Publicacions
A continuació es proporciona el llistat de publicacions del dEIC.
Les Tesis i les Tesines es mostren en un altre llistat.
2024
Articles de Journal: 6, Conferències: 1, Llibres editats: 1, Capítols de llibres: 0.
Deepfake Detection Using Spatiotemporal Transformer,” ACM Transactions on Multimedia Computing, Communications and Applications, vol. UNKNOWN, pp. UNKNOWN, 2024.DOI: 10.1145/3643030. , “2023
Articles de Journal: 5, Conferències: 1, Llibres editats: 1, Capítols de llibres: 0.
Identification of behavioural pattern associated with mastitis in dairy cows,” In 74th Annual Meeting of the European Federation of Animal Science, Aug. 2023. , “
Efficient Lossless Compression of Integer Astronomical Data,” Publications of the Astronomical Society of the Pacific, vol. 135, no. 1051, pp. 094502, 2023.DOI: 10.1088/1538-3873/acf6e0. , “
A Scalable Reduced-Complexity Compression of Hyperspectral Remote Sensing Images Using Deep Learning,” MDPI Remote Sensing, vol. 15, no. 18, 2023.DOI: 10.3390/rs15184422. IF: 4.509, Q2. , “2022
Articles de Journal: 7, Conferències: 6, Llibres editats: 1, Capítols de llibres: 0.
CCSDS 123.0-B-2 compression standard cross-validation and fuzzing,” In 8th International Workshop on On-Board Payload Data Compression (OBPDC), Sep. 2022.DOI: 10.5281/zenodo.7245126. , “
Hyperspectral image compression using
convolutional neural networks with local spectral
transforms and non-uniform sample normalisation,” In 8th International Workshop on On-Board Payload Data Compression (OBPDC), Sep. 2022.DOI: 10.5281/zenodo.7245234. , “
Coding Performance Impact on a Constant-Weight Predictor for CCSDS 123.0-B-2,” In 8th International Workshop on On-Board Payload Data Compression (OBPDC), Sep. 2022.DOI: 10.5281/zenodo.7110999. , “
Fast Run-Length Compression of Point Cloud Geometry,” IEEE Trans. Image Processing, vol. 31, pp. 4490-4501, 2022.DOI: 10.1109/TIP.2022.3185541. IF: 3.199, Q1. , “
La atención consciente como actitud ética,” Ensayos, vol. 36, no. 2, pp. 33--46, 2022. , “2021
Articles de Journal: 8, Conferències: 6, Llibres editats: 2, Capítols de llibres: 1.
Editorial to Special Issue "Remote Sensing Data Compression",” MDPI Remote Sensing, vol. 13, no. 9, pp. 3727, Sep. 2021.DOI: 10.3390/rs13183727. IF: 4.509, Q2. , “
Redundancy and Optimization of tANS Entropy Encoders,” IEEE Trans. Multimedia, vol. 23, pp. 4341-4350, 2021.DOI: 10.1109/TMM.2020.3040547. IF: 6.051, Q1. , “
MOVES: A MemOry-based VEhicular Social forwarding technique,” Computer Networks, vol. 197, no. UNKNOWN, pp. 108324, 2021. , “
LAPSE: A Machine Learning Message Forwarding Approach based on Node Centrality Estimation in Sparse Dynamic Networks,” In 2021 Wireless Days (WD), pp. 1--6, 2021. , “
Market Equity for Car-sharing Applications using Homomorphic Encryption and Opportunistic Networking,” In 2021 Wireless Days (WD), pp. 1--5, 2021. , “
Agents in a privacy-preserving world,” Transactions on Data Privacy, vol. 14, no. 1, pp. 53--63, 2021. , “Environmental Ethics: When Human Beings and Nature Are Not Two,” In UNKNOWN (editor), Multidisciplinary Approaches to Ethics in the Digital Era, 2021. ISBN: 9781799841173. , “2020
Articles de Journal: 13, Conferències: 10, Llibres editats: 1, Capítols de llibres: 0.
High-Performance Lossless Compression of Hyperspectral Remote Sensing Scenes Based on Spectral Decorrelation,” MDPI Remote Sensing, vol. 12, no. 18, pp. 2955, 2020.DOI: 10.3390/rs12182955. IF: 4.509, Q2. , “
A Preliminary Approach Towards Satellite Constellation Data Compression,” In 7th International Workshop on On-Board Payload Data Compression (OBPDC), Sep. 2020. , “
CILLIC: Context Interpolation Lossless and Image Compressor,” In 7th International Workshop on On-Board Payload Data Compression (OBPDC), Sep. 2020. , “
The Hybrid Entropy Encoder of CCSDS 123.0-B-2: Insights and Decoding Process,” In 7th International Workshop on On-Board Payload Data Compression (OBPDC), Sep. 2020. , “
Improving Storage Size and Random Access Time in k2-raster Compact Data Structure for Hyperspectral Scenes,” In 7th International Workshop on On-Board Payload Data Compression (OBPDC), Sep. 2020. , “
Analysis of Variable-Length Codes for Integer Encoding in Hyperspectral Data Compression with the k2-Raster Compact Data Structure,” MDPI Remote Sensing, vol. 12, no. 12, pp. 1983, 2020.DOI: 10.3390/rs12121983. IF: 4.509, Q2. , “
Complexity Scalable Bitplane Image Coding with Parallel Coefficient Processing,” IEEE Signal Processing Letters, vol. 27, pp. 840-844, 2020.DOI: 10.1109/LSP.2020.2990307. IF: 3.105, Q2. , “A. Bilgin, M. W. Marcellin, J. Serra-Sagristà and J. A. Storer (editors), IEEE Data Compression Conference (DCC), Mar. 2020. ISBN: 978-1-7281-6457-1. ISSN: 2375-0359.
Applications in security and evasions in machine learning: A survey,” Electronics, vol. 9, no. 1, pp. 97, 2020. , “
A Software-Defined Networking Approach for Congestion Control in Opportunistic Networking,” In 34th International Conference on Information Networking (ICOIN 2020), 2020. , “
Forwarding in opportunistic information-centric networks: an optimal stopping approach,” IEEE Communications Magazine, vol. 58, no. 5, pp. 56--61, 2020. , “
Optimising data diffusion while reducing local resources consumption in Opportunistic Mobile Crowdsensing,” Pervasive and Mobile Computing, vol. 67, no. UNKNOWN, pp. 101201, 2020. , “
Towards a Methodology for the Development of Routing Algorithms in Opportunistic Networks,” arXiv preprint arXiv:2009.01532, vol. UNKNOWN, no. UNKNOWN, pp. UNKNOWN, 2020. , “
BArt: Trading digital contents through digital assets,” Concurrency and Computation: Practice and Experience, vol. 32, no. 12, pp. e5490, 2020.DOI: 10.1002/cpe.5490. , “2019
Articles de Journal: 24, Conferències: 9, Llibres editats: 1, Capítols de llibres: 0.
Using Predictive and Differential Methods with K2-Raster Compact Data Structure for Hyperspectral Image Lossless Compression,” MDPI Remote Sensing, vol. 11, no. 11, pp. 2461, 2019.DOI: 10.3390/rs11212461. IF: 4.509, Q2. , “
GPU architecture for wavelet-based video coding acceleration,” In IEEE International Conference on Parallel Computing, Sep. 2019. , “
Compression of Hyperspectral Scenes through Integer-to-Integer Spectral Graph Transforms,” MDPI Remote Sensing, vol. 11, no. 11, pp. 2290, 2019.DOI: 10.3390/rs11192290. IF: 4.509, Q2. , “
Performance Impact of Parameter Tuning on the CCSDS-123.0-B-2 Low-Complexity Lossless and Near-Lossless Multispectral and Hyperspectral Image Compression Standard,” MDPI Remote Sensing, vol. 11, no. 11, pp. 1390, 2019.DOI: 10.3390/rs11111390. IF: 4.509, Q2. , “
Effect of Lightweight Image Compression on CNN-based Image Segmentation,” In Grenoble NewSpace Week (GNSW), pp. 31, Apr. 2019. , “
Rice-Marlin Codes: Tiny and Efficient Variable-to-Fixed Codes,” In IEEE Data Compression Conference (DCC), Mar. 2019.DOI: 10.1109/DCC.2019.00108. CORE A*. , “
Perception-Optimized Encoding for Visually Lossy Image Compression,” In IEEE Data Compression Conference (DCC), pp. 592-592, 2019. ISSN: 1068-0314.DOI: 10.1109/DCC.2019.00104. CORE A*. , “
Mosaic-Based Color-Transform Optimization for the Lossy and Lossy-to-Lossless compression of Pathology Whole-Slide Images,” IEEE Trans. Medical Imaging, vol. 38, no. 1, pp. 21-32, 2019.DOI: 10.1109/TMI.2018.2852685. IF: 6.685, Q1. , “A. Bilgin, M. W. Marcellin, J. Serra-Sagristà and J. A. Storer (editors), IEEE Data Compression Conference (DCC), Mar. 2019. ISBN: 978-1-7281-0658-8. ISSN: 2375-0359.
Efficient broadcast in opportunistic networks using optimal stopping theory,” Ad Hoc Networks, vol. 88, no. UNKNOWN, pp. 5--17, 2019. , “
Hey, influencer! Message delivery to social central nodes in social opportunistic networks,” Computer Communications, vol. 137, no. UNKNOWN, pp. 81--91, 2019. , “
Exploiting Temporal and Spatial Regularities for Content Dissemination in Opportunistic Social Network,” Wireless Communications and Mobile Computing, vol. 2019, no. UNKNOWN, pp. UNKNOWN, 2019. , “
General and mixed linear regressions to estimate inter-contact times and contact duration in opportunistic networks,” Ad Hoc Networks, vol. 93, no. UNKNOWN, pp. 101927, 2019. , “
A distributed token passing protocol for time constrained data gathering in VANETs,” Electronics, vol. 8, no. 8, pp. 823, 2019. , “
Privacy-preserving forwarding using homomorphic encryption for information-centric wireless ad hoc networks,” IEEE Communications Letters, vol. 23, no. 10, pp. 1708--1711, 2019. , “
Using local expiration timers to reduce buffer utilisation when using epidemic diffusion,” In 2019 IEEE Global Communications Conference (GLOBECOM), pp. 1--6, 2019. , “
A review of Message Anonymity on Predictable Opportunistic
Networks,” In Actas de las V Jornadas Nacionales de Investigaci\'{o}on en
Ciberseguridad (JNIC 2019), pp. 316--317, Jun. 2019. ISBN: 978-84-09-12121-2. , “
On the Difficulty of Hiding the Balance of Lightning Network Channels,” In Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, pp. 602--612, 2019. ISBN: 978-1-4503-6752-3.DOI: 10.1145/3321705.3329812. , “
Another coin bites the dust: an analysis of dust in UTXO-based cryptocurrencies,” Royal Society Open Science, vol. 6, no. 1, pp. 180817, 2019.DOI: 10.1098/rsos.180817. , “
{\textdollar}\{{\textbackslash}mathbb\{Z\}{\_}\{2\}{\textbackslash}mathbb\{Z\}{\_}\{4\}\}{\textdollar}
-Additive Cyclic Codes: Kernel and Rank,” {IEEE} Trans. Information Theory, vol. 65, no. 4, pp. 2119--2127, 2019.DOI: 10.1109/TIT.2018.2870891. , “
On Z2Z4-additive complementary dual codes and related {LCD} codes,” CoRR, vol. abs/1903.07886, no. UNKNOWN, pp. UNKNOWN, 2019. , “
Partial Permutation Decoding for Several Families of Linear and {\(\mathbb{Z}\)}\({}_{\mbox{4}}\)-Linear
Codes,” {IEEE} Trans. Information Theory, vol. 65, no. 1, pp. 131--141, 2019.DOI: 10.1109/TIT.2018.2840226. , “
On the Kernel of Z\({}_{\mbox{2\({}^{\mbox{s}}\)}}\)-Linear Simplex
and MacDonald Codes,” CoRR, vol. abs/1910.07911, no. UNKNOWN, pp. UNKNOWN, 2019. , “
Mindful Engineers in Sustainable Engineering,” IEEE Technology and Society Magazine, vol. 38, no. 3, pp. 68--73, 2019. , “2018
Articles de Journal: 20, Conferències: 12, Llibres editats: 1, Capítols de llibres: 0.
Compression of Hyperspectral Images with Graph Wavelets,” In 6th International Workshop on On-Board Payload Data Compression (OBPDC), Sep. 2018. , “
Introducing K3-Raster Compact Data Structure for Hyperspectral Images,” In 6th International Workshop on On-Board Payload Data Compression (OBPDC), Sep. 2018. , “
Prepending Spectral Decorrelating Transforms to FAPEC: A competitive High-Performance approach for Remote Sensing Data Compression,” In 6th International Workshop on On-Board Payload Data Compression (OBPDC), Sep. 2018. , “
Performance Impact of Parameter Tuning on the Emerging CCSDS-123.0-B-2 Low-Complexity Lossless and Near-Lossless Multispectral and Hyperspectral Image Compression Standard,” In 6th International Workshop on On-Board Payload Data Compression (OBPDC), Sep. 2018. , “
The new CCSDS Standard for Low-Complexity Lossless and Near-Lossless Multispectral and Hyperspectral Image Compression,” In 6th International Workshop on On-Board Payload Data Compression (OBPDC), Sep. 2018. , “
High throughput image codec for high-resolution satellite images,” In IEEE International Geoscience and Remote Sensing Symposium, pp. 6524-6527, Jul. 2018. CORE C. , “
Graph-based Rate Control in Pathology Imaging with Lossless Region of Interest Coding,” IEEE Trans. Medical Imaging, vol. 37, no. 10, pp. 2211-2223, 2018.DOI: 10.1109/TMI.2018.2824819. IF: 7.816, Q1. , “A. Bilgin, M. W. Marcellin, J. Serra-Sagristà and J. A. Storer (editors), IEEE Data Compression Conference (DCC), Mar. 2018. ISBN: 978-1-5386-4883-43. ISSN: 2375-0359.
Improving Marlin's Compression Ratio with Partially Overlapping Codewords,” In IEEE Data Compression Conference (DCC), pp. 325-334, Mar. 2018.DOI: 10.1109/DCC.2018.00041. CORE A*. , “
A Visual Discrimination Model for JPEG2000 Compression,” In IEEE Data Compression Conference (DCC), pp. 424-424, Mar. 2018.DOI: 10.1109/DCC.2018.00077. CORE A*. , “
Lossless Compression of Color Filter Array Mosaic Images with Visualization via JPEG 2000,” IEEE Trans. Multimedia, vol. 20, no. 2, pp. 257-270, 2018.DOI: 10.1109/TMM.2017.2741426. IF: 5.452, Q1. , “
The TOP gamification platform as a change agent in the
acquisition of the competences attributed to the Degree in
Computer Engineering,” In Actes del X Congrés Internacional de Docència Universitària i
Innovació (CIDUI 2018), 2018. , “
ePRIVO: An enhanced privacy-preserving opportunistic routing protocol for vehicular delay-tolerant networks,” IEEE Transactions on Vehicular Technology, vol. 67, no. 11, pp. 11154--11168, 2018. , “
Synthetic generation of spatial graphs,” International Journal of Intelligent Systems, vol. 33, no. 12, pp. 2364--2378, 2018.DOI: 10.1002/int.22034. , “
On Improving Automated Self-assessment with Moodle Quizzes: Experiences from a Cryptography Course,” In Technology Enhanced Assessment, pp. 176--189, 2018. ISBN: 978-3-319-97807-9. , “
Cryptocurrency networks: a new {P}2{P} paradigm,” Mobile Information Systems, vol. 2018, no. UNKNOWN, pp. UNKNOWN, 2018.DOI: 10.1155/2018/2159082. , “
On {\(\mathbb{Z}\)}\({}_{\mbox{p\({}^{\mbox{r}}\)}}\){\(\mathbb{Z}\)}\({}_{\mbox{p\({}^{\mbox{s}}\)}}\)-additive
cyclic codes,” Adv. in Math. of Comm., vol. 12, no. 1, pp. 169--179, 2018.DOI: 10.3934/amc.2018011. , “
Z\({}_{\mbox{2}}\)-double cyclic codes,” Des. Codes Cryptogr., vol. 86, no. 3, pp. 463--479, 2018. , “
Binary Images of {\(\mathbb{Z}\)}\({}_{\mbox{2}}\){\(\mathbb{Z}\)}\({}_{\mbox{4}}\)-Additive
Cyclic Codes,” {IEEE} Trans. Information Theory, vol. 64, no. 12, pp. 7551--7556, 2018.DOI: 10.1109/TIT.2018.2837882. , “
Completely regular codes by concatenating Hamming codes,” Adv. in Math. of Comm., vol. 12, no. 2, pp. 337--349, 2018.DOI: 10.3934/amc.2018021. , “
On the Kernel of Z\({}_{\mbox{2\({}^{\mbox{s}}\)}}\)-Linear Hadamard
Codes,” CoRR, vol. abs/1801.05189, no. UNKNOWN, pp. UNKNOWN, 2018. , “2017
Articles de Journal: 23, Conferències: 13, Llibres editats: 1, Capítols de llibres: 1.
The Current Role of Image Compression Standards in Medical Imaging,” MDPI Information, vol. 8, no. 4, 2017.DOI: 10.3390/info8040131. , “
Statistical Retrieval of Temperature and Moisture Atmospheric Profiles Benefits from Spatial-Spectral Image Compression,” In EUMETSAT - Meteorological Satellite Conference, Oct. 2017. , “
Hyperspectral IASI L1C Data Compression,” MDPI Sensors, vol. 17, no. 6, 2017.DOI: 10.3390/s17061404. , “
Lossless medical image compression through lightweight binary arithmetic coding,” In Low-Latency Lightweight Image Compression, Applications of Digital Image Processing XL, SPIE Optical Engineering + Applications, vol. 10396, Oct. 2017.DOI: 10.1117/12.2273725. , “
Cross-Color Channel Perceptually Adaptive Quantization for HEVC,” In IEEE Data Compression Conference (DCC), pp. 456-456, 2017.DOI: 10.1109/DCC.2017.66. CORE A*. , “Ali Bilgin, Michael W. Marcellin, Joan Serra-Sagristà and James A. Storer (editors), IEEE Data Compression Conference (DCC), Apr. 2017. ISBN: 978-1-5090-6721-3. ISSN: 1068-0314.
Marlin: A High Throughput Variable-to-Fixed Codec using Plurally Parsable Dictionaries,” In IEEE Data Compression Conference (DCC), Apr. 2017.DOI: 10.1109/DCC.2017.74. CORE A*. , “
Low Complexity Prediction Model for Coding Remote-Sensing Data with Regression Wavelet Analysis,” In IEEE Data Compression Conference (DCC), Apr. 2017.DOI: 10.1109/DCC.2017.61. CORE A*. , “
Softwarecast: A code-based delivery manycast scheme in heterogeneous and opportunistic ad hoc networks,” Ad Hoc Networks, vol. 55, no. UNKNOWN, pp. 72--86, 2017. , “
Explore and wait: A composite routing-delivery scheme for relative profile-casting in opportunistic networks,” Computer Networks, vol. 123, no. UNKNOWN, pp. 51--63, 2017. , “
Room escape at class: Escape games activities to facilitate the motivation and learning in computer science,” JOTSE, vol. 7, no. 2, pp. 162--171, 2017. , “
PRIVO: A privacy-preserving opportunistic routing protocol for delay tolerant networks,” In 2017 IFIP Networking Conference (IFIP Networking) and Workshops, pp. 1--9, 2017. , “
Two birds, one stone: Using mobility behavioral profiles both as destinations and as a routing tool,” Journal of Network and Computer Applications, vol. 99, no. UNKNOWN, pp. 58--72, 2017. , “
On the Applicability of Onion Routing on Predictable
Delay-Tolerant Networks,” In 2017 IEEE 42nd Conference on Local Computer Networks (LCN), pp. 575-578, 2017. ISSN: 0742-1303.DOI: 10.1109/LCN.2017.17. , “
Fuzzy meets privacy,” In The 14th International Conference on Modeling Decisions for
Artificial Intelligence. USB Proceedings., pp. 108-117, 2017. ISBN: 978-84-697-6794-8. , “
Smart Contracts Based on Blockchain for Logistics Management,” In Proceedings of the 1st International Conference on Internet of Things and Machine Learning, pp. 73:1--73:8, 2017. ISBN: 978-1-4503-5243-7.DOI: 10.1145/3109761.3158384. , “
Binary Images of Z2Z4-Additive Cyclic Codes,” CoRR, vol. abs/1707.03214, no. UNKNOWN, pp. UNKNOWN, 2017. , “
{\(\mathbb{Z}\)}\({}_{\mbox{2}}\){\(\mathbb{Z}\)}\({}_{\mbox{4}}\)-Additive
Cyclic Codes: Kernel and Rank,” CoRR, vol. abs/1711.03784, no. UNKNOWN, pp. UNKNOWN, 2017. , “Llenguatge eficaç, comunicació cordial,” In UNKNOWN (editor), UNKNOWN, 2017. ISBN: 9788491166382, 9788491166405, 9788491166399. , “2016
Articles de Journal: 21, Conferències: 18, Llibres editats: 1, Capítols de llibres: 0.
Unbiasedness of Regression Wavelet Analysis for Progressive Lossy-to-Lossless Coding,” In IEEE Picture Coding Symposium (PCS), Dec. 2016.DOI: 10.1109/PCS.2016.7906316. CORE C. , “
Lossless compression of uncalibrated hyperspectral images through Regression Wavelet Analysis,” In 5th International Workshop on On-Board Payload Data Compression (OBPDC), Sep. 2016. , “
Progressive-Lossy-to-Lossless Coding of hyperspectral images,” In 5th International Workshop on On-Board Payload Data Compression (OBPDC), pp. 1-21, Sep. 2016. , “
A Rate Allocation Method Based on the NLR Complexity for Transforms with Unequal Scaling Factors,” In 5th International Workshop on On-Board Payload Data Compression (OBPDC), Sep. 2016. , “
Piecewise Mapping in HEVC Lossless Intra-prediction Coding,” IEEE Trans. Image Processing, vol. 25, no. 9, pp. 4004-4017, 2016.DOI: 10.1109/TIP.2016.2571065. IF: 3.199, Q1. , “
Progressive Lossy-to-Lossless Compression of DNA Microarray Images,” IEEE Signal Processing Letters, vol. 23, no. 5, pp. 698-702, 2016.DOI: 10.1109/LSP.2016.2547893. IF: 2.528, Q2. , “
Two-stage compression of hyperspectral images with enhanced classification performance,” In Remotely Sensed Data Compression, Apr. 2016.DOI: 10.1117/12.2225568. , “Ali Bilgin, Michael W. Marcellin, Joan Serra-Sagristà and James A. Storer (editors), IEEE Data Compression Conference (DCC), Apr. 2016. ISBN: 978-1-5090-1853-6. ISSN: 1068-0314.
Analysis-Driven Lossy Compression of DNA Microarray Images,” IEEE Trans. Medical Imaging, vol. 35, no. 2, pp. 654-664, 2016.DOI: 10.1109/TMI.2015.2489262. IF: 3.942, Q1. , “
Bitplane image coding with parallel coefficient processing,” IEEE Trans. Image Processing, vol. 25, no. 1, pp. 209-219, 2016.DOI: 10.1109/TIP.2015.2484069. IF: 3.199, Q1. , “
Regression Wavelet Analysis for Progressive-Lossy-to-Lossless Coding of Remote-Sensing Data,” In IEEE Data Compression Conference (DCC), Apr. 2016.DOI: 10.1109/DCC.2016.43. CORE A*. , “
Transform Optimization for the Lossy Coding of Pathology Whole-Slide Images,” In IEEE Data Compression Conference (DCC), Apr. 2016.DOI: 10.1109/DCC.2016.33. CORE A*. , “
Coding Scheme for the Transmission of Satellite Imagery,” In IEEE Data Compression Conference (DCC), Apr. 2016.DOI: 10.1109/DCC.2016.29. CORE A*. , “
Measuring QoS in an Aeronautical Opportunistic Network Architecture with Limited Access to a Satellite Communications Backhaul,” Mobile Information Systems, vol. 2016, no. UNKNOWN, pp. UNKNOWN, 2016.DOI: 10.1155/2016/7601316. , “
PrivHab+: A secure geographic routing protocol for DTN,” Computer Communications, vol. 78, no. UNKNOWN, pp. 56--73, 2016. , “
Identity-based access control for pro-active message's DTN,” Security and Communication Networks, vol. 9, no. 14, pp. 2323--2337, 2016. , “
Room escape en las aulas: actividades de juegos de escape para facilitar la motivación y el aprendizaje de las ciencias de la computación,” Revista del Congr{\'e}s Internacional de Doc{\`e}ncia Universit{\`a}ria i Innovaci{\'o}, vol. 3, no. UNKNOWN, pp. 1--7, 2016. , “
Reputation and Reward: Two Sides of the Same Bitcoin,” Sensors, vol. 16, no. 6, pp. 776, 2016.DOI: 10.3390/s16060776. , “
An Integrated Reward and Reputation Mechanism for MCS Preserving Users' Privacy,” In Data Privacy Management, and Security Assurance, pp. 83--99, 2016. ISBN: 978-3-319-29883-2. , “
{\textdollar}\{{\textbackslash}mathbb \{Z\}\}{\_}\{2\}\{{\textbackslash}mathbb
\{Z\}\}{\_}\{4\}{\textdollar} -Additive Cyclic Codes, Generator Polynomials,
and Dual Codes,” {IEEE} Trans. Information Theory, vol. 62, no. 11, pp. 6348--6354, 2016.DOI: 10.1109/TIT.2016.2611528. , “
Computing the generator polynomials of Z\({}_{\mbox{2}}\)Z\({}_{\mbox{4}}\)-additive
cyclic codes,” CoRR, vol. abs/1606.01745, no. UNKNOWN, pp. UNKNOWN, 2016. , “
Ranks and Kernels of Codes From Generalized Hadamard Matrices,” {IEEE} Trans. Information Theory, vol. 62, no. 2, pp. 687--694, 2016.DOI: 10.1109/TIT.2015.2509061. , “
Baixant de la tarima: una experiència a l'aula on l'alumne pren la paraula,” Impactes de la innovació en la docència i l'aprenentage. CIDUI: congrés internacional de docència universitària i innovació, vol. UNKNOWN, no. UNKNOWN, pp. 8, 2016. , “
Learning engineering without avoiding the ``what for question'',” In 1st HEIRRI Conference. Teaching responsible reserach and innovaton at University. Book of abstracts, pp. 52, 2016. , “2015
Articles de Journal: 32, Conferències: 4, Llibres editats: 2, Capítols de llibres: 0.
Strategies of SIMD computing for image coding in GPU,” In IEEE International Conference on High Performance Computing, pp. 345-354, Dec. 2015. , “
Context-adaptive binary arithmetic coding with fixed-length codewords,” IEEE Trans. Multimedia, vol. 17, no. 8, pp. 1385-1390, 2015.DOI: 10.1109/TMM.2015.2444797. IF: 2.536, Q1. , “Ali Bilgin, Michael W. Marcellin, Joan Serra-Sagristà and James A. Storer (editors), IEEE Data Compression Conference (DCC), Apr. 2015. ISBN: 978-1-4799-8430-5. ISSN: 1068-0314.
Proposal for Infrared Atmospheric Sounding Interferometer on-board data compression,” SPIE Journal on Applied Remote Sensing, vol. 9, no. 1, pp. 1-28, 2015.DOI: 10.1117/1.JRS.9.097498. IF: 0.937, Q4. , “
On the Hardware Complexity of the Arithmetic Elements of the Pairwise Orthogonal Transform,” SPIE Journal on Applied Remote Sensing, vol. 9, no. 1, pp. 1-12, 2015.DOI: 10.1117/1.JRS.9.097496. IF: 0.937, Q4. , “
Effects of compression on classification performance and discriminant information preservation in remotely sensed data,” SPIE Satellite Data Compression Communications, and Processing XI, vol. 951, 2015.DOI: 10.1117/12.2180223. , “
Strategy of Microscopic Parallelism for Bitplane Image Coding,” In IEEE Data Compression Conference (DCC), pp. 163-172, Apr. 2015.DOI: 10.1109/DCC.2015.19. CORE A*. , “
Entropy-based evaluation of context models for wavelet-transformed images,” IEEE Trans. Image Processing, vol. 24, no. 1, pp. 57-67, 2015.DOI: 10.1109/TIP.2014.2370937. IF: 3.199, Q1. , “
Endeavouring to be in the good books. Awarding DTN network use for acknowledging the reception of bundles,” Computer Networks, vol. 83, no. UNKNOWN, pp. 149--166, 2015. , “
Privhab: a multiagent secure georouting protocol for podcast distribution on disconnected areas,” In Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, pp. 1697--1698, 2015. , “
Podcast distribution on gwanda using privhab: A multiagent secure georouting protocol,” Trends in Practical Applications of Agents, Multi-Agent Systems and Sustainability, vol. UNKNOWN, no. UNKNOWN, pp. 29--37, 2015. , “
A mobile code bundle extension for application-defined routing in delay and disruption tolerant networking,” Computer Networks, vol. 87, no. UNKNOWN, pp. 59--77, 2015. , “
Remarks on {P}einado et al.'s Analysis of {J}3{G}en,” Sensors, vol. 15, no. 3, pp. 6217-6220, 2015.DOI: 10.3390/s150306217. , “
There is exactly one Z2Z4-cyclic 1-perfect code,” CoRR, vol. abs/1510.06166, no. UNKNOWN, pp. UNKNOWN, 2015. , “
Families of nested completely regular codes and distance-regular graphs,” Adv. in Math. of Comm., vol. 9, no. 2, pp. 233--246, 2015. , “
Construction of Hadamard {\(\mathbb{Z}\)}\({}_{\mbox{2}}\) {\(\mathbb{Z}\)}\({}_{\mbox{4}}\)
Q\({}_{\mbox{8}}\)-Codes for Each Allowable Value of the Rank and
Dimension of the Kernel,” {IEEE} Trans. Information Theory, vol. 61, no. 4, pp. 1948--1958, 2015.DOI: 10.1109/TIT.2015.2398869. , “
Ranks and Kernels of Codes from Generalized Hadamard Matrices,” CoRR, vol. abs/1506.08961, no. UNKNOWN, pp. UNKNOWN, 2015. , “
Classification of the Z\({}_{\mbox{2}}\)Z\({}_{\mbox{4}}\)-Linear
Hadamard Codes and Their Automorphism Groups,” {IEEE} Trans. Information Theory, vol. 61, no. 2, pp. 887--894, 2015.DOI: 10.1109/TIT.2014.2379644. , “
Partial permutation decoding for binary linear and Z4-linear Hadamard
codes,” CoRR, vol. abs/1512.01839, no. UNKNOWN, pp. UNKNOWN, 2015. , “
Teaching engineering ethics in the classroom: Issues and challenges,” Contemporary ethical issues in engineering, vol. UNKNOWN, no. UNKNOWN, pp. 144--158, 2015. , “
New ethical challenges for today engineering and technology,” Telematics and Informatics, vol. 32, no. 2, pp. 409--415, 2015. , “2014
Articles de Journal: 17, Conferències: 21, Llibres editats: 1, Capítols de llibres: 1.
Proposal for IASI onboard data compression,” In 4th International Workshop on On-Board Payload Data Compression (OBPDC), Oct. 2014. ISBN: 978-90-815839-7-8. , “
Impact of near-lossless compression of IASI L1C data on statistical retrieval of atmospheric profiles,” In 4th International Workshop on On-Board Payload Data Compression (OBPDC), Oct. 2014. ISBN: 978-90-815839-7-8. , “
On the Hardware Complexity of the Arithmetic Elements of the Pairwise Orthogonal Transform,” In 4th International Workshop on On-Board Payload Data Compression (OBPDC), Oct. 2014. ISBN: 978-90-815839-7-8. , “
Stationary probability model for microscopic parallelism in JPEG2000,” IEEE Trans. Multimedia, vol. 16, no. 4, pp. 960-970, 2014.DOI: 10.1109/TMM.2014.2307553. IF: 2.303, Q1. , “Ali Bilgin, Michael W. Marcellin, Joan Serra-Sagristà and James A. Storer (editors), IEEE Data Compression Conference (DCC), Mar. 2014. ISBN: 978-1-4799-3882-7. ISSN: 1068-0314.
Cell-based 2-step scalar deadzone quantization for JPEG2000,” In IEEE Data Compression Conference (DCC), pp. 143-152, Mar. 2014.DOI: 10.1109/DCC.2014.51. CORE A*. , “
Improvements to HEVC intra coding for lossless medical image compression,” In IEEE Data Compression Conference (DCC), pp. 423-423, Mar. 2014.DOI: 10.1109/DCC.2014.76. CORE A*. , “
Compression limits of wavelet-based image coding,” In IEEE Data Compression Conference (DCC), pp. 397-397, Mar. 2014.DOI: 10.1109/DCC.2014.44. CORE A*. , “Compression of DNA Microarray Images,” In Luis Rueda (editor), Microarray Image and Data Analysis: Theory and Practice, 2014. ISBN: 9781466586826. , “
Visually lossless strategies to decode and transmit JPEG2000 imagery,” IEEE Signal Processing Letters, vol. 21, no. 1, pp. 35-38, 2014.DOI: 10.1109/LSP.2013.2290317. IF: 1.751, Q2. , “
Analyzing information propagation in a transoceanic aircraft delay tolerant network,” In 39th Annual IEEE Conference on Local Computer Networks, pp. 116--123, 2014.DOI: 10.1109/LCN.2014.6925763. , “
Striving for sensing: Taming your mobile code to share a robot sensor network,” Information Sciences, vol. 277, no. UNKNOWN, pp. 338--357, 2014. , “
Information System for Supporting Location-based Routing Protocols,” In RECSI XIII: Actas de la XIII Reuni{\'o}n Espa{\~n}ola sobre Criptolog{\'i}a y Seguridad de la Informaci{\'o}n. Alicante, 2-5 de septiembre de 2014, pp. 203--208, 2014. , “
Data privacy,” Wiley Interdisciplinary Reviews: Data Mining and Knowledge
Discovery, vol. 4, no. 4, pp. 269--280, 2014.DOI: 10.1002/widm.1129. , “
QR Steganography - A Threat to New Generation Electronic
Voting Systems,” In {SECRYPT} 2014 - Proceedings of the 11th International
Conference on Security and Cryptography, Vienna, Austria,
28-30 August, 2014, pp. 484--491, 2014. ISBN: 978-989-758-045-1.DOI: 10.5220/0005120404840491. , “
Aprendizaje supervisado para el enlace de registros a traves de la media ponderada,” In Actas de la XIII Reuni{\'o}n Española sobre Criptolog{\'i}a y
Seguridad de la Informaci{\'o}n, pp. 281--284, 2014. ISBN: 978-84-9717-323-0. , “
Bitcoin y el problema de los generales bizantinos,” In Actas de la XIII Reuni{\'o}n Española de Criptolog{\'i}a y Seguridad de la Informaci{\'o}n (RECSI 2014), pp. 241--246, 2014. ISBN: 978-84-9717-323-0. , “
On the similarity of commercial EPC Gen2 pseudorandom number generators,” Transactions on Emerging Telecommunications Technologies, vol. 25, no. 2, pp. 151--154, 2014.DOI: 10.1002/ett.2600. , “
Z2Z4-additive cyclic codes, generator polynomials and dual codes,” CoRR, vol. abs/1406.4425, no. UNKNOWN, pp. UNKNOWN, 2014. , “
Z2-double cyclic codes,” CoRR, vol. abs/1410.5604, no. UNKNOWN, pp. UNKNOWN, 2014. , “
Classification of the Z2Z4-Linear Hadamard Codes and Their Automorphism
Groups,” CoRR, vol. abs/1408.1147, no. UNKNOWN, pp. UNKNOWN, 2014. , “2013
Articles de Journal: 22, Conferències: 15, Llibres editats: 1, Capítols de llibres: 0.
Performance impact of parameter tuning on the CCSDS-123 lossless multi- and hyperspectral image compression standard,” J. Appl. Remote Sens., vol. 7, no. 1, pp. 1-16, Aug. 2013.DOI: 10.1117/1.JRS.7.074594. , “
2-step scalar deadzone quantization for bitplane image coding,” IEEE Trans. Image Processing, vol. 22, no. 12, pp. 4678-4688, 2013.DOI: 10.1109/TIP.2013.2277801. IF: 3.199, Q1. , “Ali Bilgin, Michael W. Marcellin, Joan Serra-Sagristà and James A. Storer (editors), IEEE Data Compression Conference (DCC), Mar. 2013. ISBN: 978-0-7695-4965-1. ISSN: 1068-0314.
A distortion metric for DNA microarray images,” In IEEE Data Compression Conference (DCC), Mar. 2013.DOI: 10.1109/DCC.2013.26. CORE A*. , “
Low complexity embedded quantization scheme compatible with bitplane image coding,” In IEEE Data Compression Conference (DCC), pp. 271-280, Mar. 2013.DOI: 10.1109/DCC.2013.35. CORE A*. , “
Computed Tomography Image Coding through Air Filtering in the Wavelet Domain,” In IEEE Data Compression Conference (DCC), Mar. 2013.DOI: 10.1109/DCC.2013.92. CORE A*. , “
Diagnostically Lossless Compression of X-ray Angiographic Images through Background Suppression,” In IEEE Data Compression Conference (DCC), Mar. 2013.DOI: 10.1109/DCC.2013.108. CORE A*. , “
Visually Lossless JPEG 2000 Decoder,” In IEEE Data Compression Conference (DCC), pp. 161-170, Mar. 2013.DOI: 10.1109/DCC.2013.25. CORE A*. , “
JPIP Proxy Server with Prefetching Strategies Based on User-Navigation Model and Semantic Map,” IEEE Trans. Multimedia, vol. 15, no. 7, pp. 1491-1502, 2013.DOI: 10.1109/TMM.2013.2264655. IF: 1.776, Q1. , “
General embedded quantization for wavelet-based lossy image coding,” IEEE Trans. Signal Process, vol. 61, no. 6, pp. 1561–1574, 2013.DOI: 10.1109/TSP.2012.2236323. IF: 2.813, Q1. , “
FAST rate allocation for JPEG2000 video transmission over time-varying channels,” IEEE Trans. Multimedia, vol. 15, no. 1, pp. 15-26, 2013.DOI: 10.1109/TMM.2012.2199973. IF: 1.776, Q1. , “
Characterization of a transoceanic aircraft delay tolerant network,” In 38th Annual IEEE Conference on Local Computer Networks, pp. 565--572, 2013.DOI: 10.1109/LCN.2013.6761292. , “
A store-carry-process-and-forward paradigm for intelligent sensor grids,” Information Sciences, vol. 222, no. UNKNOWN, pp. 113--125, 2013. , “
A Bloom Filter Based Model for Decentralized Authorization,” International Journal of Intelligent Systems, vol. 28, no. 6, pp. 565-582, 2013.DOI: 10.1002/int.21593. , “
Towards a private vector space model for confidential
documents,” In Proceedings of the 28th Annual {ACM} Symposium on Applied
Computing, pp. 944–945, 2013. ISBN: 978-1-4503-1656-9.DOI: 10.1145/2480362.2480543. , “
J3{G}en: A {P}{R}{N}{G} for Low-Cost Passive {R}{F}{I}{D},” Sensors, vol. 13, no. 3, pp. 3816--3830, 2013.DOI: 10.3390/s130303816. , “
An Algorithm for K-degree Anonymity on Large Networks,” In Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 671--675, 2013. ISBN: 978-1-4503-2240-9.DOI: 10.1145/2492517.2492643. , “
When users become sensors: can we trust their readings?,” International Journal of Communication Systems, vol. 28, no. 4, pp. 601-614, 2013.DOI: 10.1002/dac.2689. , “
{O}{S}{N} Crawling Schedulers and Their Implications on k-Plexes Detection,” International Journal of Intelligent Systems, vol. 28, no. 6, pp. 583--605, 2013.DOI: 10.1002/int.21594. , “
Permutation decoding of Z2Z4-linear codes,” CoRR, vol. abs/1303.3737, no. UNKNOWN, pp. UNKNOWN, 2013. , “
On the Number of Nonequivalent Propelinear Extended Perfect Codes,” Electr. J. Comb., vol. 20, no. 2, pp. P37, 2013. , “
Families of Hadamard BBZ\({}_{\mbox{2}}\)BBZ\({}_{\mbox{4}}\)Q\({}_{\mbox{8}}\)-Codes,” {IEEE} Trans. Information Theory, vol. 59, no. 8, pp. 5140--5151, 2013.DOI: 10.1109/TIT.2013.2258373. , “
On a family of binary completely transitive codes with growing covering
radius,” CoRR, vol. abs/1303.2547, no. UNKNOWN, pp. UNKNOWN, 2013. , “
A Realistic Distributed Storage System That Minimizes Data Storage
and Repair Bandwidth,” In 2013 Data Compression Conference, {DCC} 2013, Snowbird, UT, USA, March
20-22, 2013, pp. 491, 2013.DOI: 10.1109/DCC.2013.72. , “
A realistic distributed storage system that minimizes data storage
and repair bandwidth,” CoRR, vol. abs/1301.1549, no. UNKNOWN, pp. UNKNOWN, 2013. , “
A realistic distributed storage system: the rack model,” CoRR, vol. abs/1302.5657, no. UNKNOWN, pp. UNKNOWN, 2013. , “
Non-homogeneous Two-Rack Model for Distributed Storage Systems,” CoRR, vol. abs/1307.8201, no. UNKNOWN, pp. UNKNOWN, 2013. , “
Engineering ethics beyond engineers’ ethics,” Science and engineering ethics, vol. 19, no. 1, pp. 179--187, 2013. , “
Knowledge based concept analysis method using concept maps and UML: security notion case,” International Scholarly and Scientific Research \& Innovation, vol. 7, no. 2, pp. 216--223, 2013. , “2012
Articles de Journal: 18, Conferències: 17, Llibres editats: 0, Capítols de llibres: 0.
Multicomponent compression of DNA microarray images,” In Proceedings of the CEDI Workshop on Multimedia Data Coding and Transmission (WMDCT), Sep. 2012. , “
Low-complexity lossy image coding through a near-optimal general embedded quantizer,” In IET Image Processing Conference, pp. 1-6, Jul. 2012. , “
Standard and specific compression techniques for DNA microarray images,” MDPI Algorithms, vol. 5, no. 1, 2012.DOI: 10.3390/a5010030. , “
Divide-and-conquer strategies for hyperspectral image processing,” IEEE Signal Processing Magazine, vol. 29, no. 3, pp. 71-81, 2012.DOI: 10.1109/MSP.2011.2179416. IF: 3.368, Q1. , “
Scanning order strategies for bitplane image coding,” IEEE Trans. Image Processing, vol. 21, no. 4, pp. 1920-1933, 2012.DOI: 10.1109/TIP.2011.2176953. IF: 3.199, Q1. , “
MicroCT Image Coding Based on Air Filtering,” In IEEE Data Compression Conference (DCC), Apr. 2012.DOI: 10.1109/DCC.2012.47. CORE A*. , “
DNA microarray image coding,” In IEEE Data Compression Conference (DCC), Apr. 2012.DOI: 10.1109/DCC.2012.11. CORE A*. , “
Enhanced transmission of JPEG2000 imagery through JPIP proxy and user-navigation model,” In IEEE Data Compression Conference (DCC), pp. 22-31, Apr. 2012.DOI: 10.1109/DCC.2012.10. CORE A*. , “
Embedded quantizer design for low rate lossy image coding,” In IEEE Data Compression Conference (DCC), pp. 89-98, Apr. 2012.DOI: 10.1109/DCC.2012.17. CORE A*. , “
Performance Impact of Parameter Tuning on the CCSDS-123 Lossless Multi- and Hyperspectral Image Compression Standard,” In 3rd International Workshop on On-Board Payload Data Compression (OBPDC), Oct. 2012. , “
Joint Source/Channel Coding in 3D-JPEG2000 for Wireless 3D Region of Interest Transmission in 3D Medical Imaging Data,” In 8th IEEE International Conference on Wireless and Mobile Computing, Oct. 2012. CORE B. , “
Influence of Lossy Compressed DEM on Radiometric Correction for Land Cover Classification of Remote Sensing Images,” In American Geophysical Union's 45th Fall Meeting, Dec. 2012. , “
Esquema de gestion de claves criptográficas tolerante a retrasos e interrupciones en entornos aeronáuticos,” In Actas de la XII Reuni{\'o}n Española de Criptolog{\'i}a y Seguridad de la Informaci{\'o}n (RECSI 2012), 2012. ISBN: 978-84-615-9933-2. , “
Control de acceso para mensajes pro-activos en redes dtn,” Proceedings of XII Reuni{\'o}n Española sobre Criptolog{\i}a y Seguridad de la Informaci{\'o}n, vol. UNKNOWN, no. UNKNOWN, pp. UNKNOWN, 2012. , “
Fully Distributed Cooperative Spectrum Sensing for Cognitive
Radio Networks,” In Actas XII Reuni{\'o}n Española sobre Criptolog{\'i}a y Seguridad de la
Informaci{\'o}n, pp. 327--332, Jul. 2012. ISBN: 978-84-615-9933-2. , “
Gestión eficiente de permisos en redes de sensores
inalámbricos,” In Actas XII Reuni{\'o}n Española sobre Criptolog{\'i}a y Seguridad de la
Informaci{\'o}n, pp. 321--326, Jul. 2012. ISBN: 978-84-615-9933-2. , “
Security and Privacy Challenges in Smart Sensor Networks,” In Actas de la XII Reuni{\'o}n Española de Criptolog{\'i}a y Seguridad de la Informaci{\'o}n (RECSI 2012), pp. 423--428, 2012. ISBN: 978-84-615-9933-2. , “
Algoritmos genéticos para la anonimización de grafos,” In Actas de la XII Reuni{\'o}n Española de Criptolog{\'i}a y Seguridad de la Informaci{\'o}n (RECSI 2012), pp. 243--248, 2012. ISBN: 978-84-615-9933-2. , “
Towards secure mobile {P2P} applications using {JXME},” Journal of Internet Services and Information Security (JISIS), vol. 2, no. 1/2, pp. 1--21, 2012. , “
Characterization and constructions of self-dual codes over {\(\mathbb{Z}\)}\({}_{\mbox{2}}\)
{\texttimes} {\(\mathbb{Z}\)}\({}_{\mbox{4}}\),” Adv. in Math. of Comm., vol. 6, no. 3, pp. 287--303, 2012.DOI: 10.3934/amc.2012.6.287. , “
Structural properties of binary propelinear codes,” Adv. in Math. of Comm., vol. 6, no. 3, pp. 329--346, 2012.DOI: 10.3934/amc.2012.6.329. , “
Families of Hadamard Z2Z4Q8-codes,” CoRR, vol. abs/1211.5251, no. UNKNOWN, pp. UNKNOWN, 2012. , “
On two families of binary quadratic bent functions,” CoRR, vol. abs/1211.5257, no. UNKNOWN, pp. UNKNOWN, 2012. , “
Self-embeddings of Hamming Steiner triple systems of small order and
{APN} permutations,” CoRR, vol. abs/1212.5789, no. UNKNOWN, pp. UNKNOWN, 2012. , “
Quasi-cyclic Regenerating Codes,” CoRR, vol. abs/1209.3977, no. UNKNOWN, pp. UNKNOWN, 2012. , “2011
Articles de Journal: 20, Conferències: 16, Llibres editats: 0, Capítols de llibres: 2.
Impact of user concurrency in commonly used OGC map server implementations,” In IARIA International Conference on Advanced Communications and Computation, pp. 179-186, Oct. 2011. , “
A review of DNA microarray image compression,” In Proceedings of the IEEE 1st International Conference on Data Compression, Jun. 2011.DOI: 10.1109/CCP.2011.21. , “
Review and implementation of the future CCSDS Recommendation for multi- and hyperspectral lossless image coding,” In Proceedings of the IEEE 1st International Conference on Data Compression, Jun. 2011.DOI: 10.1109/CCP.2011.17. , “
Low complexity, high efficiency probability model for hyper-spectral image coding,” In Proceedings of the IEEE 1st International Conference on Data Compression, pp. 229-235, Jun. 2011.DOI: 10.1109/CCP.2011.10. , “
Influence of Noise Filtering in Coding Computed Tomography with JPEG2000,” In IEEE Data Compression Conference (DCC), pp. 413-422, Mar. 2011.DOI: 10.1109/DCC.2011.48. CORE A*. , “
Pre-encoded JPEG2000 video transmission in a video-on-demand scenario,” In IEEE Data Compression Conference (DCC), pp. 460-460, Mar. 2011.DOI: 10.1109/DCC.2011.64. CORE A*. , “
Rate-distortion optimized adaptive scanning order for bitplane image coding engines,” In IEEE Data Compression Conference (DCC), pp. 163-172, Mar. 2011.DOI: 10.1109/DCC.2011.23. CORE A*. , “Divide-and-Conquer Decorrelation for Hyperspectral Data Compression,” In Huang, Bormin (editor), Recent Advances in Satellite Data Compression, 2011. ISBN: 978-1-4614-1183-3. , “
FAST Rate Allocation through Steepest Descent for JPEG2000 Video Transmission,” IEEE Trans. Image Processing, vol. 20, no. 4, pp. 1166-1173, 2011.DOI: 10.1109/TIP.2010.2077304. IF: 3.042, Q1. , “
Electronic triage tag and opportunistic networks in disasters,” In Proceedings of the Special Workshop on Internet and Disasters, pp. 1--10, 2011. ISBN: 9781450310444.DOI: 10.1145/2079360.2079366. , “Heterogeneous multiagent architecture for dynamic triage of victims in emergency scenarios,” In UNKNOWN (editor), Advances on Practical Applications of Agents and Multiagent Systems, 2011. ISBN: 978-3-642-19875-5. , “
Semantic Microaggregation for the Anonymization of
Query Logs using the Open Directory Project,” SORT - Statistics and Operations Research
Transactions, vol. UNKNOWN, no. UNKNOWN, pp. 41--58, 2011. , “
Supervised Learning Using Mahalanobis Distance for Record
Linkage,” In Proceedings of 6th International Summer School on Aggregation
Operators (AGOP 2011), pp. 223--228, Jul. 2011. ISBN: 978-1-4477-7019-0. , “
Fuzzy methods for database protection,” In 7th conference of the European Society for Fuzzy Logic and
Technology (EUSFLAT-2011), pp. 439--443, 2011. ISBN: 978-90-78677-00-0.DOI: 10.2991/eusflat.2011.143. , “
Supervised learning approach for distance based record
linkage as disclosure risk evaluation,” In Joint UNECE/Eurostat Work Session on Statistical Data
Confidentiality, Oct. 2011. , “
Practical Eavesdropping of Control Data From {EPC} {G}en2 Queries With a Programmable {RFID} Toolkit,” Hakin9, vol. 6, no. 9, pp. 14--19, 2011. , “
Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices,” Future Internet, vol. 3, no. 1, pp. 31--48, 2011.DOI: 10.3390/fi3010031. , “
A Practical Implementation Attack on Weak Pseudorandom Number Generator Designs for {EPC} {G}en2 Tags,” Wireless Personal Communications, vol. 59, no. UNKNOWN, pp. 27-42, 2011. , “
A Fair and Secure Cluster Formation Process for Ad Hoc Networks,” Wireless Personal Communications, vol. 56, no. UNKNOWN, pp. 625-636, 2011. , “
{\(\mathbb{Z}\)}\({}_{\mbox{2}}\){\(\mathbb{Z}\)}\({}_{\mbox{4}}\)-additive
perfect codes in Steganography,” Adv. in Math. of Comm., vol. 5, no. 3, pp. 425--433, 2011.DOI: 10.3934/amc.2011.5.425. , “
On Lifting Perfect Codes,” {IEEE} Trans. Information Theory, vol. 57, no. 9, pp. 5918--5925, 2011.DOI: 10.1109/TIT.2010.2103410. , “
Spectrum Sharing Models in Cognitive Radio Networks,” In 2011 International Conference on Cyber-Enabled Distributed Computing
and Knowledge Discovery, CyberC 2011, Beijing, China, October 10-12,
2011, pp. 503--510, 2011.DOI: 10.1109/CyberC.2011.86. , “
Classification of Some Families of Quaternary Reed-Muller Codes,” {IEEE} Trans. Information Theory, vol. 57, no. 9, pp. 6043--6051, 2011.DOI: 10.1109/TIT.2011.2119465. , “
Quasi-cyclic Minimum Storage Regenerating Codes for Distributed Data
Compression,” In 2011 Data Compression Conference {(DCC} 2011), 29-31 March 2011, Snowbird,
UT, {USA}, pp. 33--42, 2011.DOI: 10.1109/DCC.2011.11. , “
Involutions in Binary Perfect Codes,” {IEEE} Trans. Information Theory, vol. 57, no. 9, pp. 5926--5932, 2011.DOI: 10.1109/TIT.2011.2162185. , “
Codes over {\(\mathbb{Z}\)}\({}_{\mbox{2\({}^{\mbox{k}}\)}}\), Gray
map and self-dual codes,” Adv. in Math. of Comm., vol. 5, no. 4, pp. 571--588, 2011.DOI: 10.3934/amc.2011.5.571. , “
Engineering Ethics for an Integrated Online Teaching: What is Missing?,” The Social Impact of Social Computing, vol. UNKNOWN, no. UNKNOWN, pp. 412, 2011. , “
L'ètica de l'enginyeria en el segle XXI,” UAB divulga, vol. UNKNOWN, no. UNKNOWN, pp. UNKNOWN, 2011. , “2010
Articles de Journal: 23, Conferències: 24, Llibres editats: 1, Capítols de llibres: 1.
Extensions to the CCSDS IDC recommendation for on-board hyperspectral image coding,” In Int. WS on On-Board Payload Data Compression (OBPDC), Oct. 2010. , “
Side information coding for the Pairwise Orthogonal Transform,” In Workshop on Multimedia Data Coding and Transmission CEDI 2010, Sep. 2010. ISBN: 978-84-92812-70-7. , “
Enhanced JPEG2000 Quality Scalability through Block-Wise Layer Truncation,” EURASIP Journal on Advances in Signal Processing, vol. 2010, no. 1, pp. 803542, 2010.DOI: 10.1155/2010/803542. IF: 1.053, Q2. , “
JPEG2000 encoding of images with NODATA regions for Remote Sensing applications,” SPIE Journal on Applied Remote Sensing, vol. 4, no. 1, pp. 041793, 2010. IF: 1.000, Q2. , “
4D remote sensing image coding with JPEG2000,” In SPIE International Conference on Satellite Data Compression, vol. 7810, Aug. 2010.DOI: 10.1117/12.860545. , “
Rate allocation method for the fast transmission of pre-encoded meteorological data over JPIP,” In SPIE International Conference on Satellite Data Compression, vol. 7810, Aug. 2010.DOI: 10.1117/12.860619. , “
Quality analysis in N-dimensional lossy compression of multispectral remote sensing time series images,” In SPIE International Conference on Satellite Data Compression, Aug. 2010.DOI: 10.1117/12.860569. , “Bormin Huang, Antonio J. Plaza and Joan Serra-Sagristà (editors), SPIE Conference on Satellite Data Compression, Communication, and Processing VI, Aug. 2010. ISSN: 0277-786X/09.
Smart JPIP proxy server with prefetching strategies,” In IEEE Data Compression Conference (DCC), Mar. 2010.DOI: 10.1109/DCC.2010.16. CORE A*. , “
Local average-based model of probabilities for JPEG2000 bitplane coder,” In IEEE Data Compression Conference (DCC), Mar. 2010.DOI: 10.1109/DCC.2010.12. CORE A*. , “Mobile agents in healthcare, a distributed intelligence approach,” In UNKNOWN (editor), Computational Intelligence in Healthcare 4, 2010. ISBN: 978-3-642-14463-9. , “
Mobile Agent Virtual Organisation to Improve Relative Information in Grid Services,” In 2010 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, pp. 45--49, 2010. , “
Supervised Learning for Database Integration through
Weighted Means and {OWA} Operators,” Control and Cybernetics, vol. 39, no. 4, pp. 1011--1026, 2010. , “
An efficient and secure agent code distribution service,” Software: Practice and Experience, vol. 40, no. 4, pp. 363--386, 2010.DOI: 10.1002/spe.963. , “
Towards Privacy Preserving Information Retrieval through
Semantic Microaggregation,” In Web Intelligence and Intelligent Agent Technology,
IEEE/WIC/ACM International Conference on, pp. 296--299, 2010. ISBN: 978-0-7695-4191-4.DOI: 10.1109/WI-IAT.2010.132. , “
Last results on constrained microaggregation,” In III Simposio Sobre L{\'o}gica Fuzzy y Soft Computing,
CEDI 2010, 2010. , “
Despliegue de políticas condicionadas para la
protección de atributos en negociadores móviles,” In RECSI 2010. XI Reuni{\'o}n Española sobre Criptolog{\'i}a y
Seguridad de la Informaci{\'o}n, pp. 171--175, 2010. , “
Control de acceso interoperable para la mejora en la
cooperación entre grupos de emergencias,” In RECSI 2010. XI Reuni{\'o}n Española sobre Criptolog{\'i}a y
Seguridad de la Informaci{\'o}n, pp. 241--246, 2010. , “
Análisis técnico-jurídico del proceso de Iniciativa Legislativa Popular con recogida de firmas digitales en España,” Revista de derecho y tecnolog{\'i}a, vol. 11, no. UNKNOWN, pp. 191-216, 2010. , “
Security analysis of {JXME}-Proxyless version,” In Actas de la XI Reuni{\'o}n Española sobre Criptologia y Seguridad de la Informaci{\'o}n (XI - RECSI), pp. 301-306, 2010. ISBN: 978-84-693-3304-4. , “
Clasificación de las amenazas a la seguridad en sistemas {RFID} - {EPC} Gen2,” In Actas de la XI Reuni{\'o}n Española sobre Criptologia y Seguridad de la Informaci{\'o}n (XI - RECSI), pp. 211-216, 2010. ISBN: 978-84-693-3304-4. , “
El proceso de Iniciativa Legislativa Popular por medio de firmas digitales,” In Actas de la XI Reuni{\'o}n Española sobre Criptologia y Seguridad de la Informaci{\'o}n (XI - RECSI), pp. 123-128, 2010. ISBN: 978-84-693-3304-4. , “
{JXTA} security in mobile constrained devices,” In Sixth International Symposium on Frontiers of Information Systems and Network Applications (FINA), pp. 139-144, 2010.DOI: 10.1109/WAINA.2010.178. , “
Analysis and improvement of a pseudorandom number generator for EPC Gen2 tags,” In Proceedings of the 14th international conference on Financial cryptograpy and data security, pp. 34--46, 2010. ISBN: 3-642-14991-X, 978-3-642-14991-7. , “
{XML}-based security for {JXTA} core protocols,” International Journal of Autonomic Computing (IJAC), vol. 1, no. 4, pp. 447--469, Dec. 2010.DOI: 10.1504/IJAC.2010.037517. , “
Additive codes over Z2{\texttimes} {Z4},” In 2010 {IEEE} Information Theory Workshop, {ITW} 2010, Dublin, Ireland,
August 30 - September 3, 2010, pp. 1--3, 2010.DOI: 10.1109/CIG.2010.5592827. , “
On q-ary linear completely regular codes with {\(\rho\)}=2 and antipodal
dual,” Adv. in Math. of Comm., vol. 4, no. 4, pp. 567--578, 2010.DOI: 10.3934/amc.2010.4.567. , “
New completely regular q-ary codes based on Kronecker products,” {IEEE} Trans. Information Theory, vol. 56, no. 1, pp. 266--272, 2010.DOI: 10.1109/TIT.2009.2034812. , “
Perfect Z2Z4-linear codes in Steganography,” CoRR, vol. abs/1002.0026, no. UNKNOWN, pp. UNKNOWN, 2010. , “
On lifting perfect codes,” CoRR, vol. abs/1002.0295, no. UNKNOWN, pp. UNKNOWN, 2010. , “
On linear q-ary completely regular codes with rho=2 and dual antipodal,” CoRR, vol. abs/1002.4510, no. UNKNOWN, pp. UNKNOWN, 2010. , “
Product Perfect Z2Z4-linear codes in Steganography,” CoRR, vol. abs/1003.4852, no. UNKNOWN, pp. UNKNOWN, 2010. , “
A dialogical approach when learning engineering ethics in a virtual education frame,” The ``backwards, forwards and sideway'' changes of ICT, vol. UNKNOWN, no. UNKNOWN, pp. 483, 2010. , “2009
Articles de Journal: 19, Conferències: 21, Llibres editats: 0, Capítols de llibres: 0.
Distortion estimators for bitplane image coding,” IEEE Trans. Image Processing, vol. 18, no. 8, pp. 1772-1781, 2009.DOI: 10.1109/TIP.2009.2022209. IF: 3.042, Q1. , “
JPEG2000 rate-control for improved transmission of windows-of-interest in remote sensing scenarios.,” In Proceedings of SPIE Conference on Satellite Data Compression, vol. 7455, Aug. 2009.DOI: 10.1117/12.826496. , “
Highly accurate distortion estimation for JPEG2000 through pdf-based estimators,” In IEEE Data Compression Conference (DCC), pp. 391-400, Mar. 2009.DOI: 10.1109/DCC.2009.20. CORE A*. , “
Clustered Reversible-KLT for Progressive Lossy-to-Lossless 3d Image Coding,” In IEEE Data Compression Conference (DCC), pp. 233-242, Mar. 2009.DOI: 10.1109/DCC.2009.7. CORE A*. , “
Relative information in grid information service and grid monitoring using mobile agents,” In 7th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2009), pp. 150--158, 2009. , “
Dealing with edit constraints in microdata protection:
microaggregation,” In Joint UNECE/Eurostat Work Session on Statistical Data
Confidentiality, Dec. 2009. , “
A new framework to automate constrained microaggregation,” In Proceeding of the ACM first international workshop on Privacy
and anonymity for very large databases (Conference on
Information and Knowledge Management), pp. 1--8, Nov. 2009. ISBN: 978-1-60558-804-9.DOI: 10.1145/1651449.1651451. , “
Watermarking in the encrypted Domain,” In Actas del V Congreso Iberoamericano de Seguridad Inform{\'a}tica CIBSI-09, pp. 202-212, 2009. ISBN: 978-9974-0-0593-8. , “
Maintaining unlinkability in group based P2P environments,” In 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE) , pp. 140-145, 2009. ISBN: 978-0-7695-3683-5.DOI: 10.1109/WETICE.2009.24. , “
A Security Layer for {JXTA} Core Protocols,” In Second International Workshop on P2P, Parallel, Grid and Internet Computing (3PGIC), pp. 463-468, 2009. ISBN: 978-0-7695-3575-3.DOI: 10.1109/CISIS.2009.24. , “
A Virtual Laboratory Structure for Developing Programming Labs.,” International Journal of Emerging Technologies in Learning (iJET), vol. 4, no. S1, pp. 47-52, 2009. , “
Self-Dual Codes over Z{\_}2xZ{\_}4,” CoRR, vol. abs/0910.3084, no. UNKNOWN, pp. UNKNOWN, 2009. , “
Construction of BBZ\({}_{\mbox{4}}\)-Linear Reed-Muller Codes,” {IEEE} Trans. Information Theory, vol. 55, no. 1, pp. 99--104, 2009.DOI: 10.1109/TIT.2008.2008143. , “
On the Intersection of BBZ\({}_{\mbox{2}}\)BBZ\({}_{\mbox{4}}\)-Additive
Hadamard Codes,” {IEEE} Trans. Information Theory, vol. 55, no. 4, pp. 1766--1774, 2009.DOI: 10.1109/TIT.2009.2013037. , “
On linear completely regular codes with covering radius rho=1. Construction
and classification,” CoRR, vol. abs/0906.0550, no. UNKNOWN, pp. UNKNOWN, 2009. , “
Propelinear structure of Z{\_}\{2k\}-linear codes,” CoRR, vol. abs/0907.5287, no. UNKNOWN, pp. UNKNOWN, 2009. , “
Construction of Additive Reed-Muller Codes,” CoRR, vol. abs/0909.3185, no. UNKNOWN, pp. UNKNOWN, 2009. , “
On the minimum distance graph of an extended Preparata code,” CoRR, vol. abs/0902.1351, no. UNKNOWN, pp. UNKNOWN, 2009. , “
A frame for ethical evaluation of (information) technologies,” In 8th International Conference Computer Ethics: Philosophical Enquiry, pp. 110, 2009. , “2008
Articles de Journal: 13, Conferències: 22, Llibres editats: 0, Capítols de llibres: 1.Remote sensing data compression,” In Manuel Graña and Richard Duro (editors), Computational Intelligence for Remote Sensing, 2008. ISBN: 978-3540793526. , “
Clustered Reversible-KLT for Progressive Lossy-to-Lossless 3d Image Coding,” In SPIE Conference on Satellite Data Compression, Communication, and Processing IV (OP404). Optics and Photonics. Society of Photo-optical Instrumentation Engineers (SPIE), pp. 230, vol. 7084, Aug. 2008. ISSN: 9780819473042. , “
Self-Conducted Allocation Strategy of Quality Layers for JPEG2000,” EURASIP Journal on Advances in Signal Processing, vol. 2008, no. 1, pp. 1-7, 2008.DOI: 10.1155/2008/728794. IF: 1.055, Q2. , “
Image compression effects in visual analysis,” In SPIE Conference on Satellite Data Compression, vol. 7084, Sep. 2008.DOI: 10.1117/12.798572. , “
Interactive transmission of spectrally wavelet-transformed hyperspectral images,” In SPIE Conference on Satellite Data Compression, vol. 7084, Sep. 2008.DOI: 10.1117/12.794749. , “
JPEG2000 block-wise truncation of quality layers,” In IET/IEEE International Conference on Visual Information Engineering. IEEE Press, Jul. 2008. , “
JPEG2000 arbitrary ROI coding through rate-distortion optimization techniques,” In Proc IEEE Data Compression Conference (DCC), Mar. 2008.DOI: 10.1109/DCC.2008.70. , “
Hyperspectral Image Coding Using 3D Transform and the Recommendation CCSDS-122-B-1,” In Proc IEEE Data Compression Conference (DCC), Mar. 2008.DOI: 10.1109/DCC.2008.68. , “
Historial clínico distribuido y seguro para situaciones de emergencias,” In Actas de la X Reuni{\'o}n Espa{\~n}ola de Criptolog{\'i}a y Seguridad de la Informaci{\'o}n, pp. 503--512, 2008. , “
Prevención de ataques de \emph{Cross-Site Scripting}
en aplicaciones Web,” In Actas de la X Reuni{\'o}n Española sobre Criptolog{\'i}a y
Seguridad de la Informaci{\'o}n, pp. 369-377, Sep. 2008. ISSN: 978-84-691-5158-7. , “
Sistema impreciso de control de acceso basado en la
conversión cuantificada de atributos para escenarios
de interoperabilidad,” In Actas de la X Reuni{\'o}n Española sobre Criptolog{\'i}a y
Seguridad de la Informaci{\'o}n, pp. 357-367, Sep. 2008. ISSN: 978-84-691-5158-7. , “
A Virtual Laboratory Structure for Computer Engineering Education,” X The International Symposium on Computers in Education, 2008. Salamanca (Spain), vol. 1, no. UNKNOWN, pp. S11:1-6, 2008. , “
Virtual Laboratory Ontology for Engineering Education,” Frontiers in Education, 2008. FIE 2008. 38th Annual. Saratoga (EEUU), vol. 1, no. UNKNOWN, pp. S2F-1 Vol. 1, 2008.DOI: 10.1109/FIE.2008.4720470. , “
An Integrated Structure for a Virtual Networking Laboratory,” Industrial Electronics, IEEE Transactions on, vol. 55, no. 6, pp. 2334-2342, 2008.DOI: 10.1109/TIE.2008.921231. , “
A Forwarding Cooperation Protocol for Plain and Cluster-based Ad Hoc Networks,” Journal of Communications Software and Systems (JCOMSS), vol. 4, no. 1, pp. 3-12, 2008. , “
Prevención de ataques de desincronización en esquemas de watermarking de audio,” In Actas de la X Reuni{\'o}n Española sobre Criptologia y Seguridad de la Informaci{\'o}n (X - RECSI), pp. 551-556, 2008. ISBN: 978-84-691-5158-7. , “
Gestión de recursos de un navegador web para prevenir ataques contra la privacidad en TOR,” In Actas de la X Reuni{\'o}n Española sobre Criptologia y Seguridad de la Informaci{\'o}n (X - RECSI), pp. 629--638, 2008. ISBN: 978-84-691-5158-7. , “
Analisis de seguridad y Privacidad para sistemas EPC-RFID,” In Actas de la X Reuni{\'o}n Española sobre Criptologia y Seguridad de la Informaci{\'o}n (X - RECSI), pp. 639--646, 2008. ISBN: 978-84-691-5158-7. , “
{JXTA} security in basic peer operations,” In Actas de la IX Reuni{\'o}n Española sobre Criptologia y Seguridad de la Informaci{\'o}n (X - RECSI), pp. 405-414, 2008. ISBN: 978-84-691-5158-7. , “
Persistent interoperable security for {JXTA},” In Proceedings of the Second International Workshop on P2P, Parallel, Grid and Internet Computing (3PGIC) 2008, pp. 354-359, 2008. , “
{ZRM} Codes,” {IEEE} Trans. Information Theory, vol. 54, no. 1, pp. 380--386, 2008.DOI: 10.1109/TIT.2007.911211. , “
On the Intersection of Z\({}_{\mbox{2}}\)Z\({}_{\mbox{4}}\)-Additive
Perfect Codes,” {IEEE} Trans. Information Theory, vol. 54, no. 3, pp. 1346--1356, 2008.DOI: 10.1109/TIT.2007.915917. , “
Construction of Z4-linear Reed-Muller codes,” CoRR, vol. abs/0801.3024, no. UNKNOWN, pp. UNKNOWN, 2008. , “
New completely regular q-ary codes based on Kronecker products,” CoRR, vol. abs/0810.4993, no. UNKNOWN, pp. UNKNOWN, 2008. , “
Z2Z4-linear codes: rank and kernel,” CoRR, vol. abs/0807.4247, no. UNKNOWN, pp. UNKNOWN, 2008. , “
Hindrances to engineering ethics appraisal,” In First International Conference on Ethics and Human Values in Engineering, 2008. , “
Ethics applied to technology: Is all well?,” IEEE Technology and Society Magazine, vol. 27, no. 4, pp. 45--49, 2008. , “2007
Articles de Journal: 7, Conferències: 17, Llibres editats: 0, Capítols de llibres: 0.
JPEG2000: Quality Scalability and Windows of Interest Transmission,” In Asilomar International Conference on Signals, Systems and Computing, Nov. 2007. CORE L. , “
Implications of JPEG2000 lossy compression on multiple regression modeling,” In SPIE Europe Remote Sensing 2007. Society of Photo-optical Instrumentation Engineers (SPIE), pp. 6749-48, vol. 6749, Sep. 2007. , “
Enhanced Quality Scalability for JPEG2000 code-streams by the Characterization of the Rate-Distortion Slope,” In IEEE International Conference on Image Processing (ICIP), pp. 365-368, vol. 2, Sep. 2007. CORE B. , “
Interactive Decoding for the CCSDS Recommendation for Image Data Compression,” In SPIE Europe Remote Sensing 2007. Society of Photo-optical Instrumentation Engineers (SPIE), vol. 6748, Sep. 2007. , “
JPEG2000 Low Complexity Allocation Method of Quality Layers,” Lecture Notes in Computer Science, pp. 478-484, 2007. IF: 0.402. , “
Modifying file syntax for Interactive Decoding the Recommendation CCSDS-122-B-1,” In SPIE Conference on Satellite Data Compression, vol. 6683, Aug. 2007. , “
JPEG2000 Coding Techniques Addressed To Images Containing No-Data Regions,” Lecture Notes in Computer Science, vol. 4678, pp. 1024-1036, 2007. IF: 0.402. , “
Region Of Interest coding applied to Map Overlapping in Geographic Information Systems,” In IEEE International Geoscience and Remote Sensing Symposium, Jul. 2007. CORE C. , “
Low complexity JPEG2000 rate control through reverse subband scanning order and coding passes concatenation,” IEEE Signal Processing Letters, vol. 14, no. 4, pp. 251-254, 2007. IF: 1.115, Q2. , “
Portfolios Virtuales Basados en Wiki para Evaluación
Continua y Evaluación por Compañeros,” In TICAI 2006: TICs para el Aprendizaje de la Ingenier{\'i}a, pp. 45--52, 2007. ISBN: 978-84-8158-375-5. , “
Hacia una Solución Global para Servicios Médicos en
Situaciones de Emergencia,” In Actas del II Simposio sobre Seguridad Inform{\'a}tica del
Congreso Español de Inform{\'a}tica, pp. 217-224, Sep. 2007. ISBN: 978-84-9732-607-0. , “
Coste de los protocolos de seguridad en redes MANET,” In Actas del II Simposio sobre Seguridad Inform{\'a}tica [SSI'2007]. ISBN: 978-84-9732-607-0, pp. 127-134, 2007. , “
Resolución de escenarios en control de acceso a grupo en entornos distribuidos,” In CEDI: Simposio sobre seguridad inform{\'a}tica, pp. 119-126, 2007. , “
Secure Dynamic MANET On-demand (SEDYMO) Routing Protocol,” In Communication Networks and Services Research (CNSR), pp. 372-380, 2007. ISBN: 0-7695-2835-X.DOI: 10.1109/CNSR.2007.57. , “
Plotkin construction: rank and kernel,” CoRR, vol. abs/0707.3878, no. UNKNOWN, pp. UNKNOWN, 2007. , “
Z2Z4-linear codes: generator matrices and duality,” CoRR, vol. abs/0710.1149, no. UNKNOWN, pp. UNKNOWN, 2007. , “
Intersection of Hadamard Codes,” {IEEE} Trans. Information Theory, vol. 53, no. 5, pp. 1924--1928, 2007.DOI: 10.1109/TIT.2007.894687. , “2006
Articles de Journal: 4, Conferències: 12, Llibres editats: 0, Capítols de llibres: 0.
Compression of Hyperspectral Images Using Significant Pixel Information of Wavelet Transforms,” In 26th International Geoscience and Remote Sensing Symposium. IEEE Press, pp. 3549-3552, vol. 7, Aug. 2006. CORE C. , “
Effects of JPEG and JPEG2000 lossy compression on remote sensing image classification for mapping crops and forest areas,” In IEEE International Geoscience and Remote Sensing Symposium, pp. 790-793, vol. 2, Aug. 2006. CORE C. , “
Efficient rate control for JPEG2000 coder and decoder,” In IEEE Data Compression Conference (DCC), pp. 282-291, Mar. 2006. CORE A*. , “
Still image compression through exhaustive two-valued shape-adaptive searches,” In IEEE Data Compression Conference (DCC), pp. 441, Mar. 2006. CORE A*. , “
Noves experiències d'avaluació usant wikis: grups nombrosos i avaluació per companys,” In Actes del 4rt Congrés Internacional de Docència Universitària i Innovació, 2006. , “
Secure Integration of Distributed Medical Data using
Mobile Agents,” IEEE Intelligent Systems, vol. 21, no. 6, pp. 47-54, 2006.DOI: 10.1109/MIS.2006.120. , “
SMARTCOP A Smart Card Based Access Control for the
Protection of Network Security Components,” In On the Move to Meaningful Internet Systems 2006: OTM 2006
Workshops, pp. 415-424, vol. 4277, Oct. 2006. ISBN: 978-3-540-48269-7. ISSN: 0302-9743.DOI: 10.1007/11915034_65. , “
Protection of Components based on a Smart-card Enhanced
Security Module,” In Critical Information Infrastructures Security, pp. 128-139, vol. 4347, Sep. 2006. ISBN: 978-3-540-69083-2. ISSN: 0302-9743.DOI: 10.1007/11962977_11. , “
Enabling Mobile Agents Interoperability Through FIPA
Standards,” In Cooperative Information Agents X, pp. 388-401, vol. 4149, Sep. 2006. ISBN: 978-3-540-38569-1. ISSN: 0302-9743.DOI: 10.1007/11839354_28. , “
Protección de componentes y dispositivos de
seguridad mediante un control de acceso basado en
kernel,” In Actas de la IX Reuni{\'o}n Española de Criptolog{\'i}a y
Seguridad de la Informaci{\'o}n, pp. 773-787, Jul. 2006. ISBN: 84-9788-502-3. , “
On the additive (/spl Zopf//sub 4/-linear and non-/spl Zopf//sub 4/-linear)
Hadamard codes: rank and kernel,” {IEEE} Trans. Information Theory, vol. 52, no. 1, pp. 316--319, 2006.DOI: 10.1109/TIT.2005.860464. , “
Hadamard Codes of Length 2\({}^{\mbox{\emph{t}}}\)\emph{s} (\emph{s}
Odd). Rank and Kernel,” In Applied Algebra, Algebraic Algorithms and Error-Correcting Codes,
16th International Symposium, AAECC-16, Las Vegas, NV, USA, February
20-24, 2006, Proceedings, pp. 328--337, 2006.DOI: 10.1007/11617983\_32. , “
On the intersection of additive perfect codes,” CoRR, vol. abs/cs/0612015, no. UNKNOWN, pp. UNKNOWN, 2006. , “
Introducció de l’Ètica al currículum d’Enginyeria Informàtica,” 4t Congrés Internacional Docència Universitària i Innovació, vol. UNKNOWN, no. UNKNOWN, pp. UNKNOWN, 2006. , “2005
Articles de Journal: 5, Conferències: 16, Llibres editats: 0, Capítols de llibres: 0.
Sign and magnitude refinement encoding for lossy-to-lossless image compression,” In WSEAS International Multiconference, pp. 433-508, vol. 2, Nov. 2005. CORE C. , “
Bisk scheme applied to sign encoding and to magnitude refinement,” Lecture Notes in Computer Science, vol. 3708, pp. 442-451, 2005. IF: 0.402. , “
Novel JPEG2000 implementation applied to GIS scenarios,” In SPIE International Conference on Satellite Data Compression, pp. 159-168, vol. 5915, Aug. 2005. , “
Wavelet-based coding of ultraspectral sounder data,” In SPIE International Conference on Satellite Data Compression, pp. 177-186, vol. 5889, Aug. 2005. , “
Effects of JPEG2000 lossy compression on remote sensing image classification for mapping natural areas,” In WSEAS International Multiconference, Jul. 2005. CORE C. , “
J2K: Introducing a novel JPEG2000 coder,” In SPIE International Conference on Visual Communications and Image Processing, pp. 1763-1773, vol. 5960, Jul. 2005. , “
Wikibased virtual portfolios for continuous evaluation and co-evaluation,” In International Conference on Engineering and Computer Education, vol. 37, 2005. , “
ACAPS: An Access Control Mechanism to Protect the
Components of an Attack Prevention System,” Journal of Computer Science and Network Security, vol. 5, no. 11, pp. 87-94, Nov. 2005. , “
Protecting On-line Casinos against Fraudulent Player
Drop-out,” In International Conference on Information Technology, pp. 500--506, 2005. ISBN: 0-7695-2315-3.DOI: 10.1109/ITCC.2005.232. , “
Digital chips for an on-line casino,” In International Conference on Information Technology, pp. 494--499, Apr. 2005. ISBN: 0-7695-2315-3.DOI: 10.1109/ITCC.2005.130. , “
Protección de Componentes en una Plataforma para la
Prevención de Ataques Coordinados,” In In Proceedings of the first Spanish Conference on
Informatics (CEDI 2005), Information Security
Symposium, pp. 265-272, Sep. 2005. ISBN: 84-9732-447-1. , “
Quaternary Reed-Muller codes,” {IEEE} Trans. Information Theory, vol. 51, no. 7, pp. 2686--2691, 2005.DOI: 10.1109/TIT.2005.850148. , “
Rank and kernel of binary Hadamard codes,” {IEEE} Trans. Information Theory, vol. 51, no. 11, pp. 3931--3937, 2005.DOI: 10.1109/TIT.2005.856940. , “2004
Articles de Journal: 3, Conferències: 13, Llibres editats: 0, Capítols de llibres: 0.
Evaluation of 1d, 2d, and 3d spiht coding technique for remote sensing,” In SPIE International Conference on Image and Signal Processing for Remote Sensing, pp. 273-283, vol. 5573, Nov. 2004. , “
Review of CCSDS-ILDC and JPEG2000 coding techniques for remote sensing,” In SPIE International Conference on Image and Signal Processing for Remote Sensing, pp. 250-261, vol. 5573, Nov. 2004. , “
Review of coding techniques applied to remote sensing,” In IIASS International Conference on Knowledge-Based Intelligent Information and Engineering Systems, pp. 647-653, vol. 3213, Sep. 2004. CORE B. , “
A generalization of image lossy data compression recommendation,” In IEEE International Geoscience and Remote Sensing Symposium, pp. 301-304, vol. 1, Sep. 2004. CORE C. , “
Analysis of CCSDS-IDC for remote sensing data compression,” In WSEAS International Multiconference, pp. 2176-2180, Jul. 2004. CORE C. , “
Network and application security in mobile e-health applications,” In International Conference on Information Networking, pp. 995--1004, 2004. ISBN: 978-3-540-25978-7. , “
Security specification and implementation for mobile e-health services,” In IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE'04. 2004, pp. 241--248, 2004.DOI: 10.1109/EEE.2004.1287316. , “
Preventing coordinated attacks via alert
correlation,” In 9th Nordic Workshop on Secure IT Systems, pp. 110-117, Nov. 2004. ISSN: 1456-7911. , “
Diseño y Desarrollo de un Sistema Colaborativo
para la Prevención de Ataques Coordinados,” In In Avances en Criptolog{\'i}a y Seguridad de la
Informaci{\'o}n, pp. 475-493, Sep. 2004. ISBN: 84-7978-650-7. , “
Sobre la formación no técnica en la Ingeniería Informática,” Actas de las X Jornadas de Ense{\~n}anza Universitaria de Inform{\'a}tica, Jenui, vol. 2004, no. UNKNOWN, pp. 73--78, 2004. , “
KNOWLEDGE FROM EXPERIMENTATION AND KNOWLEDGE FROM EXPERIENCE,” PCST 2004, vol. UNKNOWN, no. UNKNOWN, pp. UNKNOWN, 2004. , “
Which ethics will survive in our technological society?,” IEEE Technology and Society Magazine, vol. 23, no. 1, pp. 36--39, 2004. , “2003
Articles de Journal: 3, Conferències: 8, Llibres editats: 0, Capítols de llibres: 1.
Evaluation of copy right protection schemes for hyperspectral images,” In SPIE International Conference on Image and Signal Processing for Remote Sensing, pp. 512-523, vol. 5238, Sep. 2003. , “
Lossy coding techniques for high resolution images,” In SPIE International Conference on Image and Signal Processing for Remote Sensing, pp. 276-287, vol. 5238, Sep. 2003. , “
A JAVA framework for evaluating still image coders applied to remote sensing,” In IEEE International Geoscience and Remote Sensing Symposium, pp. 3595-3597, vol. 6, Jul. 2003. CORE C. , “
Exploring image coding techniques for remote sensing and geographic information systems,” In SPIE International Conference on Visual Communications and Image Processing, pp. 1470-1480, vol. 5150, Jul. 2003. , “
Hyperspectral image coding for remote sensing applications,” SPIE Electronic Imaging Newsletters, vol. 13, no. 1, pp. 4-8, 2003. , “
DigiRight: Relevance to and Potential Impact on Europe’s Need to Strengthen the Science and Technology Excellence on DRM,” In Proceedings of the First International Mobile IPR Workshop: Rights Management of Information Products on the Mobile Internet, pp. 127-134, 2003. ISBN: 978-951-22-6675-3. , “
Framework for developing mobile agent applications,” In Actas X Conferencia de la Asociaci{\'o}n Española para
la Inteligencia Artificial (CAEPIA 2003), pp. 66-67, Nov. 2003. , “
The rank and kernel of extended 1-perfect Z\({}_{\mbox{4}}\)-linear
and additive non-Z\({}_{\mbox{4}}\)-linear codes,” {IEEE} Trans. Information Theory, vol. 49, no. 8, pp. 2028--2034, 2003.DOI: 10.1109/TIT.2003.814490. , “
On Z\({}_{\mbox{4}}\)-linear Preparata-like and Kerdock-like code,” {IEEE} Trans. Information Theory, vol. 49, no. 11, pp. 2834--2843, 2003.DOI: 10.1109/TIT.2003.819329. , “UNKNOWN,” In UNKNOWN (editor), Grafs: fonaments i algorismes, 2003. ISBN: 978-8449014208. , “2002
Articles de Journal: 6, Conferències: 8, Llibres editats: 0, Capítols de llibres: 0.
Analysis of Lossy Compression Methods Applied to Hyperspectral Images,” In Image and Signal Processing for Remote Sensing VIII. Society of Photo-optical Instrumentation Engineers (SPIE), pp. 389-400, vol. 4885, Sep. 2002. , “
Improving classification accuracy of AVIRIS data by means of classifier combination,” In 9th International Symposium on Remote Sensing. Society of Photo-optical Instrumentation Engineers (SPIE), pp. 367-378, vol. 4885, Sep. 2002. , “
A comparison of lossy compression methods on still and hyperspectral images,” Mathematics of Data/Image Coding, vol. 4793, pp. 107-118, Jul. 2002. , “
A secure multicast pay-per-view application over Internet,” In IEEE International Conference on, Telecommunications (ICT’02), pp. 742-747, vol. 1, 2002. , “
Mobile Agents Supporting Secure GRID Environments,” In Euroweb 2002 Conference, pp. 195-197, Dec. 2002. ISBN: 1-902505-50-6. , “
Plataforma segura para la ejecución de agentes
móviles con itinerario, código y datos protegibles,” In VII Reuni{\'o}n Española sobre Criptolog{\'i}a y
Seguridad de la Informaci{\'o}n, pp. 765-778, Sep. 2002. ISSN: 84-699-8932-4. , “
On binary 1-perfect additive codes: Some structural properties,” {IEEE} Trans. Information Theory, vol. 48, no. 9, pp. 2587--2592, 2002.DOI: 10.1109/TIT.2002.801474. , “
Ranks of q-Ary 1-Perfect Codes,” Des. Codes Cryptogr., vol. 27, no. 1-2, pp. 139--144, 2002. , “
On Perfect Codes: Rank and Kernel,” Des. Codes Cryptogr., vol. 27, no. 3, pp. 183--194, 2002. , “2001
Articles de Journal: 6, Conferències: 0, Llibres editats: 0, Capítols de llibres: 0.
1-Perfect Uniform and Distance Invariant Partitions,” Appl. Algebra Eng. Commun. Comput., vol. 11, no. 4, pp. 297--311, 2001.DOI: 10.1007/PL00004224. , “
Nonexistence of completely transitive codes with error-correcting
capability e{\textgreater}3,” {IEEE} Trans. Information Theory, vol. 47, no. 4, pp. 1619--1621, 2001.DOI: 10.1109/18.923747. , “
{JPEG} standard uniform quantization error modeling with applications
to sequential and progressive operation modes,” J. Electronic Imaging, vol. 10, no. 2, pp. 475--485, 2001.DOI: 10.1117/1.1344592. , “2000
Articles de Journal: 3, Conferències: 4, Llibres editats: 0, Capítols de llibres: 0.
Enumeration of lattice points in L1 norm,” Information Processing Letters, vol. 76, no. 1-2, pp. 39-44, Nov. 2000. IF: 0.331. , “
Adaptive Lossy Compression and Classification of Hyperspectral Images,” In Image and Signal Processing for Remote Sensing VI. Society of Photo-optical Instrumentation Engineers (SPIE), pp. 214-225, vol. 4170, Sep. 2000. , “
Influence of lossy compression on classification of hyperspectral images,” In 1st International Symposium on Hyperspectral Analysis. Universidad de Extremadura, vol. 1, Sep. 2000. , “
Influence of lossy compression on hyperspectral image classification,” In Proceedings of Data Mining 2000. Wessex Institute of Technology Press, vol. 1, Jul. 2000. , “
XML: More Than an E-Publishing Language.,” In ELPUB, pp. 194--207, 2000. ISBN: 978-1-891365-07-2. , “
On the nonexistence of completely transitive codes,” {IEEE} Trans. Information Theory, vol. 46, no. 1, pp. 279--280, 2000.DOI: 10.1109/18.817528. , “1999
Articles de Journal: 4, Conferències: 3, Llibres editats: 0, Capítols de llibres: 0.
On combinatorial equalities of coordination sequences,” In FPSAC 99, pp. 519-529, Jul. 1999. CORE B. , “
Lattice points enumeration for image coding,” In IEEE International Conference on Information, Intelligence and Systems, pp. 482-489, Oct. 1999. , “
Securing the itinerary of mobile agents through a non-repudiation protocol,” In 33rd Annual International Carnahan Conference on Security Technology, pp. 461-464, Oct. 1999. , “
On the Characterization of Linear Uniquely Decodable Codes,” Des. Codes Cryptogr., vol. 17, no. 1-3, pp. 87--96, 1999.DOI: 10.1023/A:1008306605740. , “
A characterization of 1-perfect additive codes,” {IEEE} Trans. Information Theory, vol. 45, no. 5, pp. 1688--1697, 1999.DOI: 10.1109/18.771247. , “
A solution for the coloured cubes problem,” Theoretical computer science, vol. 225, no. 1-2, pp. 171--176, 1999. , “1998
Articles de Journal: 1, Conferències: 3, Llibres editats: 0, Capítols de llibres: 0.
Definition of service levels for electronic brokerage applications,” In International Conference on Intelligence in Services and Networks, pp. 351--362, 1998. ISBN: 978-3-540-69343-7.DOI: 10.1007/BFb0056980. , “
A high performance approximate algorithm for the Steiner problem in graphs,” In International Workshop on Randomization and Approximation Techniques in Computer Science, pp. 280--293, 1998. , “
A Genetic Algorithm Approach for the Steiner Problem in Graph,” In 6th European Congress on Intelligent Techniques \& Soft Computing EVFIT'98, 1998. , “1997
Articles de Journal: 1, Conferències: 2, Llibres editats: 0, Capítols de llibres: 0.
Use of WWW Technology for Client/Server Applications in MULTIMEDIATOR,” In International Conference on Intelligence in Services and Networks, pp. 61--68, 1997. ISBN: 978-3-540-69155-6.DOI: 10.1007/3-540-63135-6_6. , “
Translation-invariant propelinear codes,” {IEEE} Trans. Information Theory, vol. 43, no. 2, pp. 590--598, 1997.DOI: 10.1109/18.556115. , “
Large scale elections by coordinating electoral colleges,” In Information Security in Research and Business, Proceedings of the
{IFIP} {TC11} 13th International Conference on Information Security
{(SEC} '97), 14-16 May 1997, Copenhagen, Denmark, pp. 349--362, 1997. , “1996
Articles de Journal: 1, Conferències: 0, Llibres editats: 0, Capítols de llibres: 0.
An implementable secure voting scheme,” Computers {\&} Security, vol. 15, no. 4, pp. 327--338, 1996. , “1995
Articles de Journal: 2, Conferències: 4, Llibres editats: 0, Capítols de llibres: 0.
Neural networks as decoders in error-correcting systems for digital data transmission,” In Computational Learning and Probabilistic Reasoning, pp. 1121-1128, 1995. , “
Digital data transmission error-correcting by neural networks,” In International Conference on EANN95, 1995. CORE C. , “
A neural network for soft-decision decoding of reed-solomon codes,” In 7th Italian Workshop on Neural Networks (WIRN'95), 1995. , “
El uso de documentos normalizados en la Comisión de la Unión Europea,” In TECNIMAP 95: comunicaciones edici{\'o}n electr{\'o}nica: Auditorium de Palma de Mallorca, 10, 11, 12 de mayo de 1995, pp. 594--660, 1995. ISBN: 8-564-657-6. , “
A Fast Algorithm To Compute Irreducible and Primitive Polynomials
in Finite Fields,” Mathematical Systems Theory, vol. 28, no. 1, pp. 13--20, 1995.DOI: 10.1007/BF01294593. , “
Groups of complex integers used as {QAM} signals,” {IEEE} Trans. Information Theory, vol. 41, no. 5, pp. 1512--1517, 1995.DOI: 10.1109/18.412699. , “1993
Articles de Journal: 2, Conferències: 1, Llibres editats: 0, Capítols de llibres: 0.
How to Avoid the Cheaters Succeeding in the Key Sharing Scheme,” Des. Codes Cryptogr., vol. 3, no. 3, pp. 221--228, 1993.DOI: 10.1007/BF01388483. , “1991
Articles de Journal: 1, Conferències: 2, Llibres editats: 0, Capítols de llibres: 0.
Some upper bounds for minimal trees,” Information processing letters, vol. 38, no. 4, pp. 209--213, 1991. , “1990
Articles de Journal: 1, Conferències: 1, Llibres editats: 0, Capítols de llibres: 0.1989
Articles de Journal: 2, Conferències: 0, Llibres editats: 0, Capítols de llibres: 0.
An approximation algorithm for the TSP,” Information processing letters, vol. 31, no. 2, pp. 77--81, 1989. , “
On Finding Rectilinear Steiner Minimal Trees,” Revista de Inform{\`a}tica y Autom{\`a}tica, vol. 2, no. 22, pp. 40--45, 1989. , “1988
Articles de Journal: 0, Conferències: 1, Llibres editats: 0, Capítols de llibres: 0.1987
Articles de Journal: 0, Conferències: 2, Llibres editats: 0, Capítols de llibres: 0.1986
Articles de Journal: 0, Conferències: 2, Llibres editats: 0, Capítols de llibres: 0.
Characterization of Completely Regular Codes through P-Polynomial
Association Schemes,” In Applied Algebra, Algebraic Algorithms and Error-Correcting Codes,
4th International Conference, AAECC-4, Karlsruhe, FRG, September 23-26,
1986, Proceedings, pp. 157--167, 1986.DOI: 10.1007/BFb0039189. , “
From T(m) triangular graphs to single-error-correcting codes,” In International Conference on Applied Algebra, Algebraic Algorithms, and Error-Correcting Codes, pp. 5--12, 1986. , “1985
Articles de Journal: 0, Conferències: 2, Llibres editats: 0, Capítols de llibres: 0.Articles de Journal: 1, Conferències: 0, Llibres editats: 0, Capítols de llibres: 0.
Ethic Topics,” UNKNOWN, vol. UNKNOWN, no. UNKNOWN, pp. UNKNOWN, .
, “
Les Tesis i les Tesines es mostren en un altre llistat.
2024
Articles de Journal: 6, Conferències: 1, Llibres editats: 1, Capítols de llibres: 0.
Deepfake Detection Using Spatiotemporal Transformer
,” ACM Transactions on Multimedia Computing, Communications and Applications
, vol. UNKNOWN
, pp. UNKNOWN
, 2024
DOI: 10.1145/3643030.
, “2023
Articles de Journal: 5, Conferències: 1, Llibres editats: 1, Capítols de llibres: 0.
Identification of behavioural pattern associated with mastitis in dairy cows
,” In 74th Annual Meeting of the European Federation of Animal Science
, Aug.
.2023
Efficient Lossless Compression of Integer Astronomical Data
,” Publications of the Astronomical Society of the Pacific
, vol. 135
, no. 1051
, pp. 094502
, 2023
DOI: 10.1088/1538-3873/acf6e0.
, “A Scalable Reduced-Complexity Compression of Hyperspectral Remote Sensing Images Using Deep Learning
,” MDPI Remote Sensing
, vol. 15
, no. 18
, 2023
DOI: 10.3390/rs15184422.
IF: 4.509, Q2.
, “2022
Articles de Journal: 7, Conferències: 6, Llibres editats: 1, Capítols de llibres: 0.
CCSDS 123.0-B-2 compression standard cross-validation and fuzzing
,” In 8th International Workshop on On-Board Payload Data Compression (OBPDC)
, Sep.
.2022
DOI: 10.5281/zenodo.7245126.
, “Hyperspectral image compression using
convolutional neural networks with local spectral
transforms and non-uniform sample normalisation
,” In 8th International Workshop on On-Board Payload Data Compression (OBPDC)
, Sep.
.2022
DOI: 10.5281/zenodo.7245234.
, “Coding Performance Impact on a Constant-Weight Predictor for CCSDS 123.0-B-2
,” In 8th International Workshop on On-Board Payload Data Compression (OBPDC)
, Sep.
.2022
DOI: 10.5281/zenodo.7110999.
, “Fast Run-Length Compression of Point Cloud Geometry
,” IEEE Trans. Image Processing
, vol. 31
, pp. 4490-4501
, 2022
DOI: 10.1109/TIP.2022.3185541.
IF: 3.199, Q1.
, “La atención consciente como actitud ética
,” Ensayos
, vol. 36
, no. 2
, pp. 33--46
, 2022
2021
Articles de Journal: 8, Conferències: 6, Llibres editats: 2, Capítols de llibres: 1.
Editorial to Special Issue "Remote Sensing Data Compression"
,” MDPI Remote Sensing
, vol. 13
, no. 9
, pp. 3727
, Sep.
.2021
DOI: 10.3390/rs13183727.
IF: 4.509, Q2.
, “Redundancy and Optimization of tANS Entropy Encoders
,” IEEE Trans. Multimedia
, vol. 23
, pp. 4341-4350
, 2021
DOI: 10.1109/TMM.2020.3040547.
IF: 6.051, Q1.
, “MOVES: A MemOry-based VEhicular Social forwarding technique
,” Computer Networks
, vol. 197
, no. UNKNOWN
, pp. 108324
, 2021
LAPSE: A Machine Learning Message Forwarding Approach based on Node Centrality Estimation in Sparse Dynamic Networks
,” In 2021 Wireless Days (WD)
, pp. 1--6
, 2021
Market Equity for Car-sharing Applications using Homomorphic Encryption and Opportunistic Networking
,” In 2021 Wireless Days (WD)
, pp. 1--5
, 2021
Agents in a privacy-preserving world
,” Transactions on Data Privacy
, vol. 14
, no. 1
, pp. 53--63
, 2021
Environmental Ethics: When Human Beings and Nature Are Not Two
,” In UNKNOWN (editor)
, Multidisciplinary Approaches to Ethics in the Digital Era
, 2021
ISBN: 9781799841173
.2020
Articles de Journal: 13, Conferències: 10, Llibres editats: 1, Capítols de llibres: 0.
High-Performance Lossless Compression of Hyperspectral Remote Sensing Scenes Based on Spectral Decorrelation
,” MDPI Remote Sensing
, vol. 12
, no. 18
, pp. 2955
, 2020
DOI: 10.3390/rs12182955.
IF: 4.509, Q2.
, “A Preliminary Approach Towards Satellite Constellation Data Compression
,” In 7th International Workshop on On-Board Payload Data Compression (OBPDC)
, Sep.
.2020
CILLIC: Context Interpolation Lossless and Image Compressor
,” In 7th International Workshop on On-Board Payload Data Compression (OBPDC)
, Sep.
.2020
The Hybrid Entropy Encoder of CCSDS 123.0-B-2: Insights and Decoding Process
,” In 7th International Workshop on On-Board Payload Data Compression (OBPDC)
, Sep.
.2020
Improving Storage Size and Random Access Time in k2-raster Compact Data Structure for Hyperspectral Scenes
,” In 7th International Workshop on On-Board Payload Data Compression (OBPDC)
, Sep.
.2020
Analysis of Variable-Length Codes for Integer Encoding in Hyperspectral Data Compression with the k2-Raster Compact Data Structure
,” MDPI Remote Sensing
, vol. 12
, no. 12
, pp. 1983
, 2020
DOI: 10.3390/rs12121983.
IF: 4.509, Q2.
, “Complexity Scalable Bitplane Image Coding with Parallel Coefficient Processing
,” IEEE Signal Processing Letters
, vol. 27
, pp. 840-844
, 2020
DOI: 10.1109/LSP.2020.2990307.
IF: 3.105, Q2.
, “A. Bilgin, M. W. Marcellin, J. Serra-Sagristà and J. A. Storer (editors)
, IEEE Data Compression Conference (DCC)
, Mar.
. 2020
ISBN: 978-1-7281-6457-1
. ISSN: 2375-0359
.Applications in security and evasions in machine learning: A survey
,” Electronics
, vol. 9
, no. 1
, pp. 97
, 2020
A Software-Defined Networking Approach for Congestion Control in Opportunistic Networking
,” In 34th International Conference on Information Networking (ICOIN 2020)
, 2020
Forwarding in opportunistic information-centric networks: an optimal stopping approach
,” IEEE Communications Magazine
, vol. 58
, no. 5
, pp. 56--61
, 2020
Optimising data diffusion while reducing local resources consumption in Opportunistic Mobile Crowdsensing
,” Pervasive and Mobile Computing
, vol. 67
, no. UNKNOWN
, pp. 101201
, 2020
Towards a Methodology for the Development of Routing Algorithms in Opportunistic Networks
,” arXiv preprint arXiv:2009.01532
, vol. UNKNOWN
, no. UNKNOWN
, pp. UNKNOWN
, 2020
BArt: Trading digital contents through digital assets
,” Concurrency and Computation: Practice and Experience
, vol. 32
, no. 12
, pp. e5490
, 2020
DOI: 10.1002/cpe.5490.
, “2019
Articles de Journal: 24, Conferències: 9, Llibres editats: 1, Capítols de llibres: 0.
Using Predictive and Differential Methods with K2-Raster Compact Data Structure for Hyperspectral Image Lossless Compression
,” MDPI Remote Sensing
, vol. 11
, no. 11
, pp. 2461
, 2019
DOI: 10.3390/rs11212461.
IF: 4.509, Q2.
, “GPU architecture for wavelet-based video coding acceleration
,” In IEEE International Conference on Parallel Computing
, Sep.
.2019
Compression of Hyperspectral Scenes through Integer-to-Integer Spectral Graph Transforms
,” MDPI Remote Sensing
, vol. 11
, no. 11
, pp. 2290
, 2019
DOI: 10.3390/rs11192290.
IF: 4.509, Q2.
, “Performance Impact of Parameter Tuning on the CCSDS-123.0-B-2 Low-Complexity Lossless and Near-Lossless Multispectral and Hyperspectral Image Compression Standard
,” MDPI Remote Sensing
, vol. 11
, no. 11
, pp. 1390
, 2019
DOI: 10.3390/rs11111390.
IF: 4.509, Q2.
, “Effect of Lightweight Image Compression on CNN-based Image Segmentation
,” In Grenoble NewSpace Week (GNSW)
, pp. 31
, Apr.
.2019
Rice-Marlin Codes: Tiny and Efficient Variable-to-Fixed Codes
,” In IEEE Data Compression Conference (DCC)
, Mar.
.2019
DOI: 10.1109/DCC.2019.00108.
CORE A*.
, “Perception-Optimized Encoding for Visually Lossy Image Compression
,” In IEEE Data Compression Conference (DCC)
, pp. 592-592
, 2019
ISSN: 1068-0314
.DOI: 10.1109/DCC.2019.00104.
CORE A*.
, “Mosaic-Based Color-Transform Optimization for the Lossy and Lossy-to-Lossless compression of Pathology Whole-Slide Images
,” IEEE Trans. Medical Imaging
, vol. 38
, no. 1
, pp. 21-32
, 2019
DOI: 10.1109/TMI.2018.2852685.
IF: 6.685, Q1.
, “A. Bilgin, M. W. Marcellin, J. Serra-Sagristà and J. A. Storer (editors)
, IEEE Data Compression Conference (DCC)
, Mar.
. 2019
ISBN: 978-1-7281-0658-8
. ISSN: 2375-0359
.Efficient broadcast in opportunistic networks using optimal stopping theory
,” Ad Hoc Networks
, vol. 88
, no. UNKNOWN
, pp. 5--17
, 2019
Hey, influencer! Message delivery to social central nodes in social opportunistic networks
,” Computer Communications
, vol. 137
, no. UNKNOWN
, pp. 81--91
, 2019
Exploiting Temporal and Spatial Regularities for Content Dissemination in Opportunistic Social Network
,” Wireless Communications and Mobile Computing
, vol. 2019
, no. UNKNOWN
, pp. UNKNOWN
, 2019
General and mixed linear regressions to estimate inter-contact times and contact duration in opportunistic networks
,” Ad Hoc Networks
, vol. 93
, no. UNKNOWN
, pp. 101927
, 2019
A distributed token passing protocol for time constrained data gathering in VANETs
,” Electronics
, vol. 8
, no. 8
, pp. 823
, 2019
Privacy-preserving forwarding using homomorphic encryption for information-centric wireless ad hoc networks
,” IEEE Communications Letters
, vol. 23
, no. 10
, pp. 1708--1711
, 2019
Using local expiration timers to reduce buffer utilisation when using epidemic diffusion
,” In 2019 IEEE Global Communications Conference (GLOBECOM)
, pp. 1--6
, 2019
A review of Message Anonymity on Predictable Opportunistic
Networks
,” In Actas de las V Jornadas Nacionales de Investigaci\'{o}on en
Ciberseguridad (JNIC 2019)
, pp. 316--317
, Jun.
. 2019
ISBN: 978-84-09-12121-2
.On the Difficulty of Hiding the Balance of Lightning Network Channels
,” In Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security
, pp. 602--612
, 2019
ISBN: 978-1-4503-6752-3
.DOI: 10.1145/3321705.3329812.
, “Another coin bites the dust: an analysis of dust in UTXO-based cryptocurrencies
,” Royal Society Open Science
, vol. 6
, no. 1
, pp. 180817
, 2019
DOI: 10.1098/rsos.180817.
, “{\textdollar}\{{\textbackslash}mathbb\{Z\}{\_}\{2\}{\textbackslash}mathbb\{Z\}{\_}\{4\}\}{\textdollar}
-Additive Cyclic Codes: Kernel and Rank
,” {IEEE} Trans. Information Theory
, vol. 65
, no. 4
, pp. 2119--2127
, 2019
DOI: 10.1109/TIT.2018.2870891.
, “On Z2Z4-additive complementary dual codes and related {LCD} codes
,” CoRR
, vol. abs/1903.07886
, no. UNKNOWN
, pp. UNKNOWN
, 2019
Partial Permutation Decoding for Several Families of Linear and {\(\mathbb{Z}\)}\({}_{\mbox{4}}\)-Linear
Codes
,” {IEEE} Trans. Information Theory
, vol. 65
, no. 1
, pp. 131--141
, 2019
DOI: 10.1109/TIT.2018.2840226.
, “On the Kernel of Z\({}_{\mbox{2\({}^{\mbox{s}}\)}}\)-Linear Simplex
and MacDonald Codes
,” CoRR
, vol. abs/1910.07911
, no. UNKNOWN
, pp. UNKNOWN
, 2019
Mindful Engineers in Sustainable Engineering
,” IEEE Technology and Society Magazine
, vol. 38
, no. 3
, pp. 68--73
, 2019
2018
Articles de Journal: 20, Conferències: 12, Llibres editats: 1, Capítols de llibres: 0.
Compression of Hyperspectral Images with Graph Wavelets
,” In 6th International Workshop on On-Board Payload Data Compression (OBPDC)
, Sep.
.2018
Introducing K3-Raster Compact Data Structure for Hyperspectral Images
,” In 6th International Workshop on On-Board Payload Data Compression (OBPDC)
, Sep.
.2018
Prepending Spectral Decorrelating Transforms to FAPEC: A competitive High-Performance approach for Remote Sensing Data Compression
,” In 6th International Workshop on On-Board Payload Data Compression (OBPDC)
, Sep.
.2018
Performance Impact of Parameter Tuning on the Emerging CCSDS-123.0-B-2 Low-Complexity Lossless and Near-Lossless Multispectral and Hyperspectral Image Compression Standard
,” In 6th International Workshop on On-Board Payload Data Compression (OBPDC)
, Sep.
.2018
The new CCSDS Standard for Low-Complexity Lossless and Near-Lossless Multispectral and Hyperspectral Image Compression
,” In 6th International Workshop on On-Board Payload Data Compression (OBPDC)
, Sep.
.2018
High throughput image codec for high-resolution satellite images
,” In IEEE International Geoscience and Remote Sensing Symposium
, pp. 6524-6527
, Jul.
. 2018
CORE C.
Graph-based Rate Control in Pathology Imaging with Lossless Region of Interest Coding
,” IEEE Trans. Medical Imaging
, vol. 37
, no. 10
, pp. 2211-2223
, 2018
DOI: 10.1109/TMI.2018.2824819.
IF: 7.816, Q1.
, “A. Bilgin, M. W. Marcellin, J. Serra-Sagristà and J. A. Storer (editors)
, IEEE Data Compression Conference (DCC)
, Mar.
. 2018
ISBN: 978-1-5386-4883-43
. ISSN: 2375-0359
.Improving Marlin's Compression Ratio with Partially Overlapping Codewords
,” In IEEE Data Compression Conference (DCC)
, pp. 325-334
, Mar.
.2018
DOI: 10.1109/DCC.2018.00041.
CORE A*.
, “A Visual Discrimination Model for JPEG2000 Compression
,” In IEEE Data Compression Conference (DCC)
, pp. 424-424
, Mar.
.2018
DOI: 10.1109/DCC.2018.00077.
CORE A*.
, “Lossless Compression of Color Filter Array Mosaic Images with Visualization via JPEG 2000
,” IEEE Trans. Multimedia
, vol. 20
, no. 2
, pp. 257-270
, 2018
DOI: 10.1109/TMM.2017.2741426.
IF: 5.452, Q1.
, “The TOP gamification platform as a change agent in the
acquisition of the competences attributed to the Degree in
Computer Engineering
,” In Actes del X Congrés Internacional de Docència Universitària i
Innovació (CIDUI 2018)
, 2018
ePRIVO: An enhanced privacy-preserving opportunistic routing protocol for vehicular delay-tolerant networks
,” IEEE Transactions on Vehicular Technology
, vol. 67
, no. 11
, pp. 11154--11168
, 2018
Synthetic generation of spatial graphs
,” International Journal of Intelligent Systems
, vol. 33
, no. 12
, pp. 2364--2378
, 2018
DOI: 10.1002/int.22034.
, “On Improving Automated Self-assessment with Moodle Quizzes: Experiences from a Cryptography Course
,” In Technology Enhanced Assessment
, pp. 176--189
, 2018
ISBN: 978-3-319-97807-9
.Cryptocurrency networks: a new {P}2{P} paradigm
,” Mobile Information Systems
, vol. 2018
, no. UNKNOWN
, pp. UNKNOWN
, 2018
DOI: 10.1155/2018/2159082.
, “On {\(\mathbb{Z}\)}\({}_{\mbox{p\({}^{\mbox{r}}\)}}\){\(\mathbb{Z}\)}\({}_{\mbox{p\({}^{\mbox{s}}\)}}\)-additive
cyclic codes
,” Adv. in Math. of Comm.
, vol. 12
, no. 1
, pp. 169--179
, 2018
DOI: 10.3934/amc.2018011.
, “Z\({}_{\mbox{2}}\)-double cyclic codes
,” Des. Codes Cryptogr.
, vol. 86
, no. 3
, pp. 463--479
, 2018
Binary Images of {\(\mathbb{Z}\)}\({}_{\mbox{2}}\){\(\mathbb{Z}\)}\({}_{\mbox{4}}\)-Additive
Cyclic Codes
,” {IEEE} Trans. Information Theory
, vol. 64
, no. 12
, pp. 7551--7556
, 2018
DOI: 10.1109/TIT.2018.2837882.
, “Completely regular codes by concatenating Hamming codes
,” Adv. in Math. of Comm.
, vol. 12
, no. 2
, pp. 337--349
, 2018
DOI: 10.3934/amc.2018021.
, “On the Kernel of Z\({}_{\mbox{2\({}^{\mbox{s}}\)}}\)-Linear Hadamard
Codes
,” CoRR
, vol. abs/1801.05189
, no. UNKNOWN
, pp. UNKNOWN
, 2018
2017
Articles de Journal: 23, Conferències: 13, Llibres editats: 1, Capítols de llibres: 1.
The Current Role of Image Compression Standards in Medical Imaging
,” MDPI Information
, vol. 8
, no. 4
, 2017
DOI: 10.3390/info8040131.
, “Statistical Retrieval of Temperature and Moisture Atmospheric Profiles Benefits from Spatial-Spectral Image Compression
,” In EUMETSAT - Meteorological Satellite Conference
, Oct.
.2017
Hyperspectral IASI L1C Data Compression
,” MDPI Sensors
, vol. 17
, no. 6
, 2017
DOI: 10.3390/s17061404.
, “Lossless medical image compression through lightweight binary arithmetic coding
,” In Low-Latency Lightweight Image Compression, Applications of Digital Image Processing XL, SPIE Optical Engineering + Applications
, vol. 10396
, Oct.
.2017
DOI: 10.1117/12.2273725.
, “Cross-Color Channel Perceptually Adaptive Quantization for HEVC
,” In IEEE Data Compression Conference (DCC)
, pp. 456-456
, 2017
DOI: 10.1109/DCC.2017.66.
CORE A*.
, “Ali Bilgin, Michael W. Marcellin, Joan Serra-Sagristà and James A. Storer (editors)
, IEEE Data Compression Conference (DCC)
, Apr.
. 2017
ISBN: 978-1-5090-6721-3
. ISSN: 1068-0314
.Marlin: A High Throughput Variable-to-Fixed Codec using Plurally Parsable Dictionaries
,” In IEEE Data Compression Conference (DCC)
, Apr.
.2017
DOI: 10.1109/DCC.2017.74.
CORE A*.
, “Low Complexity Prediction Model for Coding Remote-Sensing Data with Regression Wavelet Analysis
,” In IEEE Data Compression Conference (DCC)
, Apr.
.2017
DOI: 10.1109/DCC.2017.61.
CORE A*.
, “Softwarecast: A code-based delivery manycast scheme in heterogeneous and opportunistic ad hoc networks
,” Ad Hoc Networks
, vol. 55
, no. UNKNOWN
, pp. 72--86
, 2017
Explore and wait: A composite routing-delivery scheme for relative profile-casting in opportunistic networks
,” Computer Networks
, vol. 123
, no. UNKNOWN
, pp. 51--63
, 2017
Room escape at class: Escape games activities to facilitate the motivation and learning in computer science
,” JOTSE
, vol. 7
, no. 2
, pp. 162--171
, 2017
PRIVO: A privacy-preserving opportunistic routing protocol for delay tolerant networks
,” In 2017 IFIP Networking Conference (IFIP Networking) and Workshops
, pp. 1--9
, 2017
Two birds, one stone: Using mobility behavioral profiles both as destinations and as a routing tool
,” Journal of Network and Computer Applications
, vol. 99
, no. UNKNOWN
, pp. 58--72
, 2017
On the Applicability of Onion Routing on Predictable
Delay-Tolerant Networks
,” In 2017 IEEE 42nd Conference on Local Computer Networks (LCN)
, pp. 575-578
, 2017
ISSN: 0742-1303
.DOI: 10.1109/LCN.2017.17.
, “Fuzzy meets privacy
,” In The 14th International Conference on Modeling Decisions for
Artificial Intelligence. USB Proceedings.
, pp. 108-117
, 2017
ISBN: 978-84-697-6794-8
.Smart Contracts Based on Blockchain for Logistics Management
,” In Proceedings of the 1st International Conference on Internet of Things and Machine Learning
, pp. 73:1--73:8
, 2017
ISBN: 978-1-4503-5243-7
.DOI: 10.1145/3109761.3158384.
, “Binary Images of Z2Z4-Additive Cyclic Codes
,” CoRR
, vol. abs/1707.03214
, no. UNKNOWN
, pp. UNKNOWN
, 2017
{\(\mathbb{Z}\)}\({}_{\mbox{2}}\){\(\mathbb{Z}\)}\({}_{\mbox{4}}\)-Additive
Cyclic Codes: Kernel and Rank
,” CoRR
, vol. abs/1711.03784
, no. UNKNOWN
, pp. UNKNOWN
, 2017
Llenguatge eficaç, comunicació cordial
,” In UNKNOWN (editor)
, UNKNOWN
, 2017
ISBN: 9788491166382, 9788491166405, 9788491166399
.2016
Articles de Journal: 21, Conferències: 18, Llibres editats: 1, Capítols de llibres: 0.
Unbiasedness of Regression Wavelet Analysis for Progressive Lossy-to-Lossless Coding
,” In IEEE Picture Coding Symposium (PCS)
, Dec.
.2016
DOI: 10.1109/PCS.2016.7906316.
CORE C.
, “Lossless compression of uncalibrated hyperspectral images through Regression Wavelet Analysis
,” In 5th International Workshop on On-Board Payload Data Compression (OBPDC)
, Sep.
.2016
Progressive-Lossy-to-Lossless Coding of hyperspectral images
,” In 5th International Workshop on On-Board Payload Data Compression (OBPDC)
, pp. 1-21
, Sep.
.2016
A Rate Allocation Method Based on the NLR Complexity for Transforms with Unequal Scaling Factors
,” In 5th International Workshop on On-Board Payload Data Compression (OBPDC)
, Sep.
.2016
Piecewise Mapping in HEVC Lossless Intra-prediction Coding
,” IEEE Trans. Image Processing
, vol. 25
, no. 9
, pp. 4004-4017
, 2016
DOI: 10.1109/TIP.2016.2571065.
IF: 3.199, Q1.
, “Progressive Lossy-to-Lossless Compression of DNA Microarray Images
,” IEEE Signal Processing Letters
, vol. 23
, no. 5
, pp. 698-702
, 2016
DOI: 10.1109/LSP.2016.2547893.
IF: 2.528, Q2.
, “Two-stage compression of hyperspectral images with enhanced classification performance
,” In Remotely Sensed Data Compression
, Apr.
.2016
DOI: 10.1117/12.2225568.
, “Ali Bilgin, Michael W. Marcellin, Joan Serra-Sagristà and James A. Storer (editors)
, IEEE Data Compression Conference (DCC)
, Apr.
. 2016
ISBN: 978-1-5090-1853-6
. ISSN: 1068-0314
.Analysis-Driven Lossy Compression of DNA Microarray Images
,” IEEE Trans. Medical Imaging
, vol. 35
, no. 2
, pp. 654-664
, 2016
DOI: 10.1109/TMI.2015.2489262.
IF: 3.942, Q1.
, “Bitplane image coding with parallel coefficient processing
,” IEEE Trans. Image Processing
, vol. 25
, no. 1
, pp. 209-219
, 2016
DOI: 10.1109/TIP.2015.2484069.
IF: 3.199, Q1.
, “Regression Wavelet Analysis for Progressive-Lossy-to-Lossless Coding of Remote-Sensing Data
,” In IEEE Data Compression Conference (DCC)
, Apr.
.2016
DOI: 10.1109/DCC.2016.43.
CORE A*.
, “Transform Optimization for the Lossy Coding of Pathology Whole-Slide Images
,” In IEEE Data Compression Conference (DCC)
, Apr.
.2016
DOI: 10.1109/DCC.2016.33.
CORE A*.
, “Coding Scheme for the Transmission of Satellite Imagery
,” In IEEE Data Compression Conference (DCC)
, Apr.
.2016
DOI: 10.1109/DCC.2016.29.
CORE A*.
, “Measuring QoS in an Aeronautical Opportunistic Network Architecture with Limited Access to a Satellite Communications Backhaul
,” Mobile Information Systems
, vol. 2016
, no. UNKNOWN
, pp. UNKNOWN
, 2016
DOI: 10.1155/2016/7601316.
, “PrivHab+: A secure geographic routing protocol for DTN
,” Computer Communications
, vol. 78
, no. UNKNOWN
, pp. 56--73
, 2016
Identity-based access control for pro-active message's DTN
,” Security and Communication Networks
, vol. 9
, no. 14
, pp. 2323--2337
, 2016
Room escape en las aulas: actividades de juegos de escape para facilitar la motivación y el aprendizaje de las ciencias de la computación
,” Revista del Congr{\'e}s Internacional de Doc{\`e}ncia Universit{\`a}ria i Innovaci{\'o}
, vol. 3
, no. UNKNOWN
, pp. 1--7
, 2016
Reputation and Reward: Two Sides of the Same Bitcoin
,” Sensors
, vol. 16
, no. 6
, pp. 776
, 2016
DOI: 10.3390/s16060776.
, “An Integrated Reward and Reputation Mechanism for MCS Preserving Users' Privacy
,” In Data Privacy Management, and Security Assurance
, pp. 83--99
, 2016
ISBN: 978-3-319-29883-2
.{\textdollar}\{{\textbackslash}mathbb \{Z\}\}{\_}\{2\}\{{\textbackslash}mathbb
\{Z\}\}{\_}\{4\}{\textdollar} -Additive Cyclic Codes, Generator Polynomials,
and Dual Codes
,” {IEEE} Trans. Information Theory
, vol. 62
, no. 11
, pp. 6348--6354
, 2016
DOI: 10.1109/TIT.2016.2611528.
, “Computing the generator polynomials of Z\({}_{\mbox{2}}\)Z\({}_{\mbox{4}}\)-additive
cyclic codes
,” CoRR
, vol. abs/1606.01745
, no. UNKNOWN
, pp. UNKNOWN
, 2016
Ranks and Kernels of Codes From Generalized Hadamard Matrices
,” {IEEE} Trans. Information Theory
, vol. 62
, no. 2
, pp. 687--694
, 2016
DOI: 10.1109/TIT.2015.2509061.
, “Baixant de la tarima: una experiència a l'aula on l'alumne pren la paraula
,” Impactes de la innovació en la docència i l'aprenentage. CIDUI: congrés internacional de docència universitària i innovació
, vol. UNKNOWN
, no. UNKNOWN
, pp. 8
, 2016
Learning engineering without avoiding the ``what for question''
,” In 1st HEIRRI Conference. Teaching responsible reserach and innovaton at University. Book of abstracts
, pp. 52
, 2016
2015
Articles de Journal: 32, Conferències: 4, Llibres editats: 2, Capítols de llibres: 0.
Strategies of SIMD computing for image coding in GPU
,” In IEEE International Conference on High Performance Computing
, pp. 345-354
, Dec.
.2015
Context-adaptive binary arithmetic coding with fixed-length codewords
,” IEEE Trans. Multimedia
, vol. 17
, no. 8
, pp. 1385-1390
, 2015
DOI: 10.1109/TMM.2015.2444797.
IF: 2.536, Q1.
, “Ali Bilgin, Michael W. Marcellin, Joan Serra-Sagristà and James A. Storer (editors)
, IEEE Data Compression Conference (DCC)
, Apr.
. 2015
ISBN: 978-1-4799-8430-5
. ISSN: 1068-0314
.Proposal for Infrared Atmospheric Sounding Interferometer on-board data compression
,” SPIE Journal on Applied Remote Sensing
, vol. 9
, no. 1
, pp. 1-28
, 2015
DOI: 10.1117/1.JRS.9.097498.
IF: 0.937, Q4.
, “On the Hardware Complexity of the Arithmetic Elements of the Pairwise Orthogonal Transform
,” SPIE Journal on Applied Remote Sensing
, vol. 9
, no. 1
, pp. 1-12
, 2015
DOI: 10.1117/1.JRS.9.097496.
IF: 0.937, Q4.
, “Effects of compression on classification performance and discriminant information preservation in remotely sensed data
,” SPIE Satellite Data Compression Communications, and Processing XI
, vol. 951
, 2015
DOI: 10.1117/12.2180223.
, “Strategy of Microscopic Parallelism for Bitplane Image Coding
,” In IEEE Data Compression Conference (DCC)
, pp. 163-172
, Apr.
.2015
DOI: 10.1109/DCC.2015.19.
CORE A*.
, “Entropy-based evaluation of context models for wavelet-transformed images
,” IEEE Trans. Image Processing
, vol. 24
, no. 1
, pp. 57-67
, 2015
DOI: 10.1109/TIP.2014.2370937.
IF: 3.199, Q1.
, “Endeavouring to be in the good books. Awarding DTN network use for acknowledging the reception of bundles
,” Computer Networks
, vol. 83
, no. UNKNOWN
, pp. 149--166
, 2015
Privhab: a multiagent secure georouting protocol for podcast distribution on disconnected areas
,” In Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems
, pp. 1697--1698
, 2015
Podcast distribution on gwanda using privhab: A multiagent secure georouting protocol
,” Trends in Practical Applications of Agents, Multi-Agent Systems and Sustainability
, vol. UNKNOWN
, no. UNKNOWN
, pp. 29--37
, 2015
A mobile code bundle extension for application-defined routing in delay and disruption tolerant networking
,” Computer Networks
, vol. 87
, no. UNKNOWN
, pp. 59--77
, 2015
Remarks on {P}einado et al.'s Analysis of {J}3{G}en
,” Sensors
, vol. 15
, no. 3
, pp. 6217-6220
, 2015
DOI: 10.3390/s150306217.
, “There is exactly one Z2Z4-cyclic 1-perfect code
,” CoRR
, vol. abs/1510.06166
, no. UNKNOWN
, pp. UNKNOWN
, 2015
Families of nested completely regular codes and distance-regular graphs
,” Adv. in Math. of Comm.
, vol. 9
, no. 2
, pp. 233--246
, 2015
Construction of Hadamard {\(\mathbb{Z}\)}\({}_{\mbox{2}}\) {\(\mathbb{Z}\)}\({}_{\mbox{4}}\)
Q\({}_{\mbox{8}}\)-Codes for Each Allowable Value of the Rank and
Dimension of the Kernel
,” {IEEE} Trans. Information Theory
, vol. 61
, no. 4
, pp. 1948--1958
, 2015
DOI: 10.1109/TIT.2015.2398869.
, “Ranks and Kernels of Codes from Generalized Hadamard Matrices
,” CoRR
, vol. abs/1506.08961
, no. UNKNOWN
, pp. UNKNOWN
, 2015
Classification of the Z\({}_{\mbox{2}}\)Z\({}_{\mbox{4}}\)-Linear
Hadamard Codes and Their Automorphism Groups
,” {IEEE} Trans. Information Theory
, vol. 61
, no. 2
, pp. 887--894
, 2015
DOI: 10.1109/TIT.2014.2379644.
, “Partial permutation decoding for binary linear and Z4-linear Hadamard
codes
,” CoRR
, vol. abs/1512.01839
, no. UNKNOWN
, pp. UNKNOWN
, 2015
Teaching engineering ethics in the classroom: Issues and challenges
,” Contemporary ethical issues in engineering
, vol. UNKNOWN
, no. UNKNOWN
, pp. 144--158
, 2015
New ethical challenges for today engineering and technology
,” Telematics and Informatics
, vol. 32
, no. 2
, pp. 409--415
, 2015
2014
Articles de Journal: 17, Conferències: 21, Llibres editats: 1, Capítols de llibres: 1.
Proposal for IASI onboard data compression
,” In 4th International Workshop on On-Board Payload Data Compression (OBPDC)
, Oct.
. 2014
ISBN: 978-90-815839-7-8
.Impact of near-lossless compression of IASI L1C data on statistical retrieval of atmospheric profiles
,” In 4th International Workshop on On-Board Payload Data Compression (OBPDC)
, Oct.
. 2014
ISBN: 978-90-815839-7-8
.On the Hardware Complexity of the Arithmetic Elements of the Pairwise Orthogonal Transform
,” In 4th International Workshop on On-Board Payload Data Compression (OBPDC)
, Oct.
. 2014
ISBN: 978-90-815839-7-8
.Stationary probability model for microscopic parallelism in JPEG2000
,” IEEE Trans. Multimedia
, vol. 16
, no. 4
, pp. 960-970
, 2014
DOI: 10.1109/TMM.2014.2307553.
IF: 2.303, Q1.
, “Ali Bilgin, Michael W. Marcellin, Joan Serra-Sagristà and James A. Storer (editors)
, IEEE Data Compression Conference (DCC)
, Mar.
. 2014
ISBN: 978-1-4799-3882-7
. ISSN: 1068-0314
.Cell-based 2-step scalar deadzone quantization for JPEG2000
,” In IEEE Data Compression Conference (DCC)
, pp. 143-152
, Mar.
.2014
DOI: 10.1109/DCC.2014.51.
CORE A*.
, “Improvements to HEVC intra coding for lossless medical image compression
,” In IEEE Data Compression Conference (DCC)
, pp. 423-423
, Mar.
.2014
DOI: 10.1109/DCC.2014.76.
CORE A*.
, “Compression limits of wavelet-based image coding
,” In IEEE Data Compression Conference (DCC)
, pp. 397-397
, Mar.
.2014
DOI: 10.1109/DCC.2014.44.
CORE A*.
, “Compression of DNA Microarray Images
,” In Luis Rueda (editor)
, Microarray Image and Data Analysis: Theory and Practice
, 2014
ISBN: 9781466586826
.Visually lossless strategies to decode and transmit JPEG2000 imagery
,” IEEE Signal Processing Letters
, vol. 21
, no. 1
, pp. 35-38
, 2014
DOI: 10.1109/LSP.2013.2290317.
IF: 1.751, Q2.
, “Analyzing information propagation in a transoceanic aircraft delay tolerant network
,” In 39th Annual IEEE Conference on Local Computer Networks
, pp. 116--123
, 2014
DOI: 10.1109/LCN.2014.6925763.
, “Striving for sensing: Taming your mobile code to share a robot sensor network
,” Information Sciences
, vol. 277
, no. UNKNOWN
, pp. 338--357
, 2014
Information System for Supporting Location-based Routing Protocols
,” In RECSI XIII: Actas de la XIII Reuni{\'o}n Espa{\~n}ola sobre Criptolog{\'i}a y Seguridad de la Informaci{\'o}n. Alicante, 2-5 de septiembre de 2014
, pp. 203--208
, 2014
Data privacy
,” Wiley Interdisciplinary Reviews: Data Mining and Knowledge
Discovery
, vol. 4
, no. 4
, pp. 269--280
, 2014
DOI: 10.1002/widm.1129.
, “QR Steganography - A Threat to New Generation Electronic
Voting Systems
,” In {SECRYPT} 2014 - Proceedings of the 11th International
Conference on Security and Cryptography, Vienna, Austria,
28-30 August, 2014
, pp. 484--491
, 2014
ISBN: 978-989-758-045-1
.DOI: 10.5220/0005120404840491.
, “Aprendizaje supervisado para el enlace de registros a traves de la media ponderada
,” In Actas de la XIII Reuni{\'o}n Española sobre Criptolog{\'i}a y
Seguridad de la Informaci{\'o}n
, pp. 281--284
, 2014
ISBN: 978-84-9717-323-0
.Bitcoin y el problema de los generales bizantinos
,” In Actas de la XIII Reuni{\'o}n Española de Criptolog{\'i}a y Seguridad de la Informaci{\'o}n (RECSI 2014)
, pp. 241--246
, 2014
ISBN: 978-84-9717-323-0
.On the similarity of commercial EPC Gen2 pseudorandom number generators
,” Transactions on Emerging Telecommunications Technologies
, vol. 25
, no. 2
, pp. 151--154
, 2014
DOI: 10.1002/ett.2600.
, “Z2Z4-additive cyclic codes, generator polynomials and dual codes
,” CoRR
, vol. abs/1406.4425
, no. UNKNOWN
, pp. UNKNOWN
, 2014
Z2-double cyclic codes
,” CoRR
, vol. abs/1410.5604
, no. UNKNOWN
, pp. UNKNOWN
, 2014
Classification of the Z2Z4-Linear Hadamard Codes and Their Automorphism
Groups
,” CoRR
, vol. abs/1408.1147
, no. UNKNOWN
, pp. UNKNOWN
, 2014
2013
Articles de Journal: 22, Conferències: 15, Llibres editats: 1, Capítols de llibres: 0.
Performance impact of parameter tuning on the CCSDS-123 lossless multi- and hyperspectral image compression standard
,” J. Appl. Remote Sens.
, vol. 7
, no. 1
, pp. 1-16
, Aug.
.2013
DOI: 10.1117/1.JRS.7.074594.
, “2-step scalar deadzone quantization for bitplane image coding
,” IEEE Trans. Image Processing
, vol. 22
, no. 12
, pp. 4678-4688
, 2013
DOI: 10.1109/TIP.2013.2277801.
IF: 3.199, Q1.
, “Ali Bilgin, Michael W. Marcellin, Joan Serra-Sagristà and James A. Storer (editors)
, IEEE Data Compression Conference (DCC)
, Mar.
. 2013
ISBN: 978-0-7695-4965-1
. ISSN: 1068-0314
.A distortion metric for DNA microarray images
,” In IEEE Data Compression Conference (DCC)
, Mar.
.2013
DOI: 10.1109/DCC.2013.26.
CORE A*.
, “Low complexity embedded quantization scheme compatible with bitplane image coding
,” In IEEE Data Compression Conference (DCC)
, pp. 271-280
, Mar.
.2013
DOI: 10.1109/DCC.2013.35.
CORE A*.
, “Computed Tomography Image Coding through Air Filtering in the Wavelet Domain
,” In IEEE Data Compression Conference (DCC)
, Mar.
.2013
DOI: 10.1109/DCC.2013.92.
CORE A*.
, “Diagnostically Lossless Compression of X-ray Angiographic Images through Background Suppression
,” In IEEE Data Compression Conference (DCC)
, Mar.
.2013
DOI: 10.1109/DCC.2013.108.
CORE A*.
, “Visually Lossless JPEG 2000 Decoder
,” In IEEE Data Compression Conference (DCC)
, pp. 161-170
, Mar.
.2013
DOI: 10.1109/DCC.2013.25.
CORE A*.
, “JPIP Proxy Server with Prefetching Strategies Based on User-Navigation Model and Semantic Map
,” IEEE Trans. Multimedia
, vol. 15
, no. 7
, pp. 1491-1502
, 2013
DOI: 10.1109/TMM.2013.2264655.
IF: 1.776, Q1.
, “General embedded quantization for wavelet-based lossy image coding
,” IEEE Trans. Signal Process
, vol. 61
, no. 6
, pp. 1561–1574
, 2013
DOI: 10.1109/TSP.2012.2236323.
IF: 2.813, Q1.
, “FAST rate allocation for JPEG2000 video transmission over time-varying channels
,” IEEE Trans. Multimedia
, vol. 15
, no. 1
, pp. 15-26
, 2013
DOI: 10.1109/TMM.2012.2199973.
IF: 1.776, Q1.
, “Characterization of a transoceanic aircraft delay tolerant network
,” In 38th Annual IEEE Conference on Local Computer Networks
, pp. 565--572
, 2013
DOI: 10.1109/LCN.2013.6761292.
, “A store-carry-process-and-forward paradigm for intelligent sensor grids
,” Information Sciences
, vol. 222
, no. UNKNOWN
, pp. 113--125
, 2013
A Bloom Filter Based Model for Decentralized Authorization
,” International Journal of Intelligent Systems
, vol. 28
, no. 6
, pp. 565-582
, 2013
DOI: 10.1002/int.21593.
, “Towards a private vector space model for confidential
documents
,” In Proceedings of the 28th Annual {ACM} Symposium on Applied
Computing
, pp. 944–945
, 2013
ISBN: 978-1-4503-1656-9
.DOI: 10.1145/2480362.2480543.
, “J3{G}en: A {P}{R}{N}{G} for Low-Cost Passive {R}{F}{I}{D}
,” Sensors
, vol. 13
, no. 3
, pp. 3816--3830
, 2013
DOI: 10.3390/s130303816.
, “An Algorithm for K-degree Anonymity on Large Networks
,” In Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
, pp. 671--675
, 2013
ISBN: 978-1-4503-2240-9
.DOI: 10.1145/2492517.2492643.
, “When users become sensors: can we trust their readings?
,” International Journal of Communication Systems
, vol. 28
, no. 4
, pp. 601-614
, 2013
DOI: 10.1002/dac.2689.
, “{O}{S}{N} Crawling Schedulers and Their Implications on k-Plexes Detection
,” International Journal of Intelligent Systems
, vol. 28
, no. 6
, pp. 583--605
, 2013
DOI: 10.1002/int.21594.
, “Permutation decoding of Z2Z4-linear codes
,” CoRR
, vol. abs/1303.3737
, no. UNKNOWN
, pp. UNKNOWN
, 2013
On the Number of Nonequivalent Propelinear Extended Perfect Codes
,” Electr. J. Comb.
, vol. 20
, no. 2
, pp. P37
, 2013
Families of Hadamard BBZ\({}_{\mbox{2}}\)BBZ\({}_{\mbox{4}}\)Q\({}_{\mbox{8}}\)-Codes
,” {IEEE} Trans. Information Theory
, vol. 59
, no. 8
, pp. 5140--5151
, 2013
DOI: 10.1109/TIT.2013.2258373.
, “On a family of binary completely transitive codes with growing covering
radius
,” CoRR
, vol. abs/1303.2547
, no. UNKNOWN
, pp. UNKNOWN
, 2013
A Realistic Distributed Storage System That Minimizes Data Storage
and Repair Bandwidth
,” In 2013 Data Compression Conference, {DCC} 2013, Snowbird, UT, USA, March
20-22, 2013
, pp. 491
, 2013
DOI: 10.1109/DCC.2013.72.
, “A realistic distributed storage system that minimizes data storage
and repair bandwidth
,” CoRR
, vol. abs/1301.1549
, no. UNKNOWN
, pp. UNKNOWN
, 2013
A realistic distributed storage system: the rack model
,” CoRR
, vol. abs/1302.5657
, no. UNKNOWN
, pp. UNKNOWN
, 2013
Non-homogeneous Two-Rack Model for Distributed Storage Systems
,” CoRR
, vol. abs/1307.8201
, no. UNKNOWN
, pp. UNKNOWN
, 2013
Engineering ethics beyond engineers’ ethics
,” Science and engineering ethics
, vol. 19
, no. 1
, pp. 179--187
, 2013
Knowledge based concept analysis method using concept maps and UML: security notion case
,” International Scholarly and Scientific Research \& Innovation
, vol. 7
, no. 2
, pp. 216--223
, 2013
2012
Articles de Journal: 18, Conferències: 17, Llibres editats: 0, Capítols de llibres: 0.
Multicomponent compression of DNA microarray images
,” In Proceedings of the CEDI Workshop on Multimedia Data Coding and Transmission (WMDCT)
, Sep.
.2012
Low-complexity lossy image coding through a near-optimal general embedded quantizer
,” In IET Image Processing Conference
, pp. 1-6
, Jul.
.2012
Standard and specific compression techniques for DNA microarray images
,” MDPI Algorithms
, vol. 5
, no. 1
, 2012
DOI: 10.3390/a5010030.
, “Divide-and-conquer strategies for hyperspectral image processing
,” IEEE Signal Processing Magazine
, vol. 29
, no. 3
, pp. 71-81
, 2012
DOI: 10.1109/MSP.2011.2179416.
IF: 3.368, Q1.
, “Scanning order strategies for bitplane image coding
,” IEEE Trans. Image Processing
, vol. 21
, no. 4
, pp. 1920-1933
, 2012
DOI: 10.1109/TIP.2011.2176953.
IF: 3.199, Q1.
, “MicroCT Image Coding Based on Air Filtering
,” In IEEE Data Compression Conference (DCC)
, Apr.
.2012
DOI: 10.1109/DCC.2012.47.
CORE A*.
, “DNA microarray image coding
,” In IEEE Data Compression Conference (DCC)
, Apr.
.2012
DOI: 10.1109/DCC.2012.11.
CORE A*.
, “Enhanced transmission of JPEG2000 imagery through JPIP proxy and user-navigation model
,” In IEEE Data Compression Conference (DCC)
, pp. 22-31
, Apr.
.2012
DOI: 10.1109/DCC.2012.10.
CORE A*.
, “Embedded quantizer design for low rate lossy image coding
,” In IEEE Data Compression Conference (DCC)
, pp. 89-98
, Apr.
.2012
DOI: 10.1109/DCC.2012.17.
CORE A*.
, “Performance Impact of Parameter Tuning on the CCSDS-123 Lossless Multi- and Hyperspectral Image Compression Standard
,” In 3rd International Workshop on On-Board Payload Data Compression (OBPDC)
, Oct.
.2012
Joint Source/Channel Coding in 3D-JPEG2000 for Wireless 3D Region of Interest Transmission in 3D Medical Imaging Data
,” In 8th IEEE International Conference on Wireless and Mobile Computing
, Oct.
. 2012
CORE B.
Influence of Lossy Compressed DEM on Radiometric Correction for Land Cover Classification of Remote Sensing Images
,” In American Geophysical Union's 45th Fall Meeting
, Dec.
.2012
Esquema de gestion de claves criptográficas tolerante a retrasos e interrupciones en entornos aeronáuticos
,” In Actas de la XII Reuni{\'o}n Española de Criptolog{\'i}a y Seguridad de la Informaci{\'o}n (RECSI 2012)
, 2012
ISBN: 978-84-615-9933-2
.Control de acceso para mensajes pro-activos en redes dtn
,” Proceedings of XII Reuni{\'o}n Española sobre Criptolog{\i}a y Seguridad de la Informaci{\'o}n
, vol. UNKNOWN
, no. UNKNOWN
, pp. UNKNOWN
, 2012
Fully Distributed Cooperative Spectrum Sensing for Cognitive
Radio Networks
,” In Actas XII Reuni{\'o}n Española sobre Criptolog{\'i}a y Seguridad de la
Informaci{\'o}n
, pp. 327--332
, Jul.
. 2012
ISBN: 978-84-615-9933-2
.Gestión eficiente de permisos en redes de sensores
inalámbricos
,” In Actas XII Reuni{\'o}n Española sobre Criptolog{\'i}a y Seguridad de la
Informaci{\'o}n
, pp. 321--326
, Jul.
. 2012
ISBN: 978-84-615-9933-2
.Security and Privacy Challenges in Smart Sensor Networks
,” In Actas de la XII Reuni{\'o}n Española de Criptolog{\'i}a y Seguridad de la Informaci{\'o}n (RECSI 2012)
, pp. 423--428
, 2012
ISBN: 978-84-615-9933-2
.Algoritmos genéticos para la anonimización de grafos
,” In Actas de la XII Reuni{\'o}n Española de Criptolog{\'i}a y Seguridad de la Informaci{\'o}n (RECSI 2012)
, pp. 243--248
, 2012
ISBN: 978-84-615-9933-2
.Towards secure mobile {P2P} applications using {JXME}
,” Journal of Internet Services and Information Security (JISIS)
, vol. 2
, no. 1/2
, pp. 1--21
, 2012
Characterization and constructions of self-dual codes over {\(\mathbb{Z}\)}\({}_{\mbox{2}}\)
{\texttimes} {\(\mathbb{Z}\)}\({}_{\mbox{4}}\)
,” Adv. in Math. of Comm.
, vol. 6
, no. 3
, pp. 287--303
, 2012
DOI: 10.3934/amc.2012.6.287.
, “Structural properties of binary propelinear codes
,” Adv. in Math. of Comm.
, vol. 6
, no. 3
, pp. 329--346
, 2012
DOI: 10.3934/amc.2012.6.329.
, “Families of Hadamard Z2Z4Q8-codes
,” CoRR
, vol. abs/1211.5251
, no. UNKNOWN
, pp. UNKNOWN
, 2012
On two families of binary quadratic bent functions
,” CoRR
, vol. abs/1211.5257
, no. UNKNOWN
, pp. UNKNOWN
, 2012
Self-embeddings of Hamming Steiner triple systems of small order and
{APN} permutations
,” CoRR
, vol. abs/1212.5789
, no. UNKNOWN
, pp. UNKNOWN
, 2012
Quasi-cyclic Regenerating Codes
,” CoRR
, vol. abs/1209.3977
, no. UNKNOWN
, pp. UNKNOWN
, 2012
2011
Articles de Journal: 20, Conferències: 16, Llibres editats: 0, Capítols de llibres: 2.
Impact of user concurrency in commonly used OGC map server implementations
,” In IARIA International Conference on Advanced Communications and Computation
, pp. 179-186
, Oct.
.2011
A review of DNA microarray image compression
,” In Proceedings of the IEEE 1st International Conference on Data Compression
, Jun.
.2011
DOI: 10.1109/CCP.2011.21.
, “Review and implementation of the future CCSDS Recommendation for multi- and hyperspectral lossless image coding
,” In Proceedings of the IEEE 1st International Conference on Data Compression
, Jun.
.2011
DOI: 10.1109/CCP.2011.17.
, “Low complexity, high efficiency probability model for hyper-spectral image coding
,” In Proceedings of the IEEE 1st International Conference on Data Compression
, pp. 229-235
, Jun.
.2011
DOI: 10.1109/CCP.2011.10.
, “Influence of Noise Filtering in Coding Computed Tomography with JPEG2000
,” In IEEE Data Compression Conference (DCC)
, pp. 413-422
, Mar.
.2011
DOI: 10.1109/DCC.2011.48.
CORE A*.
, “Pre-encoded JPEG2000 video transmission in a video-on-demand scenario
,” In IEEE Data Compression Conference (DCC)
, pp. 460-460
, Mar.
.2011
DOI: 10.1109/DCC.2011.64.
CORE A*.
, “Rate-distortion optimized adaptive scanning order for bitplane image coding engines
,” In IEEE Data Compression Conference (DCC)
, pp. 163-172
, Mar.
.2011
DOI: 10.1109/DCC.2011.23.
CORE A*.
, “Divide-and-Conquer Decorrelation for Hyperspectral Data Compression
,” In Huang, Bormin (editor)
, Recent Advances in Satellite Data Compression
, 2011
ISBN: 978-1-4614-1183-3
.FAST Rate Allocation through Steepest Descent for JPEG2000 Video Transmission
,” IEEE Trans. Image Processing
, vol. 20
, no. 4
, pp. 1166-1173
, 2011
DOI: 10.1109/TIP.2010.2077304.
IF: 3.042, Q1.
, “Electronic triage tag and opportunistic networks in disasters
,” In Proceedings of the Special Workshop on Internet and Disasters
, pp. 1--10
, 2011
ISBN: 9781450310444
.DOI: 10.1145/2079360.2079366.
, “Heterogeneous multiagent architecture for dynamic triage of victims in emergency scenarios
,” In UNKNOWN (editor)
, Advances on Practical Applications of Agents and Multiagent Systems
, 2011
ISBN: 978-3-642-19875-5
.Semantic Microaggregation for the Anonymization of
Query Logs using the Open Directory Project
,” SORT - Statistics and Operations Research
Transactions
, vol. UNKNOWN
, no. UNKNOWN
, pp. 41--58
, 2011
Supervised Learning Using Mahalanobis Distance for Record
Linkage
,” In Proceedings of 6th International Summer School on Aggregation
Operators (AGOP 2011)
, pp. 223--228
, Jul.
. 2011
ISBN: 978-1-4477-7019-0
.Fuzzy methods for database protection
,” In 7th conference of the European Society for Fuzzy Logic and
Technology (EUSFLAT-2011)
, pp. 439--443
, 2011
ISBN: 978-90-78677-00-0
.DOI: 10.2991/eusflat.2011.143.
, “Supervised learning approach for distance based record
linkage as disclosure risk evaluation
,” In Joint UNECE/Eurostat Work Session on Statistical Data
Confidentiality
, Oct.
.2011
Practical Eavesdropping of Control Data From {EPC} {G}en2 Queries With a Programmable {RFID} Toolkit
,” Hakin9
, vol. 6
, no. 9
, pp. 14--19
, 2011
Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices
,” Future Internet
, vol. 3
, no. 1
, pp. 31--48
, 2011
DOI: 10.3390/fi3010031.
, “A Practical Implementation Attack on Weak Pseudorandom Number Generator Designs for {EPC} {G}en2 Tags
,” Wireless Personal Communications
, vol. 59
, no. UNKNOWN
, pp. 27-42
, 2011
A Fair and Secure Cluster Formation Process for Ad Hoc Networks
,” Wireless Personal Communications
, vol. 56
, no. UNKNOWN
, pp. 625-636
, 2011
{\(\mathbb{Z}\)}\({}_{\mbox{2}}\){\(\mathbb{Z}\)}\({}_{\mbox{4}}\)-additive
perfect codes in Steganography
,” Adv. in Math. of Comm.
, vol. 5
, no. 3
, pp. 425--433
, 2011
DOI: 10.3934/amc.2011.5.425.
, “On Lifting Perfect Codes
,” {IEEE} Trans. Information Theory
, vol. 57
, no. 9
, pp. 5918--5925
, 2011
DOI: 10.1109/TIT.2010.2103410.
, “Spectrum Sharing Models in Cognitive Radio Networks
,” In 2011 International Conference on Cyber-Enabled Distributed Computing
and Knowledge Discovery, CyberC 2011, Beijing, China, October 10-12,
2011
, pp. 503--510
, 2011
DOI: 10.1109/CyberC.2011.86.
, “Classification of Some Families of Quaternary Reed-Muller Codes
,” {IEEE} Trans. Information Theory
, vol. 57
, no. 9
, pp. 6043--6051
, 2011
DOI: 10.1109/TIT.2011.2119465.
, “Quasi-cyclic Minimum Storage Regenerating Codes for Distributed Data
Compression
,” In 2011 Data Compression Conference {(DCC} 2011), 29-31 March 2011, Snowbird,
UT, {USA}
, pp. 33--42
, 2011
DOI: 10.1109/DCC.2011.11.
, “Involutions in Binary Perfect Codes
,” {IEEE} Trans. Information Theory
, vol. 57
, no. 9
, pp. 5926--5932
, 2011
DOI: 10.1109/TIT.2011.2162185.
, “Codes over {\(\mathbb{Z}\)}\({}_{\mbox{2\({}^{\mbox{k}}\)}}\), Gray
map and self-dual codes
,” Adv. in Math. of Comm.
, vol. 5
, no. 4
, pp. 571--588
, 2011
DOI: 10.3934/amc.2011.5.571.
, “Engineering Ethics for an Integrated Online Teaching: What is Missing?
,” The Social Impact of Social Computing
, vol. UNKNOWN
, no. UNKNOWN
, pp. 412
, 2011
L'ètica de l'enginyeria en el segle XXI
,” UAB divulga
, vol. UNKNOWN
, no. UNKNOWN
, pp. UNKNOWN
, 2011
2010
Articles de Journal: 23, Conferències: 24, Llibres editats: 1, Capítols de llibres: 1.
Extensions to the CCSDS IDC recommendation for on-board hyperspectral image coding
,” In Int. WS on On-Board Payload Data Compression (OBPDC)
, Oct.
.2010
Side information coding for the Pairwise Orthogonal Transform
,” In Workshop on Multimedia Data Coding and Transmission CEDI 2010
, Sep.
. 2010
ISBN: 978-84-92812-70-7
.Enhanced JPEG2000 Quality Scalability through Block-Wise Layer Truncation
,” EURASIP Journal on Advances in Signal Processing
, vol. 2010
, no. 1
, pp. 803542
, 2010
DOI: 10.1155/2010/803542.
IF: 1.053, Q2.
, “JPEG2000 encoding of images with NODATA regions for Remote Sensing applications
,” SPIE Journal on Applied Remote Sensing
, vol. 4
, no. 1
, pp. 041793
, 2010
IF: 1.000, Q2.
4D remote sensing image coding with JPEG2000
,” In SPIE International Conference on Satellite Data Compression
, vol. 7810
, Aug.
.2010
DOI: 10.1117/12.860545.
, “Rate allocation method for the fast transmission of pre-encoded meteorological data over JPIP
,” In SPIE International Conference on Satellite Data Compression
, vol. 7810
, Aug.
.2010
DOI: 10.1117/12.860619.
, “Quality analysis in N-dimensional lossy compression of multispectral remote sensing time series images
,” In SPIE International Conference on Satellite Data Compression
, Aug.
.2010
DOI: 10.1117/12.860569.
, “Bormin Huang, Antonio J. Plaza and Joan Serra-Sagristà (editors)
, SPIE Conference on Satellite Data Compression, Communication, and Processing VI
, Aug.
. 2010
ISSN: 0277-786X/09
.Smart JPIP proxy server with prefetching strategies
,” In IEEE Data Compression Conference (DCC)
, Mar.
.2010
DOI: 10.1109/DCC.2010.16.
CORE A*.
, “Local average-based model of probabilities for JPEG2000 bitplane coder
,” In IEEE Data Compression Conference (DCC)
, Mar.
.2010
DOI: 10.1109/DCC.2010.12.
CORE A*.
, “Mobile agents in healthcare, a distributed intelligence approach
,” In UNKNOWN (editor)
, Computational Intelligence in Healthcare 4
, 2010
ISBN: 978-3-642-14463-9
.Mobile Agent Virtual Organisation to Improve Relative Information in Grid Services
,” In 2010 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing
, pp. 45--49
, 2010
Supervised Learning for Database Integration through
Weighted Means and {OWA} Operators
,” Control and Cybernetics
, vol. 39
, no. 4
, pp. 1011--1026
, 2010
An efficient and secure agent code distribution service
,” Software: Practice and Experience
, vol. 40
, no. 4
, pp. 363--386
, 2010
DOI: 10.1002/spe.963.
, “Towards Privacy Preserving Information Retrieval through
Semantic Microaggregation
,” In Web Intelligence and Intelligent Agent Technology,
IEEE/WIC/ACM International Conference on
, pp. 296--299
, 2010
ISBN: 978-0-7695-4191-4
.DOI: 10.1109/WI-IAT.2010.132.
, “Last results on constrained microaggregation
,” In III Simposio Sobre L{\'o}gica Fuzzy y Soft Computing,
CEDI 2010
, 2010
Despliegue de políticas condicionadas para la
protección de atributos en negociadores móviles
,” In RECSI 2010. XI Reuni{\'o}n Española sobre Criptolog{\'i}a y
Seguridad de la Informaci{\'o}n
, pp. 171--175
, 2010
Control de acceso interoperable para la mejora en la
cooperación entre grupos de emergencias
,” In RECSI 2010. XI Reuni{\'o}n Española sobre Criptolog{\'i}a y
Seguridad de la Informaci{\'o}n
, pp. 241--246
, 2010
Análisis técnico-jurídico del proceso de Iniciativa Legislativa Popular con recogida de firmas digitales en España
,” Revista de derecho y tecnolog{\'i}a
, vol. 11
, no. UNKNOWN
, pp. 191-216
, 2010
Security analysis of {JXME}-Proxyless version
,” In Actas de la XI Reuni{\'o}n Española sobre Criptologia y Seguridad de la Informaci{\'o}n (XI - RECSI)
, pp. 301-306
, 2010
ISBN: 978-84-693-3304-4
.Clasificación de las amenazas a la seguridad en sistemas {RFID} - {EPC} Gen2
,” In Actas de la XI Reuni{\'o}n Española sobre Criptologia y Seguridad de la Informaci{\'o}n (XI - RECSI)
, pp. 211-216
, 2010
ISBN: 978-84-693-3304-4
.El proceso de Iniciativa Legislativa Popular por medio de firmas digitales
,” In Actas de la XI Reuni{\'o}n Española sobre Criptologia y Seguridad de la Informaci{\'o}n (XI - RECSI)
, pp. 123-128
, 2010
ISBN: 978-84-693-3304-4
.{JXTA} security in mobile constrained devices
,” In Sixth International Symposium on Frontiers of Information Systems and Network Applications (FINA)
, pp. 139-144
, 2010
DOI: 10.1109/WAINA.2010.178.
, “Analysis and improvement of a pseudorandom number generator for EPC Gen2 tags
,” In Proceedings of the 14th international conference on Financial cryptograpy and data security
, pp. 34--46
, 2010
ISBN: 3-642-14991-X, 978-3-642-14991-7
.{XML}-based security for {JXTA} core protocols
,” International Journal of Autonomic Computing (IJAC)
, vol. 1
, no. 4
, pp. 447--469
, Dec.
.2010
DOI: 10.1504/IJAC.2010.037517.
, “Additive codes over Z2{\texttimes} {Z4}
,” In 2010 {IEEE} Information Theory Workshop, {ITW} 2010, Dublin, Ireland,
August 30 - September 3, 2010
, pp. 1--3
, 2010
DOI: 10.1109/CIG.2010.5592827.
, “On q-ary linear completely regular codes with {\(\rho\)}=2 and antipodal
dual
,” Adv. in Math. of Comm.
, vol. 4
, no. 4
, pp. 567--578
, 2010
DOI: 10.3934/amc.2010.4.567.
, “New completely regular q-ary codes based on Kronecker products
,” {IEEE} Trans. Information Theory
, vol. 56
, no. 1
, pp. 266--272
, 2010
DOI: 10.1109/TIT.2009.2034812.
, “Perfect Z2Z4-linear codes in Steganography
,” CoRR
, vol. abs/1002.0026
, no. UNKNOWN
, pp. UNKNOWN
, 2010
On lifting perfect codes
,” CoRR
, vol. abs/1002.0295
, no. UNKNOWN
, pp. UNKNOWN
, 2010
On linear q-ary completely regular codes with rho=2 and dual antipodal
,” CoRR
, vol. abs/1002.4510
, no. UNKNOWN
, pp. UNKNOWN
, 2010
Product Perfect Z2Z4-linear codes in Steganography
,” CoRR
, vol. abs/1003.4852
, no. UNKNOWN
, pp. UNKNOWN
, 2010
A dialogical approach when learning engineering ethics in a virtual education frame
,” The ``backwards, forwards and sideway'' changes of ICT
, vol. UNKNOWN
, no. UNKNOWN
, pp. 483
, 2010
2009
Articles de Journal: 19, Conferències: 21, Llibres editats: 0, Capítols de llibres: 0.
Distortion estimators for bitplane image coding
,” IEEE Trans. Image Processing
, vol. 18
, no. 8
, pp. 1772-1781
, 2009
DOI: 10.1109/TIP.2009.2022209.
IF: 3.042, Q1.
, “JPEG2000 rate-control for improved transmission of windows-of-interest in remote sensing scenarios.
,” In Proceedings of SPIE Conference on Satellite Data Compression
, vol. 7455
, Aug.
.2009
DOI: 10.1117/12.826496.
, “Highly accurate distortion estimation for JPEG2000 through pdf-based estimators
,” In IEEE Data Compression Conference (DCC)
, pp. 391-400
, Mar.
.2009
DOI: 10.1109/DCC.2009.20.
CORE A*.
, “Clustered Reversible-KLT for Progressive Lossy-to-Lossless 3d Image Coding
,” In IEEE Data Compression Conference (DCC)
, pp. 233-242
, Mar.
.2009
DOI: 10.1109/DCC.2009.7.
CORE A*.
, “Relative information in grid information service and grid monitoring using mobile agents
,” In 7th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2009)
, pp. 150--158
, 2009
Dealing with edit constraints in microdata protection:
microaggregation
,” In Joint UNECE/Eurostat Work Session on Statistical Data
Confidentiality
, Dec.
.2009
A new framework to automate constrained microaggregation
,” In Proceeding of the ACM first international workshop on Privacy
and anonymity for very large databases (Conference on
Information and Knowledge Management)
, pp. 1--8
, Nov.
. 2009
ISBN: 978-1-60558-804-9
.DOI: 10.1145/1651449.1651451.
, “Watermarking in the encrypted Domain
,” In Actas del V Congreso Iberoamericano de Seguridad Inform{\'a}tica CIBSI-09
, pp. 202-212
, 2009
ISBN: 978-9974-0-0593-8
.Maintaining unlinkability in group based P2P environments
,” In 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE)
, pp. 140-145
, 2009
ISBN: 978-0-7695-3683-5
.DOI: 10.1109/WETICE.2009.24.
, “A Security Layer for {JXTA} Core Protocols
,” In Second International Workshop on P2P, Parallel, Grid and Internet Computing (3PGIC)
, pp. 463-468
, 2009
ISBN: 978-0-7695-3575-3
.DOI: 10.1109/CISIS.2009.24.
, “A Virtual Laboratory Structure for Developing Programming Labs.
,” International Journal of Emerging Technologies in Learning (iJET)
, vol. 4
, no. S1
, pp. 47-52
, 2009
Self-Dual Codes over Z{\_}2xZ{\_}4
,” CoRR
, vol. abs/0910.3084
, no. UNKNOWN
, pp. UNKNOWN
, 2009
Construction of BBZ\({}_{\mbox{4}}\)-Linear Reed-Muller Codes
,” {IEEE} Trans. Information Theory
, vol. 55
, no. 1
, pp. 99--104
, 2009
DOI: 10.1109/TIT.2008.2008143.
, “On the Intersection of BBZ\({}_{\mbox{2}}\)BBZ\({}_{\mbox{4}}\)-Additive
Hadamard Codes
,” {IEEE} Trans. Information Theory
, vol. 55
, no. 4
, pp. 1766--1774
, 2009
DOI: 10.1109/TIT.2009.2013037.
, “On linear completely regular codes with covering radius rho=1. Construction
and classification
,” CoRR
, vol. abs/0906.0550
, no. UNKNOWN
, pp. UNKNOWN
, 2009
Propelinear structure of Z{\_}\{2k\}-linear codes
,” CoRR
, vol. abs/0907.5287
, no. UNKNOWN
, pp. UNKNOWN
, 2009
Construction of Additive Reed-Muller Codes
,” CoRR
, vol. abs/0909.3185
, no. UNKNOWN
, pp. UNKNOWN
, 2009
On the minimum distance graph of an extended Preparata code
,” CoRR
, vol. abs/0902.1351
, no. UNKNOWN
, pp. UNKNOWN
, 2009
A frame for ethical evaluation of (information) technologies
,” In 8th International Conference Computer Ethics: Philosophical Enquiry
, pp. 110
, 2009
2008
Articles de Journal: 13, Conferències: 22, Llibres editats: 0, Capítols de llibres: 1.
Remote sensing data compression
,” In Manuel Graña and Richard Duro (editors)
, Computational Intelligence for Remote Sensing
, 2008
ISBN: 978-3540793526
.Clustered Reversible-KLT for Progressive Lossy-to-Lossless 3d Image Coding
,” In SPIE Conference on Satellite Data Compression, Communication, and Processing IV (OP404). Optics and Photonics. Society of Photo-optical Instrumentation Engineers (SPIE)
, pp. 230
, vol. 7084
, Aug.
. 2008
ISSN: 9780819473042
.Self-Conducted Allocation Strategy of Quality Layers for JPEG2000
,” EURASIP Journal on Advances in Signal Processing
, vol. 2008
, no. 1
, pp. 1-7
, 2008
DOI: 10.1155/2008/728794.
IF: 1.055, Q2.
, “Image compression effects in visual analysis
,” In SPIE Conference on Satellite Data Compression
, vol. 7084
, Sep.
.2008
DOI: 10.1117/12.798572.
, “Interactive transmission of spectrally wavelet-transformed hyperspectral images
,” In SPIE Conference on Satellite Data Compression
, vol. 7084
, Sep.
.2008
DOI: 10.1117/12.794749.
, “JPEG2000 block-wise truncation of quality layers
,” In IET/IEEE International Conference on Visual Information Engineering. IEEE Press
, Jul.
.2008
JPEG2000 arbitrary ROI coding through rate-distortion optimization techniques
,” In Proc IEEE Data Compression Conference (DCC)
, Mar.
.2008
DOI: 10.1109/DCC.2008.70.
, “Hyperspectral Image Coding Using 3D Transform and the Recommendation CCSDS-122-B-1
,” In Proc IEEE Data Compression Conference (DCC)
, Mar.
.2008
DOI: 10.1109/DCC.2008.68.
, “Historial clínico distribuido y seguro para situaciones de emergencias
,” In Actas de la X Reuni{\'o}n Espa{\~n}ola de Criptolog{\'i}a y Seguridad de la Informaci{\'o}n
, pp. 503--512
, 2008
Prevención de ataques de \emph{Cross-Site Scripting}
en aplicaciones Web
,” In Actas de la X Reuni{\'o}n Española sobre Criptolog{\'i}a y
Seguridad de la Informaci{\'o}n
, pp. 369-377
, Sep.
. 2008
ISSN: 978-84-691-5158-7
.Sistema impreciso de control de acceso basado en la
conversión cuantificada de atributos para escenarios
de interoperabilidad
,” In Actas de la X Reuni{\'o}n Española sobre Criptolog{\'i}a y
Seguridad de la Informaci{\'o}n
, pp. 357-367
, Sep.
. 2008
ISSN: 978-84-691-5158-7
.A Virtual Laboratory Structure for Computer Engineering Education
,” X The International Symposium on Computers in Education, 2008. Salamanca (Spain)
, vol. 1
, no. UNKNOWN
, pp. S11:1-6
, 2008
Virtual Laboratory Ontology for Engineering Education
,” Frontiers in Education, 2008. FIE 2008. 38th Annual. Saratoga (EEUU)
, vol. 1
, no. UNKNOWN
, pp. S2F-1 Vol. 1
, 2008
DOI: 10.1109/FIE.2008.4720470.
, “An Integrated Structure for a Virtual Networking Laboratory
,” Industrial Electronics, IEEE Transactions on
, vol. 55
, no. 6
, pp. 2334-2342
, 2008
DOI: 10.1109/TIE.2008.921231.
, “A Forwarding Cooperation Protocol for Plain and Cluster-based Ad Hoc Networks
,” Journal of Communications Software and Systems (JCOMSS)
, vol. 4
, no. 1
, pp. 3-12
, 2008
Prevención de ataques de desincronización en esquemas de watermarking de audio
,” In Actas de la X Reuni{\'o}n Española sobre Criptologia y Seguridad de la Informaci{\'o}n (X - RECSI)
, pp. 551-556
, 2008
ISBN: 978-84-691-5158-7
.Gestión de recursos de un navegador web para prevenir ataques contra la privacidad en TOR
,” In Actas de la X Reuni{\'o}n Española sobre Criptologia y Seguridad de la Informaci{\'o}n (X - RECSI)
, pp. 629--638
, 2008
ISBN: 978-84-691-5158-7
.Analisis de seguridad y Privacidad para sistemas EPC-RFID
,” In Actas de la X Reuni{\'o}n Española sobre Criptologia y Seguridad de la Informaci{\'o}n (X - RECSI)
, pp. 639--646
, 2008
ISBN: 978-84-691-5158-7
.{JXTA} security in basic peer operations
,” In Actas de la IX Reuni{\'o}n Española sobre Criptologia y Seguridad de la Informaci{\'o}n (X - RECSI)
, pp. 405-414
, 2008
ISBN: 978-84-691-5158-7
.Persistent interoperable security for {JXTA}
,” In Proceedings of the Second International Workshop on P2P, Parallel, Grid and Internet Computing (3PGIC) 2008
, pp. 354-359
, 2008
{ZRM} Codes
,” {IEEE} Trans. Information Theory
, vol. 54
, no. 1
, pp. 380--386
, 2008
DOI: 10.1109/TIT.2007.911211.
, “On the Intersection of Z\({}_{\mbox{2}}\)Z\({}_{\mbox{4}}\)-Additive
Perfect Codes
,” {IEEE} Trans. Information Theory
, vol. 54
, no. 3
, pp. 1346--1356
, 2008
DOI: 10.1109/TIT.2007.915917.
, “Construction of Z4-linear Reed-Muller codes
,” CoRR
, vol. abs/0801.3024
, no. UNKNOWN
, pp. UNKNOWN
, 2008
New completely regular q-ary codes based on Kronecker products
,” CoRR
, vol. abs/0810.4993
, no. UNKNOWN
, pp. UNKNOWN
, 2008
Z2Z4-linear codes: rank and kernel
,” CoRR
, vol. abs/0807.4247
, no. UNKNOWN
, pp. UNKNOWN
, 2008
Hindrances to engineering ethics appraisal
,” In First International Conference on Ethics and Human Values in Engineering
, 2008
Ethics applied to technology: Is all well?
,” IEEE Technology and Society Magazine
, vol. 27
, no. 4
, pp. 45--49
, 2008
2007
Articles de Journal: 7, Conferències: 17, Llibres editats: 0, Capítols de llibres: 0.
JPEG2000: Quality Scalability and Windows of Interest Transmission
,” In Asilomar International Conference on Signals, Systems and Computing
, Nov.
. 2007
CORE L.
Implications of JPEG2000 lossy compression on multiple regression modeling
,” In SPIE Europe Remote Sensing 2007. Society of Photo-optical Instrumentation Engineers (SPIE)
, pp. 6749-48
, vol. 6749
, Sep.
.2007
Enhanced Quality Scalability for JPEG2000 code-streams by the Characterization of the Rate-Distortion Slope
,” In IEEE International Conference on Image Processing (ICIP)
, pp. 365-368
, vol. 2
, Sep.
. 2007
CORE B.
Interactive Decoding for the CCSDS Recommendation for Image Data Compression
,” In SPIE Europe Remote Sensing 2007. Society of Photo-optical Instrumentation Engineers (SPIE)
, vol. 6748
, Sep.
.2007
JPEG2000 Low Complexity Allocation Method of Quality Layers
,” Lecture Notes in Computer Science
, pp. 478-484
, 2007
IF: 0.402.
Modifying file syntax for Interactive Decoding the Recommendation CCSDS-122-B-1
,” In SPIE Conference on Satellite Data Compression
, vol. 6683
, Aug.
.2007
JPEG2000 Coding Techniques Addressed To Images Containing No-Data Regions
,” Lecture Notes in Computer Science
, vol. 4678
, pp. 1024-1036
, 2007
IF: 0.402.
Region Of Interest coding applied to Map Overlapping in Geographic Information Systems
,” In IEEE International Geoscience and Remote Sensing Symposium
, Jul.
. 2007
CORE C.
Low complexity JPEG2000 rate control through reverse subband scanning order and coding passes concatenation
,” IEEE Signal Processing Letters
, vol. 14
, no. 4
, pp. 251-254
, 2007
IF: 1.115, Q2.
Portfolios Virtuales Basados en Wiki para Evaluación
Continua y Evaluación por Compañeros
,” In TICAI 2006: TICs para el Aprendizaje de la Ingenier{\'i}a
, pp. 45--52
, 2007
ISBN: 978-84-8158-375-5
.Hacia una Solución Global para Servicios Médicos en
Situaciones de Emergencia
,” In Actas del II Simposio sobre Seguridad Inform{\'a}tica del
Congreso Español de Inform{\'a}tica
, pp. 217-224
, Sep.
. 2007
ISBN: 978-84-9732-607-0
.Coste de los protocolos de seguridad en redes MANET
,” In Actas del II Simposio sobre Seguridad Inform{\'a}tica [SSI'2007]. ISBN: 978-84-9732-607-0
, pp. 127-134
, 2007
Resolución de escenarios en control de acceso a grupo en entornos distribuidos
,” In CEDI: Simposio sobre seguridad inform{\'a}tica
, pp. 119-126
, 2007
Secure Dynamic MANET On-demand (SEDYMO) Routing Protocol
,” In Communication Networks and Services Research (CNSR)
, pp. 372-380
, 2007
ISBN: 0-7695-2835-X
.DOI: 10.1109/CNSR.2007.57.
, “Plotkin construction: rank and kernel
,” CoRR
, vol. abs/0707.3878
, no. UNKNOWN
, pp. UNKNOWN
, 2007
Z2Z4-linear codes: generator matrices and duality
,” CoRR
, vol. abs/0710.1149
, no. UNKNOWN
, pp. UNKNOWN
, 2007
Intersection of Hadamard Codes
,” {IEEE} Trans. Information Theory
, vol. 53
, no. 5
, pp. 1924--1928
, 2007
DOI: 10.1109/TIT.2007.894687.
, “2006
Articles de Journal: 4, Conferències: 12, Llibres editats: 0, Capítols de llibres: 0.
Compression of Hyperspectral Images Using Significant Pixel Information of Wavelet Transforms
,” In 26th International Geoscience and Remote Sensing Symposium. IEEE Press
, pp. 3549-3552
, vol. 7
, Aug.
. 2006
CORE C.
Effects of JPEG and JPEG2000 lossy compression on remote sensing image classification for mapping crops and forest areas
,” In IEEE International Geoscience and Remote Sensing Symposium
, pp. 790-793
, vol. 2
, Aug.
. 2006
CORE C.
Efficient rate control for JPEG2000 coder and decoder
,” In IEEE Data Compression Conference (DCC)
, pp. 282-291
, Mar.
. 2006
CORE A*.
Still image compression through exhaustive two-valued shape-adaptive searches
,” In IEEE Data Compression Conference (DCC)
, pp. 441
, Mar.
. 2006
CORE A*.
Noves experiències d'avaluació usant wikis: grups nombrosos i avaluació per companys
,” In Actes del 4rt Congrés Internacional de Docència Universitària i Innovació
, 2006
Secure Integration of Distributed Medical Data using
Mobile Agents
,” IEEE Intelligent Systems
, vol. 21
, no. 6
, pp. 47-54
, 2006
DOI: 10.1109/MIS.2006.120.
, “SMARTCOP A Smart Card Based Access Control for the
Protection of Network Security Components
,” In On the Move to Meaningful Internet Systems 2006: OTM 2006
Workshops
, pp. 415-424
, vol. 4277
, Oct.
. 2006
ISBN: 978-3-540-48269-7
. ISSN: 0302-9743
.DOI: 10.1007/11915034_65.
, “Protection of Components based on a Smart-card Enhanced
Security Module
,” In Critical Information Infrastructures Security
, pp. 128-139
, vol. 4347
, Sep.
. 2006
ISBN: 978-3-540-69083-2
. ISSN: 0302-9743
.DOI: 10.1007/11962977_11.
, “Enabling Mobile Agents Interoperability Through FIPA
Standards
,” In Cooperative Information Agents X
, pp. 388-401
, vol. 4149
, Sep.
. 2006
ISBN: 978-3-540-38569-1
. ISSN: 0302-9743
.DOI: 10.1007/11839354_28.
, “Protección de componentes y dispositivos de
seguridad mediante un control de acceso basado en
kernel
,” In Actas de la IX Reuni{\'o}n Española de Criptolog{\'i}a y
Seguridad de la Informaci{\'o}n
, pp. 773-787
, Jul.
. 2006
ISBN: 84-9788-502-3
.On the additive (/spl Zopf//sub 4/-linear and non-/spl Zopf//sub 4/-linear)
Hadamard codes: rank and kernel
,” {IEEE} Trans. Information Theory
, vol. 52
, no. 1
, pp. 316--319
, 2006
DOI: 10.1109/TIT.2005.860464.
, “Hadamard Codes of Length 2\({}^{\mbox{\emph{t}}}\)\emph{s} (\emph{s}
Odd). Rank and Kernel
,” In Applied Algebra, Algebraic Algorithms and Error-Correcting Codes,
16th International Symposium, AAECC-16, Las Vegas, NV, USA, February
20-24, 2006, Proceedings
, pp. 328--337
, 2006
DOI: 10.1007/11617983\_32.
, “On the intersection of additive perfect codes
,” CoRR
, vol. abs/cs/0612015
, no. UNKNOWN
, pp. UNKNOWN
, 2006
Introducció de l’Ètica al currículum d’Enginyeria Informàtica
,” 4t Congrés Internacional Docència Universitària i Innovació
, vol. UNKNOWN
, no. UNKNOWN
, pp. UNKNOWN
, 2006
2005
Articles de Journal: 5, Conferències: 16, Llibres editats: 0, Capítols de llibres: 0.
Sign and magnitude refinement encoding for lossy-to-lossless image compression
,” In WSEAS International Multiconference
, pp. 433-508
, vol. 2
, Nov.
. 2005
CORE C.
Bisk scheme applied to sign encoding and to magnitude refinement
,” Lecture Notes in Computer Science
, vol. 3708
, pp. 442-451
, 2005
IF: 0.402.
Novel JPEG2000 implementation applied to GIS scenarios
,” In SPIE International Conference on Satellite Data Compression
, pp. 159-168
, vol. 5915
, Aug.
.2005
Wavelet-based coding of ultraspectral sounder data
,” In SPIE International Conference on Satellite Data Compression
, pp. 177-186
, vol. 5889
, Aug.
.2005
Effects of JPEG2000 lossy compression on remote sensing image classification for mapping natural areas
,” In WSEAS International Multiconference
, Jul.
. 2005
CORE C.
J2K: Introducing a novel JPEG2000 coder
,” In SPIE International Conference on Visual Communications and Image Processing
, pp. 1763-1773
, vol. 5960
, Jul.
.2005
Wikibased virtual portfolios for continuous evaluation and co-evaluation
,” In International Conference on Engineering and Computer Education
, vol. 37
, 2005
ACAPS: An Access Control Mechanism to Protect the
Components of an Attack Prevention System
,” Journal of Computer Science and Network Security
, vol. 5
, no. 11
, pp. 87-94
, Nov.
.2005
Protecting On-line Casinos against Fraudulent Player
Drop-out
,” In International Conference on Information Technology
, pp. 500--506
, 2005
ISBN: 0-7695-2315-3
.DOI: 10.1109/ITCC.2005.232.
, “Digital chips for an on-line casino
,” In International Conference on Information Technology
, pp. 494--499
, Apr.
. 2005
ISBN: 0-7695-2315-3
.DOI: 10.1109/ITCC.2005.130.
, “Protección de Componentes en una Plataforma para la
Prevención de Ataques Coordinados
,” In In Proceedings of the first Spanish Conference on
Informatics (CEDI 2005), Information Security
Symposium
, pp. 265-272
, Sep.
. 2005
ISBN: 84-9732-447-1
.Quaternary Reed-Muller codes
,” {IEEE} Trans. Information Theory
, vol. 51
, no. 7
, pp. 2686--2691
, 2005
DOI: 10.1109/TIT.2005.850148.
, “Rank and kernel of binary Hadamard codes
,” {IEEE} Trans. Information Theory
, vol. 51
, no. 11
, pp. 3931--3937
, 2005
DOI: 10.1109/TIT.2005.856940.
, “2004
Articles de Journal: 3, Conferències: 13, Llibres editats: 0, Capítols de llibres: 0.
Evaluation of 1d, 2d, and 3d spiht coding technique for remote sensing
,” In SPIE International Conference on Image and Signal Processing for Remote Sensing
, pp. 273-283
, vol. 5573
, Nov.
.2004
Review of CCSDS-ILDC and JPEG2000 coding techniques for remote sensing
,” In SPIE International Conference on Image and Signal Processing for Remote Sensing
, pp. 250-261
, vol. 5573
, Nov.
.2004
Review of coding techniques applied to remote sensing
,” In IIASS International Conference on Knowledge-Based Intelligent Information and Engineering Systems
, pp. 647-653
, vol. 3213
, Sep.
. 2004
CORE B.
A generalization of image lossy data compression recommendation
,” In IEEE International Geoscience and Remote Sensing Symposium
, pp. 301-304
, vol. 1
, Sep.
. 2004
CORE C.
Analysis of CCSDS-IDC for remote sensing data compression
,” In WSEAS International Multiconference
, pp. 2176-2180
, Jul.
. 2004
CORE C.
Network and application security in mobile e-health applications
,” In International Conference on Information Networking
, pp. 995--1004
, 2004
ISBN: 978-3-540-25978-7
.Security specification and implementation for mobile e-health services
,” In IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE'04. 2004
, pp. 241--248
, 2004
DOI: 10.1109/EEE.2004.1287316.
, “Preventing coordinated attacks via alert
correlation
,” In 9th Nordic Workshop on Secure IT Systems
, pp. 110-117
, Nov.
. 2004
ISSN: 1456-7911
.Diseño y Desarrollo de un Sistema Colaborativo
para la Prevención de Ataques Coordinados
,” In In Avances en Criptolog{\'i}a y Seguridad de la
Informaci{\'o}n
, pp. 475-493
, Sep.
. 2004
ISBN: 84-7978-650-7
.Sobre la formación no técnica en la Ingeniería Informática
,” Actas de las X Jornadas de Ense{\~n}anza Universitaria de Inform{\'a}tica, Jenui
, vol. 2004
, no. UNKNOWN
, pp. 73--78
, 2004
KNOWLEDGE FROM EXPERIMENTATION AND KNOWLEDGE FROM EXPERIENCE
,” PCST 2004
, vol. UNKNOWN
, no. UNKNOWN
, pp. UNKNOWN
, 2004
Which ethics will survive in our technological society?
,” IEEE Technology and Society Magazine
, vol. 23
, no. 1
, pp. 36--39
, 2004
2003
Articles de Journal: 3, Conferències: 8, Llibres editats: 0, Capítols de llibres: 1.
Evaluation of copy right protection schemes for hyperspectral images
,” In SPIE International Conference on Image and Signal Processing for Remote Sensing
, pp. 512-523
, vol. 5238
, Sep.
.2003
Lossy coding techniques for high resolution images
,” In SPIE International Conference on Image and Signal Processing for Remote Sensing
, pp. 276-287
, vol. 5238
, Sep.
.2003
A JAVA framework for evaluating still image coders applied to remote sensing
,” In IEEE International Geoscience and Remote Sensing Symposium
, pp. 3595-3597
, vol. 6
, Jul.
. 2003
CORE C.
Exploring image coding techniques for remote sensing and geographic information systems
,” In SPIE International Conference on Visual Communications and Image Processing
, pp. 1470-1480
, vol. 5150
, Jul.
.2003
Hyperspectral image coding for remote sensing applications
,” SPIE Electronic Imaging Newsletters
, vol. 13
, no. 1
, pp. 4-8
, 2003
DigiRight: Relevance to and Potential Impact on Europe’s Need to Strengthen the Science and Technology Excellence on DRM
,” In Proceedings of the First International Mobile IPR Workshop: Rights Management of Information Products on the Mobile Internet
, pp. 127-134
, 2003
ISBN: 978-951-22-6675-3
.Framework for developing mobile agent applications
,” In Actas X Conferencia de la Asociaci{\'o}n Española para
la Inteligencia Artificial (CAEPIA 2003)
, pp. 66-67
, Nov.
.2003
The rank and kernel of extended 1-perfect Z\({}_{\mbox{4}}\)-linear
and additive non-Z\({}_{\mbox{4}}\)-linear codes
,” {IEEE} Trans. Information Theory
, vol. 49
, no. 8
, pp. 2028--2034
, 2003
DOI: 10.1109/TIT.2003.814490.
, “On Z\({}_{\mbox{4}}\)-linear Preparata-like and Kerdock-like code
,” {IEEE} Trans. Information Theory
, vol. 49
, no. 11
, pp. 2834--2843
, 2003
DOI: 10.1109/TIT.2003.819329.
, “UNKNOWN
,” In UNKNOWN (editor)
, Grafs: fonaments i algorismes
, 2003
ISBN: 978-8449014208
.2002
Articles de Journal: 6, Conferències: 8, Llibres editats: 0, Capítols de llibres: 0.
Analysis of Lossy Compression Methods Applied to Hyperspectral Images
,” In Image and Signal Processing for Remote Sensing VIII. Society of Photo-optical Instrumentation Engineers (SPIE)
, pp. 389-400
, vol. 4885
, Sep.
.2002
Improving classification accuracy of AVIRIS data by means of classifier combination
,” In 9th International Symposium on Remote Sensing. Society of Photo-optical Instrumentation Engineers (SPIE)
, pp. 367-378
, vol. 4885
, Sep.
.2002
A comparison of lossy compression methods on still and hyperspectral images
,” Mathematics of Data/Image Coding
, vol. 4793
, pp. 107-118
, Jul.
.2002
A secure multicast pay-per-view application over Internet
,” In IEEE International Conference on, Telecommunications (ICT’02)
, pp. 742-747
, vol. 1
, 2002
Mobile Agents Supporting Secure GRID Environments
,” In Euroweb 2002 Conference
, pp. 195-197
, Dec.
. 2002
ISBN: 1-902505-50-6
.Plataforma segura para la ejecución de agentes
móviles con itinerario, código y datos protegibles
,” In VII Reuni{\'o}n Española sobre Criptolog{\'i}a y
Seguridad de la Informaci{\'o}n
, pp. 765-778
, Sep.
. 2002
ISSN: 84-699-8932-4
.On binary 1-perfect additive codes: Some structural properties
,” {IEEE} Trans. Information Theory
, vol. 48
, no. 9
, pp. 2587--2592
, 2002
DOI: 10.1109/TIT.2002.801474.
, “Ranks of q-Ary 1-Perfect Codes
,” Des. Codes Cryptogr.
, vol. 27
, no. 1-2
, pp. 139--144
, 2002
On Perfect Codes: Rank and Kernel
,” Des. Codes Cryptogr.
, vol. 27
, no. 3
, pp. 183--194
, 2002
2001
Articles de Journal: 6, Conferències: 0, Llibres editats: 0, Capítols de llibres: 0.
1-Perfect Uniform and Distance Invariant Partitions
,” Appl. Algebra Eng. Commun. Comput.
, vol. 11
, no. 4
, pp. 297--311
, 2001
DOI: 10.1007/PL00004224.
, “Nonexistence of completely transitive codes with error-correcting
capability e{\textgreater}3
,” {IEEE} Trans. Information Theory
, vol. 47
, no. 4
, pp. 1619--1621
, 2001
DOI: 10.1109/18.923747.
, “{JPEG} standard uniform quantization error modeling with applications
to sequential and progressive operation modes
,” J. Electronic Imaging
, vol. 10
, no. 2
, pp. 475--485
, 2001
DOI: 10.1117/1.1344592.
, “2000
Articles de Journal: 3, Conferències: 4, Llibres editats: 0, Capítols de llibres: 0.
Enumeration of lattice points in L1 norm
,” Information Processing Letters
, vol. 76
, no. 1-2
, pp. 39-44
, Nov.
. 2000
IF: 0.331.
Adaptive Lossy Compression and Classification of Hyperspectral Images
,” In Image and Signal Processing for Remote Sensing VI. Society of Photo-optical Instrumentation Engineers (SPIE)
, pp. 214-225
, vol. 4170
, Sep.
.2000
Influence of lossy compression on classification of hyperspectral images
,” In 1st International Symposium on Hyperspectral Analysis. Universidad de Extremadura
, vol. 1
, Sep.
.2000
Influence of lossy compression on hyperspectral image classification
,” In Proceedings of Data Mining 2000. Wessex Institute of Technology Press
, vol. 1
, Jul.
.2000
XML: More Than an E-Publishing Language.
,” In ELPUB
, pp. 194--207
, 2000
ISBN: 978-1-891365-07-2
.On the nonexistence of completely transitive codes
,” {IEEE} Trans. Information Theory
, vol. 46
, no. 1
, pp. 279--280
, 2000
DOI: 10.1109/18.817528.
, “1999
Articles de Journal: 4, Conferències: 3, Llibres editats: 0, Capítols de llibres: 0.
On combinatorial equalities of coordination sequences
,” In FPSAC 99
, pp. 519-529
, Jul.
. 1999
CORE B.
Lattice points enumeration for image coding
,” In IEEE International Conference on Information, Intelligence and Systems
, pp. 482-489
, Oct.
.1999
Securing the itinerary of mobile agents through a non-repudiation protocol
,” In 33rd Annual International Carnahan Conference on Security Technology
, pp. 461-464
, Oct.
.1999
On the Characterization of Linear Uniquely Decodable Codes
,” Des. Codes Cryptogr.
, vol. 17
, no. 1-3
, pp. 87--96
, 1999
DOI: 10.1023/A:1008306605740.
, “A characterization of 1-perfect additive codes
,” {IEEE} Trans. Information Theory
, vol. 45
, no. 5
, pp. 1688--1697
, 1999
DOI: 10.1109/18.771247.
, “A solution for the coloured cubes problem
,” Theoretical computer science
, vol. 225
, no. 1-2
, pp. 171--176
, 1999
1998
Articles de Journal: 1, Conferències: 3, Llibres editats: 0, Capítols de llibres: 0.
Definition of service levels for electronic brokerage applications
,” In International Conference on Intelligence in Services and Networks
, pp. 351--362
, 1998
ISBN: 978-3-540-69343-7
.DOI: 10.1007/BFb0056980.
, “A high performance approximate algorithm for the Steiner problem in graphs
,” In International Workshop on Randomization and Approximation Techniques in Computer Science
, pp. 280--293
, 1998
A Genetic Algorithm Approach for the Steiner Problem in Graph
,” In 6th European Congress on Intelligent Techniques \& Soft Computing EVFIT'98
, 1998
1997
Articles de Journal: 1, Conferències: 2, Llibres editats: 0, Capítols de llibres: 0.
Use of WWW Technology for Client/Server Applications in MULTIMEDIATOR
,” In International Conference on Intelligence in Services and Networks
, pp. 61--68
, 1997
ISBN: 978-3-540-69155-6
.DOI: 10.1007/3-540-63135-6_6.
, “Translation-invariant propelinear codes
,” {IEEE} Trans. Information Theory
, vol. 43
, no. 2
, pp. 590--598
, 1997
DOI: 10.1109/18.556115.
, “Large scale elections by coordinating electoral colleges
,” In Information Security in Research and Business, Proceedings of the
{IFIP} {TC11} 13th International Conference on Information Security
{(SEC} '97), 14-16 May 1997, Copenhagen, Denmark
, pp. 349--362
, 1997
1996
Articles de Journal: 1, Conferències: 0, Llibres editats: 0, Capítols de llibres: 0.
An implementable secure voting scheme
,” Computers {\&} Security
, vol. 15
, no. 4
, pp. 327--338
, 1996
1995
Articles de Journal: 2, Conferències: 4, Llibres editats: 0, Capítols de llibres: 0.
Neural networks as decoders in error-correcting systems for digital data transmission
,” In Computational Learning and Probabilistic Reasoning
, pp. 1121-1128
, 1995
Digital data transmission error-correcting by neural networks
,” In International Conference on EANN95
, 1995
CORE C.
A neural network for soft-decision decoding of reed-solomon codes
,” In 7th Italian Workshop on Neural Networks (WIRN'95)
, 1995
El uso de documentos normalizados en la Comisión de la Unión Europea
,” In TECNIMAP 95: comunicaciones edici{\'o}n electr{\'o}nica: Auditorium de Palma de Mallorca, 10, 11, 12 de mayo de 1995
, pp. 594--660
, 1995
ISBN: 8-564-657-6
.A Fast Algorithm To Compute Irreducible and Primitive Polynomials
in Finite Fields
,” Mathematical Systems Theory
, vol. 28
, no. 1
, pp. 13--20
, 1995
DOI: 10.1007/BF01294593.
, “Groups of complex integers used as {QAM} signals
,” {IEEE} Trans. Information Theory
, vol. 41
, no. 5
, pp. 1512--1517
, 1995
DOI: 10.1109/18.412699.
, “1993
Articles de Journal: 2, Conferències: 1, Llibres editats: 0, Capítols de llibres: 0.
How to Avoid the Cheaters Succeeding in the Key Sharing Scheme
,” Des. Codes Cryptogr.
, vol. 3
, no. 3
, pp. 221--228
, 1993
DOI: 10.1007/BF01388483.
, “1991
Articles de Journal: 1, Conferències: 2, Llibres editats: 0, Capítols de llibres: 0.
Some upper bounds for minimal trees
,” Information processing letters
, vol. 38
, no. 4
, pp. 209--213
, 1991
1990
Articles de Journal: 1, Conferències: 1, Llibres editats: 0, Capítols de llibres: 0.
1989
Articles de Journal: 2, Conferències: 0, Llibres editats: 0, Capítols de llibres: 0.
An approximation algorithm for the TSP
,” Information processing letters
, vol. 31
, no. 2
, pp. 77--81
, 1989
On Finding Rectilinear Steiner Minimal Trees
,” Revista de Inform{\`a}tica y Autom{\`a}tica
, vol. 2
, no. 22
, pp. 40--45
, 1989
1988
Articles de Journal: 0, Conferències: 1, Llibres editats: 0, Capítols de llibres: 0.
1987
Articles de Journal: 0, Conferències: 2, Llibres editats: 0, Capítols de llibres: 0.
1986
Articles de Journal: 0, Conferències: 2, Llibres editats: 0, Capítols de llibres: 0.
Characterization of Completely Regular Codes through P-Polynomial
Association Schemes
,” In Applied Algebra, Algebraic Algorithms and Error-Correcting Codes,
4th International Conference, AAECC-4, Karlsruhe, FRG, September 23-26,
1986, Proceedings
, pp. 157--167
, 1986
DOI: 10.1007/BFb0039189.
, “From T(m) triangular graphs to single-error-correcting codes
,” In International Conference on Applied Algebra, Algebraic Algorithms, and Error-Correcting Codes
, pp. 5--12
, 1986
1985
Articles de Journal: 0, Conferències: 2, Llibres editats: 0, Capítols de llibres: 0.
Articles de Journal: 1, Conferències: 0, Llibres editats: 0, Capítols de llibres: 0.
Ethic Topics
,” UNKNOWN
, vol. UNKNOWN
, no. UNKNOWN
, pp. UNKNOWN
, .