Archives: Events

Network Cloudification: SDN-NFV and 5G-MEC with Edge and Fog Computing

The second wave of cloud computing, named network cloudification, in the forms of SDN (Software Defined Networking), NFV (Network Function Virtualization), and 5G-MEC (Mobile Edge Computing), is to centralize and virtualize networking into data centers.

Read more arrow_right_alt

Two Approaches for the Performance Evaluation of Queueing Systems: Pricing and Scaling

Queueing theory, the set of probabilistic techniques that study waiting lines or queues, is a fundamental tool to analyze the performance of modern telecommunication networks. In this talk, we present the results of the performance analysis of two queueing systems.

Read more arrow_right_alt

Dissecting the Security and Privacy of Wireless Protocols in Aviation

A multitude of wireless technologies are used within air traffic communication. From a conceptual perspective, all of them are insecure as security was never part of their design and the evolution of wireless security in aviation did not keep up with the state of the art.

Read more arrow_right_alt

Network optimization in the era of virtualization

Future networks based on virtualization will enable on-the-fly instantiation of services in the form of "network slices". In this talk we will focus on a fundamental resource allocation problem in this context, that of finding a minimum cost embedding of a network slice onto a graph representing the available resources of our architecture.

Read more arrow_right_alt

Crowdsourcing Spectrum Data Decoding

Crowdsourced signal monitoring systems are gaining attention for capturing the wireless spectrum at large geographical scale. Yet, most of the current systems are still limited to simple power spectrum measurements reported by each sensor.

Read more arrow_right_alt

The good, the bad and the bait: Detecting and characterizing clickbait videos on YouTube

The use of deceptive techniques in user-generated video portals is ubiquitous. Unscrupulous uploaders deliberately mislabel video descriptors, such as headline, thumbnail etc., in order to increase their views and subsequently their ad revenue. However, such deceptive practices come at the expense of the end-user’s experience as the content does not meet the viewer’s expectations, which are formed by the misleading headline and thumbnail.

Read more arrow_right_alt

OpenBox: A Software-Defined Framework for Developing, Deploying, and Managing Network Functions

In this talk we present OpenBox — a software-defined framework for network-wide development, deployment, and management of network functions (NFs). OpenBox effectively decouples the control plane of NFs from their data plane, similarly to SDN solutions that only address the network’s forwarding plane.

Read more arrow_right_alt

Three open problems in Network Caching: cost reduction, video delivery and encrypted content

Cisco estimates that by 2019 traffic will be 64x than in 2005. Network caching can help cope with this traffic deluge as, by replicating content closer to the users, it reduces bandwidth consumption.

Read more arrow_right_alt

Internet Reliability, from Addresses to Outages

The Internet is central to our lives, but we know astoundingly little about it.
How big is the Internet?  How reliable? How is it evolving over months? 
How does it change over the course of a day?

Read more arrow_right_alt

Robustness and Privacy in Mobile and Wireless Systems

Wireless communication is not only a key technology underlying the mobile revolution, it is also used to connect, monitor, alert, and interact with physical infrastructures such as smart-grids, transportation networks, and even implantable devices. 

Read more arrow_right_alt

Recent Comments

    Archives

    Categories