Seminar on Internet Technologies (Summer 2016): Difference between revisions
(→Topics) |
|||
(58 intermediate revisions by 10 users not shown) | |||
Line 1: | Line 1: | ||
== Details == | == Details == | ||
{{Announcement|Note: | |||
Please directly submit the report to your topic supervisor before 1st Oct. 2016! | |||
For any general questions or grading issue, please contact Dr. Mayutan Arumaithurai.}} | |||
{{CourseDetails | {{CourseDetails | ||
|credits=5 ECTS (BSc/MSc AI); 5 (ITIS) | |credits=5 ECTS (BSc/MSc AI); 5 (ITIS) | ||
|module= M.Inf.1124 ''-or-'' B.Inf.1207/1208; ITIS Module 3.16: Selected Topics in Internet Technologies | |module= M.Inf.1124 ''-or-'' B.Inf.1207/1208; ITIS Module 3.16: Selected Topics in Internet Technologies | ||
|lecturer=[http://www.net.informatik.uni-goettingen.de/people/xu_chen Dr. Xu Chen] | |lecturer=[http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Dr. Mayutan Arumaithurai] [http://www.net.informatik.uni-goettingen.de/people/xu_chen Dr. Xu Chen] | ||
|ta=[None] | |ta=[None] | ||
|time=April 14, 16:00ct: Introduction Meeting | |time=April 14, 16:00ct: Introduction Meeting | ||
Line 13: | Line 18: | ||
==Course description== | ==Course description== | ||
This course covers selected topics on the up-to-date Internet technologies and research. Each student takes a topic, does a presentation and writes a report on it. Besides the introduction meeting | This course covers selected topics on the up-to-date Internet technologies and research. Each student takes a topic, does a presentation and writes a report on it. Besides the introduction meeting, there are no regular meetings, lectures or classes for this course. The purpose of this course is to familiarize the students with new technologies, enable independent study of a specific topic, and train presentation and writing skills. | ||
The informational meeting at the beginning of the course will cover some guidelines on scientific presenting and writing. | The informational meeting at the beginning of the course will cover some guidelines on scientific presenting and writing. | ||
==Passing requirements== | ==Passing requirements== | ||
*Actively and frequently participate in the project communication with your topic advisor | |||
**This accounts for 20% of your grade. | |||
* Present the selected topic (20 min. presentation + 10 min. Q&A). | * Present the selected topic (20 min. presentation + 10 min. Q&A). | ||
** This accounts for 40% of your grade. | ** This accounts for 40% of your grade. | ||
* Write a report on the selected topic (12-15 pages) (LaTeX Template:[ftp://ftp.springer.de/pub/tex/latex/llncs/latex2e/llncs2e.zip]). | * Write a report on the selected topic (12-15 pages) (LaTeX Template:[ftp://ftp.springer.de/pub/tex/latex/llncs/latex2e/llncs2e.zip]). | ||
** This accounts for | ** This accounts for 40% of your grade. | ||
* Please check the [[#Schedule]] and adhere to it. | * Please check the [[#Schedule]] and adhere to it. | ||
==Schedule== | ==Schedule== | ||
* '''April | * '''April 14, 16:00ct''': Introduction meeting | ||
* '''Aug. 04, 2016''' : Deadline for registration | * '''Aug. 04, 2016''' : Deadline for registration | ||
* '''Aug. 11, 2016''' : Presentations | * '''Aug. 11&12, 2016''' : Presentations | ||
* '''Sept. 30, 2016, 23:59''': Deadline for submission of report (should be sent to the topic adviser!) | * '''Sept. 30, 2016, 23:59''': Deadline for submission of report (should be sent to the topic adviser!) | ||
==Final Presentation== | ==Final Presentation== | ||
{| align="center" class="wikitable sortable" {{Prettytable}} | |||
|- | |||
|{{Hl2}} |'''Time Slot (August 11, 2016)''' | |||
|{{Hl2}} |'''Student''' | |||
|{{Hl2}} |'''Advisor''' | |||
|- | |||
| 2:00PM -- 2:30PM | |||
| Md. Khalilur Rahman Khan | |||
| Tao Zhao | |||
|- | |||
| 2:30PM -- 3:00PM | |||
| Chencheng Liang | |||
| Hong Huang | |||
|- | |||
| 3:00PM -- 3:30PM | |||
| Alireza Amiri | |||
| Osamah | |||
|- | |||
| 3:30PM -- 4:00PM | |||
| Mohammad Sahihi Benis | |||
| Osamah | |||
|- | |||
| 4:00PM -- 4:30PM | |||
| Vidya Mohan Sathya | |||
| Tao Zhao | |||
|} | |||
{| align="center" class="wikitable sortable" {{Prettytable}} | |||
|- | |||
|{{Hl2}} |'''Time Slot (August 12, 2016)''' | |||
|{{Hl2}} |'''Student''' | |||
|{{Hl2}} |'''Advisor''' | |||
|- | |||
| 10:00AM -- 10:30AM | |||
| Rafail Ismayilov | |||
| Sripriya | |||
|- | |||
| 10:30AM -- 11:00AM | |||
| Tayyebe Emadinia | |||
| Mayutan | |||
|- | |||
|} | |||
== Topics == | == Topics == | ||
Line 51: | Line 102: | ||
| [http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6099519] | | [http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6099519] | ||
|- | |- | ||
| '''Towards a Pricing Model in NFV''' | | '''Towards a Pricing Model in NFV (assigned to Mohammad Sahihi Benis)''' | ||
One of the untouched research areas in Network Function Virtualization (NFV) is Accounting Management. Your task is to first identify the current Management systems that used in Data centers and cloud computing environments and later to map what you think it might be useful in NFV area. You should support your statement with logical reasons so far. It is not required to conducted any empirical work. | |||
| [http://www.net.informatik.uni-goettingen.de/people/osamah_barakat Osamah Barakat] | | [http://www.net.informatik.uni-goettingen.de/people/osamah_barakat Osamah Barakat] | ||
| [ | | [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7243304][http://store.elsevier.com/Cloud-Data-Centers-and-Cost-Modeling/Caesar-Wu/isbn-9780128014134/][http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7378433] | ||
|- | |- | ||
| '''What can NFV brings comparing to virtual machines?''' | | '''What can NFV brings comparing to virtual machines in the security area?(assigned to Alireza Amiri)''' | ||
Another untouched area is security. Although ETSI had published couple of documents orgnizing the rcommendation regarding NFV operations, a detialed approches should be published to address multiple challenges in details. Your task is to identify the thread vector in NFV and compare it to what have been done in VMs world. | |||
| [http://www.net.informatik.uni-goettingen.de/people/osamah_barakat Osamah Barakat] | | [http://www.net.informatik.uni-goettingen.de/people/osamah_barakat Osamah Barakat] | ||
| [ | | [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7243304][http://www.etsi.org/deliver/etsi_gs/NFV-SEC/001_099/003/01.01.01_60/gs_NFV-SEC003v010101p.pdf][http://www.etsi.org/deliver/etsi_gs/NFV-SEC/001_099/001/01.01.01_60/gs_NFV-SEC001v010101p.pdf] | ||
|- | |- | ||
|- | |- | ||
Line 68: | Line 119: | ||
|- | |- | ||
| '''What is the current status and future of cloud related research? What are the main research problems that are currently being targeted? (assigned to )''' | | '''What is the current status and future of cloud related research? What are the main research problems that are currently being targeted? (assigned to Imaad Mohamed Khan (he quit mid-way))''' | ||
Cloud computing and cloud based services have become an integral part of the Internet. The aim of this work is to study what research problems exist and also identify promising solutions. Topics pertaining to Data Centers are also of relevance. | Cloud computing and cloud based services have become an integral part of the Internet. The aim of this work is to study what research problems exist and also identify promising solutions. Topics pertaining to Data Centers are also of relevance. | ||
| [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai] | | [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai] | ||
| Take a look at recent papers in well known conferences/workshops. | | Take a look at recent papers in well known conferences/workshops. | ||
|- | |- | ||
| '''Hi, AlphaGo! --- Deep into Google DeepMind''' | | '''Hi, AlphaGo! --- Deep into Google DeepMind (assigned to Aynur Amirfallah)''' | ||
The first computer program to ever beat a professional player at the game of Go. | The first computer program to ever beat a professional player at the game of Go. | ||
| [https://www.net.informatik.uni-goettingen.de/people/hong_huang Hong Huang ] | | [https://www.net.informatik.uni-goettingen.de/people/hong_huang Hong Huang ] | ||
| [https://deepmind.com/alpha-go.html] | | [https://deepmind.com/alpha-go.html] | ||
|- | |- | ||
| '''Web Scraping and Anti-Scraping Technique''' | | '''Web Scraping and Anti-Scraping Technique (assigned to Chencheng Liang)''' | ||
A scraper site is a website that copies content from other websites using web scraping. The purpose of creating such a site can be to earn revenue, usually through advertising and sometimes by selling data. Scraper sites come in various forms, ranging from spammy content sites, to price aggregation and shopping sites, and also web search engines such as Yahoo and online maps such as Google Maps. | A scraper site is a website that copies content from other websites using web scraping. The purpose of creating such a site can be to earn revenue, usually through advertising and sometimes by selling data. Scraper sites come in various forms, ranging from spammy content sites, to price aggregation and shopping sites, and also web search engines such as Yahoo and online maps such as Google Maps. | ||
| [https://www.net.informatik.uni-goettingen.de/people/hong_huang Hong Huang ] | | [https://www.net.informatik.uni-goettingen.de/people/hong_huang Hong Huang ] | ||
| [Please search relevant papers yourself.] | | [Please search relevant papers yourself.] | ||
|- | |||
|'''ICN - Information Centric Networking ''' | |||
Content Centric Networking (CCN) is a new ambitious proposal to replace the IP protocol. A better and faster content distribution, improved privacy, integrated cryptography and easy P2P communication are among the key elements of this architecture. On the other hand problems like efficiency and scalability of the name-based routing, support of existing application and new ones and the possibility to actually deploy this technology are still open and actively discussed, making CCN one of the most active research field in networking. | |||
By choosing this topic you will gain a general knowledge of the many architecture proposed for ICN and will have to gain insight into one of the problems like routing or security, or solutions (i.e. applications on top of NDN). | |||
- '''Multiple topics available''': Routing, Congestion control, network management, security, Mobile&vehicular, Evaluation strategy, naming | |||
- [http://named-data.net/wp-content/uploads/2013/10/ndn-annualreport2012-2013.pdf NDN technical report] | |||
- [http://tools.ietf.org/pdf/draft-pentikousis-icn-scenarios-04.pdf ICN Base line scenarios] | |||
| Sripriya Adhatarao (adhatarao@cs.uni-goettingen.de) | |||
|For general introduction: | |||
*[http://named-data.net/a-new-way-to-look-at-networking/ Video presenting NDN] | |||
*[http://named-data.net/wp-content/uploads/Jacob.pdf First proposal on Content Centric Networking] | |||
*[http://tools.ietf.org/pdf/draft-pentikousis-icn-scenarios-04.pdf ICN Base line scenarios] | |||
|- | |||
| '''Learning from Imbalanced Data (assigned to Georgios Kaklamanos)''' | |||
When building and training classifiers for classification problems, one commonly encountered problem is that of imbalanced data. For instance, in the case of a binary classifier, this means that one class is hugely overrepresented in the data available. Training classifiers for this kind of datasets has been a problem for some time. In this work, your task is to i) precisely introduce the imbalanced data problem, ii) discuss the state of the art of approaches for mitigating this problem (both from the perspective of learning algorithms and data manipulation techniques) and iii) find out what issues still remain open until today. Note that this topic requires a background in data science, and in particular in classification algorithms. Also, this topic requires a comparatively high reading effort. | |||
| [https://www.net.informatik.uni-goettingen.de/people/David_Koll David Koll ] | |||
| [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5128907&tag=1] | |||
|- | |||
| '''Deep Learning and its (possible) flaws (assigned to Christoph Rauterberg)''' | |||
One recent trend in machine learning is 'deep learning', where neural networks are employed for solving a wide range of problems. One prominent example of such problems is image classification. While neural networks are in fact delivering sometimes great results, they may also have some weak spots. In this work, your task is to i) make yourself familiar with neural networks, ii) discuss the state-of-the-art in image classification, and iii) to investigate some possible flaws in neural networks. Note that for this topic a background in data science, and in particular in classification algorithms, is strongly recommended. Also, this topic requires a comparatively high reading effort. | |||
| [https://www.net.informatik.uni-goettingen.de/people/David_Koll David Koll ] | |||
| [http://arxiv.org/abs/1404.7828][http://arxiv.org/pdf/1411.4555v1.pdf][http://arxiv.org/abs/1412.1897] | |||
|- | |||
|'''Service Plane for Network Functions: Network Service Headers and Other alternatives''' | |||
Focus of this topic is to understand 'Service Function Chaining of Network Functions', the state-of-the-art proposals like Network Service Headers and related academic works. Reason and justify the need for service plane and then try to propose new mechanisms and design of the data plane to support network services, and the control plane functions necessary to manage these data plane functions. | |||
| [http://www.net.informatik.uni-goettingen.de/people/sameer_kulkarni Sameer Kulkarni] | |||
| [http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6733615] [http://conferences2.sigcomm.org/acm-icn/2014/papers/p107.pdf] [https://tools.ietf.org/pdf/draft-quinn-sfc-nsh-07.pdf] | |||
|- | |||
|'''Challenges and Opportunities in the Cloud - A survey (assigned to Christian Aschenbrenner)''' | |||
Focus of this topic is to study the advancements that have happened over the last decade in Virtualization and Cloud computing. Develop an understanding towards the needs of Datacenter and Cloud computing service models, identify the challenges with Virtualization/VM's in Datacenter/Cloud and address some opportunistic prospects thereof. | |||
| [http://www.net.informatik.uni-goettingen.de/people/sameer_kulkarni Sameer Kulkarni] | |||
| [http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf] [http://arxiv.org/pdf/1312.4722v2.pdf] [http://media.johnwiley.com.au/product_data/excerpt/90/04708879/0470887990-180.pdf] [http://www-07.ibm.com/solutions/in/education/download/Virtualization%20in%20Education.pdf] | |||
|- | |||
| '''Caching mechanisms in ICN-A survey (assigned to Abdul Hadi)''' | |||
As one key feature of ICN, in-network caching receives widespread research interest. where are the data copy need to be cached, and how to process the replacement problem become the key to improve ICN performance. | |||
| [http://www.net.informatik.uni-goettingen.de/people/jie_li Jie Li] | |||
| [http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6883812] [https://www.ee.ucl.ac.uk/~gpavlou/Publications/Conference-papers/Chai-12a.pdf] | |||
|- | |||
|'''Scalable routing in ICN -A survey (assigned to Kalita Bhabajeet)''' | |||
Routing scalability is a great challenge for ICN's feasibility. How to manage the huge namespace of ICN in a limited FIB without much effect on routing efficiency has drawn more and more attention. | |||
| [http://www.net.informatik.uni-goettingen.de/people/jie_li Jie Li] | |||
| [http://named-data.net/wp-content/uploads/2014/08/ndn-tr-4-scaling-ndn-routing.pdf] [http://www.ee.ucl.ac.uk/~uceeips/hashroute-icn13.pdf] | |||
|- | |||
|'''Urban Sensing Using Mobile Phone Network Data -A survey (assigned to Khan, Md. Khalilur Rahman)''' | |||
The recent development of telecommunication networks is producing an unprecedented wealth of information. Mobile phone datasets offer access to insights into urban dynamics | |||
and human activities at an unprecedented scale and level of detail, representing a huge opportunity for research and real-world applications. This study is to provide a survey on key techniques related to the use of telecommunication data for urban sensing. | |||
| [http://www.net.informatik.uni-goettingen.de/people/tao_zhao Tao Zhao(Tao.Zhao@cs.uni-goettingen.de)] | |||
| [http://dl.acm.org/citation.cfm?id=2655691] | |||
|- | |||
|'''Trust in social networks -A survey (assigned to Vidya)''' | |||
Web-based social networks have become popular as a medium for disseminating information and connecting like-minded people. The public accessibility of such networks with the ability to share opinions, thoughts, information, and experience offers great promise to enterprises and governments. In addition to individuals using such networks to connect to their friends and families, governments and enterprises have started exploiting these platforms for delivering their services to citizens and customers. However, the success of such attempts relies on the level of trust that members have with each other as well as with the service provider. This study is to give a comprehensive survey of key technologies on trust in social networks. | |||
| [http://www.net.informatik.uni-goettingen.de/people/tao_zhao Tao Zhao (Tao.Zhao@cs.uni-goettingen.de)] | |||
| [http://dl.acm.org/citation.cfm?id=2501661] | |||
|- | |||
|'''Application of Packet Sampling in Computer Security - A Survey (assigned to Sudhir Kumar Sah)''' | |||
Today we have lot of reactive solutions for detecting security attacks. Packet sampling is one of the way to monitor real time network traffic. The aim of this work is to find whether packet sampling techniques like sflow, netflow are matured enough to detect security attacks? | |||
| [http://www.net.informatik.uni-goettingen.de/people/abhinandan_s_prasad Abhinandan S Prasad] | |||
| [http://www.sflow.org/packetSamplingBasics/] | |||
| [http://www.cse.unr.edu/~mgunes/papers/JNCA13.pdf] | |||
| [http://cs.uccs.edu/~jkalita/papers/2014/HoqueNetworkAttacksJCNA2014.pdf] | |||
|- | |||
|'''Game theory based solutions in Computer Network Security - A Survey (assigned to Florian Pätzold) ''' | |||
Game theory is the mathematical study of conflict and co-operation between rational agents. Game theory is widely used in the computer network security to detect and mitigate attacks. The aim of work is to perform survey on the recent advances in the field. | |||
| [http://www.net.informatik.uni-goettingen.de/people/abhinandan_s_prasad Abhinandan S Prasad] | |||
| [https://en.wikipedia.org/wiki/Game_theory] | |||
| [http://dl.acm.org/citation.cfm?id=2480742] | |||
| [http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6238282] | |||
| [http://people.cis.ksu.edu/~sroy/hicss43.pdf] | |||
| [http://cs.uccs.edu/~jkalita/papers/2014/HoqueNetworkAttacksJCNA2014.pdf] | |||
|- | |- | ||
Line 110: | Line 254: | ||
Hints for preparing the presentation: | Hints for preparing the presentation: | ||
20 minutes are too short to present a topic fully. | |||
It is alright to focus just on one certain important aspect. | |||
Limit the introduction of basics. | |||
Make sure to finish in time. | |||
Suggestions for preparing the slides: | Suggestions for preparing the slides: | ||
No more than 20 pages/slides. | |||
Get your audiences to quickly understand the general idea. | |||
Figures, tables and animations are better than sentences. | |||
Summary of the topic: thinking in your own words. | |||
=== 5. Write your report === | === 5. Write your report === |
Latest revision as of 09:32, 15 August 2016
Details
Note:
Please directly submit the report to your topic supervisor before 1st Oct. 2016! For any general questions or grading issue, please contact Dr. Mayutan Arumaithurai. |
Workload/ECTS Credits: | 5 ECTS (BSc/MSc AI); 5 (ITIS) |
Module: | M.Inf.1124 -or- B.Inf.1207/1208; ITIS Module 3.16: Selected Topics in Internet Technologies |
Lecturer: | Dr. Mayutan Arumaithurai Dr. Xu Chen |
Teaching assistant: | [None] |
Time: | April 14, 16:00ct: Introduction Meeting |
Place: | IFI Building, Room 3.101 |
UniVZ | [1] |
Course description
This course covers selected topics on the up-to-date Internet technologies and research. Each student takes a topic, does a presentation and writes a report on it. Besides the introduction meeting, there are no regular meetings, lectures or classes for this course. The purpose of this course is to familiarize the students with new technologies, enable independent study of a specific topic, and train presentation and writing skills.
The informational meeting at the beginning of the course will cover some guidelines on scientific presenting and writing.
Passing requirements
- Actively and frequently participate in the project communication with your topic advisor
- This accounts for 20% of your grade.
- Present the selected topic (20 min. presentation + 10 min. Q&A).
- This accounts for 40% of your grade.
- Write a report on the selected topic (12-15 pages) (LaTeX Template:[2]).
- This accounts for 40% of your grade.
- Please check the #Schedule and adhere to it.
Schedule
- April 14, 16:00ct: Introduction meeting
- Aug. 04, 2016 : Deadline for registration
- Aug. 11&12, 2016 : Presentations
- Sept. 30, 2016, 23:59: Deadline for submission of report (should be sent to the topic adviser!)
Final Presentation
Time Slot (August 11, 2016) | Student | Advisor |
2:00PM -- 2:30PM | Md. Khalilur Rahman Khan | Tao Zhao |
2:30PM -- 3:00PM | Chencheng Liang | Hong Huang |
3:00PM -- 3:30PM | Alireza Amiri | Osamah |
3:30PM -- 4:00PM | Mohammad Sahihi Benis | Osamah |
4:00PM -- 4:30PM | Vidya Mohan Sathya | Tao Zhao |
Time Slot (August 12, 2016) | Student | Advisor |
10:00AM -- 10:30AM | Rafail Ismayilov | Sripriya |
10:30AM -- 11:00AM | Tayyebe Emadinia | Mayutan |
Topics
Topic | Topic Advisor | Initial Readings | ||||
What Will 5G Be? - A Survey (assigned)
This study is to provide a comprehensive survey on the key enabling communication technologies for 5G networks. |
Xu Chen | [3] | ||||
What Will Smart Grid Be? – A Survey (assigned)
The Smart Grid, regarded as the next generation power grid, uses two-way flows of electricity and information to create a widely distributed automated energy delivery network. This study is to provide a comprehensive survey on the key enabling technologies and services for Smart Grid. |
Xu Chen | [4] | ||||
Towards a Pricing Model in NFV (assigned to Mohammad Sahihi Benis)
One of the untouched research areas in Network Function Virtualization (NFV) is Accounting Management. Your task is to first identify the current Management systems that used in Data centers and cloud computing environments and later to map what you think it might be useful in NFV area. You should support your statement with logical reasons so far. It is not required to conducted any empirical work. |
Osamah Barakat | [5][6][7] | ||||
What can NFV brings comparing to virtual machines in the security area?(assigned to Alireza Amiri)
Another untouched area is security. Although ETSI had published couple of documents orgnizing the rcommendation regarding NFV operations, a detialed approches should be published to address multiple challenges in details. Your task is to identify the thread vector in NFV and compare it to what have been done in VMs world. |
Osamah Barakat | [8][9][10] | ||||
What is the current status and future of SDN research? What are the main research problems of SDN? (assigned to Tayyebe Emadinia)
There is a lot of hype about SDN with industries, operators and Academia showing interest. The aim of this work is to study what research problems exist and also identify promising solutions. |
Mayutan Arumaithurai | [11][12], Take a look at recent papers in well known conferences/workshops. | ||||
What is the current status and future of cloud related research? What are the main research problems that are currently being targeted? (assigned to Imaad Mohamed Khan (he quit mid-way))
Cloud computing and cloud based services have become an integral part of the Internet. The aim of this work is to study what research problems exist and also identify promising solutions. Topics pertaining to Data Centers are also of relevance. |
Mayutan Arumaithurai | Take a look at recent papers in well known conferences/workshops. | ||||
Hi, AlphaGo! --- Deep into Google DeepMind (assigned to Aynur Amirfallah)
The first computer program to ever beat a professional player at the game of Go. |
Hong Huang | [13] | ||||
Web Scraping and Anti-Scraping Technique (assigned to Chencheng Liang)
A scraper site is a website that copies content from other websites using web scraping. The purpose of creating such a site can be to earn revenue, usually through advertising and sometimes by selling data. Scraper sites come in various forms, ranging from spammy content sites, to price aggregation and shopping sites, and also web search engines such as Yahoo and online maps such as Google Maps. |
Hong Huang | [Please search relevant papers yourself.] | ||||
ICN - Information Centric Networking
Content Centric Networking (CCN) is a new ambitious proposal to replace the IP protocol. A better and faster content distribution, improved privacy, integrated cryptography and easy P2P communication are among the key elements of this architecture. On the other hand problems like efficiency and scalability of the name-based routing, support of existing application and new ones and the possibility to actually deploy this technology are still open and actively discussed, making CCN one of the most active research field in networking. By choosing this topic you will gain a general knowledge of the many architecture proposed for ICN and will have to gain insight into one of the problems like routing or security, or solutions (i.e. applications on top of NDN). - Multiple topics available: Routing, Congestion control, network management, security, Mobile&vehicular, Evaluation strategy, naming - NDN technical report - ICN Base line scenarios |
Sripriya Adhatarao (adhatarao@cs.uni-goettingen.de) | For general introduction: | ||||
Learning from Imbalanced Data (assigned to Georgios Kaklamanos)
When building and training classifiers for classification problems, one commonly encountered problem is that of imbalanced data. For instance, in the case of a binary classifier, this means that one class is hugely overrepresented in the data available. Training classifiers for this kind of datasets has been a problem for some time. In this work, your task is to i) precisely introduce the imbalanced data problem, ii) discuss the state of the art of approaches for mitigating this problem (both from the perspective of learning algorithms and data manipulation techniques) and iii) find out what issues still remain open until today. Note that this topic requires a background in data science, and in particular in classification algorithms. Also, this topic requires a comparatively high reading effort. |
David Koll | [14] | ||||
Deep Learning and its (possible) flaws (assigned to Christoph Rauterberg)
One recent trend in machine learning is 'deep learning', where neural networks are employed for solving a wide range of problems. One prominent example of such problems is image classification. While neural networks are in fact delivering sometimes great results, they may also have some weak spots. In this work, your task is to i) make yourself familiar with neural networks, ii) discuss the state-of-the-art in image classification, and iii) to investigate some possible flaws in neural networks. Note that for this topic a background in data science, and in particular in classification algorithms, is strongly recommended. Also, this topic requires a comparatively high reading effort. |
David Koll | [15][16][17] | ||||
Service Plane for Network Functions: Network Service Headers and Other alternatives
Focus of this topic is to understand 'Service Function Chaining of Network Functions', the state-of-the-art proposals like Network Service Headers and related academic works. Reason and justify the need for service plane and then try to propose new mechanisms and design of the data plane to support network services, and the control plane functions necessary to manage these data plane functions. |
Sameer Kulkarni | [18] [19] [20] | ||||
Challenges and Opportunities in the Cloud - A survey (assigned to Christian Aschenbrenner)
Focus of this topic is to study the advancements that have happened over the last decade in Virtualization and Cloud computing. Develop an understanding towards the needs of Datacenter and Cloud computing service models, identify the challenges with Virtualization/VM's in Datacenter/Cloud and address some opportunistic prospects thereof. |
Sameer Kulkarni | [21] [22] [23] [24] | ||||
Caching mechanisms in ICN-A survey (assigned to Abdul Hadi)
As one key feature of ICN, in-network caching receives widespread research interest. where are the data copy need to be cached, and how to process the replacement problem become the key to improve ICN performance. |
Jie Li | [25] [26] | ||||
Scalable routing in ICN -A survey (assigned to Kalita Bhabajeet)
Routing scalability is a great challenge for ICN's feasibility. How to manage the huge namespace of ICN in a limited FIB without much effect on routing efficiency has drawn more and more attention. |
Jie Li | [27] [28] | ||||
Urban Sensing Using Mobile Phone Network Data -A survey (assigned to Khan, Md. Khalilur Rahman)
The recent development of telecommunication networks is producing an unprecedented wealth of information. Mobile phone datasets offer access to insights into urban dynamics and human activities at an unprecedented scale and level of detail, representing a huge opportunity for research and real-world applications. This study is to provide a survey on key techniques related to the use of telecommunication data for urban sensing. |
Tao Zhao(Tao.Zhao@cs.uni-goettingen.de) | [29] | ||||
Trust in social networks -A survey (assigned to Vidya)
Web-based social networks have become popular as a medium for disseminating information and connecting like-minded people. The public accessibility of such networks with the ability to share opinions, thoughts, information, and experience offers great promise to enterprises and governments. In addition to individuals using such networks to connect to their friends and families, governments and enterprises have started exploiting these platforms for delivering their services to citizens and customers. However, the success of such attempts relies on the level of trust that members have with each other as well as with the service provider. This study is to give a comprehensive survey of key technologies on trust in social networks. |
Tao Zhao (Tao.Zhao@cs.uni-goettingen.de) | [30] | ||||
Application of Packet Sampling in Computer Security - A Survey (assigned to Sudhir Kumar Sah)
Today we have lot of reactive solutions for detecting security attacks. Packet sampling is one of the way to monitor real time network traffic. The aim of this work is to find whether packet sampling techniques like sflow, netflow are matured enough to detect security attacks? |
Abhinandan S Prasad | [31] | [32] | [33] | ||
Game theory based solutions in Computer Network Security - A Survey (assigned to Florian Pätzold)
Game theory is the mathematical study of conflict and co-operation between rational agents. Game theory is widely used in the computer network security to detect and mitigate attacks. The aim of work is to perform survey on the recent advances in the field. |
Abhinandan S Prasad | [34] | [35] | [36] | [37] | [38] |
Workflow
1. Select a topic
A student picks a topic to work on. You can pick up a topic and start working at any time. However, make sure to notify the advisor of the topic before starting to work.
2. Get your work advised
For each topic, a topic advisor is available. He is your contact person for questions and problems regarding the topic. He supports you as much as you want, so please do not hesitate to approach him for any advice or with any questions you might have. It is recommended (and not mandatory) that you schedule a face-to-face meeting with him right after you select your topic.
3. Approach your topic
- By choosing a topic, you choose the direction of elaboration.
- You may work in different styles, for example:
- Survey: Basic introduction, overview of the field; general problems, methods, approaches.
- Specific problem: Detailed introduction, details about the problem and the solution.
- You should include your own thoughts on your topic.
4. Prepare your presentation
- Present your topic to the audience (in English).
- 20 minutes of presentation followed by 10 minutes discussion.
You present your topic to an audience of students and other interested people (usually the NET group members). Your presentation should give the audience a general idea of the topic and highlight interesting problems and solutions. You have 20 minutes to present your topic followed by 10 minutes of discussion. You must keep it within the time limit. Please send your slides to your topic advisor for any possible feedback before your presentation.
Hints for preparing the presentation: 20 minutes are too short to present a topic fully. It is alright to focus just on one certain important aspect. Limit the introduction of basics. Make sure to finish in time.
Suggestions for preparing the slides: No more than 20 pages/slides. Get your audiences to quickly understand the general idea. Figures, tables and animations are better than sentences. Summary of the topic: thinking in your own words.
5. Write your report
- Present the problem with its background.
- Detail the approaches, techniques, methods to handle the problem.
- Evaluate and assess those approaches (e.g., pros and cons).
- Give a short outlook on potential future developments.
The report must be written in English according to common guidelines for scientific papers, between 12 and 15 pages of content (excluding the table of content, bibliography, etc.).
6. Course schedule
There are no regular meetings, lectures or classes for this course. The work is expected to be done by yourself with the assistance of your topic advisor. Please follow the #Schedule to take appropriate actions.