Seminar on Internet Technologies (Summer 2012): Difference between revisions

Jump to navigation Jump to search
Line 65: Line 65:
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]
| [http://conferences.sigcomm.org/sigcomm/2011/papers/sigcomm/p62.pdf] [http://www.cse.iitb.ac.in/~puru/courses/spring11/cs620/references/costofcloud.pdf] [http://ccr.sigcomm.org/online/files/p51.pdf]
| [http://conferences.sigcomm.org/sigcomm/2011/papers/sigcomm/p62.pdf] [http://www.cse.iitb.ac.in/~puru/courses/spring11/cs620/references/costofcloud.pdf] [http://ccr.sigcomm.org/online/files/p51.pdf]
|-
| <strike>Advances and Challenges in Trust and Recommendation Systems</strike> (assigned to Omar Shaya)
| (To Be Available)
|
|-
|-
| <strike>Security in Near Field Communication (NFC)</strike> (assigned to Georg Jahn)
| <strike>Security in Near Field Communication (NFC)</strike> (assigned to Georg Jahn)