In this talk, I will present my research on investigating and assessing the state of user privacy in a rapidly...
Seguir leyendo arrow_right_altCyber-dependent crimes have rocketed in recent years. Illicit services, knowledge and tools are a commodity exchanged in anonymous online markets....
Seguir leyendo arrow_right_altRemote monitoring of an information source (or a process of interest) is inherent to emerging applications in various domains including...
Seguir leyendo arrow_right_altThe Web consists of numerous Web communities, news sources, and services, which are often exploited by various entities for the...
Seguir leyendo arrow_right_altIn this seminar, one of the members of our Alumni Network, Dr. Elli Zavou, will take stock of her experience...
Seguir leyendo arrow_right_altMeasuring and efficiently circumventing censorship of the Internet requires a realistic model of those entities blocking communications. We undertook an...
Seguir leyendo arrow_right_altToday's distributed systems are increasingly virtualized and software-defined. While in principle, this introduces interesting new opportunities, e.g., in terms of resource allocation and traffic engineering, it also raises the question of how to algorithmically exploit the new flexibilities, and how to operate and control such dynamic systems without violating correctness and consistency properties.
Seguir leyendo arrow_right_altCan we build platforms that are decentralized, democratic, and where profit is distributed? In this talk, I will present P2P Models (p2pmodels.eu), a new ERC 1.5M€ research project to build Blockchain-powered organizations.
Seguir leyendo arrow_right_altWireless networks are progressively displacing service provisioning towards the edge to accommodate the increasing traffic demands. This paradigm shift calls for smart policies to efficiently share network resources and ensure service delivery. In this talk, a concept of bidding and tipping for spectrum auctioning will be presented. In this concept users iteratively revise their strategies, which include bidding for spectrum, route selection and relaying incentives, to achieve their quality of service requirements. Further, a reinforcement learning algorithm will be discussed to automatize the bidding process based on users¹ previous experiences. Then, a collaborative cognitive dynamic network architecture (CDNA) will be outlined where mobile devices share their connectivities acting as access points for other users and harvest available spectrum.
Seguir leyendo arrow_right_altThe second wave of cloud computing, named network cloudification, in the forms of SDN (Software Defined Networking), NFV (Network Function Virtualization), and 5G-MEC (Mobile Edge Computing), is to centralize and virtualize networking into data centers.
Comentarios recientes