Videos

Youtubed activities

Feb 2019

20 Feb

Optimally Gathering Two Robots

20/02/2019    
2:00 pm-3:00 pm
Adam Heriban
We present a self-stabilizing algorithm that ensures in finite time the gathering of two robots in the non-rigid ASYNC model. To circumvent established impossibility results, [...]
13 Feb

Human Behavior is Low Dimensional

13/02/2019    
2:00 pm
Professor Mark Crovella
Every person is unique and complex.   But can we predict anything about how large groups of people will behave?  In the 1950s the writer [...]
06 Feb

Fully Dynamic k-center Clustering

06/02/2019    
2:00 pm
Mauro Sozio
Static and dynamic clustering algorithms are a fundamental tool in any machine learning library. Most of the efforts in developing dynamic machine learning and data mining algorithms [...]

Jan 2019

30 Jan

Resource Allocation in Cloud Radio Access Networks: A Combinatorial Optimization Point of View

30/01/2019    
2:00 pm
Makhlouf Hadji
In this presentation, we would like to focus on two well known NP-Hard problems and then provide a combinatorial optimization view  before proposing new and [...]
23 Jan

Thesis Defense : Auction-based Dynamic Resource Orchestration in Cloud-based Radio Access Networks

The paradigm of a Cloud-based RAN (C-RAN) is a key technology that combines the enabling solutions for the 5G requirements in terms of data rate, [...]
16 Jan

Internet Video Quality Inference from Encrypted Network Traffic

16/01/2019    
2:00 pm
Francesco Bronzino
Accurately monitoring application performance is becoming more important for Internet Service Providers (ISPs), as users increasingly expect their networks to consistently deliver acceptable application quality. [...]

Dec 2018

12 Dec

Protecting encrypted data against key exposure

12/12/2018    
2:00 pm
Katarzyna Kapusta
Hardening data protection using multiple methods rather than solely encryption is of paramount importance when considering continuous and powerful attacks to spy private and confidential information. Our research focuses on reinforcing data protection using a combination of data fragmentation, encryption, and dispersion. Each operation participates in the increasing of the protection level. We aim at minimizing the additional processing costs due to data fragmentation and dispersion.
05 Dec

Ranking online social users by their influence

05/12/2018    
2:00 pm-3:00 pm
Anastasios Giovanidis
TBA https://youtu.be/QA8ON74zvag

Nov 2018

28 Nov

Too Many SDN Rules, Compress Them Using Minnie

28/11/2018    
2:00 pm-3:00 pm
Myriana Rifai
Software Defined Networking (SDN) is gaining momentum with the support of major manufacturers. While it brings flexibility in the management of flows within the data [...]
21 Nov

Thesis Defense : Hyperfractals for the Modelling of Wireless Networks

We are on the verge of an industrial revolution that will make cities smarter, industries more efficient and people’s life easier. Urban communication will place [...]