Seminar on Internet Technologies (Summer 2015): Difference between revisions

From NET Wiki
Jump to navigation Jump to search
No edit summary
 
(69 intermediate revisions by 9 users not shown)
Line 1: Line 1:
{{Announcement|IMPORTANT: The deadline for registration with FlexNow is on January 15th!)}}
{{Announcement|IMPORTANT: The final presentations are schedlued for August 17th, Monday from 2pm onwards. }}
{{Announcement|A preliminary allocation of presentation slots can be found below. )}}
 


== Details ==
== Details ==
Line 8: Line 6:
|credits=5 ECTS (BSc/MSc AI); 5 (ITIS)
|credits=5 ECTS (BSc/MSc AI); 5 (ITIS)
|module= M.Inf.1124 ''-or-'' B.Inf.1207/1208; ITIS Module 3.16: Selected Topics in Internet Technologies
|module= M.Inf.1124 ''-or-'' B.Inf.1207/1208; ITIS Module 3.16: Selected Topics in Internet Technologies
|lecturer=[http://user.informatik.uni-goettingen.de/~fu Prof. Dr. Xiaoming Fu]
|lecturer=[https://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai?lang=de Dr. Mayutan Arumaithurai]
|ta=[https://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai?lang=de Dr. Mayutan Arumaithurai]
|ta= None
|time=April 16th (Thursday), 16:00ct: Introduction Meeting
|time=April 16th (Thursday), 16:00ct: Introduction Meeting
|place=IFI Building, Room 3.101
|place=IFI Building, Room 3.101
Line 17: Line 15:
==Course description==
==Course description==


This course covers selected topics on the up-to-date Internet technologies and research. Each student takes a topic, does a presentation and writes a report on it. Besides the introduction meeting on October 23rd, there are no regular meetings, lectures or classes for this course. The purpose of this course is to familiarize the students with new technologies, enable independent study of a specific topic, and train presentation and writing skills.
This course covers selected topics on the up-to-date Internet technologies and research. Each student takes a topic, does a presentation and writes a report on it. Besides the introduction meeting on April 16th, there are no regular meetings, lectures or classes for this course. The students have to keep in constant touch with their topic advisor in order to prepare for the final presentation. The purpose of this course is to familiarize the students with new technologies, enable independent study of a specific topic, and train presentation and writing skills.


The informational meeting at the beginning of the course will cover some guidelines on scientific presenting and writing.
The informational meeting at the beginning of the course will cover some guidelines on scientific presenting and writing.
{{Announcement|NOTE: Presentation slots have been allocated to those students whose topic advisor informed me that the student has done sufficient ground work and has submitted a first draft of the presentation two weeks before the final presentations. I have marked "ELIGIBLE" next to the topic below. }}


==Passing requirements==
==Passing requirements==
* Present the selected topic (20 min. presentation + 10 min. Q&A).
* Actively participate in the project communication with your topic advisor
** This accounts for 30% of your grade.
* Present the selected topic (15 min. presentation + 5 min. Q&A).
** In order to receive a presentation slot, the topic advisor needs to agree atleast two weeks before the presentation that the work done is sufficient, the student has submitted a first draft of the slides and has agreed on a Table of Content for the final report.  
** This accounts for 40% of your grade.
** This accounts for 40% of your grade.
** The grade is based on your presentation as well as your interaction level during the presentation sessions (Hint: Be attentive and ask questions)
* Write a report on the selected topic (12-15 pages) (LaTeX Template:[ftp://ftp.springer.de/pub/tex/latex/llncs/latex2e/llncs2e.zip]).
* Write a report on the selected topic (12-15 pages) (LaTeX Template:[ftp://ftp.springer.de/pub/tex/latex/llncs/latex2e/llncs2e.zip]).
** This accounts for 60% of your grade.
** This accounts for 30% of your grade.
* Please check the [[#Schedule]] and adhere to it.
* Please check the [[#Schedule]] and adhere to it.


==Schedule==
==Schedule==
* '''October 23rd, 16:00ct''': Informational meeting (+ intro to presenting and writing) '''([[Media:sitintro.pdf‎ | Introduction Slides]])'''
* '''April 16th, 16:00ct''': Informational meeting (+ intro to presenting and writing) [https://dl.dropboxusercontent.com/u/1652374/SIT/SIT-intro.pdf Introductory Slides (pdf)][https://dl.dropboxusercontent.com/u/1652374/SIT/SIT-intro.ppt Introductory Slides (ppt)]
* '''January 15th, 23:59 CET''': Deadline for registration in FlexNow/ITIS System
* '''July 8th, 23:59 CET''': Deadline for getting confirmation from topic advisor that you are eligible for the final presentations. 
* '''January 22nd, 29th''' : Presentations
* '''July 15th, 23:59 CET''': Deadline for registration in FlexNow/ITIS System  
* '''March 30, 2015, 23:59''': Deadline for submission of report
* '''August 17th, 2pm onwards''' : Presentations
* '''September 30, 2015, 23:59''': Deadline for submission of report


==Presentation Schedule==
==Presentation Schedule==
January 22nd
{| align="center" class="wikitable sortable" {{Prettytable}}
|-
|{{Hl2}} |'''Slot'''
|{{Hl2}} |'''Speaker'''
|{{Hl2}} |'''Topic'''
|-
| 14:00-14:30
| Giovanna Parra
| Advances in Networking towards The Internet of Things
|-
| 14:30-15:00
| Hari Raghavendar Rao Bandari
| Kaggle: a platform for making data science a sport
|-
| 15:00-15:30
| Burcu Coskun
| Utilising the wireless channel as a mathematical calculator - Summarising recent advances
|-
| 15:30-16:00
| Guryash Kaur Bahra
| On the recognition of emotion from Social media and sensor readings
|-
|
| Short Break
|
|-
| 16:00-16:30
| Liu Yimo
| Semantic Matching in Search
|-
| 16:30-17:00
| Siddhartha Gupta
| What is the future of SDN research? What are the main research problems of SDN?
|-
| 17:00-17:30
|
|
|-
| 17:30-18:00
|
|
|}


January 29th
== Topics ==
{| align="center" class="wikitable sortable" {{Prettytable}}
|-
|{{Hl2}} |'''Slot'''
|{{Hl2}} |'''Speaker'''
|{{Hl2}} |'''Topic'''
|-
| 14:00-14:30
| Karthik Sharma
| What is the future of SDN? What are the different products that exist and their properties and promising application scenarios?
|-
| 14:30-15:00
| Gurjinder Singh
| Use Skype to make emergency (112) calls: What are the challenges and means to solve this?
|-
| 15:00-15:30
| Pranay Tare
| Task cooperation or offloading in Mobile Device Cloud
|-
| 15:30-16:00
| Ramaninder Singh Jhajj
| Spark: the state of the art engine for big data processing
|-
|
| Short Break
|
|-
| 16:00-16:30
| Uche Oteh
| Technical, Economical and Ethical Issues with Net Neutrality -- or the Lack thereof
|-
| 16:30-17:00
| Fitria Nilamsari
| Understanding Modern Web Service Deployment in EC2 and Azure
|-
| 17:00-17:30
| Xi Wang
| Smart Q&A systems: what it is and how it works
|}


== Topics ==
{{Announcement|IMPORTANT: Please send a mail to Mayutan with the topic supervisor on CC and the topic that you would like to take}}


{| align="center" class="wikitable sortable" {{Prettytable}}  
{| align="center" class="wikitable sortable" {{Prettytable}}  
Line 128: Line 52:
|-
|-
|style="width: 70%;"|
|style="width: 70%;"|
'''The use of Delay Tolerant Networks in Real Life examples''' ''(Assigned to Pouya Saeedfar)''
Delay Tolerant Networks (DTN) are a particular family of networks characterized by high, unpredictable node mobility and consequently by the possible lack of a path between source and destination. To counterbalance the numerous drawbacks is the fact that these networks require little or no infrastructure and can act in a completely decentralized way. Many protocols have been proposed in the last 10 years. The student is required to present a general overview of DTN and in particular to investigate how DTN principles are used in hot researched fields, including Internet of Things (IoT), Vehicular Networks (VANETs), Emergency systems, Wireless Sensor Networks (WSN) and pervasive computing.
| [http://www.net.informatik.uni-goettingen.de/people/ Edo_Monticelli]
|
|-
|-
| '''Self adaptive systems'''
| '''What is the current status and future of SDN research? What are the main research problems of SDN? (assigned to Mahmoud Alzaitoun)'''
 
There is a lot of hype about SDN with industries, operators and Academia showing interest. The aim of this work is to study what research problems exist and also identify promising solutions. 
How to use several routing protocols, in a DTN, based on the external (encounters, position, message name, etc) or internal conditions (battery, buffer space, etc). Survey what has been done in DTN and other research areas.
| [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]
 
| [http://en.wikipedia.org/wiki/Software-defined_networking][http://arxiv.org/pdf/1406.0440v3.pdf]
| [http://www.net.informatik.uni-goettingen.de/people/ Edo_Monticelli]
|-
|
| ''' A survey of SDN standardization ''' 
There is a lot of hype about SDN with industries, operators and Academia showing interest. The aim of this work is to study the standardization efforts ongoing in SDN. 
| [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]
| [http://en.wikipedia.org/wiki/Software-defined_networking]
|-
|-
 
| ''' Can we use machine learning methods in SDN? '''   
|'''Understanding Modern Web Service Deployment in EC2 and Azure''' ''(Assigned to Fitria Nilamsari)''
The SDN technology is revolutionizing both the network research and industry. The idea that using machine learning methods in SDN has been under the exploitation by some companies and researchers. In this project, a survey of the work related to this idea is required.
   
| [http://www.net.informatik.uni-goettingen.de/people/narisu_tao Narisu Tao]
Today, web services are increasingly being deployed in infrastructure-as-a-service (IaaS) clouds such as Amazon EC2, Windows Azure, and Rackspace. Hence, it is critical to understand the usage patterns and identifies ways in which cloud tenants could better leverage IaaS clouds.
| [http://www.hpl.hp.com/people/jklee/com094-qazi2PSTS.pdf] , [https://www.sec.in.tum.de/assets/Uploads/MAVincentSommer.pdf], [http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6998241&url=http%3A%2F%2Fieeexplore.ieee.org%2Fiel7%2F6979384%2F6998226%2F06998241.pdf%3Farnumber%3D6998241]
| [http://www.net.informatik.uni-goettingen.de/people/ Yuan Zhang]
| [http://conferences.sigcomm.org/imc/2013/papers/imc097-heA.pdf][http://conferences2.sigcomm.org/imc/2014/papers/imc2014-longpaper146.pdf]
|-
|-
|'''Bandwidth Usage for Mobile Apps''' ''(Assigned to Martin Schwarzmaier)''
| ''' What is Scala? '''   
   
The functional programming paradigm is crucial for the coming Big Data challenge. Scala is a programming language which fits very well this paradigm. A brief introduction on the history, main ideas and industry adaptiveness of Scala are required.
Understanding the resource usage of mobile Apps is critical for developing novel recommendations and detailed best practice suggestions for mobile web content, browser, network protocol, and smartphone OS design.  
| [http://www.net.informatik.uni-goettingen.de/people/narisu_tao Narisu Tao]
| [http://www.net.informatik.uni-goettingen.de/people/ Yuan Zhang]
| [http://en.wikipedia.org/wiki/Scala_(programming_language)]
| [http://dl.acm.org/citation.cfm?id=2594372][http://dl.acm.org/citation.cfm?id=2594387]
|-
|-
|'''Efficient crowdsourcing for multi-class labeling'''  ''(Assigned to Berker Vardarsuyu)''
 
| '''A survey of publish/subscribe in ICN '''   
Crowdsourcing systems like Amazon's Mechanical Turk have emerged as an effective large-scale human-powered platform for performing tasks in domains such as image classification, data entry, recommendation, and proofreading. Since workers are low-paid (a few cents per task) and tasks performed are monotonous, the answers obtained are noisy and hence unreliable. To obtain reliable estimates, it is essential to utilize appropriate inference algorithms (e.g. Majority voting) coupled with structured redundancy through task assignment.  
The aim of this work is to study and compare the existing publish/subscribe communication support in different ICN solutions.
| [http://www.net.informatik.uni-goettingen.de/people/ Yuan Zhang]
| [http://www.net.informatik.uni-goettingen.de/people/jiachen_chen Jiachen Chen]
| [http://dspace.mit.edu/handle/1721.1/87044]
| [http://en.wikipedia.org/wiki/Information-centric_networking], [http://en.wikipedia.org/wiki/Publish%E2%80%93subscribe_pattern]
|-
|-
|'''Technical, Economical and Ethical Issues with Net Neutrality -- or the Lack thereof''' ''(Assigned to Uche Oteh)''
| '''Information-centric networks'''   
   
The study here will mainly focus on different Information-Centric Network (ICN) proposals and compare the difference among them.
Net neutrality refers to current state of the internet, where all data should be treated equally, without discrimination of specific flows or entities.
| [http://www.net.informatik.uni-goettingen.de/people/jiachen_chen Jiachen Chen]
However, this state has recently been questioned by several providers and government authorities.
| [http://en.wikipedia.org/wiki/Information-centric_networking]
In this topic, the reasons and motivations for and against net neutrality should be investigated,
with a focus on the technical implementations and outcomes of an Internet, where neutrality is no longer given.
| [http://user.informatik.uni-goettingen.de/~dkoll/ David Koll]
| [http://en.wikipedia.org/wiki/Net_neutrality]
|-
|-
|'''Advances in Networking towards The Internet of Things''' ''(Assigned to Giovanna Parra)''
| '''Routing in NDN''' 
NDN is one of the most recent information-centric network designs. The focus of the network has shifted from ''location'' (IP addresses) to the ''content'' (names of the contents).  
The idea of Internet of Things -- or IoT -- is to interconnect uniquely identifiable embedded computing devices within the existing Internet infrastructure [http://en.wikipedia.org/wiki/Internet_of_Things].
In IP, address spaces are divided into domains by some network management entities (ISPs) and the routing take advantage of this division.  
Over 25 billion of such devices are expected to be connected within the IoT by 2020.
But in NDN, content names no longer follow this rule. This complicates the routing in NDN.
The IETF has recently released a protocol suite to enable communication between the devices.
 
In this topic, the most recent advances towards the IoT should be investigated to obtain a clear overview of where both research and industry are currently standing and whether or not the 2020 estimation is still valid.
This study will focus on the different routing mechanisms and compare the pros and cons of each mechanism.
| [http://user.informatik.uni-goettingen.de/~dkoll/ David Koll]
 
| [http://en.wikipedia.org/wiki/Internet_of_Things][http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6704479][http://scholar.google.de/scholar?hl=de&q=internet+of+things+networking+survey&btnG=&lr=]
Students who have knowledge about routing preferred.
| [http://www.net.informatik.uni-goettingen.de/people/jie_li Jie Li]
| [http://en.wikipedia.org/wiki/Named_data_networking], [http://dl.acm.org/citation.cfm?id=2491231], [http://dl.acm.org/citation.cfm?id=2660141], [http://dl.acm.org/citation.cfm?id=2342498], [http://dl.acm.org/citation.cfm?id=2491232]
|-
|-
| '''Smart Q&A systems: what it is and how it works''' ''(Assigned to Xi Wang)''
| '''Caching in ICN'''
| [http://www.net.informatik.uni-goettingen.de/people/hong_huang/ Hong Huang]
As one of the most significant properties of ICN, in-network caching is excepted to improve network performance.
|[TBA]
In this topic, the student need to give a survey on the status quo of caching in ICN.
| [http://www.net.informatik.uni-goettingen.de/people/jie_li Jie Li]
| [http://dl.acm.org/citation.cfm?id=2342501], [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6957152&tag=1],[http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6883812], [http://dl.acm.org/citation.cfm?id=2643105]
|-
|-
| '''Semantic Matching in Search''' ''(Assigned to Yimo Liu)''
| '''What is deep learning and its applications?''' ''( Assigned to Alexander Warnecke)'' "ELIGIBLE"
Relevance is the most important factor to assure users’ satisfaction in search and the success of a search engine heavily depends on its performance on relevance. It has been observed that most of the dissatisfaction cases in relevance are due to term mismatch between queries and documents (e.g., query “ny times” does not match well with a document only containing “New York Times”), because term matching, i.e., the bag-of-words approach, still functions as the main mechanism of modern search engines.  
The study is to have a basic knowledge of deep learning and learn to use some tools to implement some deep learning algorithms.  
| [http://www.net.informatik.uni-goettingen.de/people/hong_huang/ Hong Huang]
| [http://www.net.informatik.uni-goettingen.de/people/hong_huang Hong Huang]
|[http://www.hangli-hl.com/uploads/3/1/6/8/3168008/ml_for_match-step2.pdf]
| TBA
|-
|-
| '''Use Skype to make emergency (112) calls: What are the challenges and means to solve this?'''  '' Assigned to Guri Singh''
| '''Tensor methods for machine learning'''  ''( Assigned to Burcu Coskun)'' "ELIGIBLE"
 
Tensor methods for machine learning are fast, accurate, and scalable, but we'll need well-developed libraries. In this work, we will try to understand tensor based methods.  
Currently, emergency service providers are not equiped to handle VoIP calls and receive voice/video/text messages. There has been quite some work done in this area and the aim of this study is to get a clear picture of how long will it be before we can make VoIP based emergency calls and what are the challenges.  
| [http://www.net.informatik.uni-goettingen.de/people/hong_huang Hong Huang]
| [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]
| [http://www.cs.cornell.edu/CV/TenWork/FinalReport.pdf][http://arxiv.org/abs/1309.0787][http://opt-ml.org/papers/opt2014_submission_15.pdf][http://arxiv.org/abs/1406.4566]
| [http://www.eena.org/uploads/gallery/files/pdf/eena_ng112_longtermdefinition.pdf]
|-
|-
| '''What is the future of SDN? What are the different products that exist and their properties and promising application scenarios? ''' '' Assigned to Karthik Sharma ''
| '''Applying Machine Learning to Computer Networks''' ''( Assigned to Omar Shaya)'' "ELIGIBLE"
There is a lot of hype about SDN with industries, operators and Academia showing interest. The aim of this work is to study what products exist and also identify promising application scenarios. 
Machine Learning is one of the big topics in computer science today. However, it has rarely been applied to computer networking.  
| [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]
In this topic, we will investigate one of the few applications thought of so far to answer one question:
| [http://en.wikipedia.org/wiki/Software-defined_networking]
Can and should we apply machine learning to detect attacks in networks?
| [http://user.informatik.uni-goettingen.de/~dkoll David Koll]
| [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6524462]
|-
|-
| '''What is the future of SDN research? What are the main research problems of SDN? ''' '' Assigned to Siddhartha Gupta ''
| '''Controllers in Software-defined Networks - A Survey''' ''(Assigned to Pouya Saeedfar)''
There is a lot of hype about SDN with industries, operators and Academia showing interest. The aim of this work is to study what research problems exist and also identify promising solutions.
SDN introduces the concept of a logically centralized controller in charge of operating the network, while routers and switches are reduced to simple forwarding elements.
| [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]
In this topic, the student will provide a survey over the state-of-the-art in SDN controllers.  
| [http://en.wikipedia.org/wiki/Software-defined_networking]
| [http://user.informatik.uni-goettingen.de/~dkoll David Koll]
| [https://www.sdxcentral.com/resources/sdn/sdn-controllers/][http://www.cs.yale.edu/homes/jf/nox.pdf]
|-
|-
|'''Task cooperation or offloading in Mobile Device Cloud''' ''(Assigned to Tare Pranay)''
| '''What Will 5G Be? - A Survey'''
 
This study is to provide a comprehensive survey on the key enabling communication technologies for 5G networks.
With the explosion of personal mobile devices, computation offloading or task cooperation through opportunistic networks of nearby
| [http://www.net.informatik.uni-goettingen.de/people/xu_chen Xu Chen]
devices is increasingly gaining attainions, to support sophisticated mobile applications with limited resources (e.g., processing ability, energy and even user knowledge).
| [http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6824752]
Such service model is called a mobile device cloud. In this topic, we aim to investigate the state-of-art research literature, and identify the key problem challenges and holistic technical roadmap.  
| [http://www.net.informatik.uni-goettingen.de/people/lingjun_pu Lingjun Pu]
| [http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6753815] [http://www.ece.ncsu.edu/netwis/papers/14LW-Info.pdf]
|-
|-
|'''Put Cloudlet Concept into Reality''' ''(Assigned to Dieter Lechler)''
| '''What Will Smart Grid Be? – A Survey''' ''(assigned to Kirill Bulert)''
 
The Smart Grid, regarded as the next generation power grid, uses two-way flows of electricity and information to create a widely distributed automated energy delivery network. This study is to provide a comprehensive survey on the key enabling technologies and services for Smart Grid.
Nowadays, smartphones, handheld devices, and wearable computing devices are part of the third group of cloud-based resources
| [http://www.net.informatik.uni-goettingen.de/people/xu_chen Xu Chen]
which is proximate mobile computing entities. Cloudlet concept combining surrounding computing resources is proposed to facilitate mobile device service.
| [http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6099519]
In this topic, students are required to investigate how to design and leverage Cloudlet into real system.
| [http://www.net.informatik.uni-goettingen.de/people/lingjun_pu Lingjun Pu]
| [http://users.atlantis.ugent.be/psimoens/2013_MobiSys_ScalableCrowdSourcingOfVideoFromMobileDevices.pdf] [http://elijah.cs.cmu.edu/DOCS/ha-mobisys2014.pdf]
|-
|-
|'''On the recognition of emotion from Social media and sensor readings''' ''(Assigned to Guryash Bahra)''
|'''On the recognition of emotion from Social media and sensor readings''' ''(assigned to Amine Lasfar)''


Recently, there are multiple efforts to extend the capabilities of data analysis tools e.g. for social media or wearable systems towards the recognition of sentiment - human emotions and internal states.  
Recently, there are multiple efforts to extend the capabilities of data analysis tools e.g. for social media or wearable systems towards the recognition of sentiment - human emotions and internal states.  
Examples are studies on emotion contagion on facebook, or the introduction of wearable technology capable to capture sentiment like prominently glasses or watches.  
Examples are studies on emotion contagion on facebook, or the introduction of wearable technology capable to capture sentiment like prominently glasses or watches.  
The student shall give a structured overview on recent advances in this field.
The student shall give a structured overview on recent advances in this field.
(Note: An independent literature survey is expected. It is NOT sufficient to just read and summarise the literature provided.)
| [http://www.net.informatik.uni-goettingen.de/people/stephan_sigg Stephan Sigg]
| [http://www.net.informatik.uni-goettingen.de/people/stephan_sigg Stephan Sigg]
| [http://www.pnas.org/content/111/24/8788.full] [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6468032] [https://www.jins-jp.com/jinsmeme/en/] [http://www.apple.com/watch/]
| [http://www.pnas.org/content/111/24/8788.full] [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6468032] [https://www.jins-jp.com/jinsmeme/en/] [http://www.apple.com/watch/]
|-
|-
|'''Utilising the wireless channel as a mathematical calculator - Summarising recent advances''' ''(assigned to Burcu Coskun)''
|'''Utilising the wireless channel as a mathematical calculator - A comprehensive technical dicussion'''  


This topic focuses recent research efforts towards the calculation of mathematical functions on the wireless channel.  
This topic focuses recent research efforts towards the calculation of mathematical functions on the wireless channel.  
The student shall give a structured overview on recent advances in this field.
The student shall give a comprehensive and technical introduction of different approaches and recent advances in this field.
(Note: An independent literature survey is expected. It is NOT sufficient to just read and summarise the literature provided.)
| [http://www.net.informatik.uni-goettingen.de/people/stephan_sigg Stephan Sigg]
| [http://www.net.informatik.uni-goettingen.de/people/stephan_sigg Stephan Sigg]
| [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6751603] [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6402311]
| [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6751603] [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6402311]
|-
|-
|'''Spark: the state of the art engine for big data processing ''' ''(Assigned to Ramaninder Singh Jhajj)''


Due to the increasing popularity of multi-core CPU and computer cluster, many ideas, techniques and software on leveraging this new computing platform have been developed in recent few years. Since this is a huge area, in this topic, students are only required to investigate a few specific ideas and techniques, such as MapReduce, Hadoop and Spark. We hope that students can understand and teach the audience the basic ideas and get hands dirty on some big data processing tools.  
|''' Virtual Machine and Data Migration in Cloud computing'''
| [http://www.net.informatik.uni-goettingen.de/people/narisu_tao Narisu Tao]
 
| [http://static.googleusercontent.com/media/research.google.com/en//archive/mapreduce-osdi04.pdf][https://spark.apache.org/] [https://www.youtube.com/watch?v=e-Ys-2uVxM0&list=PL-x35fyliRwiST9gF7Z8Nu3LgJDFRuwfr]
This topic requires to study and compare the state-of-the-art techniques employed in Virtual machine and data migration in Cloud Computing systems. Then try to propose new mechanisms and optimisations for carrying out the migration efficiently.
 
| [http://www.net.informatik.uni-goettingen.de/people/sameer_kulkarni Sameer Kulkarni]
| [http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6558130] [http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6969026]
|-
|'''Survey of Network and Application Load balancing techniques ''' ''(Assigned to Benjamin Baum)'' "ELIGIBLE"
 
The work here is to study and compare the state-of-the-art techniques employed in Network and Server Load balancing techniques. Identify different network layer (L2 to L7) load balancing techniques and mechanisms followed in the inter and intra data centres and Clouds.
 
| [http://www.net.informatik.uni-goettingen.de/people/sameer_kulkarni Sameer Kulkarni]
| [http://dl.acm.org/ft_gateway.cfm?id=2486026&ftid=1388630&dwn=1&CFID=652100403&CFTOKEN=19617420] [http://research.microsoft.com/pubs/220640/sigcomm14-duet-final.pdf] [http://yuba.stanford.edu/~nikhilh/pubs/handigol-gec9.pdf]
|-
|'''Compressive sensing -- An introduction and overview'''
Compressive sensing is a method to reconstruct a sparse signal, by solving underdetermined linear equations.
In the scope of this topic, a comprehensive introduction and overview is given on compressive sensing, applications and recent developments.
(Note: An independent literature survey is expected. It is NOT sufficient to just read and summarise the literature provided.)
| [http://www.net.informatik.uni-goettingen.de/people/stephan_sigg Stephan Sigg]
|
|-
|
'''Random Matrix Theory for signal processing '''
 
Random matrix theory has numerous applications in physics, statistics and engineering.
Although initially motivated by practical experimental problems, random matrices are now used in very diverse fields including physics, mathematics, but also neural networks, information theory and signal processing.
The student will recapitulate the basic concepts of random matrix theory and summarise recent advances in this field with relation to signal processing, in particular in communications.
 
| [http://www.stephansigg.de Stephan Sigg]
|For general introduction:
*[http://books.google.de/books/about/Random_Matrix_Methods_for_Wireless_Commu.html?id=_j7pT9HjKAUC&redir_esc=y]
 
|-
|-
|'''Kaggle: a platform for making data science a sport''' ''(Assigned to Hari Raghavendar Rao Bandari)''


Kaggle is a website where companies and researchers post their data and prediction problems and data scientists from all over the world compete to produce the best models. The student taking this topic will answer the following questions: what is data scientist? What kinds of skills are owned by data scientist? How do Kaggle competitions work? We hope that the student can not only answer above high level questions, but can tell us some personal experience by engaging one of these competition.
| [http://www.net.informatik.uni-goettingen.de/people/narisu_tao Narisu Tao]
| [http://en.wikipedia.org/wiki/Kaggle][https://www.youtube.com/watch?v=8w4UY66GKcM] [https://www.kaggle.com/]
|}
|}


Line 250: Line 191:


=== 1. Select a topic ===
=== 1. Select a topic ===
A student picks a topic to work on. You can pick up a topic and start working '''at any time'''. However, make sure to notify [http://user.informatik.uni-goettingen.de/~dkoll David] and the advisor of the topic before starting to work.
A student picks a topic to work on. You can pick up a topic and start working '''at any time'''. However, make sure to notify Mayutan and the advisor of the topic before starting to work.


=== 2. Get your work advised ===
=== 2. Get your work advised ===
Line 266: Line 207:


* Present your topic to the audience (in English).
* Present your topic to the audience (in English).
* 20 minutes of presentation followed by 10 minutes discussion.
* 15 minutes of presentation followed by 5-10 minutes discussion.


You present your topic to an audience of students and other interested people (usually the [http://www.net.informatik.uni-goettingen.de/ NET] group members). Your presentation should give the audience a general idea of the topic and highlight interesting problems and solutions. You have 20 minutes to present your topic followed by 10 minutes of discussion. You must keep it within the time limit. Please send your slides to your topic advisor for any possible feedback before your presentation.
You present your topic to an audience of students and other interested people (usually the [http://www.net.informatik.uni-goettingen.de/ NET] group members). Your presentation should give the audience a general idea of the topic and highlight interesting problems and solutions. You have 15 minutes to present your topic followed by 10 minutes of discussion. You must keep it within the time limit. Please send your slides to your topic advisor for any possible feedback before your presentation.


Hints for preparing the presentation:
Hints for preparing the presentation:
* 20 minutes are too short to present a topic fully.
* 15 minutes are too short to present a topic fully.
* It is alright to focus just on one certain important aspect.
* It is alright to focus just on one certain important aspect.
* Limit the introduction of basics (5 min.).
* Limit the introduction of basics (5 min.).
Line 277: Line 218:


Suggestions for preparing the slides:
Suggestions for preparing the slides:
* No more than 20 pages/slides.
* No more than 15 pages/slides.
* Get your audiences to quickly understand the general idea.
* Get your audiences to quickly understand the general idea.
* Figures, tables and animations are better than sentences.
* Figures, tables and animations are better than sentences.

Latest revision as of 17:36, 28 July 2015

Imbox content.png IMPORTANT: The final presentations are schedlued for August 17th, Monday from 2pm onwards.

Details

Workload/ECTS Credits: 5 ECTS (BSc/MSc AI); 5 (ITIS)
Module: M.Inf.1124 -or- B.Inf.1207/1208; ITIS Module 3.16: Selected Topics in Internet Technologies
Lecturer: Dr. Mayutan Arumaithurai
Teaching assistant: None
Time: April 16th (Thursday), 16:00ct: Introduction Meeting
Place: IFI Building, Room 3.101
UniVZ [1]


Course description

This course covers selected topics on the up-to-date Internet technologies and research. Each student takes a topic, does a presentation and writes a report on it. Besides the introduction meeting on April 16th, there are no regular meetings, lectures or classes for this course. The students have to keep in constant touch with their topic advisor in order to prepare for the final presentation. The purpose of this course is to familiarize the students with new technologies, enable independent study of a specific topic, and train presentation and writing skills.

The informational meeting at the beginning of the course will cover some guidelines on scientific presenting and writing.


Imbox content.png NOTE: Presentation slots have been allocated to those students whose topic advisor informed me that the student has done sufficient ground work and has submitted a first draft of the presentation two weeks before the final presentations. I have marked "ELIGIBLE" next to the topic below.

Passing requirements

  • Actively participate in the project communication with your topic advisor
    • This accounts for 30% of your grade.
  • Present the selected topic (15 min. presentation + 5 min. Q&A).
    • In order to receive a presentation slot, the topic advisor needs to agree atleast two weeks before the presentation that the work done is sufficient, the student has submitted a first draft of the slides and has agreed on a Table of Content for the final report.
    • This accounts for 40% of your grade.
    • The grade is based on your presentation as well as your interaction level during the presentation sessions (Hint: Be attentive and ask questions)
  • Write a report on the selected topic (12-15 pages) (LaTeX Template:[2]).
    • This accounts for 30% of your grade.
  • Please check the #Schedule and adhere to it.

Schedule

  • April 16th, 16:00ct: Informational meeting (+ intro to presenting and writing) Introductory Slides (pdf)Introductory Slides (ppt)
  • July 8th, 23:59 CET: Deadline for getting confirmation from topic advisor that you are eligible for the final presentations.
  • July 15th, 23:59 CET: Deadline for registration in FlexNow/ITIS System
  • August 17th, 2pm onwards : Presentations
  • September 30, 2015, 23:59: Deadline for submission of report

Presentation Schedule

Topics

Imbox content.png IMPORTANT: Please send a mail to Mayutan with the topic supervisor on CC and the topic that you would like to take
Topic Topic Advisor Initial Readings
What is the current status and future of SDN research? What are the main research problems of SDN? (assigned to Mahmoud Alzaitoun)

There is a lot of hype about SDN with industries, operators and Academia showing interest. The aim of this work is to study what research problems exist and also identify promising solutions.

Mayutan Arumaithurai [3][4]
A survey of SDN standardization

There is a lot of hype about SDN with industries, operators and Academia showing interest. The aim of this work is to study the standardization efforts ongoing in SDN.

Mayutan Arumaithurai [5]
Can we use machine learning methods in SDN?

The SDN technology is revolutionizing both the network research and industry. The idea that using machine learning methods in SDN has been under the exploitation by some companies and researchers. In this project, a survey of the work related to this idea is required.

Narisu Tao [6] , [7], [8]
What is Scala?

The functional programming paradigm is crucial for the coming Big Data challenge. Scala is a programming language which fits very well this paradigm. A brief introduction on the history, main ideas and industry adaptiveness of Scala are required.

Narisu Tao [9]
A survey of publish/subscribe in ICN

The aim of this work is to study and compare the existing publish/subscribe communication support in different ICN solutions.

Jiachen Chen [10], [11]
Information-centric networks

The study here will mainly focus on different Information-Centric Network (ICN) proposals and compare the difference among them.

Jiachen Chen [12]
Routing in NDN

NDN is one of the most recent information-centric network designs. The focus of the network has shifted from location (IP addresses) to the content (names of the contents). In IP, address spaces are divided into domains by some network management entities (ISPs) and the routing take advantage of this division. But in NDN, content names no longer follow this rule. This complicates the routing in NDN.

This study will focus on the different routing mechanisms and compare the pros and cons of each mechanism.

Students who have knowledge about routing preferred.

Jie Li [13], [14], [15], [16], [17]
Caching in ICN

As one of the most significant properties of ICN, in-network caching is excepted to improve network performance. In this topic, the student need to give a survey on the status quo of caching in ICN.

Jie Li [18], [19],[20], [21]
What is deep learning and its applications? ( Assigned to Alexander Warnecke) "ELIGIBLE"

The study is to have a basic knowledge of deep learning and learn to use some tools to implement some deep learning algorithms.

Hong Huang TBA
Tensor methods for machine learning ( Assigned to Burcu Coskun) "ELIGIBLE"

Tensor methods for machine learning are fast, accurate, and scalable, but we'll need well-developed libraries. In this work, we will try to understand tensor based methods.

Hong Huang [22][23][24][25]
Applying Machine Learning to Computer Networks ( Assigned to Omar Shaya) "ELIGIBLE"

Machine Learning is one of the big topics in computer science today. However, it has rarely been applied to computer networking. In this topic, we will investigate one of the few applications thought of so far to answer one question: Can and should we apply machine learning to detect attacks in networks?

David Koll [26]
Controllers in Software-defined Networks - A Survey (Assigned to Pouya Saeedfar)

SDN introduces the concept of a logically centralized controller in charge of operating the network, while routers and switches are reduced to simple forwarding elements. In this topic, the student will provide a survey over the state-of-the-art in SDN controllers.

David Koll [27][28]
What Will 5G Be? - A Survey

This study is to provide a comprehensive survey on the key enabling communication technologies for 5G networks.

Xu Chen [29]
What Will Smart Grid Be? – A Survey (assigned to Kirill Bulert)

The Smart Grid, regarded as the next generation power grid, uses two-way flows of electricity and information to create a widely distributed automated energy delivery network. This study is to provide a comprehensive survey on the key enabling technologies and services for Smart Grid.

Xu Chen [30]
On the recognition of emotion from Social media and sensor readings (assigned to Amine Lasfar)

Recently, there are multiple efforts to extend the capabilities of data analysis tools e.g. for social media or wearable systems towards the recognition of sentiment - human emotions and internal states. Examples are studies on emotion contagion on facebook, or the introduction of wearable technology capable to capture sentiment like prominently glasses or watches. The student shall give a structured overview on recent advances in this field. (Note: An independent literature survey is expected. It is NOT sufficient to just read and summarise the literature provided.)

Stephan Sigg [31] [32] [33] [34]
Utilising the wireless channel as a mathematical calculator - A comprehensive technical dicussion

This topic focuses recent research efforts towards the calculation of mathematical functions on the wireless channel. The student shall give a comprehensive and technical introduction of different approaches and recent advances in this field. (Note: An independent literature survey is expected. It is NOT sufficient to just read and summarise the literature provided.)

Stephan Sigg [35] [36]
Virtual Machine and Data Migration in Cloud computing

This topic requires to study and compare the state-of-the-art techniques employed in Virtual machine and data migration in Cloud Computing systems. Then try to propose new mechanisms and optimisations for carrying out the migration efficiently.

Sameer Kulkarni [37] [38]
Survey of Network and Application Load balancing techniques (Assigned to Benjamin Baum) "ELIGIBLE"

The work here is to study and compare the state-of-the-art techniques employed in Network and Server Load balancing techniques. Identify different network layer (L2 to L7) load balancing techniques and mechanisms followed in the inter and intra data centres and Clouds.

Sameer Kulkarni [39] [40] [41]
Compressive sensing -- An introduction and overview

Compressive sensing is a method to reconstruct a sparse signal, by solving underdetermined linear equations. In the scope of this topic, a comprehensive introduction and overview is given on compressive sensing, applications and recent developments. (Note: An independent literature survey is expected. It is NOT sufficient to just read and summarise the literature provided.)

Stephan Sigg

Random Matrix Theory for signal processing

Random matrix theory has numerous applications in physics, statistics and engineering. Although initially motivated by practical experimental problems, random matrices are now used in very diverse fields including physics, mathematics, but also neural networks, information theory and signal processing. The student will recapitulate the basic concepts of random matrix theory and summarise recent advances in this field with relation to signal processing, in particular in communications.

Stephan Sigg For general introduction:

Workflow

1. Select a topic

A student picks a topic to work on. You can pick up a topic and start working at any time. However, make sure to notify Mayutan and the advisor of the topic before starting to work.

2. Get your work advised

For each topic, a topic advisor is available. He is your contact person for questions and problems regarding the topic. He supports you as much as you want, so please do not hesitate to approach him for any advice or with any questions you might have. It is recommended (and not mandatory) that you schedule a face-to-face meeting with him right after you select your topic.

3. Approach your topic

  • By choosing a topic, you choose the direction of elaboration.
  • You may work in different styles, for example:
    • Survey: Basic introduction, overview of the field; general problems, methods, approaches.
    • Specific problem: Detailed introduction, details about the problem and the solution.
  • You should include your own thoughts on your topic.

4. Prepare your presentation

  • Present your topic to the audience (in English).
  • 15 minutes of presentation followed by 5-10 minutes discussion.

You present your topic to an audience of students and other interested people (usually the NET group members). Your presentation should give the audience a general idea of the topic and highlight interesting problems and solutions. You have 15 minutes to present your topic followed by 10 minutes of discussion. You must keep it within the time limit. Please send your slides to your topic advisor for any possible feedback before your presentation.

Hints for preparing the presentation:

  • 15 minutes are too short to present a topic fully.
  • It is alright to focus just on one certain important aspect.
  • Limit the introduction of basics (5 min.).
  • Make sure to finish in time.

Suggestions for preparing the slides:

  • No more than 15 pages/slides.
  • Get your audiences to quickly understand the general idea.
  • Figures, tables and animations are better than sentences.
  • Summary of the topic: thinking in your own words.

5. Write your report

  • Present the problem with its background.
  • Detail the approaches, techniques, methods to handle the problem.
  • Evaluate and assess those approaches (e.g., pros and cons).
  • Give a short outlook on potential future developments.

The report must be written in English according to common guidelines for scientific papers, between 12 and 15 pages of content (excluding the table of content, bibliography, etc.).

6. Course schedule

There are no regular meetings, lectures or classes for this course. The work is expected to be done by yourself with the assistance of your topic advisor. Please follow the #Schedule to take appropriate actions.