Event Category: External Presentation (External Speaker)

IoT Threats and Security

In this seminar, the presenter will provide an overview of the Computer Science Department and its programs and then discuss...

Read more arrow_right_alt

Software Defined Inception: When your Programmable Switches Turn into your Emulation and Traffic Generation Toolbox

After a quick revisitation of the evolving history behind Software Defined Networking (SDN), this talk will focus on ongoing open-source...

Read more arrow_right_alt

A Glimpse into Convex Agreement

Achieving agreement among the parties in a distributed system is crucial for maintaining consistent views. This becomes particularly challenging due...

Read more arrow_right_alt

Cluster 4 HE Sessions – Driving Digital Innovation and Public-Private Collaboration

IMDEA Networks, in collaboration with CDTI, is organizing an information session dedicated to the upcoming calls of the Horizon Europe...

Read more arrow_right_alt

From Idea to Reality: The Five Pillars of Sustainable Startup Growth

Each year, 50 million new startups emerge worldwide, yet only 10% can sustain themselves in the long run. Cloud computing...

Read more arrow_right_alt

Workshop on Scientific Writing Skills

Effective scientific writing is a fundamental skill for researchers, enabling them to communicate their findings clearly, concisely, and persuasively. This...

Read more arrow_right_alt

Multiscale Radio Reconfigurations: A Trace-Driven Approach to Estimating Network Performance

This is a dry-run for an upcoming conference presentation (WCNC2025). As mobile networks become more complex to handle increasing data...

Read more arrow_right_alt

Privacy-preserving Data Obfuscation for Credit Scoring

This is a dry-run for an upcoming conference presentation (SAC2025). Machine Learning as a Service (MLaaS) drives ML adoption by...

Read more arrow_right_alt

Decentralising social networks? An in-depth analysis of Bluesky

As a reaction to the traditional centralised social networks such as Twitter or Facebook, new models have emerged. Bluesky is...

Read more arrow_right_alt

Beyond Location Traces: Compromising User’s Privacy with Wi-Fi Data

With the increasing use of mobile devices and, particularly, the widespread use of smartphones in everyday life, there is a...

Read more arrow_right_alt

Archives

Categories