Theses and Projects: Difference between revisions
Jump to navigation
Jump to search
Line 57: | Line 57: | ||
* [[Securing Phoenix Network Coordinate System]] (M/P) | * [[Securing Phoenix Network Coordinate System]] (M/P) | ||
* [[Information diffusion in social networks: community based or location based]] (M/P) | * [[Information diffusion in social networks: community based or location based]] (M/P) | ||
* GEMSTONE goes Mobile (B) | * GEMSTONE goes Mobile (B) | ||
* Transitioning of Social Graphs between Multiple Online Social Networks (B) | * Transitioning of Social Graphs between Multiple Online Social Networks (B) | ||
</noinclude> | </noinclude> |
Revision as of 14:23, 10 July 2013
Open Theses and Student Project Topics
The Computer Networks Group is always looking for motivated students to work on various topics. If you are interested in any of the projects below, or if you have other ideas and are willing to work with us, please don't hesitate to contact us.
- (B) Bachelor thesis
- (M) Master thesis
- (P) Student project
Mobile Networking
- if you are interested in other topics in this area please get in contact with Yuan Zhang-->
Cloud Computing and Distributed Systems
- If you are interested in doing projects in this field, please contact Lei Jiao directly.
Social Networking
- Gemstone: Decentralizing Social Networks (B/M/P)
- Understanding the information propagation process in social networks (B/M/P)
- Privacy protection in social network applications (Konglin Zhu)
- if you are interested in other topics in this area please get in contact with David Koll or Dr. Wenzhong Li
Ongoing Topics
Social Network Architectures
- Securing Decentralized OSNs against the Man-in-the-Middle-Attack (M)
- Supervised by David Koll
Social Network Analysis
- Social Influence Maximization Problem (M)
- Exploring Friendship and Mobility in Location-Based Social Networks (M)
- Exploring Academic-Social Influence based on Citation and Collaboration Network Analysis (M)
- Supervised by Dr. Wenzhong Li
Network Security
- Prevention and Mitigation of (Distributed) Denial of Service Attacks in Enterprise Environments (B)
- Supervised by David Koll
Completed Topics
- Implementation and Evaluation of Decentralized Online Social Networking System (P)
- For a full list of older topics please go here.
- Implementation of a Routing and Forwarding Scheme for Coordinated Wide Area Mobility (B/M/P)
- Evaluation of the Routing Performance of various Mobility Solutions (B/M/P)
- Design and implementation of a socio-aware layer for mobile phones
- Network Friendly TCP for P2P and other low priority traffic
- Securing Phoenix Network Coordinate System (M/P)
- Information diffusion in social networks: community based or location based (M/P)
- GEMSTONE goes Mobile (B)
- Transitioning of Social Graphs between Multiple Online Social Networks (B)