Visible light communications are becoming a major short range wireless communication technology. Incorporating communication into existing lighting infrastructure, VLCs are potential candidate for future indoor communications.
Read more arrow_right_altThe standard interference functions introduced by Yates have been very influential on the analysis and design of distributed power control laws. While powerful and versatile, the framework has some drawbacks: the existence of fixed-points has to be established separately, and no guarantees are given on the rate of convergence of the iterates.
Read more arrow_right_altImagine a network in which you address information: literally, packet-level addressing of *information* rather than hosts. For example, you may request the front page of El País with a request packet addressed to "the front page of El País"! Then the network forwards the request to some server that can produce the right data (possibly cached) and then delivers that data back to you. You don't have to figure out where that information is; the network does that for you.
Read more arrow_right_altBy 2025 ad fraud will be the second largest form of organized crime, resulting in losses of up to $1 trillion in damages to the society, creating an unprecedented burden to national economies and tax payers.
Read more arrow_right_altProgrammable networks or Software Defined Networking (SDN) offers new opportunities to manage computer networks: Make networks smart, introduce new service faster.
Read more arrow_right_altThe availability of data on digital traces is growing to unprecedented sizes, but inferring actionable knowledge from large-scale data is far from being trivial.
Read more arrow_right_altMixing time is a global property of a network that indicates how fast a random walk gains independence from its starting point. Mixing time is an essential parameter for many distributed algorithms, but especially those based on gossip.
Read more arrow_right_altIn this talk I present our research results in the field of network protocols for secure host authentication and mobility,...
Read more arrow_right_altWe have experienced an era in the world of innovation where the stars have been the entrepreneurs. Small startups or even individuals were able to turn their ideas into big business and, in many cases, overcome large companies with a long tradition in the market.
Read more arrow_right_altMiddleboxes, such as proxies, firewalls and NATs play an important role in the modern Internet ecosystem. On one hand, they perform advanced functions, e.g. traffic shaping, security or enhancing application performance.
Read more arrow_right_alt
Recent Comments