Theses and Projects: Difference between revisions

From NET Wiki
Jump to navigation Jump to search
Line 46: Line 46:
* [[Privacy protection in social network applications]] (B/M/P) ([http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu])
* [[Privacy protection in social network applications]] (B/M/P) ([http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu])
* [[Mobile effects in online social networks]] (B/M/P) ([http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu])
* [[Mobile effects in online social networks]] (B/M/P) ([http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu])
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll] or Dr. [http://www.net.informatik.uni-goettingen.de/people/wenzhong_li Wenzhong Li][http://www.net.informatik.uni-goettingen.de/people/hong_huang Hong Huang]
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll] or Dr. [http://www.net.informatik.uni-goettingen.de/people/wenzhong_li Wenzhong Li] or [http://www.net.informatik.uni-goettingen.de/people/hong_huang Hong Huang]


=== Device-free recognition from RF-signals ===
=== Device-free recognition from RF-signals ===

Revision as of 15:57, 7 March 2014

Open Theses and Student Project Topics

The Computer Networks Group is always looking for motivated students to work on various topics. If you are interested in any of the projects below, or if you have other ideas and are willing to work with us, please don't hesitate to contact us.

  • (B) Bachelor thesis
  • (M) Master thesis
  • (P) Student project


Future Internet architecture

Data Crawling and analysis

Mobile Networking

  • if you are interested in other topics in this area please get in contact with Yuan Zhang-->

Social Networking

Device-free recognition from RF-signals

Context-based security for mobile devices

Mathematical calculations using superimpositions on the RF-channel

Mobile, Pervasive and Ubiquitous Computing

Ongoing Topics

Social Network Architectures

  • Securing Decentralized OSNs against the Man-in-the-Middle-Attack (M)
  • Supervised by David Koll
  • Implementation and Deployment of a Measurement Prototype for Decentralized OSNs (P)
  • Supervised by David Koll

Social Network Analysis

Completed Topics