Event Category: External Presentation (External Speaker)

Time, Technology, and Globalization. A study of the role of technology in processes of modernization and globalization using the Press, Big Data, and Computational Research Methodologies (GLOTECH)

The EU-funded GLOTECH project comprises a study of the role of technology in processes of modernisation and globalisation using the...

Read more arrow_right_alt

Is Your Mobile OS Watching You?

Mobile handsets are the main way that most people access the Internet. Much attention has been paid to tracking and...

Read more arrow_right_alt

Deployment of networking services in microservice-based UAV platforms: L2S-M

The promising combination of Unmanned Aerial Vehicles (UAVs) with network virtualisation technologies has positively shown many advantages enabling the deployment...

Read more arrow_right_alt

How Blockchain can extend the remote-control range of a Robot while Machine learning is keeping it profitable

This talk consists of two articles: 1) DLT Federation for Edge Robotics – where the author shows how the remote-control...

Read more arrow_right_alt

Blockchain is dead, long live blockchain! Exploiting Accountability to Strengthen Blockchain Fault Tolerance

The long-standing impossibility of reaching an agreement seems to restrict the lifespan of existing blockchains. In fact, consensus is key...

Read more arrow_right_alt

Let’s Work Together: Building a Robust, Consistent, and Efficient Distributed Shared Storage System for Large Data Objects that Promotes Collaboration

A distributed shared storage (DSS) space is a fundamental service to ensure availability, survivability and accessibility to the data that...

Read more arrow_right_alt

Introduction to FHE, TFHE and Machine Learning Applications

FHE is a technology allowing to perform operations over encrypted data. In this talk, we will do a general introduction...

Read more arrow_right_alt

SGD on Distributed Systems

Deep learning is booming thanks to enormous datasets with very large models, and the widespread availability of supercomputing via GPUs....

Read more arrow_right_alt

On Three Research Problems

In this talk, I will present applications of the communication theory framework to three research problems. The first is a...

Read more arrow_right_alt

Overview of Adversarial Machine Learning (AML) with Applications to Network Anomaly Detection (NAD)

In this talk, we will give an overview of “adversarial” attacks on deep learning, generally known as adversarial machine learning...

Read more arrow_right_alt

Archives

Categories