Fall 2021

Dec. 10
Real-time sampling and estimation: From IoT Markov processes to disease spread processes
Shirin Saeedi Bidokhti
University of Pennsylvania
| video |

Spring 2020

March 27
Information Theory and Deep Learning for Future Wireless Networks: Delivering the Promise of Efficiency and Security
Aly El Gamal
Purdue University

April 10
Security and Privacy for Distributed Optimization and Learning
Nitin Vaidya
Georgetown University

Fall 2019

Dec. 6
6G: Connecting the Unconnected
Mohamed-Slim Alouini
KAUST, Saudi Arabia
| slides |

Spring 2019

Feb. 1
Scalable security and privacy for an Internet on wheels
Panagiotis Papadimitratos
KTH, Stockholm, Sweden

April 3
Fundamentals for Low Latency Communications
H. Vincent Poor
Princeton University
| video | slides |

April 12
Mitigation of Multi-Vector Network Attacks via Orchestration of Distributed Rule Placement
Marinos Dimolianis
National and Technical University of Athens

May 2
Joint Distinguished Lecture: ANC and Maryland Transportation Institute
Making Intersections Safe with I2V Communications
Pravin Varaiya
University of California, Berkeley
| video | slides |

Co-sponsored by the Maryland Hybrid Networks Center, the Electrical and Computer Engineering Department, the Institute for Systems Research and the Maryland Transportation Institute

May 13
5G Service Automation
Chrysa Papagianni

Fall 2018

Nov. 14
Data compression and secrecy by design
Yanina Shkel
Princeton University
| video |

Nov. 16
Extended Mean Field Type Control and Applications to Energy Markets
Alain Bensoussan
University of Texas at Dallas
| video |

Spring 2018

Feb. 7
Noisy Search and Optimization for Next Generation Wireless Systems
Tara Javidi
Department of Electrical and Computer Engineering
University of California, San Diego
| slides | video |

April 6
Brain's Circuit Connectivity and its Dynamics
Behnaam Aazhang
Department of Electrical and Computer Engineering
Center for Neuroengineering
Rice University
| video |

April 20
Networks, Games, and Machine Learning
Tansu Alpcan
Department of Electrical and Electronic Engineering
University of Melbourne

May 23
When Subtleties Matter: Tuning the Receiver Structure and the Pilot-to-Data Power Ratio in Multiuser Multiple Input Multiple Output Systems
Gabor Fodor
Master Researcher, Ericsson Research, and
Adjunct Professor, Royal Institute of Technology (KTH), Sweden
| slides | video |

Fall 2017

Sept. 11
Recent NETMODE Activities on Internet Research and Experimentation
Vasilis Maglaris
School of Electrical & Computer Engineering
National Technical University of Athens (NTUA)
| video |

Spring 2017

Feb. 10
The SiLago Method: Next Generation VLSI Architecture and Design Methods
Ahmed Hemani
School of ICT, KTH, Sweden
slides | video |

March 1
Cover's Open Problem: The Capacity of the Relay Channel
Ayfer Ozgur
Stanford University
slides | video |

March 7
Communications Network Economics
Jianwei Huang
Department of Information Engineering
Chinese University of Hong Kong
| slides | video |

March 10
Studying large networks via local weak limit theory
Venkat Anantharam
University of California, Berkeley
| slides | video |

March 31
Analysis of Contagions in Multi-Layer and Multiplex Networks
Osman Yagan
Carnegie Mellon University
| video |

May 19
Security and privacy for emerging large-scale mobile systems
Panagiotis Papadimitratos
Stockholm, Sweden
| video |

Fall 2016

Sept. 16
Quantitative Cybersecurity Assessment: From Breach Prediction to Incentive Design
Mingyan Liu
Electrical Engineering and Computer Science
University of Michigan
| slides |

Sept. 30
User Authentication for Emerging Interfaces
Nasir Memon
New York University
| video | slides |

Oct. 7
The Economics of Interaction among Heterogeneous Providers in a Non-Neutral Network
Saswati Sarkar
University of Pennsylvania
| video | slides |

Oct. 28
Information Acquisition and Sequential Refinement of Belief
Tara Javidi
University of California, San Diego
| video |

Nov. 11
Security Challenges and Opportunities in SDN/NFV Networks
Ashutosh Dutta
| slides | video |

Nov. 18
Do You Trust Your Cloud? Verifiability, Accountability and Privacy for Remote Storage and Computation
Babis Papamanthou
University of Maryland
| video |

Dec. 9
Social opinion dynamics: agreement or disagreement
Yiguang Hong
Academy of Mathematics and Systems Science
Chinese Academy of Sciences
| video | slides |

Spring 2016

Feb. 12
Two recent information theoretic variations on the theme of patterns in security
Muriel Médard
Cecil H. Green Professor
Electrical Engineering and Computer Science Department
Massachusetts Institute of Technology
| video |

Feb. 19
Early Epidemic Detection — Inference from Weak Signals
Sanjay Shakkottai
Ashley H. Priddy Centennial Professor in Engineering
Director of the Wireless Networking and Communications Group
University of Texas
| video |

Feb. 26
Towards a theory of social dynamics over networks
Massimo Franceschetti
Electrical and Computer Engineering
University of California, San Diego
| video | slides |

March 4
Censor, Sketch, and Validate for Learning from Large-Scale Data
Georgios Giannakis
ADC Chair in Wireless Telecommunications
Department of Electrical and Computer Engineering
University of Minnesota
| video | slides |

March 11
The Road Ahead for Wireless Technology: Dreams and Challenges
Andrea Goldsmith
Stephen Harris Professor
Department of Electrical Engineering
Stanford University
| video | slides |

March 25
A Study of the Capacity of Optical Fiber Channels
Gerhard Kramer
Alexander von Humboldt Professor
Head of the Institute for Communications Engineering
Technische Universität München
| video |

March 25
Traffic Offloading and User Provided Wireless Networks: Theory and Novel Realizations
Leandros Tassiulas
Yale University

April 1
Complexity of dodging a bullet: on the topology of the space of directed paths
Yuliy Baryshnikov
University of Illinois
| video |

April 8
Fast approximation algorithms for p-center computation in large-scale informational

Iraj Saniee
Alcatel-Lucent Bell Labs
| video |

April 22
Queues and Bacteria—a Tale of Modeling and Experiment
Urbashi Mitra
University of Southern California
| video | slides |

April 29
Network Tomography
Ananthram Swami
Army Research Laboratory
| video |

May 2
Opinion Dynamics over Signed Social Networks
Guodong Shi
Australian National University
(A combined Advanced Networks/MBSE Colloquium)
| video | slides |

May 6
Strategies for controlling and suppressing noise in error-prone computing
Pulkit Grover
Carnegie Mellon University
| video |

Fall 2015

Sept. 18
Future Railway Communications
Bo Ai
State Key Lab of Rail Traffic Control and Safety
Beijing Jiaotong University

Spring-Summer 2014

March 28
Codes on Graphs
David Forney
Massachusetts Institute of Technology
| video |

March 28
Coding Theory and Access Control for Distributed Wireless Networking
Jie Rockey Luo
Colorado State University
| video |

July 18
On the optimality of treating interference as noise in competitive scenarios
Alex Dytso
University of Illinois at Chicago

Fall 2013

Aug. 23
Stability Analysis and Delay Optimality in Multi-Queue Multi-Server (MQMS) Systems
Ioannis Lambadaris
Department of Systems and Computer Engineering
Carleton University
Ottawa, Canada

Sept. 20
Challenges in Building Human Networks
Abdur Chowdhury
Co-founder, Alta Vista School
Former Chief Scientist, Twitter
| video | slides |

Oct. 7
Cloud Radio Access Downlinks, with Backhaul Constrained Oblivious Processing
Shlomo Shamai
William Fondiller Professor of Telecommunications
Technion-Israel Institute of Technology
| video | slides |

Oct. 8
Source Coding with Lists and Renyi Entropy
Amos Lapidoth
Professor of Information Theory
ETH Zurich
| video | slides |

Oct. 11
Bandit Optimization with Large Strategy Sets and Applications
Alexandre Proutiere
Associate Professor, School of Electrical Engineering
TKTH, the Royal Institute of Technology, Sweden
| video | slides |

Nov. 6
Navigating Internet Neighborhoods: Reputation, Its Impact on Security, and How to Crowd-Source It
Mingyan Liu
Professor, Dept. of Electrical Engineering and Computer Science
University of Michigan
| video | slides |

Spring 2013

April 23
Data-Efficient Quickest Change Detection
Venu Veeravalli
ECE Department and Coordinated Science Lab
University of Illinois at Urbana-Champaign

May 8
Recursive distributional equations, endogeny, and belief propagation via three examples
Rajesh Sundaresan
Coordinated Science Lab
University of Illinois at Urbana-Champaign

May 10
Analyzing (Big) Data Boxes: Multi-Way Compressed Sensing of Low-rank Tensors with Sparse Latent Structure
Nikolaos Sidiropoulos
University of Minnesota--Minneapolis

Fall 2012

Nov. 30
Security and Game Theory: Key Algorithmic Principles, Deployed Applications, Lessons Learned
Milind Tambe
University of Southern California
| video |

Spring 2012

Feb. 3
*-Aware Software for Cyber-Physical Systems
John A Stankovic
University of Virginia
| video | slides |

Feb. 17
The LiveLabs Testbed and Mobile Sensing-Based Applications
Archan Misra
School of Information Systems
Singapore Management University
| video | slides |

Feb. 24
Low-Complexity Scheduling Policies for Achieving Throughput and Delay Optimality in OFDM Downlink Systems
Ness Shroff
The Ohio State University
| video |

March 2
Fundamentals of Molecular Nano-Communication Networks
Ian Akyildiz
Georgia Institute of Technology
| video |

March 23
XIA: An Architecture for an Evolvable and Trustworthy Internet
Peter Steenkiste
Carnegie Mellon University
| slides |

March 30
Learning Equilibrium with a Minimum of Rationality
Peyton Young
James Meade Professor of Economics
Nuffield College
Oxford University
| video |

April 13
Extracting insight from large networks: implications of small-scale and large-scale structure
Michael Mahoney
Stanford University
| video |

April 20
Improving the Energy Efficiency of Data Centers
Tajana Simunic Rosing
University of California, San Diego
| video |

April 27
Network-based Statistical Models and Methods for Identification of Cellular Mechanisms of Action
Eric Kolaczyk
Department of Mathematics and Statistics
Boston University

Fall 2011

Sept. 9
State-Space Collapse via Drift Conditions
R. Srikant
University of Illinois at Urbana-Champaign
| video | slides |

Sept. 16
Physics of Algorithms: Belief Propagation and Beyond
Michael Chertkov
Los Alamos National Laboratory
| video | slides | movie in presentation |

Sept. 23
Sampling Online Social Networks
Athina Markopoulou
University of California, Irvine
| video | slides |

Sept. 30
Non-Bayesian Social Learning
Ali Jadbabaie
University of Pennsylvania
| video | slides |

Oct. 7
Multi-Armed Bandit: Learning in Dynamic Systems with Unknown Models
Qing Zhao
University of California, Davis
| video | slides |

Oct. 14
The Large Scale Curvature of Networks and its Implications for Network Management and Security
Iraj Saniee
Bell Laboratories
| video | slides |

Oct. 21
Network Science and the Internet: Lies, Damned Lies, and Statistics
Walter Willinger
AT&T Laboratories
| video | slides |

Oct. 28
What Have We Learned from Reverse-Engineering the Internet’s Inter-Domain Routing Protocol?
Timothy Griffin
University of Cambridge
| video | slides |

Nov. 4
Kalman and Kalman Bucy @ 50: Distributed and Intermittency
José M.F. Moura
Carnegie Mellon University
| video | slides |

Nov. 11
Popularity vs. Similarity in Growing Networks
Dmitri Krioukov
University of California, San Diego
| video | slides |

Nov. 18
Bilateral and Multilateral Exchanges for Peer-Assisted Content Distribution
Christina Aperjis
Hewlett-Packard Laboratories
| video | slides |

Dec. 2
Using the Network Structure of Annotation Data to Gain Insights into Gene Interactions and the Organization of Biological Function
Michelle Girvan
University of Maryland
| video | slides |

Dec. 9
Sequential Detection: Overview and Open Problems
George Moustakides
University of Patras
| video | slides |