Seminar on Internet Technologies (Summer 2013): Difference between revisions

Line 59: Line 59:
| [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu]
| [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu]
| [http://astro.temple.edu/~tuc13642/file/Infocom%2012.pdf] [http://www.cs.rpi.edu/~szymansk/papers/tpds.12.pdf] [http://www.cl.cam.ac.uk/~ph315/publications/hoc86309-hui.pdf]
| [http://astro.temple.edu/~tuc13642/file/Infocom%2012.pdf] [http://www.cs.rpi.edu/~szymansk/papers/tpds.12.pdf] [http://www.cl.cam.ac.uk/~ph315/publications/hoc86309-hui.pdf]
|-
| Data cache in delay tolerant networks
| [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu]
| [http://www.cis.temple.edu/~wu/teaching/Spring%202013/infocom2013a.pdf] [http://mcn.cse.psu.edu/paper/xuejun-zhuo/xuejun-mass11.pdf] [http://mcn.cse.psu.edu/paper/weigao/icdcs11.pdf]
|-
|-
| <strike>Sybil Attacks and Defense via Social Networks: A good Idea?</strike> (''Assigned to'' Subhash Chandra Pujari)
| <strike>Sybil Attacks and Defense via Social Networks: A good Idea?</strike> (''Assigned to'' Subhash Chandra Pujari)
178

edits