Events agenda

25 Mar
2010

Binary Program Analysis and Model Extraction for Security Applications

Juan Caballero, Carnegie Mellon University and University of California, Berkeley (USA)
In this talk I present a platform to extract models of security-relevant functionality from program binaries, enabling multiple security applications such as active botnet infiltration, finding deviations between implementations of the same functionality, vulnerability signature generation, and finding content-sniffing cross-site scripting (XSS) attacks. In this talk, I present two applications: active botnet infiltration and finding content-sniffing XSS attacks.
Read more arrow_right_alt
24 Mar
2010

CacheCast: Eliminating Redundant Link Traffic for Single Source Multiple Destination Transfers

Prof. Dr. Thomas Plagemann, University of Oslo (Norway)
His talk consists out of two parts. The first part will give an overview on the current research activities and achievements of the Distributed Multimedia Systems Research Group at the University of Oslo. This includes video streaming in MANETs and disruptive environments, publish subscribe for sparse MANETs, deviation detection with complex event processing for automated home care systems, and clean-slate Future Internet research work. The second part will focus on CacheCast, which is joint work with Lancaster University and has been initiated in the Content NoE. Due to the lack of multicast services in the Internet, applications based on single source multiple destinations transfers such as video conferencing, IP radio, IPTV must use unicast or application layer multicast. 
Read more arrow_right_alt
22 Mar
2010

Networked 3-D Virtual Collaboration in Science and Education: Towards ‘Web 3.0’ (A Modeling Perspective)

Prof. Dr. Michael Devetsikiotis, IEEE Communication Society Distinguished Lecturer 2008-2011; Professor, Department of Electrical and Computer Engineering , NC State University, Raleigh, North Carolina (USA)
Combined advances in high speed networking, mobile devices, application sharing, web services, virtual world technologies and large scale event processing are converging to create a new world of pervasive, ubiquitous “presence” of users, which offers tremendous potential for social interaction and co-creation. The communication networking and computing requirements of this converged human-centric environment are also increasing at an accelerated pace. In this new environment, it is imperative that the much-needed networking and computing resources align closely with the needs and patterns dictated by the applications, social networks, and by the human users. We believe that the success of such socio-technical systems will hinge on the way networks capture and interact with human presence and location, in all of its physical, virtual and perceived aspects.
Read more arrow_right_alt
17 Mar
2010

Who are good parents?

Jaime Garcia-Reinoso
Nowadays it is possible to watch some TV channels in the Internet using P2P mechanisms. There are basically two ways to construct a P2P network to transmit streaming video: mesh-based and tree-based (there is also a mix of both called hybrid-based). No matter how we construct the overlay, a fundamental problem is: what is the best peer to connect with, in order to obtain the best performance? This question is even more important in the tree-based P2P networks where there is just one connection between a "parent" peer and each one of its children, so, the leaving of a parent forces all its children to reconnect to other parents. Our goal in this study is to minimize the number of orphan peers per minute, i.e. select a parent who minimizes the probability of leaving before a given peer. In order to do that, it is necessary to have other results like the distribution of the channel holding time per peer, the future lifetime of a peer given its elapsed time in a given channel and other stuff that will be described during the presentation.
Read more arrow_right_alt
5 Mar
2010

Analysis and Experimental study of operational 802.11-based Wireless Mesh Networks

Dr. Vincenzo Mancuso
The performance of IP flows in Wireless Mesh Networks is unfairly biased by the unplanned compounding behavior of MAC and transport protocols. This compounding protocol behavior can undesirably result in complete starvation of some flows and in consistent capacity reductions originated by, e.g., limited volumes of control traffic.
Read more arrow_right_alt
26 Feb
2010

Cloud elasticity at a flat fee

Dr. Rade Stanojevic
Existing cloud computing platforms offer virtually unlimited compute resources (virtual machines, bandwidth, storage, etc.) that can be used on demand. Such on-demand model offers significant elasticity to the customers in terms when and where they use the resources. The existing pricing model, however, is pay-as-you-go which in turn can lead to unpredictable costs to the cloud customers. This talk will discuss two adaptive approaches for resource control under a fixed budget: Distributed Rate Limiting (DRL) and Temporal Rate Limiting (TRL). DRL is a fully decentralized mechanism for resource control over a distributed cloud service, that splits the available budget among the participating nodes subject to the load each node experiences. TRL in contrast, splits the budget over a time period, to optimize the performance of the customer with demand pattern that varies in time.
Read more arrow_right_alt
17 Feb
2010

Characterizing the Behavior of Content Publishers in BitTorrent

Michal Kryczka, PhD Student, Institute IMDEA Networks
Due to the increasing popularity of P2P systems and their contribution to overall Internet traffic, it is essential to understand how content, which is the main attraction in P2P systems, is fed. The main goal of this talk is to identify and characterize those communities of users that are primarily responsible for publishing/feeding content in BitTorrent. For this purpose we have performed two large scale measurement studies that collectively identify the feeders of more than 30k torrents. Out of these measurements we conclude that a significant part of the BitTorrent’s content (40%) is fed by two different groups: (i) users concentrated min a few IP addresses of Hosting Service Providers. In particular, there is a single Hosting Provider in this community that alone is responsible of feeding 25% of the content published in the current major BitTorrent Portal. (ii) A large number of regular BitTorrent users spread across the networks of big ISPs. In addition, we characterize how the feeders of both communities behave, finding out that the typical Hosting Providers feeder (i) publishes a larger number of torrents that become more popular and (ii) seeds longer its torrents than regular users acting as feeders. Our findings suggest that a small group of users in Hosting Providers effectively leverage BitTorrent to publish content. Therefore, their presence is essential for the livelihood of BitTorrent.
Read more arrow_right_alt
10 Feb
2010

Information and Communications Technologies and the challenge of energy efficiency

Gianluca Rizzo
The steadily raising energy costs and the increasing number of evidences of climate changes induced by high levels of CO2 in the atmosphere have brought the issue of a sustainable use of energy to the attention of governments and of people all over the world. The need for a more responsible use of energy has emerged in all sectors, together with the awareness that a decrease in carbon emissions is vital to ensuring a future to mankind. The ICT sector, which has brought deep transformations and a rapid increase in productivity in many domains in the last decades, is at the center of this transformation. In all fields of communications, researchers have started to investigate approaches to reduce energy consumption, both by designing new devices, and by exploring new network architectures. In particula r, dynamic network planning, which implies decreasing the power consumption of those network resources which are underutilized, is seen as one of the most promising techniques to improve the energy efficiency of networks.
Read more arrow_right_alt
3 Feb
2010

Seminar: Peer-to-peer vs. IP multicast: comparing approaches to IPTV streaming based on TV channel popularity

Alex Bikfalvi
Already a popular application in the Internet, IPTV is becoming, among the service providers, a preferred alternative to conventional Broadcasting technologies. Since many of the existing deployments have been done within the safe harbor of telcos own networks, IP multicast has been the desired streaming solution. However, previous studies showed that the popularity of the TV channels follows the Pareto principle, with the bulk of TV channels being watched only by a small fraction of viewers. Recognizing the potential scalability issues, we believe that multicast streaming approach may not be desirable for unpopular TV channels, especially when there are many such channels in the provider's service package. 
Read more arrow_right_alt
29 Jan
2010

The GeoNet Final Workshop

Emilio Davila Gonzalez (European Commission); Arnaud de La Fortelle (INRIA); Thierry Ernst (INRIA); Carlos J. Bernardos (IMDEA Networks); Wenhui Zhang (NEC); Hamid Menouar (Hitachi)
The GeoNet consortium invites you to attend its final workshop as a unique opportunity to learn more about IPv6 geonetworking and the link between IPv6 geonetworking and the related ITS development in CAR 2 CAR Communication Consortium, CVIS implementation and ETSI TC ITS standardization. During the workshop you will get information through communications and posters and also see the system working in real cars. Please find the program in attachment with practical details (exact place, registration procedure…).
Read more arrow_right_alt