Seminar on Internet Technologies (Summer 2012): Difference between revisions

Line 46: Line 46:
|{{Hl2}} |'''Initial readings'''
|{{Hl2}} |'''Initial readings'''
|-
|-
| <strike>Voice Over IP - A Success Story?</strike>(assigned to Christopher Menke)
| <strike>Voice Over IP - A Success Story?</strike> (assigned to Christopher Menke)
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]
| [http://en.wikipedia.org/wiki/Voice_over_Internet_Protocol] [http://transition.fcc.gov/voip/]
| [http://en.wikipedia.org/wiki/Voice_over_Internet_Protocol] [http://transition.fcc.gov/voip/]
|-
|-
| <strike>Business Models of the Underground Economy</strike>(assigned to Christian Wehrberger)
| <strike>Business Models of the Underground Economy</strike> (assigned to Christian Wehrberger)
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]
| [http://www.blackhat.com/presentations/bh-dc-10/Stevens_Kevin/BlackHat-DC-2010-Stevens-Underground-wp.pdf] [http://weis2011.econinfosec.org/papers/The%20Underground%20Economy%20of%20Fake%20Antivirus%20Software.pdf] [http://www.cs.ucsb.edu/~vigna/publications/2011_stone_cova_gilbert_kemmerer_kruegel_vigna_torpig.pdf]
| [http://www.blackhat.com/presentations/bh-dc-10/Stevens_Kevin/BlackHat-DC-2010-Stevens-Underground-wp.pdf] [http://weis2011.econinfosec.org/papers/The%20Underground%20Economy%20of%20Fake%20Antivirus%20Software.pdf] [http://www.cs.ucsb.edu/~vigna/publications/2011_stone_cova_gilbert_kemmerer_kruegel_vigna_torpig.pdf]
Line 74: Line 74:
| [http://ccr.sigcomm.org/online/files/p375.pdf] [http://research.microsoft.com/en-us/projects/ldg/a04-carrasco.pdf] [http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5961377]
| [http://ccr.sigcomm.org/online/files/p375.pdf] [http://research.microsoft.com/en-us/projects/ldg/a04-carrasco.pdf] [http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5961377]
|-
|-
| <strike>Routing strategies in Delay Tolerent Networks</strike>(assigned to Arne Bochem)
| <strike>Routing strategies in Delay Tolerent Networks</strike> (assigned to Arne Bochem)
| [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu]
| [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu]
| [http://delivery.acm.org/10.1145/1380000/1374652/p241-hui.pdf?ip=134.76.81.25&CFID=44287089&CFTOKEN=42866787&__acm__=1316779081_bdfa9e378cd848d6616ecfc6a0f9e5b1] [http://mcn.cse.psu.edu/paper/weigao/mobihoc09.pdf] [http://delivery.acm.org/10.1145/1290000/1288113/p32-daly.pdf?ip=134.76.81.25&CFID=44287089&CFTOKEN=42866787&__acm__=1316779310_6f8566b2d0ec634be8d30298ef9d129a] [http://prisms.cs.umass.edu/brian/pubs/bburns.infocom.2005.pdf][http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4585387][http://www-npa.lip6.fr/_publications/669-infocom06.pdf]
| [http://delivery.acm.org/10.1145/1380000/1374652/p241-hui.pdf?ip=134.76.81.25&CFID=44287089&CFTOKEN=42866787&__acm__=1316779081_bdfa9e378cd848d6616ecfc6a0f9e5b1] [http://mcn.cse.psu.edu/paper/weigao/mobihoc09.pdf] [http://delivery.acm.org/10.1145/1290000/1288113/p32-daly.pdf?ip=134.76.81.25&CFID=44287089&CFTOKEN=42866787&__acm__=1316779310_6f8566b2d0ec634be8d30298ef9d129a] [http://prisms.cs.umass.edu/brian/pubs/bburns.infocom.2005.pdf][http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4585387][http://www-npa.lip6.fr/_publications/669-infocom06.pdf]
599

edits