Seminar on Internet Technologies (Winter 2013/2014): Difference between revisions

(Created page with "== Details == {{CourseDetails |credits=120h, 6 ECTS (New); 4 ECTS (Old); 5 (ITIS) |module=M.Inf.122/222: Seminar Telematik I/II ''-or-'' B.Inf.204/205: Proseminar I/II, (new Cat...")
 
 
(84 intermediate revisions by 8 users not shown)
Line 6: Line 6:
|lecturer=[http://user.informatik.uni-goettingen.de/~fu Prof. Dr. Xiaoming Fu]
|lecturer=[http://user.informatik.uni-goettingen.de/~fu Prof. Dr. Xiaoming Fu]
|ta=[http://user.informatik.uni-goettingen.de/~ljiao Lei Jiao]
|ta=[http://user.informatik.uni-goettingen.de/~ljiao Lei Jiao]
|time=Please see [[#Schedule]]
|time=[[#Schedule]]
|place=IfI 3.101
|place=IFI Building, Room 3.101
|univz=[http://univz.uni-goettingen.de/qisserver/rds?state=verpublish&status=init&vmfile=no&publishid=123577&moduleCall=webInfo&publishConfFile=webInfo&publishSubDir=veranstaltung]
|univz=[http://univz.uni-goettingen.de/qisserver/rds?state=verpublish&status=init&vmfile=no&publishid=123577&moduleCall=webInfo&publishConfFile=webInfo&publishSubDir=veranstaltung]
}}
}}
{{Announcement|'''Important: Please find our arrangements for your final presentations as follows.'''}}
{{Announcement|'''Please note that we will have our final presentations on Jan. 22, 2014. Check our [[#Schedule]] for more information. Thanks.'''}}
{{Announcement|'''If you're an ITIS student, you may not be able to register via FlexNow. Please follow the instructions [http://www.itis-graduateschool.de/web/content/exams here] in order to register.'''}}


==Course description==
==Course description==
Line 29: Line 30:


==Schedule==
==Schedule==
{{Announcement|'''Note: The absence of your name here indicates that you have not registered for this course in FlexNow. Please contact [http://user.informatik.uni-goettingen.de/~ljiao me] if you have any questions. Thanks.'''}}
* Wednesday, '''October 23th, 2013, 15.00 - 16.00''': Introduction to the course (by [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu] on behalf of [http://user.informatik.uni-goettingen.de/~ljiao Lei Jiao])
* '''April 8, 2013, Monday, 15:00''': Informational meeting
* Wednesday, '''October 30th, 2013''': Finalization of topic selection
* '''April 12, 2013, Friday, 23:59''': Deadline for selection of topic
* Wednesday, '''January 8th, 2014''': Submission of slides to topic advisors
* '''June 20, 2013, Thursday, 23:59''': Deadline for registration
** '''Mandatory in order to obtain a presentation time slot'''  
* '''June 27, 2013, Thursday, 15:00 - 17:00''': Presentation time slot I: Simon Schuetz, Ditdit Nugeraha Utama
** '''Deadline for registering for this course'''
* '''July 11, 2013, Thursday, 14:00 - 18:00''': Presentation time slot II: The following arrangement is based on the alphabetical order of your last name; Sorry for any possible inconvenience. Please contact me if you have any questions. Thanks.
* Wednesday, '''January 22th, 2014, 14.00 - 18.30''': Presentations (Each student: 20 min. presentation + 10 min. Q&A)
** 14:00 --- 14:30: Irene Alvarez, "Simple Subgraphs for Link Prediction in the Social Networks: A Survey"
** '''14:00---14:30: Mohammad Abouzar, supervised by Edo Monticelli'''
** 14:30 --- 15:00: Sabyasachi Ghosh, "Inferring Networks based on Information Cascade and Diffusion"
** '''14:30---15:00: Sripriya Srikant Adhatarao, supervised by Edo Monticelli'''
** 15:00 --- 15:30: Georg Jahn, "Data Cache in Delay Tolerant Networks"
** '''15:00---15:30: Alberto Riveira Diaz, supervised by David Koll'''
** 15:30 --- 16:00: Bartosz Kohnke, "Indoor Localization for Mobile Devices"
** '''15:30---16:00: Bartosz Kohnke, supervised by Stephan Sigg'''
** 16:00 --- 16:30: Md Istiak Mehedi, "Resource Allocation and Management in Cloud Systems"
** '''16:00---16:30: Sunaina Nelamane Prasad, supervised by Lingjun Pu'''
** 16:30 --- 17:00: Subhash Chandra Pujari, "Sybil Attacks and Defense via Social Networks: A Good Idea?"
** '''16:30---17:00: Md Mostafizur Rahman, supervised by Stephan Sigg'''
** 17:00 --- 17:30: Daniel Schulenburg, "Bitcoins: A New Currency?"
** '''17:00---17:30: Hossein Salahi, supervised by Edo Monticelli'''
** 17:30 --- 18:00: Mahdi Solhdoust, "Social Aware Data Routing in Delay Tolerant Networks"
** '''17:30---18:00: Nauyen Thack, supervised by Yuan Zhang'''
* '''September 30, 2013, Monday, 23:59''': Deadline for submission of report
** '''18:00---18:30: Johannes Widenka, supervised by Stephan Sigg'''
* '''March 31th, 2014''': Deadline for report submission


== Topics ==
== Topics ==
Line 53: Line 55:
|{{Hl2}} |'''Initial readings'''
|{{Hl2}} |'''Initial readings'''
|-
|-
| <strike>Context-aware Mobile Media</strike> (''Assigned to'' Georg Roth-Kleyer)
| [http://www.net.informatik.uni-goettingen.de/people/yuan_zhang Yuan Zhang]
| [http://dl.acm.org/citation.cfm?id=1613982] [http://dl.acm.org/citation.cfm?id=2043981&CFID=115044559&CFTOKEN=88700437] [http://dl.acm.org/citation.cfm?id=2037399]
|-
|-
| <strike>Preserving Location Privacy in Wireless Mobile Networks</strike> (''Assigned to'' Simon Schütz)
|style="width: 60%;"|
| [http://www.net.informatik.uni-goettingen.de/people/wenzhong_li Dr. Wenzhong Li]
'''NDN - A content centric networking proposal (selected by Hossein Salahi & Mohammad Abouzar & Eeran Maiti & Sripriya)'''
| [http://arbor.ee.ntu.edu.tw/archive/ppdm/Anonymity/SweeneyKA02.pdf] [http://synrg.ee.duke.edu/papers/cachecloak.pdf] [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1437123&tag=1]
 
Content Centric Networking (CCN) is a new ambitious proposal to replace the IP protocol. A better and faster content distribution, improved privacy, integrated cryptography and easy P2P communication are among the key elements of this architecture. On the other hand problems like efficiency and scalability of the name-based routing, support of existing application and new ones and the possibility to actually deploy this technology are still open and actively discussed, making CCN one of the most active research field in networking.
 
By choosing this topic you will gain a general knowledge of the architecture proposed by the NDN researchers and will have to gain insight into one of the problems like routing or security, or solutions (i.e. applications on top of NDN).
 
  - Topics available: Routing, Congestion control, network management, security, Mobile&vehicular, Evaluation strategy
  -- DTN: Hossein Salahi
  -- Routing: Mohammad Abouzar
  -- Congestion control: Sripriya
  -- Network Management: Prabhu Sharma
 
- [http://named-data.net/wp-content/uploads/2013/10/ndn-annualreport2012-2013.pdf NDN technical report]
- [http://tools.ietf.org/pdf/draft-pentikousis-icn-scenarios-04.pdf  ICN Base line scenarios]
 
| [https://www.net.informatik.uni-goettingen.de/people/edo_monticelli Edo Monticelli]
|For general introduction:
*[http://named-data.net/a-new-way-to-look-at-networking/ Video presenting NDN]
*[http://named-data.net/wp-content/uploads/Jacob.pdf First proposal on Content Centric Networking]
*[http://tools.ietf.org/pdf/draft-pentikousis-icn-scenarios-04.pdf  ICN Base line scenarios]
 
|-
|-
| <strike>Indoor Localization for Mobile Devices</strike> (''Assigned to'' Bartosz Kohnke)
|
| [http://www.net.informatik.uni-goettingen.de/people/wenzhong_li Dr. Wenzhong Li]
'''Random Matrix Theory for signal processing '''
| [http://dl.acm.org/citation.cfm?id=2348581] [http://dl.acm.org/citation.cfm?id=2348579] [http://dl.acm.org/citation.cfm?id=2348578][http://dl.acm.org/citation.cfm?id=2348580]
 
Random matrix theory has numerous applications in physics, statistics and engineering.
Although initially motivated by practical experimental problems, random matrices are now used in very diverse fields including physics, mathematics, but also neural networks, information theory and signal processing.
The student will recapitulate the basic concepts of random matrix theory and summarise recent advances in this field with relation to signal processing, in particular in communications.
 
| [http://www.stephansigg.de Stephan Sigg]
|For general introduction:
*[http://books.google.de/books/about/Random_Matrix_Methods_for_Wireless_Commu.html?id=_j7pT9HjKAUC&redir_esc=y]
 
|-
|-
| <strike>Social aware data routing in delay tolerant networks</strike> (''Assigned to'' Mahdi Solhdoust)
|
| [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu]
'''Software defined networking for an environment-reactive system behaviour (selected by Mostafizur Rahman)'''
| [http://astro.temple.edu/~tuc13642/file/Infocom%2012.pdf] [http://www.cs.rpi.edu/~szymansk/papers/tpds.12.pdf] [http://www.cl.cam.ac.uk/~ph315/publications/hoc86309-hui.pdf]
 
With the advancement of Software Defined Networking (SDN) research over recent years, network components have become accessible and controllable from the application layer.
With this flexibility, a network could now react on environmental stimuli.
Therefore, it might be possible to configure network parameters spontaneously
* to adapt to instantaneous needs
* for proactive network behaviour
* to maintain network operation in the case of disaster
* ...
The student will summarise the chances and challenges of Software Defined Networking with special focus on environment-reactive behaviour.
 
| [http://www.stephansigg.de Stephan Sigg]
|For general introduction:
*[http://bit.ly/LpV2lD]
 
|-
|-
| <strike>Data cache in delay tolerant networks</strike> (''Assigned to'' Georg Jahn)
|
| [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu]
'''Amazon Mechanical Turk, oDesk and others: The Use of Crowd-Sourcing in Research (selected by Alberto Riuera Diaz)'''
| [http://www.cis.temple.edu/~wu/teaching/Spring%202013/infocom2013a.pdf] [http://mcn.cse.psu.edu/paper/xuejun-zhuo/xuejun-mass11.pdf] [http://mcn.cse.psu.edu/paper/weigao/icdcs11.pdf]
 
| [http://user.informatik.uni-goettingen.de/~dkoll/ David Koll]
|For general introduction:
*[http://en.wikipedia.org/wiki/Crowdsourcing]
*[http://dl.acm.org/citation.cfm?id=1864504]
 
|-
|-
| <strike>Sybil Attacks and Defense via Social Networks: A good Idea?</strike> (''Assigned to'' Subhash Chandra Pujari)
|
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]
'''Community detection in Delay Tolerant Networks'''
| [http://www.mpi-soft.mpg.de/~gummadi/papers/comm318g.pdf] [http://www.mpi-sws.org/~gummadi/papers/sybil_defense.pdf] [http://www.cs.ucsb.edu/~ravenben/publications/pdf/sybil-imc11.pdf]
 
| [http://user.informatik.uni-goettingen.de/~kzhu/ Konglin Zhu]
|For general introduction:
*[http://mcn.cse.psu.edu/paper/xiaomei-zhang/zhang-icnp13.pdf]
*[http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.121.6879&rep=rep1&type=pdf]
 
|-
|-
| <strike>Bitcoins: A new currency?</strike> (''Assigned to'' Daniel Schulenburg)
|
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]
'''Virtual Machine Allocation (Selected by Thack, Nauyen)'''
| [http://en.wikipedia.org/wiki/Bitcoin]
 
| [http://www.net.informatik.uni-goettingen.de/people/ Yuan Zhang]
|For general introduction:
*[http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6566848&tag=1]
*[http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6566850]
 
|-
|-
| <strike>Decentralized Online Social Networks: A Survey of the State-of-the-Art</strike> (''Assigned to'' Ditdit Nugeraha Utama)
|
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]
'''The Architecture of Mobile Crowd Sensing'''
| [http://www.peerson.net/][http://www.p2p.tu-darmstadt.de/fileadmin/user_upload/Group_P2P/share/p2p-ws10/safebook.pdf][http://dl.acm.org/citation.cfm?id=1592585]
 
|-
An emerging category of devices at the edge of the Internet are consumer-centric mobile sensing and computing
| <strike>Information-Centric Network: Existing solutions</strike> (''Assigned to'' Johannes Widenka)
devices, such as smartphones, music players, and in-vehicle sensing devices. These devices will fuel the evolution of the Internet
| [http://www.net.informatik.uni-goettingen.de/people/jiachen_chen Jiachen Chen]
of Things as they feed sensor data to the Internet at a societal scale. However, deploying mobile crowdsensing appli-
| [http://ccr.sigcomm.org/online/files/fp177-koponen1.pdf][http://www.cse.tkk.fi/fi/opinnot/T-110.6120/2010_Spring_Publish-Subscribe_Internetworking/luennot-files/STAL9781607500070-0102-1.pdf][http://pages.cs.wisc.edu/~akella/CS838/F09/838-Papers/ccn.pdf][http://dl.acm.org/citation.cfm?id=2065182]
cations in real life is not a trivial task.
|-
 
| <strike>Reliable Multicast: Solutions and Problems</strike> (''Assigned to'' Wazed Ali)
The student will gain a general knowledge of existing Crowdsensing Architectures and should summarise the chances and challenges
| [http://www.net.informatik.uni-goettingen.de/people/jiachen_chen Jiachen Chen]
of exploiting the cloud or social relation for Mobile Crowdsensing.
| [http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=01096179][http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=493090][http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.30.3968][http://www.nossdav.org/1999/papers/71-1979756152.pdf]
 
|-
| [http://www.net.informatik.uni-goettingen.de/people/ Lingjun Pu]
| <strike>Resource Allocation and Management in Cloud Systems</strike> (''Assigned to'' Md Istiak Mehedi)
|For general introduction:
| [http://user.informatik.uni-goettingen.de/~ljiao/ Lei Jiao]
*[https://wiki.engr.illinois.edu/download/attachments/180846616/paper_fanye.pdf?version=1]
| [http://iqua.ece.toronto.edu/~bli/papers/dniu-infocom13.pdf] [http://www.bell-labs.com/user/erranlli/publications/PACE-INFOCOM13.pdf] [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=6258025]
*[http://delivery.acm.org/10.1145/2510000/2505502/p25-tuncay.pdf]
|-
*[http://www.hotmobile.org/2014/papers/full/1.pdf]
| <strike>Simple Subgraphs for link prediction in the social networks: A survey</strike> (''Assigned to'' Irene Alvarez)
| [http://www.net.informatik.uni-goettingen.de/people/hong_huang Hong Huang]
| [http://www.weizmann.ac.il/mcb/UriAlon/Papers/networkMotifs/networkMotifs.pdf] [http://www2012.wwwconference.org/proceedings/proceedings/p1019.pdf] [http://research.microsoft.com/pubs/133158/GolderYardiSocComp.pdf][http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5992640]
|-
|-
| <strike>Inferring Networks based on Information Cascade and Diffusion</strike> (''Assigned to'' Sabyasachi Ghosh)
| [http://www.net.informatik.uni-goettingen.de/people/wei_du Wei Du] [http://www.net.informatik.uni-goettingen.de/people/narisu_tao Narisu Tao]
| [http://www.stanford.edu/~manuelgr/pubs/netinf-kdd2010.pdf][http://www.cs.cornell.edu/home/kleinber/kdd09-quotes.pdf] [http://snap.stanford.edu/netinf/]
|}
|}


Line 130: Line 179:
'''TLDR version:'''  
'''TLDR version:'''  
* Give an overview of your topic to the audience.
* Give an overview of your topic to the audience.
* 20~25 minutes of presentation followed by 5~10 minutes discussion.
* 20 minutes of presentation followed by 10 minutes discussion.
* Slides should be in English.
* Slides should be in English.


599

edits