128 results on '"Guerrero, Jordi"'
Search Results
2. Beyond the Digital Public Sphere: Towards a Political Ontology of Algorithmic Technologies
- Author
-
Viader Guerrero, Jordi
- Published
- 2024
- Full Text
- View/download PDF
3. Multirate mass transfer simulation of denitrification in a woodchip bioreactor
- Author
-
Wang, Jingjing, Carrera, Jesús, Valhondo, Cristina, Saaltink, Maarten W., Guerrero, Jordi Petchamé, Zhang, Fengshou, and Herbert, Roger B.
- Published
- 2023
- Full Text
- View/download PDF
4. Biofilm Growth in Porous Media Well Approximated by Fractal Multirate Mass Transfer With Advective‐Diffusive Solute Exchange.
- Author
-
Wang, Jingjing, Carrera, Jesús, Saaltink, Maarten W., Petchamé‐Guerrero, Jordi, Herrera, Graciela S., and Valhondo, Cristina
- Subjects
POROUS materials ,MASS transfer ,DIFFUSION control ,BIOCHEMICAL models ,OPEN spaces ,ADVECTION-diffusion equations ,POWER law (Mathematics) - Abstract
Biofilm growth in porous media changes not only the hydrodynamic properties of the medium (reduction in porosity and permeability, and increase in dispersivity), but also the transport itself (breakthrough curves display increasingly fast first arrivals and long tails). These features are well reproduced by multicontinuum models (Multi‐Rate Mass Transfer, MRMT) which can be used to describe reactive transport in heterogeneous porous media and facilitate the simulation of reactions that are localized within biofilms. Here, we present a conceptual and numerical model of biochemical reactive transport with dynamic biofilm growth based on MRMT formulations. Mass exchange between mobile water and immobile biofilm aggregates is represented by a memory function, which simplifies definition of MRMT parameters. We successfully tested this model on two sets of laboratory data and found that (a) a basic model based on the growth of uniformly sized biofilm aggregates fails to reproduce laboratory tracer tests and rate of biofilm growth, while a fractal growth model, which we obtain by integrating the memory functions of biofilm aggregates with a power law distribution, does; (b) the biofilm memory function evolves as the biofilm grows; and (c) the early time portion of eluted volume tracer breakthrough curves are independent of flow rate, whereas the tail becomes heavier when the flow rate is decreased, which implies that both advection controlled and diffusion controlled mass exchange coexist in biofilms. These findings imply that porous media biofilms are essentially different from those developing in human tissues or open spaces. Key Points: Biofilm aggregates with fractal size distributions are required for simulating growth and transport dynamicsThe evolution of anomalous transport during biofilm growth is well described by the fractal MRMT modelSolute exchange between biofilm and mobile water is both advective and diffusive [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. Big Data: Análisis de datos en entornos masivos
- Author
-
Casas Roma, Jordi, Nin Guerrero, Jordi, Julbe López, Francesc
- Published
- 2019
6. NORMalize: The First Workshop on Normative Design and Evaluation of Recommender Systems
- Author
-
Vrijenhoek, Sanne, primary, Michiels, Lien, additional, Kruse, Johannes, additional, Starke, Alain, additional, Tintarev, Nava, additional, and Viader Guerrero, Jordi, additional
- Published
- 2023
- Full Text
- View/download PDF
7. NORMalize: The First Workshop on Normative Design and Evaluation of Recommender Systems
- Author
-
Vrijenhoek, Sanne, Michiels, Lien, Kruse, Johannes, Starke, Alain, Tintarev, Nava, Viader Guerrero, Jordi, Vrijenhoek, Sanne, Michiels, Lien, Kruse, Johannes, Starke, Alain, Tintarev, Nava, and Viader Guerrero, Jordi
- Abstract
Recommender systems are among the most widely used applications of artificial intelligence. Since they are so widely used, it is important that we, as practitioners and researchers, think about the impact these systems may have on users, society, and other stakeholders. To that effect, the NORMalize workshop seeks to introduce normative thinking, to consider the norms and values that underpin recommender systems in the recommender systems community. The objective of NORMalize is to bring together a growing community of researchers and practitioners across disciplines who want to think about the norms and values that should be considered in the design and evaluation of recommender systems; and further educate them on how to reflect on, prioritise, and operationalise such norms and values. NORMalize offers a comprehensive program designed to cater to both the norm-curious and the norm-active. The morning session is on-site and features a lecture on normative thinking and an interactive workshop. The afternoon is a hybrid program focused on the dissemination of results. NORMalize publishes proceedings, as well as a technical report that summarises the outcomes of the interactive morning session.
- Published
- 2023
8. Multirate mass transfer simulation of denitrification in a woodchip bioreactor
- Author
-
Universitat Politècnica de Catalunya. Departament d'Enginyeria Civil i Ambiental, Universitat Politècnica de Catalunya. GHS - Grup d'Hidrologia Subterrània, Wang, Jingjing, Carrera Ramírez, Jesús, Valhondo González, Cristina, Saaltink, Maarten Willem, Petchamé Guerrero, Jordi, Zhang, Fengshou, Herbert, Roger, Universitat Politècnica de Catalunya. Departament d'Enginyeria Civil i Ambiental, Universitat Politècnica de Catalunya. GHS - Grup d'Hidrologia Subterrània, Wang, Jingjing, Carrera Ramírez, Jesús, Valhondo González, Cristina, Saaltink, Maarten Willem, Petchamé Guerrero, Jordi, Zhang, Fengshou, and Herbert, Roger
- Abstract
Denitrifying woodchip bioreactors (DWBs) have proven to be an efficient nature-based solution for nitrate removal. Modeling DWBs is required for improving their design and operation, but is hindered by the complexity of the modeled system where numerous chemical species and model parameters are needed. Reactions inside the woodchips are different from those at the edges, causing chemical localization (i.e., apparent simultaneous occurrence of incompatible reactions). We used the Multi Rate Mass Transfer (MRMT) approach to overcome these problems when simulating reactive transport processes in a DWB located at Kiruna, Sweden. Besides denitrification, other nitrogen-cycling processes (e.g., nitrification, dissimilatory nitrate reduction to ammonium, anammox) and alternative electron donors (e.g. oxygen, sulfate) were also considered. Biomass concentration is incorporated into the biochemical reaction rates, including growth and decay, to characterize microbial catalysis. We found that the MRMT model: 1) can account for the heterogeneity of the porous woodchips; 2) was capable of reproducing the nitrogen species evolution in the DWB with kinetic parameters from the literature; and 3) allows reproducing localized biochemical reactions (e.g., aerobic reactions on the woodchip edges, near the DWB entrance and anaerobic reactions inside); and 4) reproduces the full denitrification reactions sequence, but with the different reactions occurring in different portions of the woodchip (e.g., nitrate to nitrite near the edges and nitrite to nitrous oxide further inside). The latter observation suggests that increasing woodchip size may reduce the outflow of these undesired species., The authors acknowledge the financial support of projects NITREM, RESTORA (Agència Catalana de l'Aigua, ACA210/18/0040), and ConMimo (Spanish Research Agency, AEI, number TED2021-131188B-C31). NITREM (project number 17013) has received funding from the European Institute of Innovation and Technology (EIT). This body of the European Union received support from the European Union's Horizon 2020 research and innovation programme. Additional funding was obtained from the Generalitat de Catalunya (2017 SGR1485) and the Spanish Ministry of Science and Innovation (Centre of Excellence Severo-Ochoa, CSIC-IDAEA, CEX2018-000794-S)., Peer Reviewed, Postprint (published version)
- Published
- 2023
9. Human pose completion in partial body camera shots
- Author
-
Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Universitat Politècnica de Catalunya. CROMAI - Computing Resources Orchestration and Management for AI, Tous Liesa, Rubén, Nin Guerrero, Jordi, Igual Muñoz, Laura, Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Universitat Politècnica de Catalunya. CROMAI - Computing Resources Orchestration and Management for AI, Tous Liesa, Rubén, Nin Guerrero, Jordi, and Igual Muñoz, Laura
- Abstract
Many actual images contain partial body camera shots, in which a significant part of the body is not visible. This issue is especially prevalent in film images, where less than 10% are full-body shots. Most 2D human pose estimation methods return incomplete poses when applied to partial body images. This lack of completeness becomes a problem in some situations, for example, when the 2D pose is converted to a 3D pose by a two-stage 3D human pose estimation method since most of these methods require a complete pose to work. This article proposes a new technique, called CompletePose, consisting of completing the missing keypoints when 2D human pose estimation methods are applied to images with partial body camera shots. A Conditional Generative Adversarial Network is used to obtain a complete and plausible pose, realistic enough to predict a 3D pose with a two-stage 3D human pose estimation method. A complete empirical validation has been carried out with the Human3.6 M dataset and a new dataset, called CHARADE, specially built and made public for reproducibility and benchmarking for this research. Quantitative evaluation employing the Fréchet distance shows that the approach manages to approximate the actual data distribution. The qualitative evaluation shows that the completed poses enable obtaining plausible 3D poses from images previously intractable., This work is partially supported by the Spanish Ministry of Science and Innovation under contracts PID2019-107255GB, PLEC2021-007850 and RTI2018-095232-B-C21, and by the SGR programme of the Catalan Government under contracts 2021-SGR00478, 2017-SGR-1414 and 2017-SGR-1742., Peer Reviewed, Postprint (author's final draft)
- Published
- 2023
10. Multirate mass transfer simulation of denitrification in a woodchip bioreactor
- Author
-
European Commission, 0000-0002-8388-9153, 0000-0002-4009-5476, 0000-0002-7561-757X, Wang, Jingjing, Carrera, Jesús, Valhondo, Cristina, Saaltink, Maarten W., Guerrero, Jordi Petchamé, Zhang, Fengshou, Herbert, Roger B., European Commission, 0000-0002-8388-9153, 0000-0002-4009-5476, 0000-0002-7561-757X, Wang, Jingjing, Carrera, Jesús, Valhondo, Cristina, Saaltink, Maarten W., Guerrero, Jordi Petchamé, Zhang, Fengshou, and Herbert, Roger B.
- Abstract
Denitrifying woodchip bioreactors (DWBs) have proven to be an efficient nature-based solution for nitrate removal. Modeling DWBs is required for improving their design and operation, but is hindered by the complexity of the modeled system where numerous chemical species and model parameters are needed. Reactions inside the woodchips are different from those at the edges, causing chemical localization (i.e., apparent simultaneous occurrence of incompatible reactions). We used the Multi Rate Mass Transfer (MRMT) approach to overcome these problems when simulating reactive transport processes in a DWB located at Kiruna, Sweden. Besides denitrification, other nitrogen-cycling processes (e.g., nitrification, dissimilatory nitrate reduction to ammonium, anammox) and alternative electron donors (e.g. oxygen, sulfate) were also considered. Biomass concentration is incorporated into the biochemical reaction rates, including growth and decay, to characterize microbial catalysis. We found that the MRMT model: 1) can account for the heterogeneity of the porous woodchips; 2) was capable of reproducing the nitrogen species evolution in the DWB with kinetic parameters from the literature; and 3) allows reproducing localized biochemical reactions (e.g., aerobic reactions on the woodchip edges, near the DWB entrance and anaerobic reactions inside); and 4) reproduces the full denitrification reactions sequence, but with the different reactions occurring in different portions of the woodchip (e.g., nitrate to nitrite near the edges and nitrite to nitrous oxide further inside). The latter observation suggests that increasing woodchip size may reduce the outflow of these undesired species.
- Published
- 2023
11. La comunal de la Cadena: Espai cooperatiu agrari de Guimerà
- Author
-
Fité Font, Ramón Antonio, Camps Guerrero, Jordi, Fité Font, Ramón Antonio, and Camps Guerrero, Jordi
- Published
- 2023
12. Report on NORMalize: The First Workshop on the Normative Design and Evaluation of Recommender Systems
- Author
-
Vrijenhoek, Sanne, Michiels, Lien, Kruse, Johannes, Starke, Alain, Guerrero, Jordi Viader, Tintarev, Nava, Vrijenhoek, Sanne, Michiels, Lien, Kruse, Johannes, Starke, Alain, Guerrero, Jordi Viader, and Tintarev, Nava
- Abstract
Recommender systems are among the most widely used applications of artificial intelligence. Because of their widespread use, it is important that practitioners and researchers think about the impact they may have on users, society, and other stakeholders. To that effect, the NORMalize workshop seeks to introduce normative thinking, to consider the norms and values that underpin recommender systems in the recommender systems community. The objective of NORMalize is to bring together a growing community of researchers and practitioners across disciplines who want to think about the norms and values that should be considered in the design and evaluation of recommender systems, and further educate them on how to reflect on, prioritise, and operationalise such norms and values. This document is a report on the first workshop, co-located with ACM RecSys'23 in Singapore.
- Published
- 2023
13. Numerical solution of phase field models for two-phase flows
- Author
-
Universitat Politècnica de Catalunya. Departament d'Enginyeria Civil i Ambiental, Sala Lardies, Esther, Fernández Méndez, Sonia, Petchamé Guerrero, Jordi, Universitat Politècnica de Catalunya. Departament d'Enginyeria Civil i Ambiental, Sala Lardies, Esther, Fernández Méndez, Sonia, and Petchamé Guerrero, Jordi
- Abstract
Phase-field models describe the motion of multiphase flows using smooth interfaces across which the composition changes continuously. The phase-field variable represents a measure of phase as it quantifies relative differences or fractions of the fluid s components. The Cahn-Hilliard equation was originally proposed to model spinodal decomposition and coarsening in binary alloys. To this day, it has become broad ranged in its applicability. This thesis focuses on solving the Cahn-Hilliard equation numerically. A review of the mathematical modelling is made in order to develop numerical methods. Different numerical simulations in two dimensions are implemented to study the numerical and physical properties. Two realistic physical examples are also numerically solved.
- Published
- 2022
14. Numerical solution of phase field models for two-phase flows
- Author
-
Petchamé Guerrero, Jordi, Sala Lardies, Esther, Fernández Méndez, Sonia, and Universitat Politècnica de Catalunya. Departament d'Enginyeria Civil i Ambiental
- Subjects
35 Partial differential equations::35Q Equations of mathematical physics and other areas of application [Classificació AMS] ,Phase-field models ,Equacions en derivades parcials ,Matemàtiques i estadística::Equacions diferencials i integrals::Equacions en derivades parcials [Àrees temàtiques de la UPC] ,Differential equations, Partial ,Two-phase flows ,Cahn-Hilliard equation - Abstract
Phase-field models describe the motion of multiphase flows using smooth interfaces across which the composition changes continuously. The phase-field variable represents a measure of phase as it quantifies relative differences or fractions of the fluid s components. The Cahn-Hilliard equation was originally proposed to model spinodal decomposition and coarsening in binary alloys. To this day, it has become broad ranged in its applicability. This thesis focuses on solving the Cahn-Hilliard equation numerically. A review of the mathematical modelling is made in order to develop numerical methods. Different numerical simulations in two dimensions are implemented to study the numerical and physical properties. Two realistic physical examples are also numerically solved.
- Published
- 2022
15. From the classical to the stochastic heat equation
- Author
-
Petchamé Guerrero, Jordi and Sanz-Solé, Marta
- Subjects
Bachelor's thesis ,Equació de la calor ,Anàlisi estocàstica ,Equacions en derivades parcials ,Heat equation ,Bachelor's theses ,Gaussian processes ,Processos gaussians ,Treballs de fi de grau ,Stochastic analysis ,Partial differential equations - Abstract
Treballs Finals de Grau de Matemàtiques, Facultat de Matemàtiques, Universitat de Barcelona, Any: 2021, Director: Marta Sanz, [en] This bachelor’s thesis revolves around the connection between stochastic processes and the heat equation. The main goal is to carry out a thorough study of the transition from the classical to the stochastic one-dimensional heat equation. In order to develop the mathematical framework for linear stochastic partial differential equations, we use tools of basic probability theory, calculus and functional analysis. We start with a concise study of the classical deterministic heat equation, from its physical derivation to the search for explicit solutions under specific conditions. Then, we describe the mathematical foundations of the stochastic version of this partial differential equation, focusing on Gaussian stochastic processes. On that basis, we define the stochastic heat equation on $\mathbb{R}$. Finally, we conclude this project with a comprehensive analysis of its solutions’ continuity properties.
- Published
- 2021
16. Zoom Interdisciplinari. 3 (2021). L’habitatge: una necessitat bàsica de la població no resolta
- Author
-
Allepuz i Capdevila, Rafael, Enciso Rodríguez, Joan Pere, Pelegrí Viaña, Xavier, Farré Monjo, Assumpció, Villoria Mombiela, Miriam, Morell i Rosell, Ramon, Vallverdú Cortada, Anna, Cortada i Cortijo, Neus, Lázaro Ayuso, Francisco Javier, Guerrero, Jordi, Majoral, Rosa, Morros, Èric, Mateu, Carme, Universitat de Lleida. Càtedra Obra Social 'La Caixa' d’Estudis sobre Desigualtats Socials, Allepuz i Capdevila, Rafael, Balsells, M. Àngels, Camps Mirabet, Núria, Cortada i Cortijo, Neus, Domingo, Jordi (Domingo i Coll), Enciso Rodríguez, Joan Pere, Gea Sánchez, Montserrat, Lapresta Rey, Cecilio, Mata Romeu, Anna, Mateos, José Tomás, Pastells Peiró, Roland, and Pelegrí Viaña, Xavier
- Subjects
Desigualtat social -- Lleida (Catalunya) -- Revistes ,Pobresa -- Lleida (Catalunya) -- Revistes ,Habitatge -- Lleida (Catalunya) -- Revistes ,Habitatge des de la perspectiva social - Abstract
En aquest quadern us presentem una sèrie de reflexions realitzades per un grup de professionals de diferents àmbits com l’acadèmic, el tècnic i el social. En aquesta ocasió el tema que tractem i analitzem és el de l’habitatge des de la perspectiva social. Portem anys que les problemàtiques en l’accés i en les condicions d’habitabilitat s’estan convertint en un dels principals eixos de l’exclusió social. Ja fa temps que s’utilitza el terme d’exclusió residencial com a dimensió amb identitat pròpia dins de les anàlisi de la pobresa i l’exclusió social. L’exclusió residencial i la social formen part d’un mateix entramat social. L’informe del Relator Especial sobre l’extrema pobresa i els drets humans, amb data 21 d’abril de l’any 2020, declara que a Espanya tot i que el govern ha reconegut que l’habitatge és fonamental per a combatre la pobresa, s’ha fet molt poc per a garantir el dret a l’habitatge de forma universal. En aquest context l’arribada de la pandèmia del coronavirus ha suposat l’adopció d’una sèrie de mesures amb l’objectiu de reduir en lo possible els efectes negatius que aquesta pot suposar per a les persones i famílies més vulnerables l’accés i les condicions d’habitatge. El quadern que teniu a mans està format per una sèrie d’articles escrits des de la interdisciplinarietat que representen els seus autors i autores i que tracten sobre diferents qüestions relacionades amb l’habitatge i que ens preocupen des de la perspectiva social. Amb l’objectiu de donar una visió amplia del tema el quadern comença amb dos escrits de professors del Departament d’Economia Aplicada de la Universitat de Lleida en els que es posen de manifest la problemàtica de l’habitatge tant des d’una perspectiva individual com col·lectiva. Persones, grups de població i societat en general són víctimes d’una dinàmica excessivament mercantilista de l’anomenat mercat de l’habitatge amb les repercussions corresponents en les condicions de vida. A continuació dos escrits vinculats amb el paper que els Serveis Socials desenvolupen, o haurien de desenvolupar, en l’atenció a les necessitats d’habitatge per part de la població més vulnerable. Se’ns planteja la difícil gestió de la problemàtica de l’habitatge des de l’atenció primària bàsica. A aquests dos escrits acompanya un tercer en el que es reflexiona sobre la manca de voluntat política per afavorir la resolució de la problemàtica de l’habitatge a la ciutat de Lleida. Segueixen dos escrits de l’àmbit jurídic en els que es valoren algunes de les mesures adoptades durant la pandèmia per facilitar l’accés de la població a habitatges de lloguer, fent una aportació crítica de les mateixes. Tot i la voluntat de les mesures, han estat insuficients. El darrer bloc està format per quatre escrits en els que es plantegen accions dutes a terme per iniciatives privades per afavorir als col·lectius de població més vulnerable l’accés a un habitatge digne des de diferents formes de tinença o no tinença. El primer d’aquests escrits fa una breu reflexió sobre les propostes alternatives en un marc de difícil accés a l’habitatge. Esperem que aquestes reflexions siguin útils i il·lustratives per a les persones que les llegeixin. Aquesta, i no altra, és la nostra voluntat. Creiem que des de la nostra atalaia universitària podem fer una aportació d’interès i enriquir el debat social, amb l’objectiu de millorar les possibles anàlisis que es puguin fer i de donar pistes i orientacions a aquelles persones que, en moments molt complicats, han de prendre decisions.
- Published
- 2021
17. Answering Multiple Aggregate Queries Under a Specific Privacy Condition
- Author
-
Aranda, Jordi, primary, Nin Guerrero, Jordi, additional, and Herranz, Javier, additional
- Published
- 2018
- Full Text
- View/download PDF
18. On the use of social trajectory-based clustering methods for public transport optimization
- Author
-
Nin Guerrero, Jordi, Carrera Pérez, David, Villatoro, Daniel, Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Barcelona Supercomputing Center, and Universitat Politècnica de Catalunya. CAP - Grup de Computació d'Altes Prestacions
- Subjects
Metric spaces ,Geospatial clustering ,Sistemes d'informació geogràfica ,Cloud computing ,High performance computing ,Geographic information systems ,Càlcul intensiu (Informàtica) ,Informàtica::Arquitectura de computadors [Àrees temàtiques de la UPC] ,OSA distance ,Smart cities - Abstract
Public transport optimisation is becoming everyday a more di cult and challenging task, because of the increasing number of transportation options as well as the exponential increase of users. Many research contributions about this issue have been recently published under the umbrella of the smart cities research. In this work, we sketch a possible framework to optimize the tourist bus in the city of Barcelona. Our framework will extract information from Twitter and other web services, such as Foursquare to infer not only the most visited places in Barcelona, but also the trajectories and routes that tourist follow. After that, instead of using complex geospatial or trajectory clustering methods, we propose to use simpler clustering techniques as k-means or DBScan but using a real sequence of symbols as a distance measure to incorporate in the clustering process the trajectory information. This work is partially supported by the Ministry of Science and Technology of Spain under contract TIN2012-34557 and by the BSC-CNS Severo Ochoa program (SEV-2011-00067) and with the support of ACC1Ó, the Catalan Agency to promote applied research and innovation; and by the Spanish Centre for Development of Industrial Technology under the INNPRONTA program, project IPT-20111006, \CIUDAD2020".
- Published
- 2014
19. El Gobierno civil de Tarragona : la percepción precisa de un lugar
- Author
-
Guerrero, Jordi
- Published
- 2014
20. Twetsi: Anàlisi de dades de Twitter en base de dades en grafs
- Author
-
Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Nin Guerrero, Jordi, Tous Liesa, Rubén, Varias Perez, Victor, Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Nin Guerrero, Jordi, Tous Liesa, Rubén, and Varias Perez, Victor
- Published
- 2015
21. Plataforma web para el desarrollo de aplicaciones Big Data con Apache Spark
- Author
-
Casado Arias, Pablo, Nin Guerrero, Jordi, Balastegui Julian, Daniel, Casado Arias, Pablo, Nin Guerrero, Jordi, and Balastegui Julian, Daniel
- Published
- 2015
22. Implementing privacy-preserving filters in the MOA stream mining framework
- Author
-
Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Nin Guerrero, Jordi, Martínez Rodríguez, David, Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Nin Guerrero, Jordi, and Martínez Rodríguez, David
- Abstract
[CATALÀ] S'han implementat mètodes d'SDC en quatre filtres de privacitat pel software MOA. Els algorismes han estat adaptats de solucions conegudes per habilitar el seu ús en entorns de processament de fluxos. Finalment, han estat avaluats en termes del risc de revelació i la pèrdua d'informació., [ANGLÈS] Four MOA privacy-preserving filters have been developed to implement some SDC methods. The algorithms have been adapted from well-known solutions to enable their use in streaming settings. Finally, they have been benchmarked to assess their quality in terms of disclosure risk and information loss.
- Published
- 2015
23. Revisiting distance-based record linkage for privacy-preserving release of statistical datasets
- Author
-
Universitat Politècnica de Catalunya. Departament de Matemàtiques, Universitat Politècnica de Catalunya. MAK - Matemàtica Aplicada a la Criptografia, Universitat Politècnica de Catalunya. CAP - Grup de Computació d'Altes Prestacions, Herranz Sotoca, Javier, Nin Guerrero, Jordi, Rodríguez, Pablo, Tassa, Tamir, Universitat Politècnica de Catalunya. Departament de Matemàtiques, Universitat Politècnica de Catalunya. MAK - Matemàtica Aplicada a la Criptografia, Universitat Politècnica de Catalunya. CAP - Grup de Computació d'Altes Prestacions, Herranz Sotoca, Javier, Nin Guerrero, Jordi, Rodríguez, Pablo, and Tassa, Tamir
- Abstract
Statistical Disclosure Control (SDC, for short) studies the problem of privacy-preserving data publishing in cases where the data is expected to be used for statistical analysis. An original dataset T containing sensitive information is transformed into a sanitized version T' which is released to the public. Both utility and privacy aspects are very important in this setting. For utility, T' must allow data miners or statisticians to obtain similar results to those which would have been obtained from the original dataset T. For privacy, T' must significantly reduce the ability of an adversary to infer sensitive information on the data subjects in T. One of the main a-posteriori measures that the SDC community has considered up to now when analyzing the privacy offered by a given protection method is the Distance-Based Record Linkage (DBRL) risk measure. In this work, we argue that the classical DBRL risk measure is insufficient. For this reason, we introduce the novel Global Distance-Based Record Linkage (GDBRL) risk measure. We claim that this new measure must be evaluated alongside the classical DBRL measure in order to better assess the risk in publishing T' instead of T. After that, we describe how this new measure can be computed by the data owner and discuss the scalability of those computations. We conclude by extensive experimentation where we compare the risk assessments offered by our novel measure as well as by the classical one, using well-known SDC protection methods. Those experiments validate our hypothesis that the GDBRL risk measure issues, in many cases, higher risk assessments than the classical DBRL measure. In other words, relying solely on the classical DBRL measure for risk assessment might be misleading, as the true risk may be in fact higher. Hence, we strongly recommend that the SDC community considers the new GDBRL risk measure as an additional measure when analyzing the privacy offered by SDC protection algorithms., Postprint (author's final draft)
- Published
- 2015
24. Proposta de millora per a la qualitat ambiental del bosc de ribera de Santa Maria de les Franqueses
- Author
-
Larrègula Guerrero, Jordi, Casals i Martí, Frederic, and Universitat de Lleida. Escola Tècnica Superior d'Enginyeria Agrària.
- Subjects
504 - Ciències del medi ambient ,Explotació forestal -- Santa Maria de les Franqueses (Balaguer) ,Boscos -- Balaguer (Catalunya) ,Ecologia fluvial -- Segre (Riu) - Abstract
Estudi de la viabilitat de restitució del sistema fluvial de la manera més natural possible al seu pas per la partida de Santa Maria de les Franqueses (Balaguer), a fi i efecte de mantenir els processos i interaccions ecològiques i hidrogeomorfològiques del sistema per tal d’aconseguir que millori la dinàmica fluvial, la capacitat d’acollida de les espècies de fauna i faciliti els seus moviments a través del corredor fluvial.
- Published
- 2010
25. Dynamic reputation-based trust computation in private networks
- Author
-
Nin Guerrero, Jordi|||0000-0002-9659-2762, Carminati, Barbara, Ferrari, Elena, Torra i Reventós, Vicenç, Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, and Universitat Politècnica de Catalunya. DMAG - Grup d'Aplicacions Multimèdia Distribuïdes
- Subjects
Xarxes socials ,Ordinadors, Xarxes d' -- Mesures de seguretat ,Informàtica::Seguretat informàtica [Àrees temàtiques de la UPC] ,Computer networks -- Security measures ,Trust ,Social networks - Abstract
Technical Report IIIA-TR-2009-02 The use of collaborative networks services in general, and web based social networks (WBSN) services in particular, is today increasing and, therefore, the protection of the resources shared by network participants is becoming a crucial need. In a collaborative network, one of the main parameters on which access control relies is represented by trust and reputation, since access to a resource may or may not be granted on the basis of the trust/reputation of the requesting node. Therefore, the calculation of the trust of the nodes becomes a very important issue, mainly in business to business (BtoB) social networks, where trustworthy nodes can increase their benefits taking profit of their good reputation in the network. In order to address this point, in this paper we propose a mechanism to dynamically compute nodes trust, based on their past behavior. The key characteristic of our proposal is that trust is computed in a private way. This is obtained by anonymizing the local log files storing information about nodes actions.
- Published
- 2009
26. Contributions to Record Linkage for Disclosure Risk Assessment
- Author
-
Nin Guerrero, Jordi, Torra i Reventós, Vicenç, and Universitat Autònoma de Barcelona. Departament de Ciències de la Computació
- Subjects
Record linkage ,Ciències Experimentals ,Privadesa ,Privacy - Abstract
Cada dia una gran quantitat de dades són recollides pels instituts d'estadística. Aquest fet combinat amb el creixement que ha experimentat Internet en els darrers anys fa que hom es pregunti si les seves dades confidencials són emmagatzemades i distribuïdes d'una manera privada i segura.En aquest marc, els mètodes de protecció de dades tenen una gran importància, convertint-se en crucial anonimitzar les dades abans de la seva publicació. Quan anonimitzem un conjunt de dades amb un mètode de protectió, s'ha d'avaluar el grau de privadesa de les noves dades protegides. Les tècniques de re-identificació, com l'enllaç de registres, són unes de les tècniques més utilitzades per avaluar la seguretat d'un mètode de protecció.Aquesta tesi aplica mètodes d'enllaç de registres al càlcul del risc de revelació dels diferents mètodes de protecció de dades. L'objectiu d'aquest procés és avaluar la seguretat d'un mètode de protecció d'una forma pràctica i real. Les principals contribucions d'aquesta tesis són:· La definició de tres mètodes d'enllaç de registres dissenyats per avaluar el risc de revelació de dos dels mètodes d'anonimització més utilitzats: la microagregació i l'intercanvi de rangs.· La formalització d'una mesura empírica que avalua el risc de revelació de la microagregació multi variable.· El desenvolupament de noves variants dels mètodes de protecció clàssics que són resistents a les tècniques d'enllaç de registres definides dins d'aquesta tesi.· L'estudi de nous escenaris on el risc de revelació encara existeix. Concretament, hem definit un mètode de re-identificació basat en funcions d'agregació que permet re-identificar individus quan l'intrús no té accés a les dades originals abans d'ésser protegides. També hem desenvolupat un marc per a l'avaluació de mètodes de protecció quan aquests s'apliquen a series temporals. En aquest darrer escenari hem definit una serie de mesures per avaluar la pèrdua d'informació i el risc de revelació., Every day, a large amount of data is collected by statistical agencies. This fact combined with the growth that the Internet has experimented during the recent years makes one wonders whether its confidential data is stored and distributed in a secure way.In this framework, data protection methods have a great importance, becoming crucial to anonymize confidential attributes before releasing them in a private and secure manner. When a protection method is applied, a new and challenging problem arises. This problem is the evaluation of the privacy provided by such method. Re-identification techniques, as record linkage methods, are one of the most common techniques for evaluating the security of a protection method.This thesis applies record linkage techniques to the calculation of the disclosure risk of a protection method. The aim of this application is to evaluate the security of a protection method in a real and fair way. The main contributions are:· The definition of three specific record linkage techniques for evaluating two of the most common protection methods: rank swapping and microaggregation.· The definition of an empirical disclosure risk measure for microaggregation.· The development of new variants of rank swapping and microaggregation resistant to record linkage methods and disclosure risk measures defined in this thesis. · The study of new disclosure risk scenarios. In particular, we have developed a record linkage method which applies aggregation functions to re-identify individuals when the intruder has no access to any of the original attributes of the protected data. We have also developed a framework for the evaluation of protection methods when they are applied to time series data.
- Published
- 2008
27. Modeling projections in microaggregation
- Author
-
Nin Guerrero, Jordi, Torra i Reventós, Vicenç, and Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors
- Subjects
Protecció de dades ,Informàtica::Seguretat informàtica [Àrees temàtiques de la UPC] ,Microaggregation ,Statistical disclosure control ,Sugeno Integral ,Data protection - Abstract
Microaggregation is a method used by statistical agencies to limit the disclosure of sensitive microdata. It has been proven that microaggregation is an NP-hard problem when more than one variable is microaggregated at the same time. To solve this problem in a heuristic way, a few methods based on projections have been introduced in the literature. The main drawback of such methods is that the projected axis is computed maximizing a statistical property (e.g., the global variance of the data), disregarding the fact that the aim of microaggregation is to keep the disclosure risk as low as possible for all records. In this paper we present some preliminary results on the application of aggregation functions for computing the projected axis. We show that, using the Sugeno integral to calculate the projected axis, we can reduce in some cases the disclosure risk of the protected data (when projected microaggregation is used).
- Published
- 2008
28. Blocking anonymized data
- Author
-
Nin Guerrero, Jordi, Torra i Reventós, Vicenç, and Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors
- Subjects
Protecció de dades ,Record linkage ,Informàtica::Seguretat informàtica [Àrees temàtiques de la UPC] ,Blocking methods ,OWA operators ,Data protection - Abstract
Nowadays, privacy is an important issue, for this reason many researchers are working in the development of new data protection methods. The aim of these methods is to minimize the disclosure risk (DR) preserving the data utility. Due to this, the development of better methods to evaluate the DR is an increasing demand. A standard measure to evaluate disclosure risk is record linkage (RL). Normally, when data sets are very large, RL has to split the data sets into blocks to reduce its computational cost. Standard blocking methods need a non protected attribute to build the blocks and, for this reason, they are not a good option when the protected data set is completely masked. In this paper, we propose a new blocking method which does not need a blocking key to build the blocks, and therefore, it is suitable to split fully protected data sets. The method is based on aggregation operators. In particular, in the OWA operator.
- Published
- 2007
29. Parameter determination of ONN (Ordered Neural Networks)
- Author
-
Pont Tuset, Jordi, Medrano Gracia, Pau, Nin Guerrero, Jordi, Larriba Pey, Josep, Muntés Mulero, Víctor, Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Universitat Politècnica de Catalunya. Departament de Teoria del Senyal i Comunicacions, Universitat Politècnica de Catalunya. DMAG - Grup d'Aplicacions Multimèdia Distribuïdes, and Universitat Politècnica de Catalunya. DAMA-UPC - Data Management Group
- Subjects
Neural networks (Computer science) ,ONN ,Informàtica::Sistemes d'informació::Bases de dades [Àrees temàtiques de la UPC] ,Xarxes neuronals (Informàtica) -- Disseny - Abstract
The need for data privacy motivates the development of new methods that allow to protect data minimizing the disclosure risk without losing information. In this paper, we propose a new protection method for numerical data called Ordered Neural Networks (ONN) method. ONN presents a new way to protect data based on the use of Artificial Neural Networks (ANN). ONN combines the use of ANN with a new strategy for preprocessing data consisting in the vectorization, sorting and partitioning of all the values in the attributes to be protected in the data set. We also present an statistical analysis that allows to understand the most important parameters affecting the quality of our method, and we show that it is possible to find a good configuration for these parameters. Finally, we compare our method to the best methods presented in the literature, using data provided by the US Census Bureau. Our experiments show that ONN outperforms the previous methods proposed in the literature, proving that the use of ANNs in these situations is convenient to protect the data efficiently without losing the statistical properties of the set.
- Published
- 2007
30. Fuzzy measures and integrals in re-identification problems
- Author
-
Nin Guerrero, Jordi|||0000-0002-9659-2762, Torra i Reventós, Vicenç, Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, and Universitat Politècnica de Catalunya. DMAG - Grup d'Aplicacions Multimèdia Distribuïdes
- Subjects
Record linkage ,Data cleaning ,Fuzzy integrals ,Informàtica::Sistemes d'informació [Àrees temàtiques de la UPC] ,Privacy preserving data mining ,OWA operators ,Mineria de dades ,Data minig - Abstract
In this paper we give an overview of our approach of using aggregation operators, and more specifically, fuzzy integrals for solving re-identification problems. We show that the use of Choquet integrals are suitable for some kind of problems.
- Published
- 2006
31. Towards the use of OWA operators for record linkage
- Author
-
Nin Guerrero, Jordi, Torra i Reventós, Vicenç, and Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors
- Subjects
Protecció de dades ,Record linkage ,Data cleaning ,Privacy preserving data mining ,Informàtica::Sistemes d'informació::Emmagatzematge i recuperació de la informació [Àrees temàtiques de la UPC] ,OWA operators ,Mineria de dades ,Data mining ,Data protection - Abstract
Record linkage is used to establish links between those records that while belonging to two different files correspond to the same individual. Classical approaches assume that the two files contain some common variables, that are the ones used to link the records. Recently, we introduced a new approach to link records among files when such common variables are not available. In this approach, reidentification is based on the so-called structural information. In this paper we study the use of OWA operators for extracting such structural information and, thus, allowing re-identification.
- Published
- 2005
32. Hermes: Distributed social network monitoring system
- Author
-
Solé Simó, Marc, Nin Guerrero, Jordi, Cea Royes, Daniel, Solé Simó, Marc, Nin Guerrero, Jordi, and Cea Royes, Daniel
- Abstract
[ANGLÈS] Nowadays, social network services play a very important role in the way people interact with each other and with the world. This generates big amounts of data that can be used to study social relationships and extract useful information about preferences and trends. When analysing this information, two main problems emerge: The need to aggregate dif- ferent data coming from multiple sources, and hardware limitations due to the incapability traditional systems have to deal with large amounts of data. In order to solve the problems mentioned before, this project aims to implement a distributed, scalable social media analysis tool, ready to connect and gather data from multiple sources and show the aggregated results in real-time., [CASTELLÀ] Hoy en día, las redes sociales juegan un papel muy importante en la manera como las personas interactúa entre ellos y con el mundo. Esto genera grandes volúmenes de inforación que pueden ser utilizados para estudiar las relaciones sociales y extraer información útil acerca de gustos y tendencias. Cuando se analiza esta información, surgen dos problemas principales: La necesidad de agregar diferentes datos provenientes de múltiples fuentes, y las limitaciones hardware por la incapacidad de los sistemas tradicionales de manejar grandes cantidades de datos. Para poder solventar estos problemas, este proyecto propone implementar una herramienta de análisis de redes sociales distribuida y escalable, preparada para conectarse y recolectar datos de múltiples fuentes y mostrar los resultados agregados en tiempo real., [CATALÀ] Avui en dia, les xarxes socials juguen un paper molt important en la manera com les persones interactua entre ells i amb el mon. Això genera grans quantitats de dades que poden ser utilitzats per estudiar les relacions socials i extreure informació útil sobre gustos i tendències. 2 Quan s’analitza aquesta informació, sorgeixen dos problemes principals: La necessitat de agregar diferents dades provinents de múltiples fonts, i les limitacions hardware per la incapaci- tat dels sistemes tradicionals de gestionar grans quantitats de dades. Per poder solucionar aque- sts problemes, aquest projecte proposa implementar una eina d’anàlisi de xarxes socials dis- tribuïda i escalable, preparada per connectar-se i recol·lectar dades de múltiples fonts i mostrar els resultats agregats en temps real.
- Published
- 2014
33. Foodstagram
- Author
-
Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Nin Guerrero, Jordi, Reina Molina, Jordi, Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Nin Guerrero, Jordi, and Reina Molina, Jordi
- Abstract
[CASTELLÀ] Foodstagram es una aplicación que permite al usuario visualizar en un mapa fotografías de restaurantes de Cataluña. Las fotos que se muestran son capturadas en tiempo real de las enviadas por los usuarios de Instagram. Estas fotos pasarán una serie de filtros para ser seleccionadas., [ANGLÈS] Foodstagram is a appication that allows the user view on a map photos from restaurants of Catalonia. Shown photos are captured in real time from the Instagram users. These photos will go through a series of filters for be selected.
- Published
- 2014
34. Worker ranking determination in crowdsourcing platforms using aggregation functions
- Author
-
Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Universitat Politècnica de Catalunya. CAP - Grup de Computació d'Altes Prestacions, Sanchez Charles, David, Nin Guerrero, Jordi, Solé Simó, Marc, Muntés Mulero, Victor, Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Universitat Politècnica de Catalunya. CAP - Grup de Computació d'Altes Prestacions, Sanchez Charles, David, Nin Guerrero, Jordi, Solé Simó, Marc, and Muntés Mulero, Victor
- Abstract
The increasing adoption of crowdsourcing for commercial and industrial purposes rises the need for creating sophisticated mechanisms in crowd-based digital platforms for efficient worker management. One of the main challenges in this area is worker motivation and skill set control and its impact on the output quality. The quality delivered by the workers in the crowd depends on different aspects such as their skills, experience, commitment, etc. The lack of generic and detailed proposals to incentive workers and the need for creating ad-hoc solutions depending on the domain make it difficult to evaluate the best rewarding functions in each scenario. In this paper, we make a step further in this direction and propose the use of aggregation functions to evaluate the professional skills of crowd-workers based on the quality of their past tasks. Additionally, we present a real industrial crowdsourcing solution for software localisation in which the proposed solutions are put into practice with real text translations quality measures., Peer Reviewed, Postprint (author’s final draft)
- Published
- 2014
35. On the use of social trajectory-based clustering methods for public transport optimization
- Author
-
Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Barcelona Supercomputing Center, Universitat Politècnica de Catalunya. CAP - Grup de Computació d'Altes Prestacions, Nin Guerrero, Jordi, Carrera Pérez, David, Villatoro, Daniel, Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Barcelona Supercomputing Center, Universitat Politècnica de Catalunya. CAP - Grup de Computació d'Altes Prestacions, Nin Guerrero, Jordi, Carrera Pérez, David, and Villatoro, Daniel
- Abstract
Public transport optimisation is becoming everyday a more di cult and challenging task, because of the increasing number of transportation options as well as the exponential increase of users. Many research contributions about this issue have been recently published under the umbrella of the smart cities research. In this work, we sketch a possible framework to optimize the tourist bus in the city of Barcelona. Our framework will extract information from Twitter and other web services, such as Foursquare to infer not only the most visited places in Barcelona, but also the trajectories and routes that tourist follow. After that, instead of using complex geospatial or trajectory clustering methods, we propose to use simpler clustering techniques as k-means or DBScan but using a real sequence of symbols as a distance measure to incorporate in the clustering process the trajectory information., This work is partially supported by the Ministry of Science and Technology of Spain under contract TIN2012-34557 and by the BSC-CNS Severo Ochoa program (SEV-2011-00067) and with the support of ACC1Ó, the Catalan Agency to promote applied research and innovation; and by the Spanish Centre for Development of Industrial Technology under the INNPRONTA program, project IPT-20111006, \CIUDAD2020"., Postprint (author’s final draft)
- Published
- 2014
36. Towards the cloudification of the social networks analytics
- Author
-
Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Universitat Politècnica de Catalunya. CAP - Grup de Computació d'Altes Prestacions, Cea, Daniel, Nin Guerrero, Jordi, Tous Liesa, Rubén, Torres Viñals, Jordi, Ayguadé Parra, Eduard, Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Universitat Politècnica de Catalunya. CAP - Grup de Computació d'Altes Prestacions, Cea, Daniel, Nin Guerrero, Jordi, Tous Liesa, Rubén, Torres Viñals, Jordi, and Ayguadé Parra, Eduard
- Abstract
In the last years, with the increase of the available data from social networks and the rise of big data technologies, social data has emerged as one of the most profitable market for companies to increase their benefits. Besides, social computation scientists see such data as a vast ocean of information to study modern human societies. Nowadays, enterprises and researchers are developing their own mining tools in house, or they are outsourcing their social media mining needs to specialised companies with its consequent economical cost. In this paper, we present the first cloud computing service to facilitate the deployment of social media analytics applications to allow data practitioners to use social mining tools as a service. The main advantage of this service is the possibility to run different queries at the same time and combine their results in real time. Additionally, we also introduce twearch, a prototype to develop twitter mining algorithms as services in the cloud., Peer Reviewed, Postprint (author’s final draft)
- Published
- 2014
37. Intranet CFIS
- Author
-
Nin Guerrero, Jordi, Alemany Carrasco, Daniel, Nin Guerrero, Jordi, and Alemany Carrasco, Daniel
- Published
- 2014
38. Desenvolupament d'una eina de branding a Twitter
- Author
-
Nin Guerrero, Jordi, Pericas Arriola, Oriol, Nin Guerrero, Jordi, and Pericas Arriola, Oriol
- Abstract
[CATALÀ] Desenvolupament d'una aplicació web que serveixi com a eina d'anàlisi sentimental a través de la xarxa social Twitter per comprendre d'una manera general quina és la opinió del públic sobre un producte, una marca, un esdeveniment o qualsevol concepte., [ANGLÈS] Development of a web application that serves as a sentiment analysis tool using Twitter data, aiming to give a better understanding of what the users think of a product, brand, event or any other subject.
- Published
- 2014
39. Crawler de fotografies per events geolocalitzats
- Author
-
Nin Guerrero, Jordi, Català Amat, Jordi, Nin Guerrero, Jordi, and Català Amat, Jordi
- Published
- 2014
40. Towards the use of sequential patterns for detection and characterization of natural and agricultural areas
- Author
-
Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Universitat Politècnica de Catalunya. CAP - Grup de Computació d'Altes Prestacions, Guttler, Fabio, Ienco, Dino, Teisseire, Maguelonne, Nin Guerrero, Jordi, Poncelet, Pascal, Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Universitat Politècnica de Catalunya. CAP - Grup de Computació d'Altes Prestacions, Guttler, Fabio, Ienco, Dino, Teisseire, Maguelonne, Nin Guerrero, Jordi, and Poncelet, Pascal
- Abstract
Nowadays, a huge amount of high resolution satellite images are freely available. Such images allow researchers in environmental sciences to study the different natural habitats and farming practices in a remote way. However, satellite images content strongly depends on the season of the acquisition. Due to the periodicity of natural and agricultural dynamics throughout seasons, sequential patterns arise as a new opportunity to model the behaviour of these environments. In this paper, we describe some preliminary results obtained with a new framework for studying spatiotemporal evolutions over natural and agricultural areas using k-partite graphs and sequential patterns extracted from segmented Landsat images., Postprint (author’s final draft)
- Published
- 2014
41. Beyond multivariate microaggregation for large record anonymization
- Author
-
Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Universitat Politècnica de Catalunya. CAP - Grup de Computació d'Altes Prestacions, Nin Guerrero, Jordi, Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Universitat Politècnica de Catalunya. CAP - Grup de Computació d'Altes Prestacions, and Nin Guerrero, Jordi
- Abstract
Microaggregation is one of the most commonly employed microdata protection methods. The basic idea of microaggregation is to anonymize data by aggregating original records into small groups of at least k elements and, therefore, preserving k -anonymity. Usually, in order to avoid information loss, when records are large, i.e., the number of attributes of the data set is large, this data set is split into smaller blocks of attributes and microaggregation is applied to each block, successively and independently. This is called multivariate microaggregation. By using this technique, the information loss after collapsing several values to the centroid of their group is reduced. Unfortunately, with multivariate microaggregation, the k -anonymity property is lost when at least two attributes of different blocks are known by the intruder, which might be the usual case. In this work, we present a new microaggregation method called one dimension microaggregation ( Mic1D-k ). With Mic1D-k , the problem of k -anonymity loss is mitigated by mixing all the values in the original microdata file into a single non-attributed data set using a set of simple pre-processing steps and then, microaggregating all the mixed values together. Our experiments show that, using real data, our proposal obtains lower disclosure risk than previous approaches whereas the information loss is preserved., Postprint (author’s final draft)
- Published
- 2014
42. Using genetic algorithms for attribute grouping in multivariate microaggregation
- Author
-
Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Universitat Politècnica de Catalunya. DAMA-UPC - Data Management Group, Universitat Politècnica de Catalunya. CAP - Grup de Computació d'Altes Prestacions, Balasch Masoliver, Jordi, Muntés Mulero, Víctor, Nin Guerrero, Jordi, Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Universitat Politècnica de Catalunya. DAMA-UPC - Data Management Group, Universitat Politècnica de Catalunya. CAP - Grup de Computació d'Altes Prestacions, Balasch Masoliver, Jordi, Muntés Mulero, Víctor, and Nin Guerrero, Jordi
- Abstract
Anonymization techniques that provide k-anonymity suffer from loss of quality when data dimensionality is high. Microaggregation techniques are not an exception. Given a set of records, attributes are grouped into non-intersecting subsets and microaggregated independently. While this improves quality by reducing the loss of information, it usually leads to the loss of the k-anonymity property, increasing entity disclosure risk. In spite of this, grouping attributes is still a common practice for data sets containing a large number of records. Depending on the attributes chosen and their correlation, the amount of information loss and disclosure risk vary. However, there have not been serious attempts to propose a way to find the best way of grouping attributes. In this paper, we present GOMM, the Genetic Optimizer for Multivariate Microaggregation which, as far as we know, represents the first proposal using evolutionary algorithms for this problem. The goal of GOMM is finding the optimal, or near-optimal, attribute grouping taking into account both information loss and disclosure risk. We propose a way to map attribute subsets into a chromosome and a set of new mutation operations for this context. Also, we provide a comprehensive analysis of the operations proposed and we show that, after using our evolutionary approach for different real data sets, we obtain better quality in the anonymized data comparing it to previously used ad-hoc attribute grouping techniques. Additionally, we provide an improved version of GOMM called D-GOMM where operations are dynamically executed during the optimization process to reduce the GOMM execution time., Postprint (author’s final draft)
- Published
- 2014
43. Secure and efficient anonymization of distributed confidential databases
- Author
-
Universitat Politècnica de Catalunya. Departament de Matemàtica Aplicada IV, Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Universitat Politècnica de Catalunya. MAK - Matemàtica Aplicada a la Criptografia, Universitat Politècnica de Catalunya. CAP - Grup de Computació d'Altes Prestacions, Herranz Sotoca, Javier, Nin Guerrero, Jordi, Universitat Politècnica de Catalunya. Departament de Matemàtica Aplicada IV, Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Universitat Politècnica de Catalunya. MAK - Matemàtica Aplicada a la Criptografia, Universitat Politècnica de Catalunya. CAP - Grup de Computació d'Altes Prestacions, Herranz Sotoca, Javier, and Nin Guerrero, Jordi
- Abstract
Let us consider the following situation: t entities (e.g., hospitals) hold different databases containing different records for the same type of confidential (e.g., medical) data. They want to deliver a protected version of this data to third parties (e.g., pharmaceutical researchers), preserving in some way both the utility and the privacy of the original data. This can be done by applying a statistical disclosure control (SDC) method. One possibility is that each entity protects its own database individually, but this strategy provides less utility and privacy than a collective strategy where the entities cooperate, by means of a distributed protocol, to produce a global protected dataset. In this paper, we investigate the problem of distributed protocols for SDC protection methods. We propose a simple, efficient and secure distributed protocol for the specific SDC method of rank shuffling. We run some experiments to evaluate the quality of this protocol and to compare the individual and collective strategies for solving the problem of protecting a distributed database. With respect to other distributed versions of SDC methods, the new protocol provides either more security or more efficiency, as we discuss through the paper., Peer Reviewed, Postprint (published version)
- Published
- 2014
44. La 'Escola de Treball' : presencia de una idea
- Author
-
Guerrero, Jordi
- Published
- 2003
45. La Casa de Van der Veeken 'Rehabilitada'
- Author
-
Guerrero, Jordi
- Published
- 2002
46. Digital watermarking techniques and security issues in the information and communication society
- Author
-
Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Universitat Politècnica de Catalunya. CAP - Grup de Computació d'Altes Prestacions, Universitat Politècnica de Catalunya. CBA - Sistemes de Comunicacions i Arquitectures de Banda Ampla, Nin Guerrero, Jordi, Ricciardi, Sergio, Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Universitat Politècnica de Catalunya. CAP - Grup de Computació d'Altes Prestacions, Universitat Politècnica de Catalunya. CBA - Sistemes de Comunicacions i Arquitectures de Banda Ampla, Nin Guerrero, Jordi, and Ricciardi, Sergio
- Abstract
Digital watermarking is the process of embedding information into a noise-tolerant digital signal such as image or audio data. Such information is embedded in a way difficult to be removed in order to easily identify relevant information for many different purposes, such as the copyright ownership of the media, source tracking, piracy deterrence, etc. There is an extensive literature about watermarking algorithms and methods as well as possible attack techniques. In this work we collect a part of this vast literature in order to make easier for a non-expert reader about watermarking to have a high-level overview on new trends and technologies related to multimedia watermark algorithms and attacks., Peer Reviewed, Postprint (author’s final draft)
- Published
- 2013
47. Cicerone: implementació d'un Recomendador Social i Geoposicionat amb Sensat Participatiu
- Author
-
Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Villatoro, Daniel, Nin Guerrero, Jordi, Planagumà Valls, Marc, Aranda Flores, Jordi, Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Villatoro, Daniel, Nin Guerrero, Jordi, Planagumà Valls, Marc, and Aranda Flores, Jordi
- Published
- 2013
48. Optimal assignment problem on record linkage
- Author
-
Nin Guerrero, Jordi, Rodriguez Fernandez, Pablo, Nin Guerrero, Jordi, and Rodriguez Fernandez, Pablo
- Abstract
We present an application of the Hungarian Method, an optimal assignment graph theory algorithm, to record linkage in order to improve the disclosure risk assessment. We should note that Hungarian Method has O(n^3) complexity; three different methods are presented to reduce its computational cost.
- Published
- 2013
49. Abiquo Provisioning Portal
- Author
-
Fernández, Xavier, Nin Guerrero, Jordi, López Padilla, David, Fernández, Xavier, Nin Guerrero, Jordi, and López Padilla, David
- Abstract
Abiquo Provisioning Portal millora la gestió dels entorns cloud privats i permet gestionar centres de dades de forma dinàmica i escalable, facilitant l'aprovisionament d'infraestructures virtuals privades controlades pels clients finals, llestes per treballar en producció, i del software requerit.
- Published
- 2013
50. Aplicación geo-localización Forns IGP iOS / Android
- Author
-
Nin Guerrero, Jordi, Sánchez Delgado, Raúl, Nin Guerrero, Jordi, and Sánchez Delgado, Raúl
- Abstract
Aplicació de geolocalització per a dispositius iOS i Android que permet a l'usuari trobar establiments propers on comprar pa amb Indicació Geográfica Protegida (IGP) Pa de Pagés Català.
- Published
- 2012
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.