Seminar on Internet Technologies (Winter 2010/2011): Difference between revisions

Line 53: Line 53:
| [http://www.linkedin.com/]
| [http://www.linkedin.com/]
|-
|-
| Traffic Localization in P2P Networks
| <strike>Traffic Localization in P2P Networks</strike>
| [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]
| [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]
| [http://tools.ietf.org/html/draft-marocco-alto-problem-statement] [http://tools.ietf.org/html/draft-marocco-p2prg-mythbustering]
| [http://tools.ietf.org/html/draft-marocco-alto-problem-statement] [http://tools.ietf.org/html/draft-marocco-p2prg-mythbustering]
Line 65: Line 65:
| [http://avispa-project.org/]
| [http://avispa-project.org/]
|-
|-
| Distributed Hash Tables - Usage, properties and future development
| <strike>Distributed Hash Tables - Usage, properties and future development</strike>
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]
| [http://en.wikipedia.org/wiki/Distributed_hash_table]
| [http://en.wikipedia.org/wiki/Distributed_hash_table]
|-
|-
| Matrix Factorization Model based Network Coordinate System
| <strike>Matrix Factorization Model based Network Coordinate System</strike>
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]
| [http://www.net-glyph.org/~chenyang/NC/ides_jsac06.pdf] [http://www.net-glyph.org/~chenyang/Networking09_Phoenix.pdf] [http://user.informatik.uni-goettingen.de/~ychen/NC/DMF_Networking10.pdf]
| [http://www.net-glyph.org/~chenyang/NC/ides_jsac06.pdf] [http://www.net-glyph.org/~chenyang/Networking09_Phoenix.pdf] [http://user.informatik.uni-goettingen.de/~ychen/NC/DMF_Networking10.pdf]
Line 85: Line 85:
| [http://www.computer.org/portal/web/csdl/doi/10.1109/MIC.2007.125]
| [http://www.computer.org/portal/web/csdl/doi/10.1109/MIC.2007.125]
|-
|-
| Security Design in Network Coordinate Systems
| <strike>Security Design in Network Coordinate Systems</strike>
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]
| [http://www.net-glyph.org/~chenyang/NC/reputation_vivaldi.pdf] [http://www.net-glyph.org/~chenyang/NC/secure_nc_sigcomm07.pdf] [http://www.net-glyph.org/~chenyang/NC/veracity_usenix09.pdf]
| [http://www.net-glyph.org/~chenyang/NC/reputation_vivaldi.pdf] [http://www.net-glyph.org/~chenyang/NC/secure_nc_sigcomm07.pdf] [http://www.net-glyph.org/~chenyang/NC/veracity_usenix09.pdf]
Line 97: Line 97:
| [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_p2p.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_jsac.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_jsac.pdf]
| [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_p2p.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_jsac.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_jsac.pdf]
|-
|-
| Cloud Computing
| <strike>Cloud Computing</strike>
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]
| [http://portal.acm.org/citation.cfm?id=1721672] [http://ccr.sigcomm.org/online/?q=node/654] [http://www.cs.rice.edu/~gw4314/papers/infocom10.pdf] [http://aws.amazon.com/ec2/]
| [http://portal.acm.org/citation.cfm?id=1721672] [http://ccr.sigcomm.org/online/?q=node/654] [http://www.cs.rice.edu/~gw4314/papers/infocom10.pdf] [http://aws.amazon.com/ec2/]