Event Category: External Presentation (External Speaker)

Resource Optimization for Moving Target Tracking and Remote Sensing Using Minimum Flow Algorithm and Identifying Codes

In this talk, we will discuss two resource optimization problems, one in the domain of moving target tracking with mobile...

Read more arrow_right_alt

Domain-Specific Serverless Computing across Edge-to-Cloud Continuum

During the past decade, human beings experienced the prevalence of communication through various digital devices. While we can call the...

Read more arrow_right_alt

Compact local certification of graph classes

There are more and more distributed algorithms specially designed to work on specific graph classes, such as interval graphs or...

Read more arrow_right_alt

Who makes the Internet? A longitudinal analysis of the IETF

Operation of the Internet requires interoperability between networks, systems, and applications, as well as cooperation among a growing number of...

Read more arrow_right_alt

Distinguished Seminar: The Machine Learning Data Center is a Cancer: What is the Cure?

The vast majority of machine learning (ML) occurs today in a data center. But there is a very real possibility...

Read more arrow_right_alt

Distinguished Seminar. The Quantum Internet: Recent Advances and Challenges

Quantum information processing is at the cusp of having significant impact on technology and society in the form of providing...

Read more arrow_right_alt

Distinguished Seminar: From Co-Existence to Resilience through Cross-Technology Communication

Co-existence of radio communication technologies has always been one of the key challenges in wireless communications. This particularly holds for...

Read more arrow_right_alt

Distinguished Seminar: Correctness Conditions for Cross-Chain Deals

Modern distributed data management systems face a new challenge: how can autonomous, mutually-distrusting parties cooperate safely and effectively? Addressing this...

Read more arrow_right_alt

Strengthening the IoT Ecosystem: Privacy Preserving IoT Security Management

We are seeing an increasingly abundance of potentially intrusive and privacy-invasive IoT devices in our lives, from smart city projects...

Read more arrow_right_alt

Nuberu: A Reliable DU Design Suitable for Virtualization Platforms

RAN virtualization will become a key technology for the last mile of next-generation mobile networks driven by initiatives such as...

Read more arrow_right_alt

Recent Comments

    Archives

    Categories