Navigation auf uzh.ch

Suche

Department of Informatics - Communication Systems Group

Timing and Organization

  • Organization
  • Topics

Organization

The slides (PDF, 1 MB) shown during the seminar introduction summarize important thematic and organizational aspects of this seminar. Consider in addition the following material:

  • Guideline (in German) to write a written seminar report* (A new version will appear soon.): This document contains on just two pages a summary of the most relevant information on how to structure a report, on style in writing, and on the rules of how to reference and cite in a correct as well as complete way. All students are required to take these guidelines carefully into account when preparing the seminar report..
  • Seminar procedures (PDF, 187 KB): This document lists seminar procedures such as delivery deadlines or requirements on moderated discussions. Students have to fulfill all mandatory criteria mentioned in the PDF and they have to be present in all (minus one) seminar dates in order to pass the seminar.
  • For the seminar report, a LaTeX template (ZIP, 330 KB)* is provided. Its use is mandatory.

Topics

The detailed description for the subsequently listed seminar topics is made available for download in PDF format here (PDF, 158 KB)

Talk Title Student / Speaker Supervisor Date
1 A Virtualized/Containerized Radio Access Network as a Foundation for Multi-Radio Access Technology Communication Systems Florian Herzog Eryk Schiller March 17
2

A Technical Overview of Blockchain Retroactive Public Funding Schemes

Lynn Zumtaugwald, Dario Gagulic Dr. Bruno Rodrigues March 24
3

A Survey of Non-Fungible Token Use-Cases and Their Technical Standardization

Tumen Dambiev, Marek Gajewski

Christian Killer

March 31
4

Brain-Computer Interfaces: Overview and Application Scenarios

Szymon Dominik Modrzynski, Zeen Wang  Dr. 

Alberto Huertas

April 7
5

Data Plane Programmability: Overview, Abstractions, and Use Cases

Dave Basler, Jason Browne Rafael Ribeiro April 28
6

Digital Sovereignty and the Digital Colonialism: A Technical Discussion Regarding Challenges and the Digital Future of Countries

Jiaming Tong

Muriel Franco

May 5
7

An Overview of Mitigation Techniques for Spoofing Attacks in IoT

Geyu Meng, Zi Ye

Katharina Müller

May 12
8

Threat Hunting: An Overview of Proactive Cybersecurity Methods

Karin Brunner, Heman Tanos

Jan von der Assen

May 19
9

Digital Twins in Networking: Overview and Applications

Sandro Padovan, Igor Sowinski

Éder Scheid

June 2

* These files can be downloaded from within the university network. Please use a VPN client from outside the university network. Information on the VPN setup can be found here.

Weiterführende Informationen

Title

Teaser text