Event Category: External Presentation (External Speaker)

Resource Optimization for Moving Target Tracking and Remote Sensing Using Minimum Flow Algorithm and Identifying Codes

In this talk, we will discuss two resource optimization problems, one in the domain of moving target tracking with mobile...

Seguir leyendo arrow_right_alt

Domain-Specific Serverless Computing across Edge-to-Cloud Continuum

During the past decade, human beings experienced the prevalence of communication through various digital devices. While we can call the...

Seguir leyendo arrow_right_alt

Compact local certification of graph classes

There are more and more distributed algorithms specially designed to work on specific graph classes, such as interval graphs or...

Seguir leyendo arrow_right_alt

Who makes the Internet? A longitudinal analysis of the IETF

Operation of the Internet requires interoperability between networks, systems, and applications, as well as cooperation among a growing number of...

Seguir leyendo arrow_right_alt

Seminario destacado: The Machine Learning Data Center is a Cancer: What is the Cure?

The vast majority of machine learning (ML) occurs today in a data center. But there is a very real possibility...

Seguir leyendo arrow_right_alt

Seminario destacado. The Quantum Internet: Recent Advances and Challenges

Quantum information processing is at the cusp of having significant impact on technology and society in the form of providing...

Seguir leyendo arrow_right_alt

Seminario destacado: From Co-Existence to Resilience through Cross-Technology Communication

Co-existence of radio communication technologies has always been one of the key challenges in wireless communications. This particularly holds for...

Seguir leyendo arrow_right_alt

Seminario destacado: Correctness Conditions for Cross-Chain Deals

Modern distributed data management systems face a new challenge: how can autonomous, mutually-distrusting parties cooperate safely and effectively? Addressing this...

Seguir leyendo arrow_right_alt

Strengthening the IoT Ecosystem: Privacy Preserving IoT Security Management

We are seeing an increasingly abundance of potentially intrusive and privacy-invasive IoT devices in our lives, from smart city projects...

Seguir leyendo arrow_right_alt

Nuberu: A Reliable DU Design Suitable for Virtualization Platforms

RAN virtualization will become a key technology for the last mile of next-generation mobile networks driven by initiatives such as...

Seguir leyendo arrow_right_alt

Archivos

Categorías