Editor, Bureaucrats, Administrators
264
edits
(10 intermediate revisions by the same user not shown) | |||
Line 62: | Line 62: | ||
|- | |- | ||
| align="right" | 14.06.2012 | | align="right" | 14.06.2012 | ||
| | | Social Networks 2 | ||
| | | [[Media:ACN_06_osn2.pdf | pdf]] | ||
|- | |- | ||
| align="right" | 21.06.2012 | | align="right" | 21.06.2012 | ||
Line 70: | Line 70: | ||
|- | |- | ||
| align="right" | 28.06.2012 | | align="right" | 28.06.2012 | ||
| | | Social Networks 3 | ||
| | | [[Media:ACN_07_osn3.pdf | pdf]] | ||
|- | |- | ||
| align="right" | 05.07.2012 | | align="right" | 05.07.2012 | ||
| | | Social Networks 4 | ||
| | | [[Media:ACN_08_osn4.pdf | pdf]] | ||
|- | |- | ||
| align="right" | 12.07.2012 | | align="right" | 12.07.2012 | ||
| | | Decentralized OSNs | ||
| | | [[Media:ACN_09_decosn.pdf | pdf]] | ||
|- | |- | ||
| align="right" | 19.07.2012 | | align="right" | 19.07.2012 | ||
Line 90: | Line 90: | ||
Register informally via email. | Register informally via email. | ||
* Security in DHT Networks (may be based on Urdaneta et al., ACM Comput. Surv., Jan. 2011, [[Media:security_survey_dhts.pdf | pdf]]) | * Security in DHT Networks (may be based on Urdaneta et al., ACM Comput. Surv., Jan. 2011, [[Media:security_survey_dhts.pdf | pdf]]) | ||
* <strike>G-COPSS: A Content Centric Communication Infrastructure for Gaming, ICDCS 2012 (A workshop paper is also available in LANMAN 2011)</strike>Alex | * <strike>G-COPSS: A Content Centric Communication Infrastructure for Gaming, ICDCS 2012 (A workshop paper is also available in LANMAN 2011)</strike> Alex | ||
* InDepth BitTorrent - Fairness, Superseeding, Trackerless, Extensions | * InDepth BitTorrent - Fairness, Superseeding, Trackerless, Extensions | ||
* <strike>The little engine(s) that could: scaling online social networks. SIGCOMM 2010. http://ccr.sigcomm.org/online/?q=node/642</strike> | * <strike>The little engine(s) that could: scaling online social networks. SIGCOMM 2010. http://ccr.sigcomm.org/online/?q=node/642</strike> Sonja | ||
* An analysis of social network-based Sybil defenses. SIGCOMM 2010. http://ccr.sigcomm.org/online/?q=node/643 | * <strike>An analysis of social network-based Sybil defenses. SIGCOMM 2010. http://ccr.sigcomm.org/online/?q=node/643</strike> Sabyasachi | ||
* Link Analysis and Web Search, Chapter 14 of the book. David Easley and Jon Kleinberg, Networks, Crowds, and Markets: Reasoning About a Highly Connected World, Cambridge University Press, 2010. | * <strike>Link Analysis and Web Search, Chapter 14 of the book. David Easley and Jon Kleinberg, Networks, Crowds, and Markets: Reasoning About a Highly Connected World, Cambridge University Press, 2010.</strike> Sebastian | ||
* PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing http://gridsec.usc.edu/files/publications/TPDS-0463-1105.R2-Final-June21.pdf | |||
* <strike>On Blind Mice and the Elephant -- Understanding the Network Impact of a Large Distributed System http://conferences.sigcomm.org/sigcomm/2011/papers/sigcomm/p110.pdf</strike> Sromona | |||
==Presentation Style== | ==Presentation Style== |