Event Category: External Presentation (External Speaker)

Improving resource utilization in nowadays data centers

Effective scheduling in modern data centers is crucial for optimizing resource allocation, minimizing energy consumption, and ensuring high availability, which...

Seguir leyendo arrow_right_alt

Foundations of Reliable Cooperation under Asynchrony, Byzantine Faults and Message Adversaries

Reliable Broadcast (RB) is a fundamental primitive for building fault-tolerant distributed systems, with applications in critical infrastructures, financial systems, and...

Seguir leyendo arrow_right_alt

AIoT for Rural and Extreme Environments

The Artificial Intelligence of Things (AIoT) offers great potential for real-time data collection from various devices, benefiting numerous applications. However,...

Seguir leyendo arrow_right_alt

Towards Network-Assisted Data Collection Systems

The slowdown of Moore’s Law, the end of Dennard’s scaling, and the rapid adoption of high-bandwidth links is creating new...

Seguir leyendo arrow_right_alt

Advancing mmWave Communications for Mobile Devices

MmWave communication has garnered attention over the last decade due to its potential to provide large bandwidth capable of meeting...

Seguir leyendo arrow_right_alt

The Dawn of AI-Native Networks and Transforming Connectivity with AI-as-a-Service

With the journey towards 6G, we envision the network evolving into an AI-native platform that not only utilizes AI internally...

Seguir leyendo arrow_right_alt

Securing location-based mobile computing

A broad gamut of Internet of Things and mobile applications are location-based: their operation relies on precise position information or...

Seguir leyendo arrow_right_alt

Catching Malware in Memory: Challenges and Issues

Memory forensics is one of the steps of computer forensics, related to the analysis of digital evidence collected from the...

Seguir leyendo arrow_right_alt

New 6G Wireless Security Threats and Capabilities

Next-generation wireless, 6G and beyond, will feature millimeter-wave and terahertz spectrum with large bandwidth and small wavelengths to address data...

Seguir leyendo arrow_right_alt

CVE-2022-23491, or Why PO boxes can't be root certificate authorities anymore

Mozilla curates a set of root certificate authorities to validate hostnames for TLS in the Firefox browser. Many other software...

Seguir leyendo arrow_right_alt

Archivos

Categorías