Seminar on Internet Technologies (Winter 2013/2014): Difference between revisions

Jump to navigation Jump to search
(Created page with "== Details == {{CourseDetails |credits=120h, 6 ECTS (New); 4 ECTS (Old); 5 (ITIS) |module=M.Inf.122/222: Seminar Telematik I/II ''-or-'' B.Inf.204/205: Proseminar I/II, (new Cat...")
 
Line 53: Line 53:
|{{Hl2}} |'''Initial readings'''
|{{Hl2}} |'''Initial readings'''
|-
|-
| <strike>Context-aware Mobile Media</strike> (''Assigned to'' Georg Roth-Kleyer)
| [http://www.net.informatik.uni-goettingen.de/people/yuan_zhang Yuan Zhang]
| [http://dl.acm.org/citation.cfm?id=1613982] [http://dl.acm.org/citation.cfm?id=2043981&CFID=115044559&CFTOKEN=88700437] [http://dl.acm.org/citation.cfm?id=2037399]
|-
| <strike>Preserving Location Privacy in Wireless Mobile Networks</strike> (''Assigned to'' Simon Schütz)
| [http://www.net.informatik.uni-goettingen.de/people/wenzhong_li Dr. Wenzhong Li]
| [http://arbor.ee.ntu.edu.tw/archive/ppdm/Anonymity/SweeneyKA02.pdf] [http://synrg.ee.duke.edu/papers/cachecloak.pdf] [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1437123&tag=1]
|-
| <strike>Indoor Localization for Mobile Devices</strike> (''Assigned to'' Bartosz Kohnke)
| [http://www.net.informatik.uni-goettingen.de/people/wenzhong_li Dr. Wenzhong Li]
| [http://dl.acm.org/citation.cfm?id=2348581] [http://dl.acm.org/citation.cfm?id=2348579] [http://dl.acm.org/citation.cfm?id=2348578][http://dl.acm.org/citation.cfm?id=2348580]
|-
| <strike>Social aware data routing in delay tolerant networks</strike> (''Assigned to'' Mahdi Solhdoust)
| [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu]
| [http://astro.temple.edu/~tuc13642/file/Infocom%2012.pdf] [http://www.cs.rpi.edu/~szymansk/papers/tpds.12.pdf] [http://www.cl.cam.ac.uk/~ph315/publications/hoc86309-hui.pdf]
|-
| <strike>Data cache in delay tolerant networks</strike> (''Assigned to'' Georg Jahn)
| [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu]
| [http://www.cis.temple.edu/~wu/teaching/Spring%202013/infocom2013a.pdf] [http://mcn.cse.psu.edu/paper/xuejun-zhuo/xuejun-mass11.pdf] [http://mcn.cse.psu.edu/paper/weigao/icdcs11.pdf]
|-
| <strike>Sybil Attacks and Defense via Social Networks: A good Idea?</strike> (''Assigned to'' Subhash Chandra Pujari)
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]
| [http://www.mpi-soft.mpg.de/~gummadi/papers/comm318g.pdf] [http://www.mpi-sws.org/~gummadi/papers/sybil_defense.pdf] [http://www.cs.ucsb.edu/~ravenben/publications/pdf/sybil-imc11.pdf]
|-
| <strike>Bitcoins: A new currency?</strike> (''Assigned to'' Daniel Schulenburg)
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]
| [http://en.wikipedia.org/wiki/Bitcoin]
|-
| <strike>Decentralized Online Social Networks: A Survey of the State-of-the-Art</strike> (''Assigned to'' Ditdit Nugeraha Utama)
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]
| [http://www.peerson.net/][http://www.p2p.tu-darmstadt.de/fileadmin/user_upload/Group_P2P/share/p2p-ws10/safebook.pdf][http://dl.acm.org/citation.cfm?id=1592585]
|-
| <strike>Information-Centric Network: Existing solutions</strike> (''Assigned to'' Johannes Widenka)
| [http://www.net.informatik.uni-goettingen.de/people/jiachen_chen Jiachen Chen]
| [http://ccr.sigcomm.org/online/files/fp177-koponen1.pdf][http://www.cse.tkk.fi/fi/opinnot/T-110.6120/2010_Spring_Publish-Subscribe_Internetworking/luennot-files/STAL9781607500070-0102-1.pdf][http://pages.cs.wisc.edu/~akella/CS838/F09/838-Papers/ccn.pdf][http://dl.acm.org/citation.cfm?id=2065182]
|-
| <strike>Reliable Multicast: Solutions and Problems</strike> (''Assigned to'' Wazed Ali)
| [http://www.net.informatik.uni-goettingen.de/people/jiachen_chen Jiachen Chen]
| [http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=01096179][http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=493090][http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.30.3968][http://www.nossdav.org/1999/papers/71-1979756152.pdf]
|-
| <strike>Resource Allocation and Management in Cloud Systems</strike> (''Assigned to'' Md Istiak Mehedi)
| [http://user.informatik.uni-goettingen.de/~ljiao/ Lei Jiao]
| [http://iqua.ece.toronto.edu/~bli/papers/dniu-infocom13.pdf] [http://www.bell-labs.com/user/erranlli/publications/PACE-INFOCOM13.pdf] [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=6258025]
|-
| <strike>Simple Subgraphs for link prediction in the social networks: A survey</strike> (''Assigned to'' Irene Alvarez)
| [http://www.net.informatik.uni-goettingen.de/people/hong_huang Hong Huang]
| [http://www.weizmann.ac.il/mcb/UriAlon/Papers/networkMotifs/networkMotifs.pdf] [http://www2012.wwwconference.org/proceedings/proceedings/p1019.pdf] [http://research.microsoft.com/pubs/133158/GolderYardiSocComp.pdf][http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5992640]
|-
| <strike>Inferring Networks based on Information Cascade and Diffusion</strike> (''Assigned to'' Sabyasachi Ghosh)
| [http://www.net.informatik.uni-goettingen.de/people/wei_du Wei Du] [http://www.net.informatik.uni-goettingen.de/people/narisu_tao Narisu Tao]
| [http://www.stanford.edu/~manuelgr/pubs/netinf-kdd2010.pdf][http://www.cs.cornell.edu/home/kleinber/kdd09-quotes.pdf] [http://snap.stanford.edu/netinf/]
|}
|}


599

edits

Navigation menu