Proseminar (Sommer 2019)
News
- 25.04.2019 Tragen Sie sich im Forum des ILIAS-Systems für die Themenwünsche ein!
Termine
- 24.04.2019, 16:15, 101 01 016 – Vorbesprechung
- 08.05.2019, 16:15: Themenvergabe – 101 01016
- Kickoffpräsentationen 19.06. – 26.06. – 10.07.
- Deadline Report 19.07.2019
- Blockseminar 29.-30.07.2019 Raum 052-02-017 (Anwesenheitspficht nur für den Vortragstag)
Inhalte
Die Teilnehmer stellen verschiedene Technologien im Bereich Rechnernetze vor, indem sie diese recherchieren und dann im Prosemnar präsentieren. Die Themen werden demnächst hier erscheinen.
Prüfungsleistungen
- 10-15-minütige Kickoff-Präsentation (1/6)
- Bericht von maximal 5 Seiten in LaTeX (1/6)
- 30-minütige Abschlusspräsentation (1/2)
- 15-minütige erfolgreiche Fragerunde (1/6)
Alle Präsentationen werden aufgezeichnet.
Themen
- Kapitel 12.1: Hash Codes: Codes for Efficient Information Retrieval, MacKay, D.J. and Mac Kay, D.J., 2003. Information theory, inference and learning algorithms. Cambridge university press.
- Kapitel 2.2. Cryptographic Hash Functions: Construction using Encryption – Delfs, H. and Knebl, H., 2015. Public-Key Cryptography. In Introduction to Cryptography (pp. 49-106). Springer, Berlin, Heidelberg.
- Kapitel 2.2. Cryptographic Hash Functions: Real Hash Functions and HMAC – Delfs, H. and Knebl, H., 2015. Public-Key Cryptography. In Introduction to Cryptography (pp. 49-106). Springer, Berlin, Heidelberg.
- Kapitel 16: Message Passing, MacKay, D.J. and Mac Kay, D.J., 2003. Information theory, inference and learning algorithms. Cambridge university press.
- Kapitel 47: Low-Density Parity-Check Codes, MacKay, D.J. and Mac Kay, D.J., 2003. Information theory, inference and learning algorithms. Cambridge university press.
- Kapitel 48: Convolutional Codes and Turbo Codes, MacKay, D.J. and Mac Kay, D.J., 2003. Information theory, inference and learning algorithms. Cambridge university press.
- Kapitel 49: Repeat-Accumulate Codes, MacKay, D.J. and Mac Kay, D.J., 2003. Information theory, inference and learning algorithms. Cambridge university press.
- Kapitel 50: Digital Fountain Codes, MacKay, D.J. and Mac Kay, D.J., 2003. Information theory, inference and learning algorithms. Cambridge university press.
- Yang, Y.R. and Lam, S.S., 2000. General AIMD congestion control. In Proceedings 2000 International Conference on Network Protocols (pp. 187-198). IEEE.
- D. Bansal and H. Balakrishnan, "Binomial congestion control algorithms," Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213), Anchorage, AK, USA, 2001, pp. 631-640 vol.2.
- S. Stüdli, E. Crisostomi, R. Middleton and R. Shorten, "AIMD-like algorithms for charging electric and plug-in hybrid vehicles," 2012 IEEE International Electric Vehicle Conference, Greenville, SC, 2012, pp. 1-8.
- Lian, F.L., Moyne, J.R. and Tilbury, D.M., 2001. Performance evaluation of control networks: Ethernet, ControlNet, and DeviceNet. IEEE control systems magazine, 21(1), pp.66-83.
- E. Tovar and F. Vasques, "Real-time fieldbus communications using Profibus networks," in IEEE Transactions on Industrial Electronics, vol. 46, no. 6, pp. 1241-1251, Dec. 1999.
- Alves, M., Tovar, E., Vasques, F., Hammer, G. and Rother, K., 2002. Real-time communications over hybrid wired/wireless PROFIBUS-based networks. In Proceedings 14th Euromicro Conference on Real-Time Systems. Euromicro RTS 2002 (pp. 142-151). IEEE.
- Impossibility of Distributed Consensus with One Faulty Process, Fischer, Lynch, Paterson, Journal of the ACM (JACM) JACM Homepage archive, Volume 32 Issue 2, April 1985, Pages 374-382
- Lamport, L., Shostak, R. and Pease, M., 1982. The Byzantine generals problem. ACM Transactions on Programming Languages and Systems (TOPLAS), 4(3), pp.382-401.
- Hiranandani, Daniel, Katia Obraczka, and J. J. Garcia-Luna-Aceves. "MANET protocol simulations considered harmful: the case for benchmarking." IEEE Wireless Communications 20.4 (2013): 82-90.
- Andrews, J.G., Buzzi, S., Choi, W., Hanly, S.V., Lozano, A., Soong, A.C. and Zhang, J.C., 2014. What will 5G be?. IEEE Journal on selected areas in communications, 32(6), pp.1065-1082.
- Taylor, A., Japkowicz, N. and Leblanc, S., 2015, December. Frequency-based anomaly detection for the automotive CAN bus. In 2015 World Congress on Industrial Control Systems Security (WCICSS) (pp. 45-49). IEEE.
- Studnia, I., Nicomette, V., Alata, E., Deswarte, Y., Kaâniche, M. and Laarouchi, Y., 2013, June. Survey on security threats and protection mechanisms in embedded automotive networks. In 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W)
- Shokrollahi, A., 2006. Raptor codes. IEEE/ACM Transactions on Networking (TON), 14(SI), pp.2551-2567.
Themenverteilung
Nummer | Name | Thema | Kickoff-Termin | Vortragstermin | |
1. | Ben Bausch | Hash 1 | 19.06.2019 | 30.07.2019 13:15 | |
2. | Simon Blauth | Hash 2 | 19.06.2019 | 29.07.2019 10:30 | |
4. | Michael Roth | Message Passing | 19.06.2019 | 29.07.2019 09:00 | |
5. | Eric Giesa | LDPC | 19.06.2019 | 29.07.2019 11:15 | |
6. | Victor Maier | Convolutional Codes | 19.06.2019 | 29.07.2019 09:45 | |
8. | Lukas Peck | Digital Fountain Codes | 19.06.2019 | 29.07.2019 14:00 | |
21 | Danny Reichelt | Raptor Codes | 19.06.2019 | 29.07.2019 14:45 | |
13. | Tobias Bürger | Profibus | 26.06.2019 | 30.07.2019 14:00 | |
14. | Robin Peters | Profibus | 26.06.2019 | 30.07.2019 14:45 | |
20. | Simon Selg | Automotive Network Security | 26.06.2019 | 30.07.2019 11:15 | |
19 | Frederic Wolf | Frequency CANBUS | 26.06.2019 | 30.07.2019 10:30 | |
12 | Michael Hartmann | Control Networks | 26.06.2019 | 30.07.2019 09:45 | |
18a | Philipp George | 5G | 26.06.2019 | 30.07.2019 15:30 | |
18b | Matthias Eberle | 5G | 26.06.2019 | 30.07.2019 16:15 | |
11 | Maxim Liashenko | AIMD Charging | 10.07.2019 | 30.07.2019 09:00 | |
15. | Katharina Kornmeier | Impossibiltity of Distributed Consensus | 10.07.2019 | 29.07.2019 15:30 | |
16. | Lukas Berger | Byzantine Generals Problems | 10.07.2019 | 29.07.2019 16:15 |
Organisation
Registrieren Sie sich zur Veranstaltung online und ebenfalls im ILIAS-System.
Termin | Name | Thema | |
24.04.2019, 16:15, | Schindelhauer | Vorstellung | |
08.05.2019, 16:15 | Schindelhauer | Wie funktioniert Wissenschaft | |
15.05.2019, 16:15 | Schindelhauer | Lesen und Präsentieren wissenschaftlicher Arbeiten | |
22.05.2019, 16:15 | Schindelhauer | Wissenschaftliche Ethik und Fehlverhalten | |
29.05.2019, 16:15 | - optional - | Fragestunde | |
19.06.2019, 16:15 | NN1, NN2, NN3, NN4, NN5, NN6 | Sechs Kickoffvorträge | |
26.06.2019, 16:15 | NN7, NN8,NN9, NN10, NN11, NN12 | Sechs Kickoffvorträge | |
03.07.2019, 16:15 | NN13 | Vier Kickoffvorträge | |
29.07.2019, 09:15-12:15 | vier Vorträge | 052-02-017 | |
29.07.2019, 14:00-17:00 | vier Vorträge | 052-02-017 | |
30.07.2019, 09:15-12:00 | vier Vorträge | 052-02-017 | |
30.07.2019, 14:00-17:00 | vier Vorträge | 052-02-017 |
Seminar
- Kickoff presentations tba
- Blockseminar 29.-30.07.2019