We look at roundabouts as synchronous car multiplexers to overcome the current limitations of roundabouts in capacity, safety, and energy...
Read more arrow_right_altComputer programs may be protected by patents if they meet requirements that vary from one jurisdiction to another. We will...
Read more arrow_right_altIn this talk, I will present my research on investigating and assessing the state of user privacy in a rapidly...
Read more arrow_right_altCyber-dependent crimes have rocketed in recent years. Illicit services, knowledge and tools are a commodity exchanged in anonymous online markets....
Read more arrow_right_altRemote monitoring of an information source (or a process of interest) is inherent to emerging applications in various domains including...
Read more arrow_right_altThe Web consists of numerous Web communities, news sources, and services, which are often exploited by various entities for the...
Read more arrow_right_altIn this seminar, one of the members of our Alumni Network, Dr. Elli Zavou, will take stock of her experience...
Read more arrow_right_altMeasuring and efficiently circumventing censorship of the Internet requires a realistic model of those entities blocking communications. We undertook an...
Read more arrow_right_altToday's distributed systems are increasingly virtualized and software-defined. While in principle, this introduces interesting new opportunities, e.g., in terms of resource allocation and traffic engineering, it also raises the question of how to algorithmically exploit the new flexibilities, and how to operate and control such dynamic systems without violating correctness and consistency properties.
Read more arrow_right_altCan we build platforms that are decentralized, democratic, and where profit is distributed? In this talk, I will present P2P Models (p2pmodels.eu), a new ERC 1.5M€ research project to build Blockchain-powered organizations.
Read more arrow_right_alt
Recent Comments