Event Category: External Presentation (External Speaker)

Overview of Research and Standards in ETSI

About David Boswarthick David is currently the ETSI Director of New Technologies (NET), which involves tracking the latest ICT technology...

Read more arrow_right_alt

Some models of automata networks: convergence and complexity

Prof. Eric Goels will present two models of automata networks: threshold automata, characterizing their convergence for different updates modes and...

Read more arrow_right_alt

Coded Caching in Heterogeneous Scenarios

Coded caching is a technique for reducing congestion in communication networks by prefetching content during idle periods and exploiting multicasting...

Read more arrow_right_alt

Graph Constructions for Machine Learning Applications: New Insights and Algorithms

Graphs have long been used in various problems, such as analyzing social networks, machine learning, network protocol optimization, or image...

Read more arrow_right_alt

Beyond Third-Party Cookies: Safeguarding User Data from Storage and Exfiltration with CookieGraph and PURL

The online tracking ecosystem has grown increasingly sophisticated in response to anti-tracking browser countermeasures and emerging privacy regulations. The central...

Read more arrow_right_alt

From Quantum Algorithms to Quantum Services with PlanQK

P PlanQK is a platform that provides an ecosystem for the hosting and deployment of quantum services. In this presentation,...

Read more arrow_right_alt

ARES: A God of War to Bring “Peace" to Heterogeneous Robots

Robot Swarms consists of a special type of distributed systems where robots exchange sensed data in order to coordinate robot...

Read more arrow_right_alt

Global IoT testbed for security and privacy research in the real world

IoT devices are known to have security and privacy risks, but studying these risks in a real-world context has been...

Read more arrow_right_alt

Rods with Laser Beams: Understanding Browser Fingerprinting on Phishing Pages

Phishing is one of the most common forms of social engineering attacks and is regularly used by criminals to compromise...

Read more arrow_right_alt

Distributed Computing: A Guided Tour

During my stay at IMDEA Networks, I have remarked that the terms “distributed computing” sounded like dark magic to some...

Read more arrow_right_alt

Archives

Categories