Event Category: External Presentation (External Speaker)

Time, Technology, and Globalization. A study of the role of technology in processes of modernization and globalization using the Press, Big Data, and Computational Research Methodologies (GLOTECH)

The EU-funded GLOTECH project comprises a study of the role of technology in processes of modernisation and globalisation using the...

Seguir leyendo arrow_right_alt

Is Your Mobile OS Watching You?

Mobile handsets are the main way that most people access the Internet. Much attention has been paid to tracking and...

Seguir leyendo arrow_right_alt

Deployment of networking services in microservice-based UAV platforms: L2S-M

The promising combination of Unmanned Aerial Vehicles (UAVs) with network virtualisation technologies has positively shown many advantages enabling the deployment...

Seguir leyendo arrow_right_alt

How Blockchain can extend the remote-control range of a Robot while Machine learning is keeping it profitable

This talk consists of two articles: 1) DLT Federation for Edge Robotics – where the author shows how the remote-control...

Seguir leyendo arrow_right_alt

Blockchain is dead, long live blockchain! Exploiting Accountability to Strengthen Blockchain Fault Tolerance

The long-standing impossibility of reaching an agreement seems to restrict the lifespan of existing blockchains. In fact, consensus is key...

Seguir leyendo arrow_right_alt

Let’s Work Together: Building a Robust, Consistent, and Efficient Distributed Shared Storage System for Large Data Objects that Promotes Collaboration

A distributed shared storage (DSS) space is a fundamental service to ensure availability, survivability and accessibility to the data that...

Seguir leyendo arrow_right_alt

Introduction to FHE, TFHE and Machine Learning Applications

FHE is a technology allowing to perform operations over encrypted data. In this talk, we will do a general introduction...

Seguir leyendo arrow_right_alt

SGD on Distributed Systems

Deep learning is booming thanks to enormous datasets with very large models, and the widespread availability of supercomputing via GPUs....

Seguir leyendo arrow_right_alt

On Three Research Problems

In this talk, I will present applications of the communication theory framework to three research problems. The first is a...

Seguir leyendo arrow_right_alt

Overview of Adversarial Machine Learning (AML) with Applications to Network Anomaly Detection (NAD)

In this talk, we will give an overview of «adversarial» attacks on deep learning, generally known as adversarial machine learning...

Seguir leyendo arrow_right_alt

Archivos

Categorías