Networks and Communications

Available Speakers on this Topic

Dorian C Arnold – Atlanta, GA, United States

Saurabh Bagchi – West Lafayette, IN, United States

David H Bailey – Alamo, CA, United States

Brian A. Barsky – Berkeley, CA, United States

Swarup Bhunia – Gainesville, FL, United States

  • Computing in Memory for Data-Intensive Applications
    Energy-efficiency has emerged as a major barrier in performance scalability for applications that require handling large volume of data including analytics and informatics applications. For...
  • FPGA Security: New Frontiers
    Reconfigurable hardware platforms, e.g. Field Programmable Gate Arrays (FPGAs) are being increasingly deployed in diverse applications including the emerging Internet of Things (IoT) edge devices,...
  • Security of the Internet of Things: Are We Paranoid Enough?
    Security has become a critical design challenge for modern electronic hardware. With the emergence of the Internet of Things (IoT) regime that promises exciting new applications from smart...

Christophe Bobda – Fayetteville, AR, United States

Erik Brunvand – UT, United States

Tracy K Camp – CO, United States

Dipankar Dasgupta – Memphis, TN, United States

Tassos Dimitriou – Athens, Greece

Falko Dressler – Paderborn, Germany

Chuck Easttom – Plano, TX, United States

  • Cryptographic Backdoors
    This is an overview of cryptographic backdoors, their function and purpose. Specific research is discussed including examples such as Dual_EC_DRBG and backdoors in RSA. This is appropriate for...
  • Quantum Computing and Lattice Based Cryptography
    This lecture provides an overview of the current state of quantum computing and what impact that will have on cryptography.  Then cryptogrphic algorithms that are believed to be resistent to...
  • S-Box Design
    Symmetric ciphers are widely used to provide secure communications and data storage.  The ubiquitous nature of the symmetric cipher, indicates that its underlying structure is worth...
  • Steganography
    This lecture begins with an overview of steganography, including the history of steganography techniques. Basic current methods (LSB and DCT) are discussed. The lecture then describes more...

Silvia Giordano – MANNO ,TI, Switzerland

  • Is the future mobile networking?
    In the last decades, mobile ad hoc networking has been suggested as a technology for realizing the ubiquitous computing vision. However, after more than ten years of research in this field, this...
  • Mobile Hoc Networking: Cutting edge Directions
    Starting from the  reasons why the multi-hop ad hoc networking paradigm  did not have a major impact on computer communications, this talk presents the evolution of the multi-hop ad hoc...
  • People in mobile ad hoc networking
    The mobile/multihop ad hoc networking paradigm was born with the idea of extending the Internet services to group of mobile users. In those networks, often referred to as MANETs (Mobile Ad...
  • The Human Element as the Key Enabler of Big Data and Pervasiveness Visions
    The recent proliferation of smartphones/tablets has brought data networking to the general public. This has the potential of achieving the pervasive computing vision by putting the human element...
  • Towards Sustainable Mobility through Social Innovation
    One of the main challenges in reaching the goals of a sustainable society is human mobility. Transportation is a basic need for society and economy on one side having negative consequences...

Michael Gschwind – Yorktown Heights, NY, United States

Gururaj H L – Mysuru, India

  • Computer Network Simulators and Emulators
    In regard to network testing, the terms emulation and simulation are often used interchangeably. In most cases, either term will generally get the point across, but there’s a big...
  • QoS aware Congestion Control in Real Time Networks
    Tactical networks are heterogeneous network which facilitates information sharing and data exchange among military tactical force units. The tactical communication depends on factors such as...

Haitham S Hamza – Giza, Egypt

  • Demystifying the IoT Platforms
    The concept of Internet of things (IoT) has been around for more than a decade now and appears to continue attracting the attention of industry and research communities. The holistic vision...

Qi Han – Golden, CO, United States

Yu Hua – Wuhan, China

Dharm Singh Jat – Windhoek, AR, Namibia

Benjamin Kenwright – Leicester, United Kingdom

  • Memory management: Fast Efficient Fixed-Sized Memory Pools
    This lecture discusses the importance of memory in the context of performance.  We examine and present a ready-to-use, robust, and computationally fast fixed-size memory pool manager...
  • Debugging Game Systems (Practical Debugging)
    The practical challenges of debugging large software projects (such as video games) is important – not just the ability to track down issues but to write software that makes the...
  • High Performance Graphics with Vulkan
    This lecture introducing the listener to the Vulkan cross platform 3D graphics API - including examples and discussion on the practical aspects. The lecture address questions, such...
  • Inverse Kinematics
    Inverse kinematics is the mathematical process for calculating the movement of objects. This is useful in a whole range of fields, from engineering and robotics to medical analysis and...
  • Opportunities and Challenges in Teaching Video Games in Higher Education
    This lecture discusses the opportunities and challenges of video game curricula. The talk explores the diversity of the subject from both an artistic and technical perspective - centred around...

Samee U Khan – Fargo, ND, United States

  • Big Data Recommendation Systems
    Recommendation systems were developed in the 90s to address the challenges of automatic and personalized selection of data from diverse and overloaded sources of information. These systems...
  • Data Center Networks: Trends, Opportunities, and Challenges
    The major Information and Communication Technology (ICT) components within a data center are: (a) servers, (b) storage, and (c) interconnection networks. The data center network (DCN) is...
  • Universal Design in Learning
    It is a well-known fact that the human learning experience is not universal. Consequently, when developing instructional materials, we must be cognizant of techniques and procedures that...

Anis Koubaa – Riyadh, Saudi Arabia

Ponnurangam Kumaraguru – New Delhi, India

Ashish Kundu – Yorktown Heights, NY, United States

  • HMACs for Graph Data
    Graphs are widely used in the representation and processing of data in several domains. Assurance of integrity of graph data is essential. Related work has shown that the digital signatures...

Perry Victor Lea – Boise, ID, United States

  • 5G Communication for IoT
    5G communication is being developed, marketed, and planned on by anyone involved in communication.  The plans are big: Gigabit speeds, 1 million nodes by square kilometer, maintain...
  • Computer Architecture Flops and Failures
    During this conversation, we will discuss computer flops.  Not necessarily floating-point operations per second, but failures and pitfalls that have served the computer industry for...
  • Fog Computing and the 20% Rule
    Fog computing is the extension of the cloud to the edge of compute.  As the world grows to 50 billion connected objects, certain laws of physics preside that need to be discussed.  Fog...
  • In Memory Intelligence  The Legacy of von-Neumann
    This lecture will talk about cutting edge design that’s been in the works for 40 years.  We will dive in deep on in-memory computing not using typical tricks like caches, HBM and...

Hai Li – Durham, NC, United States

Gabriel H Loh – Bellevue, WA, United States

Chenyang Lu – Clayton, MO, United States

  • Dependable Internet of Things
    IoT-driven control underpins many IoT applications in industries and smart cities.  In contrast to best-effort IoT often found in consumer markets, there remain daunting challenges to...

Yung-Hsiang Lu – West Lafayette, IN, United States

  • Mobile Computing in a Connected World
    Mobile computers connected to the Internet allow users anywhere to create, share, and retrieve information. Despite the convenience, mobile computers have one critical disadvantage: the...
  • Opportunities and Challenges in Global Network Cameras
    Millions of network cameras have been deployed. Many of these cameras provide publicly available data, continuously streaming live views of national parks, city halls, streets, highways,...
  • Power Management- A System View
    Reducing power consumption is important for electronic systems due to many reasons.  Battery-powered mobile systems and embedded systems are widely used today.  Energy cost...

Chenyang Lu – Clayton, MO, United States

  • Real-Time Cloud Computing
    Recent years have witnessed increasing demand for real-time cloud services to support Internet of Things and other time-critical applications.  However, existing virtualization and cloud...
  • Real-Time Internet of Things
    Recent years have witnessed increasing demand for real-time cloud services to support Internet of Things and other time-critical applications.  However, existing virtualization and cloud...

Jeanna N Matthews – Potsdam, NY, United States

Varun G Menon – Ernakulam, India

Prabhat Mishra – Gainesville, FL, United States

  • Design Automation for Embedded Systems
    Embedded systems are everywhere. They run the computing devices hidden inside a vast array of everyday products such as mobile phones, gadgets, cameras, and smart appliances. Cars are full of...
  • Validation of Hardware Security and Trust
    Reusable hardware Intellectual Property (IP) based System-on-Chip (SoC) design has emerged as a pervasive design practice in the industry to dramatically reduce design/verification cost while...

Anand Nayyar – Da Nang, Viet Nam

  • Securing Wireless Communications
    Computer Network is significant aspect of our day-to-day life now by which we can share the information via different technologies such as Wired or Wireless. With recent boom in Smart...
  • Transforming the World in Digital Ecosystem via Internet of Things
    The explosive growth of “Internet of Things” is changing our world and the rapid development of sensors, MEMS technology, is allowing IoT adaption in Industries, Medical areas,...
  • Wireless Sensor Communications
    Wireless Sensor Communications are picking up in various sectors like Agriculture, Health-care, Military based Battlefield communications, Space Communications and even underwater...

Sharath Pankanti – Yorktown Heights, NY, United States

  • Actionable Video Content Summarization: Lessons from Practical Case Studies
    For the first time in the history of universe, the video data generated by humans has exceeds all other forms of the data. While no one denies the utility of the information hidden within...
  • Biometrics
    The determination of identity can be accomplished by three generic means. Conventionally, an exclusive possession (either a physical, e.g., key or electronic, e.g., cookie), knowledge (e.g.,...
  • Multi-media Compliance: A practical paradigm for managing business integrity
    In virtually every business context there is a need to establish some form of monitoring system to ensure that employees comply with business processes and policies. Compliance failures range from...
  • Public Sector Surveillance
    Situation awareness is the key to security. Awareness requires information that spans multiple scales of space and time. The increasing need for sophisticated surveillance systems and the move to...
  • Retail video analytics
    The retail industry grosses trillions of USD revenue annually worldwide and provides numerous opportunities for innovation to facilitate real-world business operations. Applications include: loss...

Shrisha Rao – Bangalore, India

  • Resource Management in Cloud Computing
    Cloud computing is an increasingly popular paradigm of offering services over the Internet; it is also an active area of research. One key area that calls for innovative approaches, is...
  • Sustainability in IT Systems
    While we all appreciate the ways in which information technology (IT) has revolutionized society, it is becoming increasingly obvious that the full benefits of IT will be available to us...

Abhishek Roy – Seoul, Republic of Korea

  • 3GPP Machine Type Communications (MTC)  An Overview
    The Third Generation Partnership Project (3GPP) has been working on developing specifications on Machine Type Communications (MTC), also known as Machine to Machine Communications (M2M). This is...
  • D2D Communications: Technology and Prospect
    Next generation 5G networks contemplate to exploit millimeter Wave (mmWave) for a massive increase in data rates but its inherent characteristic of line-of-sight (LoS) brings up the challenge of...
  • DISASTER DETECTION AND RECOVERY
    In this lecture, we will talk about the challenges of autonomous cell outage detection (COD) in Self-Organizing Networks (SON). COD is a pre-requisite to trigger fully automated self-healing...
  • Greening of Mobile Networks  Myths and Opportunities
    Next generation 5G wireless networks envision innovative radio technologies for ultra dense deployment with improved coverage and higher data rates. However, the deployment of ultra dense 5G...
  • Mobile Wi-MAX for Broadband Wireless Internet
    Mobile WiMAX is a fast growing broadband access technology that enables low-cost mobile Internet applications, and realizes the convergence of mobile and fixed broadband access in a single air...
  • Modulation and Coding
    In a digital communication system, the source to be transmitted is discrete both in time and amplitude. Digital information carrying signals must be first converted to an analog waveform prior to...
  • Next Generation 5G Wireless Networks
    The vision of next generation 5G wireless communications lies in providing very high data rates (typically of Gbps order), extremely low latency, manifold increase in base station capacity, and...
  • Opportunities and Challenges in Machine-to-Machine Communications
    Machine-to-machine (M2M) communications have emerged as a cutting edge technology for next-generation communications, and are undergoing rapid development and inspiring numerous applications....
  • Regulatory Issues in M2M Communications
    Machine-to-machine (M2M) solutions are rolling out worldwide and across all industries - possibly being a key enabler of applications and services covering a broad range of vertical markets (e.g.,...
  • Resource Allocation in Cellular Network and HetNets
    Heterogeneous wireless networks with small-cell deployments in licensed and unlicensed spectrum bands are a promising approach for expanding wireless connectivity and service. As a result,...
  • Traffic-Driven Power Saving in Operational 3G Cellular Networks
    Base stations (BSes) in the 3G cellular networks are not energy proportional with respect to their carried traffic load. Our mea- surements show that 3G traffic exhibits high fluctuations both in...
  • Tutorial on OMNeT++ (Part-1)
    OMNeT++ (Objective Modular Network Testbed in C++) is a modular, component-based C++ simulation library and framework, primarily for building network simulators. OMNeT++ can be used for free for...
  • Tutorial on OMNeT++ (Part-2)
    OMNeT++ (Objective Modular Network Testbed in C++) is a modular, component-based C++ simulation library and framework, primarily for building network simulators. OMNeT++ can be used for...

Sherif Sakr – Riyadh, Saudi Arabia

  • Big Data 2.0 Processing Engines
    For a decade, the MapReduce framework, and its open source realization, Hadoop, has emerged as a highly successful framework that has created a lot of momentum such that it has become the defacto...
  • Big Data Science as a Service
    Recently, big data science has emerged as a modern and important data analysis discipline. It is considered as an amalgamation of classical disciplines such as statistics, artificial intelligence...
  • Data Analytics for Healthcare Services
    The last decade has seen huge advances in the scale of data we routinely generate and collect in pretty much everything we do, as well as our ability to use technology to analyze and understand...
  • Large Scale Graph Processing Systems
    Recently, people, devices, processes, and other entities have been more connected than at any other point in history. In general, a graph is a natural, neat, and flexible structure to model the...

Valentina Salapura – NY, United States

Xipeng Shen – Raleigh, NC, United States

Dhananjay Singh – Seoul, Republic of Korea

Andrew S Tanenbaum – Amsterdam, Netherlands

  • MINIX 3: A Reliable and Secure Operating System
    Most computer users nowadays are nontechnical people who have  a mental model of what they expect from a computer based on their experience with TV sets and stereos: you buy it, plug...

Sundar Vedantham – Allentown, PA, United States

Rakesh Verma – Houston, TX, United States

  • Talking to Computers - A Solved Problem?
    Life would be so much easier if computers could read and understand our directions in English, talk to people, and perhaps also compose stories and poems for them. Siri and Cortana...

Arun Vishwanath – Melbourne, VIC, Australia

Yu Wang – Beijing, China

Bebo White – San Francisco, CA, United States

  • Cybercurrencies and Blockchain (fiction, fallacy, fact, fun, and future)
    Hardly a day goes by without a news story about Bitcoin or Ethereum, two of the best known and strongest cybercurrency technologies. Opinions run the spectrum, from those who view it as...
  • Preparing for the Internet of Things
    The Internet as we have known it for the past three+ decades is in the midst of a major and disruptive change. “The Internet of Things (IOT)” will bring opportunities that could...
  • Storages Are Not Forever
    Like the well-known concern over diminishing fossil fuels, information technology is bringing its own unique future challenges. This lecture describes one of the most fundamental of these...

Moustafa A Youssef – New Borg Elarab City, Alexandria, Egypt

Demetrios Zeinalipour-Yazti – Nicosia, Cyprus