599
edits
(→Topics) |
(→Topics) |
||
Line 46: | Line 46: | ||
|{{Hl2}} |'''Initial readings''' | |{{Hl2}} |'''Initial readings''' | ||
|- | |- | ||
| <strike>Voice Over IP - A Success Story?</strike>(assigned to Christopher Menke) | | <strike>Voice Over IP - A Success Story?</strike> (assigned to Christopher Menke) | ||
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler] | | [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler] | ||
| [http://en.wikipedia.org/wiki/Voice_over_Internet_Protocol] [http://transition.fcc.gov/voip/] | | [http://en.wikipedia.org/wiki/Voice_over_Internet_Protocol] [http://transition.fcc.gov/voip/] | ||
|- | |- | ||
| <strike>Business Models of the Underground Economy</strike>(assigned to Christian Wehrberger) | | <strike>Business Models of the Underground Economy</strike> (assigned to Christian Wehrberger) | ||
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler] | | [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler] | ||
| [http://www.blackhat.com/presentations/bh-dc-10/Stevens_Kevin/BlackHat-DC-2010-Stevens-Underground-wp.pdf] [http://weis2011.econinfosec.org/papers/The%20Underground%20Economy%20of%20Fake%20Antivirus%20Software.pdf] [http://www.cs.ucsb.edu/~vigna/publications/2011_stone_cova_gilbert_kemmerer_kruegel_vigna_torpig.pdf] | | [http://www.blackhat.com/presentations/bh-dc-10/Stevens_Kevin/BlackHat-DC-2010-Stevens-Underground-wp.pdf] [http://weis2011.econinfosec.org/papers/The%20Underground%20Economy%20of%20Fake%20Antivirus%20Software.pdf] [http://www.cs.ucsb.edu/~vigna/publications/2011_stone_cova_gilbert_kemmerer_kruegel_vigna_torpig.pdf] | ||
Line 74: | Line 74: | ||
| [http://ccr.sigcomm.org/online/files/p375.pdf] [http://research.microsoft.com/en-us/projects/ldg/a04-carrasco.pdf] [http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5961377] | | [http://ccr.sigcomm.org/online/files/p375.pdf] [http://research.microsoft.com/en-us/projects/ldg/a04-carrasco.pdf] [http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5961377] | ||
|- | |- | ||
| <strike>Routing strategies in Delay Tolerent Networks</strike>(assigned to Arne Bochem) | | <strike>Routing strategies in Delay Tolerent Networks</strike> (assigned to Arne Bochem) | ||
| [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu] | | [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu] | ||
| [http://delivery.acm.org/10.1145/1380000/1374652/p241-hui.pdf?ip=134.76.81.25&CFID=44287089&CFTOKEN=42866787&__acm__=1316779081_bdfa9e378cd848d6616ecfc6a0f9e5b1] [http://mcn.cse.psu.edu/paper/weigao/mobihoc09.pdf] [http://delivery.acm.org/10.1145/1290000/1288113/p32-daly.pdf?ip=134.76.81.25&CFID=44287089&CFTOKEN=42866787&__acm__=1316779310_6f8566b2d0ec634be8d30298ef9d129a] [http://prisms.cs.umass.edu/brian/pubs/bburns.infocom.2005.pdf][http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4585387][http://www-npa.lip6.fr/_publications/669-infocom06.pdf] | | [http://delivery.acm.org/10.1145/1380000/1374652/p241-hui.pdf?ip=134.76.81.25&CFID=44287089&CFTOKEN=42866787&__acm__=1316779081_bdfa9e378cd848d6616ecfc6a0f9e5b1] [http://mcn.cse.psu.edu/paper/weigao/mobihoc09.pdf] [http://delivery.acm.org/10.1145/1290000/1288113/p32-daly.pdf?ip=134.76.81.25&CFID=44287089&CFTOKEN=42866787&__acm__=1316779310_6f8566b2d0ec634be8d30298ef9d129a] [http://prisms.cs.umass.edu/brian/pubs/bburns.infocom.2005.pdf][http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4585387][http://www-npa.lip6.fr/_publications/669-infocom06.pdf] |
edits