Seminar on Internet Technologies (Summer 2012): Difference between revisions

Jump to navigation Jump to search
Line 61: Line 61:
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]
| [http://research.microsoft.com/en-us/people/weic/infocom11_relationshipclassification.pdf] [http://www.cs.purdue.edu/homes/rxiang/Publication_files/wfp1000-xiang.pdf]
| [http://research.microsoft.com/en-us/people/weic/infocom11_relationshipclassification.pdf] [http://www.cs.purdue.edu/homes/rxiang/Publication_files/wfp1000-xiang.pdf]
|-
| <strike>Modern Data Center Techniques</strike> (assigned to Christof Pohl)
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]
| [http://conferences.sigcomm.org/sigcomm/2011/papers/sigcomm/p62.pdf] [http://www.cse.iitb.ac.in/~puru/courses/spring11/cs620/references/costofcloud.pdf] [http://lcs.syr.edu/faculty/tang/Teaching/CSE791-Spring11/Papers/VL2-Sigcomm09.pdf]
|-
|-
| <strike>Security in Near Field Communication (NFC)</strike> (assigned to Georg Jahn)
| <strike>Security in Near Field Communication (NFC)</strike> (assigned to Georg Jahn)
599

edits

Navigation menu