THURSDAY 4.5.2006 | ||
---|---|---|
8:15 | Registration | |
8:30 | Welcome words | Antti Ylä-Jääski |
8:45 | Voice services and Skype | |
A study of WLAN Roaming and its implications for Voice Services | Sharma | |
Internet Telephony - Security Issues in Skype | Korpi | |
Use of eBays Reputation System in Skype | Silvekoski | |
10:00 | break | |
10:15 | Presence | |
An open standard for instant messaging: eXtensible Messaging and Presence Protocol (XMPP) | Nie | |
Simplifying presence - a survey and a proposal | Sorvakko | |
Advantages and Disadvantages of Using Presence Service | Salinas | |
11:30 | lunch break | |
12:30 | Service management | |
Methodologies for researching the usability of applications within mobile communities | Duran | |
Applying Recent Enhancements in Reputation Based Mechanisms for Promoting Trust in Mobile Communities | Dobrinkat | |
Internet Pricing | Chowdhuru | |
13:45 | break | |
14:00 | SIP and P2P | |
P2P architecture for IP telephony using SIP | Pu | |
A study on interworking between centralized SIP, P2P-SIP and PSTN | Toivanen | |
A Technical Analysis of SIP and P2P Networks | Xie | |
15:15 | break | |
15:30 | Mobile cellular systems and services: | |
How To Fit the World into a Mobile Phone? | Suhonen | |
Wireless Cellular Services by Region | Avetisova | |
Architecture and Performance Evaluation of MP2P | Yang | |
16:45 | summary of the first day | |
17:00 | the end | |
FRIDAY 5.5.2006 | ||
8:30 | welcome back | |
8:45 | Service discovery and security | |
Security Architecture for the Internet Protocol in 2006 | Jormola | |
An overview of service discovery methods for mobile entities | Rodriguez Ponce | |
UPnP security in Internet gateway devices | Selen | |
10:00 | break | |
10:15 | Distributing and file sharing | |
Implementing Mobile E-mail with OceanStore | Aydin | |
Consistency management in distributed storage systems | Hakala | |
Secure and Mobile Peer-to-Peer File Sharing | Lehtinen | |
11:30 | lunch break | |
12:30 | Communities in mobile environment | |
SIP in Mobile Environments - Applications and Possibilities | Berg | |
Security issues in P2P networks regarding person to person communication | Lukkari | |
Taking Advantage of Mobility in Game Design | Arajuuri | |
13:45 | summary of the seminar | |
14:00 | the end |