|
|
Line 53: |
Line 53: |
| |{{Hl2}} |'''Initial readings''' | | |{{Hl2}} |'''Initial readings''' |
| |- | | |- |
| | <strike>Context-aware Mobile Media</strike> (''Assigned to'' Georg Roth-Kleyer)
| |
| | [http://www.net.informatik.uni-goettingen.de/people/yuan_zhang Yuan Zhang]
| |
| | [http://dl.acm.org/citation.cfm?id=1613982] [http://dl.acm.org/citation.cfm?id=2043981&CFID=115044559&CFTOKEN=88700437] [http://dl.acm.org/citation.cfm?id=2037399]
| |
| |-
| |
| | <strike>Preserving Location Privacy in Wireless Mobile Networks</strike> (''Assigned to'' Simon Schütz)
| |
| | [http://www.net.informatik.uni-goettingen.de/people/wenzhong_li Dr. Wenzhong Li]
| |
| | [http://arbor.ee.ntu.edu.tw/archive/ppdm/Anonymity/SweeneyKA02.pdf] [http://synrg.ee.duke.edu/papers/cachecloak.pdf] [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1437123&tag=1]
| |
| |-
| |
| | <strike>Indoor Localization for Mobile Devices</strike> (''Assigned to'' Bartosz Kohnke)
| |
| | [http://www.net.informatik.uni-goettingen.de/people/wenzhong_li Dr. Wenzhong Li]
| |
| | [http://dl.acm.org/citation.cfm?id=2348581] [http://dl.acm.org/citation.cfm?id=2348579] [http://dl.acm.org/citation.cfm?id=2348578][http://dl.acm.org/citation.cfm?id=2348580]
| |
| |-
| |
| | <strike>Social aware data routing in delay tolerant networks</strike> (''Assigned to'' Mahdi Solhdoust)
| |
| | [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu]
| |
| | [http://astro.temple.edu/~tuc13642/file/Infocom%2012.pdf] [http://www.cs.rpi.edu/~szymansk/papers/tpds.12.pdf] [http://www.cl.cam.ac.uk/~ph315/publications/hoc86309-hui.pdf]
| |
| |-
| |
| | <strike>Data cache in delay tolerant networks</strike> (''Assigned to'' Georg Jahn)
| |
| | [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu]
| |
| | [http://www.cis.temple.edu/~wu/teaching/Spring%202013/infocom2013a.pdf] [http://mcn.cse.psu.edu/paper/xuejun-zhuo/xuejun-mass11.pdf] [http://mcn.cse.psu.edu/paper/weigao/icdcs11.pdf]
| |
| |-
| |
| | <strike>Sybil Attacks and Defense via Social Networks: A good Idea?</strike> (''Assigned to'' Subhash Chandra Pujari)
| |
| | [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]
| |
| | [http://www.mpi-soft.mpg.de/~gummadi/papers/comm318g.pdf] [http://www.mpi-sws.org/~gummadi/papers/sybil_defense.pdf] [http://www.cs.ucsb.edu/~ravenben/publications/pdf/sybil-imc11.pdf]
| |
| |-
| |
| | <strike>Bitcoins: A new currency?</strike> (''Assigned to'' Daniel Schulenburg)
| |
| | [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]
| |
| | [http://en.wikipedia.org/wiki/Bitcoin]
| |
| |-
| |
| | <strike>Decentralized Online Social Networks: A Survey of the State-of-the-Art</strike> (''Assigned to'' Ditdit Nugeraha Utama)
| |
| | [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]
| |
| | [http://www.peerson.net/][http://www.p2p.tu-darmstadt.de/fileadmin/user_upload/Group_P2P/share/p2p-ws10/safebook.pdf][http://dl.acm.org/citation.cfm?id=1592585]
| |
| |-
| |
| | <strike>Information-Centric Network: Existing solutions</strike> (''Assigned to'' Johannes Widenka)
| |
| | [http://www.net.informatik.uni-goettingen.de/people/jiachen_chen Jiachen Chen]
| |
| | [http://ccr.sigcomm.org/online/files/fp177-koponen1.pdf][http://www.cse.tkk.fi/fi/opinnot/T-110.6120/2010_Spring_Publish-Subscribe_Internetworking/luennot-files/STAL9781607500070-0102-1.pdf][http://pages.cs.wisc.edu/~akella/CS838/F09/838-Papers/ccn.pdf][http://dl.acm.org/citation.cfm?id=2065182]
| |
| |-
| |
| | <strike>Reliable Multicast: Solutions and Problems</strike> (''Assigned to'' Wazed Ali)
| |
| | [http://www.net.informatik.uni-goettingen.de/people/jiachen_chen Jiachen Chen]
| |
| | [http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=01096179][http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=493090][http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.30.3968][http://www.nossdav.org/1999/papers/71-1979756152.pdf]
| |
| |-
| |
| | <strike>Resource Allocation and Management in Cloud Systems</strike> (''Assigned to'' Md Istiak Mehedi)
| |
| | [http://user.informatik.uni-goettingen.de/~ljiao/ Lei Jiao]
| |
| | [http://iqua.ece.toronto.edu/~bli/papers/dniu-infocom13.pdf] [http://www.bell-labs.com/user/erranlli/publications/PACE-INFOCOM13.pdf] [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=6258025]
| |
| |-
| |
| | <strike>Simple Subgraphs for link prediction in the social networks: A survey</strike> (''Assigned to'' Irene Alvarez)
| |
| | [http://www.net.informatik.uni-goettingen.de/people/hong_huang Hong Huang]
| |
| | [http://www.weizmann.ac.il/mcb/UriAlon/Papers/networkMotifs/networkMotifs.pdf] [http://www2012.wwwconference.org/proceedings/proceedings/p1019.pdf] [http://research.microsoft.com/pubs/133158/GolderYardiSocComp.pdf][http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5992640]
| |
| |-
| |
| | <strike>Inferring Networks based on Information Cascade and Diffusion</strike> (''Assigned to'' Sabyasachi Ghosh)
| |
| | [http://www.net.informatik.uni-goettingen.de/people/wei_du Wei Du] [http://www.net.informatik.uni-goettingen.de/people/narisu_tao Narisu Tao]
| |
| | [http://www.stanford.edu/~manuelgr/pubs/netinf-kdd2010.pdf][http://www.cs.cornell.edu/home/kleinber/kdd09-quotes.pdf] [http://snap.stanford.edu/netinf/]
| |
| |} | | |} |
|
| |
|