Measuring and efficiently circumventing censorship of the Internet requires a realistic model of those entities blocking communications. We undertook an...
Read more arrow_right_altToday's distributed systems are increasingly virtualized and software-defined. While in principle, this introduces interesting new opportunities, e.g., in terms of resource allocation and traffic engineering, it also raises the question of how to algorithmically exploit the new flexibilities, and how to operate and control such dynamic systems without violating correctness and consistency properties.
Read more arrow_right_altCan we build platforms that are decentralized, democratic, and where profit is distributed? In this talk, I will present P2P Models (p2pmodels.eu), a new ERC 1.5M€ research project to build Blockchain-powered organizations.
Read more arrow_right_altWireless networks are progressively displacing service provisioning towards the edge to accommodate the increasing traffic demands. This paradigm shift calls for smart policies to efficiently share network resources and ensure service delivery. In this talk, a concept of bidding and tipping for spectrum auctioning will be presented. In this concept users iteratively revise their strategies, which include bidding for spectrum, route selection and relaying incentives, to achieve their quality of service requirements. Further, a reinforcement learning algorithm will be discussed to automatize the bidding process based on users¹ previous experiences. Then, a collaborative cognitive dynamic network architecture (CDNA) will be outlined where mobile devices share their connectivities acting as access points for other users and harvest available spectrum.
Read more arrow_right_altThe second wave of cloud computing, named network cloudification, in the forms of SDN (Software Defined Networking), NFV (Network Function Virtualization), and 5G-MEC (Mobile Edge Computing), is to centralize and virtualize networking into data centers.
Read more arrow_right_altQueueing theory, the set of probabilistic techniques that study waiting lines or queues, is a fundamental tool to analyze the performance of modern telecommunication networks. In this talk, we present the results of the performance analysis of two queueing systems.
Read more arrow_right_altA multitude of wireless technologies are used within air traffic communication. From a conceptual perspective, all of them are insecure as security was never part of their design and the evolution of wireless security in aviation did not keep up with the state of the art.
Read more arrow_right_altFuture networks based on virtualization will enable on-the-fly instantiation of services in the form of "network slices". In this talk we will focus on a fundamental resource allocation problem in this context, that of finding a minimum cost embedding of a network slice onto a graph representing the available resources of our architecture.
Read more arrow_right_altThe use of deceptive techniques in user-generated video portals is ubiquitous. Unscrupulous uploaders deliberately mislabel video descriptors, such as headline, thumbnail etc., in order to increase their views and subsequently their ad revenue. However, such deceptive practices come at the expense of the end-user’s experience as the content does not meet the viewer’s expectations, which are formed by the misleading headline and thumbnail.
Read more arrow_right_altIn this talk we present OpenBox — a software-defined framework for network-wide development, deployment, and management of network functions (NFs). OpenBox effectively decouples the control plane of NFs from their data plane, similarly to SDN solutions that only address the network’s forwarding plane.
Read more arrow_right_alt
Recent Comments