{"id":3835,"date":"1994-01-01T00:00:00","date_gmt":"1994-01-01T00:00:00","guid":{"rendered":"https:\/\/www.deberes.net\/tesis\/1994\/01\/01\/redes-de-interconexion-contribucion-al-estudio-de-su-vulnerabilidad\/"},"modified":"1994-01-01T00:00:00","modified_gmt":"1994-01-01T00:00:00","slug":"redes-de-interconexion-contribucion-al-estudio-de-su-vulnerabilidad","status":"publish","type":"post","link":"https:\/\/www.deberes.net\/tesis\/ciencias-tecnologicas\/redes-de-interconexion-contribucion-al-estudio-de-su-vulnerabilidad\/","title":{"rendered":"Redes de interconexion: contribucion al estudio de su vulnerabilidad."},"content":{"rendered":"<h2>Tesis doctoral de <strong> M. Luisa Zaragoza Monroig <\/strong><\/h2>\n<p>Esta tesis se ha centrado en el estudio de la vulnerabilidad del encaminamiento en familias de grafos y digrafos que resultan particularmente interesantes por su aplicacion al dise\u00f1o de redes de interconexion: redes asociadas con teselaciones del plano, digrafos linea parciales de kautz y de brujin. Se demuestra la existencia de vertices (p,f)-centrales en los grafos de doble y triple lazo para determinados f y se determinan conjuntos de vertices y conjuntos de ramas que pueden fallar sin que se pierda la comunicacion entre los restantes en las dos familias anteriores y en los digrafos bipartitos bd (s,b,c,d). Este estudio se hace a partir de la representacion geometrica que representan estas redes asociadas a teselaciones del plano.  tambien se da un metodo que construye toda la sucesion finita de digrafos linea parciales de kautz y de brujin presentando un algoritmo que calcula vertices (p,f)-centrales en estas redes.<\/p>\n<p>&nbsp;<\/p>\n<h3>Datos acad\u00e9micos de la tesis doctoral \u00ab<strong>Redes de interconexion: contribucion al estudio de su vulnerabilidad.<\/strong>\u00ab<\/h3>\n<ul>\n<li><strong>T\u00edtulo de la tesis:<\/strong>\u00a0 Redes de interconexion: contribucion al estudio de su vulnerabilidad. <\/li>\n<li><strong>Autor:<\/strong>\u00a0 M. Luisa Zaragoza Monroig <\/li>\n<li><strong>Universidad:<\/strong>\u00a0 Polit\u00e9cnica de catalunya<\/li>\n<li><strong>Fecha de lectura de la tesis:<\/strong>\u00a0 01\/01\/1994<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3>Direcci\u00f3n y tribunal<\/h3>\n<ul>\n<li><strong>Director de la tesis<\/strong>\n<ul>\n<li>Josep F\u00c1\u00a0brega Canudas<\/li>\n<\/ul>\n<\/li>\n<li><strong>Tribunal<\/strong>\n<ul>\n<li>Presidente del tribunal: Miguel \u00e1ngel Fiol Mora <\/li>\n<li>Josep Rifa Coma (vocal)<\/li>\n<li>Mateo Valero Cort\u00e9s (vocal)<\/li>\n<li>Ugo Vaccaro (vocal)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tesis doctoral de M. Luisa Zaragoza Monroig Esta tesis se ha centrado en el estudio de la vulnerabilidad del encaminamiento [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[4810,332,15596,2535],"tags":[16005,12503,16004,13321,15610,16006],"class_list":["post-3835","post","type-post","status-publish","format-standard","hentry","category-arquitectura-de-ordenadores","category-ciencias-tecnologicas","category-politecnica-de-catalunya","category-tecnologia-de-los-ordenadores","tag-josep-fa-brega-canudas","tag-josep-rifa-coma","tag-m-luisa-zaragoza-monroig","tag-mateo-valero-cortes","tag-miguel-angel-fiol-mora","tag-ugo-vaccaro"],"_links":{"self":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts\/3835","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/comments?post=3835"}],"version-history":[{"count":0,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts\/3835\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/media?parent=3835"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/categories?post=3835"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/tags?post=3835"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}