Seminar on Internet Technologies (Winter 2010/2011): Difference between revisions

 
(20 intermediate revisions by 4 users not shown)
Line 9: Line 9:
}}
}}


 
{{Announcement|'''Don't forget to register with FlexNow!''' The final FlexNow registration deadline is 7 January 2011.}}
{{Announcement|Please register your topic with the corresponding topic supervisor and '''your preferred date for the presentation''' as soon as possible. We will cancel the presentations on 16 December 2010 if not at least two students register for this date before 30 November 2010.}}
{{Announcement|Please register your topic with the corresponding topic supervisor and '''your preferred date for the presentation''' as soon as possible. We will cancel the presentations on 16 December 2010 if not at least two students register for this date before 30 November 2010.}}
{{Announcement|You can participate in the seminar even if you were not present at the informational meeting (please contact [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann] for future information).}}
{{Announcement|You can participate in the seminar even if you were not present at the informational meeting (please contact [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann] for future information).}}
Line 29: Line 29:
==Schedule==
==Schedule==
* Thursday, '''4 November 2010, 16.15 - 17.00''': First general meeting. Introduction to the course and open questions.
* Thursday, '''4 November 2010, 16.15 - 17.00''': First general meeting. Introduction to the course and open questions.
* Thursday, '''16 December 2010, 15.00 - 18.00''': Presentations (pending)
* CANCELED - Thursday, '''6 January 2011, 15.00 - 18.00''': Presentations
** Topic TBA
** CANCELED!
** Topic TBA
** <strike>Automated Security Protocol Analysis (AVANTSSAR)</strike> <span style="color:#B22222">(canceled)</span>
** Topic TBA
* Thursday, '''13 January 2011, 15.00 - 18.00''': Presentations
** Topic TBA
** Scalable Server Selection for Cloud Services
* Thursday, '''6 January 2011, 15.00 - 18.00''': Presentations (pending)
** Modern Authentication Systems on the example of MS Geneva
** Topic TBA
** Topic TBA
** Topic TBA
* Thursday, '''13 January 2011, 15.00 - 18.00''': Presentations (pending)
** Cloud Computing I
** Matrix Factorization Model based Network Coordinate System
** Matrix Factorization Model based Network Coordinate System
** Distributed Hash Tables - Usage, properties and future development
** A conceptual overview of mobile platforms
** Topic TBA
** Android programming: Concepts and limitations
* Thursday, '''20 January 2011, 15.00 - 18.00''': Presentations
** Mobile and Wireless Peer-to-Peer Systems
** Fighting Spam in Social Networking Sites
** Modern Authentication Systems on the example of MS Geneva <span style="color:#B22222">(shifted from 6th of January)</span>
** Distributed Hash Tables - Usage, properties and future development <span style="color:#B22222">(shifted from 6th of January)</span>


== Topics ==
== Topics ==
Line 79: Line 77:
| [http://msdn.microsoft.com/de-de/magazine/dd278426.aspx]
| [http://msdn.microsoft.com/de-de/magazine/dd278426.aspx]
|-
|-
| Automated Security Protocol Analysis (choose an example from CasperFDR, Isabelle, Avispa)
| <strike>Automated Security Protocol Analysis (choose an example from CasperFDR, Isabelle, Avispa)</strike>
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]
| [http://avispa-project.org/]
| [http://avispa-project.org/]
Line 99: Line 97:
| [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.75.9303&rep=rep1&type=pdf] [http://portal.acm.org/ft_gateway.cfm?id=1378626&type=pdf&coll=GUIDE&dl=GUIDE&CFID=108242768&CFTOKEN=61684608] [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.83.5797&rep=rep1&type=pdf]
| [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.75.9303&rep=rep1&type=pdf] [http://portal.acm.org/ft_gateway.cfm?id=1378626&type=pdf&coll=GUIDE&dl=GUIDE&CFID=108242768&CFTOKEN=61684608] [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.83.5797&rep=rep1&type=pdf]
|-
|-
| Fighting Spam in Social Networking Sites
| <strike>Fighting Spam in Social Networking Sites</strike>
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]
| [http://www.computer.org/portal/web/csdl/doi/10.1109/MIC.2007.125]
| [http://www.computer.org/portal/web/csdl/doi/10.1109/MIC.2007.125]
Line 111: Line 109:
| [http://cs.nju.edu.cn/dislab/xuty/readinglist/econ_tax.pdf] [http://www.cs.ust.hk/mjg_lib/Library/0310039.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/econ_wu.pdf]
| [http://cs.nju.edu.cn/dislab/xuty/readinglist/econ_tax.pdf] [http://www.cs.ust.hk/mjg_lib/Library/0310039.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/econ_wu.pdf]
|-
|-
| Mobile and Wireless Peer-to-Peer Systems
| <strike>Mobile and Wireless Peer-to-Peer Systems</strike>
| [http://cs.nju.edu.cn/dislab/xuty/xuty.html Tianyin Xu]
| [http://cs.nju.edu.cn/dislab/xuty/xuty.html Tianyin Xu]
| [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_p2p.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_jsac.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_jsac.pdf]
| [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_p2p.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_jsac.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_jsac.pdf]
|-
|-
| <strike>Cloud Computing</strike>
| <strike>Scalable Server Selection for Cloud Services</strike>
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]
| [http://portal.acm.org/citation.cfm?id=1721672] [http://ccr.sigcomm.org/online/?q=node/654] [http://www.cs.rice.edu/~gw4314/papers/infocom10.pdf] [http://aws.amazon.com/ec2/]
| [http://portal.acm.org/citation.cfm?id=1721672] [http://ccr.sigcomm.org/online/?q=node/654] [ftp://ftp.cs.princeton.edu/techreports/2009/868.pdf]
|}
|}