Videos

Youtubed activities

Mar 2014

12 Mar

Network Fingerprinting: TTL-Based Router Signatures

12/03/2014    
2:00 pm-3:00 pm
Yves Vanaubel
Fingerprinting networking equipment has many potential applications and benefits in network management and security. More generally, it is useful for the understanding of network structures [...]
05 Mar

On the resiliency of the French Internet

05/03/2014    
2:00 pm-3:00 pm
Remi Varloot
This presentation focuses on the resiliency of the French Internet, studied from thepoint of view of network interconnectivity. We define a model for representing theBGP-level [...]

Feb 2014

26 Feb

Impact of the electronic architecture of optical slot switching nodes on latency in ring networks

26/02/2014    
2:30 pm-3:00 pm
Nihel Djoher Benzaoui
An optical slot switching node network called POADM (packet optical add-drop multiplexers) has formerly been proposed as a flexible solution for metropolitan ring networks to [...]
26 Feb

Energy-Aware Computing with Application Processors

26/02/2014    
2:00 pm-2:30 pm
Karel De Vogeleer
Energy aware computing is as ubiquitous as ubiquitous computing itself. The user experience and up-time of hand-held devices are affected directly by the squander of [...]
19 Feb

Optimal cache allocation for content-centric networking

19/02/2014    
2:00 pm-3:00 pm
Steve Uhligh
Content-Centric Networking (CCN) is a promis-ing framework for evolving the current network architecture,advocating ubiquitous in-network caching to enhance contentdelivery. Consequently, in CCN, each router has [...]
05 Feb

Be fair to flows: a fair network is attractive and trustworthy and far more than just adequate

05/02/2014    
2:00 pm-3:00 pm
James Roberts
The subject of active queue management is again highly topical with the recent creation of a new IETF working group. Regained interest has arisen notably [...]

Jan 2014

29 Jan

Protecting Privacy While Providing Utility in Published Network Mobility Traces Using Differential Privacy

29/01/2014    
2:00 pm-3:00 pm
Jim Kurose
Those who design, develop and deploy computer and networked systems, have a vital interest in how these systems perform in "real-world" scenarios. But real-world conditions [...]
22 Jan

COBRA: Lean Intra-domain Routing in NDN

22/01/2014    
2:00 pm-3:00 pm
Michele Tortelli
Named Data Networking (NDN) is an emerging In-formation Centric Networking architecture based on hierarchicalcontent names, in-network caching mechanisms, receiver-driven operations, and content-level security schema. NDN [...]
15 Jan

Community detection in stochastic block models via spectral methods

15/01/2014    
2:00 pm-3:00 pm
Laurent Massoulié
Community detection consists in identification of groups of similar items within a population. In the context of online social networks, it isa useful primitive for [...]

Dec 2013

11 Dec

Combating Internet Attacks Via Infiltration

11/12/2013    
2:00 pm-3:00 pm
Vern Paxson
Far and away the most energetic driver of modern Internet attacks is the ability of attackers to financially profit from their assaults. Many of these [...]