Colloquia

Page 1 of 6 123456 >>

DLS in Cybersecurity: Secure Deduplication - Models and Optimization
Deduplication is a widely used mechanism in cloud storage systems which can greatly increase efficiency. The basic idea is to remove duplicate stored files, replacing copies with a pointer to a...

"Das Akademische Viertel" mit Informatikprofessor Christian Reuter
Professor Christian Reuter ist als Informatiker seit 1. Oktober 2017 neuberufen an der TU Darmstadt. Sein Impulsvortrag stellt das Arbeitsgebiet der neu eingerichteten Professur dar: Wissenschaft und...

Talk: A cryptographic treatment of secure channels for bidirectional and group communication
Speaker: Dr. rer. nat. Giorgia Marson (NEC Laboratories Europe)
Abstract Secure channels allow two or more users to communicate in a confidential and authentic manner over an unprotected network. The general understanding seems to be that providing...

***Cancelled*** CE-Seminar: HPC Programming Models and Tools: Programmer’s Expectations
***Cancelled*** Due to illness of the speaker, this talk has been cancelled. ---- Parallel programming for HPC systems is a challenging task, and will remain so. Although we have found that...

Öffentliche Antrittsvorlesung von Dr. Tatiana Landesberger von Antburg
Dr. Tatiana Landesberger von Antburg hält ihre Antrittsvorlesung im Rahmen ihrer Vorlesung "Informationsvisualisierung und Visual Analytics".   Die Antrittsvorlesung wird in...

Die Magie hinter Spring-Boot-Startern
Speaker: Michael Simons
Zusammen mit Spring Boot wird fast immer der Spring Initializr auf start.spring.io erwähnt: Eine komfortable REST-Anwendung, mit deren Hilfe sich Entwicklerinnen und Entwickler die Abhängigkeiten...

DLS in Cybersecurity: Security as a Science - Are we making progress?
Recent years have seen increasing calls to make security research more “scientific”. Who can argue with science being desirable? But what exactly do people mean when they suggest this, and what are...

Beyond Deep Learning: Multi-Person Pose Estimation and Multi-People Tracking
We have seen dramatic progress in computer vision in areas such as image classification, object recognition and human pose estimation spurred by large datasets and deep learning. In this talk I will...

DLS in Cybersecurity: Sanctum - Towards an Open-Source, Formally-Verified Secure Processor
Architectural isolation can be used to secure computation on a remote secure processor with a private key where the privileged software is potentially malicious as recently deployed by Intel's...

Runtime Verification Utilizing the Blockchain
The documentation and verification of real-world events plays an important role in smart systems, e.g., with regard to supply chains or logistics. Once events have been identified, it is necessary to...

Page 1 of 6 123456 >>

Service

Note

If you know about other events at the department not listed yet, please notify us at events(a-t)informatik.tu-darmstadt.de.

A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Suche Search | Kontakt Contact | Website Analysis: More Information
zum Seitenanfangzum Seitenanfang