Event Category: External Presentation (External Speaker)

IoT Threats and Security

In this seminar, the presenter will provide an overview of the Computer Science Department and its programs and then discuss...

Seguir leyendo arrow_right_alt

Software Defined Inception: When your Programmable Switches Turn into your Emulation and Traffic Generation Toolbox

After a quick revisitation of the evolving history behind Software Defined Networking (SDN), this talk will focus on ongoing open-source...

Seguir leyendo arrow_right_alt

A Glimpse into Convex Agreement

Achieving agreement among the parties in a distributed system is crucial for maintaining consistent views. This becomes particularly challenging due...

Seguir leyendo arrow_right_alt

Jornadas Cluster 4 HE – Impulsando la innovación digital y la colaboración público-privada

IMDEA Networks, en colaboración con el CDTI, organiza una jornada informativa dedicada a las próximas convocatorias del WP 2025 Clúster...

Seguir leyendo arrow_right_alt

From Idea to Reality: The Five Pillars of Sustainable Startup Growth

Each year, 50 million new startups emerge worldwide, yet only 10% can sustain themselves in the long run. Cloud computing...

Seguir leyendo arrow_right_alt

Workshop sobre habilidades de redacción científica

La escritura científica efectiva es una habilidad fundamental para los investigadores, ya que les permite comunicar sus hallazgos de manera...

Seguir leyendo arrow_right_alt

Multiscale Radio Reconfigurations: A Trace-Driven Approach to Estimating Network Performance

This is a dry-run for an upcoming conference presentation (WCNC2025). As mobile networks become more complex to handle increasing data...

Seguir leyendo arrow_right_alt

Privacy-preserving Data Obfuscation for Credit Scoring

This is a dry-run for an upcoming conference presentation (SAC2025). Machine Learning as a Service (MLaaS) drives ML adoption by...

Seguir leyendo arrow_right_alt

Decentralising social networks? An in-depth analysis of Bluesky

As a reaction to the traditional centralised social networks such as Twitter or Facebook, new models have emerged. Bluesky is...

Seguir leyendo arrow_right_alt

Beyond Location Traces: Compromising User’s Privacy with Wi-Fi Data

With the increasing use of mobile devices and, particularly, the widespread use of smartphones in everyday life, there is a...

Seguir leyendo arrow_right_alt

Archivos

Categorías