Seminar on Internet Technologies (Winter 2011/2012): Difference between revisions

Jump to navigation Jump to search
 
(19 intermediate revisions by 5 users not shown)
Line 1: Line 1:
== Details ==
== Details ==


{{Announcement|'''First Meeting Thursday 27.10.2011 16:00 Room 3.101'''}}
{{Announcement|'''Presentations: 19.01.2012'''}}


{{CourseDetails
{{CourseDetails
|credits=120h, 4 ECTS
|credits=120h, 4 ECTS
|module=M.Inf.122/222: Seminar Telematik I/II ''-or-'' B.Inf.204/205: Proseminar I/II
|module=M.Inf.122/222: Seminar Telematik I/II ''-or-'' B.Inf.204/205: Proseminar I/II, (new Catalog:) M.Inf.1222.Mp''-or-'' B.Inf.1207/1208
|ta=[http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]
|ta=[http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]
|time=please see [[#Schedule]] In general Thursdays 16:00.
|time=please see [[#Schedule]] In general Thursdays 16:00.
Line 29: Line 29:
==Schedule==
==Schedule==
First meeting: Thursday Oct. 27th at 16:00 in 3.101
First meeting: Thursday Oct. 27th at 16:00 in 3.101
FlexNow Deadline: Thursday Jan. 12th
Presentations: Thursday Jan. 19th at 16:00 in 3.101


== Topics ==
== Topics ==
Line 42: Line 44:
| Voice Over IP - A Success Story?
| Voice Over IP - A Success Story?
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]
| [http://en.wikipedia.org/wiki/Voice_over_Internet_Protocol]
| [http://en.wikipedia.org/wiki/Voice_over_Internet_Protocol] [http://transition.fcc.gov/voip/]
|-
|-
| Business Models of the Underground Economy.
| Business Models of the Underground Economy.
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]
|  
| [http://www.blackhat.com/presentations/bh-dc-10/Stevens_Kevin/BlackHat-DC-2010-Stevens-Underground-wp.pdf] [http://weis2011.econinfosec.org/papers/The%20Underground%20Economy%20of%20Fake%20Antivirus%20Software.pdf] [http://www.cs.ucsb.edu/~vigna/publications/2011_stone_cova_gilbert_kemmerer_kruegel_vigna_torpig.pdf]
|-
|-
| Malware Detection in Networks - Anomaly Detection (multiple topics available)
| Malware Detection in Networks - Anomaly Detection (multiple topics available)
Line 52: Line 54:
| [http://www.google.com/url?sa=t&rct=j&q=malware%20detection%20in%20networks&source=web&cd=1&ved=0CB4QFjAA&url=http%3A%2F%2Fwww.networkworld.com%2Fnews%2F2007%2F042507-malware-detection.html&ei=Rm2lTpTFHcrNswaijp2eAw&usg=AFQjCNG5qvZm7a4kS-L8ajgOmMNEVoDQZA&cad=rja]
| [http://www.google.com/url?sa=t&rct=j&q=malware%20detection%20in%20networks&source=web&cd=1&ved=0CB4QFjAA&url=http%3A%2F%2Fwww.networkworld.com%2Fnews%2F2007%2F042507-malware-detection.html&ei=Rm2lTpTFHcrNswaijp2eAw&usg=AFQjCNG5qvZm7a4kS-L8ajgOmMNEVoDQZA&cad=rja]
|-
|-
| Information Propagation in Social Networks
| <s>Information Propagation in Social Networks</s> ''(taken)''
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]
| <s>[http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]</s>
| [http://www.ccs.neu.edu/home/amislove/publications/Flickr-WWW.pdf]
| <s>[http://www.ccs.neu.edu/home/amislove/publications/Flickr-WWW.pdf]</s>
|-
|-
| Relationship Classification in Social Networks
| Relationship Classification in Social Networks
Line 60: Line 62:
| [http://research.microsoft.com/en-us/people/weic/infocom11_relationshipclassification.pdf] [http://www.cs.purdue.edu/homes/rxiang/Publication_files/wfp1000-xiang.pdf]
| [http://research.microsoft.com/en-us/people/weic/infocom11_relationshipclassification.pdf] [http://www.cs.purdue.edu/homes/rxiang/Publication_files/wfp1000-xiang.pdf]
|-
|-
| Security and Privacy in Delay Tolerant Networks
| Modern Data Center Techniques
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]
| [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.71.8314&rep=rep1&type=pdf] [https://www.netlab.tkk.fi/opetus/s383151/articles/01659530.pdf] [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.60.7450&rep=rep1&type=pdf]
| [http://conferences.sigcomm.org/sigcomm/2011/papers/sigcomm/p62.pdf] [http://www.cse.iitb.ac.in/~puru/courses/spring11/cs620/references/costofcloud.pdf] [http://lcs.syr.edu/faculty/tang/Teaching/CSE791-Spring11/Papers/VL2-Sigcomm09.pdf]
|-
| <s>Security and Privacy in Delay Tolerant Networks</s>  ''(taken by Sromona Chatterjee)''
| <s>[http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]</s>
| <s>[http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.71.8314&rep=rep1&type=pdf] [https://www.netlab.tkk.fi/opetus/s383151/articles/01659530.pdf] [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.60.7450&rep=rep1&type=pdf]</s>
|-
|-
| Understanding Android Security
| Understanding Android Security
Line 80: Line 86:
| [http://cs.nju.edu.cn/dislab/xuty/readinglist/econ_tax.pdf] [http://www.cs.ust.hk/mjg_lib/Library/0310039.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/econ_wu.pdf]
| [http://cs.nju.edu.cn/dislab/xuty/readinglist/econ_tax.pdf] [http://www.cs.ust.hk/mjg_lib/Library/0310039.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/econ_wu.pdf]
|-
|-
| Computation Offloading from Mobile Device to the Cloud
| Applications of Bloom Filter in Data Center Networking
| [http://www.net.informatik.uni-goettingen.de/people/lei_jiao Lei Jiao]
| [http://www.net.informatik.uni-goettingen.de/people/lei_jiao Lei Jiao]
| [http://berkeley.intel-research.net/bgchun/clonecloud-eurosys11.pdf] [http://research.microsoft.com/en-us/um/people/alecw/mobisys-2010.pdf] [http://people.inf.ethz.ch/oriva/pubs/riva_middleware09.pdf] [http://www.cs.vu.nl/~rkemp/papers/kemp-mobicase2010.pdf]
| [http://alex.fabrikant.us/papers/yfr09.pdf] [http://www.ce.sunysb.edu/~xwang/public/paper/ICNP_BF_Mcast.pdf] [http://www.informatik.tu-darmstadt.de/fileadmin/user_upload/Group_CDC/Documents/Publikationen/201104_CN55_6__In-packet_Bloom_filters_-_Design_and_networking_applications.pdf]
|-
|-
| Routing strategies in Delay Tolerent Networks
| Routing strategies in Delay Tolerent Networks
| [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu]
| [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu]
| [http://delivery.acm.org/10.1145/1380000/1374652/p241-hui.pdf?ip=134.76.81.25&CFID=44287089&CFTOKEN=42866787&__acm__=1316779081_bdfa9e378cd848d6616ecfc6a0f9e5b1] [http://mcn.cse.psu.edu/paper/weigao/mobihoc09.pdf] [http://delivery.acm.org/10.1145/1290000/1288113/p32-daly.pdf?ip=134.76.81.25&CFID=44287089&CFTOKEN=42866787&__acm__=1316779310_6f8566b2d0ec634be8d30298ef9d129a] [http://prisms.cs.umass.edu/brian/pubs/bburns.infocom.2005.pdf][http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4585387][http://www-npa.lip6.fr/_publications/669-infocom06.pdf]
| [http://delivery.acm.org/10.1145/1380000/1374652/p241-hui.pdf?ip=134.76.81.25&CFID=44287089&CFTOKEN=42866787&__acm__=1316779081_bdfa9e378cd848d6616ecfc6a0f9e5b1] [http://mcn.cse.psu.edu/paper/weigao/mobihoc09.pdf] [http://delivery.acm.org/10.1145/1290000/1288113/p32-daly.pdf?ip=134.76.81.25&CFID=44287089&CFTOKEN=42866787&__acm__=1316779310_6f8566b2d0ec634be8d30298ef9d129a] [http://prisms.cs.umass.edu/brian/pubs/bburns.infocom.2005.pdf][http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4585387][http://www-npa.lip6.fr/_publications/669-infocom06.pdf]
 
|-
| <s> Introduction on Cloud Computing''</s>(taken by Shanshi Yang)''
| <s>[http://www.net.informatik.uni-goettingen.de/people/yuan_zhang Zhang Yuan]</s>
| <s>[http://www.computer.org/cms/Computer.org/ComputingNow/homepage/2011/0611/rW_MM_VirtualizedScreen.pdf] [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5754008&tag=1] [http://dl.acm.org/citation.cfm?id=1741957]</s>
|-
|}
|}


Navigation menu