CS-E4000 - Seminar in Computer Science D, Lecture, 5.9.2022-10.12.2022
This course space end date is set to 10.12.2022 Search Courses: CS-E4000
Seminar Day Schedule
Completion requirements
Remember to bring your own laptop with the slides and questions for the student you are opponent for.
Location 1Fri 09:15-18:00 R037/1021-1022 AS3 Saab Space (Jan-Mikael Rybicki) | |||
Timeslot | Student name | Title | Opponent |
9:15-9:35 | Joonas Harjumäki | Intent-Based Networking | Dennis Marttinen |
9:35-9:55 | Zunaira Salam | Low Latency, Low Loss, Scalable Throughput (L4S) Protocol | Aaro Isomäki |
9:55-10:15 | Tiia Hyvönen | Comparison of current Identity Management Solutions/technologies | Valentin Ionita |
10:15-10:35 | Kiran Joy Kulangara | Psychometry for researching usable security | Joel Rämö |
Break: tea & coffee | |||
10:40-11:00 | Dennis Marttinen | Microservices - when and how to use them | Juho Pousi |
11:00-11:20 | Timo Nappa | Psychometry for researching usable security | Antti Nousiainen |
11:20-11:40 | Nami Naziri | A Survey on Data-Driven Animation Techniques | Anton Sulkava |
11:40-12:00 | Joel Rämö | Inference in human-AI interaction | Pierre Chapeau |
Lunch Break: TUAS buiding (code: CS-E4000) | |||
13:00-13:20 | Giancarlo Andriano | Cryptocurrencies price predictions using effictive factors | Aleksi Hirvensalo |
13:20-13:40 | Ahonen Joona | Computer-aided proofs for cryptography | Giancarlo Andriano |
13:40-14:00 | Johanna Sänger | Security indicators and warnings | Vishal Verma |
14:00-14:20 | Vishal Verma | Container isolation beyond namespaces | Kiran Joy Kulangara |
Break: tea & coffee | |||
14:30-14:50 | Yejun Zhang | Efficient methods for uncertainty in Deep learning | Wan Yue |
14:50-15:10 | Wan Yue | Misinformation classification and community detection on Twitter | Timo Nappa |
15:10-15:30 | Aleksi Hirvensalo | Container isolation beyond namespaces | Joona Ahonen |
Fri 09:15-18:00 R030/T4 A140 (Antti Ylä-Jääski) | |||
9:15-9:35 | Kerkko Karttunen | Adversarial attacks and defenses | Félix Lepeltier |
9:35-9:55 | Pierre Chapeau | Adversarial attacks and defenses | Kerkko Karttunen |
9:55-10:15 | Iiris Joutsi | Usability of passwords | Hung Nguyen |
10:15-10:35 | Hung Nguyen | Computer-aided proofs for cryptography | Johanna Sänger |
Break: tea & coffee | |||
10:40-11:00 | Félix Lepeltier | Recent advances in Reinforcement Learning | Christian Montecchiani |
11:00-11:20 | Christian Montecchiani | Modern Generative Modelling Landscape | Elias Peltonen |
11:20-11:40 | Elias Peltonen | Recent advances in Reinforcement Learning | Yejun Zhang |
11:40-12:00 | Nicholas Saarela | Interactive global illumination algorithms based on ray tracing | Tarmo Asikainen |
Lunch Break: TUAS buiding (code: CS-E4000) | |||
13:00-13:20 | Aaro Isomäki | Adapting Kubernetes for Fog Computing | Oskari Järvinen |
13:20-13:40 | Oskari Järvinen | (Semantic) Service Discovery for Fog, Edge, and Web | Zunaira Salam (leave questions) |
13:40-14:00 | Valentin Ionita | Container isolation beyond namespaces | Iiris Joutsi |
14:00-14:20 | Antti Nousiainen | Container isolation beyond namespaces | Veli-Matti Rantanen |
Break: tea & coffee | |||
14:30-14:50 | Veli-Matti Rantanen | Computer-aided proofs for cryptography | Tiia Hyvönen |
14:50-15:10 | Juho Pousi | Microservices - when and how to use them | |
15:10-15:30 | Anton Sulkava | Passive IoT solutions for 6G | Nicholas Saarela |
15:30-15:50 | Tarmo Asikainen | Semantic interoperability for automotive vertical | Nami Naziri |
Last modified: Wednesday, 30 November 2022, 11:27 PM