Seminar Algorithms for Computer Networks (WS 2020)
News
- Update: 24.02.2020, 9am final meeting with discussion of al presentations
- 1.11.2020: ILIAS page online
- 14.10.2020: web page online
Dates
- 2.11.2020 10:15 – First meeting (password: 6yDKE=PS8) presentation of topics
- 13.11.2020 23:59 deadline for choice of your topic (take survey on ILIAS)
- 16.11.2020 10:15 – Assignment of topics to students via Zoom (Meeting-ID: 857 4959 3754, Kenncode: 6yDKE=PS8)
- 20.12.2020 Deadline for report
- 24.01.2021 Deadline for video
- 24.02.2020, 9am block seminar date for discussion of videos
Contents
We discuss up-to-date topics of distributed algorithms, cryptography, coding theory, and wireless communication.
- Cryptography
- Dijk, Gentry, Halevi, and Vaikuntanathan, "Fully homomorphic encryption over the integers", Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2010. link
- "Fully Homomorphic Encryption over the Integers with Shorter Public Keys", Coron, Mandal, Naccache, and Tibouchi, Annual Cryptology Conference, 2011. link
- M. Ajtai. Generating hard instances of lattice problems. In Complexity of computations and proofs, volume 13 of Quad. Mat., pages 1–32. Dept. Math., Seconda Univ. Napoli, Caserta, 2004. Preliminary version in STOC 1996.
- M. Ajtai and C. Dwork. A public-key cryptosystem with worst-case/average-case equivalence. In STOC, pages 284–293. 1997.
- Peikert, Chris. "A decade of lattice cryptography. Foundations and Trends in Theoretical Computer Science 10.4 (2016): 283-424.
- Stabilization, Distributed Systems
- Q. Bramas, T. Masuzawa, S. Tixeuil, Distributed Online Data Aggregation in Dynamic Graphs, in 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), https://ieeexplore.ieee.org/abstract/document/7536583
- C. Gkantsidis, M. Mihail, and A. Saberi, Random Walks in Peer-to-Peer Networks, in IEEE INFOCOM 2004, https://ieeexplore.ieee.org/document/1354487
- A. Miller, A. Pelc, R.N. Yadav, Deterministic Leader Election in Anonymous Radio Networks, in SPAA ’20, July 15–17, 2020, Virtual Event, USA
- I. Jahja, H. Yu, Sublinear Algorithms in T-interval Dynamic Networks, , in SPAA ’20, July 15–17, 2020, Virtual Event, USA
- Xavier Défago, Yuval Emek, Shay Kutten, Toshimitsu Masuzawa, and Yasumasa Tamura, "Communication Efficient Self-Stabilizing Leader Election", DISC 2020
- Shay Kutten, William K. Moses Jr., Gopal Pandurangan, and David Peleg, "Singularly Optimal Randomized Leader Election", DISC 2020
- Wireless Sensor Networks
- Demirkol, Ilker & Ersoy, Cem & Onur, Ertan. (2009). Wake-up receivers for wireless sensor networks: Benefits and challenges. Wireless Communications, IEEE. 16. 88 - 96. 10.1109/MWC.2009.5281260.
- Blanckenstein, Johannes, Jirka Klaue, and Holger Karl. "Energy efficient clustering using a wake-up receiver." European Wireless 2012; 18th European Wireless Conference 2012. VDE, 2012.
- Ait Aoudia, Fayçal, Matthieu Gautier, and Olivier Berder. "OPWUM: Opportunistic MAC protocol leveraging wake-up receivers in WSNs." Journal of sensors 2016 (2016).
- Park, Hyunhee. "Anti-Malicious Attack Algorithm for Low-Power Wake-Up Radio Protocol." IEEE Access 8 (2020): 127581-127592.
- Moody, Roy, Barker, Calhoun, Bowers, "Interference Robust Detector-First Near-Zero Power Wake-Up Receiver, IEEE Journal of Solid-State Circus, Vol 54, No. 8, August 2019
- Localization
- A. A. Ghany, B. Uguen and D. Lemur, "A Parametric TDoA Technique in the IoT Localization Context," 2019 16th Workshop on Positioning, Navigation and Communications (WPNC), Bremen, Germany, 2019, pp. 1-6, doi: 10.1109/WPNC47567.2019.8970254.
- P. Tabaghi, I. Dokmani and M. Vetterli, "Kinetic Euclidean Distance Matrices," in IEEE Transactions on Signal Processing, vol. 68, pp. 452-465, 2020, doi: 10.1109/TSP.2019.2959260.
- O. Jean and A. J. Weiss, "Geolocation by Direction of Arrival Using Arrays With Unknown Orientation," in IEEE Transactions on Signal Processing, vol. 62, no. 12, pp. 3135-3142, June15, 2014, doi: 10.1109/TSP.2014.2321109
- Pratik Biswas, Tzu-Chen Lian, Ta-Chung Wang, and Yinyu Ye. 2006. Semidefinite programming based algorithms for sensor network localization. ACM Trans. Sen. Netw. 2, 2 (May 2006), 188-220. DOI:https://doi.org/10.1145/1149283.1149286
- Ribeiro, F., Florencio, D., Ba, D. and Zhang, C., 2011. Geometrically constrained room modeling with compact microphone arrays. IEEE Transactions on Audio, Speech, and Language Processing, 20(5), pp.1449-1460.
- Acoustic echoes reveal room shape, Ivan Dokmanić, Reza Parhizkar, Andreas Walther, Yue M. Lu, and Martin Vetterli, PNAS July 23, 2013 110 (30) 12186-12191; https://doi.org/10.1073/pnas.1221464110
- Parhizkar, R., Dokmanić, I. and Vetterli, M., 2014, May. Single-channel indoor microphone localization. In 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (pp. 1434-1438). IEEE.
- O. Öçal, I. Dokmanić and M. Vetterli, "Source localization and tracking in non-convex rooms," 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Florence, 2014, pp. 1429-1433, doi: 10.1109/ ICASSP.2014.6853833.
- Students' choices
- Santos, José, et al. "Towards network-aware resource provisioning in kubernetes for fog computing applications." 2019 IEEE Conference on Network Softwarization (NetSoft). IEEE, 2019.
- Peter Corke, Tim Wark, Raja Jurdak, Wen Hu, Philip Valencia, and Darren Moore, "Environmental Wireless Sensor Networks, Digital Object Identifier: 10.1109/JPROC.2010.2068530, Proceedings of the IEEE, Vol. 98, No. 11, November 2010
- Ebert, J.T., Gauci, M., Mallmann-Trenn, F. and Nagpal, R., 2020, May. Bayes bots: collective Bayesian decision-making in decentralized robot swarms. In 2020 IEEE International Conference on Robotics and Automation (ICRA) (pp. 7186-7192). IEEE.
Organisation
Registration online with the University system before and after the presentation of topics. Please register also on the ILIAS-page.
For a successful participation you have to
- Write a written (max) 5 page report (LaTeX) and upload it using ILIAS (1/4) until 20.12.2020.
- Contribute a 30 minute final presentation video during the block seminar until 24.01.2021 or let yourself being recorded at the university with a presentation (contact your supervisor regarding recording date). (1/2)
- Watch all presentation in ILIAS
- Participate in the online block seminar for a 30 minute question round (mandatory) (1/4)
Assignments
The following assignments were chosen respecting the students' choices.
Last name | First name | ILIAS ID | Topic ID | Short title | Supervisor | Contact info |
Herzig | Miriam | mh672 | 1.1. | Homomorphic Encryption | Schindelhauer | cs675 |
Weinmann | Alexander | aw359 | 2.1. | Distributed Online Data Aggregation | Schindelhauer | cs675 |
Grugel | Tobias | tg97 | 2.3. | Deterministic Leader Election | Köhler | sk1140 |
Cagir | Hasan | hc63 | 2.4. | Sublinar Alg. T-interval Dynamic Networks | Köhler | sk1140 |
Holler | Sebastian | sh477 | 2.5. | Commun. Efficient Self-Stab. Leader Elect. | Köhler | sk1140 |
Scherer | Matthias | ms1415 | 2.6. | Singularly Optimal Rand. Leader Elect. | Köhler | sk1140 |
Beck | Marco | mb903 | 3.1. | Wake-up Receivers | Schindelhauer | cs675 |
Sharma | Abhishek | as1597 | 3.4. | Anti-Malicious Attack LP-WU Radio | Schindelhauer | cs675 |
Kordowich | Stefanie | fk193 | 4.2. | Kinetic Euclidean Distance Matrices | Xiong | wx5 |
Seemann | Gerhard | gs103 | 4.5. | Geometrically Constrained Room Modelling | Schindelhauer | cs675 |
Peters | Ludger | lp242 | 4.6. | Acousting Echoes Reveal Room Shape | Schindelhauer | cs675 |
Mattheis | Jürgen | jm622 | 5.1. | Network-aware Kubernetes Fog Computing | Schindelhauer | cs675 |