You are here: Home Previous Events 2023 Introductory Seminar Algorithms …

Introductory Seminar Algorithms for Computer Networks (Winter 2023/2024)


  • 1st meeting, 16.10.2023, 12 noon, 106-00-007
  • ILIAS page created


  • 1st meeting, 16.10.2023, 12 noon, presentation of the topics, assignment of topics via ILIAS
  • Week 43: How does science work?
  • CW 44: Plagiarism, scientific misconduct
  • CW 45: Literature Review, Scientific Presentation
  • CW 46-51, 2023, CW 2-CW 6: Presentations of the participants


The participants work in groups of two and present research and technologies in the field of computer networks on the basis of their own research or given work.

Examinations/Academic Achievements

  1. Summary of a maximum of 3 pages in LaTeX exported as PDF (1/4)
  2. 30-minute presentation with slide deck (deadline for slides: Wednesday before the presentation date) (1/2)
  3. 15-minute successful Q&A session (1/4)

All presentations will be recorded. The report and the set of slides will be uploaded to ILIAS by the participants.


  1. Illumination
    1. Art-Gallery-Problems, Section 1-2 of Chapter 22 of Urrutia, J., 2000. In Handbook of computational geometry (pp. 973-1027). North-Holland.
    2. Complexity of Art-Gallery-problems Section 3 of Chapter 22 of Urrutia, J., 2000. Art gallery and illumination problems. In Handbook of computational geometry (pp. 973-1027). North-Holland.
    3. Aronov, B., Davis, A.R., Dey, T.K., Pal, S.P. and Prasad, D.C., 1998. Discrete & Computational Geometry, 19, pp.553-574.
    4. Aronov, B., Davis, A.R., Dey, T.K., Pal, S.P. and Prasad, D.C., 1998. Discrete & Computational Geometry, 20, pp.61-78.
    5. Aronov, B., Davis, A.R., Iacono, J. and Yu, A.S.C., 2006, March. The complexity of diffuse reflections in a simple polygon. In: Latin American Symposium on Theoretical Informatics (pp. 93-104). Berlin, Heidelberg: Springer Berlin Heidelberg.
    6. Eppstein, D., 2022. Reflections in an octagonal mirror maze. arXiv preprint arXiv:2206.11413.
    7. Steiger, W. and Streinu, I., 1998. Computational Geometry, 10(1), pp.57-70.
  2. Localization
    1. Ribeiro, F., Florencio, D., Ba, D. and Zhang, C., 2011. Geometrically constrained room modeling with compact microphone arrays. IEEE Transactions on Audio, Speech, and Language Processing, 20(5), pp.1449-1460.
    2. Dokmanić, I., Parhizkar, R., Walther, A., Lu, Y.M. and Vetterli, M., 2013. Proceedings of the National Academy of Sciences, 110(30), pp.12186-12191.
    3. Su, D., Vidal-Calleja, T. and Miro, J.V., 2017, May. Towards real-time 3D sound sources mapping with linear microphone arrays. In 2017 IEEE International Conference on Robotics and Automation (ICRA) (pp. 1662-1668). IEEE.
    4. Kreković, M., Dokmanić, I. and Vetterli, M., 2020. Shapes from echoes: uniqueness from point-to-plane distance matrices. IEEE Transactions on Signal Processing, 68, pp.2480-2498.
    5. An, I., Son, M., Manocha, D. and Yoon, S.E., 2018, May. Reflection-aware sound source localization. In 2018 IEEE International Conference on Robotics and Automation (ICRA) (pp. 66-73). IEEE.
  3. Internet
    1. Starnberger, G., Kruegel, C. and Kirda, E., 2008, September. Overbot: a botnet protocol based on Kademlia. In Proceedings of the 4th international conference on Security and privacy in communication netowrks (pp. 1-9).
    2. Yang, P., Shao, J., Luo, W., Xu, L., Deogun, J. and Lu, Y., 2013. IEEE/ACM Transactions On Networking, 22(4), pp.1311-1324.
  4. Peer-to-Peer
    1. Montresor, A., Jelasity, M. and Babaoglu, O., 2005, August. Chord on demand. In Fifth IEEE International Conference on Peer-to-Peer Computing (P2P'05) (pp. 87-94). IEEE.
    2. Golbeck, J., 2008. Trust on the world wide web: a survey. Foundations and trends® in web science, 1(2), pp.131-197.
    3. Schmid, S., 2010, July. Robust architectures for open distributed systems and topological self-stabilization. In Proceedings of the Third International Workshop on Reliability, Availability, and Security (pp. 1-6).
    4. Li, B. and Niu, D., 2011. Random network coding in peer-to-peer networks: From theory to practice. Proceedings of the IEEE, 99(3), pp.513-523.
    5. Kannengießer, N., Lins, S., Dehling, T. and Sunyaev, A., 2020. ACM Computing Surveys (CSUR), 53(2), pp.1-37.
    6. Nakamoto, S., 2008. Bitcoin: A peer-to-peer electronic cash system. Decentralized business review.
  5. Cryptography
    1. Maurer, U., 2009, June. Unifying zero-knowledge proofs of knowledge. In International Conference on Cryptology in Africa (pp. 272-286). Berlin, Heidelberg: Springer Berlin Heidelberg.



Register for the event online and also in the ILIAS system.

Name ILIAS Abbreviation Topic No Topic Lecture date Report
 Engel/Jehle LE123/DJ60  1A  Art Gallery  20.11.2023   08.01.2024
 Herwig/Reitmeir MH1346/TR224  1G  Floodlights  20.11.2023  08.01.2024
 Caci/Kibler ZC16/MK1530  1E  Diffuse Reflection  27.11.2023  15.01.2024
 Abbas/Jaffal AA394/HJ69  4F  Bitcoin  27.11.2023  15.01.2024
 Huth LH660  2A  Room Modeling  04.12.2023  22.01.2024
 Ettner LE183  2B  Echoes Room Shape  04.12.2023  22.01.2024
 Saiger SS1722  2D  Shapes from Echoes  11.12.2023  05.02.2024
Bun/Stampone RD108/VS224  3A  Overbot  11.12.2023  05.02.2024
Divine/Frederick TG202/JF375  4A  Chord on Demand  18.12.2023  05.02.2024
Peach/Pink TP135/PR132  4B  Trust WWW  18.12.2023  05.02.2024
 Di Biase/Qelibari/Aranda Fehrenbach MD509/RQ3/TA136  3B  TCP Congestion  08.01.2024  11.12.2023
 Junghans/Litkevych FJ84/AL525  4C  Topological Self-Stab.  15.01.2024  11.12.2023
 Xi YX15  4D  Network Coding  15.01.2024  11.12.2023
 Lachmann/Schuhmacher JL469/MS2061  4E  Distributed Ledger  22.01.2024  18.12.2023
 Janzen/Roters/von Waldenfels DJ57/FR269/OV26  5A  Zero-Knowledge Proofs  05.02.2024  18.12.2023


There are currently no items in this folder.