Event Category: External Presentation (External Speaker)

Improving resource utilization in nowadays data centers

Effective scheduling in modern data centers is crucial for optimizing resource allocation, minimizing energy consumption, and ensuring high availability, which...

Read more arrow_right_alt

Foundations of Reliable Cooperation under Asynchrony, Byzantine Faults and Message Adversaries

Reliable Broadcast (RB) is a fundamental primitive for building fault-tolerant distributed systems, with applications in critical infrastructures, financial systems, and...

Read more arrow_right_alt

AIoT for Rural and Extreme Environments

The Artificial Intelligence of Things (AIoT) offers great potential for real-time data collection from various devices, benefiting numerous applications. However,...

Read more arrow_right_alt

Towards Network-Assisted Data Collection Systems

The slowdown of Moore’s Law, the end of Dennard’s scaling, and the rapid adoption of high-bandwidth links is creating new...

Read more arrow_right_alt

Advancing mmWave Communications for Mobile Devices

MmWave communication has garnered attention over the last decade due to its potential to provide large bandwidth capable of meeting...

Read more arrow_right_alt

The Dawn of AI-Native Networks and Transforming Connectivity with AI-as-a-Service

With the journey towards 6G, we envision the network evolving into an AI-native platform that not only utilizes AI internally...

Read more arrow_right_alt

Securing location-based mobile computing

A broad range of Internet of Things and mobile applications are location-based: their operation relies on precise position information or...

Read more arrow_right_alt

Catching Malware in Memory: Challenges and Issues

Memory forensics is one of the steps of computer forensics, related to the analysis of digital evidence collected from the...

Read more arrow_right_alt

New 6G Wireless Security Threats and Capabilities

Next-generation wireless, 6G and beyond, will feature millimeter-wave and terahertz spectrum with large bandwidth and small wavelengths to address data...

Read more arrow_right_alt

CVE-2022-23491, or Why PO boxes can't be root certificate authorities anymore

Mozilla curates a set of root certificate authorities to validate hostnames for TLS in the Firefox browser. Many other software...

Read more arrow_right_alt

Recent Comments

    Archives

    Categories