Youtubed activities
Feb 2019
27
Feb
Processing of Aggregations over Big Data Streams
Online analytics and real-time data processing in most advanced IoT, scientific, business, and defense applications, rely heavily on the efficient execution of large numbers of [...]
21
Feb
Ending the Era of Information Overload and Cognitive Fatigue
In the post-digital era we face the risk of cognitive insufficiency in the attempt of dealing with the increasing exposure to large volume of data [...]
20
Feb
Optimally Gathering Two Robots
We present a self-stabilizing algorithm that ensures in finite time the gathering of two robots in the non-rigid ASYNC model. To circumvent established impossibility results, [...]
13
Feb
Human Behavior is Low Dimensional
Every person is unique and complex. But can we predict anything about how large groups of people will behave? In the 1950s the writer [...]
06
Feb
Fully Dynamic k-center Clustering
Static and dynamic clustering algorithms are a fundamental tool in any machine learning library. Most of the efforts in developing dynamic machine learning and data mining algorithms [...]
Jan 2019
30
Jan
Resource Allocation in Cloud Radio Access Networks: A Combinatorial Optimization Point of View
In this presentation, we would like to focus on two well known NP-Hard problems and then provide a combinatorial optimization view before proposing new and [...]
23
Jan
Thesis Defense : Auction-based Dynamic Resource Orchestration in Cloud-based Radio Access Networks
The paradigm of a Cloud-based RAN (C-RAN) is a key technology that combines the enabling solutions for the 5G requirements in terms of data rate, [...]
16
Jan
Internet Video Quality Inference from Encrypted Network Traffic
Accurately monitoring application performance is becoming more important for Internet Service Providers (ISPs), as users increasingly expect their networks to consistently deliver acceptable application quality. [...]
Dec 2018
12
Dec
Protecting encrypted data against key exposure
Hardening data protection using multiple methods rather than solely encryption is of paramount importance when considering continuous and powerful attacks to spy private and confidential information. Our research focuses on reinforcing data protection using a combination of data fragmentation, encryption, and dispersion. Each operation participates in the increasing of the protection level. We aim at minimizing the additional processing costs due to data fragmentation and dispersion.
05
Dec