Seminar on Internet Technologies (Summer 2013): Difference between revisions

From NET Wiki
Jump to navigation Jump to search
 
(71 intermediate revisions by 6 users not shown)
Line 10: Line 10:
|univz=[http://univz.uni-goettingen.de/qisserver/rds?state=verpublish&status=init&vmfile=no&publishid=123577&moduleCall=webInfo&publishConfFile=webInfo&publishSubDir=veranstaltung]
|univz=[http://univz.uni-goettingen.de/qisserver/rds?state=verpublish&status=init&vmfile=no&publishid=123577&moduleCall=webInfo&publishConfFile=webInfo&publishSubDir=veranstaltung]
}}
}}
{{Announcement|'''Please send an e-mail to [http://user.informatik.uni-goettingen.de/~ljiao me] if your want to take this course or if you have any questions. Thanks.'''}}
{{Announcement|'''Important: Please find our arrangements for your final presentations as follows.'''}}
{{Announcement|'''Please attend our informational meeting at 15:00, Monday, April 8, 2013 in Room 3.101 of the IFI building. Thanks.'''}}


==Course description==
==Course description==
Line 30: Line 29:


==Schedule==
==Schedule==
* '''April 8, 2013, Monday, 15:00''': Informational Meeting
{{Announcement|'''Note: The absence of your name here indicates that you have not registered for this course in FlexNow. Please contact [http://user.informatik.uni-goettingen.de/~ljiao me] if you have any questions. Thanks.'''}}
* '''April 8, 2013, Monday, 15:00''': Informational meeting
* '''April 12, 2013, Friday, 23:59''': Deadline for selection of topic
* '''April 12, 2013, Friday, 23:59''': Deadline for selection of topic
* June 27, 2013, Thursday, 14:00 --- 17:00: Presentation slot I
* '''June 20, 2013, Thursday, 23:59''': Deadline for registration
* July 4, 2013, Thursday, 14:00 --- 17:00: Presentation slot II
* '''June 27, 2013, Thursday, 15:00 - 17:00''': Presentation time slot I: Simon Schuetz, Ditdit Nugeraha Utama
* September 30, 2013, Monday, 23:59: Submission of written report
* '''July 11, 2013, Thursday, 14:00 - 18:00''': Presentation time slot II: The following arrangement is based on the alphabetical order of your last name; Sorry for any possible inconvenience. Please contact me if you have any questions. Thanks.
** 14:00 --- 14:30: Irene Alvarez, "Simple Subgraphs for Link Prediction in the Social Networks: A Survey"
** 14:30 --- 15:00: Sabyasachi Ghosh, "Inferring Networks based on Information Cascade and Diffusion"
** 15:00 --- 15:30: Georg Jahn, "Data Cache in Delay Tolerant Networks"
** 15:30 --- 16:00: Bartosz Kohnke, "Indoor Localization for Mobile Devices"
** 16:00 --- 16:30: Md Istiak Mehedi, "Resource Allocation and Management in Cloud Systems"
** 16:30 --- 17:00: Subhash Chandra Pujari, "Sybil Attacks and Defense via Social Networks: A Good Idea?"
** 17:00 --- 17:30: Daniel Schulenburg, "Bitcoins: A New Currency?"
** 17:30 --- 18:00: Mahdi Solhdoust, "Social Aware Data Routing in Delay Tolerant Networks"
* '''September 30, 2013, Monday, 23:59''': Deadline for submission of report


== Topics ==
== Topics ==
Line 44: Line 53:
|{{Hl2}} |'''Initial readings'''
|{{Hl2}} |'''Initial readings'''
|-
|-
| Context-aware Mobile Media
| <strike>Context-aware Mobile Media</strike> (''Assigned to'' Georg Roth-Kleyer)
| [http://www.net.informatik.uni-goettingen.de/people/yuan_zhang Yuan Zhang]
| [http://www.net.informatik.uni-goettingen.de/people/yuan_zhang Yuan Zhang]
| [http://dl.acm.org/citation.cfm?id=1613982] [http://dl.acm.org/citation.cfm?id=2043981&CFID=115044559&CFTOKEN=88700437] [http://dl.acm.org/citation.cfm?id=2037399]
| [http://dl.acm.org/citation.cfm?id=1613982] [http://dl.acm.org/citation.cfm?id=2043981&CFID=115044559&CFTOKEN=88700437] [http://dl.acm.org/citation.cfm?id=2037399]
|-
|-
| Preserving Location Privacy in Wireless Mobile Networks  
| <strike>Preserving Location Privacy in Wireless Mobile Networks</strike> (''Assigned to'' Simon Schütz)
| [http://www.net.informatik.uni-goettingen.de/people/wenzhong_li Dr. Wenzhong Li]
| [http://www.net.informatik.uni-goettingen.de/people/wenzhong_li Dr. Wenzhong Li]
| [http://arbor.ee.ntu.edu.tw/archive/ppdm/Anonymity/SweeneyKA02.pdf] [http://synrg.ee.duke.edu/papers/cachecloak.pdf] [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1437123&tag=1]
| [http://arbor.ee.ntu.edu.tw/archive/ppdm/Anonymity/SweeneyKA02.pdf] [http://synrg.ee.duke.edu/papers/cachecloak.pdf] [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1437123&tag=1]
|-
|-
| <strike>Indoor Localization for Mobile Devices</strike> (Assigned to Bartosz)
| <strike>Indoor Localization for Mobile Devices</strike> (''Assigned to'' Bartosz Kohnke)
| [http://www.net.informatik.uni-goettingen.de/people/wenzhong_li Dr. Wenzhong Li]
| [http://www.net.informatik.uni-goettingen.de/people/wenzhong_li Dr. Wenzhong Li]
| [http://dl.acm.org/citation.cfm?id=2348581] [http://dl.acm.org/citation.cfm?id=2348579] [http://dl.acm.org/citation.cfm?id=2348578][http://dl.acm.org/citation.cfm?id=2348580]
| [http://dl.acm.org/citation.cfm?id=2348581] [http://dl.acm.org/citation.cfm?id=2348579] [http://dl.acm.org/citation.cfm?id=2348578][http://dl.acm.org/citation.cfm?id=2348580]
|-
|-
| Social aware data routing in delay tolerant networks
| <strike>Social aware data routing in delay tolerant networks</strike> (''Assigned to'' Mahdi Solhdoust)
| [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu]
| [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu]
| [http://astro.temple.edu/~tuc13642/file/Infocom%2012.pdf] [http://www.cs.rpi.edu/~szymansk/papers/tpds.12.pdf] [http://www.cl.cam.ac.uk/~ph315/publications/hoc86309-hui.pdf]
| [http://astro.temple.edu/~tuc13642/file/Infocom%2012.pdf] [http://www.cs.rpi.edu/~szymansk/papers/tpds.12.pdf] [http://www.cl.cam.ac.uk/~ph315/publications/hoc86309-hui.pdf]
|-
|-
| <strike>Sybil Attacks and Defense via Social Networks: A good Idea?</strike> (Assigned to Subhash)
| <strike>Data cache in delay tolerant networks</strike> (''Assigned to'' Georg Jahn)
| [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu]
| [http://www.cis.temple.edu/~wu/teaching/Spring%202013/infocom2013a.pdf] [http://mcn.cse.psu.edu/paper/xuejun-zhuo/xuejun-mass11.pdf] [http://mcn.cse.psu.edu/paper/weigao/icdcs11.pdf]
|-
| <strike>Sybil Attacks and Defense via Social Networks: A good Idea?</strike> (''Assigned to'' Subhash Chandra Pujari)
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]
| [http://www.mpi-soft.mpg.de/~gummadi/papers/comm318g.pdf] [http://www.mpi-sws.org/~gummadi/papers/sybil_defense.pdf] [http://www.cs.ucsb.edu/~ravenben/publications/pdf/sybil-imc11.pdf]
| [http://www.mpi-soft.mpg.de/~gummadi/papers/comm318g.pdf] [http://www.mpi-sws.org/~gummadi/papers/sybil_defense.pdf] [http://www.cs.ucsb.edu/~ravenben/publications/pdf/sybil-imc11.pdf]
|-
|-
| Bitcoins: A new currency?
| <strike>Bitcoins: A new currency?</strike> (''Assigned to'' Daniel Schulenburg)
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]
| [http://en.wikipedia.org/wiki/Bitcoin]
| [http://en.wikipedia.org/wiki/Bitcoin]
|-
|-
| Resource Allocation in the Cloud
| <strike>Decentralized Online Social Networks: A Survey of the State-of-the-Art</strike> (''Assigned to'' Ditdit Nugeraha Utama)
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]
| [http://www.peerson.net/][http://www.p2p.tu-darmstadt.de/fileadmin/user_upload/Group_P2P/share/p2p-ws10/safebook.pdf][http://dl.acm.org/citation.cfm?id=1592585]
|-
| <strike>Information-Centric Network: Existing solutions</strike> (''Assigned to'' Johannes Widenka)
| [http://www.net.informatik.uni-goettingen.de/people/jiachen_chen Jiachen Chen]
| [http://ccr.sigcomm.org/online/files/fp177-koponen1.pdf][http://www.cse.tkk.fi/fi/opinnot/T-110.6120/2010_Spring_Publish-Subscribe_Internetworking/luennot-files/STAL9781607500070-0102-1.pdf][http://pages.cs.wisc.edu/~akella/CS838/F09/838-Papers/ccn.pdf][http://dl.acm.org/citation.cfm?id=2065182]
|-
| <strike>Reliable Multicast: Solutions and Problems</strike> (''Assigned to'' Wazed Ali)
| [http://www.net.informatik.uni-goettingen.de/people/jiachen_chen Jiachen Chen]
| [http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=01096179][http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=493090][http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.30.3968][http://www.nossdav.org/1999/papers/71-1979756152.pdf]
|-
| <strike>Resource Allocation and Management in Cloud Systems</strike> (''Assigned to'' Md Istiak Mehedi)
| [http://user.informatik.uni-goettingen.de/~ljiao/ Lei Jiao]
| [http://user.informatik.uni-goettingen.de/~ljiao/ Lei Jiao]
| [http://iqua.ece.toronto.edu/~bli/papers/dniu-infocom13.pdf] [http://www.bell-labs.com/user/erranlli/publications/PACE-INFOCOM13.pdf] [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=6258025]
| [http://iqua.ece.toronto.edu/~bli/papers/dniu-infocom13.pdf] [http://www.bell-labs.com/user/erranlli/publications/PACE-INFOCOM13.pdf] [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=6258025]
|-
| <strike>Simple Subgraphs for link prediction in the social networks: A survey</strike> (''Assigned to'' Irene Alvarez)
| [http://www.net.informatik.uni-goettingen.de/people/hong_huang Hong Huang]
| [http://www.weizmann.ac.il/mcb/UriAlon/Papers/networkMotifs/networkMotifs.pdf] [http://www2012.wwwconference.org/proceedings/proceedings/p1019.pdf] [http://research.microsoft.com/pubs/133158/GolderYardiSocComp.pdf][http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5992640]
|-
| <strike>Inferring Networks based on Information Cascade and Diffusion</strike> (''Assigned to'' Sabyasachi Ghosh)
| [http://www.net.informatik.uni-goettingen.de/people/wei_du Wei Du] [http://www.net.informatik.uni-goettingen.de/people/narisu_tao Narisu Tao]
| [http://www.stanford.edu/~manuelgr/pubs/netinf-kdd2010.pdf][http://www.cs.cornell.edu/home/kleinber/kdd09-quotes.pdf] [http://snap.stanford.edu/netinf/]
|}
|}



Latest revision as of 21:38, 9 July 2013

Details

Workload/ECTS Credits: 120h, 6 ECTS (New); 4 ECTS (Old); 5 (ITIS)
Module: M.Inf.122/222: Seminar Telematik I/II -or- B.Inf.204/205: Proseminar I/II, (new Catalog:) M.Inf.1124-or- B.Inf.1207/1208; ITIS Module 3.16: Selected Topics in Internet Technologies
Lecturer: Prof. Dr. Xiaoming Fu
Teaching assistant: Lei Jiao
Time: Please see #Schedule
Place: IfI 3.101
UniVZ [1]


Imbox content.png Important: Please find our arrangements for your final presentations as follows.

Course description

The seminar covers selected topics from the current popular technologies and research on computer networks. Each student will present one topic and write a report on it. There are no regular meetings for this seminar.

The purpose of this seminar is to

  • Familiarize the students with common and new technologies.
  • Enable independent study of a specific topic.
  • Train writing and presentation skills.

Passing requirements

  • Present the selected topic in the seminar (20 min. presentation + 10 min. discussion).
    • This accounts for 40% of your grade.
  • Prepare a written report on the selected topic (12-15 pages) (Template:[2]).
    • This accounts for 60% of your grade.
  • Please see #Schedule and adhere to it.

Schedule

Imbox content.png Note: The absence of your name here indicates that you have not registered for this course in FlexNow. Please contact me if you have any questions. Thanks.
  • April 8, 2013, Monday, 15:00: Informational meeting
  • April 12, 2013, Friday, 23:59: Deadline for selection of topic
  • June 20, 2013, Thursday, 23:59: Deadline for registration
  • June 27, 2013, Thursday, 15:00 - 17:00: Presentation time slot I: Simon Schuetz, Ditdit Nugeraha Utama
  • July 11, 2013, Thursday, 14:00 - 18:00: Presentation time slot II: The following arrangement is based on the alphabetical order of your last name; Sorry for any possible inconvenience. Please contact me if you have any questions. Thanks.
    • 14:00 --- 14:30: Irene Alvarez, "Simple Subgraphs for Link Prediction in the Social Networks: A Survey"
    • 14:30 --- 15:00: Sabyasachi Ghosh, "Inferring Networks based on Information Cascade and Diffusion"
    • 15:00 --- 15:30: Georg Jahn, "Data Cache in Delay Tolerant Networks"
    • 15:30 --- 16:00: Bartosz Kohnke, "Indoor Localization for Mobile Devices"
    • 16:00 --- 16:30: Md Istiak Mehedi, "Resource Allocation and Management in Cloud Systems"
    • 16:30 --- 17:00: Subhash Chandra Pujari, "Sybil Attacks and Defense via Social Networks: A Good Idea?"
    • 17:00 --- 17:30: Daniel Schulenburg, "Bitcoins: A New Currency?"
    • 17:30 --- 18:00: Mahdi Solhdoust, "Social Aware Data Routing in Delay Tolerant Networks"
  • September 30, 2013, Monday, 23:59: Deadline for submission of report

Topics

Topic Topic advisor Initial readings
Context-aware Mobile Media (Assigned to Georg Roth-Kleyer) Yuan Zhang [3] [4] [5]
Preserving Location Privacy in Wireless Mobile Networks (Assigned to Simon Schütz) Dr. Wenzhong Li [6] [7] [8]
Indoor Localization for Mobile Devices (Assigned to Bartosz Kohnke) Dr. Wenzhong Li [9] [10] [11][12]
Social aware data routing in delay tolerant networks (Assigned to Mahdi Solhdoust) Konglin Zhu [13] [14] [15]
Data cache in delay tolerant networks (Assigned to Georg Jahn) Konglin Zhu [16] [17] [18]
Sybil Attacks and Defense via Social Networks: A good Idea? (Assigned to Subhash Chandra Pujari) David Koll [19] [20] [21]
Bitcoins: A new currency? (Assigned to Daniel Schulenburg) David Koll [22]
Decentralized Online Social Networks: A Survey of the State-of-the-Art (Assigned to Ditdit Nugeraha Utama) David Koll [23][24][25]
Information-Centric Network: Existing solutions (Assigned to Johannes Widenka) Jiachen Chen [26][27][28][29]
Reliable Multicast: Solutions and Problems (Assigned to Wazed Ali) Jiachen Chen [30][31][32][33]
Resource Allocation and Management in Cloud Systems (Assigned to Md Istiak Mehedi) Lei Jiao [34] [35] [36]
Simple Subgraphs for link prediction in the social networks: A survey (Assigned to Irene Alvarez) Hong Huang [37] [38] [39][40]
Inferring Networks based on Information Cascade and Diffusion (Assigned to Sabyasachi Ghosh) Wei Du Narisu Tao [41][42] [43]

Workflow

The workflow of the seminar is as follows.

1. Topic selection

Each student picks a topic to work on. You can pick a topic and start working at any time. Just approach the topic advisor and he will give you initial information and a time frame for the topic. Alternatively you can select a topic at the first session of a semester.

2. Topic advisor

For each topic a supervising tutor is available who is familiar with the topic. He is your contact person for questions and problems regarding the topic. The tutor supports you as much as you want, so don't hesitate to approach him for general advice or with any questions you might have. You must have at least one face-to-face meeting to discuss your outline and initial thoughts. It is recommended that you schedule a first meeting right when you select the topic you want to work on.

3. Approach your topic

  • Topic titles are rather abstract.
  • You chose the direction of your elaboration.
  • For example:
    • Survey style: Basic introduction, overview about the field, general problems, methods, approaches.
    • Specific problem: Selective introduction, detail the problem, introduce solutions or approaches.
  • Include your own thoughts: Evaluation section, outlook in the end.
  • Remember: We are interested in the aspects related to Internet technologies.

4. Prepare a Presentation

TLDR version:

  • Give an overview of your topic to the audience.
  • 20~25 minutes of presentation followed by 5~10 minutes discussion.
  • Slides should be in English.

As a part of the seminar you have to present your topic to an audience of students and other interested people. Your presentation should give the audience a general idea of the topic and highlight interesting issues and problems. Try to explain the motivation behind your topic and the problems that are addressed as well as the solutions and open questions. You have 25 minutes to present your topic followed by 10 minutes of discussion. You must keep within the time limit of 35 minutes. The deadline for the slides you prepare for the presentation is one week before the actual presentation. Please send the slides to your topic advisor as soon possible though, so you have time to include any feedback you got.

You can chose on your own whether you want to prepare the presentation or write the report first. We recommend that you have a rough draft of the presentation as a basis to discuss your approach of the topic with your advisor before writing a lot of text. It is easier to exchange a couple of slides than a couple pages in the report.

Some hints you should keep in mind when preparing the presentation:

  • 20 minutes are too short to present a topic fully.
  • Limit the introduction of basics (5 min.).
  • Focus on the interesting parts of the topic.
  • It is alright to focus just on one certain important aspect.
  • Make sure to finish in time!

Suggestions for preparing the slides:

  • No more than 20 slides.
  • Get your audiences to quickly understand the idea of the presentation
  • Figures, tables and animations are better than wordy sentences
  • Use example to explain complicated algorithms
  • Short sentences
  • Avoid complicated equations
  • Summary of the topic: thinking/justification of the approach(es) in your own words

5. Write the Report

TLDR version:

  • Comprehensively cover the topic.
  • Content:
    • Present the problem with its background.
    • Detail available approaches, techniques, methodologies to deal with this problem. What are their properties, advantages and drawbacks.
    • Evaluate and assess those approaches.
    • Give a short outlook on potential future developments.
  • Between 12 and 15 pages of content (usual thesis layout).
  • Written in English according to common guidelines for scientific papers.
  • Deadline: End of the semester.

The report is the main part of your work. It must be between 12 and 15 pages of content (not including table of content, bibliography and such) and comprehensively cover your topic.

6. Block meetings

There will be no general meetings for this seminar. The work for will be done by yourself with the assistance of your topic advisor. There will be a limited number of block meetings every semester. In general there will be one block meeting in the beginning of a semester to give an introduction to the course and a couple of dates for the presentations. Please see the schedule for the current semester for the exact dates. While the participation in the presentation meetings is mandatory, you are not required to participate in the organizational meeting. If you miss the general meeting or you want to start your work earlier (for example during the semester break), please contact the teaching assistants (see top of this page) or the topic advisor for your topic.