departament
d'Enginyeria de la Informació i de les Comunicacions


Cerca de publicacions:

  1. M. Fuentes, S. Robles, S. Miguel, J. Pons, A. Sanchez-Carmona. The TOP gamification platform as a change agent in the acquisition of the competences attributed to the Degree in Computer Engineering. In Congrés Internacional de Docència Universitària i Innovació (CIDUI 2018)Academic Press ( 2018 )
    Full ref.Full text
  2. A. Sanchez-Carmona, F. Guidec, P. Launay, Y. Mahéo, S. Robles. Filling in the missing link between simulation and application in opportunistic networking. Journal of Systems and Software ( 2018 )
    Full ref.Full text
  3. A. Sanchez-Carmona, C. Borrego, S. Robles, G. Garcia. Two birds, one stone: Using mobility behavioral profiles both as destinations and as a routing tool. Journal of Network and Computer Applications ( 2017 )
    Full ref.Full text
  4. C. Borrego, A. Sanchez-Carmona, S. Robles. Explore and wait: A composite routing-delivery scheme for relative profile-casting in opportunistic networks. International Journal on Computer Networks ( 2017 )
    Full ref.Full text
  5. A. Sanchez-Carmona. How to win with everyone fighting its own battles. Extending Opportunistic Networking to Heterogeneous Environments. Phdthesis( 2017 )
    Full ref.Full text
  6. C. Perez, J. Conesa, M. E. Rodríguez. ¿Cómo usar una base de datos en grafo?. Editorial UOC ( 2017 )
    Full ref.Full text
  7. R. Martínez, R. Martí, C. J. Sreenan, J. Borrell. Measuring QoS in an Aeronautical Opportunistic Network Architecture with Limited Access to a Satellite Communications Backhaul. Mobile Information Systems ( 2016 ) DOI: 10.1155/2016/7601316.
    Full ref.Full text
  8. A. Sanchez-Carmona, J. Pons, S. Robles. Una Experiència de Ludificació per Millorar el Rendiment de l'Alumnat d'Enginyeria a través de la Motivació. In Congrés Internacional de Docència Universitària i Innovació (CIDUI 2016)Academic Press ( 2016 )
    Full ref.Full text
  9. V. Torra, Y. Narukawa, G. Navarro-Arribas, C. Yañez. Modeling Decisions for Artificial Intelligence 13th International Conference, MDAI 2016, Sant Julià de Lòria, Andorra, September 19-21, 2016. Proceedings. Springer ( 2016 ) DOI: 10.1007/978-3-319-45656-0.
    Full ref.Full text
  10. A. Antúnez, G. Navarro-Arribas. Onion Routing in Deterministic Delay Tolerant Networks. In Foundations and Practice of SecurityAcademic Press ( 2016 ) DOI: 10.1007/978-3-319-30303-1_21.
    Full ref.Full text
  11. J. Garcia, G. Navarro-Arribas, A. Aldini, F. Martinelli, N. Suri. Data Privacy Management, and Security Assurance 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21–22, 2015. Revised Selected Papers. Academic Press ( 2016 ) DOI: 10.1007/978-3-319-29883-2.
    Full ref.Full text
  12. V. Torra, G. Navarro-Arribas, K. Stokes. An Overview of the Use of Clustering for Data Privacy. In Unsupervised Learning AlgorithmsSpringer ( 2016 ) DOI: 10.1007/978-3-319-24211-8_10.
    Full ref.More Information
  13. S. Delgado, C. Perez, G. Navarro-Arribas, J. Herrera, J. Borrell. Survey of network based attacks to the Bitcoin P2P network. In Reunión Española de Criptología y Seguridad de la InformaciónAcademic Press ( 2016 )
    Full ref.Full text
  14. C. Perez, J. Casas. Análisis de datos de redes sociales. Editorial UOC ( 2016 )
    Full ref.Full text
  15. J. Herrera, C. Perez. Privacy in Bitcoin Transactions: New Challenges from Blockchain Scalability Solutions. In International Conference on Modeling Decisions for Artificial IntelligenceAcademic Press ( 2016 ) DOI: 10.1007%2F978-3-319-45656-0_3.
    Full ref.Full text
  16. J. Borges, C. Fernández, J. Rifà, M. Villanueva, S. Dougherty, V. Zinoviev. Códigos correctores de errores y sus aplicaciones: Completamente regulares y Hadamard. Software en teoria de códigos. ( 2016 )
    Full ref.Full text
  17. A. Sanchez-Carmona, S. Robles, C. Borrego. PrivHab: A privacy preserving georouting protocol based on a multiagent system for podcast distribution on disconnected areas. Ad Hoc Networks ( 2016 ) DOI: http://dx.doi.org/10.1016/j.adhoc.2016.09.019.
    Full ref.Full text
  18. J. Grimaldo, R. Martínez, R. Martí. Detección de Black holes en VANETs basada en auditoría a nodos. In Actas de la XIV Reunión Española de Criptología y Seguridad de la Información (RECSI 2016)  ( 2016 )
    Full ref.Full text
  19. A. Sanchez-Carmona, S. Robles, C. Borrego. Identity-based access control for pro-active messages DTN. Security and Communication Networks ( 2016 ) DOI: http://dx.doi.org/10.1002/sec.1494.
    Full ref.Full text
  20. I. Symeonidis, F. Shirazi, G. Biczok, C. Perez, B. Preneel. Collateral Damage of Facebook Apps: Friends, Providers, and Privacy Interdependence. In ICT Systems Security and Privacy ProtectionAcademic Press ( 2016 ) DOI: 10.1007/978-3-319-33630-5_14.
    Full ref.Full text
  21. A. Sanchez-Carmona, C. Borrego, S. Robles. PrivHab+: A secure geographic routing protocol for DTN. Journal of Computer Communications ( 2016 ) DOI: doi:10.1016/j.comcom.2015.10.002.
    Full ref.Full text
  22. C. Tanas, S. Delgado, J. Herrera. An integrated reward and reputation mechanism for MCS preserving users privacy. In Data Privacy ManagementSpringer ( 2016 )
    Full ref.Full text
  23. G. Navarro-Arribas, V. Torra. Advanced Research in Data Privacy. Springer ( 2015 ) DOI: 10.1007/978-3-319-09885-2.
    Full ref.Full text
  24. D. Abril, G. Navarro-Arribas, V. Torra. Data Privacy with R. In Advanced Research in Data PrivacySpringer ( 2015 )
    Full ref.Full text
  25. V. Torra, G. Navarro-Arribas. Data Privacy: A Survey of Results. In Advanced Research in Data PrivacySpringer ( 2015 )
    Full ref.Full text
  26. G. Navarro-Arribas, V. Torra. Advanced Research on Data Privacy in the ARES Project. In Advanced Research in Data PrivacySpringer ( 2015 ) DOI: 10.1007/978-3-319-09885-2_1 .
    Full ref.More Information
  27. D. Abril, G. Navarro-Arribas. Supervised learning using a symmetric bilinear form for record linkage. An International Journal on Multi-Sensor, Multi-Source Information Fusion ( 2015 ) DOI: 10.1016/j.inffus.2014.11.004.
    Full ref.Full text
  28. A. Sanchez-Carmona, S. Robles, C. Borrego. Improving Podcast Distribution on Gwanda using PrivHaba Multiagent Secure Georouting Protocol. Advances in Distributed Computing and Artificial Intelligence Journal ( 2015 )
    Full ref.
  29. C. Borrego, S. Robles, A. Fabregues, A. Sanchez-Carmona. A mobile code bundle extension for application-defined routing in delay and disruption tolerant networking. International Journal on Computer Networks ( 2015 ) DOI: 10.1016/j.comnet.2015.05.017.
    Full ref.Full text
  30. G. Navarro-Arribas, S. Robles, J. Borrell, J. Herrera, R. Martí, C. Borrego. SEGURIDAD PARA MOBILE CROWD SENSING CON PROTOCOLOS OPORTUNISTAS. ( 2015 )
    Full ref.Full text
  31. J. Herrera. Research and Challenges on Bitcoin Anonymity. In Data Privacy Management, Autonomous Spontaneous Security, and Security AssuranceAcademic Press ( 2015 ) DOI: 10.1007/978-3-319-17016-9_1.
    Full ref.Full text
  32. J. Melià-Seguí, J. Garcia, J. Herrera. Remarks on Peinado et al.’s Analysis of J3Gen. Associació de Barcelona per a l'estudi i l'aprenentatge de les Matemàtiques ( 2015 ) DOI: 10.3390/s150306217.
    Full ref.Full text
  33. R. Martínez, R. Martí, C. J. Sreenan, J. Borrell. Methodological evaluation of architectural alternatives for an aeronautical delay tolerant network. International Journal on Pervasive and Mobile Computing ( 2015 ) DOI: 10.1016/j.pmcj.2015.06.012.
    Full ref.Full text
  34. A. Sanchez-Carmona, S. Robles, C. Borrego. Endeavouring to be in the good books. Awarding DTN network use for acknowledging the reception of bundles. International Journal on Computer Networks ( 2015 ) DOI: 10.1016/j.comnet.2015.03.007.
    Full ref.Full text
  35. A. Sanchez-Carmona, C. Borrego, S. Robles. Podcast Distribution on Gwanda using PrivHab: a Multiagent Secure Georouting Protocol. In 13th Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 15). Salamanca. Springer Verlag ( 2015 ) DOI: 10.1007/978-3-319-19629-4_4.
    Full ref.Full text
  36. A. Sanchez-Carmona, S. Robles, C. Borrego. PrivHab: A Multiagent Secure Georouting Protocol for Podcast Distribution on Disconnected Areas. In 14th International Conference on Autonomous Agents and Multiagents Systems (AAMAS 15). Istanbul. ACM Press ( 2015 )
    Full ref.Full text
  37. A. Sanchez-Carmona, S. Robles, G. Garcia, C. Borrego. PrivHab: A Multiagent Secure Georouting Protocol for Distributing Podcasts in Disconnected Areas (Demonstration). In 14th International Conference on Autonomous Agents and Multiagents Systems (AAMAS 15). Istanbul. ACM Press ( 2015 )
    Full ref.Full text
  38. R. Martínez, T. R. Henderson, J. Borrell. Implementation and Evaluation of Licklider Transmission Protocol (LTP) in ns-3. In Proceedings of the 2015 Workshop on ns-3 ACM Press ( 2015 ) DOI: 10.1145/2756509.2756519.
    Full ref.Full text
  39. J. M. Basart . Contemporary Ethical Issues in Engineering, Chapter Teaching Engineering Ethics in the Classroom: Issues and Challenges. IGI Global ( 2015 ) DOI: 10.4018/978-1-4666-8130-9.
    Full ref.Full text
  40. J. Borges, C. Fernández. Double cyclic codes over the rings Z2^a xZ2^b and Z2^a x Z4^b. In Real Sociedad Matemática Española ( 2015 )
    Full ref.Full text
  41. D. Abril, G. Navarro-Arribas, V. Torra. Spherical Microaggregation: Anonymizing Sparse Vector Spaces. Computers and Security ( 2015 ) DOI: 10.1016/j.cose.2014.11.005.
    Full ref.Full text
  42. J. M. Basart , M. Farrús, M. Serra. New Ethical Challenges for Today Engineering and Technology. Telematics and Informatics ( 2015 ) DOI: http://www.sciencedirect.com/science/article/pii/S0736585314000458.
    Full ref.Full text
  43. J. Borges, C. Fernández, J. Pujol, J. Rifà, M. Villanueva, S. T. Dougherty, F. Soloveva, V. Zinoviev. Códigos óptimos y sus aplicaciones a la criptografía y almacenamiento de datos. Software para la experimentación en teoría de códigos. ( 2014 )
    Full ref.Full text
  44. J. Rifà, F. Aulí, J. Bartrina, I. Blanes, J. Borges, J. Borrell, J. Herrera, G. Navarro-Arribas, R. Martí, J. Pujol, S. Robles, J. Serra, M. Villanueva. Codificació, compressió i seguretat (CCS). ( 2014 )
    Full ref.Full text
  45. C. Perez, J. Herrera. Bitcoin y el problema de los generales bizantinos. In Actas de la XIII Reunión Española de Criptología y Seguridad de la Información (RECSI 2014)Academic Press ( 2014 )
    Full ref.Full text
  46. J. A. Donet, C. Perez, J. Herrera. The Bitcoin P2P Network. In Financial Cryptography and Data SecurityAcademic Press ( 2014 ) DOI: 10.1007/978-3-662-44774-1_7.
    Full ref.Full text
  47. D. Abril, G. Navarro-Arribas, V. Torra. Aprendizaje supervisado para el enlace de registros a través de la media ponderada. In Actas de la XIII Reunión Española sobre Criptología y Seguridad de la InformaciónUniversidad de Alicante ( 2014 )
    Full ref.Full text
  48. J. Cucurull, S. Guasch, A. Escala, G. Navarro-Arribas, V. Acin. QR Steganography - A Threat to New Generation Electronic Voting Systems. In Proceedings of the 11th International Conference on Security and Cryptography ( 2014 ) DOI: 10.5220/0005120404840491.
    Full ref.Full text
  49. J. Jimenez, G. Navarro-Arribas, V. Torra. JPEG-Based Microdata Protection. In Privacy in Statistical DatabasesSpringer ( 2014 ) DOI: 10.1007/978-3-319-11257-2_10.
    Full ref.Full text
  50. G. Navarro-Arribas, V. Torra. Rank Swapping for Stream Data. In Modeling Decisions for Artificial IntelligenceSpringer ( 2014 ) DOI: 10.1007/978-3-319-12054-6_19.
    Full ref.Full text
  51. V. Torra, G. Navarro-Arribas. Data privacy. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery ( 2014 ) DOI: 10.1002/widm.1129.
    Full ref.Full text
  52. C. Tanas, J. Herrera. Fostering participation in MCS: How much you should pay to your crowd sensors?. In Satellite Workshop CitiNet 2014 at ECCS14 ( 2014 )
    Full ref.
  53. J. Casas, J. Herrera, V. Torra. Anonymizing graphs: measuring quality for clustering. Knowledge and Information Systems ( 2014 ) DOI: 10.1007/s10115-014-0774-7.
    Full ref.Full text
  54. D. Ezquerra, M. de Toro, J. Borrell. Un Enfoque Tolerante a Interrupciones para la Seguridad de la Internet de las Cosas. In Actas de la XIII Reunión Española sobre Criptología y Seguridad de la InformaciónUniversidad de Alicante ( 2014 )
    Full ref.Full text
  55. S. Robles, C. Borrego, A. Sanchez-Carmona, G. Garcia. Information System for Supporting Location-based Routing Protocols. In Actas de la XIII Reunión Española sobre Criptología y Seguridad de la InformaciónUniversidad de Alicante ( 2014 )
    Full ref.Full text
  56. C. Borrego, J. Borrell, S. Robles. De sobres i samarretes: metàfores didàctiques per a facilitar l'aprenentatge d'arquitectures de xarxes. In Actes de CIDUI: Congrés Internacional de Docència Universitària i Innovació (CIDUI 2014).CIDUI Congrés Internacional de Docència Universitària i Innovació ( 2014 )
    Full ref.Full text
  57. C. Borrego. Jardinería criptográfica: retos criptográficos distribuidos. In Actes de CIDUI: Congrés Internacional de Docència Universitària i Innovació (CIDUI 2014).CIDUI Congrés Internacional de Docència Universitària i Innovació ( 2014 )
    Full ref.
  58. R. Martínez, R. Martí, J. Borrell. Analyzing Information Propagation in a Transoceanic Aircraft Delay Tolerant Network. In Proceedings of the 39th IEEE Conference on Local Computer Networks (LCN)IEEE Computer Society Press ( 2014 ) DOI: 10.1109/LCN.2014.6925763.
    Full ref.Full text
  59. J. Borges, C. Fernández. Z2Z4-additive cyclic codes, generator polynomials and dual codes. In Karatekin Mathematics Days, KMD 2014 ( 2014 )
    Full ref.Full text
  60. J. Borges, C. Fernández. Z2-double cyclic codes. In IX Jornadas de Matemática Discreta y AlgorítmicaUniversitat Rovira i Virgili ( 2014 )
    Full ref.Full text
  61. J. J. Bernal, J. Borges, C. Fernández, M. Villanueva. Permutation decoding of Z2Z4-linear codes. Desings, Codes and Cryptography ( 2014 ) DOI: 10.1007/s10623-014-9946-4.
    Full ref.Full text
  62. C. Borrego, S. Castillo, S. Robles. Striving for sensing: Taming your mobile code to share a robot sensor network. Information Sciences ( 2014 ) DOI: 10.1016/j.ins.2014.02.072.
    Full ref.Full text
  63. G. Navarro-Arribas, J. Borrell, S. Robles, R. Martí, J. Herrera. MobileKey. Desarrollo de un mecanismo de aprovisionamiento de certificados digitales para entornos móviles. ( 2014 )
    Full ref.Full text
  64. G. Navarro-Arribas, J. Borrell, R. Martí, S. Robles, J. Herrera. Crowd eAssessment: Sistema de crowdsourcing para observación electoral basado en conectividad oportunista que garantice el anonimato de los participantes y la veracidad de las observaciones. ( 2014 )
    Full ref.Full text
  65. G. Navarro-Arribas, D. Abril, V. Torra. Dynamic anonymous index for confidential data. In Data Privacy Management and Autonomous Spontaneous SecuritySpringer Verlag ( 2014 ) DOI: 10.1007/978-3-642-54568-9 23.
    Full ref.Full text
  66. J. Borges, J. Rifà, V. Zinoviev. Families of completely transitive codes and distance transitive graphs. Nom revista absent ( 2014 ) DOI: 10.1016/j.disc.2014.02.008.
    Full ref.Full text
  67. F. Aulí, M. Marcellin. Stationary probability model for microscopic parallelism in JPEG2000. IEEE Transactions on Multimedia ( 2014 )
    Full ref.
  68. M. Hernández, M. Marcellin, J. Serra. Compression of Microarray Images. CRC Press Taylor & Francis Group ( 2014 )
    Full ref.Full text
  69. L. Jimenez, F. Aulí, M. W. Marcellin. Visually Lossless Strategies to Decode and Transmit JPEG2000 Imagery. IEEE Signal Processing Letters ( 2014 ) DOI: 10.1109/LSP.2013.2290317.
    Full ref.Full text
  70. J. Rifà, V. Zinoviev. On a family of binary completely transitive codes with growing covering radius. Discrete Mathematics ( 2014 ) DOI: 10.1016/j.disc.2013.11.009.
    Full ref.More Information
  71. J. Rifà, F. Soloveva, M. Villanueva. Self-embeddings of Hamming Steiner triple systems of small order and APN permutations. Desings, Codes and Cryptography ( 2014 ) DOI: 10.1007/s10623-013-9909-1.
    Full ref.More Information
  72. J. Melià-Seguí, J. García, J. Herrera. On the similarity of commercial EPC Gen2 pseudorandom number generators. Transactions on Emerging Telecommunications Technologies ( 2014 )
    Full ref.Full text
  73. S. T. Dougherty, C. Fernández. Z2Z4-formally self-dual codes. Desings, Codes and Cryptography ( 2014 ) DOI: 10.1007/s10623-012-9773-4.
    Full ref.Full text
  74. V. Torra, Y. Narukawa, G. Navarro-Arribas, D. Megías. Modeling Decisions for Artificial Intelligence 10th International Conference, MDAI 2013, Barcelona, Spain, November 20-22, 2013. Proceedings. Springer ( 2013 ) DOI: 10.1007/978-3-642-41550-0.
    Full ref.Full text
  75. J. Pernas, B. Gaston, J. Pujol. Non-homogeneous two-rack model for distributed storage systems. In 2013 IEEE International Symposium on Information TheoryAcademic Press ( 2013 ) DOI: 10.1109/ISIT.2013.6620424.
    Full ref.Full text
  76. J. Casas, J. Herrera, V. Torra. Analyzing the Impact of Edge Modifications on Networks. In Modeling Decisions for Artificial IntelligenceSpringer ( 2013 ) DOI: 10.1007/978-3-642-41550-0_26.
    Full ref.Full text
  77. J. Casas, J. Herrera, V. Torra. An algorithm for k-degree anonymity on large networks. In Advances in Social Networks Analysis and Mining (ASONAM), 2013 IEEE/ACM International Conference onIEEE Computer Society Press ( 2013 )
    Full ref.Full text
  78. J. Melià-Seguí, J. Garcia, J. Herrera. J3Gen: A PRNG for Low-Cost Passive RFID. Sensors ( 2013 ) DOI: 10.3390/s130303816.
    Full ref.Full text
  79. D. Abril, G. Navarro-Arribas, V. Torra. Towards a private vector space model for confidential documents. In Proceedings of the 28th Annual ACM Symposium on Applied Computing ACM Press ( 2013 )
    Full ref.Full text
  80. D. Abril, G. Navarro-Arribas, V. Torra. Vector Space Model Anonymization. In Frontiers in Artificial Intelligence and Applications (CCIA 2013)Academic Press ( 2013 ) DOI: 10.3233/978-1-61499-320-9-141.
    Full ref.Full text
  81. E. Mercadal. Mobile Agents in Wireless Sensor Networks to Improve the Coordination of Emergency Response Teams. Phdthesis( 2013 )
    Full ref.Full text
  82. C. Borrego. A Mobile Code-based Multi-Routing Protocol Architecture for Delay and Disruption Tolerant Networking. Phdthesis( 2013 )
    Full ref.Full text
  83. I. Blanes, J. Serra. Multicomponent compression algorithm based on CCSDS 122.0 standard (2013). ( 2013 )
    Full ref.Full text
  84. E. Auge, J. E. Sanchez, A. Kiely, I. Blanes, J. Serra. Performance impact of parameter tuning on the CCSDS-123 lossless multi- and hyperspectral image compression standard. International Journal of Applied Mathematics ( 2013 )
    Full ref.Full text
  85. A. Bilgin, M. Marcellin, J. Serra, J. Storer. Data Compression Conference. IEEE Computer Society Press ( 2013 )
    Full ref.Full text
  86. J. Serra, J. Bartrina, F. Aulí, I. Blanes, M. Hernández. Learning Image Features to Encode Visual Information (LIFE-VISION). ( 2013 )
    Full ref.Full text
  87. F. Aulí. General Embedded Quantization for Wavelet-Based Lossy Image Coding. IEEE Transactions on Signal Processing ( 2013 ) DOI: 10.1109/TSP.2012.2236323.
    Full ref.Full text
  88. J. L. Monteagudo, F. Aulí, J. Serra. JPIP Proxy Server With Prefetching Strategies Based on User-Navigation Model and Semantic Map. IEEE Transactions on Multimedia ( 2013 ) DOI: 10.1109/TMM.2013.2264655.
    Full ref.Full text
  89. F. Aulí, M. Marcellin, J. Serra, J. Bartrina. Lossy-to-Lossless 3D Image Coding through Prior Coefficient Lookup Tables. Information Sciences ( 2013 )
    Full ref.
  90. L. Jimenez, F. Aulí, M. Marcellin, J. Serra. Visually Lossless JPEG 2000 Decoder. In 2013 Data Compression ConferenceIEEE Computer Society Press ( 2013 ) DOI: 10.1109/DCC.2013.25.
    Full ref.Full text
  91. J. Muñoz, J. Bartrina, F. Aulí, J. Serra. Computed Tomography Image Coding through Air Filtering in the Wavelet Domain. In 2013 Data Compression ConferenceAcademic Press ( 2013 ) DOI: 10.1109/DCC.2013.92.
    Full ref.Full text
  92. F. Aulí. Low Complexity Embedded Quantization Scheme Compatible with Bitplane Image Coding. In 2013 Data Compression ConferenceIEEE Computer Society Press ( 2013 ) DOI: 10.1109/DCC.2013.35.
    Full ref.Full text
  93. M. Hernández, V. Sanchez, M. Marcellin, J. Serra. A Distortion Metric for the Lossy Compression of DNA Microarray Images. In 2013 Data Compression ConferenceIEEE Computer Society Press ( 2013 ) DOI: 10.1109/DCC.2013.26.
    Full ref.Full text
  94. J. Muñoz, J. Bartrina, M. Marcellin, J. Serra. Correlation Modeling for Compression of Computed Tomography Images. IEEE Journal of Biomedical and Health Informatics ( 2013 ) DOI: 10.1109/JBHI.2013.2264595.
    Full ref.Full text
  95. F. Aulí. 2-Step Scalar Deadzone Quantization for Bitplane Image Coding. IEEE Transactions on Image Processing ( 2013 ) DOI: 10.1109/TIP.2013.2277801.
    Full ref.Full text
  96. Z. Xu, J. Bartrina, V. Sanchez, J. Serra, J. Muñoz. Diagnostically Lossless compression of X-ray angiography images based on automatic segmentation using ray-casting and α-shapes. In Proc. IEEE International Conference on Image ProcessingIEEE Computer Society Press ( 2013 )
    Full ref.Full text
  97. Z. Xu, J. Bartrina, V. Sanchez, J. Serra, J. Muñoz. Diagnostically Lossless Compression of X-Ray Angiographic Images through Background Suppression. In 2013 Data Compression ConferenceIEEE Computer Society Press ( 2013 ) DOI: 10.1109/DCC.2013.108.
    Full ref.Full text
  98. J. Rifà, V. Zinoviev. On two sequences of binary quadratic bent functions. Problems of Information Transmission ( 2013 )
    Full ref.
  99. C. Tanas, J. Herrera. Crowdsensing Simulation using ns-3. In 2nd International Workshop on Citizen Sensor NetworksSpringer ( 2013 )
    Full ref.Full text
  100. C. Tanas, J. Herrera. When users become sensors: can we trust their readings?. International Journal of Communication Systems ( 2013 ) DOI: 10.1002/dac.2689.
    Full ref.Full text
  101. R. Martínez, R. Martí, J. Borrell. Characterization of a Transoceanic Aircraft Delay Tolerant Network. In 38th Annual IEEE Conference on Local Computer NetworksIEEE Computer Society Press ( 2013 ) DOI: 10.1109/LCN.2013.6761292.
    Full ref.Full text
  102. C. Perez, J. Herrera. Improving Automatic Edge Selection for Relational Classification. In Proceedings of the 10th International Conference on Modeling Decisions for Artificial Intelligence Springer ( 2013 )
    Full ref.Full text
  103. J. Borges, I. Mogilnykh, J. Rifà, F. Soloveva. On the number of nonequivalent propelinear extended perfect codes. Electronic Journal of Combinatorics ( 2013 )
    Full ref.
  104. . del Rio, J. Rifà. Families of Hadamard Z2Z4Q8-codes. IEEE Transactions on Information Theory ( 2013 ) DOI: 10.1109/TIT.2013.2258373..
    Full ref.More Information
  105. J. Rifà, F. Soloveva, M. Villanueva. Biembeddings of Small Order Hamming STS(n) and APN Monomial Po- wer Permutations. In IEEE International Symposium on Information Theory (ISIT 2013)IEEE Press ( 2013 )
    Full ref.
  106. . del Rio, J. Rifà. Hadamard quaternionic code. In Real Sociedad Matemática Espa˜ nola, Matemáticas de la Teor´ıa de la InformaciónReal Sociedad Matemática Española ( 2013 )
    Full ref.Full text
  107. S. N. Foley, G. Navarro-Arribas. A Bloom Filter Based Model for Decentralized Authorization. International Journal of Intelligent Systems ( 2013 ) DOI: 10.1002/int.21593.
    Full ref.Full text
  108. C. Perez. Formación de Profesorado Universitario. ( 2013 )
    Full ref.Full text
  109. C. Perez, J. Herrera. Improving relational classification using link prediction techniques. In European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in DatabasesSpringer ( 2013 ) DOI: 10.1007/978-3-642-40988-2_38.
    Full ref.Full text
  110. C. Perez, J. Herrera. OSN crawling schedulers and their implications on community detection. International Journal of Intelligent Systems ( 2013 ) DOI: 10.1002/int.21594.
    Full ref.Full text
  111. P. Marques, S. Robles, R. Cruz. Profiling Roles and Scenarios of Agent application in Healthcare - a Systematic Review. In Proceedings of the VIII Workshop on Agents Applied in Health Care, A2HC 2013Universidad de Mucia ( 2013 )
    Full ref.Full text
  112. S. Castillo, R. Martínez, S. Robles, A. Sanchez-Carmona, J. Borrell, M. Cordero, A. Viguria, N. Giuditta. Mobile-Agent Based Delay-Tolerant Network Architecture for Non-Critical Aeronautical Data Communications. In 10th International Symposium on Distributed Computing and Artificial IntelligenceSpringer ( 2013 ) DOI: 10.1007/978-3-319-00551-5_61.
    Full ref.Full text
  113. M. Colobran, J. M. Basart . Knowledge Based Concept Analysis Method using Concept Maps and UML: Security Notion Case. World Academy of Science, Engineering and Technology ( 2013 )
    Full ref.Full text
  114. J. M. Basart , M. Serra. Engineering Ethics Beyond Engineers’ Ethics. Science & Engineering Ethics ( 2013 ) DOI: 10.1007/s11948-011-9293-z.
    Full ref.Full text
  115. C. Borrego, S. Robles. A store-carry-process-and-forward paradigm for intelligent sensor grids. Information Sciences ( 2013 ) DOI: 10.1016/j.ins.2012.08.016.
    Full ref.Full text
  116. A. Martín, J. Crowcroft, E. Yoneki, R. Martí. Evaluating Opportunistic Networks in Disaster Scenarios. Journal of Network and Computer Applications ( 2013 ) DOI: 10.1016/j.jnca.2012.11.001.
    Full ref.Full text
  117. C. Perez, J. Herrera. Classifying Online Social Network Users Through the Social Graph. In 5th I.S. on Foundations And Practice of Security Springer Verlag ( 2013 ) DOI: 10.1007/978-3-642-37119-6_8.
    Full ref.Full text
  118. L. Jimenez, F. Aulí, M. W. Marcellin. FAST rate allocation for JPEG2000 video transmission over time-varying channels. IEEE Transactions on Multimedia ( 2013 )
    Full ref.
  119. J. Borges, C. Fernández, J. Pujol, J. Rifà, M. Villanueva. Survey on Z2Z4-additive codes. In Proceedings of the contact forum Galois geometries and applications.Universa Press ( 2012 )
    Full ref.Full text
  120. J. Serra, V. Sanchez. Natural Sciences and Engineering Research Council of Canada (NSERC). ( 2012 )
    Full ref.Full text
  121. J. Serra, I. Blanes. Multicomponent compression algorithm based on CCSDS 122.0 standard (2012). ( 2012 )
    Full ref.Full text
  122. J. Bartrina. Programa José Castillejo 2012 - Modalitat B. ( 2012 )
    Full ref.Full text
  123. J. Bartrina. Beques per a estades de recerca a l'estranger (BE-DGR 2012) - Modalitat B. ( 2012 )
    Full ref.Full text
  124. V. Sanchez, J. Serra. Joint Source/Channel Coding in 3D-JPEG2000 for Wireless 3D Region of Interest Transmission in 3D Medical Imaging Data. In 8th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)Academic Press ( 2012 )
    Full ref.Full text
  125. J. E. Sanchez, E. Auge, A. Kiely, I. Blanes, J. Serra. Performance Impact of Parameter Tuning on the CCSDS-123 Lossless Multi- and Hyperspectral Image Compression Standard. In 3rd International Workshop on On-Board Payload Data Compression (OBPDC)Academic Press ( 2012 )
    Full ref.Full text
  126. F. Aulí, J. L. Monteagudo, J. Serra, J. Bartrina. Low-complexity lossy image coding through a near-optimal general embedded quantizer. In IET Image Processing ConferenceAcademic Press ( 2012 )
    Full ref.Full text
  127. M. Villanueva, J. Pujol, E. Suárez. Random network coding and designs over GF(q). ( 2012 )
    Full ref.Full text
  128. J. Rifà. Enhancing the transfer of Intelligent Transportation System innovations to the market (T-TRANS). ( 2012 )
    Full ref.Full text
  129. L. Ronquillo, J. Rifà. On Additive Binary Nonlinear Codes And Steganography. Phdthesis( 2012 )
    Full ref.Full text
  130. M. Domingo, J. Arnedo, J. Herrera, J. Prieto. Towards secure mobile P2P applications using JXME. Journal of Internet Services and Information Security ( 2012 )
    Full ref.
  131. J. Casas, J. Herrera, V. Torra. Algoritmos genéticos para la anonimización de grafos. In Actas de la XII Reunión Española de Criptología y Seguridad de la Información (RECSI 2012) ( 2012 )
    Full ref.Full text
  132. J. Garcia, G. Navarro-Arribas, N. Cuppens-Boulahia, S. de Capitani di Vimercati. Data Privacy Management and Autonomous Spontaneus Security. In Data Privacy Management and Autonomous Spontaneus SecurityAcademic Press ( 2012 ) DOI: 10.1007/978-3-642-28879-1.
    Full ref.Full text
  133. C. Garrigues, H. Rifà, G. Navarro-Arribas. Fully Distributed Cooperative Spectrum Sensing for Cognitive Radio Networks. In XII Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2012)Servicio Editorial de Mondragon Unibertsitatea ( 2012 )
    Full ref.Full text
  134. J. Pernas, J. Pujol, M. Villanueva. Characterization of the automorphism group of quaternary linear Hadamard codes. Desings, Codes and Cryptography ( 2012 ) DOI: 10.1007/s10623-012-9678-2.
    Full ref.Full text
  135. A. Martín. Triage applications and communications in emergency scenarios. Phdthesis( 2012 )
    Full ref.Full text
  136. C. Tanas, J. Herrera. Users as Smart Sensors: A Mobile Platform for Sensing Public Transport Incidents. In Citizen in Sensor NetworksSpringer Berlin Heidelberg NY ( 2012 ) DOI: 10.1007/978-3-642-36074-9_8.
    Full ref.
  137. J. Borrell, J. Herrera, R. Martí, G. Navarro-Arribas, S. Robles. Ubiquitous Secure Electronic Voting (u-SEV): Sistema de voto electrónico seguro para entornos sin infraestructuras de telecomunicaciones fiables. ( 2012 )
    Full ref.
  138. J. Rifà, V. Zinoviev. A family of binary completely transitive codes and distance-transitive graphs. In Thirteenth International Workshop on Algebraic and Combinatorial Coding TheoryBulgarian Academic of Sciences ( 2012 )
    Full ref.Full text
  139. J. Borges, I. Mogilnykh, J. Rifà, F. Soloveva. Lower bound on the number of nonequivalent propelinear extended perfect codes. In Thirteenth International Workshop on Algebraic and Combinatorial Coding TheoryBulgarian Academic of Sciences ( 2012 )
    Full ref.Full text
  140. J. Borges, I. Mogilnykh, J. Rifà, F. Slovieva. Structural properties of binary propelinear codes. Advances in Mathematics of Communication ( 2012 ) DOI: 10.3934/amc.2012.6.329.
    Full ref.Full text
  141. J. Borges, J. Rifà, V. Zinoviev. New families of completely regular codes and their corresponding distance regular coset graphs. Desings, Codes and Cryptography ( 2012 ) DOI: 10.1007/s10623-012-9713-3.
    Full ref.Full text
  142. J. Rifà, F. Soloveva, M. Villanueva. Intersection of Hamming codes avoiding Haming subcodes. Desings, Codes and Cryptography ( 2012 ) DOI: DOI: 10.1007/s10623-011-9506-0.
    Full ref.Full text
  143. L. Huguet, J. Rifà, J. Tena. Criptografía Avanzada. Fundació Universitat Oberta de Catalunya ( 2012 )
    Full ref.Full text
  144. M. Bras, J. Rifà. Matemàtica Discreta II: Aritmètica i teoria de la codificació. Servei Publicacions Universitat Rovira-Virgili ( 2012 )
    Full ref.Full text
  145. M. Bilal, J. Borges, C. Fernández. Self-dual codes over Zk from rectangular association schemes. In VIII Jornadas de Matemática Discreta y Algorítmica ( 2012 )
    Full ref.Full text
  146. J. Borges, S. T. Dougherty, C. Fernández. Characterization and constructions of self-dual codes over $\mathbb Z_2\times \mathbb Z_4$. Advances in Mathematics of Communication ( 2012 ) DOI: 10.3934/amc.2012.6.287.
    Full ref.Full text
  147. M. Hernández, F. Aulí, J. Bartrina, I. Blanes, L. Jimenez, M. Marcellin, J. Muñoz, V. Sanchez, J. Serra, Z. Xu. Multicomponent compression of DNA microarray images. In Proceeding of the CEDI Workshop on Multimedia Data Coding and Transmission, WMDCT ( 2012 )
    Full ref.Full text
  148. E. Mercadal, G. Navarro-Arribas, S. N. Foley, J. Borrell. Towards efficient access control in a mobile agent based wireless sensor network. In 7th International Conference on Risks and Security of Internet and SystemsIEEE Computer Society Press ( 2012 )
    Full ref.
  149. J. Casas, J. Herrera, V. Torra. Comparing Random-based and k-Anonymity-based Algorithms for Graph Anonymization. In Modeling Decision for Artificial IntelligenceAcademic Press ( 2012 )
    Full ref.Full text
  150. E. Mercadal, J. Borrell, G. Navarro-Arribas, A. Freijó. Gestion eficiente de permisos en redes de sensores inalámbricos. In XII Reunión Española sobre Criptología y Seguridad de la InformaciónMondragón Unibertsitatea ( 2012 )
    Full ref.
  151. E. Mercadal, C. Vidueira, C. J. Sreenan, J. Borrell. Improving the dynamism of mobile agent applications in wireless sensor networks through separate itineraries. Journal of Computer Communications ( 2012 ) DOI: 10.1016/j.comcom.2012.09.017.
    Full ref.Full text
  152. R. Martínez, M. de Toro, R. Martí, J. Borrell. Esquema de gestión de claves criptográficas tolerante a retrasos e interrupciones en entornos aeronáuticos. In Actas de la XII Reunión Española de Criptología y Seguridad de la Información (RECSI 2012) Mondragón Unibertsitatea ( 2012 )
    Full ref.
  153. A. Sanchez-Carmona, C. Borrego, J. Andújar, S. Robles. Control de Acceso para Mensajes Pro-activos en Redes DTN. In XII Reunión Española sobre Criptología y Seguridad de la Información (RECSI)Mondragón Unibertsitatea ( 2012 )
    Full ref.
  154. S. Castillo, J. Garcia. On the Use of Latency Graphs for the Construction of Tor Circuits. Technical report ( 2012 )
    Full ref.Full text
  155. S. Castillo, S. Martinez, S. Robles, M. Gozalbo. Protocolo de No-repudio para Redes DTN Basado en Intercambio Justo de Firmas. In XII Reunión Española sobre Criptología y Seguridad de la Información (RECSI)Mondragón Unibertsitatea ( 2012 )
    Full ref.
  156. C. Tanas, C. Perez, J. Herrera. Security and privacy challenges in smart sensor networks. In Actas de la XII Reunión Española de Criptología y Seguridad de la Información (RECSI 2012) ( 2012 )
    Full ref.Full text
  157. D. Abril, G. Navarro-Arribas, V. Torra. Improving record linkage with supervised learning for disclosure risk assessment. Information Fusion ( 2012 ) DOI: 10.1016/j.inffus.2011.05.001.
    Full ref.Full text
  158. G. Navarro-Arribas, V. Torra. Information fusion in data privacy: A survey. Information Fusion ( 2012 ) DOI: 10.1016/j.inffus.2012.01.001.
    Full ref.Full text
  159. G. Navarro-Arribas, V. Torra, A. Erola, J. Castellà. User k-anonymity for privacy preserving data mining of query logs. Information Processing & Management ( 2012 ) DOI: 10.1016/j.ipm.2011.01.004.
    Full ref.Full text
  160. C. Martínez, G. Navarro-Arribas, J. Borrell. Intra-role Progression in RBAC: An RPG-Like Access Control Scheme. In Data Privacy Management and Autonomous Spontaneus SecuritySpringer Verlag ( 2012 ) DOI: 10.1007/978-3-642-28879-1_15.
    Full ref.Full text
  161. M. Bilal, J. Borges, S. T. Dougherty, C. Fernández. Extensions of Z2Z4-additive self-dual codes preserving their properties. In IEEE International Symposium on Information Theory ( 2012 )
    Full ref.Full text
  162. F. Aulí, J. L. Monteagudo, J. Serra, J. Bartrina. Low-complexity lossy image coding through a near-optimal general embedded quantizer. In Proc. IET Image Processing ConferenceAcademic Press ( 2012 )
    Full ref.Full text
  163. E. Mercadal, S. Robles, R. Martí, C. J. Sreenan, J. Borrell. Double multiagent architecture for dynamic triage of victims in emergency scenarios. Progress in Artificial Intelligence ( 2012 ) DOI: 10.1007/s13748-012-0016-8.
    Full ref.Full text
  164. C. Perez. Estancias de Movilidad de Estudiantes en Programas de Doctorado con mención hacia la excelencia. ( 2012 )
    Full ref.Full text
  165. A. Martín, R. Martí. Energy-efficient forwarding mechanism for wireless opportunistic networks in emergency scenarios. Journal of Computer Communications ( 2012 ) DOI: 10.1016/j.comcom.2012.04.028.
    Full ref.Full text
  166. M. Hernández, I. Blanes, M. W. Marcellin, J. Serra. Standard and specific compression techniques for DNA microarray images. Multidisciplinary Digital Publishing Institute Algorithms ( 2012 ) DOI: 10.3390/a5010030.
    Full ref.Full text
  167. F. Aulí, L. Jimenez, M. W. Marcellin, I. Blanes, J. Serra. Embedded quantizer design for low rate lossy image coding. In IEEE Data Compression ConferenceIEEE Press ( 2012 )
    Full ref.Full text
  168. J. L. Monteagudo, F. Aulí, J. Serra, A. Zabala, J. Masó-Pau, X. Pons. Enhanced transmission of JPEG2000 imagery through JPIP proxy and user-navigation model. In IEEE Data Compression ConferenceIEEE Press ( 2012 )
    Full ref.Full text
  169. M. Hernández, J. Muñoz, I. Blanes, M. W. Marcellin, J. Serra. DNA microarray image coding. In IEEE Data Compression ConferenceIEEE Press ( 2012 ) DOI: 10.1109/DCC.2012.11.
    Full ref.Full text
  170. J. Bartrina, M. Navarro, J. Muñoz, M. W. Marcellin, J. Ruberte, J. Serra. MicroCT Image Coding Based on Air Filtering. In IEEE Data Compression ConferenceIEEE Press ( 2012 ) DOI: 10.1109/DCC.2012.47.
    Full ref.Full text
  171. F. Aulí, M. W. Marcellin. Scanning order strategies for bitplane image coding. IEEE Transactions on Image Processing ( 2012 )
    Full ref.Full text
  172. I. Blanes, J. Serra, M. W. Marcellin, J. Bartrina. Divide-and-conquer strategies for hyperspectral image processing. IEEE Signal Processing Magazine ( 2012 ) DOI: 10.1109/MSP.2011.2179416.
    Full ref.More Information
  173. E. Byrne, M. Greferath, J. Pernas, J. Zumbrägel. Algebraic Decoding of Negacyclic Codes over Z4. Desings, Codes and Cryptography ( 2012 ) DOI: 10.1007/s10623-012-9632-3.
    Full ref.More Information
  174. I. Blanes, J. Serra. Multicomponent compression algorithm based on CCSDS 122.0 standard (2011). ( 2011 )
    Full ref.
  175. J. Serra. Programa de Formación del Profesorado Universitario - Ministerio de Ciencia e Innovación - FPU2010. ( 2011 )
    Full ref.Full text
  176. J. Serra. FPU2010 (Programa de Formación del Profesorado Universitario - Ministerio de Ciencia e Innovación). ( 2011 )
    Full ref.Full text
  177. J. Serra. China Scholarship Council. ( 2011 )
    Full ref.Full text
  178. J. Serra, F. Aulí, L. Jimenez. Scalable Video Coding and Streaming over Internet. ( 2011 )
    Full ref.Full text
  179. F. Zeng. China Scholarship Council. ( 2011 )
    Full ref.Full text
  180. J. Borrell, J. Herrera, R. Martí, G. Navarro-Arribas, S. Robles. SGE2, desarrollo de un sistema de gestión de procesos electorales de manera electrónica. ( 2011 )
    Full ref.
  181. J. Borrell, J. Herrera, R. Martí, G. Navarro-Arribas, S. Robles. TrustedCloud, entorno para verificar la integridad de los sistemas de ejecución en un entorno de Cloud Computing. ( 2011 )
    Full ref.
  182. H. Rifà, J. Rifà, L. Ronquillo. Z2Z4-additive perfect codes in Steganography. Advances in Mathematics of Communication ( 2011 ) DOI: 10.3934/amc.2011.5.425.
    Full ref.Full text
  183. M. Bilal, J. Borges, C. Fernández, J. Rifà, L. Ronquillo, V. Zinoviev. Fomento de la participación de jóvenes investigadores pre-doc y post-doc en congreso internacional sobre teoría de códigos y sus aplicaciones. ( 2011 )
    Full ref.Full text
  184. J. Borges, M. Villanueva. 3rd International Castle Meeting on Coding Theory and Applications. In 3rd International Castle Meeting on Coding Theory and ApplicationServei de Publicacions, UAB ( 2011 )
    Full ref.Full text
  185. S. Robles, S. Castillo. Ingeniería Social. Fundació Universitat Oberta de Catalunya ( 2011 )
    Full ref.
  186. S. Castillo. Vulnerabilidades de bajo nivel y software malicioso. Fundació Universitat Oberta de Catalunya ( 2011 )
    Full ref.
  187. S. Castillo. Vulnerabilidades y software malicioso. In II Congreso de Nuevas Tecnologías y sus repercusiones en el seguro (Internet, Biotecnología y Nanotecnología) ( 2011 )
    Full ref.
  188. D. Abril, G. Navarro-Arribas, V. Torra. Choquet integral for record linkage. Annals of Operations Research ( 2011 ) DOI: 10.1007/s10479-011-0989-x.
    Full ref.Full text
  189. M. Serra, J. M. Basart . Engineering Ethics for an Integrated Online Teaching: What is Missing?. In ETHICOMP 2011Sheffield Hallam University ( 2011 )
    Full ref.Full text
  190. C. Perez. Movilidad de profesores visitantes y de estudiantes en enseñanzas universitarias oficiales de máster. ( 2011 )
    Full ref.Full text
  191. D. Abril, G. Navarro-Arribas, V. Torra. Supervised learning using mahalanobis distance for record linkage. In Proceedings of 6th International Summer School on Aggregation Operators (AGOP 2011) ( 2011 )
    Full ref.Full text
  192. V. Torra, D. Abril, G. Navarro-Arribas. Fuzzy methods for database protection. In 7th conference of the European Society for Fuzzy Logic and Technology (EUSFLAT-2011) ( 2011 )
    Full ref.Full text
  193. V. Torra, G. Navarro-Arribas, D. Abril. Supervised Learning Approach for Distance Based Record Linkage as Disclosure Risk Evaluation. In Joint UNECE/Eurostat Work Session on Statistical Data Confidentiality ( 2011 )
    Full ref.Full text
  194. M. Hernández. FPU2010. ( 2011 )
    Full ref.Full text
  195. Z. Xu. China Scholarship Council. ( 2011 )
    Full ref.Full text
  196. J. Serra. Red Temática en Codificación y Transmisión de Contenidos Multimedia. ( 2011 )
    Full ref.Full text
  197. F. Aulí, L. Jimenez, J. Serra. Scalable Video Coding and Streaming over Internet. ( 2011 )
    Full ref.Full text
  198. I. Blanes, J. Serra, P. Schelkens. Recent Advances in Satellite Data Compression - Chapter "Divide-and-conquer decorrelation for hyperspectral data compression". Springer Verlag ( 2011 )
    Full ref.Full text
  199. F. Aulí, J. Bartrina, J. Serra, M. W. Marcellin. Low complexity, high efficiency probability model for hyper-spectral image coding. In International Conference on Data Compression, Communication and Processing (CCP)IEEE Press ( 2011 )
    Full ref.Full text
  200. J. E. Sanchez, E. Auge, J. Santalo, I. Blanes, A. Kiely. Review and implementation of the future CCSDS Recommendation for multi- and hyperspectral lossless image coding. In International Conference on Data Compression, Communication and Processing (CCP)IEEE Press ( 2011 )
    Full ref.Full text
  201. M. Hernández, I. Blanes, J. Serra, M. W. Marcellin. A review of DNA microarray image compression. In International Conference on Data Compression, Communication and Processing (CCP)IEEE Press ( 2011 ) DOI: 10.1109/CCP.2011.21.
    Full ref.Full text
  202. J. Masó-Pau, P. Diaz, X. Pons, J. Serra, J. L. Monteagudo, F. Aulí. Impact of user concurrency in commonly used OGC map server implementations. In International Conference on Advanced Communications and ComputationInternational Academy, Research, and Industry Association ( 2011 )
    Full ref.Full text
  203. D. Abril, G. Navarro-Arribas, V. Torra. On the Declassification of Confidential Documents. In Modeling Decision for Artificial IntelligenceAcademic Press ( 2011 ) DOI: 10.1007/978-3-642-22589-5_22.
    Full ref.Full text
  204. J. Borges, C. Fernández, J. Rifà, J. Pujol, M. Villanueva. III International Castle Meeting on Coding Theory and Applications. ( 2011 )
    Full ref.Full text
  205. M. Bilal, J. Borges, C. Fernández, B. Gaston, J. Pernas, J. Pujol, J. Rifà, L. Ronquillo, F. Soloveva, M. Villanueva, V. Zinoviev. Red temática de Matemáticas en la Sociedad de la Información (MATSI). ( 2011 )
    Full ref.Full text
  206. H. Rifà, J. Rifà. Spectrum Sharing Models in Cognitive Radio Networks. In International Conference on Cyber-Enabled Distributed Computing and Knoledge DiscoveryIEEE Computer Society Press ( 2011 )
    Full ref.Full text
  207. J. Borges, J. Rifà, V. Zinoviev. Two new families of binary completely regular codes and distance regular graphs. In III International Castle Meeting on Coding Theory and Applications Servei de Publicacions, UAB ( 2011 )
    Full ref.Full text
  208. J. Borges, J. Rifà, F. Soloveva. On properties of propelinear and transitive binary codes. In III International Castle Meeting on Coding Theory and Applications Servei de Publicacions, UAB ( 2011 )
    Full ref.Full text
  209. J. Rifà, V. Zinoviev. On Lifting Perfect Codes. IEEE Transactions on Information Theory ( 2011 ) DOI: 10.1109/TIT.2010.2103410.
    Full ref.Full text
  210. B. Gaston, J. Pujol, M. Villanueva. Quasi-Cyclic Minimum Bandwidth Regenerating Codes. In 3rd International Castle Meeting on Coding Theory and ApplicationsServei de Publicacions, UAB ( 2011 )
    Full ref.Full text
  211. M. Villanueva, F. Soloveva. Professor Visitant. ( 2011 )
    Full ref.Full text
  212. C. Fernández, K. Phelps, M. Villanueva. Involutions in Binary Perfect Codes. IEEE Transactions on Information Theory ( 2011 ) DOI: 10.1109/TIT.2011.2162185.
    Full ref.Full text
  213. S. T. Dougherty, M. Bilal, J. Borges, C. Fernández. Maximum distance separable codes over Z_4 and Z_2xZ_4. Desings, Codes and Cryptography ( 2011 ) DOI: 10.1007/s10623-010-9437-1.
    Full ref.Full text
  214. C. Fernández, S. T. Dougherty. Codes over Z_2^k, Gray map and self-dual codes. Advances in Mathematics of Communication ( 2011 ) DOI: 10.3934/amc.2011.5.571 .
    Full ref.Full text
  215. J. Herrera, C. Perez. Online Social Honeynets: Trapping Web Crawlers in OSN. In Modeling Decision for Artificial IntelligenceSpringer ( 2011 ) DOI: 10.1007/978-3-642-22589-5_1.
    Full ref.Full text
  216. M. Bilal, J. Borges, C. Fernández. Binary Self-dual codes from 3-class association schemes. In III International Castle Meeting on Coding Theory and Applications Servei de Publicacions, UAB ( 2011 )
    Full ref.Full text
  217. C. Martínez, G. Navarro-Arribas, S. N. Foley, V. Torra, J. Borrell. Flexible secure inter-domain interoperability through attribute conversion. Information Sciences ( 2011 ) DOI: 10.1016/j.ins.2011.04.023.
    Full ref.More Information
  218. A. Martín, R. Martí, E. Yoneki, J. Crowcroft. Electronic Triage Tag and Opportunistic Networks in Disasters. In Special Workshop on the Internet and Disasters at ACM CoNEXT 2011 (WoID at CoNEXT 2011)ACM Press ( 2011 ) DOI: 10.1145/2079360.2079366.
    Full ref.Full text
  219. J. Pernas, J. Pujol, M. Villanueva. On the Permutation Automorphism Group of Quaternary Linear Hadamard Codes. In 3rd International Castle Meeting on Coding Theory and ApplicationsServei de Publicacions, UAB ( 2011 )
    Full ref.
  220. E. Byrne, M. Greferath, J. Pernas, J. Zumbrägel. Algebraic Decoding of Negacyclic Codes over Z4. In 7th International Workshop on Coding and Cryptography 2011INRIA. Roquencourt, France. ( 2011 )
    Full ref.
  221. J. Pernas, J. Pujol, M. Villanueva. Classification of Some Families of Quaternary Reed–Muller Codes. IEEE Transactions on Information Theory ( 2011 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  222. N. Giuditta, S. Robles, A. Viguria, S. Castillo, M. Cordero, L. Fernández. PROSES – Network Communications for the Future European ATM system. In Proceedings of the International Conference on Application and Theory of Automation in Command and Control Systems ( 2011 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  223. H. Rifà, J. Rifà, L. Ronquillo. Z2Z4-additive perfect codes in steganography. Advances in Mathematics of Communication ( 2011 ) DOI: 10.3934/amc.2011.5.425 .
    Full ref.More Information
  224. B. Gaston, J. Pujol, M. Villanueva. Quasi-cyclic Minimum Storage Regenerating Codes for Distributed Data Compression. In Data Compression Conference (DCC), 2011 IEEE Computer Society Press ( 2011 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  225. J. Rifà, L. Ronquillo. Construction of new completely regular Z2Z4-linear codes from old. In 7th International Workshop on Coding and Cryptography 2011  ( 2011 )
    Full ref.
  226. E. Mercadal, S. Robles, R. Martí, C. J. Sreenan, J. Borrell. Heterogeneous Multiagent Architecture for Dynamic Triage of Victims in Emergency Scenarios. In 9th International Conference on Practical Applications of Agents and Multiagent SystemsSpringer ( 2011 ) DOI: 10.1007/978-3-642-19875-5_31.
    Full ref.Full text
  227. C. Martínez, G. Navarro-Arribas, J. Borrell. Fuzzy Role-Based Access Control. Information Processing Letters ( 2011 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  228. F. Aulí, M. W. Marcellin. Rate-distortion optimized adaptive scanning order for bitplane image coding engines. In IEEE Data Compression ConferenceIEEE Press ( 2011 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  229. J. Muñoz, J. Bartrina, M. Marcellin, J. Serra. Influence of Noise Filtering in Coding Computed Tomography with JPEG2000. In Proceedings of the IEEE Data Compression ConferenceIEEE Press ( 2011 ) DOI: 10.1109/DCC.2011.48.
    Full ref.Full text
  230. L. Jimenez, F. Aulí, M. W. Marcellin, J. Serra. Pre-encoded JPEG2000 video transmission in a video-on-demand scenario. In Data Compression ConferenceIEEE Press ( 2011 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  231. F. Aulí. Stationary probability model for bitplane image coding through local average of wavelet coefficients. IEEE Transactions on Image Processing ( 2011 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  232. J. Borrell, S. Robles, R. Martí, J. Herrera, G. Navarro-Arribas, C. Martínez, J. García, C. Garrigues, M. de Toro, S. Castillo, R. Serrano, E. Mercadal, J. Cucurull, P. Marques, A. Martín. Seguridad en entornos móviles con conectividad intermitente para sus aplicaciones médicas y aeroespaciales. (N-KHRONOUS). ( 2011 )
    Full ref.
  233. M. Villanueva, J. Pujol, B. Gaston, J. Pernas, F. Slovieva. La codificación de la información para el almacenamiento distribuido y la autenticación en redes sociales. ( 2011 )
    Full ref.
  234. I. Blanes, J. Serra, P. Schelkens. Divide-and-conquer decorrelation for hyperspectral data compression. Springer Verlag ( 2011 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  235. I. Blanes, J. Serra. Pairwise Orthogonal Transform for Spectral Image Coding. IEEE Transactions on Geoscience and Remote Sensing ( 2011 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  236. F. Aulí, A. Bilgin, M. W. Marcellin. FAST Rate Allocation through Steepest Descent for JPEG2000 Video Transmission. IEEE Transactions on Image Processing ( 2011 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  237. F. García, J. Muñoz, M. Zortea, I. Blanes, V. González, G. Camps, A. Plaza, J. Serra. On the Impact of Lossy Compression on Hyperspectral Image Classification and Unmixing. IEEE Geoscience and Remote Sensing Letters ( 2011 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  238. I. Blanes. Divide-and-conquer Spectral Decorrelation for Remote-Sensing Image Coding. Phdthesis( 2010 )
    Full ref.Full text
  239. S. Castillo, J. Múrcia, J. Garcia. El Spyware como amenaza contra navegadores web. In XI Reunión Española sobre Criptología y Seguridad de la Información (RECSI) ( 2010 )
    Full ref.
  240. C. Perez, A. Martínez, J. Herrera. El proceso de Iniciativa Legislativa Popular por medio de firmas digitales. In Actas de la XI Reunión Española de Criptología y Seguridad de la Información (RECSI 2010)Universitat Rovira i Virgili ( 2010 )
    Full ref.Full text
  241. C. Perez, J. Herrera. OSN: When Multiple Autonomous Users Disclose Another Individual's Information. In 2010 International Conference on P2P, Parallel, Grid, Cloud and Internet ComputingIEEE Computer Society Press ( 2010 ) DOI: 10.1109/3PGCIC.2010.80.
    Full ref.Full text
  242. A. Martínez, J. Herrera, C. Perez. Análisis técnico-jurídico del proceso de Iniciativa Legislativa Popular con recogida de firmas digitales en España. In Revista de Derecho y TecnologíaUniversidad Católica de Táchira ( 2010 ) Diposit Legal: p.p. 200202TA1209.
    Full ref.
  243. J. Borges, S. T. Dougherty, C. Fernández. Additive Codes over Z2 x Z4. In Information Theory Workshop ( 2010 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  244. S. Robles, C. Fernández, J. Pons, R. M. Sebastián. El wiki para la coordinación de un grupo de interés en innovación docente. In Actes del Congrés Internacional de Docència Universitària i Innovació (CIDUI)Universitat Politècnica de Catalunya ( 2010 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  245. I. Blanes. Short-length stays to Spain and abroad for FPU grant holders. ( 2010 )
    Full ref.Full text
  246. J. Cucurull, R. Martí, G. Navarro-Arribas, S. Robles, J. Borrell, G. Suades. Fragment Transfer Protocol: An IEEE-FIPA based efficient transfer protocol for mobile agents. Journal of Computer Communications ( 2010 ) DOI: 10.1016/j.comcom.2010.08.005.
    Full ref.Full text
  247. A. Martín. Research stay in the University of Cambridge with the supervision of the professor Jon Crowcroft. ( 2010 )
    Full ref.Full text
  248. J. Rifà, M. Villanueva, F. Soloveva. Hamming Codes avoiding Hamming subcodes. In Algebraic and Combinatorial proceedingsAKADEMGORODOV ( 2010 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  249. J. Borges, J. Rifà, V. Zinoviev. On lifting Completely Regular Codes. In Algebraic and Combinatorial proceedingsAKADEMGORODOV ( 2010 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  250. C. Borrego, S. Robles. Mobile Agent Virtual Organisation to Improve Relative Information in Grid Services. In 5th International Conference on P2P, Parallel, Grid, Cloud and Internet ComputingAcademic Press ( 2010 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  251. J. Borges, J. Rifà, V. Zinoviev. On q-ary linear completely regular codes with $\rho=2$ and antipodal dual. Advances in Mathematics of Communication ( 2010 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  252. J. Rifà, L. Ronquillo. Product Perfect Z2Z4-linear codes in steganography. In Proceedings of the 2010 International Symposium of Information Theory and its ApplicationsPublicació on-line ( 2010 )
    Full ref.
  253. J. Bartrina, J. Serra, F. Aulí. JPEG2000 ROI Coding Through Component Priority for Digital Mammography. Computer Vision and Image Understanding, ELSEVIER ( 2010 ) DOI: 10.1016/j.cviu.2010.09.008.
    Full ref.Full text
  254. I. Blanes, F. García, J. Serra. Extensions to the CCSDS IDC Recommendation for On-Board Hyperspectral Image Coding. In Workshop on On-board Payload Data Compression (OBPDC) ( 2010 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  255. S. Robles, B. Martínez, A. Huegún, A. Lareki, J. I. Martínez, J. C. Sola, C. Iglesias, F. Santiveri, M. Santamaría, A. Sánchez. Equipos Docentes y Nuevas Identidades Académicas. Narcea ( 2010 ) DOI: 10.1109/TIT.2011.2119465.Diposit Legal: M-27.441.
    Full ref.
  256. C. Borrego, S. Robles. Seguridad en la Planificación de Agentes Móviles en Redes DTN. In Actas de la XI Reunión Española de Criptología y Seguridad de la InformaciónUniversitat Rovira i Virgili ( 2010 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  257. S. Castillo, S. Robles, M. de Toro, J. Borrell. Seguridad en Protocolos de Encaminamiento para Redes DTN. In Actas de la XI Reunión Española de Criptología y Seguridad de la InformaciónUniversitat Rovira i Virgili ( 2010 ) DOI: 10.1109/TIT.2011.2119465.Diposit Legal: T-1099/2010.
    Full ref.
  258. C. Martínez, G. Navarro-Arribas, J. García. Despliegue de políticas condicionada para la protección de atributos en negociadores móviles. In Actas de la XI RECSI Universitat Rovira i Virgili ( 2010 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  259. F. Aulí. Coding and interactive transmission of images and video with JPEG2000 standard. ( 2010 )
    Full ref.Full text
  260. B. Huang, A. Plaza, J. Serra. SPIE Conference on Satellite Data Compression, Communication, and Processing VI (OP404). Society of Photo-optical Instrumentation Engineers (SPIE) ( 2010 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  261. M. W. Marcellin, J. Serra. Programa Nacional de Movilidad de Recursos Humanos de Investigación. ( 2010 )
    Full ref.Full text
  262. L. Pesquer, A. Zabala, X. Pons, J. Serra. Quality analysis in N-dimensional lossy compression of multispectral remote sensing time series images. In Conference on Satellite Data Compression, Communication, and Processing VI Society of Photo-optical Instrumentation Engineers (SPIE) ( 2010 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  263. J. Muñoz, J. Bartrina, I. Blanes, L. Jimenez, F. Aulí, J. Serra. 4D remote sensing image coding with JPEG2000. In Conference on Satellite Data Compression, Communication, and Processing VI Society of Photo-optical Instrumentation Engineers (SPIE) ( 2010 ) DOI: 10.1117/12.860545.
    Full ref.Full text
  264. A. Zabala, J. González, J. Serra, X. Pons. JPEG2000 encoding of images with NODATA regions for Remote Sensing applications,. SPIE Journal on Applied Remote Sensing ( 2010 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  265. F. Aulí, I. Blanes, J. Bartrina, J. Serra. Stationary model of probabilities for symbols emitted by bitplane image coders. In International Conference on Image ProcessingIEEE Press ( 2010 ) DOI: 10.1109/ICIP.2010.5651220.
    Full ref.Full text
  266. M. W. Marcellin, J. Serra. Visiting Professor Grant. ( 2010 )
    Full ref.Full text
  267. M. W. Marcellin, J. Serra. Visiting Scholarship Fulbright Commission. ( 2010 )
    Full ref.Full text
  268. F. Aulí, J. Bartrina, I. Blanes, L. Jimenez, M. W. Marcellin, J. L. Monteagudo, J. Muñoz, J. Serra. GMES and Earth Observation combined with Position based Image and sensor Communications Technology for Universal Rescue, Emergency and Surveillance (GEO-PICTURES). ( 2010 )
    Full ref.Full text
  269. H. Rifà, J. Rifà, L. Ronquillo. Perfect Z2Z4-linear codes applied to steganography. In Libro de actas VII Jornadas de Matemática Discreta y AlgorítmicaUniversidad de Cantabria ( 2010 )
    Full ref.
  270. M. W. Marcellin, J. Serra. International Incoming Fellowships (IIF). ( 2010 )
    Full ref.Full text
  271. M. Bilal, J. Borges, S. T. Dougherty, C. Fernández. Optimal codes over Z2xZ4. In Libro de actas VII Jornadas de Matemática Discreta y Algorítmica ( 2010 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  272. I. Blanes, J. Serra, F. Aulí, J. Bartrina, L. Jimenez, J. Muñoz. Side information coding for the Pairwise Orthogonal Transform. In CEDI Workshop on Multimedia Data Coding and Transmission  ( 2010 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  273. L. Jimenez, F. Aulí, J. Muñoz, J. Bartrina, I. Blanes, J. Serra. Rate allocation method for the fast transmission of pre-encoded meteorological data over JPIP. In Conference on Satellite Data Compression, Communication, and Processing VI Society of Photo-optical Instrumentation Engineers (SPIE) ( 2010 ) DOI: 10.1117/12.860619.
    Full ref.Full text
  274. C. Martínez, A. Martín, G. Navarro-Arribas, R. Martí, J. Borrell. Control de acceso interoperable para la mejora en la cooperación entre grupos de emergencias. In Actas de la XI RECSI Universitat Rovira i Virgili ( 2010 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  275. F. Aulí, J. Bartrina, J. Serra. Enhanced JPEG2000 Quality Scalability through Block-Wise Layer Truncation. EURASIP Journal on Advances in Signal Processing ( 2010 ) DOI: 10.1155/2010/803542.
    Full ref.More Information
  276. C. Garrigues, S. Robles, J. Borrell, G. Navarro-Arribas. Promoting the development of secure mobile agent applications. Journal of Systems and Software ( 2010 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  277. M. Serra, J. M. Basart . A dialogical approach when learning engineering ethics in a virtual education frame. In ETHICOMP 2010Universitat Rovira i Virgili ( 2010 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  278. A. Martín, C. Martínez, J. Cucurull, R. Martí, S. Robles, J. Borrell. Computational Intelligence in Healthcare 4. Springer Verlag ( 2010 ) DOI: 10.1007/978-3-642-14464-6.
    Full ref.Full text
  279. I. Blanes, J. Serra. Cost and Scalability Improvements to the Karhunen-Loêve Transform for Remote-Sensing Image Coding. IEEE Transactions on Geoscience and Remote Sensing ( 2010 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  280. A. Martín, J. Crowcroft, E. Yoneki, R. Martí, C. Martínez. Using Haggle to create an Electronic Triage Tag. In The Second International Workshop on Mobile Opportunistic Networking - ACM/SIGMOBILE MobiOpp 2010ACM Press ( 2010 ) DOI: 10.1145/1755743.1755775.
    Full ref.Full text
  281. C. Fernández, K. Phelps. On the minimum distance graph of an extended Preparata code. Desings, Codes and Cryptography ( 2010 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  282. J. Cucurull, G. Navarro-Arribas, R. Martí, S. Robles, J. Borrell. An efficient and secure agent code distribution service. Software: Practice and Experience ( 2010 ) DOI: 10.1002/spe.963.
    Full ref.Full text
  283. F. Aulí. Local average-based model of probabilities for JPEG2000 bitplane coder. In IEEE Data Compression ConferenceIEEE Press ( 2010 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  284. J. L. Monteagudo, F. Aulí, J. Serra, J. Bartrina. Smart JPIP proxy server with prefetching strategies. In Proc. IEEE Data Compression ConferenceIEEE Press ( 2010 ) DOI: 10.1109/DCC.2010.16.
    Full ref.Full text
  285. M. Bilal, J. Borges, C. Fernández, J. Rifà, L. Ronquillo, V. Zinoviev. Códigos óptimos. Nuevas construcciones y aplicaciones. ( 2010 )
    Full ref.
  286. J. Rifà, V. Zinoviev. New completely regular q-ary codes based on Kronecker products. IEEE Transactions on Information Theory ( 2010 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  287. J. Rifà, V. Zinoviev. Professor Visitant. ( 2010 )
    Full ref.
  288. F. Aulí, J. Bartrina, I. Blanes, L. Donoso, M. W. Marcellin, J. Muñoz, C. Rubies, J. Serra, J. Fernandez. Scalable compression and interactive transmission and processing of massive images. ( 2010 )
    Full ref.
  289. C. Fernández, J. Pujol, M. Villanueva. Z2Z4-linear codes: rank and kernel. Desings, Codes and Cryptography ( 2010 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  290. J. Borges, C. Fernández, J. Pujol, J. Rifà, M. Villanueva. Z2Z4-linear codes: generator matrices and duality. Desings, Codes and Cryptography ( 2010 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  291. J. González, J. Bartrina, J. Serra. JPEG2000 Encoding of Remote Sensing Multispectral Images with No-Data Regions. IEEE Geoscience and Remote Sensing Letters ( 2010 ) DOI: 10.1109/LGRS.2009.2032370.
    Full ref.More Information
  292. R. Martí, S. Robles, A. Martín, J. Cucurull. Método y sistema para la gestión de información y clasificación de víctimas, en función de su grado de gravedad y condición médica, en situaciones de emergencia. . ( 2010 )
    Full ref.
  293. S. Castillo, J. García. Evaluation of Two Privacy-Preserving Protocols for the DNS. In Proceedings of the 2009 Sixth International Conference on Information Technology: New GenerationsIEEE Computer Society Press ( 2009 )
    Full ref.
  294. S. Castillo, J. García. Spyware-Based Menaces Against Web Applications. In Proceedings of the 2009 International Conference on Intelligent Networking and Collaborative SystemsIEEE Computer Society Press ( 2009 )
    Full ref.
  295. C. Borrego, S. Robles. Relative Information in Grid Information Service and Grid Monitoring Using Mobile Agents. In 7th International Conference on Practical Applications of Agents and Multi-Agent SystemsSpringer Berlin Heidelberg NY ( 2009 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  296. C. Martínez. Research stay in the University of Cambridge with the supervision of the professor Jean Bacon. ( 2009 )
    Full ref.Full text
  297. T. Dao. Interactive Coding of Images 6 (Ph.D. Fellowship). ( 2009 )
    Full ref.Full text
  298. J. Serra. Group on Interactive Coding of Images (UAB). European Activity. ( 2009 )
    Full ref.Full text
  299. J. Serra. REX-ICC4GEM, Marie Curie Industry-Academia Partnerships Pathway. ( 2009 )
    Full ref.Full text
  300. J. Bescós, J. M. Martínez, I. García, F. Díaz, P. A. Cuenca, A. Dapena, R. Duro, R. Molina, N. Guil, M. Pérez, A. Gómez, M. Graña, J. Serra, D. Megías, P. Salembier, P. Manzoni, M. L. Alcañiz. Red Temática en Codificación y Transmisión de Contenidos Multimedia. ( 2009 )
    Full ref.Full text
  301. A. Martín. Research stay in the University of Cambridge with the supervision of the professor Jon Crowcroft. ( 2009 )
    Full ref.
  302. S. Robles. SAHIB - Enhancing multi-institutional health data availability through multi-agent systems. ( 2009 )
    Full ref.
  303. J. Borges, J. Rifà, V. Zinoviev. On linear completely regular codes with covering radius $\ro$ = 1. Construction and classification. Nom revista absent ( 2009 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  304. F. García. Extending the CCSDS Recommendation for Imaga Data Compression for Remote Sensing scenarios. Phdthesis( 2009 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  305. J. González. Coding Techniques Addressed to Images Containing No-Data Regions within the JPEG2000 Framework. Phdthesis( 2009 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  306. J. Muñoz. Codificacio de Tomografies Computacionals amb JPEG2000. ( 2009 )
    Full ref.
  307. A. Martín. Programa de Formación del Profesorado Universitario (FPU). ( 2009 )
    Full ref.
  308. J. Borrell. Mobility Grant to visit the Department of Computer Science, University College Cork, Ireland. ( 2009 )
    Full ref.Full text
  309. J. Rifà. Review in: Mathematical Review. ( 2009 ) Constructions of difference systems of sets and disjoint difference families. by Fan, Cui-Ling; Lei, Jian-Guo; Chang, Yan-Xun in IEEE Trans. Inform. Theory 54 (2008), no. 7, pp.~3195--3201.
    Full ref.More Information
  310. S. Robles, J. Borrell, C. Fernández, M. Freixas, A. Pèlachs, J. Pons, R. M. Sebastián. Wiki en la Universitat Autónoma de Barcelona, Alcance y Perspectivas. Red U Revista de Docencia Universitaria ( 2009 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  311. S. Robles, R. Martí, J. Borrell. Protocolos de Red para el Cielo Único Europeo (PROSES). ( 2009 )
    Full ref.
  312. J. Pujol. Review in: Mathematical Review. ( 2009 ) Strongly closed subgraphs in a distance-regular graph with $c_2>1$ by Hiraki, Akira in Graphs Combin. 24 (2008), no. 6, 537--550.
    Full ref.More Information
  313. J. Pujol. Review in: Mathematical Review. ( 2009 ) A note on the construction of error detecting/correcting prefix codes by Pessoa, Artur Alves in Inform. Process. Lett. 107 (2008), no. 3, 34--38.
    Full ref.More Information
  314. J. Pujol. Review in: Mathematical Review. ( 2009 ) More efficient algorithms and analyses for unequal letter cost prefix-free coding by Golin, Mordecai; Li, Jian in Algorithms and computation, 329--340, Lecture Notes in Comput. Sci., 4835, Springer, Berlin, 2007.
    Full ref.More Information
  315. S. Robles. El Wiki, ¿Tecnología o Estrategia?. In Actas de RED-U USC09 Universidad de Mucia ( 2009 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  316. F. Aulí. Compression and transmission of N-dimensional images with JPEG2000 (Postdoctoral Fellowship). ( 2009 )
    Full ref.
  317. L. Jimenez. Interactive Coding of Images 4 (Ph.D. Fellowship). ( 2009 )
    Full ref.
  318. J. Rifà, F. Aulí, J. Bartrina, I. Blanes, J. Borges, J. Borrell, C. Fernández, R. Martí, J. Pernas, J. Pujol, S. Robles, L. Ronquillo, J. Serra, M. Villanueva, C. Martínez. Grup de Recerca Consolidat de Catalunya. ( 2009 )
    Full ref.
  319. J. Muñoz. Interactive Coding of Images 5 (Ph.D. Fellowship). ( 2009 )
    Full ref.
  320. J. Pernas, J. Pujol, M. Villanueva. Rank for Some Families of Quaternary Reed-Muller Codes. Lecture Notes in Computer Science ( 2009 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  321. M. Bilal. Duality of Z2Z4-Additive Codes. ( 2009 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  322. J. Borges, S. T. Dougherty, C. Fernández. Self-Dual Codes over Z_2xZ_4. Technical report ( 2009 )
    Full ref.Full text
  323. J. M. Basart , A. Cullell, A. Manresa, C. Nadeu, S. Robles, E. Valderrama, M. Colobran, M. Serra. Elaboració d'una matèria adaptada a l'EEES per a l'aprenentatge d'ètica professional en l'àmbit de les enginyeries. ( 2009 )
    Full ref.
  324. J. L. Monteagudo, J. Bartrina, F. Aulí, J. Serra. JPEG2000 rate-control for improved transmission of windows-of-interest in remote sensing scenarios. In Conference on Satellite Data Compression, Communication, and Processing IVSociety of Photo-optical Instrumentation Engineers (SPIE) ( 2009 ) DOI: 10.1117/12.826496.
    Full ref.
  325. J. Bartrina, J. Serra, F. Aulí, J. Muñoz. JPEG2000 ROI-Component coding. In Asilomar Conference on Signals, Systems, and ComputersIEEE Press ( 2009 ) DOI: 10.1109/ACSSC.2009.5469892.
    Full ref.
  326. F. García, J. Serra. Extending the CCSDS Recommendation for Image Data Compression for Remote Sensing Scenarios. IEEE Transactions on Geoscience and Remote Sensing ( 2009 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  327. F. Aulí, . 0 Oh, A. Bilgin, M. W. Marcellin. Hill climbing algorithm for the transmission of layered JPEG2000 video under multiple rate constraints. In Proceedings of the IEEE International Conference on Image ProcessingIEEE Press ( 2009 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  328. J. Borges, C. Fernández, J. Rifà. Propelinear structure of Z_{2k}-linear codes. Technical report ( 2009 )
    Full ref.Full text
  329. J. González, J. Bartrina, J. Serra. Encoding Scheme for Multi-Component Images Containing No-Data Regions. In IEEE International Conference on Image Processing IEEE Press ( 2009 ) DOI: 10.1109/ICIP.2009.5413670.
    Full ref.
  330. J. M. Basart , M. Serra. A Frame for Ethical Evaluation of (Information) Technologies. In VIII International Conference of Computer Ethics Philosophical EnquiryNomiki Bibliothiki ( 2009 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  331. J. M. Basart , M. Serra. Applied Ethics in Engineering Schools. In VII European Conference on Philosophy and Computing ( 2009 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  332. I. Blanes, J. Serra. Quality Evaluation of Progressive Lossy-to-Lossless Remote-Sensing Image Coding. In IEEE International Conference on Image Processing 2009IEEE Press ( 2009 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  333. J. Cucurull, R. Martí, G. Navarro-Arribas, S. Robles, J. Borrell. Full mobile agent interoperability in an IEEE-FIPA context. Journal of Systems and Software ( 2009 ) DOI: 10.1016/j.jss.2009.06.038.
    Full ref.Full text
  334. J. Rifà, V. Zinoviev. On Kronecker product constructions for q-ary linear completely regular codes. In XII International Symposium on problems of redundancy in information and control systems ( 2009 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  335. J. Pujol, J. Rifà, L. Ronquillo. Construction of Additive Reed-Muller Codes. Lecture Notes in Computer Science ( 2009 )
    Full ref.
  336. F. Aulí, M. W. Marcellin. Distortion estimators for bitplane image coding. IEEE Transactions on Image Processing ( 2009 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  337. J. Rifà, F. Slovieva, M. Villanueva. On the intersection of Z2Z4-additive Hadamard codes. IEEE Transactions on Information Theory ( 2009 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  338. H. Rifà, J. Rifà. Product Perfect Codes and Steganography. Digital Signal Processing ( 2009 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  339. J. Rifà, V. Zinoviev. On a class of binary linear completely transitive codes with arbitrary covering radius. Discrete Mathematics ( 2009 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  340. J. Borges. Review in: Mathematical Review. ( 2009 ) Alderson, Tim L.; Mellinger, Keith E. Families of OOC with $lambda=2$. IEEE Trans. Inform. theory 54(2008), no. 8, 3722--3724.
    Full ref.More Information
  341. R. Martí, S. Robles, A. Martín, J. Cucurull. Providing early resource allocation during emergencies: the mobile triage tag. Journal of Network and Computer Applications ( 2009 ) DOI: 10.1016/j.jnca.2009.05.006.
    Full ref.Full text
  342. J. Borges, J. Rifà, M. Villanueva. On some topics in Combinatorial Coding Theory. In Congreso de la Real Sociedad Matemática Española, Nuevos avances en Criptografía y codificación de la informaciónEdiciones y Publicaciones de la UdL ( 2009 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  343. J. Pujol, J. Rifà, F. Slovieva. Construction of Z4-Linear Reed–Muller Codes. IEEE Transactions on Information Theory ( 2009 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  344. J. Pujol. Review in: Mathematical Review. ( 2009 ) Some combinatorial constructions for optimal perfect deletion-correcting codes by Wang, Jianmin in Des. Codes Cryptogr. 48 (2008), no. 3, 331--347.
    Full ref.More Information
  345. J. Pujol. Review in: Mathematical Review. ( 2009 ) Lattices associated with distance-regular graphs by Wang, Kaishun; Li, Zengti in European J. Combin. 29 (2008), no. 2, 379--385.
    Full ref.More Information
  346. J. Pujol. Review in: Mathematical Review. ( 2009 ) On linear codes with large weights simultaneously for the Rosenbloom-Tsfasman and Hamming metrics by Skriganov, M. M. in J. Complexity 23 (2007), no. 4-6, 926--936.
    Full ref.More Information
  347. J. Rifà. Review in: Mathematical Review. ( 2009 ) Tardos, Gábor Optimal probabilistic fingerprint codes. J. ACM 55 (2008), no. 2, Art. 10, 24 pp.
    Full ref.More Information
  348. J. Bartrina. Region Of Interest Coding methods for JPEG2000. Phdthesis( 2009 )
    Full ref.Full text
  349. C. Martínez, G. Navarro-Arribas, J. Borrell, A. Martín. An access control scheme for multi-agent systems over multi-domain environments. In 7th International Conference on Practical Applications of Agents and Multi-Agent SystemsSpringer ( 2009 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  350. A. Martín, R. Martí, S. Robles, C. Martínez. Mobile agents for critical medical information retrieving from the emergency scene. In 7th International Conference on Practical Applications of Agents and Multi-Agent SystemsSpringer ( 2009 ) DOI: 10.1007/978-3-642-00487-2_4.
    Full ref.Full text
  351. I. Blanes, J. Serra. Clustered Reversible-KLT for Progressive Lossy-to-Lossless 3d Image Coding. In Data Compression Conference 2009IEEE Press ( 2009 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  352. F. Aulí, M. W. Marcellin, J. Serra. Highly accurate distortion estimation for JPEG2000 through pdf-based estimators. In Data Compression Conference 2009IEEE Press ( 2009 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  353. J. Cucurull, R. Martí, G. Navarro-Arribas, S. Robles, B. J. Overeinder, J. Borrell. Agent Mobility Architecture based on IEEE-FIPA standards. Journal of Computer Communications ( 2009 ) DOI: 10.1016/j.comcom.2008.11.038.
    Full ref.Full text
  354. J. Rifà, V. Zinoviev. Estada de professor visitant. ( 2009 )
    Full ref.
  355. F. Aulí, J. Bartrina, J. Serra. Self-Conducted Allocation Strategy of Quality Layers for JPEG2000. EURASIP Journal on Advances in Signal Processing ( 2009 ) DOI: 10.1155/2008/728794.
    Full ref.More Information
  356. J. Bartrina, J. Serra, F. Aulí. JPEG2000 ROI Coding with Fine-Grain Accuracy through Rate-Distortion Optimization Techniques. IEEE Signal Processing Letters ( 2009 ) DOI: 10.1109/ACSSC.2009.5469892.
    Full ref.More Information
  357. C. Garrigues, N. Migas, W. Buchanan, S. Robles, J. Borrell. Protecting mobile agents from external replay attacks. Journal of Systems and Software ( 2009 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  358. B. Huang, J. Serra. Satellite Data Compression, Communication, and Processing IV. Society of Photo-optical Instrumentation Engineers (SPIE) ( 2008 )
    Full ref.Full text
  359. J. Garcia, S. Castillo. Resolución de consultas anónimas sobre DNS. In X Reunión Española sobre Criptología y Seguridad de la Información (RECSI) ( 2008 )
    Full ref.
  360. S. Castillo, J. Garcia. Anonymous Resolution of DNS Queries. In Proceedings of the OTM 2008 Confederated International ConferencesSpringer Verlag ( 2008 ) DOI: http://dx.doi.org/10.1007/978-3-540-88873-4_5.
    Full ref.Full text
  361. J. Borrell, C. Fernández, F. García, R. Martí, J. Pons, S. Robles. Portfolios Virtuales Basados en Wiki para Evaluación Continua y Evaluación por Compañeros. In TICAI2006: TICs para el Aprendizaje de la IngenieríaIEEE, Sociedad de Educación ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  362. J. Serra, F. Aulí. Computational Intelligence for Remote Sensing. Springer Verlag ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  363. C. Fernández, J. Pujol, M. Villanueva. Rank and dimension of the kernel of Z4-linear codes. In American Mathematical Society regional conference. Special Session: Linear codes over rings and modules ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  364. R. M. Figueras, J. Serra. National Human Resources Fellowship. ( 2008 )
    Full ref.
  365. I. Blanes. Interactive Coding of Images 3 (Ph.D. Fellowship). ( 2008 )
    Full ref.
  366. I. Blanes, J. Serra. Interactive Coding of Images 3 (Ph.D. Fellowship). ( 2008 )
    Full ref.
  367. I. Blanes. Interactive Coding of Images 3 (Ph.D. Fellowship). ( 2008 )
    Full ref.
  368. J. Pernas. Some families of quaternary linear Reed-Muller codes. Kernel dimension. ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  369. J. Borrell, C. Fernández, M. Freixas, A. Pèlachs, J. Pons, S. Robles, R. M. Sebastián, A. Vié, A. Villalonga. GI-IDES:"Wiki" (Noves tecnologies aplicades a la docència). In Jornades d'Innovació DocentServei de Publicacions, UAB ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  370. J. Prieto, A. Moreno, J. Herrera. An Integrated Structure for a Virtual Networking Laboratory. IEEE Transactions on Industrial Electronics ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  371. J. Rifà, V. Zinoviev. . Lecture Notes in Computer Science ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  372. B. Gaston, J. Pujol, M. Villanueva. Development of algorithmic methods for binary non-linear codes in MAGMA. In VI Jornadas de Matemática Discreta y AlgorítmicaUniversitat de Lleida ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  373. J. Pujol, J. Rifà, F. Slovieva. On New Quaternary Reed-Muller Codes. In Proceedings 2008 IEEE Region 8 international conference on computational technologies in electrical and electronics engineering “SIBIRCON 2008”IEEE Press ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  374. J. Pujol. Review in: Mathematical Review. ( 2008 ) On the stabilizers of the minimum-weight codewords of the binary codes from triangular graphs by Rodrigues, B. G. in Ars Combin. 82 (2007), 353--364.
    Full ref.More Information
  375. J. Rifà, L. Ronquillo. About the Z4-linear Reed-Muller ZRM^-(r,m-1) and RMs(r,m) codes. In VI Jornadas de Matemática Discreta y AlgorítmicaUniversitat de Lleida ( 2008 )
    Full ref.
  376. C. Martínez. Control d'accés sota situacions d'emergència: Revisió i disseny de mecanismes de flexibilitat i interoperabilitat. ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  377. J. Martinez. 3-dimensional coding in JPEG2000. ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  378. C. Borrego. Publicación de información y monitorización relativa usando agentes móviles en la computación grid. ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  379. M. Colobran. Sistemes multi-agent en entorns de dades sensibles usant ontologies jurídiques. ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  380. J. M. Moyano. Minería de datos: en enfoque usando agentes móviles. ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  381. L. Ronquillo. On data-hiding and nonlinear codes. ( 2008 )
    Full ref.
  382. J. Villar. Tablas hash distribuidas. Revisión y problemas abiertos. ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  383. C. Fernández, J. Pujol, M. Villanueva. Una experiencia de trabajo colaborativo (WIKI) en la asignatura de matemática discreta. In V Congrès Internacional de Docència Universitària i InnovacióUniversitat de Lleida ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  384. J. Cucurull. Efficient Mobility and Interoperability of Software Agents. Phdthesis( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  385. J. Rifà, F. Slovieva. Estada de professor visitant. ( 2008 )
    Full ref.
  386. J. M. Basart . Ethics Applied to Technologies. Is All Well?. IEEE Technology and Society Magazine ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  387. J. Pernas, J. Pujol, M. Villanueva. Kernel dimension for some families of quaternary Reed-Muller codes. Lecture Notes in Computer Science ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  388. J. Rifà, F. Slovieva, M. Villanueva. Quaternary Hadamard codes and their intersections. In 1st Istanbul design theory and combinatorics conference.  ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  389. C. Fernández, J. Pujol, M. Villanueva. On Rank and Kernel of Z4-linear codes. Lecture Notes in Computer Science ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  390. C. Fernández, J. Pujol, M. Villanueva. Z2Z4-linear codes: rank and kernel. Technical report ( 2008 )
    Full ref.Full text
  391. J. Íñigo, J. M. Barceló, S. Llorente, J. M. Marquès, R. Martí, E. Peig, X. Perramón. Protocolos y Aplicaciones Internet. Fundació Universitat Oberta de Catalunya ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  392. J. Borges, C. Fernández, J. Pujol, J. Rifà, M. Villanueva. Red temática de Matemáticas en la Sociedad de la Información (MATSI). ( 2008 )
    Full ref.
  393. J. Rifà, J. Pujol, J. Herrera. MyCity, interacción de las administraciones públicas con sus ciudadanos a través de las redes sociales. ( 2008 )
    Full ref.
  394. J. Rifà, J. Pujol, M. Villanueva. Sistema de integridad de registro para tarjetas de crédito (PCI-DSS) y datos personales (LOPD). ( 2008 )
    Full ref.
  395. S. Robles, R. Martí. Integridad y Seguridad de la Historia Clínica. ( 2008 )
    Full ref.
  396. J. Melià-Seguí, J. Herrera, J. García. Análisis de seguridad y privacidad para sistemas EPC-RFID en el sector postal. In Actas de la X Reunión Española sobre Criptología y Seguridad de la InformaciónUniversidad de Salamanca ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  397. G. Navarro-Arribas, J. García, F. García, J. Herrera. Gestión de recursos de un navegador Web para prevenir ataques contra la privacidad en Tor. In Actas de la X Reunión Española sobre Criptología y Seguridad de la InformaciónUniversidad de Salamanca ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  398. J. García, S. Pérez. Resolución de consultas anónimas sobre DNS. In Actas de la X Reunión Española sobre Criptología y Seguridad de la Información ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  399. X. Doménech, J. Herrera, D. Megías. Prevención de ataques de desincronización en esquemas de watermarking de audio. In Actas de la X Reunión Española sobre Criptología y Seguridad de la InformaciónUniversidad de Salamanca ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  400. J. Arnedo, J. Herrera. JXTA security in basic peer operations. In Actas de la X Reunión Española sobre Criptología y Seguridad de la InformaciónUniversidad de Salamanca ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  401. J. Borrell, C. Martínez, J. Cucurull, M. de Toro, X. Piñol, S. Robles. . In Actas de la X Reunión Española sobre Criptología y Seguridad de la InformaciónImpresores de Seguridad ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  402. J. García, G. Navarro-Arribas. Prevención de ataques de Cross-Site Scripting en aplicaciones Web. In Actas de la X Reunión Española sobre Criptología y Seguridad de la InformaciónUniversidad de Salamanca ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  403. G. Navarro-Arribas, J. Borrell, A. Martín, C. Martínez. . In Actas de la X Reunión Española sobre Criptología y Seguridad de la InformaciónUniversidad de Salamanca ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  404. A. Martín, S. Robles, R. Martí, C. Garrigues. Historial clínico distribuido y seguro para situaciones de emergencias. In Actas de la X Reunión Española sobre Criptología y Seguridad de la InformaciónUniversidad de Salamanca ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  405. A. Martín. An approach to a global solution for emergency management / Un acercamiento a una solución global para la gestión de emergencias. ( 2008 )
    Full ref.
  406. A. Zabala, X. Pons, F. Aulí, J. Serra. Image compression effects in visual analysis. In SPIE International Conference on Satellite Data Compression, Communication and ProcessingSociety of Photo-optical Instrumentation Engineers (SPIE) ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  407. J. L. Monteagudo, F. Aulí, J. Serra, A. Zabala, J. Bartrina, X. Pons. Interactive transmission of spectrally wavelet-transformed hyperspectral images. In SPIE Conference on Satellite Data Compression, Communication, and Processing IV (OP404). Optics and PhotonicsSociety of Photo-optical Instrumentation Engineers (SPIE) ( 2008 ) DOI: 10.1117/12.794749.
    Full ref.
  408. J. Borges, J. Rifà, V. Zinoviev. On non-antipodal completely regular codes. Discrete Mathematics ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  409. J. Borges. Review in: Mathematical Reviews. ( 2008 ) S. Nishimura, T. Hiramatsu. A generalization of the Lee distance and error correcting codes. Discrete Applied Maths., 156 (2008), pp. 588-595.
    Full ref.More Information
  410. C. Garrigues. Contributions to Mobile Agent Protection from Malicious Hosts. Phdthesis( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  411. M. R. Quintero, S. Robles. Introducing a Wiki for the Formative Assessment of Laboratory Lessons in Biochemistry. In Actes del 5è Congrés Internacional de Docència Universitària i InnovacióUniversitat de Lleida ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  412. J. Pons, S. Robles, G. Navarro-Arribas, R. Martí, J. Borrell. Improvement of the Adaptation of the Wiki Platform to the University Teaching: The Concrete Case of the Subjects of Computer Networks. In Actes del 5è Congrés Internacional de Docència Universitària i InnovacióUniversitat de Lleida ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  413. S. Robles, J. Borrell, J. Castellà, E. César, C. Fernández, M. Freixas, . 0 Hernández, A. Pèlachs, J. Pons, R. M. Sebastián, R. Suppi, A. Villalonga. Avaluació i Seguiment de Competències en el Marc EEES: Integració d'una Eina Wiki al Campus Virtual de la UAB. ( 2008 )
    Full ref.
  414. C. Fernández, J. Pujol, M. Villanueva. Pairs of rank and kernel dimension for Z2Z4-linear codes. In 1st Istanbul design theory and combinatorics conference ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  415. J. M. Basart , M. Serra. The improvement of autonomy in online learning environments. In EDEN 2008 Annual ConferenceCD ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  416. I. Blanes, A. Zabala, J. Serra, G. Moré, X. Pons. Classification of Hyperspectral Images Compressed through 3D-JPEG2000. In Knowledge-Based Intelligent Information and Engineering Systems: KES 2008Springer ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  417. C. Garrigues, S. Robles, J. Borrell. Método para la protección de plataformas de computación frente a ataques externos de repetición de agentes móviles y sistema de plataformas de computación protegidas. . ( 2008 )
    Full ref.
  418. J. González, J. Serra, C. Rubies, L. Donoso. Encoding of Images Containing No-Data Regions within JPEG2000 Framework. In IEEE International Conference on Image ProcessingIEEE Press ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  419. F. Aulí, D. Taubman. Optimal delivery of motion JPEG2000 over JPIP with block-wise truncation of quality layers. In IEEE International Conference on Image ProcessingIEEE Press ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  420. F. Aulí, D. Taubman. JPEG2000 Block-Wise Truncation of Quality Layers. In IEEE/IET International Conference on Visual Information EngineeringIEEE Press ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  421. I. García, P. A. Cuenca, A. Dapena, R. Duro, R. Molina, N. Guil, M. Pérez, A. Gómez, M. Graña, J. Serra, D. Megías, P. Salembier, P. Manzoni, M. L. Alcañiz. Red Temática en Codificación y Transmisión de Contenidos Multimedia (RTCTM). ( 2008 )
    Full ref.
  422. J. Borges. Review in: Mathematical Reviews. ( 2008 ) Heden, Olof. The partial order of perfect codes associated to a perfect code. Adv. Math. Commun. 1 (2007), no. 4, 399-412.
    Full ref.More Information
  423. J. M. Basart . Hindrances to engineering ethics appraisal. In Int. Conf. on Ethics and Human Values in Engineering.International Center for Numerical Methods in Engineering ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  424. C. Garrigues, S. Robles, J. Borrell. Securing dynamic itineraries for mobile agent applications. Journal of Network and Computer Applications ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  425. F. García, J. Serra, J. Bartrina, F. Aulí. Hyperspectral Image Coding Using 3D Transform and the Recommendation CCSDS-122-B-1. In Proc IEEE Data Compression ConferenceIEEE Computer Society Press ( 2008 ) DOI: 10.1109/DCC.2008.68.
    Full ref.
  426. J. Bartrina, F. Aulí, J. Serra, J. L. Monteagudo. JPEG2000 arbitrary ROI coding through rate-distortion optimization techniques. In Proc IEEE Data Compression ConferenceIEEE Computer Society Press ( 2008 ) DOI: 10.1109/DCC.2008.70.
    Full ref.Full text
  427. S. Robles, J. Pons, J. Borrell, M. Freixas, C. Fernández, R. M. Sebastián, A. Pèlachs. New Wiki Tools for On-line Formative Assessment. In Proceedings of the International Technology and Development Conference ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  428. J. Borges, C. Fernández, K. Phelps. ZRM Codes. IEEE Transactions on Information Theory ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  429. F. Aulí, J. Serra. JPEG2000 Quality Scalability Without Quality Layers. IEEE Transactions on Circuits and Systems for Video Technology ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  430. J. Rifà, F. Slovieva, M. Villanueva. On the intersection of Z2Z4-additive perfect codes. IEEE Transactions on Information Theory ( 2008 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  431. C. Martínez. Becas para personal investigador en formación. ( 2007 )
    Full ref.Full text
  432. J. L. Monteagudo, J. Serra. Interactive Coding of Images 1 (Ph.D. Fellowship). ( 2007 )
    Full ref.
  433. F. Aulí. Interactive transmission of volumetric data using the JPEG2000 standard (Postdoctoral Fellowship). ( 2007 )
    Full ref.
  434. J. González, J. Serra. Interactive Coding of Images 2 (Ph.D. Fellowship). ( 2007 )
    Full ref.
  435. J. Borges. Review in: Mathematical Reviews. ( 2007 ) Dinh, Hai Q. Complete distances of all negacyclic codes of length $2^s$ over $Z_{2^a}$. IEEE Trans. Inform. theory 53 (2007), no. 1, 147--161.
    Full ref.More Information
  436. M. Huertas, J. Pujol. e-Learning de las Matemáticas en las Universidades Españolas: tendencias tecnológicas emergentes y adaptación al EEES. ( 2007 )
    Full ref.
  437. A. Cortés, M. A. Senar, E. César, R. Toledo, X. Verge, J. C. Moure, R. Suppi, J. Pujol, A. Morajko, . 0 Hernández, J. Sorribes. EPI: Ensenyament Presencial Interactiu. ( 2007 )
    Full ref.
  438. R. Toledo, J. Pujol, J. Pons, X. Verge, X. Oriols, J. Borges, A. Cortés, D. Franco. Plataforma de “e-learning” para la definición de actividades de formación incluyendo la medición y cuantificación del esfuerzo de alumnos y profesores en asignaturas de la titulación de Ingeniería Técnica en Informática impartidas según ECTS. ( 2007 )
    Full ref.
  439. J. Pujol. Review in: Mathematical Review. ( 2007 ) A note on strongly regular self-complementary graphs by Tian, Fang in Chinese Quart. J. Math. 21 (2006), no. 1, 62--65.
    Full ref.More Information
  440. J. Pujol. Review in: Mathematical Review. ( 2007 ) Lower bounds for codes correcting moderate-density bursts of fixed length with Lee weight consideration by Jain, Sapna; Nam, Ki-Bong in Linear Algebra Appl. 418 (2006), no. 1, 122--129.
    Full ref.More Information
  441. J. Pujol. Review in: Mathematical Review. ( 2007 ) An information-lossless decomposition theory of relational information systems by Lee, Tony T.; Lo, Terry Y.; Wang, Jianfang in IEEE Trans. Inform. Theory 52 (2006), no. 5, 1890--1903.
    Full ref.More Information
  442. J. Borges, C. Fernández, J. Pujol, J. Rifà, M. Villanueva. Códigos combinatorios óptimos. ( 2007 )
    Full ref.
  443. J. Íñigo, J. M. Barceló, S. Llorente, J. M. Marquès, R. Martí, E. Peig, X. Perramón. Protocolos y Aplicaciones Internet. Fundació Universitat Oberta de Catalunya ( 2007 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  444. J. Íñigo, J. M. Barceló, S. Llorente, J. M. Marquès, R. Martí, E. Peig, X. Perramón. Protocols i Aplicacions Internet. Fundació Universitat Oberta de Catalunya ( 2007 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  445. J. Pujol, J. Rifà, F. Slovieva. Quaternary Plotkin constructions and quaternary Reed-Muller codes. Lecture Notes in Computer Science ( 2007 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  446. J. Serra, F. Aulí. JPEG2000: Quality Scalability and Windows of Interest Transmission. In Asilomar International Conference,IEEE Press ( 2007 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  447. M. de Toro, S. Robles, R. Martí, G. Navarro-Arribas, J. Borrell. Hacia una Solución Global para Servicios Médicos en Situaciones de Emergencia. In Actas del II Simposio sobre Seguridad Informática del Congreso Español de InformáticaThomson ( 2007 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  448. J. Cucurull, B. J. Overeinder, M. Oey, J. Borrell, F. M. Brazier. Abstract Software Migration Architecture Towards Agent Middleware Interoperability. In Proceedings of the 2nd Int'l Multiconference on Computer Science and Information Technology (IMCSIT), Wisla, PolandPolish Information Processing Society ( 2007 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  449. J. García, G. Navarro-Arribas. Prevention of Cross-Site Scripting Attacks on Current Web Applications. Lecture Notes in Computer Science ( 2007 ) DOI: 10.1007/978-3-540-76843-2_45.
    Full ref.More Information
  450. J. García, G. Navarro-Arribas. A survey on detection techniques to prevent cross-site scripting attacks on current web applications. Lecture Notes in Computer Science ( 2007 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  451. J. Borges, C. Fernández, J. Pujol, J. Rifà, M. Villanueva. Z2Z4-linear codes: generator matrices and duality. Technical report ( 2007 )
    Full ref.More Information
  452. S. Robles, J. Borrell, M. Freixas, J. Pons, M. Llado. Adaptació d'un Sistema Wiki per a la Docència Universitària dins l'EEES. In Jornades d'Innovació DocentServei de Publicacions, UAB ( 2007 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  453. J. Pons, J. Borrell, M. Freixas, M. Llado, A. Pèlachs, S. Robles, R. M. Sebastián. Ús d'un Entorn Wiki per a la Docència Universitària dins l'EEES. In Jornades d'Innovació DocentServei de Publicacions, UAB ( 2007 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  454. S. Robles. Trust and security. In Issues in Multi-Agent SystemsSpringer Verlag ( 2007 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  455. J. Borges, C. Fernández. Plotkin construction: Rank and Kernel. Technical report ( 2007 )
    Full ref.More Information
  456. J. Cucurull, R. Martí, S. Robles, J. Borrell, G. Navarro-Arribas. FIPA-based Interoperable Agent Mobility. In CEEMAS07Springer Verlag ( 2007 ) DOI: 10.1007/978-3-540-75254-7_37.
    Full ref.Full text
  457. J. Borges. Review in: Mathematical Reviews. ( 2007 ) An optimal lower bound for 2-query locally decodable linear codes by Shiowattana, Dungjade; Lokam, Satyanarayana V. in Information Processing Letters, 97(2006), no. 6, pp. 244-250.
    Full ref.More Information
  458. M. Bras, M. E. O'Sullivan. The Order Bound on the Minimum Distance of the One-Point Codes Associated to the Garcia-Stichtenoth Tower of Function Fields. IEEE Transactions on Information Theory ( 2007 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  459. J. Borges, C. Fernández, J. Pujol, J. Rifà, M. Villanueva. Matemáticas en la sociedad de la Información (MATSI). ( 2007 )
    Full ref.
  460. J. Rifà, V. Zinoviev. On new completely regular codes. Problems of Information Transmission ( 2007 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  461. J. Bartrina, F. Aulí, J. Serra, A. Zabala, X. Pons, J. Masó-Pau. Region Of Interest coding applied to Map Overlapping in Geographic Information Systems. In IEEE International Geoscience And Remote Sensing SymposiumIEEE Press ( 2007 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  462. M. Bras. Fibonacci-Like Behavior of the Number of Numerical Semigroups of a Given Genus. Semigroup Forum ( 2007 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  463. . Moratalla, S. Robles. Component-Based Development of Secure Mobile Agents Applications. Lecture Notes in Artificial Intelligence ( 2007 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  464. F. García, F. Aulí, J. Serra. Modifying file syntax for Interactive Decoding the Recommendation CCSDS-122-B-1. In SPIE Conference on Satellite Data Compression, Communications, and Archiving (OEI106).Optics and PhotonicsSociety of Photo-optical Instrumentation Engineers (SPIE) ( 2007 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  465. F. García, J. Serra, A. Zabala, X. Pons. Interactive Decoding for the CCSDS Recommendation for Image Data Compression. In SPIE Europe Remote Sensing 2007. Society of Photo-optical Instrumentation Engineers (SPIE)Society of Photo-optical Instrumentation Engineers (SPIE) ( 2007 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  466. J. González, F. Aulí, J. Bartrina, J. Serra. JPEG2000 Coding Techniques Addressed To Images Containing No-Data Regions. Lecture Notes in Computer Science ( 2007 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  467. F. Aulí, J. Serra, C. Rubies, L. Donoso. JPEG2000 Low Complexity Allocation Method of Quality Layers. Lecture Notes in Computer Science ( 2007 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  468. A. Zabala, X. Pons, F. Aulí, J. Serra. Implications of JPEG2000 lossy compression on multiple regression modeling. In SPIE Europe Remote Sensing 2007Society of Photo-optical Instrumentation Engineers (SPIE) ( 2007 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  469. F. Aulí, J. Serra, J. Bartrina, J. L. Monteagudo. Enhanced Quality Scalability for JPEG2000 code-streams by the Characterization of the Rate-Distortion Slope. In IEEE International Conference on Image Processing 2007IEEE Press ( 2007 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  470. C. Fernández, M. Villanueva. Z2Z4-linear codes: rank and kernel. In XI International Symposium on problems of redundancy in information and control systems  ( 2007 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  471. M. Villanueva, F. Slovieva. Estancia Profesorado Visitante. ( 2007 )
    Full ref.
  472. M. Bras, A. de Mier. Representation of Numerical Semigroups by Dyck Paths. Semigroup Forum ( 2007 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  473. M. Bras, M. E. O'Sullivan. On Semigroups Generated by Two Consecutive Integers and Hermitian codes. IEEE Transactions on Information Theory ( 2007 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  474. J. Rifà, F. Slovieva, M. Villanueva. Intersection of quaternary linear Hadamard codes. In International Workshop on Hadamard and Cocyclic Matrices and Applications, IWHCMA'07,Universidad de Sevilla ( 2007 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  475. K. Phelps, M. Villanueva. On the intersection problem for Hadamard codes. In International Workshop on Hadamard and Cocyclic Matrices and Applications. IWHCMA'07, Universidad de Sevilla ( 2007 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  476. J. Rifà, F. Slovieva, M. Villanueva. On the intersection of additive extended and non-extended perfect codes. In Proceedings of Workshop on Coding and Cryptography, WCC'07, INRIA. Roquencourt, France. ( 2007 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  477. K. Phelps, M. Villanueva. Intersection of Hadamard codes. IEEE Transactions on Information Theory ( 2007 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  478. M. Bras. Matemàtiques que milloren la comunicació. . ( 2007 )
    Full ref.Full text
  479. M. Bras. Algebraic-Geometry Codes, One-Point Codes and Evaluation Codes. Desings, Codes and Cryptography ( 2007 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  480. M. Bras. A Note on Numerical Semigroups. IEEE Transactions on Information Theory ( 2007 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  481. J. Cucurull, J. Ametller, R. Martí. Developing Multi-Agent Systems with JADE. Academic Press ( 2007 ) DOI: 10.1002/9780470058411.
    Full ref.Full text
  482. F. Aulí, J. Serra. Low complexity JPEG2000 rate control through reverse subband scanning order and coding passes concatenation. IEEE Signal Processing Letters ( 2007 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  483. J. Rifà, F. Slovieva, M. Villanueva. On the intersection of additive perfect codes. Technical report ( 2006 )
    Full ref.Full text
  484. M. Bras, J. González, P. Guitart, J. Serra, F. García. . In Data Compression Conference ProceedingsIEEE Computer Society Press ( 2006 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  485. F. Aulí, J. Bartrina, I. Blanes, R. M. Figueras, F. García, J. González, J. L. Monteagudo, J. Serra. Interactive coding and transmission of high-resolution images. Applications in Remote Sensing, Geographic Information Systems, and Telemedicine (INCO). ( 2006 )
    Full ref.
  486. J. Pujol. Review in: Mathematical Review. ( 2006 ) On constant composition codes by Chu, Wensong; Colbourn, Charles J.; Dukes, Peter in Discrete Appl. Math. 154 (2006), no. 6, 912--929.
    Full ref.More Information
  487. J. Pujol. Review in: Mathematical Review. ( 2006 ) Association schemes of conjugate matrices by Szczerba-Zubek, Anna in J. Statist. Plann. Inference 136 (2006), no. 1, 270--281.
    Full ref.More Information
  488. J. Pujol. Review in: Mathematical Review. ( 2006 ) Some results on a generalized useful information measure by Khan, Abul Basar; Bhat, Bilal Ahmad; Pirzada, S. in JIPAM. J. Inequal. Pure Appl. Math. 6 (2005), no. 4, Article 117, 5 pp. (electronic).
    Full ref.More Information
  489. J. Pujol. Review in: Mathematical Review. ( 2006 ) Simplex codes over the ring $\sum\sb {n=0}\sp su\sp nF\sb 2$ by AL-Ashker, Mohammed M. in Turkish J. Math. 29 (2005), no. 3, 221--233.
    Full ref.More Information
  490. J. Pujol. Review in: Mathematical Review. ( 2006 ) Triangle- and pentagon-free distance-regular graphs with an eigenvalue multiplicity equal to the valency by Jurišić, Aleksandar; Koolen, Jack; Miklavič, Štefko in J. Combin. Theory Ser. B 94 (2005), no. 2, 245--258.
    Full ref.More Information
  491. J. Borrell, S. Robles, G. Navarro-Arribas, J. Cucurull, C. Garrigues. IX Reunión Española sobre criptologia y Seguridad de la Información. ( 2006 )
    Full ref.
  492. S. Robles, J. Herrera, J. Borrell, J. Rifà. IX Reunión Española sobre Criptología y Seguridad de la Información. ( 2006 )
    Full ref.
  493. J. Borges, C. Fernández, K. Phelps. On ZRM codes. In V Jornadas de Matemática Discreta y AlgorítmicaUniversidad de Valladolid ( 2006 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  494. F. Aulí, J. Bartrina, M. Bras, L. Donoso, C. Fernández, F. García, J. González, P. Guitart, J. Rifà, C. Rubies, J. Serra. Compresión y transmisión interactiva de imágenes de alta resolución. Aplicaciones en Telemedicina. ( 2006 )
    Full ref.Full text
  495. J. Borges, C. Fernández, J. Pujol, J. Rifà, M. Villanueva. Caracterización y construcción, a partir de criterios estructurales, de códigos combinatorios óptimos. ( 2006 )
    Full ref.
  496. G. Navarro-Arribas, S. N. Foley. Aproximando SAML con medidas de similitud. In Actas de la IX Reunión Española de Criptología y Seguridad de la Información ( 2006 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  497. G. Navarro-Arribas. Access Control and Authorisation Management in Mobile Agent Systems. Phdthesis( 2006 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  498. F. Aulí. Model-based JPEG2000 rate control methods. Phdthesis( 2006 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  499. M. Bras. Review in: Mathematical Review. ( 2006 ) Ballico, Edoardo; Fontanari, Claudio: The Horace method for error-correcting codes. Appl. Algebra Engrg. Comm. Comput. 17 (2006), no. 2, 135--139.
    Full ref.Full text
  500. J. García. Platform of Intrusion Management - Design and implementation. Phdthesis( 2006 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  501. M. Badia, J. Borrell, C. Fernández, M. Freixas, F. García, A. Pèlachs, J. Pons, S. Robles, R. M. Sebastián, A. Vié, A. Villalonga. Noves Estratègies d'Aprenentatge en el Marc de l'Espai Europeu d'Educació Superior: l'Ús del Wiki. ( 2006 )
    Full ref.Full text
  502. J. Bartrina. Regions d'Interès per a JPEG2000. ( 2006 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  503. M. Bras, M. E. O'Sullivan. The Correction Capability of the Berlekamp-Massey-Sakata algorithm with Majority Voting. Nom revista absent ( 2006 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  504. . Moratalla. Entorn Integrat pel Desenvolupament i Seguiment d'Agents Mòbils. ( 2006 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  505. S. Robles, J. Borrell, J. García, G. Navarro-Arribas. Red Temática Nacional de Tecnología de Agentes y Sistemas Multi-Agente. ( 2006 )
    Full ref.
  506. S. Robles, J. Borrell, J. M. Basart , R. Martí, J. Pons, G. Navarro-Arribas, J. Ametller, M. de Toro, M. Colobran, J. García, J. Cucurull, C. Garrigues. Diseño e implementación de una solución global para el soporte de servicios críticos en situaciones de emergencia. ( 2006 )
    Full ref.Full text
  507. J. Cucurull. Contribució a la mobilitat i seguretat dels agents software. ( 2006 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  508. J. Borges, C. Fernández, J. Pujol, M. Villanueva. . ( 2006 )
    Full ref.
  509. J. García, S. Castillo, J. Castellà, G. Navarro-Arribas, J. Borrell. SMARTCOP - A Smart Card Based Access Control for the Protection of Network Security Components. Lecture Notes in Computer Science ( 2006 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  510. J. García, F. Cuppens, N. Cuppens. Analysis of Policy Anomalies on Distributed Network Security Setups. Lecture Notes in Computer Science ( 2006 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  511. J. García, S. Castillo, J. Castellà, G. Navarro-Arribas, J. Borrell. Protection of Components based on a Smart-card Enhanced Security Module. Lecture Notes in Computer Science ( 2006 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  512. J. García, F. Cuppens, F. Cuppens. Towards Filtering and Alerting Rule Rewriting on Single-Component Policies. Lecture Notes in Computer Science ( 2006 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  513. J. García, I. Barrera-Caparros. Intercambio distribuido de alertas para la gestión de ataques coordinados. In Actas de la IX Reunión Española de Criptología y Seguridad de la Información ( 2006 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  514. J. García, S. Castillo, J. Castellà, G. Navarro-Arribas. Protección de componentes y dispositivos de seguridad mediante un control de acceso basado en kernel. In Actas de la IX Reunión Española de Criptología y Seguridad de la Información ( 2006 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  515. J. García, F. Cuppens, F. Cuppens. Análisis de anomalí­as sobre polí­ticas de control de acceso en red. In Actas de la IX Reunión Española de Criptología y Seguridad de la Información ( 2006 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  516. F. Cuppens, J. García. Detection of Network Security Component Misconfiguration by Rewriting and Correlation. In In 5th Conference on Security and Network Architectures (SAR 2006)Citeseer ( 2006 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  517. P. Marques, S. Robles, J. Cucurull, R. Cruz, G. Navarro-Arribas, R. Martí. Secure Integration of Distributed Medical Data using Mobile Agents. IEEE Intelligent Systems ( 2006 ) DOI: 10.1109/MIS.2006.120.
    Full ref.Full text
  518. J. Borrell, R. Martí, G. Navarro-Arribas, J. Pons, S. Robles. Wikis i Avaluació per Companys en Assignatures de Xarxes d'Ordinadors. In Jornades d'Innovació DocentServei de Publicacions, UAB ( 2006 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  519. C. Garrigues, S. Robles, . Moratalla. Metodología para el Desarrollo Automatizado de Aplicaciones Seguras Basadas en Agentes Móviles. In Actas de la IX Reunión Española de Criptología y Seguridad de la Información ( 2006 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  520. J. Rifà, I. Dejter. Estancia Profesorado Visitante. ( 2006 )
    Full ref.
  521. J. Ametller, J. Cucurull, R. Martí, G. Navarro-Arribas, S. Robles. Enabling Mobile Agents Interoperability Through FIPA Standards. In Cooperative Information Agents XSpringer Verlag ( 2006 ) DOI: 10.1007/11839354_28.
    Full ref.Full text
  522. J. Borges, J. Rifà, V. Zinoviev. On non-antipodal binary completely regular codes. In ACCT-10Russian Academic of Sciences ( 2006 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  523. J. Rifà, V. Zinoviev. On completely regular codes from perfect codes. In ACCT-10Russian Academic of Sciences ( 2006 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  524. J. Rifà, V. Zinoviev. Construction of new completely regular q-ary codes from q-ary perfect codes. In V Jornadas de Matemática Discreta y AlgorítmicaUniversidad de Valladolid ( 2006 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  525. J. Borges, C. Fernández, J. Pujol, J. Rifà, M. Villanueva. On Z2Z4-linear codes and duality. In V Jornadas de Matemática Discreta y AlgorítmicaUniversidad de Valladolid ( 2006 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  526. J. M. Basart . Introducció de l'ètica al currículum d'Enginyeria Informàtica. In 4t Congrés Internacional Docència Universitària i Innovació ( 2006 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  527. J. Rifà. Review in: Mathematical Review. ( 2006 ) "On private scalar product computation for privacy-preserving data mining." by Goethals, Bart; Laur, Sven; Lipmaa, Helger; Mielikäinen, Taneli in Information security and cryptology---ICISC 2004, 104--120, Lecture Notes in Comput. Sci., 3506, Springer, Berlin, 2005.
    Full ref.More Information
  528. J. Rifà. Review in: Mathematical Review. ( 2006 ) "Continued fractions and RSA with small secret exponent" by Dujella, Andrej in Tatra Mt. Math. Publ. 29 (2004), 101--112.
    Full ref.More Information
  529. J. Rifà. Review in: Mathematical Review. ( 2006 ) "Immunizing encryption schemes from decryption errors" by Dwork, Cynthia; Naor, Moni; Reingold, Omer in Advances in cryptology---EUROCRYPT 2004, 342--360, Lecture Notes in Comput. Sci., 3027, Springer, Berlin, 2004.
    Full ref.More Information
  530. G. Navarro-Arribas, J. Borrell. An XML Standards Based Authorization Framework for Mobile Agents. In Secure Mobile Ad-hoc Networks and SensorsSpringer Verlag ( 2006 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  531. J. Borrell, R. Martí, G. Navarro-Arribas, J. Pons, S. Robles. Noves Experiències d'Avaluació amb Wikis: Grups Nombrosos i Avaluació per Companys. In Actes del 4rt Congrés Internacional de Docència Universitària i Innovació ( 2006 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  532. J. Serra, S. W. Lee, S. W. Lee. Compression of Hyperspectral Images Using Significant Pixel Information of Wavelet Transforms. In 26th International Geoscience and Remote Sensing SymposiumIEEE Press ( 2006 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  533. A. Zabala, X. Pons, J. A. Delgado, J. Serra, F. Aulí, F. García. Effects of JPEG and JPEG2000 lossy compression on remote sensing image classification for mapping crops and forest areas. In 26th International Geoscience and Remote Sensing SymposiumIEEE Press ( 2006 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  534. J. Rifà. Review in: Mathematical Review. ( 2006 ) ``On proactive secret sharing schemes." by Nikov, Ventzislav; Nikova, Svetla in Selected areas in cryptography, 308--325, Lecture Notes in Comput. Sci., 3357, Springer, Berlin, 2005.
    Full ref.More Information
  535. J. Rifà. Review in: Mathematical Review. ( 2006 ) ``Identification algorithms for sequential traitor tracing." by Fernandez, Marcel; Soriano, Miguel in Progress in cryptology---INDOCRYPT 2004, 414--429, Lecture Notes in Comput. Sci., 3348, Springer, Berlin, 2004.
    Full ref.More Information
  536. J. Rifà. Review in: Mathematical Review. ( 2006 ) Three constructions of authentication/secrecy codes. By Ding, Cunsheng; Salomaa, Arto; Solé, Patrick; Tian, Xiaojian in J. Pure Appl. Algebra 196 (2005), no. 2-3, 149--168.
    Full ref.More Information
  537. J. Rifà. Review in: Mathematical Review. ( 2006 ) Secure identity based encryption without random oracles. By Boneh, Dan; Boyen, XavierAdvances in cryptology---CRYPTO 2004, 443--459, Lecture Notes in Comput. Sci., 3152, Springer, Berlin, 2004.
    Full ref.More Information
  538. J. Rifà. Review in: Mathematical Review. ( 2006 ) Secure hypergraphs: privacy from partial broadcast. By Franklin, Matthew; Yung, Moti SIAM J. Discrete Math. 18 (2004), no. 3, 437--450 (electronic).
    Full ref.More Information
  539. F. Aulí, J. Serra, J. L. Monteagudo, J. Bartrina. Efficient Rate Control for JPEG2000 Coder and Decoder. In Proceedings IEEE Data Compression ConferenceIEEE Computer Society Press ( 2006 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  540. K. Phelps, J. Rifà, M. Villanueva. Hadamard codes of length 2^t·s (s odd). Rank and Kernel. Lecture Notes in Computer Science ( 2006 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  541. M. Bras, P. A. García-Sánchez. Patterns on Numerical Semigroups. Linear Algebra and Its Applications, Elsevier ( 2006 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  542. J. Rifà, F. Slovieva. Estancia Profesorado Visitante. ( 2006 )
    Full ref.
  543. F. Cuppens, F. Autrel, Y. Bouzida, J. García, S. Gombault, T. Sans. Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework. Annals of Telecommunications ( 2006 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  544. K. Phelps, J. Rifà, M. Villanueva. On the additive Z4-linear and non-Z4-linear Hadamard codes. Rank and Kernel. IEEE Transactions on Information Theory ( 2006 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  545. J. Pujol. Review in: Mathematical Review. ( 2005 ) New bounds for $n_4(k,d)$ and classification of some optimal codes over ${\rm GF}(4)$ by Bouyukliev, Iliya; Grassl, Markus; Varbanov, Zlatko in Discrete Math. 281 (2004), no, 1-3, 43--66.
    Full ref.More Information
  546. J. Bartrina, J. Serra. Region Of Interest Coding in JPEG2000 (Ph.D. Fellowship). ( 2005 )
    Full ref.
  547. J. Pujol. Review in: Mathematical Review. ( 2005 ) A distance regular graph with intersection array (21, 16, 8; 1, 4, 14) does not exist by Coolsaet, K. in European J. Combin. 26 (2005), no. 5, 709--716.
    Full ref.More Information
  548. J. Pujol. Review in: Mathematical Review. ( 2005 ) Graphs, tessellations, and perfect codes on flat tori by Costa, Sueli I. R.; Muniz, Marcelo; Agustini, Edson; Palazzo, Reginaldo in IEEE Trans. Inform. Theory 50 (2004), no. 10, 2363--2377.
    Full ref.More Information
  549. J. Pujol. Review in: Mathematical Review. ( 2005 ) Perfect codes in ${\rm SL}(2,2\sp f)$ by Terada, Sachiyo in European J. Combin. 25 (2004), no. 7, 1077--1085.
    Full ref.More Information
  550. J. Pujol. Review in: Mathematical Review. ( 2005 ) New upper and lower bounds on the channel capacity of read/write isolated memory by Golin, Mordecai J.; Yong, Xuerong; Zhang, Yuanping; Sheng, Li in Discrete Appl. Math. 140 (2004), no. 1-3, 35--48.
    Full ref.More Information
  551. M. Bras, P. Guitart, J. González, J. Serra, F. García. BISK Scheme Applied to Sign Encoding and to Magnitude Refinement. Lecture Notes in Computer Science ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  552. M. Badia, J. Borrell, C. Fernández, M. Freixas, F. García, A. Pèlachs, J. Pons, S. Robles, A. Vié, A. Villalonga, R. M. Sebastián. Un any de wiki en la docència de la UAB. In Jornades d'Innovació Docent ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  553. M. Badia, J. Borrell, C. Fernández, M. Freixas, F. García, A. Pèlachs, J. Pons, S. Robles, R. M. Sebastián, A. Vié, A. Villalonga. La innovación tecnológica para la enseñanza a distancia y semi-presencial: el entorno wiki en la UAB. In Congreso Internacional Virtual de Educación. CIVE 2005 ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  554. J. Castellà. Contributions to Mental Poker. Phdthesis( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  555. C. Garrigues. Simplicació del Desenvolupament d'Agents Mòbils Basats en Arquitectures Criptogràfiques. ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  556. J. Cucurull, J. Ametller, J. A. Ortega, S. Robles, J. Borrell. Protecting Mobile Agent Loops. In Mobility Aware Technologies and ApplicationsSpringer ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  557. J. Cucurull, J. Ametller, J. Borrell. Protocolo para la protección de itinerarios con bucles de agentes móviles. In 1r Simposio sobre Seguridad Informática [SSI'2005]Thomson ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  558. J. Borrell, C. Fernández, F. García, R. Martí, J. Pons, S. Robles. Wiki-based virtual portfolios for continuous evaluation and co-evaluation. In International Conference on Engineering and Computer Education ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  559. J. M. Basart , J. Borges, J. Borrell, M. Bras, P. Guitart, J. Pujol, S. Robles, J. Serra, M. Villanueva, C. Fernández, G. Navarro-Arribas, J. Pons, F. Aulí, J. Bartrina, J. Cucurull, F. García, J. García, C. Garrigues. Equipament d'infraestructura per a un cluster. ( 2005 )
    Full ref.
  560. M. Bras, J. González, P. Guitart, J. Serra, F. García. On Sign Encoding and Magnitude Refinement of Still Images. In WSEAS International ConferencesWSEAS Multiconference CSCC ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  561. M. Bras, J. González, P. Guitart, J. Serra, F. García. Sign and Magnitude Refinement Encoding for Lossy-to-Lossless Image Compression. WSEAS Transactions on Signal Processing ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  562. J. Borges, J. M. Basart , M. Bras, J. Serra, P. Guitart, J. Pujol, S. Robles, J. Borrell, J. García, C. Garrigues, M. Villanueva, C. Fernández, G. Navarro-Arribas, J. Pons, F. Aulí, J. Bartrina, J. Cucurull, F. García. Grup de Recerca Consolidat de Catalunya. ( 2005 )
    Full ref.
  563. J. García, S. Castillo, G. Navarro-Arribas, J. Borrell. ACAPS: An Access Control Mechanism to Protect the Components of an Attack Prevention System. Journal of Computer Science and Network Security  ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  564. G. Navarro-Arribas, S. N. Foley. Approximating SAML using Similarity Based Imprecision. In Intelligence in Communication SystemsSpringer ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  565. G. Navarro-Arribas, J. A. Ortega, J. Ametller, S. Robles. Distributed Authorization Framework for Mobile Agents. In Mobility Aware Technologies and ApplicationsSpringer ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  566. F. Cuppens, F. Cuppens, J. García. Detection and Removal of Firewall Misconfiguration. In In Proceedings of the 2005 IASTED International Conference on Communication, Network and Information Security (CNIS 2005)IASTED PRESS ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  567. F. Cuppens, F. Cuppens, J. García. Misconfiguration Management of Network Security Components. In In Proceedings of the 7th International Symposium on System and Information Security (SSI 2005)ITA Corporate ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  568. J. García, M. Jaeger, G. Mühl, J. Borrell. Decoupling Components of an Attack Prevention System using Publish/Subscribe. In Proceedings of the 2005 IFIP International Conference on Intelligence in Communication Systems (INTELLCOMM 2005)Springer Science + Business Media Inc ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  569. G. Navarro-Arribas, J. Peñalver, J. Ametller, J. A. Ortega, J. García, J. Borrell. AMAPOLA: A Simple Infrastructure for Ubiquitous Computing. In Proceedings of the 2005 IFIP International Conference on Intelligence in Communication Systems (INTELLCOMM 2005)Springer Science + Business Media Inc ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  570. J. García, S. Castillo, G. Navarro-Arribas, J. Borrell. Mechanisms for Attack Protection on a Prevention Framework. In In Proceedings of the 39th Annual IEEE International Carnahan Conference on Security Technology (ICCST 2005)IEEE Press ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  571. J. García, M. Jaeger, G. Mühl, J. Borrell. An Alert Communication Infrastructure for a Decentralized Attack Prevention Framework. In In Proceedings of the 39th Annual IEEE International Carnahan Conference on Security Technology (ICCST 2005)IEEE Press ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  572. G. Navarro-Arribas, J. A. Ortega, J. García, S. Robles. Secure Agent-based Management for Ubiquitous Computing. In In Proceedings of the 39th Annual IEEE International Carnahan Conference on Security Technology (ICCST 2005)IEEE Press ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  573. S. Robles, J. Borrell, J. Ametller, J. García, G. Navarro-Arribas. Creación de un entorno innovador para la comunicación de agentes inteligentes. ( 2005 )
    Full ref.
  574. M. Bras. Addition behavior of a numerical semigroup. In Arithmetic, Geometry and Coding Theory (AGCT 2003)Société Mathématique de France ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  575. J. Rifà. Review in: Mathematical Review. ( 2005 ) Sequential key derivation patterns for broadcast encryption and key predistribution schemes. by Attrapadung, Nuttapong; Kobara, Kazukuni; Imai, Hideki in Advances in cryptology---ASIACRYPT 2003, 374--391, Lecture Notes in Comput. Sci., 2894, Springer, Berlin, 2003.
    Full ref.More Information
  576. C. Fernández. On Reed-Muller and related quaternary codes. Phdthesis( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  577. G. Navarro-Arribas, J. Borrell. Towards an Standards-based Authorization Framework for Mobile Agents. In International Workshop on Secure Mobile Ad-hoc Networks and SensorsSpringer ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  578. S. Castillo, J. García, G. Navarro-Arribas, J. Borrell. Protección de Componentes en una Plataforma para la Prevención de Ataques Coordinados. In In Proceedings of the first Spanish Conference on Informatics (CEDI 2005), Information Security SymposiumThomson ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  579. G. Navarro-Arribas, J. Borrell, J. A. Ortega, S. Robles. Access Control with Safe Role Assignment for Mobile Agents. In Proceedings of the Fourth International Joint Conference on Autonomous agents and Multi Agent SystemsACM Press ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  580. J. Borges, J. Rifà, V. Zinoviev. On non-antipodal binary completely regular codes. Discrete Mathematics ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  581. J. Rifà, V. Zinoviev. On new completely regular q-ary codes. Desings, Codes and Cryptography ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  582. J. Borges, J. Rifà, V. Zinoviev. New completely regular and completely transitive binary codes. IEEE Transactions on Information Theory ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  583. K. Phelps, J. Rifà, M. Villanueva. Rank and Kernel of binary Hadamard codes. IEEE Transactions on Information Theory ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  584. J. Rifà. Review in: Mathematical Review. ( 2005 ) Security of signature schemes in a multi-user setting. Des. Codes Cryptogr. 33 (2004), no. 3, 261--274. by Menezes, Alfred; Smart, Nigel
    Full ref.More Information
  585. A. Zabala, X. Pons, J. Masó-Pau, J. Serra, F. Aulí, F. García. Evaluation of JPEG and JPEG2000 effects on remote sensing image classification for mapping natural areas. WSEAS TRANSACTIONS on INFORMATION SCIENCE and APPLICATIONS ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  586. A. Zabala, X. Pons, J. Masó-Pau, F. García, J. Serra, F. Aulí. Effects of JPEG2000 lossy compression on remote sensing image classification for mapping natural areas. In 9th WSEAS International CSCC Multiconference: CIRCUITS'05, SYSTEMS'05, COMPUTERS'05, COMMUNICATIONS'05WSEAS Multiconference CSCC ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  587. J. Borges, C. Fernández, K. Phelps. Quaternary Reed-Muller Codes. IEEE Transactions on Information Theory ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  588. S. Castillo, J. García, J. Borrell. Diseño y desarrollo del subsistema de detección y reacción de una plataforma para la prevención de ataques coordinados. In In III Simposio Español de Comercio ElectrónicoUniversitat de les Illes Balears ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  589. J. Borges, J. Rifà, V. Zinoviev. On non-antipodal binary completely regular codes. In Proceedings of Optimal Codes and Related Topics. OC'05Bulgarian Academic of Sciences ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  590. K. Phelps, J. Rifà, M. Villanueva. Kernels and p-Kernels of p^r-ary 1-Perfect codes. Desings, Codes and Cryptography ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  591. J. Minguillón, J. Herrera, D. Megías, J. Serra, J. Serra, F. García. Influence of mark embedding strategies on lossless compression of ultraspectral images. In 25th International Geoscience and Remote Sensing SymposiumIEEE Press ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  592. K. Phelps, J. Rifà, M. Villanueva. Binary Hadamard Codes of length 2^n. Rank and Kernel. In Proceedings of Optimal Codes and Related Topics. OC'05Bulgarian Academic of Sciences ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  593. J. Serra, F. García, J. Minguillón, D. Megías, B. Huang, A. Ahuja. Wavelet Lossless Compression of Ultraspectral Sounder Data. In 25th International Geoscience and Remote Sensing SymposiumIEEE Press ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  594. J. González. Compresión de imágenes con métodos basados en partición de conjuntos. ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  595. T. Ericson, J. Rifà. Estancia profesor Visitante. ( 2005 )
    Full ref.
  596. J. Rifà, V. Zinoviev. Estancia profesor Visitante. ( 2005 )
    Full ref.
  597. F. García, J. Serra, F. Aulí. Wavelet-based coding of Ultraspectral Sounder Data. In Satellite Data Compression, Communications, and ArchivingSociety of Photo-optical Instrumentation Engineers (SPIE) ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  598. F. Aulí, J. L. Monteagudo, J. Bartrina, J. R. Patón, J. Serra. Novel JPEG2000 implementation applied to GIS scenarios. In Mathematics of Data/Image Coding, Compression, and Encryption VIII, with ApplicationsSociety of Photo-optical Instrumentation Engineers (SPIE) ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  599. F. Aulí, J. R. Patón, J. Bartrina, J. L. Monteagudo, J. Serra. J2K: introducing a novel JPEG2000 coder. In Visual Communications and Image ProcessingSociety of Photo-optical Instrumentation Engineers (SPIE) ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  600. M. Bras. How to reduce failures in data transmission? Maths give the answer. . ( 2005 )
    Full ref.Full text
  601. J. García, F. Cuppens, F. Autrel, J. Castellà, J. Borrell, G. Navarro-Arribas, J. A. Ortega. Protecting On-line Casinos against Fraudulent Player Drop-out. In International Conference on Information TechnologyIEEE Computer Society Press ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  602. J. Castellà, G. Navarro-Arribas, J. A. Ortega, J. García. Digital chips for an on-line casino. In International Conference on Information TechnologyIEEE Computer Society Press ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  603. M. Badia, J. Borrell, C. Fernández, M. Freixas, F. García, A. Pèlachs, J. Pons, S. Robles, R. M. Sebastián, A. Vié, A. Villalonga. L'entorn Wiki: una nova estratègia didàctica a la UAB. In Didàctica i organització d'assignatures basades en l'experimentacióCPDA- Publicacions l'Abast, S.L.L. ( 2005 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  604. J. Pujol. Review in: Mathematical Review. ( 2005 ) The difference matrices of the classes of a Sharma-Kaushik partition by Sharma, Bhu Dev; Sookoo, Norris in Arch. Math. (Brno) 40 (2004), no. 1, 23--31.
    Full ref.More Information
  605. J. Pujol. Review in: Mathematical Review. ( 2005 ) Bipartite $Q$-polynomial distance-regular graphs by Caughman, John S., IV in Graphs Combin. 20 (2004), no. 1, 47--57.
    Full ref.More Information
  606. J. Pujol. Review in: Mathematical Review. ( 2005 ) On Witsenhausen's zero-error rate for multiple sources by Gábor Simonyi in IEEE Trans. Inform. Theory 49 (2003), no. 12, 3258--3261.
    Full ref.More Information
  607. J. Rifà. Review in: Mathematical Review. ( 2005 ) Threshold verification scheme to a valid-signature using identity only on specialized approval. by Wang, Shiuh-Jeng in Appl. Math. Comput. 152 (2004), no. 2, 373-383.
    Full ref.More Information
  608. F. García, J. Serra. Image Data Compression CCSDS-IDC (Ph.D. Fellowship). ( 2004 )
    Full ref.
  609. J. Borges, C. Fernández, K. Phelps. Quaternary Reed-Muller codes. In SIAM Conference on Discrete Mathematics ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  610. S. Robles, G. Navarro-Arribas. Agentlink III: A Co-ordination Network for Agent-Based Computing. ( 2004 )
    Full ref.Full text
  611. J. Castellà. Mental Poker: a TTP-free protocol based on homomorphic encryption. ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  612. M. Bras. Tots els camins porten a Roma. . ( 2004 )
    Full ref.Full text
  613. J. Ametller. Mobilitat i protocols de protecció d'itineraris en sistemes d'agents mòbils. ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  614. J. Mir. Protocolos criptográficos para canales de comunicación anónimos y protección de itinerarios en agentes móviles. Phdthesis( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  615. K. Phelps, J. Rifà. Profesor Visitante. ( 2004 )
    Full ref.
  616. J. Pujol. Review in: Mathematical Review. ( 2004 ) Random strongly regular graphs? by Peter J. Cameron in EuroComb'01 (Barcelona). Discrete Math. 273 (2003), no. 1- 3, 103--114.
    Full ref.More Information
  617. J. Rifà. Review in: Mathematical Review. ( 2004 ) A decoding algorithm for general Z4-linear codes. by Cui, Jie in J. Syst. Sci. Complex. 17 (2004), no. 1, 16--22.
    Full ref.More Information
  618. J. Serra, F. García, F. Aulí, J. González. A Generalization of 'Image Lossy Data Compression' Recommendation. In 2004 IEEE International Geoscience and Remote Sensing SymposiumIEEE Press ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  619. M. Badia, J. Borrell, C. Fernández, M. Freixas, F. García, A. Pèlachs, J. Pons, S. Robles, R. M. Sebastián, A. Vié, A. Villalonga. GI-IDES L'entorn Wiki: una nova iniciativa docent. In Jornades d'Innovació Docent ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  620. S. Robles, J. Borrell, J. Pons. Experiencies d'ensenyament semipresencial amb Wiki. In Jornades d'Innovació Docent ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  621. S. Robles, J. A. Ortega, J. Ametller. Security Solutions and Killer Applications: Unlocking Mobile Agents. British Computer Society Expert Update ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  622. C. Garrigues, S. Robles, . Moratalla, J. Borrell. Building Secure Mobile Agents using Cryptographic Architectures. In 2nd European Workshop on Multi-Agent Systems ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  623. J. M. Basart . Societat del coneixement?. In II Congrés de l'Observatori per a la Cibersocietat (Barcelona)Publicació on-line ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  624. J. Serra, F. Aulí, F. García, C. Fernández. Review of CCSDS-ILDC and JPEG2000 coding techniques for remote sensing. In Image and Signal Processing for Remote Sensing XSociety of Photo-optical Instrumentation Engineers (SPIE) ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  625. J. Serra, J. González, P. Guitart, M. Bras. Evaluation of 1D, 2D, and 3D SPIHT coding technique for remote sensing. In Image and Signal Processing for Remote Sensing XSociety of Photo-optical Instrumentation Engineers (SPIE) ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  626. J. Serra, F. Aulí, F. García, J. González, P. Guitart. Review of Coding Techniques Applied to Remote Sensing. Lecture Notes in Computer Science ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  627. J. Serra, F. Aulí, F. García, J. González, P. Guitart. Review of Coding Techniques Applied to Remote Sensing. In Knowledge-Based Intelligent Information and Engineering SystemsSpringer Verlag ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  628. M. Bras. Patterns on numerical semigroups. In Actas de los Encuentro de Álgebra Computacional y AplicacionesElsevier Science Publisher B.V. ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  629. M. Bras. Acute Semigroups, the Order Bound on the Minimum Distance and the Feng-Rao Improvements. IEEE Transactions on Information Theory ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  630. F. García. Description and extension of: Image Lossy Data Compression CCSDS-ILDC. ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  631. F. Aulí. L'estàndard de compressió d'imatges JPEG2000. ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  632. J. Mir, J. Borrell, V. Daza. Un Canal de Comunicaciones Anónimo. In Avances en Criptología y Seguridad de la InformaciónEdiciones Díaz de Santos ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  633. J. Mir, J. Borrell. Protegiendo la Información de la Ruta de los Agentes Móviles. In Avances en Criptología y Seguridad de la InformaciónEdiciones Díaz de Santos ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  634. J. García, F. Autrel, J. Borrell, Y. Bouzida, S. Castillo, F. Cuppens, G. Navarro-Arribas. Preventing coordinated attacks via alert correlation. In 9th Nordic Workshop on Secure IT SystemsPublications in Telecommunications Software and Multimedia ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  635. G. Navarro-Arribas, J. García, J. A. Ortega. Chained and delegable authorization tokens. In 9th Nordic Workshop on Secure IT SystemsPublications in Telecommunications Software and Multimedia ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  636. J. García, F. Autrel, J. Borrell, S. Castillo, F. Cuppens, G. Navarro-Arribas. Decentralized publish-subscribe system to prevent coordinated attacks via alert correlation. Lecture Notes in Computer Science ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  637. J. García, X. Perramón, J. Herrera. Aspectos avanzados de seguridad en redes. Fundació Universitat Oberta de Catalunya ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  638. G. Navarro-Arribas, J. García. CADAT: Control de acceso basado en tokens y cadenas hash delegables. In In Avances en Criptología y Seguridad de la InformaciónEdiciones Díaz de Santos ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  639. J. A. Ortega, S. Robles, J. Ametller. Mecanismos de Protección para Agentes Itinerantes. In Avances en Criptología y Seguridad de la InformaciónEdiciones Díaz de Santos ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  640. C. Garrigues, S. Robles, J. Borrell, . Moratalla. Generación de Agentes Móviles Seguros a partir de Itinerarios y Arquitecturas Criptográficas. In Avances en Criptología y Seguridad de la InformaciónEdiciones Díaz de Santos ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  641. J. García, S. Castillo, G. Navarro-Arribas, J. Borrell. Diseño y Desarrollo de un Sistema Colaborativo para la Prevención de Ataques Coordinados. In In Avances en Criptología y Seguridad de la InformaciónEdiciones Díaz de Santos ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  642. J. Borges, C. Fernández, K. Phelps. Reed-Muller and Quaternary Related Codes: Rank and Kernel. In IV Jornadas de Matemática Discreta y AlgorítmicaUniversidad Politécnica de Madrid ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  643. J. Serra, F. Aulí, F. García, J. González, P. Guitart. Evaluation of Still Image Coders Applied to Remote Sensing Applications. In IEEE Sensor Array and Multichannel Signal Processing WorkshopIEEE Press ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  644. S. Robles, J. Borrell, C. Fernández, J. A. Ortega, G. Navarro-Arribas, J. García, F. García, J. Pons. El Wiki com estratègia didàctica en assignatures de xarxes d'ordinadors. In 3r Congrés Internacional en Docència Universitaria i Innovació ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  645. J. Serra, C. Fernández, F. García, F. Aulí. Analysis of CCSDS-ILDC for Remote Sensing Data Compression. In 2004 WSEAS International Multiconference CSCCWSEAS Multiconference CSCC ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  646. J. García. . ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  647. J. Serra, C. Fernández, F. García, F. Aulí. Analysis of CCSDS-ILDC for Remote Sensing Data Compression. WSEAS Transaction on Systems ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  648. J. M. Basart . Knowledge from experimentation and knowledge from experience. In VIII Public Communication of Science and Technology (Barcelona)Publicació on-line ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  649. J. M. Basart . . In X Jornadas de Enseñanza Universitaria de la Informática (Alacant), p. 73-78Thomson ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  650. J. Pujol. Review in: Mathematical Review. ( 2004 ) A combinatorial approach to finding the capacity of the discrete noiseless channel by Pimentel, Cecilio; Uchôa- Filho, Bartolomeu F. in IEEE Trans. Inform. Theory 49 (2003), no. 8, 2024--2028.
    Full ref.More Information
  651. J. Pujol. Review in: Mathematical Review. ( 2004 ) Additive successive refinement by Tuncel, Ertem; Rose, Kenneth in IEEE Trans. Inform. Theory 49 (2003), no. 8, 1983--1991.
    Full ref.More Information
  652. J. Pujol. Review in: Mathematical Review. ( 2004 ) Multidimensional companding quantization of the Gaussian source by Samuelsson, Jonas in IEEE Trans. Inform. Theory 49 (2003), no. 5, 1343--1351.
    Full ref.More Information
  653. J. Pujol. Review in: Mathematical Review. ( 2004 ) The last subconstituent of a bipartite $Q$-polynomial distance-regular graph by Caughman, John S., IV in European J. Combin. 24 (2003), no. 5, 459--470.
    Full ref.More Information
  654. J. Pujol. Review in: Mathematical Review. ( 2004 ) Classification of perfect linear codes with crown poset structure by Ahn, Jungmin; Kim, Hyun Kwang; Kim, Jung Soo; Kim, Mina in Discrete Math. 268 (2003), no. 1-3, 21-- 30.
    Full ref.More Information
  655. K. Phelps, J. Rifà, M. Villanueva. Rank and kernel of additive (Z4-linear and non-Z4-linear) Hadamard codes. In Proceedings of Algebraic and Combinatorial Coding Theory. ACCT'04Bulgarian Academic of Sciences ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  656. J. Herrera, J. García, X. Perramón. Seguridad en redes de computadores. Fundació Universitat Oberta de Catalunya ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  657. J. Ametller, S. Robles, J. A. Ortega. An Implementation of Self-Protected Mobile Agents. In Eleventh IEEE International Conference and Workshop on the Engineering of Computer-Based Systems.IEEE Computer Society Press ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  658. S. Poslad, J. Tan, S. Robles, A. Reitbauer, G. Vitaglione. From Message-based Security Mechanisms to a Social Interaction Model to Improve Safety and Security in Open Service Infrastructures. In Workshop on Safety and Security in Multiagent Systems (SASEMAS)ACM Press ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  659. J. M. Basart . Which ethics will survive in our technological society?. IEEE Technology and Society Magazine ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  660. J. Ametller, S. Robles, J. A. Ortega. Self-Protected Mobile Agents. In 3rd International Conference on Autonomous Agents and Multi Agents SystemsACM Press ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  661. J. M. Basart . Conocimiento y método en Descartes, Pascal y Leibniz. CIENCIA ergo sum ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  662. R. Baig, F. Aulí. Sistema operativo GNU/Linux básico. Fundació Universitat Oberta de Catalunya ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  663. J. Herrera, J. García, X. Perramón. Seguretat en xarxes de computadors. Fundació Universitat Oberta de Catalunya ( 2004 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  664. F. Aulí, J. Serra. Model-based JPEG2000 rate control methods (Ph.D. Fellowship). ( 2003 )
    Full ref.
  665. F. Aulí, J. Borges, M. Bras, C. Fernández, F. García, J. González, P. Guitart, J. Pujol, J. Rifà, J. Serra, M. Villanueva. Hyperspectral image compression with wavelet transform to remote sensing applications and geographic information systems (WAVEGIS). ( 2003 )
    Full ref.
  666. M. Bras. Analysis of the Parameters of Algebraic Codes from the Weierstrass Semigroup Perspective. In Tagungsbericht 53/2003 Kodierungstheorie ( 2003 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  667. G. Navarro-Arribas, S. Robles, J. Borrell. Assigning Roles for Access Control in Mobile Agent Applications. In The 3rd IFIP Conference on e-Commerce, e-Business, and e-GovernmentKluwer Academic ( 2003 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  668. A. Riera, J. Castellà, J. Borrell. . . ( 2003 )
    Full ref.
  669. J. Mir, J. Borrell. Protecting Route Information of Mobile Agents. In European Workshop on Multi Agent SystemsSt Catherine's College, Oxford University ( 2003 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  670. M. Bras. Improvements to Evaluation Codes and New Characterizations of Arf Semigroups. In Applied algebra, algebraic algorithms and error-correcting codes (Toulouse, 2003)Springer Berlin Heidelberg NY ( 2003 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  671. G. Verdejo. Seguridad en Redes IP. ( 2003 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  672. J. Castellà, C. Ferrer, A. Riera, J. Borrell. Practical mental poker without a TTP based on homomorphic encryption. Lecture Notes in Computer Science ( 2003 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  673. J. Pujol. Review in: Mathematical Review. ( 2003 ) Source coding exponents for zero-delay coding with finite memory by Merhav, Neri; Kontoyiannis, Ioannis in IEEE Trans. Inform. Theory 49 (2003), no. 3, 609--625.
    Full ref.More Information
  674. J. Pujol. Review in: Mathematical Review. ( 2003 ) A MacWilliamstype identity for linear codes on weak order by Kim, Dae San; Lee, Jeh Gwon in Discrete Math. 262 (2003), no. 1-3, 181--194.
    Full ref.More Information
  675. J. Pujol. Review in: Mathematical Review. ( 2003 ) Labelings of Lee and Hamming spaces by Muniz, Marcelo; Costa, Sueli I. R. in Discrete Math. 260 (2003), no. 1-3, 119--136.
    Full ref.More Information
  676. J. Pujol. Review in: Mathematical Review. ( 2003 ) Small vertex-transitive directed strongly regular graphs. Combinatorics '98 (Palermo) by Fiedler, Frank; Klin, Mikhail H.; Muzychuk, Mikhail in Discrete Math. 255 (2002), no. 1-3, 87--115.
    Full ref.More Information
  677. J. Pujol. Review in: Mathematical Review. ( 2003 ) On perfect codes: rank and kernel by Phelps, Kevin T.; Villanueva, Mercè in Des. Codes Cryptogr. 27 (2002), no. 3, 183--194.
    Full ref.More Information
  678. J. Pujol. Review in: Mathematical Review. ( 2003 ) A construction of a space-time code based on number theory by Damen, Mohamed Oussama; Tewfik, Ahmed; Belfiore, Jean-Claude in IEEE Trans. Inform. Theory 48 (2002), no. 3, 753--760.
    Full ref.More Information
  679. J. Rifà. Review in: Mathematical Review. ( 2003 ) Weber, Jos H.; Abdel-Ghaffar, Khaled A. S. Reduced GMD decoding. IEEE Trans. Inform. Theory 49 (2003), no. 4, 1013--1027.
    Full ref.More Information
  680. J. Rifà. Review in: Mathematical Review. ( 2003 ) Lee, Hyang-Sook; Lee, Young-Ran; Lee, Ju-Hee Multiparty key agreement protocol based on symmetric techniques. Commun. Korean Math. Soc. 18 (2003), no. 1, 169--179.
    Full ref.More Information
  681. J. Rifà. Review in: Mathematical Review. ( 2003 ) Brassard, Gilles; Crépeau, Claude; Wolf, Stefan Oblivious transfers and privacy amplification. J. Cryptology 16 (2003), no. 4, 219--237.
    Full ref.More Information
  682. J. Ametller, S. Robles, J. Borrell, J. A. Ortega. Security Mechanisms for Mobile Agent Protection. In European Workshop on Multi Agent SystemsSt Catherine's College, Oxford University ( 2003 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  683. J. Minguillón, J. Herrera, D. Megías, J. Serra. Evaluation of CopyRight Protection Schemes for Hyperspectral Images. In Image and Signal Processing for Remote Sensing IX (RS07)Society of Photo-optical Instrumentation Engineers (SPIE) ( 2003 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  684. F. Aulí, J. Borges, M. Bras, C. Fernández, F. García, J. González, P. Guitart, J. Pujol, J. Rifà, J. Serra, M. Villanueva. Compresion de imagenes hiperespectrales mediante transformadas wavelet para aplicaciones de teledeteccion y sistemas de informacion geografica. ( 2003 )
    Full ref.
  685. G. Navarro-Arribas, B. Sadighi Firozabadi, E. Rissanen, J. Borrell. Constrained Delegation in XML-based Access Control and Digital Rights Management Standards. In CNIS03, Special Session on Architectures and Languages for Digital Rights Management and Access ControlActa Press ( 2003 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  686. G. Navarro-Arribas. Access Control and Mobile Agents. ( 2003 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  687. J. Ametller, J. Borrell, J. García, G. Navarro-Arribas, S. Robles. Framework for developing mobile agent applications. In Actas X Conferencia de la Asociación Española para la Inteligencia Artificial ( 2003 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  688. R. Masià, J. Pujol, J. Rifà, M. Villanueva. Matemàtica Discreta. Fundació Universitat Oberta de Catalunya ( 2003 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  689. J. Borges, K. Phelps, J. Rifà, V. Zinoviev. On $Z4-linear preparata-like and kerdock-like codes. IEEE Transactions on Information Theory ( 2003 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  690. J. Borges, K. Phelps, J. Rifà. The Rank and Kernel of Extended 1-Perfect Z4-Linear and Additive Non-Z4-Linear Codes. IEEE Transactions on Information Theory ( 2003 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  691. J. Ametller, J. M. Basart , J. Borrell, J. García, C. Garrigues, N. Guil, J. A. Ortega, J. Pons, J. Rifà, S. Robles, . Moratalla, J. Cucurull. Desarrollo de Aplicaciones Decisivas y Seguras sobre una Plataforma Ligera de Agentes Móviles. ( 2003 )
    Full ref.Full text
  692. J. Mir, J. Borrell. Protecting Mobile Agent Itineraries. In Mobile Agents for Telecommunication Applications (MATA)Springer Verlag ( 2003 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  693. J. Ametller, S. Robles, J. Borrell. Secure Mobile Agents Applications: Implementation through Platform Services. In Mobile Agents for Telecommunication Applications (MATA)Springer Verlag ( 2003 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  694. J. Ametller, S. Robles, J. Borrell. Agent Migration over FIPA ACL Messages. In Mobile Agents for Telecommunication Applications (MATA)Springer Verlag ( 2003 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  695. D. Megías, J. Herrera, J. Minguillón. A robust audio watermarking scheme based on MPEG 1 layer 3 compression. In IFIP conference on Communications and Multimedia SecurityKluwer Academic ( 2003 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  696. J. Minguillón, P. Coll, M. Francesca, J. Pujol. An iterative constrained quantization algorithm for band discrimination in pulsed field gel electrophoresis. In Artificial Intelligence Research and DevelopmentIOS Press ( 2003 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  697. P. Coll, J. Minguillón, M. Francesca, J. Pujol. A Constrained Quantization Algorithm for Pulsed Field Gel Electrophoresis Pattern Analysis. In 43rd ICAAC AbstractsAmerican Society for Microbiology ( 2003 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  698. J. Serra, C. Fernández, F. Aulí, F. García, J. Minguillón. Lossy coding techniques for high resolution images. In Image and Signal Processing for Remote Sensing IX (RS07)Society of Photo-optical Instrumentation Engineers (SPIE) ( 2003 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  699. J. Serra, F. Aulí, C. Fernández, F. García. A JAVA Framework for Evaluating Still Image Coders Applied to Remote Sensing Applications. In International Geoscience and Remote Sensing SymposiumIEEE Press ( 2003 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  700. J. Serra, C. Fernández, F. Aulí, F. García. Exploring image coding techniques for remote sensing and geographic information systems. In Visual Communications and Image ProcessingSociety of Photo-optical Instrumentation Engineers (SPIE) ( 2003 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  701. J. Serra. Hyperspectral Image Coding for Remote Sensing Applications. SPIE Electronic Imaging Newsletters ( 2003 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  702. M. Bras. Improving Evaluation Codes. Phdthesis( 2003 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  703. J. Rifà. Protocolos Criptográficos y Seguridad en Redes. Servicio de Publicaciones de la Universidad de Cantabria ( 2003 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  704. J. Borges, J. Borrell, J. Pujol, J. Rifà, M. Villanueva, J. Serra. Seguretat, Codificació i Transport de la Informació. ( 2003 )
    Full ref.Full text
  705. J. Ametller, S. Robles, J. Borrell. Movilidad de Agentes para Aplicaciones de Comercio Electrónico. In Actas del II simposio español de comercio electrónico (SCE'03)Fundación Dintel ( 2003 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  706. J. Ametller, J. Borrell, J. García, N. Guil, J. A. Ortega, S. Robles. Creación de un entorno innovador para la comunicación de agentes inteligentes. ( 2003 )
    Full ref.Full text
  707. J. M. Barceló, M. Barranco, L. Huguet, G. Navarro-Arribas, A. Nieto, P. Pascual, J. Pla, A. Poves, P. Puigdomenech, J. Rifà, A. Ripoll, X. Roqué, E. Salvador, J. Serra, J. Solanes, L. Valverde. 10 impactos de la ciencia del siglo XX. Fondo de Cultura Económico de España ( 2003 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  708. J. Minguillón, J. Herrera, D. Megías. Empirical evaluation of a JPEG2000 standard-based robust watermarking scheme. In IS&T/SPIE's 15th Annual Symposium on electronic Imaging: Security and Watermarking of Multimedia Contents VSociety of Photo-optical Instrumentation Engineers (SPIE) ( 2003 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  709. J. Herrera, J. Minguillón, D. Megías. A family of image watermarking schemes based on lossy compression. In International Conference on Information Technology: Coding and ComputingIEEE Computer Society Press ( 2003 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  710. E. Mor, J. Minguillón. An empirical evaluation of classifier combination schemes for predicting user navigational behavior. In International Conference on Information Technology: Coding and ComputingIEEE Computer Society Press ( 2003 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  711. J. Rifà, J. Pujol, J. Serra, S. Robles, M. Villanueva, C. Fernández, F. Aulí, J. Borges, F. García, J. Borrell, J. M. Basart , J. Pons, I. Ortuño, J. García, G. Navarro-Arribas, J. Ametller, J. Mir. Xarxa Wireless i dispositiu d'emmagatzemament massiu. ( 2003 )
    Full ref.
  712. J. Borges, K. Phelps, J. Pujol, J. Rifà, M. Villanueva, V. Zinoviev. The rank and kernel of several non-linear codes. In Proceedings of Congreso conjunto AMS-RSME. Sevilla. ( 2003 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  713. K. Phelps, J. Rifà, M. Villanueva. Kernels of q-ary 1-perfect codes. In Proceedings of Workshop on Coding and Cryptography, WCC'03, INRIA. Roquencourt, France. ( 2003 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  714. J. Castellà, J. Borrell, A. Riera, J. Domingo. Método para la obtención de un resultado imparcial de un juego a través de una red de comunicación y protocolos y programas asociados. . ( 2002 )
    Full ref.
  715. J. Pujol. Review in: Mathematical Review. ( 2002 ) Right complete codes by Satyanarayana, M. in Semigroup Forum 64 (2002), no. 3, 443--452.
    Full ref.More Information
  716. J. Minguillón, M. Pallarés, T. Lloret. Towards a web based system for teaching quantitative geography models. In 1ª Conferencia Internacional de TIC’s en la EducaciónGobierno de Extremadura ( 2002 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  717. J. Rifà, J. Borrell, J. Pujol. . ( 2002 )
    Full ref.
  718. J. M. Basart . Sobre las dificultades de una ética informática. In IV Jornades Informàtica i SocietatServei de Publicacions d'Enginyeria i Arquitectura La Salle ( 2002 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  719. S. Robles, G. Navarro-Arribas, J. García, F. Aulí, J. Borrell. Parallel Mobile Agent Infrastructure for Developing GRID Secure System Applications. In Intl. Workshop on Agent Based Cluster and Grid ComputingBritish Computer Society ( 2002 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  720. J. Rifà. Review in: Mathematical Review. ( 2002 ) Forney, G. David, Jr. Codes on graphs: normal realizations. IEEE Trans. Inform. Theory 47 (2001), no. 2, 520--548.
    Full ref.More Information
  721. J. Rifà. Review in: Mathematical Review. ( 2002 ) Yin, Jianxing A combinatorial construction for perfect deletion-correcting codes. Des. Codes Cryptogr. 23 (2001), no. 1, 99--110.
    Full ref.More Information
  722. J. Rifà. Review in: Mathematical Review. ( 2002 ) Wood, Jay A. The structure of linear codes of constant weight. Trans. Amer. Math. Soc. 354 (2002), no. 3, 1007-- 1026 (electronic).
    Full ref.More Information
  723. J. Borges, K. Phelps, J. Rifà. 1-Perfect additive codes. In Extended abstracts of Arithmétique et Combinatoire, Marsella, França. ( 2002 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  724. J. Pujol. Review in: Mathematical Reviews. ( 2002 ) Relating propelinear and binary $G$-linear codes by Alves, Marcelo M. S.; Gerônimo, João R.; Palazzo, Reginaldo, Jr.; Costa, Sueli I. R.; Interlando, J. Carmelo; Araújo, Martinho C. in Discrete Math. 243 (2002), no. 1-3, 187-- 194.
    Full ref.More Information
  725. J. Pujol. Review in: Mathematical Review. ( 2002 ) Spectral characterizations of some distance-regular graphs by van Dam, Edwin R.; Haemers, Willem H. in J. Algebraic Combin. 15 (2002), no. 2, 189--202.
    Full ref.More Information
  726. J. Pujol. Review in: Mathematical Review. ( 2002 ) Optimal sequential vector quantization of Markov sources by Borkar, Vivek S.; Mitter, Sanjoy K.; Tatikonda, Sekhar in SIAM J. Control Optim. 40 (2001), no. 1, 135--148 (electronic).
    Full ref.More Information
  727. J. Pujol. Review in: Mathematical Review. ( 2002 ) Bounding the inefficiency of length-restricted prefix codes by Milidiú, R. L.; Laber, E. S. in Algorithmica 31 (2001), no. 4, 513--529.
    Full ref.More Information
  728. S. Robles, G. Navarro-Arribas, J. Pons, J. Rifà, J. Borrell. Mobile Agents Supporting Secure GRID Environments. In Euroweb 2002 ConferenceBritish Computer Society ( 2002 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  729. G. Navarro-Arribas, S. Robles, J. Borrell. An Access Control Method for Mobile Agents in Sea-of-Data Applications. Upgrade ( 2002 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  730. G. Navarro-Arribas, S. Robles, J. Borrell. Un método de Control de Acceso para Agentes Móviles en Aplicaciones Mar-de-Datos. Novatica ( 2002 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  731. C. Fernández. Propelinear Codes. ( 2002 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  732. J. Borges, C. Fernández. Punctured extended 1-perfect Z_4-linear codes. Technical report ( 2002 )
    Full ref.More Information
  733. S. Robles, J. Borrell, G. Navarro-Arribas, J. Rifà, J. Serra. iTrust: Working Group on Trust Management in Dynamic Open Systems. ( 2002 )
    Full ref.Full text
  734. S. Robles, J. Borrell. A Fault-Tolerant Voting Scheme Based on Mobile Agents. In World Multiconference on Systemics, Cybernetics and Informatics ( 2002 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  735. J. Minguillón, . 0 Tate, . 0 Griffiths, C. Majos, A. Moreno, J. Pujol, C. Arús. A Multistage Classifier for In Vivo Magnetic Resonance Spectra Of Brain Tumors. In ESMRMB 2002 19th Annual MeetingElsevier Science Publisher B.V. ( 2002 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  736. J. Herrera, J. Minguillón. Ataques a esquemas de watermarking de imágenes. In Actas de la VII Reunión Española sobre Criptología y Seguridad de la InformaciónServicio de Publicaciones de la Universidad de Oviedo ( 2002 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  737. G. Navarro-Arribas, S. Robles, J. Borrell. Role-based Access Control for E-commerce Sea-of-Data Applications. In Information Security Conference 2002Springer Verlag ( 2002 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  738. S. Robles, J. Mir, J. Ametller, J. Borrell. Implementation of Secure Architectures for Mobile Agents in MARISM-A. In Mobile Agents for Telecommunication Applications (MATA)Springer Verlag ( 2002 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  739. S. Robles. Mobile Agent Systems and Trust, a Combined View Toward Secure Sea-Of-Data Applications. Phdthesis( 2002 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  740. K. Phelps, M. Villanueva. . Desings, Codes and Cryptography ( 2002 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  741. K. Phelps, M. Villanueva. Ranks of q-ary 1-perfect codes. Desings, Codes and Cryptography ( 2002 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  742. J. Serra, D. Gavilan, J. Minguillón. Analysis of Lossy Compression Methods Applied to Hyperspectral Images. In Image and Signal Processing for Remote Sensing VIIISociety of Photo-optical Instrumentation Engineers (SPIE) ( 2002 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  743. J. Serra, J. Borrell. A comparison of lossy compression methods on still and hyperspectral images. In Mathematics of Data/Image Coding, Compression and Encryption V, with ApplicationsSociety of Photo-optical Instrumentation Engineers (SPIE) ( 2002 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  744. J. Minguillón, J. Serra. Improving classification accuracy of AVIRIS data by means of classifier combination. In 9th International Symposium on Remote SensingSociety of Photo-optical Instrumentation Engineers (SPIE) ( 2002 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  745. J. Minguillón, J. Pujol. Árboles de decisión. In Terceras Jornadas de Matemáticas Discretas y AlgorímicaUniversidad de Sevilla ( 2002 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  746. K. Phelps, J. Rifà. Estancia de Profesorado Visitante. ( 2002 )
    Full ref.
  747. V. Zinoviev, J. Rifà. Estancia de Profesorado Visitante. ( 2002 )
    Full ref.
  748. J. Rifà, J. Climent. Professor Visitant a la Universitat d'Alacant. ( 2002 )
    Full ref.
  749. J. Rifà, J. Pujol, J. Borges, J. Borrell, M. Villanueva, J. Pons, J. Serra, S. Robles. Xarxa temàtica de seguretat, codificació i transport de la informació. ( 2002 )
    Full ref.
  750. J. Rifà, J. Borrell, J. Pujol, J. Pons, J. Minguillón, M. Villanueva, S. Robles, J. Serra, C. Fernández, J. Borges, G. Navarro-Arribas. Grup de recerca consolidat: UNITAT de COMBINATORIA i COMUNICACIÓ DIGITAL. ( 2002 )
    Full ref.
  751. J. Borges, C. Fernández, J. Rifà. Every $Z_{2k}$-Code accepts a representation as a Binary Propelinear Code. In Hypercube'2002Academic Press ( 2002 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  752. J. Rifà. Binary $1$-error correcting Propelinear Codes. In Hypercube'2002 ( 2002 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  753. J. Rifà. Sobre las particiones del espacio de Hamming $F^n$ en códigos perfectos. In RSME'2002 ( 2002 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  754. J. Borges, K. Phelps, J. Rifà. On the rank and kernel of $Z_4$-linear Preparata-like codes. In ACCT-VIIIRussian Academic of Sciences ( 2002 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  755. K. Phelps, J. Rifà, M. Villanueva. The Switching construction and kernels of q-ary 1-perfect codes. In ACCT-VIII  ( 2002 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  756. J. Borges, K. Phelps, J. Rifà. Extended $1$-perfect additive codes. Technical report ( 2002 )
    Full ref.Full text
  757. J. Rifà, K. Phelps. On binary $1$-perfect additive codes: some structural properties. IEEE Transactions on Information Theory ( 2002 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  758. J. Minguillón. On cascading small decision trees. Phdthesis( 2002 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  759. J. Minguillón, . 0 Tate, C. Arús. Classifier combination for in vivo magnetic resonance spectra of brain tumors. In Multiple Classifier SystemsLecture Notes in Computer Science ( 2002 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  760. S. Robles, J. Mir, J. Borrell. MARISM-A: An Architecture for Mobile Agents with Recursive Itinerary and Secure Migration. In 2nd. IW on Security of Mobile Multiagent SystemsCiteseer ( 2002 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  761. S. Robles, J. Borrell. Applying Trust to Solve the Security Problem in Mobile Agent Applications. In 5th. IW on Deception, Fraud and Trust in Agent Societies ( 2002 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  762. G. Navarro-Arribas, S. Robles, J. Borrell. Adapted Role-based Access Control for MARISM-A using SPKI Certificates. In 2nd. IW on Security of Mobile Multiagent SystemsGerman Research Center for Artificial Intelligence ( 2002 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  763. S. Robles, I. Luque, G. Navarro-Arribas, J. Pons, J. Borrell. Plataforma segura para la ejecución de agentes móviles con itinerario, código y datos protegibles. In VII Reunión Española sobre Criptología y Seguridad de la InformaciónServicio de Publicaciones de la Universidad de Oviedo ( 2002 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  764. S. Robles, J. Borrell. Un Modelo Práctico de Confianza para Entornos de Agentes Móviles. In VII Reunión Española sobre Criptología y Seguridad de la InformaciónServicio de Publicaciones de la Universidad de Oviedo ( 2002 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  765. G. Navarro-Arribas, S. Robles, J. Borrell. SPKI para el control de acceso a recursos en entornos de agentes móviles. In VII Reunión Española sobre Criptología y Seguridad de la InformaciónServicio de Publicaciones de la Universidad de Oviedo ( 2002 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  766. J. Mir, J. Borrell. Protecting General Flexible Itineraries of Mobile Agents. In Proceedings of ICISC 2001Springer Verlag ( 2002 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  767. J. Brunat, R. Ferré, M. Bras, C. Padró, X. Muñoz, F. Puerta, E. Fossas, J. Quer, J. Villar, S. Xambó-Descamps, J. Saludes, F. Martinez. Codis Espacials i temporals. In GEMT BCN 2001 ( 2001 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  768. P. Guitart. On the Performance of Zelikovsky's 11/6 Approximation Algorithm for the Steiner Problem in Graphs. In International Workshop on Interconnection Networks (IWIN 2001) ( 2001 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  769. J. Pujol. Review in: Mathematical Review. ( 2001 ) Partition-based entropies of deterministic and stochastic maps by Ebeling, W.; Steuer, R.; Titchener, M. R. in Stoch. Dyn. 1 (2001), no. 1, 45--61.
    Full ref.More Information
  770. M. Villanueva. On Rank and kernel of perfect codes. Phdthesis( 2001 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  771. V. Zinoviev, J. Rifà. Estancia de Profesorado Visitante. ( 2001 )
    Full ref.
  772. P. Guitart. A Faster Implementation of Zelikovsky's 11/6-Approximation Algorithm for the the Steiner Problem in Graphs. In COMB'01Elsevier Science Publisher B.V. ( 2001 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  773. J. Pujol. Review in: Mathematical Review. ( 2001 ) Rate-splitting multiple access for discrete memoryless channels by Alexander J. Grant; Bixio Rimoldi; Rüdiger L. Urbanke and Philip A Whiting in IEEE Trans. Inform. Theory 47 (2001), no. 3, 873--890
    Full ref.More Information
  774. J. Pujol. Review in: Mathematical Review. ( 2001 ) On strongly regular graphs with parameters $(k,0,2)$ and their antipodal double covers by Nobuo Nakagawa in Hokkaido Math. J. 30 (2001), no. 2, 431--450
    Full ref.More Information
  775. J. Pujol. Review in: Mathematical Review. ( 2001 ) Block-definition approaches to source coding with a fidelity criterion by Takeshi Hashimoto in IEEE Trans. Inform. Theory 47 (2001), no. 1, 112--125
    Full ref.More Information
  776. J. Pujol. Review in: Mathematical Review. ( 2001 ) The redundancy of source coding with a fidelity criterion. II. Coding at a fixed rate level with unknown statistics by En-hui Yang and Zhen Zhang in IEEE Trans. Inform. Theory 47 (2001), no. 1, 126--145
    Full ref.More Information
  777. K. Phelps, J. Rifà. . Technical report ( 2001 )
    Full ref.Full text
  778. J. Pujol. Review in: Mathematical Review. ( 2001 ) The Terwilliger algebra of a 2-homogeneous bipartite distance-regular graph by Brian Curtin in J. Combin. Theory Ser. B 81 (2001), no. 1, 125--141
    Full ref.More Information
  779. J. Pujol. Review in: Mathematical Review. ( 2001 ) On covering radii and coset weight distributions of extremal binary self-dual codes of length 56 by Michio Ozeki in IEEE Trans. Inform. Theory 46 (2000), no. 7, 2359-- 2372
    Full ref.More Information
  780. J. Pujol. Review in: Mathematical Review. ( 2001 ) Optical orthogonal codes: their bounds and new optimal constructions by Ryoh Fuji-Hara and Ying Miao in IEEE Trans. Inform. Theory 46 (2000), no. 7, 2396--2406
    Full ref.More Information
  781. J. Pujol. Review in: Mathematical Review. ( 2001 ) Distance-regular graphs related to the quantum enveloping algebra of ${\rm sl}(2)$ by Brian Curtin in J. Algebraic Combin. 12 (2000), no. 1, 25--36
    Full ref.More Information
  782. J. Pujol. Review in: Mathematical Review. ( 2001 ) Almost $2$-homogeneous bipartite distance-regular graphs by Brian Curtin in European J. Combin. 21 (2000), no. 7, 865- 876
    Full ref.More Information
  783. K. Phelps, M. Villanueva. Bounds on the Rank and Kernel of Perfect Codes. In COMB '01 ( 2001 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  784. J. Mir, J. Borrell. A practical anonymous channel without mixes. In IASTED International Symposiaiasted ( 2001 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  785. S. Robles, S. Poslad, J. Borrell, J. Bigham. . In 4th International Conference on Electronic Commerce Research ( 2001 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  786. J. Bigham, L. Tokarchuk, D. Ryan, L. Cuthbert, J. Lisalina, M. Dinis, S. Robles. Agent-based resource management for 3G networks. In Second International Conference on 3G Mobile Communication TechnologiesIEEE Press ( 2001 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  787. J. Borges, C. Fernández, J. Rifà, M. Villanueva. Constructions of 1-perfect Partitions on the n-cube (Z/2)^n. Technical report ( 2001 )
    Full ref.Full text
  788. S. Robles, S. Poslad, J. Borrell, J. Bigham. Adding Security and Privacy to Agents Acting in a Marketplace: A Trust Model. In Proceedings of the 35th Annual IEEE International Carnahan Conference on Security TechnologyIEEE Press ( 2001 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  789. J. Borges, J. Rifà, V. Zinoviev. Nonexistence of completely transitive codes with error-correcting capability $e > 3$. IEEE Transactions on Information Theory ( 2001 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  790. J. Borrell, J. Rifà, J. Serra, P. Guitart, J. Pons, S. Robles, G. Navarro-Arribas. Desarrollo de dos aplicaciones de comercio-e seguras: votaciones B2G y subastas B2B. ( 2001 )
    Full ref.
  791. J. Borrell, A. Riera. Adaptació a Catalunya d'experiències electorals d'algunes regions europees. ( 2001 )
    Full ref.
  792. J. Borges, C. Fernández, J. Rifà. Every $Z_{2k}$-Code is a Binary Propelinear Code. In COMB'01Electronic Notes in Discrete Mthematics ( 2001 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  793. J. Borges, J. Rifà, V. Zinoviev. On completely regular binary codes and t-designs. In COMB'01Electronic Notes in Discrete Mthematics ( 2001 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  794. J. Pujol. Review in: Mathematical Review. ( 2001 ) Distance-regular graphs of valency 6 and a1=1 by Akira Hiraki, Kazumasa Nomura and Hiroshi Suzuki in J. Algebraic Combin. 11 (2000), no. 2, 101-134
    Full ref.More Information
  795. J. Pujol. Review in: Mathematical Review. ( 2001 ) Strongly closed subgraphs in a regular thick near polygon by Akira Hiraki in European J. Combin. 20 (1999), no. 8, 789-796
    Full ref.More Information
  796. J. Rifà, J. Pujol, J. Borges. 1-Perfect Uniform and Distance Invariant Partitions. Nom revista absent ( 2001 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  797. S. Robles, J. Borrell, J. Bigham, L. Tokarchuk, L. Cuthbert. Design of a Trust Model for a Secure Multi-Agent Marketplace. In 5th International Conference on Autonomous AgentsACM Press ( 2001 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  798. J. Rifà, J. Pujol, I. Ortuño, J. Borges, J. Serra, M. Villanueva, J. Minguillón, C. Fernández. . ( 2001 )
    Full ref.Full text
  799. J. Bigham, A. Hayzelden, J. Borrell, S. Robles. Distributed Control of Connection Admission. In Agent Technology for Communication InfrastructuresWiley ( 2001 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  800. J. Minguillón, J. Pujol. JPEG Standard Uniform Quantization Error Modeling with Applications to Sequential and Progressive Operation Modes. Journal of Electronic Imaging ( 2001 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  801. M. Bras, S. Xambó-Descamps. Omega Decoders for Goppa Codes. In Actas del Sexto Encuentro de Álgebra Computacional y AplicacionesServei de Publicacions, UPC ( 2000 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  802. V. Zinoviev, J. Rifà. Estancia de Profesorado Visitante. ( 2000 )
    Full ref.
  803. J. Borges. Review in: Mathematical Reviews. ( 2000 ) Binary codes of strongly regular graphs by W.H. Haemers, R. Peeters and J.M. van Rijckevorsel in Des. Codes Cryptogr., 17 (1999), no. 1-3, 187-209
    Full ref.More Information
  804. J. Rifà. II Jornadas de matemáticas discretas y algorítmica. ( 2000 )
    Full ref.
  805. J. Borrell. Documentación de proyectos e instalaciones de software. ( 2000 )
    Full ref.
  806. J. Borrell, S. Robles. Analisis de la seguretat d'aplicacions internet. ( 2000 )
    Full ref.
  807. J. Pujol. Review in: Mathematical Review. ( 2000 ) Deza graphs: a generalization of strongly regular graphs by M. Erickson, S. Fernando, W.H. Haemers, D. Hardy and J. Hemmeter in J. Combin. Des. 7 (1999), no. 6, 395-405
    Full ref.More Information
  808. J. Pujol. Review in: Mathematical Review. ( 2000 ) A characterization of 1-perfect additive codes by Joaquim Borges and Josep Rifà in IEEE Trans. Inform. Theory 45 (1999), no. 5, 1688-1697
    Full ref.More Information
  809. J. Pujol. Review in: Mathematical Review. ( 2000 ) Representing variable-length codes in fixed-length T-depletion format in encoders and decoders by Ulrich Güenter, Peter Hertling, Radu Nicolescu and Mark Titchener in Proceedings of the First Japan-New Zealand Workshop on Logic in Computer Science (Auckland, 1997), J.UCS (1997), no. 11, 1207-1225
    Full ref.More Information
  810. J. Pujol. Review in: Mathematical Review. ( 2000 ) Cyclotomy and strongly regular graphs by A.E. Brouwer, R.M. Wilson and Qing Xiang in J. Algebraic Combin. 10 (1999), no. 1, 25-28
    Full ref.More Information
  811. J. Pujol. Review in: Mathematical Review. ( 2000 ) Tight graphs and their primitive idempotents by Arlene A. Pascasio in J. Algebraic Combin. 10 (1999), no. 1, 47-59
    Full ref.More Information
  812. J. Pujol. Review in: Mathematical Review. ( 2000 ) Optimum extendible prefix codes by Cristian S. Calude and Ioan Tomescu in Proceedings of the First Japan-New Zealand Workshop on Logic in Computer Science (Auckland, 1997). J.UCS 3 (1997), no. 11, 1167-1179
    Full ref.More Information
  813. J. Pujol. Review in: Mathematical Review. ( 2000 ) On a characterization of bilinear forms graphs by Klaus Metsch in European J. Combin. 20 (1999), no. 4, 293-306
    Full ref.More Information
  814. J. Bigham, L. Tokarchuk, L. Cuthbert, S. Robles, J. Borrell. Towards a Global Trust Model for a Multi-Agent System to Manage Transactions in Future Mobile Communication Networks. In 3rd UK Workshop of the UK Special Interest Group on Multi-Agent Systems ( 2000 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  815. K. Phelps, M. Villanueva. Rank and Kernel of 1-perfect codes. In II Jornades de Matemàtica Discreta i algorísmica Servei de Publicacions, UAB ( 2000 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  816. J. Rifà, M. Villanueva. Euclidean complex quadratic fields used for coding QAM signals. International Journal of Applied Mathematics ( 2000 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  817. J. M. Basart , C. Ferrer, J. Oliver, I. Ortuño, J. Pujol, J. Pons, M. Prim, J. Roig. Sistema d'autoaprenentatge orientat a l'ensenyament de la Informàtica utilitzant les tecnologies de la Informació i de les Comunicacions. ( 2000 )
    Full ref.
  818. J. Minguillón, J. Pujol, J. Serra, I. Ortuño, P. Guitart. Adaptive Lossy Compression and Classification of Hyperspectral Images. In Image and Signal Processing for Remote Sensing VISociety of Photo-optical Instrumentation Engineers (SPIE) ( 2000 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  819. J. Borrell. INTERPRET: International Network for Pattern Recognition of Tumours using Magnetic Resonance. ( 2000 )
    Full ref.Full text
  820. P. Guitart. Some new variants of the shortest path heuristic for the Steiner problem in graphs. In II Jornades de Matemàtica Discreta i Algorísmica  ( 2000 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  821. J. Rifà. 10 impactes de la ciència del segle XX. Eumo Editorial ( 2000 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  822. A. Riera, J. Rifà, J. Borrell. Efficient construction of vote-tags to allow open objection to. Information Processing Letters ( 2000 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  823. J. Serra. Enumeration of Leech lattice points in L1-norm. In II Jornades de Matemàtica Discreta i AlgorísmicaServei de Publicacions, UAB ( 2000 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  824. J. Serra. Enumeration of lattice points in L1 norm. Information Processing Letters ( 2000 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  825. J. Serra, J. Minguillón. Influence of lossy compression on classification of hyperspectral images. In 1st International Symposium on Hyperspectral AnalysisUniversidad de Extremadura ( 2000 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  826. J. Serra. Lattice Points Enumeration using the L1 norm. Phdthesis( 2000 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  827. J. Borges, J. Borrell, J. Minguillón, J. Pons, J. Pujol, A. Riera, J. Rifà, S. Robles, M. Villanueva. . ( 2000 )
    Full ref.Full text
  828. S. Robles, J. Vera, J. Pons, J. Borrell. Agentes Móviles y Seguridad: una Revisión. In VI Reunión Española sobre Criptología y Seguridad de laInformaciónRA-MA ( 2000 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  829. J. Bigham, L. Cuthbert, A. Hayzelden, J. Borrell, S. Robles. Distributed Control of Connection Admission to a Telecommunications Network: Security Issues. In 4th World Multiconference on Systemics, Cybernetics and Informatics (SCI'2000) ( 2000 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  830. J. Borges, J. Borrell, J. Pujol, J. Rifà, M. Villanueva, J. Minguillón. Seguretat, Codificació i Transport de la Informació. ( 2000 )
    Full ref.Full text
  831. J. Minguillón, J. Pujol, J. Serra, I. Ortuño. Influence of lossy compression on hyperspectral image classification. In Proceedings of Data Mining 2000Wessex Institute of Technology Press ( 2000 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  832. J. Borges, J. Rifà. On the nonexistence of completely transitive codes. IEEE Transactions on Information Theory ( 2000 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  833. J. Borrell. Asesoramiento para entornos de servidores en red. ( 1999 )
    Full ref.
  834. J. Pujol. Review in: Mathematical Review. ( 1999 ) Nonsystematic perfect codes by Kevin Phelps and Mike Levan in SIAM J. Discrete Math 12 (1999) no. 1, 27-34
    Full ref.More Information
  835. J. Pujol. Review in: Mathematical Review. ( 1999 ) A MacWilliams identity for poset-codes by J.N. Gutiérrez and H. Tapia-Recillas in Proceedings of the Twenty-ninth Southeastern International Conference on Combinatorics, Graph Theory and Computing (Boca Raton, FL, 1998). Congr. Numer. 133 (1998), 63-73
    Full ref.More Information
  836. J. Rifà, J. M. Arqués, J. Borges, A. Codina, J. Minguillón, J. Pujol, J. Pons, A. Riera, S. Robles, M. Villanueva, J. Borrell. Resultados del proyecto CICYT TEL97-0663. In SPAST-IUniversidad Publica de Navarra ( 1999 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  837. A. Codina. Estudi dels sistemes de missatgeria electrònica segurs i implementació del Communication of Confidential Data (CCD). ( 1999 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  838. J. Pujol, I. Ortuño, J. Serra, P. Guitart, J. Minguillón. Control de qualitat d'aigües mitjançant imatgeria hiperespectral. ( 1999 )
    Full ref.
  839. J. Borrell, S. Robles, J. Serra, A. Riera. Securing the Itinerary of Mobile Agents through a Non-Repudiation Protocol. In Proceedings of 33rd Annual 1999 International Carnahan Conference on Security TechnologyIEEE Press ( 1999 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  840. J. Pujol. Review in: Mathematical Review. ( 1999 ) Generalised classes in groups and association schemes: duals of results on characters and sharpness by Kenneth W. Johnson and Eirini Poimenidou in European J. Combin. 20 (1999)
    Full ref.More Information
  841. J. Pujol. Review in: . ( 1999 ) Generating functions of circular codes by Frédérique Bassino in Advances in Applied Mathematics, 22 (1999)
    Full ref.More Information
  842. J. Pujol. Review in: Mathematical Review. ( 1999 ) Iterating an a-ary Gray code by Jonathan Lichtner in SIAM Journal on Discrete Mathematics, 11 (1998)
    Full ref.More Information
  843. J. Pujol. Review in: Mathematical Review. ( 1999 ) The structure of Schur rings over cyclic groups of square-free order by Mikhail Muzychuk in Algebra and Combinatorics: interactions and applications (Königstein, 1994). Acta Applicandae Mathematicae, 52 (1998)
    Full ref.More Information
  844. J. Pujol. Review in: . ( 1999 ) The spectra of complementary subgraphs in a strongly regular graph by D. de Caen in European Journal of Combinatorics, 19 (1998)
    Full ref.More Information
  845. J. Pujol. Review in: . ( 1999 ) On association schemes of balanced property with m1 = 4 by Eiichi Bannai and Attila Sali in Group theory and combinatorial mathematics (Japanese) (Kyoto, 1996)
    Full ref.More Information
  846. J. Roig, J. Pujol, J. Pons, S. Robles, A. Ros. Disseny, desenvolupament i manteniment d'una web corporativa per a la Fundació Indústries de la Informació. Projecte de col.laboració de la Universitat Autònoma de Barcelona, 1999/2000. ( 1999 )
    Full ref.
  847. J. M. Basart , P. Guitart. A solution for the coloured cubes problem. Theoretical Computer Science ( 1999 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  848. S. Robles. Aplicació de sistemes d'agents mòbils al disseny d'un sistema de votacions a gran escala. ( 1999 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  849. A. . Puiggené. Codificació Turbo. ( 1999 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  850. P. Guitart. Mètodes heurístics per al problema d'Steiner en grafs. Phdthesis( 1999 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  851. A. Riera. Design of implementable solutions for large scale electronic voting schemes. Phdthesis( 1999 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  852. A. Riera, J. Borrell. Practical Approach to Anonymity in Large Scale Electronic Voting Schemes. In Network and Distributed System Security, NDSS '99Internet Society ( 1999 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  853. J. Minguillón, J. Pujol. Method for JPEG Standard Progressive Operation Mode Definition Scripts Construction and Evaluation. In Proceedings of the SPIE 44rd International Symposium on Optical Science, Engineering and Instrumentation ( 1999 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  854. J. Minguillón, J. Pujol, K. Zeger. Progressive Classification Scheme for Document Layout Recognition. In Proceedings of the SPIE's 44rd International Symposium on Optical Science, Engineering and Instrumentation ( 1999 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  855. J. Serra, J. Borrell. Lattice points enumeration for image coding. In Proc. of IEEE International Conference on Information, Intelligence and SystemsIEEE Computer Society Press ( 1999 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  856. J. Serra. On combinatorial equalities of coordination sequences. In Proc. of FPSAC '99 (11th International Conference on Formal Power Series and Algebraic Combinatorics) ( 1999 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  857. J. Borges, J. Rifà. A Characterization of 1-perfect Additive Codes. IEEE Transactions on Information Theory ( 1999 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  858. G. Cohen, J. Rifà, J. Tena, G. Zemor. On the characterization of linear uniquely decodable codes. Desings, Codes and Cryptography ( 1999 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  859. J. Rifà. Review in: . ( 1999 ) Perfect codes on the Towers of Hanoi graph by Chi-Kwong Li and Ingrid Nelson in Bull. Austral. Math. Soc, 57 (1998), no. 3, 367-376
    Full ref.More Information
  860. J. Rifà. Well-Ordered Steiner Tryple Systems and 1-Perfect Partitions of the n-Cube. SIAM Journal on Discrete Mathematics ( 1999 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  861. J. Borrell, J. Pons, J. Pujol, A. Riera, J. Rifà, S. Robles. Aplicacions internet avançades (XANETA). ( 1999 )
    Full ref.
  862. J. Serra. Counting lattice points. In Métodos CombinatóriosProjecto Práxis ( 1998 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  863. J. Rifà. A new algorithm to decode the ternary Golay code. Information Processing Letters ( 1998 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  864. J. M. Basart . Programació lineal. Servei de Publicacions, UAB ( 1998 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  865. G. Cohen, J. Rifà, J. Tena, G. Zemor. On the characterization of linear uniquely decodable codes. In Proceedings of the Algebraic and Combinatorial Coding Theory Workshop, ACCT-Y1 ( 1998 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  866. J. Rifà. Teoria de la Codificació. Problemes. Servei de Publicacions, UAB ( 1998 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  867. J. M. Arqués. Fractal Analysis and its Applications in Human Palaeontology. In Abstracts of Contributions to the Dual Congress 1998Organising Committee of Dual Congress 1998 ( 1998 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  868. J. Borrell, S. Robles, J. Torres. Ataques de Denegación de Servicio por Manipulación de Protocolos TCP/IP. In Actas de la V Reunión Española sobre Criptología y Seguridad de la InformaciónUniversidad de Málaga ( 1998 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  869. A. Codina, J. Borrell. Communication of Confidential Data: Una aplicación de correo electrónico seguro en entorno local. In Actas de la V Reunión Española sobre Criptología y Seguridad de la InformaciónUniversidad de Málaga ( 1998 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  870. S. Robles, J. Pons, J. Borrell. Diseño de un Servicio de Votación Seguro a Gran Escala: El Colegio Electoral. In Actas de la V Reunión Española sobre Criptología y Seguridad de la InformaciónUniversidad de Málaga ( 1998 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  871. J. Borges. Codis perfectes, particions i generalitzacions. Phdthesis( 1998 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  872. P. Guitart, J. M. Basart . A Genetic Algorithm Approach for the Steiner Problem in Graphs. In 6th European Congress on Intelligent Techniques and Soft ComputingVerlag Mainz ( 1998 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  873. P. Guitart, J. M. Basart . A High Performance Approximation Algorithm for the Steiner Problem in Graphs. In Lecture Notes in Computer ScienceSpringer Verlag ( 1998 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  874. P. Guitart, J. M. Basart . A Genetic Algorithm for the Steiner Problem in Graphs. In I Jornades de Matemàtica Discreta i AlgorísmicaServei de Publicacions, UPC ( 1998 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  875. A. Riera. An Introduction to Electronic Voting Schemes. Technical report ( 1998 )
    Full ref.More Information
  876. A. Riera, J. Borrell, J. Rifà. How Smartcards Helped to Solve a Cryptographic Paradox. In Actas de la V Reunión Española sobre Criptología y Seguridad de la InformaciónCiteseer ( 1998 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  877. A. Riera, J. Borrell, J. Rifà. An Uncoercible Verifiable Electronic Voting Protocol. In Proceedings del IFIP SEC '98, IT Global SecurityAustrian Computer Society ( 1998 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  878. J. Pujol. Review in: . ( 1998 ) An eigenvalue Characterization of Antipodal Distance-Regular Graphs by M.A. Fiol in Electronic Journal of Combinatorics, 4 (1997)
    Full ref.More Information
  879. J. Pujol. Review in: . ( 1998 ) On binary linear codes which satisfy the two-chain condition by Sylvia B. Encheva in IEEE Transaction on Information Theory, 42-3 (1996) 1038-1047
    Full ref.More Information
  880. J. Minguillón, J. Pujol. Uniform Quantization Error for Laplacian sources with aplications to JPEG Standard. In Proceedings of SPIE's 43rd International Symposium on Optical Science, Engineering and Instrumentation ( 1998 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  881. J. Minguillón, J. Pujol. Uniform Quantization Error of Laplacian Sources with Applications to JPEG Coding. Technical report ( 1998 )
    Full ref.More Information
  882. I. Ortuño, J. Pujol, J. Serra, J. Minguillón. Aplicació de les xarxes neurals al tractament d'imatges hiperespectrals. ( 1998 )
    Full ref.
  883. J. Rifà, M. Villanueva. Error-Correcting Codes for QAM from Integer Rings of an Euclidean Complex Quadratic Field. In Proceedings of the 1998 IEEE International symposium on Information TheoryIEEE Computer Society Press ( 1998 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  884. J. Rifà, J. Borges, J. Pujol. 1-Perfect Partitions and 1-Perfect Propelinear Codes. In Proceedings of VII International Colloquium on Numerical Analysis and Computer Science with Applications ( 1998 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  885. J. Rifà. Codes, combinatorics, cryptography and the likes. In I Jornades de Matemàtica Discreta i AlgorísmicaServei de Publicacions, UPC ( 1998 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  886. J. Rifà, M. Villanueva. Error-Correcting Codes for QAM from Rings of Integers of an Algebraic Number Field. In I Jornades de Matemàtica Discreta i AlgorísmicaServei de Publicacions, UPC ( 1998 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  887. J. Borges, J. Pujol, J. Rifà. 1-Perfect Partitions and 1-Perfect Codes. In I Jornades de Matemàtica Discreta i AlgorísmicaServei de Publicacions, UPC ( 1998 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  888. J. M. Arqués. Fractal Analysis and its Applications in Human Palaentology. Technical report ( 1998 )
    Full ref.More Information
  889. J. Rifà, M. Villanueva. Error-Correcting Codes for QAM from Rings of Integers of a Complex Algebraic Number Field. Technical report ( 1998 )
    Full ref.More Information
  890. J. Borges, J. Rifà. A characterization of 1-perfect additive codes. Technical report ( 1998 )
    Full ref.More Information
  891. J. Gibert, D. Campillo, D, J. M. Arqués, E. Garcia-Olivares, C. Borja. Hominid Status of the Orce Cranial Fragment Reasserted. Journal of Human Evolution ( 1998 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  892. I. Dejter, J. Rifà. Estancia de Profesorado Visitante. ( 1997 )
    Full ref.
  893. J. Borrell. Asesoramiento para entornos de servidores en red. ( 1997 )
    Full ref.
  894. J. Serra. . ( 1997 )
    Full ref.
  895. J. M. Arqués, J. Borges, J. Borrell, A. Codina, J. Minguillón, J. Pons, J. Pujol, A. Riera, J. Rifà, S. Robles, M. Villanueva. Desarrollo de un servicio de votación segura en entornos Intranet/Internet sobre una infraestructura de certificados. ( 1997 )
    Full ref.
  896. J. Rifà. Estancias de profesorado visitante (Dr. Italo Dejter Glasman). ( 1997 )
    Full ref.
  897. G. Cohen, J. Rifà. Aplicaciones de la Codificación Algebraica a la Criptología. Acciones Integradas España-Francia. ( 1997 )
    Full ref.
  898. J. Pujol. Codis Propelineals invariants per translacions: classificació, construccions i particions associades. Phdthesis( 1997 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  899. J. Rifà, A. Vardi. On Partions of Space into Perfect Codes. In Proceedings of the III-Mediterranean Workshop on Coding Theory and Information Integrity ( 1997 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  900. J. Pujol, J. Rifà. Additive Reed-Muller codes. In Proc. of IEEE International Symposium on Information Theory, ISIT'97 ( 1997 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  901. J. Rifà. Review in: Mathematical Review. ( 1997 ) The catalan conjecture by P. Ribenboim in Butlletí de la Societat Catalana de Matemàtiques, 11 (1996), no. 1, 95-105
    Full ref.More Information
  902. J. Rifà, J. Pujol. Translation Invariant Propelinear Codes. IEEE Transactions on Information Theory ( 1997 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  903. J. Minguillón. Mesures de Qualitat i Error de Quantificació en les Modalitats d'Operació Seqüencial i Progressiva de l'Estàndard JPEG. ( 1997 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  904. A. Riera, J. Borrell, J. Rifà. . In Proceedings of the {IFIP} TC11 13th International Conference on Information Security (SEC'97)Ed. Chapman and Hall ( 1997 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  905. G. Cohen, J. Rifà, G. Zemor. Uniquely Decodable Codes. In Proceedings of the 1997 IEEE International Workshop on Information TheoryIEEE Computer Society Press ( 1997 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  906. J. M. Basart , P. Guitart. Grafs aplicats a la resolució de jocs. Butlletí de la Societat Catalana de Matemàtiques ( 1997 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  907. J. Pujol. Algorismes i Programes. Servei de Publicacions, UAB ( 1997 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  908. J. M. Basart , J. Rifà, M. Villanueva. Fonaments de Matemàtica Discreta. Elements de combinatòria i aritmètica. Servei de Publicacions, UAB ( 1997 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  909. J. M. Arqués. Evitació i detecció de mentiders en esquemes de llindar. ( 1997 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  910. J. M. Arqués, J. Gibert. A revised technique to calculate the fractal dimension of cranial sutures. In Actas del Congreso Internacional de Paleontología Humana (Orce)Museo de Prehistoria y Paleontologia J. Gilbert ( 1997 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  911. J. M. Basart , J. Borges, J. Borrell, J. Pujol, J. Rifà, M. Villanueva. Seguretat, Codificació i Transport de la informació. ( 1996 )
    Full ref.Full text
  912. J. Rifà. Ajut a la organització dels Mediterranean Workshop on Coding and Information Integrity. ( 1996 )
    Full ref.
  913. G. Cohen, J. Rifà. Aplicaciones de la Codificación Algebraica a la Criptología. Acciones Integradas España-Francia. ( 1996 )
    Full ref.
  914. J. Pujol, J. Rifà. Additive Reed-Muller Codes. In Proc. II Mediterranean Workshop on Coding and Information IntegrityUniversitat de les Illes Balears ( 1996 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  915. M. Villanueva. Simulacions de codis correctors d'errors per QAM en canals Gaussians amb soroll blanc additiu. ( 1996 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  916. J. Serra. Neural Networks and their applications. John Wiley and Sons, Inc. ( 1996 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  917. A. Riera, J. Borrell. SecuDE as a tool to construct certification structures: some shell scripts to facilitate its use. In Actas de la IV Reunión Española sobre CriptologíaUniversidad de Valladolid ( 1996 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  918. J. Borrell, J. Rifà. El protocolo de autenticación STS. Una versión cliente-servidor sobre RPC. In Actas de la IV Reunión Española de Criptología ( 1996 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  919. J. Borrell, J. Rifà. Two Robust Threshold Secret Sharing Schemes. In Proc. II Mediterranean Workshop on Coding and Information IntegrityUniversitat de les Illes Balears ( 1996 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  920. J. Borrell. Estudi i desenvolupament d'un esquema criptogràfic per realitzar votacions segures sobre una xarxa local. Phdthesis( 1996 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  921. P. Guitart, J. M. Basart . Redes de Petri y protocolos de comunicación. Informática y Autómatica ( 1996 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  922. J. Borges, J. M. Arqués, J. Serra. Teoria d'autòmats. Servei de Publicacions, UAB ( 1996 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  923. J. Borges, I. Dejter. On Perfect Dominating Sets in Hypercubes and their Complements. The Journal of Combinatorial Mathematics and Combinatorial Computing ( 1996 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  924. J. Borrell, J. Rifà. An Implementable Secure Voting Scheme. Computers and Security ( 1996 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  925. J. Rifà. Aproximación a la criptografía. In Data Security'95 ( 1995 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  926. F. Cucker, R. Gavalda, J. Serra, C. Torras. Complexitat contínua, xarxes neuronals i aprenentatge. ( 1995 )
    Full ref.
  927. G. Cohen, J. Rifà. Aplicaciones de la Codificación Algebraica a la Criptología. Acciones Integradas España-Francia. ( 1995 )
    Full ref.
  928. I. Ortuño, J. Serra. Neural Networks in Digital Data Transmission. Lecture Notes in Computer Science ( 1995 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  929. I. Ortuño, J. Serra. Digital Data Transmission Error-Correcting by Neural Networks. In Engineering Applications of Artificial Neural NetworksFinnish Artificial Intelligence Society: International Conferences ( 1995 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  930. J. Serra, I. Ortuño. A neural network for soft-decision decoding of Reed-Solomon Codes. In Proceedings of WIRN95. 7th Italian workshop on Neural NetworksSpringer Verlag ( 1995 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  931. J. Serra. Neural networks as decoders in error-correcting systems for digital data transmissio. Computational Learning and Probabilistic Reasoning ( 1995 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  932. J. Rifà. Review in: Mathematical Review. ( 1995 ) A ternary algebra arising from association schemes on triples by D. L. Mesner in J. Algebra, 164 (1994), n.3, 595-613
    Full ref.More Information
  933. A. Riera. Public key certification hierarchies and their operation using the security toolkit SecuDE. ( 1995 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  934. I. Dejter, J. Pujol. Perfect domination and symmetry in hypercubes. Congresus Numerantium ( 1995 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  935. J. Minguillón, A. Riera, J. Rifà. Investigación Universitaria en el ámbito de las autopistas de la Información. In I Fòrum sobre Autopistes de la Informació ( 1995 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  936. J. Borrell, J. Rifà. A Practical Secure Voting Scheme over a Computer Network. In Proceedings of the II Israeli-French Workshop on Coding and Information IntegrityAcademic Press ( 1995 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  937. J. Rifà. The Rational Approximations and the Decoding of One Error beyond the BCH Bound. In Proceedings of the II Israeli-French Workshop on Coding and Information Integrity ( 1995 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  938. J. Rifà. Gaussian Rings and the Differentially Coherent Detection of QAM Signals. In Proceedings of the International Conference on Telecommunications ICT'95 ( 1995 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  939. P. Guitart. Xarxes de Petri i Protocols de Comunicació. ( 1995 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  940. J. Rifà. Seguretat Computacional. Servei de Publicacions, UAB ( 1995 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  941. J. Rifà. Groups of Complex Integers Used as QAM Signals. IEEE Transactions on Information Theory ( 1995 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  942. J. Rifà, J. Borrell. A Fast Algorithm to Compute Irreducible and Primitive Polynomials in Finite Fields. MST, Mathematical Systems Theory ( 1995 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  943. J. Borges, J. Rifà. Multidiseños como diseños con repetición. SCIENTIA: An International Scientific Journal Official of the UTFSM ( 1995 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  944. I. Dejter, J. Rifà. Estancia Profesor Visitante. ( 1994 )
    Full ref.
  945. J. Shawe-Taylor, J. Serra. Continuous Complexity, Neural Nets and Learning (NeuroCOLT). ( 1994 )
    Full ref.
  946. J. M. Arqués, J. M. Basart , J. Borrell, J. Pons, J. Pujol, A. Riera, J. Rifà. Implementación de un esquema de votación seguro sobre una red local usando protocolos criptogràficos sobre TCP/IP. ( 1994 )
    Full ref.
  947. J. Serra. Xarxes neuronals com a eina de descodificació en codis de Reed-Solomon. ( 1994 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  948. J. Borrell, J. Rifà. Protocolos para la votación electrónica: una propuesta implementable. In Actas de la III Reunión Española sobre CriptologíaServei de Publicacions, UPC ( 1994 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  949. J. M. Basart . Grafs: fonaments i algorismes. Servei de Publicacions, UAB ( 1994 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  950. J. Rifà. Decoding a bit more than the BCH bound. Lecture Notes in Computer Science ( 1994 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  951. J. Rifà. Threshold Shared Schemes. In State and progress of research in CryptographyFundazione Ugo Bordoni ( 1993 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  952. I. Dejter. Estancia profesor Visitante. ( 1993 )
    Full ref.
  953. M. R. Pous, M. M. Puntí, J. Rifà. Singladura Històrico-Artística d'Osona. ( 1993 )
    Full ref.
  954. J. Rifà. Estancias de profesorado visitante (Dr. Italo Dejter Glasman). ( 1993 )
    Full ref.
  955. I. Ortuño. Correcci{\'o}n de interferencia intersimbólica mediante redes neuronales. In Proceedings del VIII Simposium nacional del Comité Español de la Unión Científica Internacional de Radio ( 1993 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  956. I. Ortuño, M. Ortuño, J. A. Delgado. Neural Networks for Block Decoding in the presence of channel symbols interferences. In Proceedings of the International Conference on Digital Signal Procesing and II International Conference on Computer Applications to Engineering Systems ( 1993 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  957. J. Serra. A Single-layer High-order Perceptron for decoding Reed-Solomon Codes. In Proceedings of the II International Workshop on Combinatorics, Coding and Graphs, Codigraf'93 ( 1993 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  958. J. Rifà. Review in: . ( 1993 ) Character Tables of Association Schemes of Affine Type by Wing Man Kwok in European J. Combin. 13 (1992), n.3, pp. 167-185.
    Full ref.More Information
  959. J. Rifà. Review in: . ( 1993 ) Nonexistence results for Baker arrays by J.Jedwab in Cryptography and Coding, II (Cirencester, 1989), 121-126, Inst. Math. Appl. Conf. Ser. New Ser., 33, Oxford Univ. Press, New York, 1992.
    Full ref.More Information
  960. J. Borges, J. Rifà. On Perfect Dominating Sets in n-cubes. In Proceedings of the II International Workshop on Combinatorics, Coding and Graphs, Codigraf'93 ( 1993 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  961. J. Rifà, J. Pujol. Completely Regular Codes Related to Distance Regular Graphs. In Proceedings of the II International Workshop on Combinatorics, Coding and Graphs, Codigraf'93Servei de Publicacions, UAB ( 1993 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  962. J. Rifà, I. Dejter. About Additive Codes associated to Distance Regular Graph. In Proceedings of the II International Workshop on Combinatorics, Coding and Graphs, Codigraf'93 ( 1993 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  963. J. Rifà. How to avoid the Cheaters succeed in the Key Sharing Scheme. Desings, Codes and Cryptography ( 1993 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  964. J. Borges, J. Rifà. A note about Multidesigns and Extended Designs. Discrete Mathematics ( 1993 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  965. I. Ortuño, M. Ortuño, J. A. Delgado. Error Correcting Neural Networks for Channels with Gaussian Noise. In Proceedings IEEE, International Joint Conference on Neural Networks, IJCNN ( 1992 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  966. J. Rifà. Review in: Mathematical Review. ( 1992 ) The generation of primitive polynomials in GF(q) with independent roots and their applications for power residue codes, VLSI testing and finite field multipliers using normal basis by T.Aaron Gulliver, Micaela Serra, Vijay K.Bhargava in International J. Electronics, 71 (1991), n.4, 559-576.
    Full ref.More Information
  967. J. Rifà, J. Pujol. Sobre l'estructura propelineal dels codis de Preparata. Technical report ( 1992 )
    Full ref.More Information
  968. J. Casasnovas, J. Rifà. Inference of Approximate Values of a Possibility Measure by Database Accumulation. In Proceedings of the Fifth International Symposium on Knowledge Engineering ( 1992 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  969. J. M. Basart . Introducció a la Teoria de Grafs. Technical report ( 1992 )
    Full ref.More Information
  970. J. Rifà. Error Correcting Codes: Theory and Applications. Prentice Hall ( 1992 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  971. J. Rifà. All s-Sum-Sets of type 2 or 3 are triple sum-sets. Computers & Mathematics with Applications ( 1992 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  972. J. M. Basart , J. Borrell, J. Cotrina, I. Ortuño, J. Pujol, J. Rifà. Grafs i fraccions continues en la codificació per a la correcció d'errors. ( 1991 )
    Full ref.
  973. J. M. Basart , J. Borrell, J. Cotrina, I. Ortuño, J. Pujol, J. Rifà. Grafos y fracciones continuas en la codificación para la corrección de múltiples errores en comunicaciones digitales y su simulación en una LAN. ( 1991 )
    Full ref.
  974. I. Ortuño, M. Ortuño, J. A. Delgado. Neural Networks as Error Correcting Systems in Digital Communications. Lecture Notes in Computer Science ( 1991 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  975. J. Rifà. Review in: . ( 1991 ) A Remark on Association Schemes with two P-Polynomials Structures by A.E. Brouwer in European Journal of Combinatorics, 10 (1989), n.6, 523-526.
    Full ref.More Information
  976. J. Rifà. Review in: . ( 1991 ) Binary Set Functions and Parity Check Matrices by W.E. Clark, W.E. Dunning and D.G. Rogers in Discrete Mathematics, 80 (1990), n.3, 249-265.
    Full ref.More Information
  977. J. Pujol. Relacions entre codis binaris completament regulars no lineals i grafs distància-regulars. ( 1991 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  978. J. Borrell, J. Rifà. Finite Field Computations using Processor Arrays. In Proceedings of the ISMM International Workshop on Parallel ComputingActa Press ( 1991 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  979. J. Rifà. Detección de tramposos usando un esquema umbral en red. In Proceedings de la Primera Reunión Española sobre Criptología. Aspectos teóricos y aplicaciones ( 1991 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  980. J. M. Basart . Some Upper Bounds For Minimal Trees. Information Processing Letters ( 1991 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.Full text
  981. J. Rifà, L. Huguet. Comunicación Digital: Teoría Matemática de la Información, Codificación Algebraica, Criptología. Masson ( 1991 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  982. J. Rifà, J. Borrell. Improving the Time Complexity of the Computation of Irreducible and Primitive Polynomials in Finite Fields. In Proc. 10th International Conference, AAECC-10Springer Verlag ( 1991 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  983. J. Rifà, J. Pujol. Completely Transitive Codes and Distance Transitive Graphs. In Proc. 9th International Conference, AAECC-9Springer Verlag ( 1991 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  984. J. Rifà. On a Categorial Isomorphism between a class of Completely Regular Codes and a class of Distance Regular Graphs. Lecture Notes in Computer Science ( 1991 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  985. O. Egecioglu, C. K. Koc, J. Rifà. Fast computation of continued fractions. Computers & Mathematics with Applications ( 1991 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  986. J. M. Basart , J. Borges, J. Borrell, J. Domingo, R. Fernández, L. Huguet, J. Pons, J. Pujol, J. Rifà, I. Ortuño, M. A. Vilardell. Equipo Spider, Unidad de prueba y elementos adicionales. ( 1990 )
    Full ref.
  987. J. Rifà, L. Huguet. Classification of a class of Distance Regular Graphs via Completely Regular Codes. Discrete Applied Mathematics ( 1990 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  988. J. M. Basart , J. Borges, J. Borrell, J. Domingo, R. Fernández, L. Huguet, J. Pons, J. Pujol, J. Rifà, I. Ortuño, M. A. Vilardell. Investigación en los campos de Códigos, Criptografía y Teletratamiento. ( 1990 )
    Full ref.
  989. J. Dalmau, J. A. Delgado, L. Huguet, I. Ortuño, R. Valle. Concatenated coding schemes for H.F. channels. Lecture Notes in Computer Science ( 1989 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  990. J. Borges. t-dissenys i les seves relacions. ( 1989 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  991. J. M. Basart , L. Huguet. An Approximation Algorithm for the TSP. Information Processing Letters ( 1989 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  992. J. Rifà. Codes correcteurs: Théorie et applications. Masson ( 1989 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  993. J. M. Basart , J. Rifà. On finding Rectilinear Steiner Minimal Trees. Informática y Autómatica ( 1989 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  994. J. Rifà, J. M. Basart , L. Huguet. On Completely Regular Propelinear Codes. In Lecture Notes in Computer ScienceSpringer Verlag ( 1989 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  995. J. M. Basart , J. Rifà. Covering Radius for Codes obtained from T(m) Triangular Graphs. In Lecture Notes in Computer ScienceSpringer Verlag ( 1989 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  996. J. Rifà. On the construction of Linear Completely Regular Codes from Distance Regular Graphs. Lecture Notes in Computer Science ( 1989 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  997. J. Rifà. An open problem on analytic inequalities. Crux Mathematicorum ( 1989 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  998. J. Dalmau, J. A. Delgado, L. Huguet, I. Ortuño, R. Valle. Simulations of coding schemes used in H.F. digital mobile radio. In Proceeding of the Mini and Microcomputers and their applications ( 1988 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  999. J. M. Basart , J. Rifà. Another approach to the Steiner problem in graphs and its generalization. In Proceedings of the ISMM International Symposium: Mini and Microcomputers and their applicationsServei de Publicacions, UAB ( 1988 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  1000. J. M. Basart , L. Huguet. Arbres Minimals i Arbres de Steiner en la Mètrica Rectilínia. Qüestió ( 1988 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  1001. J. M. Basart , L. Huguet. From T(m) Triangular Graphs to Single-Error-Correcting Codes. In Lecture Notes in Computer ScienceSpringer Verlag ( 1988 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  1002. J. M. Basart . Els arbres de Steiner: obtenció i propietats. Phdthesis( 1988 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  1003. J. Rifà, L. Huguet. Characterization of Completely Regular Codes through P-Polynomial Association Schemes. Lecture Notes in Computer Science ( 1988 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  1004. J. Rifà. An open problem on analytic inequalities. Crux Mathematicorum ( 1988 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  1005. J. Rifà, J. Pujol. Covering and Distance-Regular Graphs. Qüestió ( 1988 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  1006. J. Rifà. Equivalències entre estructures combinatòricament regulars: Codis, Esquemes i grafs. Phdthesis( 1987 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  1007. J. M. Basart . Construcció de codis correctors a partir de configuracions i grafs. Qüestió ( 1986 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  1008. L. Huguet, J. Rifà, M. Griera. Pseudo-triple Sum-Sets and Association Schemes. Lecture Notes in Computer Science ( 1986 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  1009. M. Griera, J. Rifà, L. Huguet. On S-Sum Sets and Projective Codes. Lecture Notes in Computer Science ( 1986 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
  1010. J. M. Basart , L. Huguet. Utilización de códigos de Preparata en la codificación por trasladados. In Actes del VI Congrés de la Asociación Española de Informàtica y Automàtica ( 1985 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.
  1011. J. M. Basart . Configuracions i Grafs en la Teoria de Codis. ( 1985 ) DOI: 10.1109/TIT.2011.2119465.
    Full ref.More Information
Full BibTeX


Home | Contact | Web map
Dilluns, 11 de novembre de 2019. © 2006, dEIC. Administrator: webmaster {at} deic.uab.cat