Videos

Youtubed activities

Feb 2019

27 Feb

Processing of Aggregations over Big Data Streams

27/02/2019    
2:00 pm-3:00 pm
Professor Panos Chrysanthis
Online analytics and real-time data processing in most advanced IoT, scientific, business, and defense applications, rely heavily on the efficient execution of large numbers of [...]
21 Feb

Ending the Era of Information Overload and Cognitive Fatigue

21/02/2019    
2:00 pm-3:00 pm
Alessandra Sala
In the post-digital era we face the risk of cognitive insufficiency in the attempt of dealing with the increasing exposure to large volume of data [...]
20 Feb

Optimally Gathering Two Robots

20/02/2019    
2:00 pm-3:00 pm
Adam Heriban
We present a self-stabilizing algorithm that ensures in finite time the gathering of two robots in the non-rigid ASYNC model. To circumvent established impossibility results, [...]
13 Feb

Human Behavior is Low Dimensional

13/02/2019    
2:00 pm
Professor Mark Crovella
Every person is unique and complex.   But can we predict anything about how large groups of people will behave?  In the 1950s the writer [...]
06 Feb

Fully Dynamic k-center Clustering

06/02/2019    
2:00 pm
Mauro Sozio
Static and dynamic clustering algorithms are a fundamental tool in any machine learning library. Most of the efforts in developing dynamic machine learning and data mining algorithms [...]

Jan 2019

30 Jan

Resource Allocation in Cloud Radio Access Networks: A Combinatorial Optimization Point of View

30/01/2019    
2:00 pm
Makhlouf Hadji
In this presentation, we would like to focus on two well known NP-Hard problems and then provide a combinatorial optimization view  before proposing new and [...]
23 Jan

Thesis Defense : Auction-based Dynamic Resource Orchestration in Cloud-based Radio Access Networks

The paradigm of a Cloud-based RAN (C-RAN) is a key technology that combines the enabling solutions for the 5G requirements in terms of data rate, [...]
16 Jan

Internet Video Quality Inference from Encrypted Network Traffic

16/01/2019    
2:00 pm
Francesco Bronzino
Accurately monitoring application performance is becoming more important for Internet Service Providers (ISPs), as users increasingly expect their networks to consistently deliver acceptable application quality. [...]

Dec 2018

12 Dec

Protecting encrypted data against key exposure

12/12/2018    
2:00 pm
Katarzyna Kapusta
Hardening data protection using multiple methods rather than solely encryption is of paramount importance when considering continuous and powerful attacks to spy private and confidential information. Our research focuses on reinforcing data protection using a combination of data fragmentation, encryption, and dispersion. Each operation participates in the increasing of the protection level. We aim at minimizing the additional processing costs due to data fragmentation and dispersion.
05 Dec

Ranking online social users by their influence

05/12/2018    
2:00 pm-3:00 pm
Anastasios Giovanidis
TBA https://youtu.be/QA8ON74zvag