Seminar on Internet Technologies (Summer 2012): Difference between revisions

Jump to navigation Jump to search
Line 59: Line 59:
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]
| [http://research.microsoft.com/en-us/people/weic/infocom11_relationshipclassification.pdf] [http://www.cs.purdue.edu/homes/rxiang/Publication_files/wfp1000-xiang.pdf]
| [http://research.microsoft.com/en-us/people/weic/infocom11_relationshipclassification.pdf] [http://www.cs.purdue.edu/homes/rxiang/Publication_files/wfp1000-xiang.pdf]
|-
| Modern Data Center Techniques
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]
| [http://conferences.sigcomm.org/sigcomm/2011/papers/sigcomm/p62.pdf] [http://www.cse.iitb.ac.in/~puru/courses/spring11/cs620/references/costofcloud.pdf] [http://lcs.syr.edu/faculty/tang/Teaching/CSE791-Spring11/Papers/VL2-Sigcomm09.pdf]
|-
|-
| Understanding Android Security
| Understanding Android Security

Navigation menu