Seminar on Internet Technologies (Summer 2013): Difference between revisions

Jump to navigation Jump to search
(Created page with "== Details == {{CourseDetails |credits=120h, 6 ECTS (New); 4 ECTS (Old) |module=M.Inf.122/222: Seminar Telematik I/II ''-or-'' B.Inf.204/205: Proseminar I/II, (new Catalog:) M.I...")
 
 
(97 intermediate revisions by 6 users not shown)
Line 2: Line 2:


{{CourseDetails
{{CourseDetails
|credits=120h, 6 ECTS (New); 4 ECTS (Old)
|credits=120h, 6 ECTS (New); 4 ECTS (Old); 5 (ITIS)
|module=M.Inf.122/222: Seminar Telematik I/II ''-or-'' B.Inf.204/205: Proseminar I/II, (new Catalog:) M.Inf.1124''-or-'' B.Inf.1207/1208; ITIS Module 3.16
|module=M.Inf.122/222: Seminar Telematik I/II ''-or-'' B.Inf.204/205: Proseminar I/II, (new Catalog:) M.Inf.1124''-or-'' B.Inf.1207/1208; ITIS Module 3.16: Selected Topics in Internet Technologies
|lecturer=[http://user.informatik.uni-goettingen.de/~fu Prof. Dr. Xiaoming Fu]
|lecturer=[http://user.informatik.uni-goettingen.de/~fu Prof. Dr. Xiaoming Fu]
|ta=[http://user.informatik.uni-goettingen.de/~ljiao Lei Jiao]
|ta=[http://user.informatik.uni-goettingen.de/~ljiao Lei Jiao]
|time=Please see [[#Schedule]]
|time=Please see [[#Schedule]]
|place=IfI 3.101
|place=IfI 3.101
|univz=(TBA)
|univz=[http://univz.uni-goettingen.de/qisserver/rds?state=verpublish&status=init&vmfile=no&publishid=123577&moduleCall=webInfo&publishConfFile=webInfo&publishSubDir=veranstaltung]
}}
}}
{{Announcement|'''Please register in FlexNow for this course before January 3, 2013.'''}}
{{Announcement|'''Important: Please find our arrangements for your final presentations as follows.'''}}
{{Announcement|'''If you study with the new regulations, you'll get 6 ECTS for this course; if you're with the old regulations, you'll get 4 ECTS instead. '''}}


==Course description==
==Course description==
Line 30: Line 29:


==Schedule==
==Schedule==
* Thursday, '''October 25th, 15.00 - 16.00''': Initial general meetings. Introduction to the course and open questions.
{{Announcement|'''Note: The absence of your name here indicates that you have not registered for this course in FlexNow. Please contact [http://user.informatik.uni-goettingen.de/~ljiao me] if you have any questions. Thanks.'''}}
* Thursday, '''November 1st, 2012''': Finalization of topic and deadline to meet the topic advisors.
* '''April 8, 2013, Monday, 15:00''': Informational meeting
* Sunday, '''January 4th, 2013''': Submission of slides to topic advisor
* '''April 12, 2013, Friday, 23:59''': Deadline for selection of topic
** '''Mandatory to obtain a presentation slot'''
* '''June 20, 2013, Thursday, 23:59''': Deadline for registration
* Thursday, '''January 3th, 2013''': Registration deadline
* '''June 27, 2013, Thursday, 15:00 - 17:00''': Presentation time slot I: Simon Schuetz, Ditdit Nugeraha Utama
* Thursday, '''January 10th, 2013, 15.00 - 17.00''': Presentation slot - I.
* '''July 11, 2013, Thursday, 14:00 - 18:00''': Presentation time slot II: The following arrangement is based on the alphabetical order of your last name; Sorry for any possible inconvenience. Please contact me if you have any questions. Thanks.
* Thursday, '''January 17th, 2013, 15.00 - 17.00''': Presentation slot - II.  
** 14:00 --- 14:30: Irene Alvarez, "Simple Subgraphs for Link Prediction in the Social Networks: A Survey"
* Thursday, '''January 24th, 2013, 15.00 - 17.00''': Presentation slot - III.
** 14:30 --- 15:00: Sabyasachi Ghosh, "Inferring Networks based on Information Cascade and Diffusion"
* '''March 31th, 2013''': Deadline to submit the final report
** 15:00 --- 15:30: Georg Jahn, "Data Cache in Delay Tolerant Networks"
** 15:30 --- 16:00: Bartosz Kohnke, "Indoor Localization for Mobile Devices"
** 16:00 --- 16:30: Md Istiak Mehedi, "Resource Allocation and Management in Cloud Systems"
** 16:30 --- 17:00: Subhash Chandra Pujari, "Sybil Attacks and Defense via Social Networks: A Good Idea?"
** 17:00 --- 17:30: Daniel Schulenburg, "Bitcoins: A New Currency?"
** 17:30 --- 18:00: Mahdi Solhdoust, "Social Aware Data Routing in Delay Tolerant Networks"
* '''September 30, 2013, Monday, 23:59''': Deadline for submission of report


== Topics ==
== Topics ==
Line 48: Line 53:
|{{Hl2}} |'''Initial readings'''
|{{Hl2}} |'''Initial readings'''
|-
|-
| Context-aware Mobile Media
| <strike>Context-aware Mobile Media</strike> (''Assigned to'' Georg Roth-Kleyer)
| [http://www.net.informatik.uni-goettingen.de/people/yuan_zhang Yuan Zhang]
| [http://www.net.informatik.uni-goettingen.de/people/yuan_zhang Yuan Zhang]
| [http://dl.acm.org/citation.cfm?id=1613982] [http://dl.acm.org/citation.cfm?id=2043981&CFID=115044559&CFTOKEN=88700437] [http://dl.acm.org/citation.cfm?id=2037399]
| [http://dl.acm.org/citation.cfm?id=1613982] [http://dl.acm.org/citation.cfm?id=2043981&CFID=115044559&CFTOKEN=88700437] [http://dl.acm.org/citation.cfm?id=2037399]
|-
|-
| Preserving Location Privacy in Wireless Mobile Networks  
| <strike>Preserving Location Privacy in Wireless Mobile Networks</strike> (''Assigned to'' Simon Schütz)
| [http://www.net.informatik.uni-goettingen.de/people/wenzhong_li Dr. Wenzhong Li]
| [http://www.net.informatik.uni-goettingen.de/people/wenzhong_li Dr. Wenzhong Li]
| [http://arbor.ee.ntu.edu.tw/archive/ppdm/Anonymity/SweeneyKA02.pdf] [http://synrg.ee.duke.edu/papers/cachecloak.pdf] [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1437123&tag=1]
| [http://arbor.ee.ntu.edu.tw/archive/ppdm/Anonymity/SweeneyKA02.pdf] [http://synrg.ee.duke.edu/papers/cachecloak.pdf] [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1437123&tag=1]
|-
|-
| Indoor Localization for Mobile Devices
| <strike>Indoor Localization for Mobile Devices</strike> (''Assigned to'' Bartosz Kohnke)
| [http://www.net.informatik.uni-goettingen.de/people/wenzhong_li Dr. Wenzhong Li]
| [http://www.net.informatik.uni-goettingen.de/people/wenzhong_li Dr. Wenzhong Li]
| [http://dl.acm.org/citation.cfm?id=2348581] [http://dl.acm.org/citation.cfm?id=2348579] [http://dl.acm.org/citation.cfm?id=2348578][http://dl.acm.org/citation.cfm?id=2348580]
| [http://dl.acm.org/citation.cfm?id=2348581] [http://dl.acm.org/citation.cfm?id=2348579] [http://dl.acm.org/citation.cfm?id=2348578][http://dl.acm.org/citation.cfm?id=2348580]
|-
|-
| Social aware data routing in delay tolerant networks
| <strike>Social aware data routing in delay tolerant networks</strike> (''Assigned to'' Mahdi Solhdoust)
| [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu]
| [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu]
| [http://astro.temple.edu/~tuc13642/file/Infocom%2012.pdf] [http://www.cs.rpi.edu/~szymansk/papers/tpds.12.pdf] [http://www.cl.cam.ac.uk/~ph315/publications/hoc86309-hui.pdf]
| [http://astro.temple.edu/~tuc13642/file/Infocom%2012.pdf] [http://www.cs.rpi.edu/~szymansk/papers/tpds.12.pdf] [http://www.cl.cam.ac.uk/~ph315/publications/hoc86309-hui.pdf]
|-
|-
| Sybil Attacks and Defense via Social Networks: A good Idea?
| <strike>Data cache in delay tolerant networks</strike> (''Assigned to'' Georg Jahn)
| [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu]
| [http://www.cis.temple.edu/~wu/teaching/Spring%202013/infocom2013a.pdf] [http://mcn.cse.psu.edu/paper/xuejun-zhuo/xuejun-mass11.pdf] [http://mcn.cse.psu.edu/paper/weigao/icdcs11.pdf]
|-
| <strike>Sybil Attacks and Defense via Social Networks: A good Idea?</strike> (''Assigned to'' Subhash Chandra Pujari)
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]
| [http://www.mpi-soft.mpg.de/~gummadi/papers/comm318g.pdf] [http://www.mpi-sws.org/~gummadi/papers/sybil_defense.pdf] [http://www.cs.ucsb.edu/~ravenben/publications/pdf/sybil-imc11.pdf]
| [http://www.mpi-soft.mpg.de/~gummadi/papers/comm318g.pdf] [http://www.mpi-sws.org/~gummadi/papers/sybil_defense.pdf] [http://www.cs.ucsb.edu/~ravenben/publications/pdf/sybil-imc11.pdf]
|-
|-
| <strike>Bitcoins: A new currency?</strike> (''Assigned to'' Daniel Schulenburg)
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]
| [http://en.wikipedia.org/wiki/Bitcoin]
|-
| <strike>Decentralized Online Social Networks: A Survey of the State-of-the-Art</strike> (''Assigned to'' Ditdit Nugeraha Utama)
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]
| [http://www.peerson.net/][http://www.p2p.tu-darmstadt.de/fileadmin/user_upload/Group_P2P/share/p2p-ws10/safebook.pdf][http://dl.acm.org/citation.cfm?id=1592585]
|-
| <strike>Information-Centric Network: Existing solutions</strike> (''Assigned to'' Johannes Widenka)
| [http://www.net.informatik.uni-goettingen.de/people/jiachen_chen Jiachen Chen]
| [http://ccr.sigcomm.org/online/files/fp177-koponen1.pdf][http://www.cse.tkk.fi/fi/opinnot/T-110.6120/2010_Spring_Publish-Subscribe_Internetworking/luennot-files/STAL9781607500070-0102-1.pdf][http://pages.cs.wisc.edu/~akella/CS838/F09/838-Papers/ccn.pdf][http://dl.acm.org/citation.cfm?id=2065182]
|-
| <strike>Reliable Multicast: Solutions and Problems</strike> (''Assigned to'' Wazed Ali)
| [http://www.net.informatik.uni-goettingen.de/people/jiachen_chen Jiachen Chen]
| [http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=01096179][http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=493090][http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.30.3968][http://www.nossdav.org/1999/papers/71-1979756152.pdf]
|-
| <strike>Resource Allocation and Management in Cloud Systems</strike> (''Assigned to'' Md Istiak Mehedi)
| [http://user.informatik.uni-goettingen.de/~ljiao/ Lei Jiao]
| [http://iqua.ece.toronto.edu/~bli/papers/dniu-infocom13.pdf] [http://www.bell-labs.com/user/erranlli/publications/PACE-INFOCOM13.pdf] [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=6258025]
|-
| <strike>Simple Subgraphs for link prediction in the social networks: A survey</strike> (''Assigned to'' Irene Alvarez)
| [http://www.net.informatik.uni-goettingen.de/people/hong_huang Hong Huang]
| [http://www.weizmann.ac.il/mcb/UriAlon/Papers/networkMotifs/networkMotifs.pdf] [http://www2012.wwwconference.org/proceedings/proceedings/p1019.pdf] [http://research.microsoft.com/pubs/133158/GolderYardiSocComp.pdf][http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5992640]
|-
| <strike>Inferring Networks based on Information Cascade and Diffusion</strike> (''Assigned to'' Sabyasachi Ghosh)
| [http://www.net.informatik.uni-goettingen.de/people/wei_du Wei Du] [http://www.net.informatik.uni-goettingen.de/people/narisu_tao Narisu Tao]
| [http://www.stanford.edu/~manuelgr/pubs/netinf-kdd2010.pdf][http://www.cs.cornell.edu/home/kleinber/kdd09-quotes.pdf] [http://snap.stanford.edu/netinf/]
|}
|}


599

edits

Navigation menu