Uni-Logo
Sie sind hier: Startseite Lehre Aktuelle Lehre Algorithms for Computer Networks (Winter 2018)
Artikelaktionen

Seminar Algorithms for Computer Networks (Winter 2018)

News

  • 17.10.2018: ILIAS web page online
  • 07.10.2018: web page online

Dates

  • 17.10.2018, 4pm 101 01 016 – First meeting
  • 31.10.2018, final topic assignment 4pm 101 01016 
  • Kickoff presentations 05.12.2018 4pm 101 01 016 
  • Kickoff presentations 12.12.2018 4pm 101 01 016 
  • Block seminar 11.02.2018, 14:00-17:00, room 051-03-026

Contents

We discuss up-to-date topics of distributed algorithms, localization, cryptography, coding theory, and wireless communication. More topics will appear soon.

  1. Cryptography
    1. I. Chatzigiannakis, A. Pyrgelis, P. G. Spirakis and Y. C. Stamatiou, "Elliptic Curve Based Zero Knowledge Proofs and their Applicability on Resource Constrained Devices," 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems, Valencia, 2011, pp. 715-720.
    2. Barnett, Adam, and Nigel P. Smart. "Mental poker revisited." IMA International Conference on Cryptography and Coding. Springer, Berlin, Heidelberg, 2003.
    3. Castella-Roca, Jordi, Francesc Sebé, and Josep Domingo-Ferrer. "Dropout-tolerant TTP-free mental poker." International Conference on Trust, Privacy and Security in Digital Business. Springer, Berlin, Heidelberg, 2005.
  2. Localization
    1. Arun, K. Somani, Thomas S. Huang, and Steven D. Blostein. "Least-squares fitting of two 3-D point sets." IEEE Transactions on pattern analysis and machine intelligence 5 (1987): 698-700.
    2. Särkkä, Simo, Aki Vehtari, and Jouko Lampinen. "Rao-Blackwellized Monte Carlo data association for multiple target tracking." Proceedings of the seventh international conference on information fusion. Vol. 1. I, 2004.
    3. Vo, B-N., and W-K. Ma. "The Gaussian mixture probability hypothesis density filter." IEEE Transactions on signal processing 54.11 (2006): 4091-4104.
  3. Block Chain, Bitcoins etc.
    1. A. Miller, A. Juels, E. Shi, B. Parno and J. Katz, "Permacoin: Repurposing Bitcoin Work for Data Preservation," 2014 IEEE Symposium on Security and Privacy, San Jose, CA, 2014, pp. 475-490.
    2. Back, Adam, Matt Corallo, Luke Dashjr, Mark Friedenbach, Gregory Maxwell, Andrew Miller, Andrew Poelstra, Jorge Timón, and Pieter Wuille. "Enabling blockchain innovations with pegged sidechains." URL: http://www. opensciencereview. com/papers/123/enablingblockchain-innovations-with-pegged-sidechains (2014).
       
  4. Stabilisation, Robot flocking etc.
    1. Patt-Shamir, Boaz, and Mor Perry. "Proof-labeling schemes: broadcast, unicast and in between." In International Symposium on Stabilization, Safety, and Security of Distributed Systems, pp. 1-17. Springer, Cham, 2017.
    2. Feldmann, Michael, and Christian Scheideler. "A Self-Stabilizing General De Bruijn Graph." In International Symposium on Stabilization, Safety, and Security of Distributed Systems, pp. 250-264. Springer, Cham, 2017.
    3. Canepa, Davide, Xavier Defago, Taisuke Izumi, and Maria Potop-Butucaru. "Flocking with Oblivious Robots." In International Symposium on Stabilization, Safety, and Security of Distributed Systems, pp. 94-108. Springer, Cham, 2016.
  5. MIMO
    1. Nosratinia, Aria, Todd E. Hunter, and Ahmadreza Hedayat. "Cooperative communication in wireless networks." IEEE communications Magazine 42.10 (2004): 74-80.
    2. Raleigh, Gregory G., and John M. Cioffi. "Spatio-temporal coding for wireless communication." IEEE Transactions on communications 46.3 (1998): 357-366.
    3. Fundamentals of Wireless Communication1 David Tse, University of California, Berkeley Pramod Viswanath, University of Illinois, Urbana-Champaign Chapter 8.1. V-Blast Architecture -> Summary 8.1 Performance Gains in a MIMO Channel
    4. Fundamentals of Wireless Communication1 David Tse, University of California, Berkeley Pramod Viswanath, University of Illinois, Urbana-Champaign Chapter 9.1.
  6. Wireless Sensor Networks
    1. Basagni, Stefano, Chiara Petrioli, and Dora Spenza. "CTP-WUR: The collection tree protocol in wake-up radio WSNs for critical applications." Computing, Networking and Communications (ICNC), 2016 International Conference on. IEEE, 2016.
    2. Sutton, Felix, et al. "Zippy: On-demand network flooding." Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems. ACM, 2015.
    3. Spenza, Dora, et al. "Beyond duty cycling: Wake-up radio with selective awakenings for long-lived wireless sensing systems." Computer Communications (INFOCOM), 2015 IEEE Conference on. IEEE, 2015.
  7. Coding Theory
    1. Haeupler, Bernhard, and Amirbehshad Shahrasbi. "Synchronization strings: codes for insertions and deletions approaching the singleton bound." Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing. ACM, 2017.
    2. Leonard J. Schulman. Coding for interactive communication. IEEE Transactions on Information Theory, 42(6):1745–1756, 1996.
    3. Ta-Shma, Amnon. "Explicit, almost optimal, epsilon-balanced codes." Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing. ACM, 2017.
    4. Electronic Colloquium on Computational Complexity, Report No. 32 (2018) Explicit Binary Tree Codes with Polylogarithmic Size Alphabet Gil Cohen Bernhard Haeupler Leonard J. Schulman
  8. Suggested by Students
    1. Bernstein, D. J., & Lange, T. (2017). Post-quantum cryptography-dealing with the fallout of physics success. IACR Cryptology ePrint Archive, 2017, 314. This paper is a current overview of the consequences quantum computers will have on state of the art cryptography but it also presents an overview over new cryptosystems which should be resilient to such attacks.
    2. ZombieCoin: Powering Next-Generation Botnets with Bitcoin. Ali ST, McCorry P, Lee PH, Hao F. FC
    3. Towards Risk Scoring of Bitcoin Transactions. Möser M, Böhme R, Breuker D. FC '14.

Deliverables

For a successful participation you have to 

  1. Give a 15 minute kickoff presentation (1/6)
  2. Write a written (max) 5 page report (LaTeX) until 06.02.2019 and upload it using ILIAS (1/6)
  3. Give a 30 minute final presentation during the block seminar (1/2)
  4. Survive the 15 minute discussion after your presentation (1/6)

All presentations will be recorded and will be made accessible to the participants. 

Organisation

Registration online with the University system before and after the presentation of topics. Please register also on the ILIAS-page.

 

Name First name ILIAS Topic Kickoff date Presentation date
Baumann Felix fb234 2.1. Least Square Fitting 05.12.2018  
Noullet Kristian  kn65 2.2. Rao Blackwellized MC data assoziation 05.12.2018  
Wilhelm Ben bw106 4.3. Flocking with oblivious robots 05.12.2018  11.02.2019, 14:00
Seibel Colin cs434 5.1. Cooperative communications in wireless networks 05.12.2018  11.02.2019, 15:30
Metzger Lukas lm310 8.1. Bernstein, Lange et al. "Post Quantum Cryptography" 05.12.2018  
Bentele Manuel mb930 6.2. Zippy 12.12.2018  
Aicher Tim ta71 6.1. CTP-WUR 12.12.2018  
Zarghami Erica ez36 6.3. Beyond Duty Cycling 12.12.2018 11.02.2019, 14:45
Qosja Andrea aq10 3.1. Permacoin 12.12.2018  
Ariani Masih ma280 8.2. Zombiecoin 12.12.2018 11.02.2019, 16:15
Altaner Florian fa66 8.3. Towards Risk Scoring of Bitcoin Transactions 12.12.2018  

 

Topic assignment is based on your choices communicated via the ILIAS-Forum. Please name three topics in order of your interest. The assignment will be published on this web page on 26.10.2018. If your name does not show up, please contact Christian Schindelhauer or come to the meeting on 31.10.2018.

Seminar

  • Kickoff presentations 05.12.2018-19.12.2018
  • Block seminar 11.02.2019, room 051-03-026 2pm-5pm

 

Benutzerspezifische Werkzeuge