In the past decade there has been a significant increase in the collection of personal information and communication metadata (with whom users communicate, when, how often) by governments, Internet providers, companies, and universities. While there are many ongoing efforts to secure users' communications, namely end-to-end encryption messaging apps and E-mail services, safeguarding metadata remains elusive.
Following the progress in computing and machine learning algorithms as well as the emergence of big data, artificial intelligence (AI) has become a reality impacting every fabric of our algorithmic society. Despite the explosive growth of machine learning, the common misconception that machines operate on zeros and ones, therefore they should be objective, still holds. But then, why does Google Translate convert these Turkish sentences with gender-neutral pronouns, “O bir doktor. O bir hemşire”, to these English sentences, “He is a doctor. She is a nurse”?
The hybrid fiber-coaxial network has evolved since 1997 to become the most popular broadband technology passing 97% of American homes and offering gigabit speeds. This presentation will cover the physical layer hybrid fiber coaxial network and the data over cable (DOCSIS) implementation used by US operators. In addition to the core technology, we will discuss the practical operation and evolution of cable-based broadband access.
In today's fast-paced developing digital world, a wide range of services such as web services, social networks and mobile devices collect a large amount of data from the users about their personal activities. Although sharing and mining the collected large-scale personal data can help improve the functionality of these services, it also raises concerns of protecting the privacy of the individuals who contribute to the data.
TCP is widely used for client-server communication in modern data centers. But TCP packet handling is notoriously CPU intensive, accounting for an increasing fraction of data center processing time. Techniques such as TCP segment offload, kernel bypass, and RDMA are of limited benefit for the typical small, frequent RPCs. These techniques can also compromise protocol agility, resource isolation, overall system reliability, and complicate multi-tenancy.
The reconstruction of 3D scenes and their appearance from imagery is one of the longest-standing problems in computer vision. Originally developed to support robotics and artificial intelligence applications, it has found some of its most widespread use in support of interactive 3D scene visualization. One of the keys to this success has been the melding of 3D geometric and photometric reconstruction with a heavy re-use of the original imagery, which produces more realistic rendering than a pure 3D model-driven approach.