Speaker: Yves Vanaubel Title : Network Fingerprinting: TTL-Based Router Signatures Abstract: Fingerprinting networking equipment has many potential applications and benefits in network management and security. More generally, it is useful for the understanding of network structures and their behaviors.
2013 November 13- Daphne Tuncer
Speaker: Daphne Tuncer Title : More Control Over Network Resources: An ISP Caching Perspective Abstract: Management operations performed by Content Delivery Network providers consist mainly in controlling the placement of contents at different storage locations and deciding where to serve
2013 October 30- Lifeng Wang
Speaker: Lifeng Wang Title : Secure Transmission with Antenna Selection in MIMO wiretap channels Abstract: Security and privacy have become increasingly significant concerns in wireless communication networks since the open nature of the wireless medium makes the wireless transmission
2013 October 23- Amna Abdul Wahid & Keith Jones
Speaker 1 : Amna Abdul Wahid Title : Optimising the Sampling Rate when Measuring Packet-level Performance in Networks Abstract: Optimal sampling of a network for measurement of parameters like mean delay and loss probability is an active area of research.
2013 October 16- Jasson Casey
Speaker : Jasson Casey Title : Eliminating Network Protocol Vulnerabilities Through Abstraction and Systems Language Design Abstract: Incorrect implementations of network protocol message specifications affect the stability, security, and cost of network system development. Most implementation defects fall into one
2013 October 9- Dan Zhao
Speaker : Dan Zhao Title : Optimal Offline Resource Allocation for Multiple Access Channel with Conferencing Links and a Shared Renewable Energy Source Abstract: This research investigates the optimal resource allocation for the Gaussian multiple access channel (MAC) with conferencing links, where
2013 September 25- Dr. Neelesh B. Mehta
Speaker : Dr. Neelesh B. Mehta Title : Distributed, multiple access based selection schemes for wireless networks Abstract: Opportunistic selection arises in several opportunistic wireless communications systems. It is used to exploit multi-user diversity in cellular systems, to select relays in cooperative
2013 July 3- Dr. Gareth Tyson
Speaker : Dr. Gareth Tyson Title : Demystifying Porn 2.0: A look into a major adult video streaming website Abstract: The Internet has recently evolved into a huge video delivery infrastructure, with websites such as YouTube and Netflix appearing at
2013 June 19- Yun Li & Xingyu Han
Speaker1 : Yun Li Title : Adaptive Delay and Energy Efficient Duty Cycle Control for IEEE 802.15.4 Home Area Networks Abstract: The current IEEE 802.15.4 medium access control (MAC) protocol lacks effective delay-sensitive data transmission and adaptive duty cycle control
2013 June 12- Dr.Marco Canini
Speaker : Dr.Marco Canini Title : Reaping the Benefits of Partial SDN Deployment in Enterprise Networks Abstract: The operational challenges posed in enterprise networks, present an appealing opportunity for the software-defined orchestration of the network (SDN). However, the primary challenge