Seminar on Internet Technologies (Summer 2012): Difference between revisions

From NET Wiki
Jump to navigation Jump to search
 
(90 intermediate revisions by 4 users not shown)
Line 1: Line 1:
== Details ==
== Details ==
{{Announcement|'''Presentations: 19.01.2012'''}}


{{CourseDetails
{{CourseDetails
|credits=120h, 4 ECTS
|credits=120h, 6 ECTS (New); 4 ECTS (Old)
|module=M.Inf.122/222: Seminar Telematik I/II ''-or-'' B.Inf.204/205: Proseminar I/II, (new Catalog:) M.Inf.1222.Mp''-or-'' B.Inf.1207/1208
|module=M.Inf.122/222: Seminar Telematik I/II ''-or-'' B.Inf.204/205: Proseminar I/II, (new Catalog:) M.Inf.1222.Mp''-or-'' B.Inf.1207/1208
|ta=[http://www.net.informatik.uni-goettingen.de/people/lei_jiao Lei Jiao]
|ta=[http://www.net.informatik.uni-goettingen.de/people/lei_jiao Lei Jiao]
|time=please see [[#Schedule]] In general Thursdays 16:00.
|time=Please see [[#Schedule]]
|place=IfI 3.101
|place=IfI 3.101
|univz=[http://univz.uni-goettingen.de/qisserver/rds?state=verpublish&status=init&vmfile=no&publishid=90024&moduleCall=webInfo&publishConfFile=webInfo&publishSubDir=veranstaltung]
|univz=[http://univz.uni-goettingen.de/qisserver/rds?state=verpublish&status=init&vmfile=no&publishid=96263&moduleCall=webInfo&publishConfFile=webInfo&publishSubDir=veranstaltung]
}}
}}
{{Announcement|'''Please send your final report by 30.9.2012 to your topic advisor and also cc to me. Thanks.'''}}
{{Announcement|'''Please check the [[#Schedule]] on this page for your own final presentation arrangement. '''}}
{{Announcement|'''If you study with the new regulations, you'll get 6 ECTS for this course; if you're with the old regulations, you'll get 4 ECTS instead. '''}}


==Course description==
==Course description==
Line 23: Line 24:
==Passing requirements==
==Passing requirements==
* Prepare a written report on the selected topic (12-15 pages) (Template:[ftp://ftp.springer.de/pub/tex/latex/llncs/latex2e/llncs2e.zip]).
* Prepare a written report on the selected topic (12-15 pages) (Template:[ftp://ftp.springer.de/pub/tex/latex/llncs/latex2e/llncs2e.zip]).
** This accounts for 60% of your grade.
* Present the selected topic in the seminar (20 min. presentation + 10 min. discussion).
* Present the selected topic in the seminar (20 min. presentation + 10 min. discussion).
* Presence and active participation during all meetings.
** This accounts for 40% of your grade.
* Please see [[#Schedule]] and adhere to it.
* Please see [[#Schedule]] and adhere to it.


==Schedule==
==Schedule==
First meeting: Thursday Oct. 27th at 16:00 in 3.101
* '''September 30th''': Deadline to submit the final report
FlexNow Deadline: Thursday Jan. 12th
{{Announcement|'''If you cannot find yourself in the following list, it indicates that you have not registered for this course. Please contact me if you have any questions.'''}}
Presentations: Thursday Jan. 19th at 16:00 in 3.101
* '''July 19th''' 14:00 --- 14:35: Arne, "Routing strategies in delay tolerant networks"
* '''July 19th''' 14:35 --- 15:10: Rasha, "Data placement among geo-distributed clouds"
* '''July 19th''' 15:10 --- 15:45: Sonja, "Relationship classification in social networks"
* '''July 19th''' 15:45 --- 16:20: Christof, "Modern data center techniques"
* '''July 19th''' 16:20 --- 16:55: Christian, "Business models of the underground economy"
* '''July 24th''' 14:00 --- 14:35: Bassel, "Malware propagation in mobile phone networks"
* '''July 24th''' 14:35 --- 15:10: Subhi, "Scaling and partitioning online social networks"


== Topics ==
== Topics ==
Line 42: Line 50:
|{{Hl2}} |'''Initial readings'''
|{{Hl2}} |'''Initial readings'''
|-
|-
| Voice Over IP - A Success Story?
| <strike>Voice Over IP - A Success Story?</strike> (assigned to Christopher Menke)
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]
| [http://en.wikipedia.org/wiki/Voice_over_Internet_Protocol] [http://transition.fcc.gov/voip/]
| [http://en.wikipedia.org/wiki/Voice_over_Internet_Protocol] [http://transition.fcc.gov/voip/]
|-
|-
| Business Models of the Underground Economy.
| <strike>Business Models of the Underground Economy</strike> (assigned to Christian Wehrberger)
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]
| [http://www.blackhat.com/presentations/bh-dc-10/Stevens_Kevin/BlackHat-DC-2010-Stevens-Underground-wp.pdf] [http://weis2011.econinfosec.org/papers/The%20Underground%20Economy%20of%20Fake%20Antivirus%20Software.pdf] [http://www.cs.ucsb.edu/~vigna/publications/2011_stone_cova_gilbert_kemmerer_kruegel_vigna_torpig.pdf]
| [http://www.blackhat.com/presentations/bh-dc-10/Stevens_Kevin/BlackHat-DC-2010-Stevens-Underground-wp.pdf] [http://weis2011.econinfosec.org/papers/The%20Underground%20Economy%20of%20Fake%20Antivirus%20Software.pdf] [http://www.cs.ucsb.edu/~vigna/publications/2011_stone_cova_gilbert_kemmerer_kruegel_vigna_torpig.pdf]
|-
|-
| Malware Detection in Networks - Anomaly Detection (multiple topics available)
| <strike>Malware Detection in Networks - Anomaly Detection</strike> (assigned to Abouzar Hosseini)
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]
| [http://www.google.com/url?sa=t&rct=j&q=malware%20detection%20in%20networks&source=web&cd=1&ved=0CB4QFjAA&url=http%3A%2F%2Fwww.networkworld.com%2Fnews%2F2007%2F042507-malware-detection.html&ei=Rm2lTpTFHcrNswaijp2eAw&usg=AFQjCNG5qvZm7a4kS-L8ajgOmMNEVoDQZA&cad=rja]
| [http://www.google.com/url?sa=t&rct=j&q=malware%20detection%20in%20networks&source=web&cd=1&ved=0CB4QFjAA&url=http%3A%2F%2Fwww.networkworld.com%2Fnews%2F2007%2F042507-malware-detection.html&ei=Rm2lTpTFHcrNswaijp2eAw&usg=AFQjCNG5qvZm7a4kS-L8ajgOmMNEVoDQZA&cad=rja]
|-
|-
| Relationship Classification in Social Networks
| <strike>Relationship Classification in Social Networks</strike> (assigned to Sonja Neue)
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]
| [http://research.microsoft.com/en-us/people/weic/infocom11_relationshipclassification.pdf] [http://www.cs.purdue.edu/homes/rxiang/Publication_files/wfp1000-xiang.pdf]
| [http://research.microsoft.com/en-us/people/weic/infocom11_relationshipclassification.pdf] [http://www.cs.purdue.edu/homes/rxiang/Publication_files/wfp1000-xiang.pdf]
|-
|-
| Modern Data Center Techniques
| <strike>Modern Data Center Techniques</strike> (assigned to Christof Pohl)
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]
| [http://conferences.sigcomm.org/sigcomm/2011/papers/sigcomm/p62.pdf] [http://www.cse.iitb.ac.in/~puru/courses/spring11/cs620/references/costofcloud.pdf] [http://lcs.syr.edu/faculty/tang/Teaching/CSE791-Spring11/Papers/VL2-Sigcomm09.pdf]
| [http://conferences.sigcomm.org/sigcomm/2011/papers/sigcomm/p62.pdf] [http://www.cse.iitb.ac.in/~puru/courses/spring11/cs620/references/costofcloud.pdf] [http://ccr.sigcomm.org/online/files/p51.pdf]
|-
|-
| Understanding Android Security
| <strike>Advances and Challenges in Trust and Recommendation Systems</strike> (assigned to Omar Shaya)
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]
| [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4768655&tag=1]
| (To Be Available)
|-
|-
| Security in Near Field Communication (NFC)
| <strike>Security in Near Field Communication (NFC)</strike> (assigned to Georg Jahn)
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]
| [http://events.iaik.tugraz.at/RFIDSec06/Program/papers/002%20-%20Security%20in%20NFC.pdf]
| [http://events.iaik.tugraz.at/RFIDSec06/Program/papers/002%20-%20Security%20in%20NFC.pdf]
|-
|-
| Malware propagation in mobile phone networks
| <strike>Malware propagation in mobile phone networks</strike> (assigned to Bassel Zeidan)
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]
| [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.75.9303&rep=rep1&type=pdf] [http://portal.acm.org/ft_gateway.cfm?id=1378626&type=pdf&coll=GUIDE&dl=GUIDE&CFID=108242768&CFTOKEN=61684608] [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.83.5797&rep=rep1&type=pdf]
| [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.75.9303&rep=rep1&type=pdf] [http://portal.acm.org/ft_gateway.cfm?id=1378626&type=pdf&coll=GUIDE&dl=GUIDE&CFID=108242768&CFTOKEN=61684608] [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.83.5797&rep=rep1&type=pdf]
|-
|-
| Economics in Peer-to-Peer Systems
| <strike>Scaling and Partitioning Online Social Networks</strike> (assigned to Subhi Barikhan)
| [http://cs.nju.edu.cn/dislab/xuty/xuty.html Tianyin Xu]
| [http://www.net.informatik.uni-goettingen.de/people/lei_jiao Lei Jiao]
| [http://cs.nju.edu.cn/dislab/xuty/readinglist/econ_tax.pdf] [http://www.cs.ust.hk/mjg_lib/Library/0310039.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/econ_wu.pdf]
| [http://ccr.sigcomm.org/online/files/p375.pdf] [http://research.microsoft.com/en-us/projects/ldg/a04-carrasco.pdf] [http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5961377]
|-
|-
| Applications of Bloom Filter in Data Center Networking
| <strike>Data Placement among Geo-Distributed Clouds</strike> (assigned to Rasha Mohsen)
| [http://www.net.informatik.uni-goettingen.de/people/lei_jiao Lei Jiao]
| [http://www.net.informatik.uni-goettingen.de/people/lei_jiao Lei Jiao]
| [http://alex.fabrikant.us/papers/yfr09.pdf] [http://www.ce.sunysb.edu/~xwang/public/paper/ICNP_BF_Mcast.pdf] [http://www.informatik.tu-darmstadt.de/fileadmin/user_upload/Group_CDC/Documents/Publikationen/201104_CN55_6__In-packet_Bloom_filters_-_Design_and_networking_applications.pdf]
| [http://www.vldb.org/pvldb/vol4/p1040-kadambi.pdf] [http://www.news.cs.nyu.edu/~trandinh/publications/Nomad-ATC.pdf] [http://research.microsoft.com/en-us/people/sagarwal/nsdi2010.pdf]
|-
|-
| Routing strategies in Delay Tolerent Networks
| <strike>Routing strategies in Delay Tolerent Networks</strike> (assigned to Arne Bochem)
| [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu]
| [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu]
| [http://delivery.acm.org/10.1145/1380000/1374652/p241-hui.pdf?ip=134.76.81.25&CFID=44287089&CFTOKEN=42866787&__acm__=1316779081_bdfa9e378cd848d6616ecfc6a0f9e5b1] [http://mcn.cse.psu.edu/paper/weigao/mobihoc09.pdf] [http://delivery.acm.org/10.1145/1290000/1288113/p32-daly.pdf?ip=134.76.81.25&CFID=44287089&CFTOKEN=42866787&__acm__=1316779310_6f8566b2d0ec634be8d30298ef9d129a] [http://prisms.cs.umass.edu/brian/pubs/bburns.infocom.2005.pdf][http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4585387][http://www-npa.lip6.fr/_publications/669-infocom06.pdf]
| [http://delivery.acm.org/10.1145/1380000/1374652/p241-hui.pdf?ip=134.76.81.25&CFID=44287089&CFTOKEN=42866787&__acm__=1316779081_bdfa9e378cd848d6616ecfc6a0f9e5b1] [http://mcn.cse.psu.edu/paper/weigao/mobihoc09.pdf] [http://delivery.acm.org/10.1145/1290000/1288113/p32-daly.pdf?ip=134.76.81.25&CFID=44287089&CFTOKEN=42866787&__acm__=1316779310_6f8566b2d0ec634be8d30298ef9d129a] [http://prisms.cs.umass.edu/brian/pubs/bburns.infocom.2005.pdf][http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4585387][http://www-npa.lip6.fr/_publications/669-infocom06.pdf]
Line 112: Line 120:
'''TLDR version:'''  
'''TLDR version:'''  
* Give an overview of your topic to the audience.
* Give an overview of your topic to the audience.
* 20 minutes of presentation followed by 10 minutes discussion.
* 20~25 minutes of presentation followed by 5~10 minutes discussion.
* Slides should be in English.
* Slides should be in English.


As a part of the seminar you have to present your topic to an audience of students and other interested people. Your presentation should give the audience a general idea of the topic and highlight interesting issues and problems. Try to explain the motivation behind your topic and the problems that are addressed as well as the solutions and open questions. You have 20 minutes to present your topic followed by 10 minutes of discussion. You must keep within the time limit of 30 minutes. The deadline for the slides you prepare for the presentation is one week before the actual presentation. Please send the slides to your topic advisor as soon possible though, so you have time to include any feedback you got.
As a part of the seminar you have to present your topic to an audience of students and other interested people. Your presentation should give the audience a general idea of the topic and highlight interesting issues and problems. Try to explain the motivation behind your topic and the problems that are addressed as well as the solutions and open questions. You have 25 minutes to present your topic followed by 10 minutes of discussion. You must keep within the time limit of 35 minutes. The deadline for the slides you prepare for the presentation is one week before the actual presentation. Please send the slides to your topic advisor as soon possible though, so you have time to include any feedback you got.


You can chose on your own whether you want to prepare the presentation or write the report first. We recommend that you have a rough draft of the presentation as a basis to discuss your approach of the topic with your advisor before writing a lot of text. It is easier to exchange a couple of slides than a couple pages in the report.  
You can chose on your own whether you want to prepare the presentation or write the report first. We recommend that you have a rough draft of the presentation as a basis to discuss your approach of the topic with your advisor before writing a lot of text. It is easier to exchange a couple of slides than a couple pages in the report.  
Line 126: Line 134:
* Make sure to finish in time!
* Make sure to finish in time!


Tips for preparing the slides:
Suggestions for preparing the slides:
* No more than 15 slides.
* No more than 20 slides.
* Get your audiences to quickly understand the idea of the presentation
* Get your audiences to quickly understand the idea of the presentation
*Figures, tables and animations are better than wordy sentences
* Figures, tables and animations are better than wordy sentences
*Use example to explain complicated algorithms
* Use example to explain complicated algorithms
*Short sentences
* Short sentences
*Avoid complicated equations
* Avoid complicated equations
*Summary of the topic: thinking/justification of the approach(es) in your own words
* Summary of the topic: thinking/justification of the approach(es) in your own words


=== 5. Write the Report ===
=== 5. Write the Report ===

Latest revision as of 11:49, 12 November 2012

Details

Workload/ECTS Credits: 120h, 6 ECTS (New); 4 ECTS (Old)
Module: M.Inf.122/222: Seminar Telematik I/II -or- B.Inf.204/205: Proseminar I/II, (new Catalog:) M.Inf.1222.Mp-or- B.Inf.1207/1208
Lecturer: {{{lecturer}}}
Teaching assistant: Lei Jiao
Time: Please see #Schedule
Place: IfI 3.101
UniVZ [1]


Imbox content.png Please send your final report by 30.9.2012 to your topic advisor and also cc to me. Thanks.
Imbox content.png Please check the #Schedule on this page for your own final presentation arrangement.
Imbox content.png If you study with the new regulations, you'll get 6 ECTS for this course; if you're with the old regulations, you'll get 4 ECTS instead.

Course description

The seminar will cover selected topics from current research and technology approaches in computer networking. Each student will write a report on one topic and present it during the seminar. The seminar is held on a small number of block meetings where the students give their presentations. There will be no regular meetings.

The purpose of this seminar is to

  • Familiarize the students with common and new technologies that are being used in the Internet.
  • Enable independent studying of a specific topic.
  • Train writing and presentation skills.

Passing requirements

  • Prepare a written report on the selected topic (12-15 pages) (Template:[2]).
    • This accounts for 60% of your grade.
  • Present the selected topic in the seminar (20 min. presentation + 10 min. discussion).
    • This accounts for 40% of your grade.
  • Please see #Schedule and adhere to it.

Schedule

  • September 30th: Deadline to submit the final report
Imbox content.png If you cannot find yourself in the following list, it indicates that you have not registered for this course. Please contact me if you have any questions.
  • July 19th 14:00 --- 14:35: Arne, "Routing strategies in delay tolerant networks"
  • July 19th 14:35 --- 15:10: Rasha, "Data placement among geo-distributed clouds"
  • July 19th 15:10 --- 15:45: Sonja, "Relationship classification in social networks"
  • July 19th 15:45 --- 16:20: Christof, "Modern data center techniques"
  • July 19th 16:20 --- 16:55: Christian, "Business models of the underground economy"
  • July 24th 14:00 --- 14:35: Bassel, "Malware propagation in mobile phone networks"
  • July 24th 14:35 --- 15:10: Subhi, "Scaling and partitioning online social networks"

Topics

The following list of topics is constantly being expanded. If there is no topic that you like at the moment, please check back regularly for the most recent updates. You can also get in touch with us directly and we will try to find a topic that interests you.

Topic Topic advisor Initial readings
Voice Over IP - A Success Story? (assigned to Christopher Menke) Florian Tegeler [3] [4]
Business Models of the Underground Economy (assigned to Christian Wehrberger) Florian Tegeler [5] [6] [7]
Malware Detection in Networks - Anomaly Detection (assigned to Abouzar Hosseini) Florian Tegeler [8]
Relationship Classification in Social Networks (assigned to Sonja Neue) David Koll [9] [10]
Modern Data Center Techniques (assigned to Christof Pohl) David Koll [11] [12] [13]
Advances and Challenges in Trust and Recommendation Systems (assigned to Omar Shaya) David Koll (To Be Available)
Security in Near Field Communication (NFC) (assigned to Georg Jahn) Sufian Hameed [14]
Malware propagation in mobile phone networks (assigned to Bassel Zeidan) Sufian Hameed [15] [16] [17]
Scaling and Partitioning Online Social Networks (assigned to Subhi Barikhan) Lei Jiao [18] [19] [20]
Data Placement among Geo-Distributed Clouds (assigned to Rasha Mohsen) Lei Jiao [21] [22] [23]
Routing strategies in Delay Tolerent Networks (assigned to Arne Bochem) Konglin Zhu [24] [25] [26] [27][28][29]

Workflow

The workflow of the seminar is as follows.

1. Topic selection

Each student picks a topic to work on. You can pick a topic and start working at any time. Just approach the topic advisor and he will give you initial information and a time frame for the topic. Alternatively you can select a topic at the first session of a semester.

2. Topic advisor

For each topic a supervising tutor is available who is familiar with the topic. He is your contact person for questions and problems regarding the topic. The tutor supports you as much as you want, so don't hesitate to approach him for general advice or with any questions you might have. You must have at least one face-to-face meeting to discuss your outline and initial thoughts. It is recommended that you schedule a first meeting right when you select the topic you want to work on.

3. Approach your topic

  • Topic titles are rather abstract.
  • You chose the direction of your elaboration.
  • For example:
    • Survey style: Basic introduction, overview about the field, general problems, methods, approaches.
    • Specific problem: Selective introduction, detail the problem, introduce solutions or approaches.
  • Include your own thoughts: Evaluation section, outlook in the end.
  • Remember: We are interested in the aspects related to Internet technologies.

4. Prepare a Presentation

TLDR version:

  • Give an overview of your topic to the audience.
  • 20~25 minutes of presentation followed by 5~10 minutes discussion.
  • Slides should be in English.

As a part of the seminar you have to present your topic to an audience of students and other interested people. Your presentation should give the audience a general idea of the topic and highlight interesting issues and problems. Try to explain the motivation behind your topic and the problems that are addressed as well as the solutions and open questions. You have 25 minutes to present your topic followed by 10 minutes of discussion. You must keep within the time limit of 35 minutes. The deadline for the slides you prepare for the presentation is one week before the actual presentation. Please send the slides to your topic advisor as soon possible though, so you have time to include any feedback you got.

You can chose on your own whether you want to prepare the presentation or write the report first. We recommend that you have a rough draft of the presentation as a basis to discuss your approach of the topic with your advisor before writing a lot of text. It is easier to exchange a couple of slides than a couple pages in the report.

Some hints you should keep in mind when preparing the presentation:

  • 20 minutes are too short to present a topic fully.
  • Limit the introduction of basics (5 min.).
  • Focus on the interesting parts of the topic.
  • It is alright to focus just on one certain important aspect.
  • Make sure to finish in time!

Suggestions for preparing the slides:

  • No more than 20 slides.
  • Get your audiences to quickly understand the idea of the presentation
  • Figures, tables and animations are better than wordy sentences
  • Use example to explain complicated algorithms
  • Short sentences
  • Avoid complicated equations
  • Summary of the topic: thinking/justification of the approach(es) in your own words

5. Write the Report

TLDR version:

  • Comprehensively cover the topic.
  • Content:
    • Present the problem with its background (˜10%).
    • Detail available approaches, techniques, methodologies to deal with this problem. What are their properties, advantages and drawbacks(˜50%).
    • Evaluate and assess those approaches (˜30%).
    • Give a short outlook on potential future developments (˜10%).
  • Between 12 and 15 pages of content (usual thesis layout).
  • Written in English according to common guidelines for scientific papers.
  • Deadline: End of the semester.

The report is the main part of your work. It must be between 12 and 15 pages of content (not including table of content, bibliography and such) and comprehensively cover your topic.

6. Block meetings

There will be no general meetings for this seminar. The work for will be done by yourself with the assistance of your topic advisor. There will be a limited number of block meetings every semester. In general there will be one block meeting in the beginning of a semester to give an introduction to the course and a couple of dates for the presentations. Please see the schedule for the current semester for the exact dates. While the participation in the presentation meetings is mandatory, you are not required to participate in the organizational meeting. If you miss the general meeting or you want to start your work earlier (for example during the semester break), please contact the teaching assistants (see top of this page) or the topic advisor for your topic.