Josep Cotrina Navau

According to our database1, Josep Cotrina Navau authored at least 30 papers between 2000 and 2014.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
A simple scheme for correcting blocks of multiple adjacent bit errors.
Proceedings of the International Symposium on Information Theory and its Applications, 2014

2011
Alternatives for Indoor Location Estimation on Uncoordinated Environments.
Proceedings of the 13th IEEE International Conference on High Performance Computing & Communication, 2011

2010
Propagation delay influence in IEEE 802.11 outdoor networks.
Wirel. Networks, 2010

A family of asymptotically good binary fingerprinting codes.
IEEE Trans. Inf. Theory, 2010

A note about the identifier parent property in Reed-Solomon codes.
Comput. Secur., 2010

2009
On the IPP Properties of Reed-Solomon Codes.
Proceedings of the Emerging Challenges for Security, 2009

Activity Recognition from Accelerometer Data on a Mobile Phone.
Proceedings of the Distributed Computing, 2009

2007
?-error.">A class of non-linear asymptotic fingerprinting codes with ?-error.
Online Inf. Rev., 2007

Tracing illegal redistribution using errors-anderasures and side information decoding algorithms.
IET Inf. Secur., 2007

A Note About the Traceability Properties of Linear Codes.
Proceedings of the Information Security and Cryptology, 2007

2006
Obtaining Traceability Codes from Chinese Reminder Theorem Codes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

<i>N</i>-sided patches with B-spline boundaries.
Comput. Graph., 2006

Families of traceability codes based on the Chinese Remainder Theorem.
Proceedings of the 2006 IEEE Information Theory Workshop, 2006

Obtaining Asymptotic Fingerprint Codes Through a New Analysis of the Boneh-Shaw Codes.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006

2005
Performance enhancement of WLAN IEEE 802.11 for asymmetric traffic.
Proceedings of the IEEE 16th International Symposium on Personal, 2005

Enhancement proposal for WLAN IEEE 802.11e: desynchronization of its working procedure.
Proceedings of the 14th IEEE Workshop on Local and Metropolitan Area Networks, 2005

Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

A New Class of Codes for Fingerprinting Schemes.
Proceedings of the Information Security Practice and Experience, 2005

Tracing Traitors by Guessing Secrets. The <i>q</i>-Ary Case.
Proceedings of the Information Security Practice and Experience, 2005

A Family of Collusion 2-Secure Codes.
Proceedings of the Information Hiding, 7th International Workshop, 2005

Practical Scenarios for the Van Trung-Martirosyan Codes.
Proceedings of the Computational Science and Its Applications, 2005

Equidistant Binary Fingerprinting Codes Existence and Identification Algorithms.
Proceedings of the Computational Science and Its Applications, 2005

2004
Wireless technology applied to GIS.
Comput. Geosci., 2004

IEEE 802.11g performance in presence of beacon control frames.
Proceedings of the IEEE 15th International Symposium on Personal, 2004

Study of asymmetric traffic influence on IEEE 802.11 WLAN family, enhancement proposals.
Proceedings of the 13th IEEE Workshop on Local and Metropolitan Area Networks, 2004

Outdoor IEEE 802.11g cellular network performance.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2002
A Generic Approach to Free Form Surface Generation.
J. Comput. Inf. Sci. Eng., 2002

Regular triangulations of dynamic sets of points.
Comput. Aided Geom. Des., 2002

2000
Modeling surfaces from meshes of arbitrary topology.
Comput. Aided Geom. Des., 2000

Modelling surfaces from planar irregular meshes.
Comput. Aided Geom. Des., 2000


  Loading...