Monday 27.4. | ||
8:00 | OPENING WORDS | prof. Antti Ylä-Jääski |
8:15 | SESSION 1 | Tutors: Andrei Gurtov and Iiro Jantunen |
Teemu Typpi | Game theory in peer-to-peer networks | |
Murad Kamalov | Adopting Internet protocols to sensor internetworking | |
Li Jingxuan | Mobile-Internet-Based Healthcare, Public Safety and Home Welfare Services | |
Yu Chen | Usability Analysis on online Social Networks for the elderly | |
9:35 | BREAK | |
9:50 | SESSION 2 | Tutors: Miika Komu, Andrei Lukyanenko, Luo Hong |
Syed Usman Hssan | A Survey on Network Application Frameworks | |
Vilen Looga | Peer-to-peer reputation systems | |
A. M. Anisul Huq | Can incentives overcome malicious behavior in p2p network? | |
Joris Kinable | Trust Management Framework for Multi-level Clustered Wireless Sensor Networks | |
11:10 | LUNCH | |
12:00 | SESSION 3 | Tutors: Olli Mäkinen, Teemu Muukkonen, Antti Ylä-Jääski |
Laura Marcia Villalba | A survey of mobile social networking | |
Henri Arjamaa | Energy Consumption Estimates of Information and Communication Technology: synthesis and analysis | |
Rasmus Päivärinta | Design and Operation of Energy-Efficient Data Centers | |
Subhamoy Ghosh | On Maximizing Throughput under Optimum Energy with Inter-session Network Coding in Wireless Networks | |
13:20 | BREAK | |
13:35 | SESSION 4 | Tutors: Sanna Suoranta, Nie Pin |
Kari Helenius | OpenID and identity management in consumer services on the Internet | |
Tuomas Launiainen | A comparison of mobile authentication methods | |
Abu Shohel Ahmed | An Evaluation of Security Protocols on Wireless Sensor Network | |
Shuai Tong | An Evaluation Framework for middleware approaches on Wireless Sensor Networks | |
14:55 | BREAK | |
15:10 | SESSION 5 | Tutors: Prabhu Patil, Matti Siekkinen |
Md. Atiqur Rahman | Middleware for wireless sensor networks: Challenges and Approaches | |
Jinat Rehana | Security of Wireless Sensor Network | |
Rijubrata Bhaumik | Mobile Agent based Architecture for Wireless Sensor Networks | |
Ming Li | Segment Level Authentication | |
Tuesday 28.4. | ||
8:15 | SESSION 6 | Tutors: Jin Zhihua, Sasu Tarkoma |
Mohammad Ashraful Hoque | Analysis of TCP Behavior and Enhancements on Vertical Handover | |
Jiawei Chen | Congestion Control Mechanisms of Transport Protocols | |
Alexander Zahariev | Google App Engine | |
Rerngvit Yanggratoke | The Amazon Web Services | |
9:35 | BREAK | |
9:50 | SESSION 7 | Tutors: Boris Nechaev, Long Nguyen |
Taneli Korri | Cloud computing: utility computing over the Internet | |
Peilin Guo | A Survey of Software as a Service Delivery Paradigm | |
Tomi Aarnio | Parallel data processing with MapReduce | |
Minh Nhat Bui | Searching in P2P Networks: A Survey | |
11:10 | LUNCH | |
12:00 | SESSION 8 | Tutors: Tuomas Aura, Jani Heikkinen |
Kashif Nizam Khan | Wireless Handoff Optimization | |
Jouni Mäenpää | Cloud computing with the Azure platform | |
Pihla Viitanen | Location Integrity in Mobile Ad-hoc and Peer-to-Peer Networks | |
Petri Kääriäinen | Inferences in the Web | |
13:20 | BREAK | |
13:35 | SESSION 9 | Tutors: Jaakko Kangasharju, Janne Lindqvist |
Mikko Ahvenniemi | Cooperation in P2P: Effects on Performance and a Review of Incentives | |
Sharmistha Chatterjee | Expanding the Web: Is XML Sufficient? | |
Juha Kaskenmäki | Mechanisms of reducing reauthetication delay on IEEE 802.11 WLANs | |
Olli Vihervuori | Recent Developments in IEEE 802.11 Wireless Local Area Network Link-layer Security | |
14:55 | BREAK | |
15:10 | SESSION 10 | Tutors: Oleg Ponomarev, Ming Li |
Markus Granström | What is wrong with DNS? | |
Kai, Konka | Methods for accountability on the Internet | |