Youtubed activities
Mar 2025
26
Mar
Responsible digital developments in research and education: where do we start?
Several recent initiatives have proposed new directions for research practices and their operations in the computer science community, from updated codes of conduct that clarify [...]
21
Mar
Incentives in large-scale demand-side flexibility management in smart energy grids: the RESONANCE approach
The increased contribution of renewable energy sources to energy production has led to increased variability and lower levels of controlability of energy generation. On the [...]
19
Mar
Cybersecurity and Cyber Resilience of Complex Systems
Thanks to technological advancements, critical infrastructures integrate many smart technologies and become highly connected to the cyber world. This is especially true for Cyber-Physical Systems [...]
14
Mar
Deployment of an end to end 4G/5G testbed based on a single computer
This presentation will present the deployment and installation procedure of a 4G/5G testbded on single computer. This testbed is based on SRSRAN open source 4G/5G [...]
07
Mar
Python tricks for discrete-event simulation
In this presentation, I will introduce discrete-event simulation, provide a minimal Python implementation, and then showcase how we can use certain Python features (decorators, generator [...]
05
Mar
Orchestration of AI-based Applications in Heterogeneous and Distributed Computing Systems
Today, distributed systems are increasingly needed to support distributed applications that involve machine learning (ML) operations for both service providers and end users. These operations [...]
Feb 2025
21
Feb
FjORD: Fair and Accurate Federated Learning under heterogeneous targets with Ordered Dropout
Federated Learning (FL) has been gaining significant traction across different ML tasks, ranging from vision to keyboard predictions. In large-scale deployments, client heterogeneity is a [...]
19
Feb
AI for the Detection and Mitigation of Cyberattacks
Gateway Servers for the Internet of Things, including critical application areas such as the Internet of Vehicles and health monitoring, must meet stringent Security and Quality [...]
14
Feb
Master Python Efficiency with itertools and joblib
This Python programming tutorial is designed for intermediate learners who want to optimize their code for performance, scalability, and elegance using two powerful libraries: itertools [...]
12
Feb
How can alpha-information theory formally prove that your sensitive circuits are protected against side-channel attacks?
Cryptographic algorithms are ubiquitous in our digital society. Principles (such as Kerckhoffs’) and mathematical techniques for securing data against cryptanalysis are well established, even with [...]