Timing and Organization
- Organization
- Topics
Organization
The slides (PDF, 1 MB) shown during the seminar introduction summarize important thematic and organizational aspects of this seminar. Consider in addition the following material:
- Guideline (in German) to write a written seminar report* (A new version will appear soon.): This document contains on just two pages a summary of the most relevant information on how to structure a report, on style in writing, and on the rules of how to reference and cite in a correct as well as complete way. All students are required to take these guidelines carefully into account when preparing the seminar report..
- Seminar procedures (PDF, 187 KB): This document lists seminar procedures such as delivery deadlines or requirements on moderated discussions. Students have to fulfill all mandatory criteria mentioned in the PDF and they have to be present in all (minus one) seminar dates in order to pass the seminar.
- For the seminar report, a LaTeX template (ZIP, 330 KB)* is provided. Its use is mandatory.
Topics
The detailed description for the subsequently listed seminar topics is made available for download in PDF format here (PDF, 158 KB).
Talk | Title | Student / Speaker | Supervisor | Date |
---|---|---|---|---|
1 | A Virtualized/Containerized Radio Access Network as a Foundation for Multi-Radio Access Technology Communication Systems | Florian Herzog | Eryk Schiller | March 17 |
2 |
A Technical Overview of Blockchain Retroactive Public Funding Schemes |
Lynn Zumtaugwald, Dario Gagulic | Dr. Bruno Rodrigues | March 24 |
3 |
A Survey of Non-Fungible Token Use-Cases and Their Technical Standardization |
Tumen Dambiev, Marek Gajewski |
Christian Killer |
March 31 |
4 |
Brain-Computer Interfaces: Overview and Application Scenarios |
Szymon Dominik Modrzynski, Zeen Wang | Dr.
Alberto Huertas |
April 7 |
5 |
Data Plane Programmability: Overview, Abstractions, and Use Cases |
Dave Basler, Jason Browne | Rafael Ribeiro | April 28 |
6 |
Digital Sovereignty and the Digital Colonialism: A Technical Discussion Regarding Challenges and the Digital Future of Countries |
Jiaming Tong |
Muriel Franco |
May 5 |
7 |
An Overview of Mitigation Techniques for Spoofing Attacks in IoT |
Geyu Meng, Zi Ye |
Katharina Müller |
May 12 |
8 |
Threat Hunting: An Overview of Proactive Cybersecurity Methods |
Karin Brunner, Heman Tanos |
Jan von der Assen |
May 19 |
9 |
Digital Twins in Networking: Overview and Applications |
Sandro Padovan, Igor Sowinski |
Éder Scheid |
June 2 |
* These files can be downloaded from within the university network. Please use a VPN client from outside the university network. Information on the VPN setup can be found here.