Theses and Projects: Difference between revisions
Jump to navigation
Jump to search
Line 53: | Line 53: | ||
* [[Indoor localisation based on RF-signal-strength]] (M/P) | * [[Indoor localisation based on RF-signal-strength]] (M/P) | ||
* [[Activity recognition from RSSI on android mobile phones]] (B/M/P) | * [[Activity recognition from RSSI on android mobile phones]] (B/M/P) ([http://www.net.informatik.uni-goettingen.de/people/stephan_sigg Stephan Sigg]) | ||
* if you are interested in other topics in this area please get in contact with [http://www.stephansigg.de Stephan Sigg] | * if you are interested in other topics in this area please get in contact with [http://www.stephansigg.de Stephan Sigg] | ||
Line 59: | Line 59: | ||
* [[Secure authentication from ambient audio]] (B/M/P) | * [[Secure authentication from ambient audio]] (B/M/P) | ||
* [[Unattended context-based authentication with fuzzy cryptography]] (B/M/P) | * [[Unattended context-based authentication with fuzzy cryptography]] (B/M/P) ([http://www.net.informatik.uni-goettingen.de/people/stephan_sigg Stephan Sigg]) | ||
* if you are interested in other topics in this area please get in contact with [http://www.stephansigg.de Stephan Sigg] | * if you are interested in other topics in this area please get in contact with [http://www.stephansigg.de Stephan Sigg] | ||
=== Mathematical calculations using superimpositions on the RF-channel === | === Mathematical calculations using superimpositions on the RF-channel === | ||
* [[Utilising convolutions of random functions for calculations on the RF-channel]] (B/M/P) | * [[Utilising convolutions of random functions for calculations on the RF-channel]] (B/M/P) ([http://www.net.informatik.uni-goettingen.de/people/stephan_sigg Stephan Sigg]) | ||
* if you are interested in other topics in this area please get in contact with [http://www.stephansigg.de Stephan Sigg] | * if you are interested in other topics in this area please get in contact with [http://www.stephansigg.de Stephan Sigg] | ||
=== Mobile, Pervasive and Ubiquitous Computing === | === Mobile, Pervasive and Ubiquitous Computing === | ||
* [[Android/Iphone/Ubuntu touch development of an environment-reactive app]] (B/M/P) | * [[Android/Iphone/Ubuntu touch development of an environment-reactive app]] (B/M/P) ([http://www.net.informatik.uni-goettingen.de/people/stephan_sigg Stephan Sigg]) | ||
* if you are interested in other topics in this area please get in contact with [http://www.stephansigg.de Stephan Sigg] | * if you are interested in other topics in this area please get in contact with [http://www.stephansigg.de Stephan Sigg] | ||
Revision as of 14:44, 22 September 2014
Open Theses and Student Project Topics
The Computer Networks Group is always looking for motivated students to work on various topics. If you are interested in any of the projects below, or if you have other ideas and are willing to work with us, please don't hesitate to contact us.
- (B) Bachelor thesis
- (M) Master thesis
- (P) Student project
Future Internet architecture
- Network Management: Information Centric Networking (ICN) based solution for Network Management (B/M/P)
- if you are interested in other topics in this area please get in contact with Mayutan Arumaithurai, Jiachen Chen, Edo Monticelli
Data Crawling and analysis
- if you are interested in other topics in this area please get in contact with Mayutan Arumaithurai
Mobile Networking
- Context-aware networking (M/P)
- if you are interested in other topics in this area please get in contact with Yuan Zhang-->
Social Networking
- Topic prediction in online social networks (B/M/P)(Hong Huang)
- Mining emotion patterns in online social networks (B/M/P)(Hong Huang)
- Gemstone: Decentralizing Social Networks (B/M/P)
- Understanding the information propagation process in social networks (B/M/P)
- Privacy protection in social network applications (B/M/P) (Konglin Zhu)
- Mobile effects in online social networks (B/M/P) (Konglin Zhu)
- Opportunistic social sensing as an enabling technology for smart cities (B/M/P) (Stephan Sigg)
- Bringing offline social networks online (B/M/P) (Stephan Sigg)
- if you are interested in other topics in this area please get in contact with David Koll, Dr. Wenzhong Li or Hong Huang
Device-free recognition from RF-signals
- Indoor localisation based on RF-signal-strength (M/P)
- Activity recognition from RSSI on android mobile phones (B/M/P) (Stephan Sigg)
- if you are interested in other topics in this area please get in contact with Stephan Sigg
Context-based security for mobile devices
- Secure authentication from ambient audio (B/M/P)
- Unattended context-based authentication with fuzzy cryptography (B/M/P) (Stephan Sigg)
- if you are interested in other topics in this area please get in contact with Stephan Sigg
Mathematical calculations using superimpositions on the RF-channel
- Utilising convolutions of random functions for calculations on the RF-channel (B/M/P) (Stephan Sigg)
- if you are interested in other topics in this area please get in contact with Stephan Sigg
Mobile, Pervasive and Ubiquitous Computing
- Android/Iphone/Ubuntu touch development of an environment-reactive app (B/M/P) (Stephan Sigg)
- if you are interested in other topics in this area please get in contact with Stephan Sigg
Ongoing Topics
Social Network Architectures
- Securing Decentralized OSNs against the Man-in-the-Middle-Attack (M)
- Supervised by David Koll
- Implementation and Deployment of a Measurement Prototype for Decentralized OSNs (P)
- Supervised by David Koll
Social Network Analysis
- Social Influence Maximization Problem (M)
- Exploring Friendship and Mobility in Location-Based Social Networks (M)
- Exploring Academic-Social Influence based on Citation and Collaboration Network Analysis (M)
- Supervised by Dr. Wenzhong Li
Completed Topics
- Implementation and Evaluation of Decentralized Online Social Networking System (P)
- Implementation of a Routing and Forwarding Scheme for Coordinated Wide Area Mobility (B/M/P)
- Evaluation of the Routing Performance of various Mobility Solutions (B/M/P)
- Design and implementation of a socio-aware layer for mobile phones
- Network Friendly TCP for P2P and other low priority traffic
- Securing Phoenix Network Coordinate System (M/P)
- Information diffusion in social networks: community based or location based (M/P)
- GEMSTONE goes Mobile (B)
- Transitioning of Social Graphs between Multiple Online Social Networks (B)
- Prevention and Mitigation of (D)DoS Attacks in Enterprise Environments (B)
- For a full list of older topics please go here.