Seminar on Internet Technologies (Summer 2015): Difference between revisions

Jump to navigation Jump to search
Line 88: Line 88:
| [http://www.net.informatik.uni-goettingen.de/people/hong_huang Hong Huang]
| [http://www.net.informatik.uni-goettingen.de/people/hong_huang Hong Huang]
| [http://www.cs.cornell.edu/CV/TenWork/FinalReport.pdf][http://arxiv.org/abs/1309.0787][http://opt-ml.org/papers/opt2014_submission_15.pdf][http://arxiv.org/abs/1406.4566]
| [http://www.cs.cornell.edu/CV/TenWork/FinalReport.pdf][http://arxiv.org/abs/1309.0787][http://opt-ml.org/papers/opt2014_submission_15.pdf][http://arxiv.org/abs/1406.4566]
|-
| '''Network Configuration - Past, Present and Future Techniques''' 
Network conditions are dynamic; unfortunately, current approaches to configuring networks are very inefficient, as operators today usually have to manually step through the configuration process.
In this topic, the student will do a survey of different network configuration approaches, including those that try to automate network configuration.
| [http://user.informatik.uni-goettingen.de/~dkoll David Koll]
| [https://www.cs.duke.edu/~tbenson/papers/IMC11.pdf][https://www.usenix.org/conference/nsdi15/technical-sessions/presentation/kim]
|-
|-
| '''Applying Machine Learning to Computer Networks''' ''( Assigned to Omar Shaya)''
| '''Applying Machine Learning to Computer Networks''' ''( Assigned to Omar Shaya)''