Family NameName Topic
SerkovaElenaTJ1 : Active learning
RathiJayshreeAYJ: Microservices - when and how to use them
KarakaşBuketAYJ: Microservices - when and how to use them
YagubluJeyhunAD: Deep Reinforcement Learning and Games
VasudevanAnandTA4: Firewalls and filtering policies for small networks
BertocchiMassimoTA1: Optimizing firewall policies
MoustafaMariam Moustafa WM: Task Allocation for Vehicular Fog Computing
BakićBojanaAYJ: Microservices - when and how to use them
AlkhafajiHusamu Aldeen SS2: Continuous Behavioral Authentication
CalabreseMatteoTA4: Firewalls and filtering policies for small networks
JavidSepehrTA4: Firewalls and filtering policies for small networks
SakaoğluSinanWM: Task Allocation for Vehicular Fog Computing
KhatiwadaBipinLC: Theoretical Framework for Cloud Computing Network Measurements
LekkalaSoumyaVH: Co-inference techniques for Edge and Fog computing
Tengana HurtadoLizzyWM: Task Allocation for Vehicular Fog Computing
ChiarelliAlessandroCB: Identity-hiding key exchange
SafargalievaAnastasiaTA1: Optimizing firewall policies
JiangGuangkaiYT: Image generation with generative models
HenrikssonKasper Anton AlexanderKKH: Approximation Algorithms for Clustering Problems
Rumi ChiapellaStefanoSS1: Biometric authentication beyond fingers and eyes
Howard BakerJulian JessenSS1: Biometric authentication beyond fingers and eyes
LimbagoJosephus Jasper DatoySS2: Continuous Behavioral Authentication
Valencia GómezJuan PabloLG: Tools and techniques for formal verification
ZhaoZetongTA2: Detecting anomalies in firewall configurations
LasockiKarol JakubSS: CNN over unordered sets
ZhouZixinWM: Task Allocation for Vehicular Fog Computing
SipiläHeikki SanteriLC: Theoretical Framework for Cloud Computing Network Measurements
Pham ThiSong HuongCB: identity-hiding key exchange
HamidMaryumYT: Image generation with generative models
LiuZixuanAD: Deep Reinforcement Learning and Games
PohjolaPeter Otso DanielCB: identity-hiding key exchange
FrimanOtso KasperiTA4: Firewalls and filtering policies for small networks
SpieringMartinTA4: Firewalls and filtering policies for small networks
BalassaÁdámLG: Tools and techniques for formal verification
WickströmJohn FelixJH: Asymmetric multi-core scheduling
PekkolaMarko TapaniAV1: Object tracking for mobile augmented reality
ZsemberiDániel BalázsNHK: Animating Virtual Characters with Deep Neural Networks
ShchevyevaAlenaNHK: Animating Virtual Characters with Deep Neural Networks
ValtonenValtteri MatiasAV1: Object tracking for mobile augmented reality
RenKunTA3: Layer-2 integrity protection
ZhuYifanALJ4: Explainable Empirical Risk Minimization
KanervaSara MartinaCB: identity-hiding key exchange
LinjamaAapo JukanpoikaMK:A survey of deterministic networking
LehtinenJoose Erkki JuhaniTA2: Detecting anomalies in firewall configurations
FacchiniStefanoAA: Aalto startup ecosystem (and/ or University ecosystem for student (and/or research-based and deep tech) startups
SumanDanALJ2:  Networked Federated Learning
MairueSami PetteriAV1: Object tracking for mobile augmented reality
GomesLendl LeoAA: Aalto startup ecosystem (and/ or University ecosystem for student (and/or research-based and deep tech) startups
ArteElias ViljamiAV1: Object tracking for mobile augmented reality
GuptaSuresh SikandarprasadAA: Aalto startup ecosystem (and/ or University ecosystem for student (and/or research-based and deep tech) startups
RäsänenTommi VilhelmJH: Asymmetric multi-core scheduling
GouilaBastienALJ2:  Networked Federated Learning
PirhonenAntonALJ4: Explainable Empirical Risk Minimization
 Chiarelli  Alessandro Individual topic
 Pham Huong Individual topic
 Kaukiainen Sergei Individual topic

Senast redigerad: fredag, 21 januari 2022, 12:55