Networks and Communications

Available Speakers on this Topic

Dorian C Arnold

Saurabh Bagchi

David H Bailey

Brian A. Barsky

Swarup Bhunia

  • Computing in Memory for Data-Intensive Applications
    Energy-efficiency has emerged as a major barrier in performance scalability for applications that require handling large volume of data including analytics and informatics applications. For these...
  • FPGA Security: New Frontiers
    Reconfigurable hardware platforms, e.g. Field Programmable Gate Arrays (FPGAs) are being increasingly deployed in diverse applications including the emerging Internet of Things (IoT) edge devices, biomedical,...
  • Security of the Internet of Things: Are We Paranoid Enough?
    Security has become a critical design challenge for modern electronic hardware. With the emergence of the Internet of Things (IoT) regime that promises exciting new applications from smart cities...

Christophe Bobda

Erik Brunvand

Tracy K Camp

Dipankar Dasgupta

Tassos Dimitriou

Falko Dressler

Chuck Easttom

  • Cryptographic Backdoors
    This is an overview of cryptographic backdoors, their function and purpose. Specific research is discussed including examples such as Dual_EC_DRBG and backdoors in RSA. This is appropriate for general...
  • Quantum Computing and Lattice Based Cryptography
    This lecture provides an overview of the current state of quantum computing and what impact that will have on cryptography.  Then cryptogrphic algorithms that are believed to be resistent to quantum...
  • S-Box Design
    Symmetric ciphers are widely used to provide secure communications and data storage.  The ubiquitous nature of the symmetric cipher, indicates that its underlying structure is worth study. ...
  • Steganography
    This lecture begins with an overview of steganography, including the history of steganography techniques. Basic current methods (LSB and DCT) are discussed. The lecture then describes more advanced...

Silvia Giordano

  • Is the future mobile networking?
    In the last decades, mobile ad hoc networking has been suggested as a technology for realizing the ubiquitous computing vision. However, after more than ten years of research in this field, this promising...
  • Mobile Hoc Networking: Cutting edge Directions
    Starting from the  reasons why the multi-hop ad hoc networking paradigm  did not have a major impact on computer communications, this talk presents the evolution of the multi-hop ad hoc networking...
  • People in mobile ad hoc networking
    The mobile/multihop ad hoc networking paradigm was born with the idea of extending the Internet services to group of mobile users. In those networks, often referred to as MANETs (Mobile Ad hoc...
  • The Human Element as the Key Enabler of Big Data and Pervasiveness Visions
    The recent proliferation of smartphones/tablets has brought data networking to the general public. This has the potential of achieving the pervasive computing vision by putting the human element in...
  • Towards Sustainable Mobility through Social Innovation
    One of the main challenges in reaching the goals of a sustainable society is human mobility. Transportation is a basic need for society and economy on one side having negative consequences and...

Michael Gschwind

Haitham S Hamza

  • Demystifying the IoT Platforms
    The concept of Internet of things (IoT) has been around for more than a decade now and appears to continue attracting the attention of industry and research communities. The holistic vision of...

Qi Han

Yu Hua

Dharm Singh Jat

Benjamin Kenwright

  • Memory management: Fast Efficient Fixed-Sized Memory Pools
    This lecture discusses the importance of memory in the context of performance.  We examine and present a ready-to-use, robust, and computationally fast fixed-size memory pool manager with...
  • Debugging Game Systems (Practical Debugging)
    The practical challenges of debugging large software projects (such as video games) is important – not just the ability to track down issues but to write software that makes the process...
  • High Performance Graphics with Vulkan
    This lecture introducing the listener to the Vulkan cross platform 3D graphics API - including examples and discussion on the practical aspects. The lecture address questions, such as: 
    •...
  • Inverse Kinematics
    Inverse kinematics is the mathematical process for calculating the movement of objects. This is useful in a whole range of fields, from engineering and robotics to medical analysis and video...
  • Opportunities and Challenges in Teaching Video Games in Higher Education
    This lecture discusses the opportunities and challenges of video game curricula. The talk explores the diversity of the subject from both an artistic and technical perspective - centred around solutions...

Samee U Khan

  • Big Data Recommendation Systems
    Recommendation systems were developed in the 90s to address the challenges of automatic and personalized selection of data from diverse and overloaded sources of information. These systems apply...
  • Data Center Networks: Trends, Opportunities, and Challenges
    The major Information and Communication Technology (ICT) components within a data center are: (a) servers, (b) storage, and (c) interconnection networks. The data center network (DCN) is considered...
  • Universal Design in Learning
    It is a well-known fact that the human learning experience is not universal. Consequently, when developing instructional materials, we must be cognizant of techniques and procedures that may...

Anis Koubaa

Ponnurangam Kumaraguru

Ashish Kundu

  • HMACs for Graphs
    Graphs are widely used in the representation and processing of data in several domains. Assurance of integrity of graph data is essential. Related work has shown that the digital signatures for graphs...

Perry Victor Lea

  • 5G Communication for IoT
    5G communication is being developed, marketed, and planned on by anyone involved in communication.  The plans are big: Gigabit speeds, 1 million nodes by square kilometer, maintain link...
  • Computer Architecture Flops and Failures
    During this conversation, we will discuss computer flops.  Not necessarily floating-point operations per second, but failures and pitfalls that have served the computer industry for the...
  • Fog Computing and the 20% Rule
    Fog computing is the extension of the cloud to the edge of compute.  As the world grows to 50 billion connected objects, certain laws of physics preside that need to be discussed.  Fog computing...
  • In Memory Intelligence  The Legacy of von-Neumann
    This lecture will talk about cutting edge design that’s been in the works for 40 years.  We will dive in deep on in-memory computing not using typical tricks like caches, HBM and die...

Hai Li

Gabriel H Loh

  • Computer Architectures for 3D Die Stacking
    Session 1 Title: Die Stacking and it Architectural Implications
    Session 2 Title: Introduction to Die-Stacked Memory Systems
    Session 3 Title: Advanced Topics in...
  • Memory Organizations for 3D Die Stacking
    This talk provides a brief overview and review of die-stacking technologies, covering some of the different types of options out there for stacking, and in particular focusing on how the different...

Yung-Hsiang Lu

  • Mobile Computing in a Connected World
    Mobile computers connected to the Internet allow users anywhere to create, share, and retrieve information. Despite the convenience, mobile computers have one critical disadvantage: the limited...
  • Opportunities and Challenges in Global Network Cameras
    Millions of network cameras have been deployed. Many of these cameras provide publicly available data, continuously streaming live views of national parks, city halls, streets, highways, and...
  • Power Management- A System View
    Reducing power consumption is important for electronic systems due to many reasons.  Battery-powered mobile systems and embedded systems are widely used today.  Energy cost has...

Jeanna N Matthews

Prabhat Mishra

  • Design Automation for Embedded Systems
    Embedded systems are everywhere. They run the computing devices hidden inside a vast array of everyday products such as mobile phones, gadgets, cameras, and smart appliances. Cars are full of them,...
  • Validation of Hardware Security and Trust
    Reusable hardware Intellectual Property (IP) based System-on-Chip (SoC) design has emerged as a pervasive design practice in the industry to dramatically reduce design/verification cost while meeting...

Sharath Pankanti

  • Actionable Video Content Summarization: Lessons from Practical Case Studies
    For the first time in the history of universe, the video data generated by humans has exceeds all other forms of the data. While no one denies the utility of the information hidden within this...
  • Biometrics
    The determination of identity can be accomplished by three generic means. Conventionally, an exclusive possession (either a physical, e.g., key or electronic, e.g., cookie), knowledge (e.g., password,...
  • Multi-media Compliance: A practical paradigm for managing business integrity
    In virtually every business context there is a need to establish some form of monitoring system to ensure that employees comply with business processes and policies. Compliance failures range from organized...
  • Public Sector Surveillance
    Situation awareness is the key to security. Awareness requires information that spans multiple scales of space and time. The increasing need for sophisticated surveillance systems and the move to a...
  • Retail video analytics
    The retail industry grosses trillions of USD revenue annually worldwide and provides numerous opportunities for innovation to facilitate real-world business operations. Applications include: loss prevention,...

Shrisha Rao

  • Resource Management in Cloud Computing
    Cloud computing is an increasingly popular paradigm of offering services over the Internet; it is also an active area of research. One key area that calls for innovative approaches, is proper...
  • Sustainability in IT Systems
    While we all appreciate the ways in which information technology (IT) has revolutionized society, it is becoming increasingly obvious that the full benefits of IT will be available to us and...

Sherif Sakr

  • Big Data 2.0 Processing Engines
    For a decade, the MapReduce framework, and its open source realization, Hadoop, has emerged as a highly successful framework that has created a lot of momentum such that it has become the defacto standard...
  • Big Data Science as a Service
    Recently, big data science has emerged as a modern and important data analysis discipline. It is considered as an amalgamation of classical disciplines such as statistics, artificial intelligence and...
  • Data Analytics for Healthcare Services
    The last decade has seen huge advances in the scale of data we routinely generate and collect in pretty much everything we do, as well as our ability to use technology to analyze and understand it....
  • Large Scale Graph Processing Systems
    Recently, people, devices, processes, and other entities have been more connected than at any other point in history. In general, a graph is a natural, neat, and flexible structure to model the complex...

Valentina Salapura

Xipeng Shen

Andrew S Tanenbaum

  • MINIX 3: A Reliable and Secure Operating System
    Most computer users nowadays are nontechnical people who have  a mental model of what they expect from a computer based on their experience with TV sets and stereos: you buy it, plug it...

Rakesh Verma

  • Talking to Computers - A Solved Problem?
    Life would be so much easier if computers could read and understand our directions in English, talk to people, and perhaps also compose stories and poems for them. Siri and Cortana notwithstanding,...

Arun Vishwanath

Yu Wang

Bebo White

  • Cybercurrencies and Blockchain (fiction, fallacy, fact, fun, and future)
    Hardly a day goes by without a news story about Bitcoin or Ethereum, two of the best known and strongest cybercurrency technologies. Opinions run the spectrum, from those who view it as mainly...
  • Preparing for the Internet of Things
    The Internet as we have known it for the past three+ decades is in the midst of a major and disruptive change. “The Internet of Things (IOT)” will bring opportunities that could hardly...
  • Storages Are Not Forever
    Like the well-known concern over diminishing fossil fuels, information technology is bringing its own unique future challenges. This lecture describes one of the most fundamental of these concerns...

Moustafa A Youssef

Demetrios Zeinalipour-Yazti