Event Category: External Presentation (External Speaker)

Network optimization in the era of virtualization

Future networks based on virtualization will enable on-the-fly instantiation of services in the form of "network slices". In this talk we will focus on a fundamental resource allocation problem in this context, that of finding a minimum cost embedding of a network slice onto a graph representing the available resources of our architecture.

Read more arrow_right_alt

The good, the bad and the bait: Detecting and characterizing clickbait videos on YouTube

The use of deceptive techniques in user-generated video portals is ubiquitous. Unscrupulous uploaders deliberately mislabel video descriptors, such as headline, thumbnail etc., in order to increase their views and subsequently their ad revenue. However, such deceptive practices come at the expense of the end-user’s experience as the content does not meet the viewer’s expectations, which are formed by the misleading headline and thumbnail.

Read more arrow_right_alt

OpenBox: A Software-Defined Framework for Developing, Deploying, and Managing Network Functions

In this talk we present OpenBox — a software-defined framework for network-wide development, deployment, and management of network functions (NFs). OpenBox effectively decouples the control plane of NFs from their data plane, similarly to SDN solutions that only address the network’s forwarding plane.

Read more arrow_right_alt

Three open problems in Network Caching: cost reduction, video delivery and encrypted content

Cisco estimates that by 2019 traffic will be 64x than in 2005. Network caching can help cope with this traffic deluge as, by replicating content closer to the users, it reduces bandwidth consumption.

Read more arrow_right_alt

Internet Reliability, from Addresses to Outages

The Internet is central to our lives, but we know astoundingly little about it.
How big is the Internet?  How reliable? How is it evolving over months? 
How does it change over the course of a day?

Read more arrow_right_alt

Robustness and Privacy in Mobile and Wireless Systems

Wireless communication is not only a key technology underlying the mobile revolution, it is also used to connect, monitor, alert, and interact with physical infrastructures such as smart-grids, transportation networks, and even implantable devices. 

Read more arrow_right_alt

Recent advances on hybrid Open-Flow/All-Path switches and Path Discovery protocols (AOSS, TCP-Path, Multiple Disjoint Paths)

After a number of years of its launch, OpenFlow does not yet provide deployable alternatives but it has fully changed the conceptual approach to manage and control networks.

Read more arrow_right_alt

SoftAir: A Software-Defined Networking Architecture for 5G Wireless Systems

SoftAir is a new wireless software-defined architecture with network function virtualization (NFV) solutions for 5G wireless systems. The concept of SDN has been proposed to efficiently create centralized network abstraction with the provisioning of programmability over the entire network.

Read more arrow_right_alt

Big Crisis Data - an exciting frontier for applied computing

Social media is an invaluable source of time-critical information during a crisis. However, emergency response and humanitarian relief organizations that would like to use this information struggle with an avalanche of social media messages, exceeding their capacity to process them.

Read more arrow_right_alt

Time-Critical Social Mobilization: from the DARPA Red Balloon Challenge to the Nightmare Machine

This seminar explores the physical, behavioral, and computational limits of crowd-assembly for problem-solving.

Read more arrow_right_alt

Recent Comments

    Archives

    Categories