You are here: Home Previous Events 2020 Seminar Rechnernetze und Telematik …

Seminar Rechnernetze und Telematik (Winter 2020)

Seminar for master students of Computer Science and Embedding Systems discussion current and classic research in the area.



  • Update: 24.02.2020, 9am final meeting with discussion of al presentations
  • 1.11.2020: ILIAS page online
  • 14.10.2020: web page online


  • 2.11.2020 10:15 – First meeting (password: 6yDKE=PS8) presentation of topics
  • 13.11.2020 23:59 deadline for choice of your topic (take survey on ILIAS)
  • 16.11.2020 10:15 – Assignment of topics to students via Zoom (Meeting-ID: 857 4959 3754, Kenncode: 6yDKE=PS8)
  • 20.12.2020 Deadline for report
  • 24.01.2021 Deadline for video
  • 24.02.2020, 9am block seminar date for discussion of videos


We discuss up-to-date topics of distributed algorithms, cryptography, coding theory, and wireless communication.

  1. Cryptography
    1. Dijk, Gentry, Halevi, and Vaikuntanathan, "Fully homomorphic encryption over the integers", Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2010. link
    2. "Fully Homomorphic Encryption over the Integers with Shorter Public Keys", Coron, Mandal, Naccache, and Tibouchi, Annual Cryptology Conference, 2011. link
    3. M. Ajtai. Generating hard instances of lattice problems. In Complexity of computations and proofs, volume 13 of Quad. Mat., pages 1–32. Dept. Math., Seconda Univ. Napoli, Caserta, 2004. Preliminary version in STOC 1996.
    4. M. Ajtai and C. Dwork. A public-key cryptosystem with worst-case/average-case equivalence. In STOC, pages 284–293. 1997.
    5. Peikert, Chris. "A decade of lattice cryptography. Foundations and Trends in Theoretical Computer Science 10.4 (2016): 283-424.
  2. Stabilization, Distributed Systems
    1. Q. Bramas, T. Masuzawa, S. Tixeuil, Distributed Online Data Aggregation in Dynamic Graphs, in  2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), 
    2. C. Gkantsidis, M. Mihail, and A. Saberi, Random Walks in Peer-to-Peer Networks, in  IEEE INFOCOM 2004,
    3. A. Miller, A. Pelc, R.N. Yadav, Deterministic Leader Election in Anonymous Radio Networks, in SPAA ’20, July 15–17, 2020, Virtual Event, USA
    4. I. Jahja, H. Yu, Sublinear Algorithms in T-interval Dynamic Networks, , in SPAA ’20, July 15–17, 2020, Virtual Event, USA
    5. Xavier Défago, Yuval Emek, Shay Kutten, Toshimitsu Masuzawa, and Yasumasa Tamura, "Communication Efficient Self-Stabilizing Leader Election", DISC 2020
    6. Shay Kutten, William K. Moses Jr., Gopal Pandurangan, and David Peleg, "Singularly Optimal Randomized Leader Election", DISC 2020
  3. Wireless Sensor Networks
    1. Demirkol, Ilker & Ersoy, Cem & Onur, Ertan. (2009). Wake-up receivers for wireless sensor networks: Benefits and challenges. Wireless Communications, IEEE. 16. 88 - 96. 10.1109/MWC.2009.5281260. 
    2. Blanckenstein, Johannes, Jirka Klaue, and Holger Karl. "Energy efficient clustering using a wake-up receiver." European Wireless 2012; 18th European Wireless Conference 2012. VDE, 2012.
    3. Ait Aoudia, Fayçal, Matthieu Gautier, and Olivier Berder. "OPWUM: Opportunistic MAC protocol leveraging wake-up receivers in WSNs." Journal of sensors 2016 (2016).
    4. Park, Hyunhee. "Anti-Malicious Attack Algorithm for Low-Power Wake-Up Radio Protocol." IEEE Access 8 (2020): 127581-127592.
    5. Moody, Roy, Barker, Calhoun, Bowers, "Interference Robust Detector-First Near-Zero Power Wake-Up Receiver, IEEE Journal of Solid-State Circus, Vol 54, No. 8, August 2019
  4. Localization
    1. A. A. Ghany, B. Uguen and D. Lemur, "A Parametric TDoA Technique in the IoT Localization Context," 2019 16th Workshop on Positioning, Navigation and Communications (WPNC), Bremen, Germany, 2019, pp. 1-6, doi: 10.1109/WPNC47567.2019.8970254.
    2. P. Tabaghi, I. Dokmani and M. Vetterli, "Kinetic Euclidean Distance Matrices," in IEEE Transactions on Signal Processing, vol. 68, pp. 452-465, 2020, doi: 10.1109/TSP.2019.2959260.
    3. O. Jean and A. J. Weiss, "Geolocation by Direction of Arrival Using Arrays With Unknown Orientation," in IEEE Transactions on Signal Processing, vol. 62, no. 12, pp. 3135-3142, June15, 2014, doi: 10.1109/TSP.2014.2321109
    4. Pratik Biswas, Tzu-Chen Lian, Ta-Chung Wang, and Yinyu Ye. 2006. Semidefinite programming based algorithms for sensor network localization. ACM Trans. Sen. Netw. 2, 2 (May 2006), 188-220. DOI:
    5. Ribeiro, F., Florencio, D., Ba, D. and Zhang, C., 2011. Geometrically constrained room modeling with compact microphone arrays. IEEE Transactions on Audio, Speech, and Language Processing, 20(5), pp.1449-1460.
    6. Acoustic echoes reveal room shape, Ivan Dokmanić, Reza Parhizkar, Andreas Walther, Yue M. Lu, and Martin Vetterli, PNAS July 23, 2013 110 (30) 12186-12191;
    7. Parhizkar, R., Dokmanić, I. and Vetterli, M., 2014, May. Single-channel indoor microphone localization. In 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (pp. 1434-1438). IEEE.
    8. O. Öçal, I. Dokmanić and M. Vetterli, "Source localization and tracking in non-convex rooms," 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Florence, 2014, pp. 1429-1433, doi: 10.1109/ ICASSP.2014.6853833.
  5. Students' choices
    1. Santos, José, et al. "Towards network-aware resource provisioning in kubernetes for fog computing applications." 2019 IEEE Conference on Network Softwarization (NetSoft). IEEE, 2019.
    2. Peter Corke, Tim Wark, Raja Jurdak, Wen Hu, Philip Valencia, and Darren Moore, "Environmental Wireless Sensor Networks, Digital Object Identifier: 10.1109/JPROC.2010.2068530, Proceedings of the IEEE, Vol. 98, No. 11, November 2010
    3. Ebert, J.T., Gauci, M., Mallmann-Trenn, F. and Nagpal, R., 2020, May. Bayes bots: collective Bayesian decision-making in decentralized robot swarms. In 2020 IEEE International Conference on Robotics and Automation (ICRA) (pp. 7186-7192). IEEE.



Registration online with the University system before and after the presentation of topics. Please register also on the  ILIAS-page.

For a successful participation you have to

  1. Write a written (max) 5 page report (LaTeX) and upload it using ILIAS (1/4) until 20.12.2020.
  2. Contribute a 30 minute final presentation video during the block seminar until 24.01.2021 or let yourself being recorded at the university with a presentation (contact your supervisor regarding recording date). (1/2) 
  3. Watch all presentation in ILIAS
  4. Participate in the online block seminar for a 30 minute question round (mandatory) (1/4)



 The following assignments were chosen respecting the students' choices.

Last name First name ILIAS ID Topic ID Short title Supervisor Contact info
Herzig Miriam mh672 1.1. Homomorphic Encryption Schindelhauer cs675
Allgeier  Joshua  ja162  1.5.  Lattice Cryptography Schindelhauer  cs675 
Weinmann  Alexander aw359  2.1.  Distributed Online Data Aggregation Schindelhauer cs675
Grugel Tobias tg97 2.3. Deterministic Leader Election Köhler sk1140
Cagir Hasan hc63  2.4.  Sublinar Alg. T-interval Dynamic Networks Köhler  sk1140
Holler Sebastian sh477 2.5.  Commun. Efficient Self-Stab. Leader Elect. Köhler  sk1140
Scherer   Matthias  ms1415 2.6.  Singularly Optimal Rand. Leader Elect.  Köhler  sk1140  
Beck   Marco   mb903  3.1.  Wake-up Receivers  Schindelhauer cs675
Sharma  Abhishek   as1597  3.4.   Anti-Malicious Attack LP-WU Radio   Schindelhauer cs675
Kordowich Stefanie fk193 4.2. Kinetic Euclidean Distance Matrices Xiong wx5
Seemann Gerhard gs103 4.5. Geometrically Constrained Room Modelling Schindelhauer cs675
Peters Ludger lp242 4.6. Acousting Echoes Reveal Room Shape  Schindelhauer cs675
Mattheis  Jürgen jm622  5.1.  Network-aware Kubernetes Fog Computing Schindelhauer cs675