Editor, Bureaucrats, Administrators
264
edits
(→Topics) |
|||
(14 intermediate revisions by 5 users not shown) | |||
Line 1: | Line 1: | ||
== Details == | == Details == | ||
{{Announcement|''' | {{Announcement|'''Presentations: 19.01.2012'''}} | ||
{{CourseDetails | {{CourseDetails | ||
|credits=120h, 4 ECTS | |credits=120h, 4 ECTS | ||
|module=M.Inf.122/222: Seminar Telematik I/II ''-or-'' B.Inf.204/205: Proseminar I/II | |module=M.Inf.122/222: Seminar Telematik I/II ''-or-'' B.Inf.204/205: Proseminar I/II, (new Catalog:) M.Inf.1222.Mp''-or-'' B.Inf.1207/1208 | ||
|ta=[http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler] | |ta=[http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler] | ||
|time=please see [[#Schedule]] In general Thursdays 16:00. | |time=please see [[#Schedule]] In general Thursdays 16:00. | ||
Line 29: | Line 29: | ||
==Schedule== | ==Schedule== | ||
First meeting: Thursday Oct. 27th at 16:00 in 3.101 | First meeting: Thursday Oct. 27th at 16:00 in 3.101 | ||
FlexNow Deadline: Thursday Jan. 12th | |||
Presentations: Thursday Jan. 19th at 16:00 in 3.101 | |||
== Topics == | == Topics == | ||
Line 42: | Line 44: | ||
| Voice Over IP - A Success Story? | | Voice Over IP - A Success Story? | ||
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler] | | [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler] | ||
| [http://en.wikipedia.org/wiki/Voice_over_Internet_Protocol] | | [http://en.wikipedia.org/wiki/Voice_over_Internet_Protocol] [http://transition.fcc.gov/voip/] | ||
|- | |- | ||
| Business Models of the Underground Economy. | | Business Models of the Underground Economy. | ||
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler] | | [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler] | ||
| | | [http://www.blackhat.com/presentations/bh-dc-10/Stevens_Kevin/BlackHat-DC-2010-Stevens-Underground-wp.pdf] [http://weis2011.econinfosec.org/papers/The%20Underground%20Economy%20of%20Fake%20Antivirus%20Software.pdf] [http://www.cs.ucsb.edu/~vigna/publications/2011_stone_cova_gilbert_kemmerer_kruegel_vigna_torpig.pdf] | ||
|- | |- | ||
| Malware Detection in Networks - Anomaly Detection (multiple topics available) | | Malware Detection in Networks - Anomaly Detection (multiple topics available) | ||
Line 52: | Line 54: | ||
| [http://www.google.com/url?sa=t&rct=j&q=malware%20detection%20in%20networks&source=web&cd=1&ved=0CB4QFjAA&url=http%3A%2F%2Fwww.networkworld.com%2Fnews%2F2007%2F042507-malware-detection.html&ei=Rm2lTpTFHcrNswaijp2eAw&usg=AFQjCNG5qvZm7a4kS-L8ajgOmMNEVoDQZA&cad=rja] | | [http://www.google.com/url?sa=t&rct=j&q=malware%20detection%20in%20networks&source=web&cd=1&ved=0CB4QFjAA&url=http%3A%2F%2Fwww.networkworld.com%2Fnews%2F2007%2F042507-malware-detection.html&ei=Rm2lTpTFHcrNswaijp2eAw&usg=AFQjCNG5qvZm7a4kS-L8ajgOmMNEVoDQZA&cad=rja] | ||
|- | |- | ||
| Information Propagation in Social Networks | | <s>Information Propagation in Social Networks</s> ''(taken)'' | ||
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll] | | <s>[http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]</s> | ||
| [http://www.ccs.neu.edu/home/amislove/publications/Flickr-WWW.pdf] | | <s>[http://www.ccs.neu.edu/home/amislove/publications/Flickr-WWW.pdf]</s> | ||
|- | |- | ||
| Relationship Classification in Social Networks | | Relationship Classification in Social Networks | ||
Line 64: | Line 66: | ||
| [http://conferences.sigcomm.org/sigcomm/2011/papers/sigcomm/p62.pdf] [http://www.cse.iitb.ac.in/~puru/courses/spring11/cs620/references/costofcloud.pdf] [http://lcs.syr.edu/faculty/tang/Teaching/CSE791-Spring11/Papers/VL2-Sigcomm09.pdf] | | [http://conferences.sigcomm.org/sigcomm/2011/papers/sigcomm/p62.pdf] [http://www.cse.iitb.ac.in/~puru/courses/spring11/cs620/references/costofcloud.pdf] [http://lcs.syr.edu/faculty/tang/Teaching/CSE791-Spring11/Papers/VL2-Sigcomm09.pdf] | ||
|- | |- | ||
| Security and Privacy in Delay Tolerant Networks | | <s>Security and Privacy in Delay Tolerant Networks</s> ''(taken by Sromona Chatterjee)'' | ||
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed] | | <s>[http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]</s> | ||
| [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.71.8314&rep=rep1&type=pdf] [https://www.netlab.tkk.fi/opetus/s383151/articles/01659530.pdf] [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.60.7450&rep=rep1&type=pdf] | | <s>[http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.71.8314&rep=rep1&type=pdf] [https://www.netlab.tkk.fi/opetus/s383151/articles/01659530.pdf] [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.60.7450&rep=rep1&type=pdf]</s> | ||
|- | |- | ||
| Understanding Android Security | | Understanding Android Security | ||
Line 86: | Line 88: | ||
| Applications of Bloom Filter in Data Center Networking | | Applications of Bloom Filter in Data Center Networking | ||
| [http://www.net.informatik.uni-goettingen.de/people/lei_jiao Lei Jiao] | | [http://www.net.informatik.uni-goettingen.de/people/lei_jiao Lei Jiao] | ||
| [http://alex.fabrikant.us/papers/yfr09.pdf] [http://www.ce.sunysb.edu/~xwang/public/paper/ICNP_BF_Mcast.pdf] | | [http://alex.fabrikant.us/papers/yfr09.pdf] [http://www.ce.sunysb.edu/~xwang/public/paper/ICNP_BF_Mcast.pdf] [http://www.informatik.tu-darmstadt.de/fileadmin/user_upload/Group_CDC/Documents/Publikationen/201104_CN55_6__In-packet_Bloom_filters_-_Design_and_networking_applications.pdf] | ||
|- | |- | ||
| Routing strategies in Delay Tolerent Networks | | Routing strategies in Delay Tolerent Networks | ||
| [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu] | | [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu] | ||
| [http://delivery.acm.org/10.1145/1380000/1374652/p241-hui.pdf?ip=134.76.81.25&CFID=44287089&CFTOKEN=42866787&__acm__=1316779081_bdfa9e378cd848d6616ecfc6a0f9e5b1] [http://mcn.cse.psu.edu/paper/weigao/mobihoc09.pdf] [http://delivery.acm.org/10.1145/1290000/1288113/p32-daly.pdf?ip=134.76.81.25&CFID=44287089&CFTOKEN=42866787&__acm__=1316779310_6f8566b2d0ec634be8d30298ef9d129a] [http://prisms.cs.umass.edu/brian/pubs/bburns.infocom.2005.pdf][http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4585387][http://www-npa.lip6.fr/_publications/669-infocom06.pdf] | | [http://delivery.acm.org/10.1145/1380000/1374652/p241-hui.pdf?ip=134.76.81.25&CFID=44287089&CFTOKEN=42866787&__acm__=1316779081_bdfa9e378cd848d6616ecfc6a0f9e5b1] [http://mcn.cse.psu.edu/paper/weigao/mobihoc09.pdf] [http://delivery.acm.org/10.1145/1290000/1288113/p32-daly.pdf?ip=134.76.81.25&CFID=44287089&CFTOKEN=42866787&__acm__=1316779310_6f8566b2d0ec634be8d30298ef9d129a] [http://prisms.cs.umass.edu/brian/pubs/bburns.infocom.2005.pdf][http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4585387][http://www-npa.lip6.fr/_publications/669-infocom06.pdf] | ||
|- | |||
| <s> Introduction on Cloud Computing''</s>(taken by Shanshi Yang)'' | |||
| <s>[http://www.net.informatik.uni-goettingen.de/people/yuan_zhang Zhang Yuan]</s> | |||
| <s>[http://www.computer.org/cms/Computer.org/ComputingNow/homepage/2011/0611/rW_MM_VirtualizedScreen.pdf] [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5754008&tag=1] [http://dl.acm.org/citation.cfm?id=1741957]</s> | |||
|- | |||
|} | |} | ||