . We also prove that in many cases this condition is also necessary. These results are applied to cyclic and Reed-Solomon codes.

    We characterize the traceability properties of linear codes. It is well known that any code of length n and minimum distance d is a c-TA code if c 2¿<¿n/(n¿-¿d). In this paper, we show that a less restrictive condition can be derived. In other words, there exists a value Z C , with n¿-¿d¿=¿Z C ¿=¿c(n¿-¿d), such that any linear code is c-TA if c¿<¿n/Z C . We also prove that in many cases this condition is also necessary. These results are applied to cyclic and Reed-Solomon codes.

  • Familias de códigos localizadores basadas en el Teorema Chino del Resto

     Cotrina Navau, Josep; Fernandez Muñoz, Marcel; Soriano Ibáñez, Miguel
    IX Reunion Española sobre Criptologia y Seguridad de la Informacion
    p. 361-369
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Families of traceability codes based on the Chinese Remainder Theorem

     Cotrina Navau, Josep; Fernandez Muñoz, Marcel; Casademont Serra, Jordi
    2006 IEEE Information Theory Workshop
    p. 121-125
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Obtaining Asymptotic Fingerprint Codes Through a New Analysis of the Boneh-Shaw Codes

     Fernandez Muñoz, Marcel; Cotrina Navau, Josep
    Second SKLOIS Conference, Inscrypt 2006
    p. 289-303
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • N-Sided patches with B-Spline boundaries

     Pla Garcia, Nuria; Vigo Anglada, Marc; Cotrina Navau, Josep
    Computers & graphics
    Vol. 30, num. 6, p. 959-970
    Date of publication: 2006-12
    Journal article

     Share Reference managers Reference managers Open in new window

  • Obtaining Traceability Codes from Chinese Reminder Theorem Codes

     Fernandez Muñoz, Marcel; Soriano Ibáñez, Miguel; Cotrina Navau, Josep
    IEICE transactions on fundamentals of electronics communications and computer
    Vol. E89, num. 1, p. 227-230
    Date of publication: 2006-01
    Journal article

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • Obtaining Asymptotic Fingerprint Codes Through a New Analysis of the Boneh-Shaw Codes

     Fernandez Muñoz, Marcel; Cotrina Navau, Josep
    Lecture notes in computer science
    Vol. 4318, p. 289-303
    Date of publication: 2006-11
    Journal article

     Share Reference managers Reference managers Open in new window

  • Practical Scenarios for the van Trung-Martirosyan Codes

     Fernandez Muñoz, Marcel; Soriano Ibáñez, Miguel; Cotrina Navau, Josep
    International Conference on Computational Science and its Applications (ICCSA 05) & International Workshop on Information Security & Hiding (ISH '05)
    p. 624-633
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information

     Soriano Ibáñez, Miguel; Fernandez Muñoz, Marcel; Cotrina Navau, Josep
    Digital Watermarking: 4th International Workshop
    p. 231-243
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Performance enhancement of WLAN IEEE 802.11 for asymmetric traffic

     Lopez Aguilera, Maria Elena; Casademont Serra, Jordi; Cotrina Navau, Josep; Rojas Espinosa, Alfonso
    IEEE International Symposium on Personal Indoor and Mobile Radio Communications
    p. 1463-1467
    Presentation's date: 2005-09-01
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Performance enhancement of outdoor IEEE 802.11 cellular networks

     Lopez Aguilera, Maria Elena; Casademont Serra, Jordi; Rojas Espinosa, Alfonso; Cotrina Navau, Josep
    The IASTED International Conference on Wireless Networks and Emerging Technologies
    Presentation's date: 2005-07-01
    Presentation of work at congresses

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • A Family of Collusion 2-Secure Codes

     Cotrina Navau, Josep; Fernandez Muñoz, Marcel; Soriano Ibáñez, Miguel
    International Conference on Computational Science and its Applications (ICCSA 05) & International Workshop on Information Security & Hiding (ISH '05)
    p. 387-397
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Enhancement proposal for WLAN IEEE 802.11e: Desynchronization of its Working Procedure

     Lopez Aguilera, Maria Elena; Casademont Serra, Jordi; Cotrina Navau, Josep; Rojas Espinosa, Alfonso
    14th IEEE Workshop on Local and Metropolitan Area Networks, 2005
    Presentation's date: 2005-09-01
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Equidistant Binary Fingerprinting Codes. Existence and Identification Algorithms

     Fernandez Muñoz, Marcel; Soriano Ibáñez, Miguel; Cotrina Navau, Josep
    International Conference on Computational Science and its Applications (ICCSA 05) & International Workshop on Information Security & Hiding (ISH '05)
    p. 527-536
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Tracing traitors by guessing secrets. The q-ary case

     Fernandez Muñoz, Marcel; Soriano Ibáñez, Miguel; Cotrina Navau, Josep
    Lecture notes in computer science
    Vol. 3439, p. 61-73
    DOI: 10.1007/978-3-540-31979-5_6
    Date of publication: 2005-04
    Journal article

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • A New Class of Codes for Fingerprinting Schemes

     Fernandez Muñoz, Marcel; Soriano Ibáñez, Miguel; Cotrina Navau, Josep
    Lecture notes in computer science
    Vol. 3439, p. 398-409
    DOI: 10.1007/978-3-540-31979-5_34
    Date of publication: 2005-04
    Journal article

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • Practical Scenarios for the van Trung-Martirosyan Codes

     Fernandez Muñoz, Marcel; Soriano Ibáñez, Miguel; Cotrina Navau, Josep
    Lecture notes in computer science
    Vol. 3481, p. 624-633
    DOI: 10.1007/11424826_66
    Date of publication: 2005-05
    Journal article

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • Equidistant Binary Fingerprinting Codes. Existence and Identification Algorithms

     Fernandez Muñoz, Marcel; Soriano Ibáñez, Miguel; Cotrina Navau, Josep
    Lecture notes in computer science
    Vol. 3481, p. 527-536
    DOI: 10.1007/11424826_56
    Date of publication: 2005-05
    Journal article

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information

     Soriano Ibáñez, Miguel; Fernandez Muñoz, Marcel; Cotrina Navau, Josep
    Lecture notes in computer science
    Vol. 3710, p. 231-243
    DOI: 10.1007/11551492_18
    Date of publication: 2005-09
    Journal article

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • A Family of Collusion 2-Secure Codes

     Cotrina Navau, Josep; Fernandez Muñoz, Marcel; Soriano Ibáñez, Miguel
    Lecture notes in computer science
    Vol. 3727, p. 387-397
    DOI: 10.1007/11558859_28
    Date of publication: 2005-06
    Journal article

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • Tracing traitors by guessing secrets. The q-ary case

     Fernandez Muñoz, Marcel; Soriano Ibáñez, Miguel; Cotrina Navau, Josep
    Information Security Practice and Experience Conference
    p. 61-73
    DOI: 10.1007/978-3-540-31979-5_6
    Presentation's date: 2005
    Presentation of work at congresses

    Read the abstract Read the abstract View View Open in new window  Share Reference managers Reference managers Open in new window

    In this paper we present, by solving a variant of the guessing secrets problem defined by Chung, Graham and Leighton [3], a sequential traitor tracing scheme equipped with an efficient identification algorithm. Sequential traitor tracing schemes are used to detect piracy in multimedia content broadcast systems, where the traitors illegally rebroadcast the content they receive to unauthorized users.

    In this paper we present, by solving a variant of the guessing secrets problem defined by Chung, Graham and Leighton [3], a sequential traitor tracing scheme equipped with an efficient identification algorithm. Sequential traitor tracing schemes are used to detect piracy in multimedia content broadcast systems, where the traitors illegally rebroadcast the content they receive to unauthorized users.

  • A new class of codes for fingerprinting schemes

     Fernandez Muñoz, Marcel; Soriano Ibáñez, Miguel; Cotrina Navau, Josep
    Information Security Practice and Experience Conference
    p. 398-409
    DOI: 10.1007/978-3-540-31979-5_34
    Presentation's date: 2005-09-20
    Presentation of work at congresses

    Read the abstract Read the abstract View View Open in new window  Share Reference managers Reference managers Open in new window

    In this paper we discuss the problem of collusion secure fingerprinting. In the first part of our contribution we prove the existence of equidistant codes that can be used as fingerprinting codes. Then we show that by giving algebraic structure to the equidistant code, the tracing process can be accomplished by passing a modified version of the Viterbi algorithm through the trellis representing the code.

    In this paper we discuss the problem of collusion secure fingerprinting. In the first part of our contribution we prove the existence of equidistant codes that can be used as fingerprinting codes. Then we show that by giving algebraic structure to the equidistant code, the tracing process can be accomplished by passing a modified version of the Viterbi algorithm through the trellis representing the code.

  • Multisided patches

     Pla Garcia, Nuria; Vigo Anglada, Marc; Cotrina Navau, Josep
    Date: 2004-06
    Report

     Share Reference managers Reference managers Open in new window

  • Outdoor IEEE 802.11g Cellular Network Performance

     Lopez-Aguilera, Elena; Lopez Aguilera, Maria Elena; Casademont Serra, Jordi; Cotrina Navau, Josep
    IEEE Global Communications Conference
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Evaluación de IEEE 802.11g en un entorno celular exterior

     López-Aguilera, E; Lopez Aguilera, Maria Elena; Casademont Serra, Jordi; Cotrina Navau, Josep
    XIV Jornadas Telecom I+D 2004
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Study of asymmetric traffic influence on IEEE 802.11 WLAN family, enhancement proposals

     López-Aguilera, E; Lopez Aguilera, Maria Elena; Casademont Serra, Jordi; Cotrina Navau, Josep
    13th IEEE Workshop on Local and Metropolitan Area Networks
    p. 45-50
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Wireless technology applied to GIS Systems

     Casademont Serra, Jordi; Lopez Aguilera, Maria Elena; Paradells Aspas, Jose; Rojas Espinosa, Alfonso; Calveras Auge, Ana M.; Barceló Arroyo, Francisco; Cotrina Navau, Josep
    Computers and geosciences
    Vol. 30, num. 6, p. 671-682
    DOI: 10.1016/j.cageo.2004.02.004
    Date of publication: 2004-07
    Journal article

    Read the abstract Read the abstract View View Open in new window  Share Reference managers Reference managers Open in new window

    At present, there is a growing interest in wireless applications, due to the fact that the technology begins to support them at reasonable costs. In this paper, we present the technology currently available for use in wireless environments, focusing on Geographic Information Systems. As an example, we present a newly developed platform for the commercialization of advanced geographical information services for use in portable devices. This platform uses available mobile telephone networks and wireless local area networks, but it is completely scalable to new technologies such as third generation mobile networks. Users access the service using a vector map player that runs on a Personal Digital Assistant with wireless access facilities and a Global Positioning System receiver. Before accessing the information, the player will request authorization from the server and download the requested map from it, if necessary. The platform also includes a system for improving Global Positioning System localization with the Real Time Differential Global Positioning System, which uses short GSM messages as the transmission medium.

  • A generic approach to free form surface generation

     Cotrina Navau, Josep; Pla Garcia, Nuria; Vigo Anglada, Marc
    7th ACM Symposium on Solid Modelling and Applications
    p. 35-44
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Regular triangulations of dynamic sets of points

     Vigo Anglada, Marc; Pla Garcia, Nuria; Cotrina Navau, Josep
    Computer aided geometric design
    Vol. 19, num. 2, p. 127-149
    Date of publication: 2002-03
    Journal article

     Share Reference managers Reference managers Open in new window