17th GI/ITG Conference on Communication in Distributed Systems (KiVS 11)
|
|
|
- Margery Elfreda Curtis
- 10 years ago
- Views:
Transcription
1 17th GI/ITG Conference on Communication in Distributed Systems (KiVS 11) 17. GI/ITG Fachtagung Kommunikation in Verteilten Systemen, March 8 11, 2011, Kiel, Edited by Norbert Luttenberger Hagen Peters OA S I c s Vo l. 1 7 K i V S 1 1 w w w. d a g s t u h l. d e / o a s i c s
2 Editors Norbert Luttenberger, Hagen Peters Institut für Informatik Christian-Albrechts-Universität zu Kiel {nl hap}informatik.uni-kiel.de ACM Classification 1998 C.2.4 Distributed Systems ISBN Published online and open access by Schloss Dagstuhl Leibniz Zentrum für Informatik ggmbh, Dagstuhl Publishing, Saarbrücken/Wadern,. Publication date March, Bibliographic information published by the Deutsche Nationalbibliothek The Deutsche Nationalbibliothek lists this publication in the Deutsche Nationalbibliografie; detailed bibliographic data are available in the Internet at License This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported license: In brief, this license authorizes each and everybody to share (to copy, distribute and transmit) the work under the following conditions, without impairing or restricting the author s moral rights: Attribution: The work must be attributed to its authors. Noncommercial: The work may not be used for commercial purposes. No derivation: It is not allowed to alter or transform this work. The copyright is retained by the corresponding authors. Digital Object Identifier: /OASIcs.KiVS.2011.i ISBN ISSN
3 iii OASIcs OpenAccess Series in Informatics OASIcs aims at a suitable publication venue to publish peer-reviewed collections of papers emerging from a scientific event. OASIcs volumes are published according to the principle of Open Access, i.e., they are available online and free of charge. Editorial Board Dorothea Wagner (Karlsruhe Institute of Technology) ISSN K i V S 1 1
4
5 Preface Our world is in its public and private spheres, and equally in its economic, political and cultural domains more and more affected and influenced by the permanent availability of a huge variety of different kinds of information. It seems natural that in this world communication itself, communication in all its facets (i.e. from bearer networks over endsystems to information syntax and semantics) is undergoing a fundamental process of change a process of change that, though being a constant, is only seldom of such fundamental depth as can be observed today in the networking and communications arena. Network providers around the world have started to consolidate their infrastructure into All-IP networks. The well-beloved Plain Old Telephone System is going to vanish in the next 10 to 15 years, and its successor is not the long believed-in global ATM network with its controllable QoS, but it is... plain old IP! (Is POIP being the new abbreviation that we have to teach to our students?) This process is as ambitious as chancy, but seems to be inevitable when regarding the ever increasing data streams that cross the Internet. Present-day mobile endsystems incorporate capabilities that until yesterday have been reserved to devices that find themselves on desks, but not in pockets. Smart environments hosting ubiquitous computing devices let people experience the world as both a real and a virtual "thing" at the same time. And no doubt: It is the virtual side that today fascinates most people! The emphatic acceptance of the new species of devices lets us easily speculate on even faster, more powerful devices tomorrow. Upper layers functions (Yes the authors of these lines are strong followers of ISO s OSI reference model!), though never fully spelt out in the Internet world, are re-animated and augmented in new shape, being called the Semantic Web Layer Cake, where the somewhat disrespectful "cake" seems to reflect the wish for a less bureaucratic kind of architecture definition, something more homebrew. Related efforts strive to bring "better" information to people and even let machines do the information provisioning work. The goal is still very far, but semantic technologies are available today that provide a sound base to build upon. Only the ongoing security and privacy problems seem to be a permanent companion on the path to a new communications world. He/she changes face, but we seem unable to get rid of this nasty free rider... KiVS 11 reflects several aspects of these world trends, and KiVS 11 does it on a highquality level. From 55 submissions, the program committee accepted 14 papers as full papers, 5 as short papers, and 4 as industry papers. This careful selection ensures that KiVS is going to stay the most important conference on all kinds of communication-related matters in the German-speaking countries. Though KiVS focus is clearly on contributions from these countries, it takes another step to becoming more international: The conference proceedings are published in Open Access format for the first time, which makes them easily accessible via the Internet, and English is the only accepted language for the proceedings. KiVS 11 for the first time hosts an Industry Track. This is to show the close intertwining between academic and industrial research. The publishers think that this track should also enhance further KiVS conferences. We thank all authors for their efforts in providing their input and hope that both scientific and personal discussions during the conference are rewarding for all participants. 17th GI/ITG Conference on Communication in Distributed Systems (KiVS 11). Editors: Norbert Luttenberger, Hagen Peters OpenAccess Series in Informatics Schloss Dagstuhl Leibniz-Zentrum für Informatik, Dagstuhl Publishing,
6
7 Contents Full Papers The Scope of the IBGP Routing Anomaly Problem Uli Bornhauser, Peter Martini, and Martin Horneffer A Reputation-Based Approach to Self-Adaptive Service Selection Jan Sudeikat, Wolfgang Renz, Ante Vilenica, and Winfried Lamersdorf A Service-Oriented Operating System and an Application Development Infrastructure for Distributed Embedded Systems Martin Lipphardt, Nils Glombitza, Jana Neumann, Christian Werner, and Stefan Fischer An adaptive protocol for distributed beamforming Stephan Sigg and Michael Beigl Web Workload Generation According to the UniLoG Approach Andrey W. Kolesnikov and Bernd E. Wolfinger Improving Markov-based TCP Traffic Classification Gerhard Münz, Stephan Heckmüller, Lothar Braun, and Georg Carle IT Management Using a Heavyweight CIM Ontology Andreas Textor, Jeanne Stynes, and Reinhold Kroeger TOGBAD-LQ - Using Challenge-Response to Detect Fake Link Qualities Elmar Gerhards-Padilla, Nils Aschenbruck, and Peter Martini Avoiding Publication and Privatization Problems on Software Transactional Memory Holger Machens and Volker Turau A Resilient and Energy-saving Incentive System for Resource Sharing in MANETs Holger Teske, Jochen Furthmüller, and Oliver P. Waldhorst Supporting Cooperative Traffic Information Systems through Street-Graph-based Peer-to-Peer Networks Jedrzej Rybicki, Benjamin Pesch, Martin Mauve, and Björn Scheuermann Distributed Probabilistic Network Traffic Measurements Alexander Marold, Peter Lieven, and Björn Scheuermann A Feasibility Check for Geographical Cluster Based Routing under Inaccurate Node Localization in Wireless Sensor Networks Hannes Frey and Ranjith Pillay An Arbitrary 2D Structured Replica Control Protocol Robert Basmadjian and Hermann de Meer Short Papers Resolving Conflicts in Highly Reactive Teams Hendrik Skubch, Daniel Saur, and Kurt Geihs th GI/ITG Conference on Communication in Distributed Systems (KiVS 11). Editors: Norbert Luttenberger, Hagen Peters OpenAccess Series in Informatics Schloss Dagstuhl Leibniz-Zentrum für Informatik, Dagstuhl Publishing,
8 viii Contents A Privacy-Preserving Social P2P Infrastructure for People-Centric Sensing Michael Dürr and Kevin Wiesner Optimization-based Secure Multi-hop Localization in Wireless Ad Hoc Networks Sander Wozniak, Tobias Gerlach, and Guenter Schaefer Efficient Distributed Intrusion Detection applying Multi Step Signatures Michael Vogel and Sebastian Schmerl Node Degree based Improved Hop Count Weighted Centroid Localization Algorithm Rico Radeke and Stefan Türk Industry Papers Automated generic integration of flight logbook data into aircraft maintenance systems Oliver Hunte, Carsten Kleiner, Uwe Koch, Arne Koschel, Björn Koschel, and Stefan Nitz Alister Programmable Logic Controllers in Railway Interlocking Systems for Regional Lines of the DB Netze AG Reiner Saykowski, Elferik Schultz, and Joachim Bleidiessel Browser as a Service (BaaS): Security and Performance Enhancements for the Rich Web Nils Gruschka and Luigi Lo Iacono Model Driven Development of Distributed Business Applications Wolfgang Goerigk Summaries of Prize-Winning Theses A Mobility Model for the Realistic Simulation of Social Context Daniel Fischer Anonymous Communication in the Digital World Andriy Panchenko Optimized DTN-Routing for Urban Public Transport Systems Tobias Pögel A Novel Algorithm for Distributed Dynamic Interference Coordination in Cellular Networks Marc C. Necker Does Proactive Secret Sharing Perform in Peer-to-Peer Systems? Nicolas C. Liebau, Andreas U. Mauthe, Vasilios Darlagiannis, and Ralf Steinmetz 239
9 List of Authors Nils Aschenbruck University of Bonn - Institute of Computer Science 4, Kurt Geihs Distributed Systems, Universität Kassel, Robert Basmadjian University of Passau, Department of Computer Network and Communication, Michael Beigl TecO, Chair for Pervasive Computing Systems, Karlsruhe Institute of Technology (KIT), Joachim Bleidiessel Funkwerk Information Technologies GmbH, Uli Bornhauser University of Bonn Institute of Computer Science 4, Lothar Braun Network Architectures and Services, Technische Universität München, Georg Carle Network Architectures and Services, Technische Universität München, Vasilios Darlagiannis Informatics and Telematics Institute, Centre for Research and Technology Hellas, Greece Michael Dürr Mobile and Distributed Systems Group, Institute for Informatics, Ludwig-Maximilians-Universität, Stefan Fischer Institute of Telematics, University of Lübeck, Daniel Fischer SAP AG, Hannes Frey University of Paderborn, Elmar Gerhards-Padilla University of Bonn - Institute of Computer Science 4, Tobias Gerlach Operations Research and Stochastics Research Group, Ilmenau University of Technology, Nils Glombitza Institute of Telematics, University of Lübeck, Wolfgang Goerigk b+m Informatik AG, Nils Gruschka NEC Laboratories Europe, Stephan Heckmüller Telecommunications and Computer Networks, Universität Hamburg, Martin Horneffer Deutsche Telekom AG Technical Engineering Center, Oliver Hunte Fachhochschule Hannover, Fakultät IV (Wirtschaft und Informatik), Luigi Lo Iacono European University of Applied Sciences (EUFH), Carsten Kleiner Fachhochschule Hannover, Fakultät IV (Wirtschaft und Informatik), Uwe Koch Fachhochschule Hannover, Fakultät IV (Wirtschaft und Informatik), Jochen Furthmüller Institute of Telematics, Karlsruhe Institute of Technology, Andrey W. Kolesnikov University of Hamburg, Department of Informatics, 17th GI/ITG Conference on Communication in Distributed Systems (KiVS 11). Editors: Norbert Luttenberger, Hagen Peters OpenAccess Series in Informatics Schloss Dagstuhl Leibniz-Zentrum für Informatik, Dagstuhl Publishing,
10 x Authors Björn Koschel edatasystems GmbH, Arne Koschel Fachhochschule Hannover, Fakultät IV (Wirtschaft und Informatik), Reinhold Kroeger RheinMain University of Applied Sciences, Distributed Systems Lab, Winfried Lamersdorf Distributed Systems and Information Systems, Computer Science Department, University of Hamburg, Nicolas C. Liebau Multimedia Communications Lab, Technische Universität Darmstadt, Peter Lieven Heinrich Heine University Düsseldorf, Mobile and Decentralized Networks Group, Martin Lipphardt Institute of Telematics, University of Lübeck, Gerhard Münz Network Architectures and Services, Technische Universität München, Marc C. Necker Institute of Communication Networks and Computer Engineering, University of Stuttgart, Jana Neumann Institute of Information Systems, University of Lübeck, Stefan Nitz Fachhochschule Hannover, Fakultät IV (Wirtschaft und Informatik), Andriy Panchenko Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Luxembourg Benjamin Pesch Institute of Computer Science, Heinrich Heine University Düsseldorf, Ranjith Pillay Amrita Vishwa Vidyapeetham, India Holger Machens Hamburg University of Technology, Institute of Telematics, Alexander Marold University of Duisburg-Essen, Institute for Experimental Mathematics, Peter Martini University of Bonn Institute of Computer Science 4, Andreas U. Mauthe Computing Department, Lancaster University, United Kingdom Martin Mauve Institute of Computer Science, Heinrich Heine University Düsseldorf, Hermann de Meer University of Passau, Department of Computer Network and Communication, Tobias Pögel Institute of Operating Systems and Computer Networks, Technische Universität Braunschweig, Rico Radeke Technische Universität Dresden, Chair for Telecommunications, Wolfgang Renz Multimedia Systems Laboratory, Hamburg University of Applied Sciences, Jedrzej Rybicki Institute of Computer Science, Heinrich Heine University Düsseldorf, Daniel Saur Distributed Systems, Universität Kassel, Reiner Saykowski Funkwerk Information Technologies GmbH,
11 Authors xi Guenter Schaefer Telematics and Computer Networks Research Group, Ilmenau University of Technology, Björn Scheuermann Heinrich Heine University Düsseldorf, Mobile and Decentralized Networks Group, Sebastian Schmerl Brandenburg University of Technology, Elferik Schultz Funkwerk Information Technologies GmbH, Stephan Sigg TecO, Chair for Pervasive Computing Systems, Karlsruhe Institute of Technology (KIT), Hendrik Skubch Distributed Systems, Universität Kassel, Ralf Steinmetz Multimedia Communications Lab, Technische Universität Darmstadt, Ante Vilenica Distributed Systems and Information Systems, Computer Science Department, University of Hamburg, Michael Vogel Brandenburg University of Technology, Oliver P. Waldhorst Institute of Telematics, Karlsruhe Institute of Technology, Christian Werner Institute of Telematics, University of Lübeck, Kevin Wiesner Mobile and Distributed Systems Group, Institute for Informatics, Ludwig-Maximilians-Universität, Bernd E. Wolfinger University of Hamburg, Department of Informatics, Sander Wozniak Telematics and Computer Networks Research Group, Ilmenau University of Technology, Jeanne Stynes Cork Institute of Technology, Department of Computing, Ireland Jan Sudeikat Multimedia Systems Laboratory, Hamburg University of Applied Sciences, Holger Teske Institute of Telematics, Karlsruhe Institute of Technology, Andreas Textor RheinMain University of Applied Sciences, Distributed Systems Lab, Volker Turau Hamburg University of Technology, Institute of Telematics, Stefan Türk Technische Universität Dresden, Chair for Telecommunications, K i V S 1 1
How To Write A Blog Post On Distributed Systems
17th GI/ITG Conference on Communication in Distributed Systems (KiVS 11) 17. GI/ITG Fachtagung Kommunikation in Verteilten Systemen, March 8 11, 2011, Kiel, Germany Edited by Norbert Luttenberger Hagen
Visualization of Large and Unstructured Data Sets Applications in Geospatial Planning, Modeling and Engineering
Visualization of Large and Unstructured Data Sets Applications in Geospatial Planning, Modeling and Engineering IRTG 1131 Workshop, March 19 21, 2010, Bodega Bay, U.S. Edited by Ariane Middel Inga Scheler
Embedded Internet and the Internet of Things WS 12/13
Embedded Internet and the Internet of Things WS 12/13 0. Organizational Prof. Dr. Mesut Güneş Distributed, embedded Systems (DES) Institute of Computer Science Freie Universität Berlin Prof. Dr. Mesut
Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks
Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental
1. MSc Communication and Media Engineering (CME) University of Applied Sciences Offenburg
1. MSc Communication and Media Engineering (CME) University of Applied Sciences Offenburg 2. M.Sc. Computer Science with Media Applications Brandenburg University of Applied Sciences 3. M.Sc. Digital Media
New Scholarships 2005 - New Scholarships 2005
New Scholarships 2005 - New Scholarships 2005 DAAD-SIEMENS SCHOLARSHIP PROGRAM ASIA 21st CENTURY GERMAN ACADEMIC EXCHANGE SERVICE Deutscher Akademischer Austausch-Dienst (DAAD) Bonn and SIEMENS AG Munich
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
10 Signaling Protocols for Multimedia Communication
Outline (Preliminary) 1. Introduction and Motivation 2. Digital Rights Management 3. Cryptographic Techniques 4. Electronic Payment Systems 5. Multimedia Content Description Part I: Content-Oriented Base
A General-purpose Laboratory for Large-scale Botnet Experiments
A General-purpose Laboratory for Large-scale Botnet Experiments Thomas Barabosch, Sebastian Eschweiler, Mohammad Qasem, Daniel Panteleit, Daniel Plohmann and Elmar Gerhards-Padilla Cyber Defense Fraunhofer
Operations and Technology Management. Volume 12
Operations and Technology Management Volume 12 High-Performance Logistics Methods and Technologies Edited by Thorsten Blecker, Wolfgang Kersten and Matthias Meyer With Contributions by Hatem Aldarrat,
Unit 3 - Advanced Internet Architectures
Unit 3 - Advanced Internet Architectures Carlos Borrego Iglesias, Sergi Robles [email protected],[email protected] Departament d Enginyeria de la Informació i de les Comunicacions Universitat Autònoma
How To Analyse The Edonkey 2000 File Sharing Network
The edonkey File-Sharing Network Oliver Heckmann, Axel Bock, Andreas Mauthe, Ralf Steinmetz Multimedia Kommunikation (KOM) Technische Universität Darmstadt Merckstr. 25, 64293 Darmstadt (heckmann, bock,
LIST OF FIGURES. Figure No. Caption Page No.
LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS
GECO: Automatic Generator-Composition for (Aspect-oriented) DSLs
GECO: Automatic Generator-Composition for (Aspect-oriented) DSLs Doctoral Symposium Reiner Jung Christian-Albrechts-Universität zu Kiel Institut für Informatik 26.02.2014 Domain-specific Languages Motivation
Masters in Human Computer Interaction
Masters in Human Computer Interaction Programme Requirements Taught Element, and PG Diploma in Human Computer Interaction: 120 credits: IS5101 CS5001 CS5040 CS5041 CS5042 or CS5044 up to 30 credits from
Masters in Advanced Computer Science
Masters in Advanced Computer Science Programme Requirements Taught Element, and PG Diploma in Advanced Computer Science: 120 credits: IS5101 CS5001 up to 30 credits from CS4100 - CS4450, subject to appropriate
Masters in Artificial Intelligence
Masters in Artificial Intelligence Programme Requirements Taught Element, and PG Diploma in Artificial Intelligence: 120 credits: IS5101 CS5001 CS5010 CS5011 CS4402 or CS5012 in total, up to 30 credits
TOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
Masters in Computing and Information Technology
Masters in Computing and Information Technology Programme Requirements Taught Element, and PG Diploma in Computing and Information Technology: 120 credits: IS5101 CS5001 or CS5002 CS5003 up to 30 credits
Masters in Networks and Distributed Systems
Masters in Networks and Distributed Systems Programme Requirements Taught Element, and PG Diploma in Networks and Distributed Systems: 120 credits: IS5101 CS5001 CS5021 CS4103 or CS5023 in total, up to
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
SECURITY AND QUALITY OF SERVICE IN AD HOC WIRELESS NETWORKS
SECURITY AND QUALITY OF SERVICE IN AD HOC WIRELESS NETWORKS Ensuring secure transmission and good quality of service (QoS) are key commercial concerns in ad hoc wireless networks as their application in
Pragmatic Web 4.0. Towards an active and interactive Semantic Media Web. Fachtagung Semantische Technologien 26.-27. September 2013 HU Berlin
Pragmatic Web 4.0 Towards an active and interactive Semantic Media Web Prof. Dr. Adrian Paschke Arbeitsgruppe Corporate Semantic Web (AG-CSW) Institut für Informatik, Freie Universität Berlin [email protected]
OPNET Network Simulator
Simulations and Tools for Telecommunications 521365S: OPNET Network Simulator Jarmo Prokkola Research team leader, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,
Network Security A Decision and Game-Theoretic Approach
Network Security A Decision and Game-Theoretic Approach Tansu Alpcan Deutsche Telekom Laboratories, Technical University of Berlin, Germany and Tamer Ba ar University of Illinois at Urbana-Champaign, USA
Uli Bornhauser - Peter Martini - Martin Horneffer Scalability of ibgp Path Diversity Concepts
Uli Bornhauser - Peter Martini - Martin Horneffer Scalability of ibgp Path Diversity Concepts 10.05.2011 p. 1 Scalability of ibgp Path Diversity Concepts - Computer Science 4, University of Bonn - Networking
Doctor of Philosophy in Computer Science
Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects
Visualization of Large and Unstructured Data Sets
Hans Hagen, Andreas Kerren, Peter Dannenmann (Eds.) Visualization of Large and Unstructured Data Sets First workshop of the DFG s International Research Training Group Visualization of Large and Unstructured
CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS
International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan
Master of Science in Computer Science
Master of Science in Computer Science Background/Rationale The MSCS program aims to provide both breadth and depth of knowledge in the concepts and techniques related to the theory, design, implementation,
Network Security. Chapter 1 Introduction. Network Security IN2101. Georg Carle. Course organization
Chair for Network Architectures and Services Institute for Informatics TU München Prof. Carle Network Security IN101 Prof. Dr.-Ing. Georg Carle Dipl.-Inform. Ali Fessi Institut für Informatik Technische
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor
Components and Concepts of the Ambient Networks Architecture
Components and Concepts of the Ambient Networks Architecture Andreas Schieder, Ericsson Deutschland GmbH, Ericsson Allee 1, 52134 Herzogenrath, Germany Lars Eggert, NEC Europe Ltd., Network Laboratories,
CS144R/244R Network Design Project on Software Defined Networking for Computing
CS144R/244R Network Design Project on Software Defined Networking for Computing (introduction and course overview) 9/2/2015 Instructor: Professor HT Kung Harvard Paulson School of Engineering and Applied
Industrie 4.0. Towards a Holistic Approach for Cyber Safety and Security
Industrie 4.0 Towards a Holistic Approach for Cyber Safety and Security Prof. Dr.-Ing. Reiner Anderl Marco Grimm, M.Sc. Datenverarbeitung in der Konstruktion (DiK) Fachbereich Maschinenbau Technische Universität
Masters in Information Technology
Computer - Information Technology MSc & MPhil - 2015/6 - July 2015 Masters in Information Technology Programme Requirements Taught Element, and PG Diploma in Information Technology: 120 credits: IS5101
IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper
IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and
Re-optimization of Rolling Stock Rotations
Konrad-Zuse-Zentrum für Informationstechnik Berlin Takustraße 7 D-14195 Berlin-Dahlem Germany RALF BORNDÖRFER 1, JULIKA MEHRGARDT 1, MARKUS REUTHER 1, THOMAS SCHLECHTE 1, KERSTIN WAAS 2 Re-optimization
List of Projects in Application
List of Projects in Application S-Logix #9, First Floor, Krishnabai St, Habibullah Road T.Nagar, Chennai-600017 (Opp:HDFC Bank) Ph:28343467 Mobile: 8124001111, 9710999001 E-Mail: [email protected]
Combining the INTERNET of THINGS and the INTERNET of SERVICES
On RFID Conference and Exhibition LAGOAS PARK, LISBON Combining the INTERNET of THINGS and the INTERNET of SERVICES Dr. Joachim Schaper Vice President SAP Research EMEA, SAP AG Agenda 1 2 3 4 5 The VISION
Network Virtualization and Energy Efficiency
Network Virtualization and Energy Efficiency University of Passau Gergö Lovász, Andreas Fischer, and Hermann de Meer Outline 1. Power Consumption of ICT 2. Economic Principle and Energy Efficiency Benchmarks
Simulation and Evaluation of Computer Networks. 00. Preliminaries. Who is who TK What do we do. Organizational Issues. Rough time line Examination
Simulation and Evaluation of Computer Networks 00. Preliminaries Who is who TK What do we do Organizational Issues Rough time line Examination SS 14 Fachbereich Informatik Telecooperation Group SECoN Mathias
Master of Science (Electrical Engineering) MS(EE)
Master of Science (Electrical Engineering) MS(EE) 1. Mission Statement: The mission of the Electrical Engineering Department is to provide quality education to prepare students who will play a significant
How To Teach Computer Science
EIT ICT Labs Master Programme Internet Technology and Architecture (ITA) The ITA master is a new European two-year master programme within the EIT master school ICT Innovation. The aim of the EIT (European
Concept and Project Objectives
3.1 Publishable summary Concept and Project Objectives Proactive and dynamic QoS management, network intrusion detection and early detection of network congestion problems among other applications in the
ROS-INDUSTRIAL. Technologies, Trends, Applications
FRAUNHOFER INSTITUTe FoR Manufacturing engineering and Automation IPA Conference June 9, 2015 ROS-INDUSTRIAL Technologies, Trends, Applications Preface The Event at a Glance Established already in robotics
Frank Peter Helmus. Process Plant Design. Project Management from Inquiry to Acceptance. Translated by Christine Ahner
Frank Peter Helmus Process Plant Design Project Management from Inquiry to Acceptance Translated by Christine Ahner Frank Peter Helmus Process Plant Design Further Reading Vogel, G. H. Process Development
CSE 3461 / 5461: Computer Networking & Internet Technologies
Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2
Global Logistics Management
Global Logistics Management Sustainability, Quality, Risks Edited by Wolfgang Kersten, Thorsten Blecker, and Heike Flämig With Contributions by Adel Al-Mansi, Hatem Aldarrat, Dagoberto Alves de Almeida,
10CS64: COMPUTER NETWORKS - II
QUESTION BANK 10CS64: COMPUTER NETWORKS - II Part A Unit 1 & 2: Packet-Switching Networks 1 and Packet-Switching Networks 2 1. Mention different types of network services? Explain the same. 2. Difference
DAAD Deutscher Akademischer Austausch Dienst German Academic Exchange Service
DAAD Deutscher Akademischer Austausch Dienst German Academic Exchange Service Siemens / DAAD Post Graduate Program Research Grants for Foreign Graduates 2007 / 2008 Working together in offering the "Siemens
How To Understand And Understand Rwth Aachen University
A short introduction to RWTH Location of RWTH Aachen University RWTH Mainbuilding Development of RWTH Aachen University until 2004 Students Foreign Students Polytechnical School Faculty of Architecture
Fundamentals of Mobile and Pervasive Computing
Fundamentals of Mobile and Pervasive Computing Frank Adelstein Sandeep K. S. Gupta Golden G. Richard III Loren Schwiebert Technische Universitat Darmstadt FACHBEREICH INFORMATIK B1BLIOTHEK Inventar-Nr.:
An Approach for Knowledge-Based IT Management of Air Traffic Control Systems
An Approach for Knowledge-Based IT Management of Air Traffic Control Systems Fabian Meyer, Reinhold Kroeger RheinMain University of Applied Sciences D-65195 Wiesbaden, Germany {firstname.lastname}@hs-rm.de
SBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India
3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India Call for Papers Cloud computing has emerged as a de facto computing
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
for High Performance Computing
Technische Universität München Institut für Informatik Lehrstuhl für Rechnertechnik und Rechnerorganisation Automatic Performance Engineering Workflows for High Performance Computing Ventsislav Petkov
The necessity of multicast for IPTV streaming
The necessity of multicast for IPTV streaming ARIANIT MARAJ, ADRIAN SHEHU Telecommunication Department Faculty of Information Technology, Polytechnic University of Tirana Tirana, Republic of Albania [email protected],
18th IEEE Conference on Business Informatics Call for Papers
18th IEEE Conference on Business Informatics Call for Papers Paris, France, 29 th August 1 st September 2016 http://cbi2016.cnam.fr/ Important Dates Mandatory abstract submission: April 26, 2016 (extended)
Mobile and Sensor Systems
Mobile and Sensor Systems Lecture 1: Introduction to Mobile Systems Dr Cecilia Mascolo About Me In this course The course will include aspects related to general understanding of Mobile and ubiquitous
Service-Oriented Architecture as an Integrative Backbone for Cyber Physical Systems
Service-Oriented Architecture as an Integrative Backbone for Cyber Physical Systems Summary of Main Findings of the Manufuture 13 Stamatis Karnouskos Input from Manufuture 2013 Session Presentations: Rolf
Influences of Communication Disruptions on Decentralized Routing in Transport Logistics
Influences of Communication Disruptions on Decentralized Routing in Transport Logistics Bernd Scholz-Reiter, Christian Zabel BIBA Bremer Institut für Produktion und Logistik GmbH University of Bremen Hochschulring
Steinbuch Centre for Computing (SCC) The Information Technology Centre of KIT
Steinbuch Centre for Computing (SCC) The Information Technology Centre of KIT SCIENTIFIC COMPUTING, HPC AND GRIDS KIT the cooperation of Forschungszentrum Karlsruhe GmbH and Universität Karlsruhe (TH)
Contents. Biography. Acknowledgments. List of Abbreviations. List of Symbols
Contents Biography Preface Acknowledgments List of Abbreviations List of Symbols xi xiii xvii xix xxvii 1 Introduction 1 1.1 Cellular Mobile Communication Systems 1 1.1.1 The Cellular Concept 2 1.1.2 Propagation
Smart Data Innovation Lab (SDIL)
Smart Data Innovation Lab (SDIL) Accelerating Data driven Innovation NESSI Summit May 27, 2014 Prof. Dr.-Ing. Michael Beigl Department of Informatics KIT University of the State of Baden-Wuerttemberg and
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Ernesto Jiménez Caballero Helsinki University of Technology [email protected] Abstract intrusion detection
GASPI A PGAS API for Scalable and Fault Tolerant Computing
GASPI A PGAS API for Scalable and Fault Tolerant Computing Specification of a general purpose API for one-sided and asynchronous communication and provision of libraries, tools, examples and best practices
Towards Open Urban Platforms for Smart Cities and Communities. Memorandum of Understanding
Towards Open Urban Platforms for Smart Cities and Communities Memorandum of Understanding 1. Outline of this Memorandum 1.1. The market for current Urban Platform(s) is fragmented and uncertain on the
PRIMIUM Process Innovation for Enterprise Software
Armin Heinzl, Peter Dadam, Stefan Kirn, Peter Lockemann (Eds.) PRIMIUM Process Innovation for Enterprise Software 15.04.2009 in Mannheim, Germany Gesellschaft für Informatik e.v. (GI) Lecture Notes in
Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 4 (2014), pp. 381-388 Research India Publications http://www.ripublication.com/aeee.htm Security and Privacy Issues in Wireless
Kommunikationsdienste im Internet Möglichkeiten und Risiken
Die Zukunft der Kommunikationsdienste im Internet Möglichkeiten und Risiken Erwin P. Rathgeb Technik der Rechnernetze, Universität Duisburg-Essen Jochen Kögel, Marc Barisch IKR, Universität Stuttgart Steffen
How a German Technical University interacts with the (Railway) Industry
Faculty of Transportation and Traffic Sciences Friedrich List, Institute of Railway Systems and Public Transport How a German Technical University interacts with the (Railway) Industry - Some Overall Aspects
Internet Anonymity and the Design Process - A Practical Approach
anon.next: A Framework for Privacy in the Next Generation Internet Matthew Wright Department of Computer Science and Engineering, The University of Texas at Arlington, Arlington, TX, USA, [email protected],
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software
53. IWK Internationales Wissenschaftliches Kolloquium International Scientific Colloquium
PROCEEDINGS 53. IWK Internationales Wissenschaftliches Kolloquium International Scientific Colloquium Faculty of Mechanical Engineering... PROSPECTS IN MECHANICAL ENGINEERING 8-12 September 2008 www.tu-ilmenau.de
PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA
International Research Journal of Engineering and Technology (IRJET) e-issn: -00 Volume: 0 Issue: 0 Oct-01 www.irjet.net p-issn: -00 PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET
Towards Modeling and Transformation of Security Requirements for Service-oriented Architectures
Towards Modeling and Transformation of Security Requirements for Service-oriented Architectures Sven Feja 1, Ralph Herkenhöner 2, Meiko Jensen 3, Andreas Speck 1, Hermann de Meer 2, and Jörg Schwenk 3
School of Computer Science
School of Computer Science Head of School Professor S Linton Taught Programmes M.Sc. Advanced Computer Science Artificial Intelligence Computing and Information Technology Information Technology Human
Internet of Things (IoT): A vision, architectural elements, and future directions
SeoulTech UCS Lab 2014-2 st Internet of Things (IoT): A vision, architectural elements, and future directions 2014. 11. 18 Won Min Kang Email: [email protected] Table of contents Open challenges
Protocols and Architectures for Wireless Sensor Netwoks. by Holger Karl and Andreas Willig
Protocols and Architectures for Wireless Sensor Netwoks by Holger Karl and Andreas Willig Grade Midterm Exam. 25% Exercises 35% (5 ~ 7 times) Term Project 30% Class Attitude 10% 2 Ad hoc and Sensor Networks
Car-to-Car Communication
Car-to-Car Communication Stephan Eichler #, Christoph Schroth and Jörg Eberspächer # # Institute of Communication Networks, Technische Universität München, München, Germany Institute of Media and Communication
