<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0">
  <channel>
    <title>www.net.in.tum.de: News</title>
    <link>http://www.net.in.tum.de/</link>
    <description></description>
    <language>de</language>
    <image>
      <title>www.net.in.tum.de: News</title>
      <url>http://www.net.in.tum.de/EXT:tt_news/ext_icon.gif</url>
      <link>http://www.net.in.tum.de/</link>
      <width></width>
      <height></height>
      <description></description>
    </image>
    <lastBuildDate>2026-03-16 04:09:13 +0000</lastBuildDate>
    <item>
      <title>BSCI'24: Best Student Paper Award</title>
      <link>http://www.net.in.tum.de/news/2024/bsci-best-paper.html</link>
      <description>
      </description>
      <content>&lt;p&gt;
&lt;b&gt;Best Student Paper Award at BSCI 2024&lt;/b&gt;
&lt;/p&gt;
&lt;p&gt;
Our publication "On the Impact of Network Transport Protocols on Leader-Based Consensus Communication"
has been awarded with the Best Student Paper Award at the 6th ACM
International Symposium on Blockchain and Secure Critical Infrastructure 2024.
&lt;/p&gt;
&lt;p&gt;
In our work we investigate the performance and robustness impact of network
transport protocols, secure channels and their configuration onto leader-based
consensus. We experimentally quantify the impact of four transport protocols
and two secure channel implementations on a HotStuff deployment. Our results
show, that delays of a single processing layer often impact all layers above,
and typical optimizations such as command batching or pipelining act as
amplifiers. We demonstrate that tuning of the transport protocol building
block opens a novel optimization space to a class of leader-based consensus
algorithm deployments.
&lt;/p&gt;
&lt;table&gt;
&lt;tr&gt;
&lt;td class='sort-date'&gt;
2024-07-01
&lt;/td&gt;
&lt;td class='bibtexitem'&gt;
Richard von Seck, Filip Rezabek, Sebastian Gallenmüller, Georg Carle, “On the Impact of Network Transport Protocols on Leader-Based Consensus Communication,” in Proceedings of the 6th ACM International Symposium on Blockchain and Secure Critical Infrastructure, Jul. 2024.
[&lt;a href="/publications/bibtex/vonseck2024impact.bib"&gt;Bib&lt;/a&gt;]
&lt;/td&gt;
&lt;/tr&gt;
&lt;/table&gt;

</content>
      <pubDate>02.07.2024</pubDate>
    </item>
    <item>
      <title>TUM Blockchain Salon 2024</title>
      <link>http://www.net.in.tum.de/news/2024/blockchain_salon.html</link>
      <description>
      </description>
      <content>&lt;h1 id="abstract"&gt;Abstract&lt;/h1&gt;
&lt;p&gt;On 16 and 17 May 2024 we organize the second edition of the TUM Blockchain Salon at the Institute of Advanced Studies (IAS). The event will host more than 20 speakers distributed over 8 sessions with a parallel poster session. 
Researchers involved in SUPREMS will be present both as organizers and presenters. The event is organized as a hybrid event with on-site audience. The link to the agenda and registration can be found under a &lt;a href="https://hedgedoc.net.in.tum.de/s/6sJs4C5Ni"&gt;link to event&lt;/a&gt;. Registration available on the event website &lt;a href="https://hedgedoc.net.in.tum.de/s/6sJs4C5Ni#Registration"&gt;here&lt;/a&gt;&lt;/p&gt;

&lt;h1 id="date-and-location"&gt;Date and Location&lt;/h1&gt;

&lt;ul&gt;
  &lt;li&gt;16&amp;amp;17 May 2024&lt;/li&gt;
  &lt;li&gt;From 09:00-18:00&lt;/li&gt;
  &lt;li&gt;&lt;a href="https://www.ias.tum.de/ias/contact-directions/"&gt;Institute of Advanced Studies at TUM Garching campus)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
</content>
      <pubDate>16.05.2024</pubDate>
    </item>
    <item>
      <title>NetSec Guest Lecture: Cyber Security Assessments in Practice</title>
      <link>http://www.net.in.tum.de/news/2024/guest_lecture.html</link>
      <description>
      </description>
      <content>&lt;h1 id="abstract"&gt;Abstract&lt;/h1&gt;

&lt;p&gt;At universities, cyber security is often viewed solely from the perspective of the attackers and defenders. In their guest lecture "Cyber Security Assessments in Practice", Nico Fechtner and Merten Nagel from usd AG shed light on a new perspective: They outline how compliance with legal and regulatory requirements in terms of cyber security is essential for a large number of companies. The presentation will look at the different motivations for and types of security analyses. In particular, security audits and penetration tests and the role of network security will be discussed in more detail and highlighted using practical examples.&lt;/p&gt;

&lt;h1 id="date-and-location"&gt;Date and Location&lt;/h1&gt;

&lt;ul&gt;
  &lt;li&gt;30.01.2024&lt;/li&gt;
  &lt;li&gt;14:15&lt;/li&gt;
  &lt;li&gt;&lt;a href="https://portal.mytum.de/campus/roomfinder/roomfinder_viewmap?mapid=80&amp;amp;roomid=102@5620"&gt;5620.01.102 (Interimshörsaalgebäude 1, Hörsaal 2)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
</content>
      <pubDate>30.01.2024</pubDate>
    </item>
    <item>
      <title>WueWoWas'23: Best Workshop Contribution Award</title>
      <link>http://www.net.in.tum.de/news/2023/wuewowas-best-paper.html</link>
      <description>
      </description>
      <content>&lt;p&gt;
&lt;b&gt;Best Contribution Award at WueWoWas 2023&lt;/b&gt;
&lt;/p&gt;
&lt;p&gt;
Our publication "Never Miss Twice - Add-On-Miss Table Updates in Software Data Planes"
has been awarded as the &lt;i&gt;one&lt;/i&gt; &lt;strong&gt;Best Workshop Contribution&lt;/strong&gt; at the KuVS Fachgespräch - Würzburg Workshop on Modeling, Analysis and Simulation of Next-Generation Communication Networks 2023 (WueWoWas’23).
&lt;/p&gt;
&lt;p&gt;
In our work, we investigated the potential and performance of state insertions in P4 programmable data planes. Together with our previous work on updatable table entries, add-on-miss insertions enable powerful state-heavy applications with high performance directly in the data plane. The idea of add-on-miss insertions is brought up by the upcoming P4 Portable NIC Architecture targeting P4 applications running on the end hosts. We showed that the overhead of add-on-miss insertions in software targets is small, and therefore the approach is suited to run at line rate.
&lt;/p&gt;
&lt;table&gt;
&lt;tr&gt;
&lt;td class='sort-date'&gt;
2023-06-01
&lt;/td&gt;
&lt;td class='bibtexitem'&gt;
Manuel Simon, Sebastian Gallenmüller, Georg Carle, “Never Miss Twice - Add-On-Miss Table Updates in Software Data Planes,” in KuVS Fachgespräch - Würzburg Workshop on Modeling, Analysis and Simulation of Next-Generation Communication Networks 2023 (WueWoWAS’23), Würzburg, Germany, Jun. 2023, p. 5.
&lt;strong&gt;Best Workshop Contribution&lt;/strong&gt;
[&lt;a href="https://opus.bibliothek.uni-wuerzburg.de/files/32207/Simon_et_al_Add-on-Miss_WueWoWas23_1570909890.pdf"&gt;Pdf&lt;/a&gt;]
[&lt;a href="http://www.net.in.tum.de/fileadmin/bibtex/publications/papers/2023-wuewowas-simon.pdf"&gt;Preprint&lt;/a&gt;]
[&lt;a href="http://www.net.in.tum.de/fileadmin/bibtex/publications/papers/2023-wuewowas-simon-slides.pdf"&gt;Slides&lt;/a&gt;]
[&lt;a href="https://doi.org/10.25972/OPUS-32207"&gt;DOI&lt;/a&gt;]
[&lt;a href="/publications/bibtex/Simo2306:Never.bib"&gt;Bib&lt;/a&gt;]
&lt;/td&gt;
&lt;/tr&gt;
&lt;/table&gt;

</content>
      <pubDate>30.06.2023</pubDate>
    </item>
    <item>
      <title>TMA'23: Best Paper Award</title>
      <link>http://www.net.in.tum.de/news/2023/tma-best-paper.html</link>
      <description>
      </description>
      <content>&lt;p&gt;
&lt;b&gt;Best Paper Award at TMA 2023&lt;/b&gt;
&lt;/p&gt;
&lt;p&gt;
Our publication "Target Acquired? Evaluating Target Generation Algorithms for IPv6"
has been awarded with the Best Paper Award at the Network Traffic Measurement and Analysis Conference (TMA 2023).
&lt;/p&gt;
&lt;p&gt;
The publication is a collaboration with
Oliver Gasser from the Max Planck Institute for Informatics.
&lt;/p&gt;
&lt;p&gt;
In our work we investigated biases in the
&lt;a href="https://ipv6hitlist.github.io"&gt;IPv6 Hitlist Service&lt;/a&gt;
, a service maintained by our chair, which offers active IPv6 addresses to Internet researchers.
This service is used to run measurements in the IPv6 address space and can also function as input for Target Generation Algorithms (TGAs).
We found that being aware of and filtering a bias towards certain address categories can reduce unnecessary scan overhead and limit the bias in the addresses generated by TGAs.
&lt;/p&gt;
&lt;table&gt;
&lt;tr&gt;
&lt;td class='sort-date'&gt;
2023-06-01
&lt;/td&gt;
&lt;td class='bibtexitem'&gt;
Lion Steger, Liming Kuang, Johannes Zirngibl, Georg Carle, Oliver Gasser, “Target Acquired? Evaluating Target Generation Algorithms for IPv6,” in Proceedings of the Network Traffic Measurement and Analysis Conference (TMA), Jun. 2023.
&lt;strong&gt;Best Paper Award&lt;/strong&gt;
[&lt;a href="http://www.net.in.tum.de/fileadmin/bibtex/publications/papers/steger2023targetacquired.pdf"&gt;Pdf&lt;/a&gt;]
[&lt;a href="/publications/bibtex/steger2023targetacquired.bib"&gt;Bib&lt;/a&gt;]
&lt;/td&gt;
&lt;/tr&gt;
&lt;/table&gt;

</content>
      <pubDate>29.06.2023</pubDate>
    </item>
    <item>
      <title>PerFail'23: Best Paper Award</title>
      <link>http://www.net.in.tum.de/news/2023/perfail-best-paper.html</link>
      <description>
      </description>
      <content>&lt;p&gt;
&lt;b&gt;Best Paper Award at the PerFail 2023&lt;/b&gt;
&lt;/p&gt;
&lt;p&gt;
Our publication "TSN Experiments Using COTS Hardware and Open-Source Solutions: Lessons Learned"
has been awarded with the Best Paper Award at the Second International Workshop on Negative Results in Pervasive Computing (PerFail 2023), co-located with IEEE Pervasive Computing (PerCom) 2023, Atlanta, USA.
&lt;/p&gt;
&lt;p&gt;
The publication presents lessons learned from using Commodity off-the shelf (COTS) hardware and open-source solutions for Time Sensitive Networking (TSN) experiments.
We focus on three main observations related to Linux queueing disciplines (CBS, ETF, and TAPRIO) and Precision Time Protocol (PTP).
We built on top of the open-source EnGINE framework
&lt;a href="https://github.com/rezabfil-sec/engine-framework"&gt;EnGINE framework&lt;/a&gt;
with newly created measurements results supporting the observed behavior.
&lt;/p&gt;
&lt;table&gt;
&lt;tr&gt;
&lt;td class='sort-date'&gt;
2023-03-01
&lt;/td&gt;
&lt;td class='bibtexitem'&gt;
Filip Rezabek*, Marcin Bosk*, Georg Carle, Jörg Ott, “TSN Experiments Using COTS Hardware and Open-Source Solutions: Lessons Learned,” in 2nd International Workshop on Negative Results in Pervasive Computing (PerFail 2023), Atlanta, USA, Mar. 2023.
&lt;strong&gt;Best Paper Award&lt;/strong&gt;
[&lt;a href="http://www.net.in.tum.de/fileadmin/bibtex/publications/papers/rezabek_perfail2023.pdf"&gt;Pdf&lt;/a&gt;]
[&lt;a href="https://www.net.in.tum.de/fileadmin/bibtex/publications/papers/rezabek_perfail2023_slides.pdf"&gt;Slides&lt;/a&gt;]
[&lt;a href="/publications/bibtex/RezBosk23PerFail.bib"&gt;Bib&lt;/a&gt;]
&lt;/td&gt;
&lt;/tr&gt;
&lt;/table&gt;

</content>
      <pubDate>20.03.2023</pubDate>
    </item>
    <item>
      <title/>
      <link>http://www.net.in.tum.de/news/2023/kolloq_gervais.html</link>
      <description>
      </description>
      <content>&lt;h1 id="abstract"&gt;Abstract&lt;/h1&gt;

&lt;p&gt;The DeFi ecosystem has experienced rapid growth, reaching over $253 billion in total value locked in just four years.
However, this growth has been accompanied by numerous attacks resulting in a loss of at least $3.24 billion.
This talk will introduce a systematic approach for evaluating and comparing DeFi attacks.
Using data from academic papers, audit reports, and real-world incidents, we will identify gaps between academia and the practitioners' community.
We will also examine potential defenses and their effectiveness.
We will provide specific use cases showcasing how dynamic and advanced current attackers are.
By understanding the challenges and potential solutions in DeFi, we aim to help strengthen its security and resilience.&lt;/p&gt;

&lt;h1 id="bio"&gt;Bio&lt;/h1&gt;

&lt;p&gt;Arthur Gervais is a computer scientist and researcher in the field of blockchain technology.
He is currently an Associate Professor of Information Security at University College London, where he leads a research group focused on improving the security and scalability of blockchain systems.
Gervais has made significant contributions to the field, including his work on smart contract security, decentralized systems, and blockchain privacy.
He has published numerous academic papers and has been recognized for his innovative ideas and impactful research.
In addition to his academic work, Gervais is also an active advisor and speaker in the blockchain  community, and has served as a technical advisor for several blockchain startups.
He continues to push the boundaries of what is possible in the field of blockchain, and is dedicated to improving the overall security and usability of these systems.&lt;/p&gt;
</content>
      <pubDate>07.03.2023</pubDate>
    </item>
    <item>
      <title>TUM ACE SUPPRA Project</title>
      <link>http://www.net.in.tum.de/news/2022/tum-ace-suppra-project.html</link>
      <description>
      </description>
      <content>&lt;h2 id="tum-research-groups-selected-as-global-winners-for-blockchain-and-education-program-offered-by-algorand-foundation"&gt;TUM Research Groups Selected as Global Winners for Blockchain and Education Program offered by Algorand Foundation&lt;/h2&gt;

&lt;p align="justify"&gt;The Algorand protocol [1] is a carbon-zero Layer 1 Blockchain technology, founded by the Turing Award winner and MIT professor Silvio Micali. Based on pure Proof-of-Stake (POS) consensus, Algorand currently supports 1000 transactions per second (TPS) with a 4.5 second settlement finality and offers a powerful smart contract platform based on the Algorand Virtual Machine (AVM).&lt;/p&gt;

&lt;p align="justify"&gt;The Algorand Centres of Excellence (ACE) programme [2], funded by the Algorand Foundation, is dedicated to support research, education, development, and social impact of projects in the Blockchain and distributed ledger space. In total, the Algorand Foundation selected 10 centers of excellence globally out of 77 proposals with over 550 participants, representing 46 countries. The projects were evalauted by 27 international experts with various backgrounds.&lt;/p&gt;

&lt;p align="justify"&gt;TUM is represented among other awardees such as University of California Berkeley, Carnegie Mellon University, Yale and Purdue Universities, and Nanyang Technological University from Singapore. In total 36 additional sub-organizations are involved with representation from the USA, Europe, Africa, Australia and Asia. &lt;/p&gt;

&lt;p align="justify"&gt;In the challenging competition, the TUM project ACE-SUPPRA (Security, Usability, Performance, and Privacy Research in Algorand) was selected for a five year long research initiative grant with educational and outreach elements.
The Principal Investigator (PI) of ACE-SUPPRA is Prof. Georg Carle, head of the Chair of Network Architectures and Services (NET). ACE-SUPPRA is an interdisciplinary initiative, involving teams of different TUM departments with the following Co-PIs: &lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;Prof. Andreas Herkersdorf – Chair of Integrated Systems (LIS)&lt;/li&gt;
  &lt;li&gt;Prof. Florian Matthes – Chair of Software Engineering for Business Information Systems (SEBIS)&lt;/li&gt;
  &lt;li&gt;Prof. Alexander Pretschner – Chair of Software and Systems Engineering (SSE)&lt;/li&gt;
  &lt;li&gt;Prof. Isabell Welpe – Chair for Strategy and Organization (SAO)&lt;/li&gt;
&lt;/ul&gt;

&lt;p align="justify"&gt;Research of the involved groups, building on their key competencies, addresses technical, economic, and social aspects of blockchain technologies in relation to the Algorand protocol. The Chair of Prof. Carle targets assessment of the Algorand infrastructure, aiming for the improvement of its performance, and research of more secure and privacy-preserving techniques for the Algorand users. Prof. Herkersdorf and his team address performance enhancements using SmartNICs to which certain operations can be offloaded. Smart contract capabilities are a key factor to blockchain adoption and usability, which will be investigated by the research group of Prof. Preschner, aiming to improve robustness, quality, and security. Focusing on secure usability, Prof. Matthes aims to offer solutions to minimize risks and overhead caused by smart contract development. The team of Prof. Welpe addresses aspects of tokenomics and governance of Algorand. ACE-SUPPRA outreach activities include the organization of workshops and Hackathons. &lt;/p&gt;

&lt;p&gt;The official announcement of the award winners by the Algorand Foundation can be found &lt;a href="https://www.algorand.foundation/news/algorand-foundation-announces-global-winners-for-its-50m-blockchain-research-and-education-program"&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;[1] &lt;a href="https://www.algorand.foundation/"&gt;https://www.algorand.foundation/&lt;/a&gt;&lt;/li&gt;
  &lt;li&gt;[2] &lt;a href="https://www.algorand.foundation/ace"&gt;https://www.algorand.foundation/ace&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
</content>
      <pubDate>04.08.2022</pubDate>
    </item>
    <item>
      <title>TMA'22: Best Paper Award</title>
      <link>http://www.net.in.tum.de/news/2022/tma-best-paper.html</link>
      <description>
      </description>
      <content>&lt;p&gt;
&lt;b&gt;Best Paper Award at TMA 2022&lt;/b&gt;
&lt;/p&gt;
&lt;p&gt;
Our publication "Active TLS Stack Fingerprinting: Characterizing TLS Server Deployments at Scale"
has been awarded with the Best Paper Award at the Network Traffic Measurement and Analysis Conference (TMA 2022).
&lt;/p&gt;
&lt;p&gt;
The publication is a collaboration with
Claas Grohnfeldt, Michele Russo, and Daniele Sgandurra from AI4Sec, Huawei Technologies Munich.
&lt;/p&gt;
&lt;p&gt;
The publication investigates how large-scale server fingerprinting can be achieved by utilizing TLS meta data.
We propose an approach and show the feasibility based on a Content Delivery Network (CDN) and Command and Control (CnC) server detection.
We extended the
&lt;a href="https://github.com/tumi8/goscanner"&gt;TUM goscanner&lt;/a&gt;
with active TLS fingerprinting capabilites and open-sourced our measurement data
and code under the
&lt;a href="https://active-tls-fingerprinting.github.io/"&gt;publication website.&lt;/a&gt;
&lt;/p&gt;
&lt;table&gt;
&lt;tr&gt;
&lt;td class='sort-date'&gt;
2022-06-01
&lt;/td&gt;
&lt;td class='bibtexitem'&gt;
Markus Sosnowski, Johannes Zirngibl, Patrick Sattler, Georg Carle, Claas Grohnfeldt, Michele Russo, Daniele Sgandurra, “Active TLS Stack Fingerprinting: Characterizing TLS Server Deployments at Scale,” in Proc. Network Traffic Measurement and Analysis Conference (TMA), Jun. 2022.
&lt;strong&gt;Best Paper Award&lt;/strong&gt;
[&lt;a href="https://dl.ifip.org/db/conf/tma/tma2022/tma2022-paper35.pdf"&gt;Pdf&lt;/a&gt;]
[&lt;a href="https://www.net.in.tum.de/fileadmin/bibtex/publications/papers/sosnowski2022tlsfingerprinting_slides.pdf"&gt;Slides&lt;/a&gt;]
[&lt;a href="https://tumi8.github.io/active-tls-fingerprinting/"&gt;Homepage&lt;/a&gt;]
[&lt;a href="https://doi.org/10.14459/2022mp1658435"&gt;Rawdata&lt;/a&gt;]
[&lt;a href="/publications/bibtex/sosnowski2022tlsfingerprinting.bib"&gt;Bib&lt;/a&gt;]
&lt;/td&gt;
&lt;/tr&gt;
&lt;/table&gt;

</content>
      <pubDate>29.06.2022</pubDate>
    </item>
    <item>
      <title/>
      <link>http://www.net.in.tum.de/news/2020/kolloq_holz.html</link>
      <description>
      </description>
      <content>&lt;h1 id="abstract"&gt;Abstract&lt;/h1&gt;

&lt;p&gt;The design and development of TLS 1.3 was different from previous
versions of the Transport Layer Security protocol (TLS). Community
consensus led to it enforcing the latest generation of cryptography
and making fundamental changes to the protocol flow. Prominent
industry engaged at an unprecedented level, making TLS 1.3 the
best-tested version ever to be deployed. TLS 1.3 is also the first
TLS version to be developed in the age of pervasive mobile devices.&lt;/p&gt;

&lt;p&gt;We track the rollout of TLS 1.3 since nearly its conception. We
use longitudinal, active scans to measure the increasing deployment
over more than 275m domains (including more than fifty ccTLDs),
paying special attention to the role that big hosting and frontend
providers play. We characterize the evolution of both deployment
and use for both draft versions and the final RFC version, including
an analysis of connection errors. We show which industries lead in
the deployment of TLS 1.3, and we characterize the very different
deployment in a variety of countries. We use passive monitoring at
two positions on the globe to understand the initial testing phase
and the degree to which users profit from the new protocol and its
new features. Finally, we exploit data from a widely deployed
measurement app in the Android ecosystem to analyze the use of
TLS 1.3 in mobile applications.
The design and development of TLS 1.3 was different from previous
versions of the Transport Layer Security protocol (TLS). Community
consensus led to it enforcing the latest generation of cryptography
and making fundamental changes to the protocol flow. Prominent
industry engaged at an unprecedented level, making TLS 1.3 the
best-tested version ever to be deployed. TLS 1.3 is also the first
TLS version to be developed in the age of pervasive mobile devices.&lt;/p&gt;

&lt;p&gt;We track the rollout of TLS 1.3 since nearly its conception. We
use longitudinal, active scans to measure the increasing deployment
over more than 275m domains (including more than fifty ccTLDs),
paying special attention to the role that big hosting and frontend
providers play. We characterize the evolution of both deployment
and use for both draft versions and the final RFC version, including
an analysis of connection errors. We show which industries lead in
the deployment of TLS 1.3, and we characterize the very different
deployment in a variety of countries. We use passive monitoring at
two positions on the globe to understand the initial testing phase
and the degree to which users profit from the new protocol and its
new features. Finally, we exploit data from a widely deployed
measurement app in the Android ecosystem to analyze the use of
TLS 1.3 in mobile applications.&lt;/p&gt;

&lt;h1 id="bio"&gt;Bio&lt;/h1&gt;

&lt;p&gt;Ralph Holz is an Associate Professor at University of Twente in the
Netherlands. His research interests revolve around empirical studies
of Internet infrastructure, in particular with respect to security
and the social impact and drivers of a new technology. Before joining
University of Twente, Ralph was a Lecturer (Asst. Prof.) at the
University of Sydney, Australia and affiliated with Australia’s prime
ICT research centre, NICTA. Ralph holds a PhD from TU Munich.&lt;/p&gt;
</content>
      <pubDate>20.02.2020</pubDate>
    </item>
    <item>
      <title/>
      <link>http://www.net.in.tum.de/news/2020/kolloq_rusek.html</link>
      <description>
      </description>
      <content>&lt;h1 id="abstract"&gt;Abstract&lt;/h1&gt;

&lt;p&gt;RouteNet is a novel network model based on Graph Neural Network (GNN) that can understand the complex relationship between topology, routing, and input traffic to produce accurate estimates of the per-source/destination per-packet delay distribution and loss.
RouteNet leverages the ability of GNNs to learn and model graph-structured information and as a result, the model can generalize over arbitrary topologies, routing schemes and traffic intensity.
In the evaluation,the RouteNet can predict accurately the delay distribution (mean delay and jitter) and loss even in topologies, routing and traffic unseen in the training.&lt;/p&gt;

&lt;h1 id="bio"&gt;Bio&lt;/h1&gt;

&lt;p&gt;Krzysztof Rusek defended his Ph.D. Thesis on queuing theory in 2016 at AGH University of Science and Technology, Kraków, Poland.
Prior that He has worked as a system administrator and machine learning engineer in the research group focused on processing and protection of multimedia content.
Currently, he is an assistant professor at AGH.
He also works as a data scientist for Barcelona Neural Networking Center, IT advisor for the department of Atsronomy of Jagiellonian University and a Member of the Board of an AI-focused spin-of company.
His main research interests are performance evaluation of telecommunications systems, machine learning, and data analysis.
Currently, he is working on the applications of Graph Neural Networks and probabilistic modeling for performance evaluation of communications systems.&lt;/p&gt;
</content>
      <pubDate>10.02.2020</pubDate>
    </item>
    <item>
      <title/>
      <link>http://www.net.in.tum.de/news/2020/kolloq_pardal.html</link>
      <description>
      </description>
      <content>&lt;h1 id="abstract"&gt;Abstract&lt;/h1&gt;

&lt;p&gt;The scale and geographic dispersion of the Internet of Things (IoT) will surpass the size of the current day Internet in, at least, 3 orders of magnitude.
The IoT will be the largest and most widely distributed system ever, with a multitude of connected sensors and actuators.
The current Internet already has some serious, unresolved security problems.
Adding physical world autonomous connections brings even more concerns about attacks and their consequences to people and goods.
The SureThing project (http://surething-project.eu) is addressing an IoT security need: creating and validating location certificates.
The project’s goal is to allow for constrained devices, needed in the provisioning of IoT services, to obtain proof of their location or to request proof of location to other devices.
The certificates issued using the SureThing framework will contain location data, obtained and verified using: WiFi and Bluetooth fingerprinting, and ambience sensing.
The SureThing framework will allow developers to choose between faster location proofs and more reliable proofs, which will be digitally signed and kept in a ledger.
The witness models – providing a validation role for other devices at the same location – will play an important role, particularly when only limited cryptographic mechanisms are available.&lt;/p&gt;

&lt;h1 id="bio"&gt;Bio&lt;/h1&gt;

&lt;p&gt;&lt;a href="http://web.tecnico.ulisboa.pt/miguel.pardal/"&gt;Miguel L. Pardal&lt;/a&gt; is an Assistant Professor at Instituto Superior Técnico, Universidade de Lisboa and a researcher at INESC-ID in the Distributed Systems Group (GSD).
He is currently leading the SureThing project (FCT) and completed a participation in the Safe Cloud EU Project (H2020).
He is collaborating with TU Munich as Guest Scientist.
During his PhD, he was a visiting student at the Auto-ID Labs at MIT.
He currently has more than 40 publications and his main research interest is Cybersecurity applied to the digital frontiers of the Internet of Things and Cloud Computing.&lt;/p&gt;
</content>
      <pubDate>29.01.2020</pubDate>
    </item>
    <item>
      <title>CCNC'20: Best Demo Award</title>
      <link>http://www.net.in.tum.de/news/2020/ccnc-best-demo-award.html</link>
      <description>
      </description>
      <content>&lt;p&gt;
&lt;b&gt;Best Demo Award at CCNC 2020&lt;/b&gt;
&lt;/p&gt;
&lt;p&gt;
Our demo of NCSbench has been awarded the Best Demo Award at the IEEE Consumer Communications and Networking
Conference (CCNC'20) in Las Vegas, Nevada, USA.
&lt;/p&gt;
&lt;p&gt;
The demo presented NCSbench a platform consisting of a networked control system (NCS) and an NCS-specific
benchmarking platform.
The NCS is a two-wheeled inverted pendulum robot built upon Lego Mindstorms.
The constuction plans for the robot, its software, and the benchmark is publicly available in our
&lt;a href="https://github.com/tum-lkn/NCSbench"&gt;GitHub repository.&lt;/a&gt;
All components are affordable and widely available so others can easily recreate NCSbench.
&lt;/p&gt;
&lt;table&gt;
&lt;tr&gt;
&lt;td class='sort-date'&gt;
2020-01-01
&lt;/td&gt;
&lt;td class='bibtexitem'&gt;
Samuele Zoppi, Onur Ayan, Fabio Molinari, Zenit Music, Sebastian Gallenmüller, Georg Carle, Wolfgang Kellerer, “NCSbench: Reproducible Benchmarking Platform for Networked Control Systems,” in 2020 IEEE 17th Annual Consumer Communications &amp; Networking Conference (CCNC) (CCNC 2020), Las Vegas, USA, Jan. 2020.
[&lt;a href="http://www.net.in.tum.de/fileadmin/bibtex/publications/papers/gallenmueller_ccnc2020.pdf"&gt;Pdf&lt;/a&gt;]
[&lt;a href="/publications/bibtex/Zopp2001:NCSbench.bib"&gt;Bib&lt;/a&gt;]
&lt;/td&gt;
&lt;/tr&gt;
&lt;/table&gt;

</content>
      <pubDate>13.01.2020</pubDate>
    </item>
    <item>
      <title>ANCS'19: Best Paper Award</title>
      <link>http://www.net.in.tum.de/news/2019/ancs-best-paper-award.html</link>
      <description>
      </description>
      <content>&lt;p&gt;
&lt;b&gt;Best Paper Award at ANCS 2019&lt;/b&gt;
&lt;/p&gt;
&lt;p&gt;
Our publication
&lt;a href="https://www.net.in.tum.de/fileadmin/bibtex/publications/papers/the-case-for-writing-network-drivers-in-high-level-languages.pdf"&gt;The Case for Writing Network Drivers in High-Level Programming Languages&lt;/a&gt;
has been awarded with the Best Paper Award at the ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS'19)
in Cambridge, United Kingdom.
&lt;/p&gt;
&lt;p&gt;
The publication is a feasability study investigating network drivers in high-level programming languages.
We present high-speed network drivers written in Rust, Go, C#, Java, OCaml, Haskell, Swift, JavaScript, and Python.
All implementations are available in a
&lt;a href="https://github.com/ixy-languages/ixy-languages"&gt;GitHub repository.&lt;/a&gt;
&lt;/p&gt;
&lt;table&gt;
&lt;tr&gt;
&lt;td class='sort-date'&gt;
2019-09-01
&lt;/td&gt;
&lt;td class='bibtexitem'&gt;
Paul Emmerich, Simon Ellmann, Fabian Bonk, Alex Egger, Esaú García Sánchez-Torija, Thomas Günzel, Sebastian Di Luzio, Alexandru Obada, Maximilian Stadlmeier, Sebastian Voit, Georg Carle, “The Case for Writing Network Drivers in High-Level Programming Languages,” in ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS 2019), &lt;strong&gt;Best Paper Award&lt;/strong&gt;, Sep. 2019.
[&lt;a href="https://www.net.in.tum.de/fileadmin/bibtex/publications/papers/the-case-for-writing-network-drivers-in-high-level-languages.pdf"&gt;Pdf&lt;/a&gt;]
[&lt;a href="/publications/bibtex/highleveldrivers.bib"&gt;Bib&lt;/a&gt;]
&lt;/td&gt;
&lt;/tr&gt;
&lt;/table&gt;

</content>
      <pubDate>24.09.2019</pubDate>
    </item>
    <item>
      <title/>
      <link>http://www.net.in.tum.de/news/2019/kolloq_kerschbaum.html</link>
      <description>
      </description>
      <content>&lt;h1 id="abstract"&gt;Abstract&lt;/h1&gt;

&lt;p&gt;This talk covers two recent works in computing analytical functions over
encrypted data. I will start with the traditional range search problem and show
how to encrypt data, such that it can be efficiently searched and stored, but is
provably secure against attacks by a snap-shot attackers. The problem entails a
definition of securely encrypting a datastructure. Our approach can withstand
all recent attacks on property-preservingly encrypted databases. In the second
part of the talk I will talk about the problem of computing rank functions over
the blockchain. This can be used to implement sealed-bid auctions over the
blockchain. Our approach is secure against malicious adversaries and requires
only 3 to 4 blocks to compute. We combine a number of techniques in an usual way
to achieve this trade-off.&lt;/p&gt;

&lt;h1 id="bio"&gt;Bio&lt;/h1&gt;

&lt;p&gt;Florian is an associate professor in the David R. Cheriton School of Computer
Science at the University of Waterloo (since 2017) and executive director of the
Waterloo Cybersecurity and Privacy Institute (since 2018). Before he worked as
chief research expert at SAP in Karlsruhe (2005 – 2016) and as a software
architect at Arxan Technologies in San Francisco (2002 – 2004). He holds a Ph.D.
in computer science from the Karlsruhe Institute of Technology (2010) and a
master's degree from Purdue University (2001). He is interested in data security
and privacy in data management, machine learning, and blockchains. He extends
real-world systems with cryptographic security mechanisms to achieve (some)
provable security guarantees.&lt;/p&gt;
</content>
      <pubDate>30.07.2019</pubDate>
    </item>
    <item>
      <title/>
      <link>http://www.net.in.tum.de/news/2019/kolloq_feldmann.html</link>
      <description>
      </description>
      <content>&lt;h1 id="abstract"&gt;Abstract&lt;/h1&gt;

&lt;p&gt;While the Internet is a hugely successful, human made artifact
that has changed the society fundamentally, it has become a complex
system with many challenges.  In this talk, I will outline some of them
and also point out a number of surprises in terms of our
mental models of the Internet that we develop over the years.
Next, I will focus on the evolution of the Internet and discuss methods
for detecting Internet infrastructure outages and combat major DDoS
attacks.  I will end with an outlook on how we may evolve the Internet
to tackle the network management challenges as well as handle the flood
of ubiquitous data availability from sensors and devices everywhere.&lt;/p&gt;

&lt;h1 id="bio"&gt;Bio&lt;/h1&gt;

&lt;p&gt;Anja Feldmann is a director at the Max Planck Institute for Informatics
in Saarbrücken, Germany, since 2018. Her research interests include
Internet measurement, traffic engineering and traffic characterization,
network performance debugging, intrusion detection, network
architecture.  She has published more than 70 papers and has served on
more than 50 program committees, including as Co-Chair of ACM SIGCOMM
2003, ACM IMC 2011, PAM 2018 and as Co-PC-Chair of ACM SIGCOMM, ACM IMC,
and ACM HotNets. She held professor positions at TU Berlin, Germany
(2006-2017), TU München, Germany (2002) and Saarland University (2000).
Before that she was a member of AT&amp;amp;T Labs - Research in Florham
Park, NJ. She received a M.S. degree from the University of Paderborn,
and M.S. and Ph.D. degrees from Carnegie Mellon University.&lt;/p&gt;

&lt;p&gt;She is a member of the German Academy of Sciences Leopoldina, the BBAW,
Academia Europaea, and was a member of the supervisory board of SAP SE
from 2012 to 2018. She is a recipient of the Gottfried Wilhelm Leibniz
Preis 2011, the Berliner Wissenschaftspreis 2011, the Vodafon Innovation
Award 2018, and the Schelling-Preis 2018 of the Bayrische Akademie der
Wissenschaften.&lt;/p&gt;
</content>
      <pubDate>24.05.2019</pubDate>
    </item>
    <item>
      <title>PAM'19: Best Dataset Award</title>
      <link>http://www.net.in.tum.de/news/2019/pam-data-award.html</link>
      <description>
      </description>
      <content>&lt;p&gt;
&lt;b&gt;Best Dataset Award at PAM 2019&lt;/b&gt;
&lt;/p&gt;
&lt;p&gt;
The publication "A First Look at QNAME Minimization in the Domain Name System"
has been awarded with the Best Dataset Award at the Passive and Active Measurement (PAM)
Conference (PAM'19).
&lt;/p&gt;
&lt;p&gt;
The publication is an international collaboration with
Wouter B. de Vries (University of Twente),
Moritz Müller (SIDN and University of Twente)
Willem Toorop (NLNet Labs),
Ralph Dolmans (NLnet Labs), and
Roland van Rijswijk-Deij (University of Twente and NLnet Labs).
&lt;/p&gt;
&lt;p&gt;
The IMC Community Contribution Award is "given to the best paper that makes datasets and corresponding code available to the public".
&lt;a href="http://pam2019.niclabs.cl/index.html"&gt;Website of PAM'19 Awards&lt;/a&gt;
&lt;/p&gt;
&lt;table&gt;
&lt;tr&gt;
&lt;td class='sort-date'&gt;
2019-03-01
&lt;/td&gt;
&lt;td class='bibtexitem'&gt;
Wouter B. de Vries, Quirin Scheitle, Moritz Müller, Willem Toorop, Ralph Dolmans, Roland van Rijswijk-Deij, “A First Look at QNAME Minimization in the Domain Name System,” in Proceedings of the Passive and Active Measurement Conference (PAM 2019), Best Dataset Award, Puerto Varas, Chile, Mar. 2019.
[&lt;a href="https://pam2019.niclabs.cl/program.html"&gt;Url&lt;/a&gt;]
[&lt;a href="/publications/bibtex/pam18qmin.bib"&gt;Bib&lt;/a&gt;]
&lt;/td&gt;
&lt;/tr&gt;
&lt;/table&gt;

</content>
      <pubDate>29.03.2019</pubDate>
    </item>
    <item>
      <title/>
      <link>http://www.net.in.tum.de/news/2019/kolloq_linguaglossa.html</link>
      <description>
      </description>
      <content>&lt;h1 id="abstract"&gt;Abstract&lt;/h1&gt;

&lt;p&gt;Network Functions Virtualization (NFV) is among the latest network
revolutions, bringing flexibility and avoiding network ossification.
While NFV provides a flexible way of implementing network functions
on commodity hardware, an all-software NFV implementation may present
a performance gap with respect to hardware-based solutions. In the
last decade numerous software acceleration techniques have appeared
to bring high-speed capabilities to software network frameworks, thus
trying to reduce the distance w.r.t. pure hardware solutions. Batching
is one example of such techniques, consisting in processing packets
in groups as opposed to individually, which is required at high-speed
to minimize the framework overhead, reduce interrupt pressure,
and leverage instruction-level cache hits. Whereas several system
implementations have been proposed and experimentally benchmarked, the
scientific community has so far only to a limited extent attempted to
model the system dynamics of modern NFV routers exploiting batching
acceleration. We fill this gap by proposing a simple generic model
for such batching-based mechanisms, which allows a very detailed
prediction of highly relevant performance indicators. These include the
distribution of the processed batch size as well as queue size, which
can be used to identify loss-less operational regimes or quantify the
packet loss probability in high-load scenarios. In this talk I will
present our experimental campaign for performance evaluation using a
state-of-the-art NFV router, namely VPP. Then I will introduce our
model for a generic NFV router. We contrast the model prediction with
experimental results gathered in our testbed, showing that the model
not only correctly captures system performance under simple conditions,
but also in more realistic scenarios in which traffic is processed by a
mixture of functions.
rials will be discussed.&lt;/p&gt;

&lt;h1 id="bio"&gt;Bio&lt;/h1&gt;

&lt;p&gt;Leonardo Linguaglossa is currently a post-doctoral researcher at
Telecom PairsTech (France) working in a collaboration with Cisco named
"NewNet@Paris". In 2018/2019 he is working in a joint collaboration
between TPT and TUM with a project named "AI4P" (Artificial Intelligence
for Performance). Leonardo's main research interests include high-speed
networking, future network architectures (NFV, SDN), performance
evaluation and modeling.&lt;/p&gt;
</content>
      <pubDate>18.02.2019</pubDate>
    </item>
    <item>
      <title>IMC'18: Community Contribution Award</title>
      <link>http://www.net.in.tum.de/news/2018/imc-comm-award.html</link>
      <description>
      </description>
      <content>&lt;p&gt;
&lt;b&gt;Community Contribution Award at IMC 2018&lt;/b&gt;
&lt;/p&gt;
&lt;p&gt;
The publication "A Long Way to the Top: Significance, Structure, and Stability of Internet Top Lists"
has been awarded with the Community Contribution Award at the ACM SIGCOMM
Internet Measurement Conference (IMC'18).
&lt;/p&gt;
&lt;p&gt;
The publication is an international collaboration with Oliver Hohlfeld (RWTH Aachen University),
Julien Gamba (IMDEA, Universidad Carlos III de Madrid),
Torsten Zimmermann (RWTH Aachen University), Stephen D. Strowes (RIPE NCC), and
Narseo Vallina-Rodriguez (IMDEA Networks Institute / ICSI)
&lt;/p&gt;
&lt;p&gt;
The IMC Community Contribution Award recognizes "a paper with an outstanding contribution to the community in the form of a novel dataset, source code distribution, open platform, or other noteworthy service to the community".
&lt;a href="https://conferences.sigcomm.org/imc/2018/awards/"&gt;Website of IMC'18 Awards&lt;/a&gt;
&lt;/p&gt;
&lt;table&gt;
&lt;tr&gt;
&lt;td class='sort-date'&gt;
2018-11-01
&lt;/td&gt;
&lt;td class='bibtexitem'&gt;
Quirin Scheitle, Oliver Hohlfeld, Julien Gamba, Jonas Jelten, Torsten Zimmermann, Stephen D. Strowes, Narseo Vallina-Rodriguez, “A Long Way to the Top: Significance, Structure, and Stability of Internet Top Lists,” in Internet Measurement Conference (IMC’18), IMC’18 Community Contribution Award, Boston, USA, Nov. 2018, pp. 478–493.
[&lt;a href="https://toplists.github.io"&gt;Homepage&lt;/a&gt;]
[&lt;a href="https://mediatum.ub.tum.de/1452290"&gt;Rawdata&lt;/a&gt;]
[&lt;a href="https://arxiv.org/abs/1805.11506"&gt;Arxiv&lt;/a&gt;]
[&lt;a href="https://doi.org/10.1145/3278532.3278574"&gt;DOI&lt;/a&gt;]
[&lt;a href="/publications/bibtex/ScheitleTopLists18.bib"&gt;Bib&lt;/a&gt;]
&lt;/td&gt;
&lt;/tr&gt;
&lt;/table&gt;

</content>
      <pubDate>02.11.2018</pubDate>
    </item>
    <item>
      <title/>
      <link>http://www.net.in.tum.de/news/2018/kolloq_sofia.html</link>
      <description>
      </description>
      <content>&lt;h1 id="abstract"&gt;Abstract&lt;/h1&gt;

&lt;p&gt;The interconnection of heterogeneous devices in IoT is today performed
via multiple IP-based messaging protocols which have been developed to
assist a faster delivery of information over IP networks. These
protocols, which perform well under restrained scenarios, require
interoperability support (from/to the network as well as towards
services) to scale well. Yet, today there is no standardized nor unified
ICT model, capable of sustaining not only millions of heterogeneous
devices, as well as: bi-directional communication towards people and
devices.&lt;/p&gt;

&lt;p&gt;In parallel, the Internet research community is exploiting novel
networking paradigms, such as Information Centric Networking (ICN). ICN
has, by design, a few networking architecture features (such as
integrated security and the support for N to M communications) which
seem to be better suited for large-scale, dense and mobile IoT
environments, where bi-directional communication is required.&lt;/p&gt;

&lt;p&gt;This talk provides an overview on the evolution of IoT communications
and environments. It explains the requirements that need to be met when
handling data transmission, be it in industrial IoT or personal IoT.
The talk also provides a debate on the applicability of ICN to IoT;
advantages and limitations, as well as interoperability towards today's
environments.&lt;/p&gt;

&lt;h1 id="bio"&gt;Bio&lt;/h1&gt;

&lt;p&gt;Rute C. Sofia (PhD 2004) is, since 2010, a Senior Researcher at the
Cognitive and People-centric Computing R&amp;amp;D unit, and an Associate
Professor of University Lusófona de Humanidades e Tecnologias. She is
also, since 2017, an Associated Researcher of ISTAR, ISCTE-IUL.
Rute's research background has been developed on industrial and on
academic context, and she has co-founded COPELABS (2012), research unit
which she steered between 2013-2017. She has also co-founded Senception
Lda (2013), a startup focused on personal communication platforms.
Her current research interests are: network architectures and protocols;
IoT; mobility management and estimation; network mining.
Rute holds over 50 peer-reviewed publications in her fields of
expertise, and 9 patents. She is an ACM member and an IEEE Senior member.&lt;/p&gt;
</content>
      <pubDate>29.10.2018</pubDate>
    </item>
    <item>
      <title/>
      <link>http://www.net.in.tum.de/news/2018/kolloq_barbeau.html</link>
      <description>
      </description>
      <content>&lt;h1 id="abstract"&gt;Abstract&lt;/h1&gt;

&lt;p&gt;Underwater Acoustic Sensor Networks are used for the exploration of
natural undersea resources, collection of oceanographic data, pollution
monitoring, offshore exploration, disaster prevention, assisted
navigation and tactical surveillance. Utilizing acoustic communications,
sensor nodes gather and send data to sink nodes. Employing radio
communications, the sinks forward the data to other surface located
nodes or satellites. The Internet type of communication protocols work
solely for sink nodes with classical wireless access. Specific protocols
are required for submerged node communications.&lt;/p&gt;

&lt;p&gt;In this talk, I will address protocol design for long range
underwater/under ice acoustic communications. In the present state of
scientific and technical progress, long range underwater communications
are more likely to be achievable at low frequency and narrow bandwidth.
We concentrate on low frequency mobile acoustic communications in the
300 Hz to 3 kHz range. Because of the narrow half-power bandwidth at
low frequency and long distance, solely extremely low data rates are
possible. At low data rates, the Doppler effect is also a difficult
problem. My research draws on the science of extremely weak signal
communications that can deal with channels with 250 dB attenuation or
more. I will focus on the design of a data link layer protocol, which
includes framing and high redundancy Forward Error Correction. The
complexity is in the receiver. Algebraic and probabilistic decoding
techniques are combined to determine what is most likely the content
of a message. Performance results obtained through simulation and sea
trials will be discussed.&lt;/p&gt;

&lt;h1 id="bio"&gt;Bio&lt;/h1&gt;

&lt;p&gt;Michel Barbeau is a professor of Computer Science. He got a Bachelor
(Universite de Sherbrooke, Canada ’85), a Master’s and a Ph.D., in
Computer Science (Universite de Montreal, Canada ’87 &amp;amp; ’91). From
’91 to ’99, he was a professor at Universite de Sherbrooke. During
the ’98-’99 academic year, he was a visiting researcher at the
University of Aizu, Japan. Since 2000, he works at Carleton University,
School of Computer Science, Canada. His current research interests are
wide area ad hoc networks, underwater communications and networks,
quantum communications and networks.&lt;/p&gt;
</content>
      <pubDate>01.10.2018</pubDate>
    </item>
    <item>
      <title>IEEE ComSoc ITC Best Paper Award 2017</title>
      <link>http://www.net.in.tum.de/news/2018/comsoc_bpa.html</link>
      <description>
      </description>
      <content>&lt;p&gt;
&lt;b&gt;I8 team awarded IEEE ComSoc ITC Best Paper Award for 2017&lt;/b&gt;
&lt;/p&gt;
&lt;p&gt;
A team from TUM's Chair of Network Architectures and Services have been
awarded the IEEE ComSoc ITC Best Paper Award 2017. This award honors the
best paper in the set of IEEE ComSoc ITC sponsored conferences in 2017,
namely the Global Internet, ICC NGNI, ICC Cloud Networking SAC, ITC, NetGames,
NetSys, NoF, TMA, and CSNet conferences.
&lt;a href="http://itc.committees.comsoc.org/awards/"&gt;IEEE ComSoc ITC Best Paper Award&lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;
The award has been presented at the TMA 2018 conference:
&lt;a href="http://tma.ifip.org/2018/awards/"&gt;TMA 2018 Award Presentation&lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;
The awarded publication, "Push Away Your Privacy: Precise User Tracking Based on TLS Client Certificate Authentication"
describes privacy implications in Apple Push Notification Service (APNs), that have been
discovered, thoroughly described and responsibly disclosed by a team of I8 researchers.
Before publication, Apple released a fix in January 2017.
&lt;a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2383"&gt;CVE&lt;/a&gt;
&lt;a href="https://support.apple.com/en-au/HT207482"&gt;Apple Release Note&lt;/a&gt;
&lt;a href="https://github.com/tumi8/cca-privacy"&gt;Code &amp; Dataset&lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;
The publicaton has previously been awarded the Best Paper Award of TMA'17:
&lt;a href="http://tma.ifip.org/2017/awards/#best_paper"&gt;TMA'17 Award&lt;/a&gt;
&lt;/p&gt;
&lt;table&gt;
&lt;tr&gt;
&lt;td class='sort-date'&gt;
2017-06-01
&lt;/td&gt;
&lt;td class='bibtexitem'&gt;
Matthias Wachs, Quirin Scheitle, Georg Carle, “Push Away Your Privacy: Precise User Tracking Based on TLS Client Certificate Authentication,” in Network Traffic Measurement and Analysis Conference (TMA), Best Paper Award TMA’17, IEEE ComSoc ITC Best Paper Award 2017, Jun. 2017.
[&lt;a href="https://www.net.in.tum.de/fileadmin/bibtex/publications/papers/tma17-tls-cca_CAMERAREADY.pdf"&gt;Pdf&lt;/a&gt;]
[&lt;a href="https://www.net.in.tum.de/fileadmin/bibtex/publications/papers/tma17-tls-cca_PRESENTED.pdf"&gt;Slides&lt;/a&gt;]
[&lt;a href="https://www.youtube.com/watch?v=VLbMnbuHW2o"&gt;Recording&lt;/a&gt;]
[&lt;a href="/publications/bibtex/tls-cca-tma17.bib"&gt;Bib&lt;/a&gt;]
&lt;/td&gt;
&lt;/tr&gt;
&lt;/table&gt;

</content>
      <pubDate>03.07.2018</pubDate>
    </item>
    <item>
      <title/>
      <link>http://www.net.in.tum.de/news/2018/kolloq-broering.html</link>
      <description>
      </description>
      <content>&lt;h1 id="abstract"&gt;Abstract&lt;/h1&gt;

&lt;p&gt;This talk presents solutions and open challenges on the corner stones
of the Internet of Things (IoT): discovery, interoperability and
composition. While discovery of suitable IoT devices is the initial
step for interaction, various technologies (e.g. via networks or
directories) exist. This talk presents generic discovery patterns
useful for facilitating IoT usage. Once discovered, the interface of
the IoT device needs to be understood. The broad heterogeniety of these
interfaces has created a further gap of interoperability. We present a
generic approach that utilizes semantic models to integrate IoT devices
and platforms. Finally, once devices are interoperably accessible,
their composition is crucial to facilitate re-usage and higher value
creation. An approach is presented that allows the definition of IoT
choreographies, their instantiation as applications, and automated
re-configuration at runtime. The intention of this talk is to discuss
the presented solution as well as challenges identified from an industry
perspective.&lt;/p&gt;

&lt;h1 id="bio"&gt;Bio&lt;/h1&gt;

&lt;p&gt;Arne Bröring is a Senior Researcher at Siemens’ corporate research
unit in Munich (Germany). Previously, he worked as a researcher for
Esri (Switzerland), the 52°North initiative, as well as the University
of Münster. He has an MSc in Geoinformatics from the University of
Münster and received his PhD related to IoT, Semantic Web and Sensors
from the University of Twente (Netherlands). He has been one of the key
designers of the Sensor Web Enablement framework at the Open Geospatial
Consortium (OGC). As the chairperson of the Sensor Observation Service
working group, he has co-authored multiple international standards. More
recently, he has been involved in standardization at the W3C and its
Web of Things group. Since 10 years, he is researching on IoT related
topics, has contributed to over 70 publications, and has served on
various programme committees for conferences and workshops. He has been
involved in numerous research projects (FP-7, H2020) and is currently
responsible for the scientific and technical coordination of the BIG IoT
project (http://big-in order to.eu).&lt;/p&gt;
</content>
      <pubDate>18.05.2018</pubDate>
    </item>
    <item>
      <title>PAM'18: Best Paper Award</title>
      <link>http://www.net.in.tum.de/news/2018/pam-best-paper-award.html</link>
      <description>
      </description>
      <content>&lt;p&gt;
&lt;b&gt;Best Paper Award at PAM 2018&lt;/b&gt;
&lt;/p&gt;
&lt;p&gt;
The publication "In Log We Trust: Revealing Poor Security Practices with Certificate Transparency Logs and Internet Measurements" has been awarded with the Best Paper Award at the Passive and Active Measurement Conference (PAM'18).
The publication is the result of an international collaboration with Maciej Korczynski (Grenoble Alps University and Delft University of Technology) and Ralph Holz (University of Sydney).
&lt;/p&gt;
&lt;p&gt;
The publication evaluates the security of certificate in Certificate Transparency (CT) logs.
The team downloads 600 million certificate entries from 30 different CT logs and evaluates their compliance to the industry's Baseline Requirements.
The Baseline Requirements define standards for HTTPS certificates and issuing processes, such as minimum key lengths or maximum duration of certificates.
Additionally, the authors perform active HTTPS measurements and compare CT logs to actual deployment spanning from 2009 to 2017.
Moreover, the team analyzes inclusion of non-HTTPS certificates and CT logs and provides a CT-extended IPv6 hitlist for public download.
&lt;/p&gt;
&lt;a href="https://pam2018.inet.berlin/2018/06/25/best-paper-and-dataset-awards/"&gt;Website of PAM 2018 Awards&lt;/a&gt;
&lt;table&gt;
&lt;/table&gt;

</content>
      <pubDate>27.03.2018</pubDate>
    </item>
    <item>
      <title>IMC'17: Community Contribution Award</title>
      <link>http://www.net.in.tum.de/news/2017/imc-comm-award.html</link>
      <description>
      </description>
      <content>&lt;p&gt;
&lt;b&gt;Community Contribution Award at IMC 2017&lt;/b&gt;
&lt;/p&gt;
&lt;p&gt;
The publication "Mission Accomplished? HTTP Security After DigiNotar"
has been awarded with the Community Contribution Award at the ACM SIGCOMM
Internet Measurement Conference (IMC'17).
The publication is an international collaboration with Johanna Amann (ICSI),
Lexi Brent (University of Sydney) and Ralph Holz (University of Sydney).
&lt;/p&gt;
&lt;p&gt;
The publication takes a look at security extensions for the HTTP Eco System that
have been developed after the disruptive breach of DigiNotar in 2012.
The team conducted large-scale active and passive scans of the Internet to evaluate adoption,
configuration and security contributions of these novel methods.
These include Certificate Transparency (CT), for making the CA system auditable; HSTS and HPKP headers, to harden the
HTTPS posture of a domain; the DNS-based extensions CAA
and TLSA, for control over certificate issuance and pinning;
and SCSV, for protocol downgrade protection.
&lt;/p&gt;
&lt;p&gt;
The IMC Community Contribution Award recognized "a paper with an outstanding contribution to the community in the form of a novel dataset, source code distribution, open platform, or other noteworthy service to the community".
&lt;a href="https://conferences.sigcomm.org/imc/2017/awards/"&gt;Website of IMC'17 Awards&lt;/a&gt;
&lt;/p&gt;
&lt;table&gt;
&lt;/table&gt;

</content>
      <pubDate>09.11.2017</pubDate>
    </item>
    <item>
      <title>MoonGen wins the Applied Networking Research Prize</title>
      <link>http://www.net.in.tum.de/news/2017/moongen-anrp.html</link>
      <description>
      </description>
      <content>&lt;p&gt;
&lt;b&gt;Our open source packet generator MoonGen won the Applied Networking Research Prize (ANRP)!&lt;/b&gt;
The Internet Research Task Force (IRTF) awards this prize for applied networking research that is relevant for standardization efforts and research transitioning into shipping Internet products. The ANRP prize will be awarded at the IETF-100 meeting in Singapore in November 2017.
&lt;a href="https://irtf.org/anrp"&gt;More information on the Applied Networking Research Prize.&lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;
MoonGen aims at providing a packet generator for academic use: it's programmable, fast, precise, and runs on inexpensive commodity hardware.
This combination ensures that performance evaluations are reliable and reproducible without relying on expensive hardware black-boxes.
Researchers can define their entire test setup and logic within a MoonGen &lt;i&gt;script&lt;/i&gt; which can then be published together with the results.
&lt;a href="https://github.com/emmericp/MoonGen"&gt;MoonGen is open source on GitHub.&lt;/a&gt;
&lt;/p&gt;
&lt;table&gt;
&lt;tr&gt;
&lt;td class='sort-date'&gt;
2015-10-01
&lt;/td&gt;
&lt;td class='bibtexitem'&gt;
Paul Emmerich, Sebastian Gallenmüller, Daniel Raumer, Florian Wohlfart, Georg Carle, “MoonGen: A Scriptable High-Speed Packet Generator,” in Internet Measurement Conference (IMC) 2015, &lt;strong&gt;IRTF Applied Networking Research Prize 2017&lt;/strong&gt;, Tokyo, Japan, Oct. 2015.
[&lt;a href="http://www.net.in.tum.de/fileadmin/bibtex/publications/papers/MoonGen_IMC2015.pdf"&gt;Pdf&lt;/a&gt;]
[&lt;a href="/publications/bibtex/EmmGall15_1.bib"&gt;Bib&lt;/a&gt;]
&lt;/td&gt;
&lt;/tr&gt;
&lt;/table&gt;

</content>
      <pubDate>18.10.2017</pubDate>
    </item>
    <item>
      <title/>
      <link>http://www.net.in.tum.de/news/2017/kolloq-vallina-rodriguez.html</link>
      <description>
      </description>
      <content>&lt;h1 id="abstract"&gt;Abstract&lt;/h1&gt;
&lt;p&gt;As a society we have come to rely upon our mobile phones for myriad daily
tasks. It is striking how little insight we, as mobile users and researchers,
have into the operation and performance of our devices and network, into how
(or whether) mobile apps protect the information we entrust to them, and with
whom they share it. The research community (including the speaker) have
energetically used a variety of approaches to gain empirical understanding of
the mobile device/network ecosystem; however, these techniques have had to make
trade-offs that affect either the scale, scope or granularity of measurements.&lt;/p&gt;

&lt;p&gt;This talk describes how we leverage ideas from this prior work to design and
develop the Lumen Privacy Monitor. The talk will demonstrate its utility to
researchers and average users alike by providing case studies on mobile traffic
characterization, identification of privacy risks inflicted by mobile apps, and
perform network performance measurements.&lt;/p&gt;

&lt;h1 id="bio"&gt;Bio&lt;/h1&gt;
&lt;p&gt;Narseo Vallina-Rodriguez is an Assistant Research Professor at IMDEA Networks
and a research scientist at the Networking and Security team at the
International Computer Science Institute (ICSI) in Berkeley. Narseo received
his degree in Telecommunications Engineering from the University of Oviedo in
2007, which he extended with a 6-month visit at the University of Cambridge to
complete his degree dissertation. In 2008, Dr. Vallina-Rodriguez joined
Vodafone R&amp;amp;D, returning to the University of Cambridge to complete his Ph.D.
program under the supervision of Prof. Jon Crowcroft one year after. In July
2013, Dr. Vallina-Rodriguez joined ICSI in Berkeley (California) as a Post-Doc,
becoming a Research Scientist and Principal Investigator one year after. During
his doctoral studies Dr. Vallina-Rodriguez also interned in world-class
industry research labs, such as Deutsche Telekom Labs in Berlin (Germany) and
the scientific group at Telefonica Research (Spain). The outcome of his
research has been awarded with a Qualcomm Innovation Fellowship in 2012, the
best short-paper award at ACM CoNEXT'14, the best paper award at ACM
HotMiddlebox'15 and a DataTransparencyLabs grant in 2016 for characterizing
mobile tracking services with the Lumen Privacy Monitor.&lt;/p&gt;
</content>
      <pubDate>17.09.2017</pubDate>
    </item>
    <item>
      <title/>
      <link>http://www.net.in.tum.de/news/2017/kolloq-stadler.html</link>
      <description>
      </description>
      <content>&lt;h1 id="abstract"&gt;Abstract&lt;/h1&gt;

&lt;p&gt;We start with discussing the opportunities of using machine learning for
network and cloud engineering and operation. We then focus on the
specific problem of KPI estimation and present an approach that is based
based upon statistical learning, whereby the behavior of a system is
learned from observations. Following this approach, we collect device
statistics from servers and switches on a testbed and use regression
techniques to predict client-side service metrics for a video service
and a key-value store. One surprising finding is that these service
metrics can be predicted quite accurately using network device
statistics alone.&lt;/p&gt;

&lt;h1 id="bio"&gt;Bio&lt;/h1&gt;

&lt;p&gt;Rolf Stadler is a professor with the Department of Network and Systems
Engineering at KTH Royal Institute of Technology in Stockholm, Sweden.
He holds an M.Sc. degree in mathematics and a Ph.D. in computer science
from the University of Zurich. Before joining KTH in 2001, he held
positions at the IBM Zurich Research Laboratory, Columbia University,
and ETH Zürich. Rolf Stadler is currently EiC of IEEE TNSM. His group
has made contributions to real-time monitoring, resource management, and
self-management for large-scale networks and clouds. His current
interests include advanced monitoring techniques, as well as data-driven
methods for network engineering and management.&lt;/p&gt;
</content>
      <pubDate>14.07.2017</pubDate>
    </item>
    <item>
      <title>AIMS'17: Best Paper Award</title>
      <link>http://www.net.in.tum.de/news/2017/aims-bpa.html</link>
      <description>
      </description>
      <content>&lt;p&gt;
&lt;b&gt;I8 team awarded Best Paper Award at AIMS 2017&lt;/b&gt;
&lt;/p&gt;
&lt;p&gt;
A team from TUM's Chair of Network Architectures and Services has been
awarded with the Best Paper Award at the "11th International Conference on Autonomous Infrastructure, Management and Security" (AIMS 2017).
&lt;a href="http://www.aims-conference.org/2017/"&gt;AIMS'17 Web Page&lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;
The publication awarded with the Best Paper Award, "Achieving Reproducible Network Environments with INSALATA"
describes a framework for reproducing physical or virtual environments in a virtual testbed.
The system features a flexible, modularized framework that can be extended to fit various architectures.
Network environments can be automatically scanned by a collection component.
They can then be described using the INSALATA network information model.
Based on this description an automated setup process can be utilized to deploy the environment to a testbed.
&lt;a href="https://github.com/tumi8/INSALATA"&gt;Code&lt;/a&gt;
&lt;/p&gt;
&lt;table&gt;
&lt;tr&gt;
&lt;td class='sort-date'&gt;
2017-07-01
&lt;/td&gt;
&lt;td class='bibtexitem'&gt;
Nadine Herold, Matthias Wachs, Marko Dorfhuber, Christoph Rudolf, Stefan Liebald, Georg Carle, “Achieving reproducible network environments with INSALATA,” in 11th International Conference on Autonomous Infrastructure, Management and Security (AIMS’2017), Best Paper Award, Zurich, Switzerland, Jul. 2017.
[&lt;a href="https://www.net.in.tum.de/fileadmin/bibtex/publications/papers/2017_insalata_aims.pdf"&gt;Pdf&lt;/a&gt;]
[&lt;a href="https://www.net.in.tum.de/fileadmin/bibtex/publications/papers/aims2017-insalata_PRESENTED.pdf"&gt;Slides&lt;/a&gt;]
[&lt;a href="/publications/bibtex/herold_insalata_aims.bib"&gt;Bib&lt;/a&gt;]
&lt;/td&gt;
&lt;/tr&gt;
&lt;/table&gt;

</content>
      <pubDate>13.07.2017</pubDate>
    </item>
    <item>
      <title/>
      <link>http://www.net.in.tum.de/news/2017/kolloq-sofia.html</link>
      <description>
      </description>
      <content>&lt;h1 id="abstract"&gt;Abstract&lt;/h1&gt;

&lt;p&gt;This talk is focused on wireless network mining and on context and
behavior characterization derived from the application of
non-intrusive, pervasive sensing approaches in connected wireless
environments. The research described in this talk goes over the
development of networking solutions and mechanisms that can assist data
capture and distributed inference of roaming habits in a way that may
lead to social interaction stimulation (and as a consequence, to a
better design of networking communication).&lt;/p&gt;

&lt;p&gt;Related pointers:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href="http://copelabs.ulusofona.pt/~pdlab"&gt;http://copelabs.ulusofona.pt/~pdlab&lt;/a&gt;&lt;/li&gt;
  &lt;li&gt;&lt;a href="http://copelabs.ulusofona.pt/~uloop"&gt;http://copelabs.ulusofona.pt/~uloop&lt;/a&gt;&lt;/li&gt;
  &lt;li&gt;&lt;a href="http://copelabs.ulusofona.pt/~citysense"&gt;http://copelabs.ulusofona.pt/~citysense&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h1 id="bio"&gt;Bio&lt;/h1&gt;

&lt;p&gt;Rute Sofia is a Senior Researcher at COPELABS, Lisbon, a private not
for profit research unit fusing pervasive wireless systems and social
psychology with the goal of contributing to improving well-being. She
is an Associate Professor at University Lusofona, and a co-founder as
well as CTO of Senception Lda, a spin-off of COPELABS, focused on
wireless network mining. Since 95 she has been developing research both
in an industrial environment as well as in an academic environment. She
was a Senior Researcher and co-coordinator of the Internet
Architectures and Networking area (IAN) of INESC TEC, Porto. Before,
she was a Senior Researcher at Siemens AG Corporate Technology, Munich,
focusing on aspects such as carrier grade Ethernet; QoS; IPv6. She was
a Senior Researcher at Bundeswehr Universitaet Munich, focusing on QoS.
She was a Visiting Scholar at University of Pennsylvania, Multimedia
and Networking Lab, Philadelphia, USA, and at ICAIR, Northwestern
University, Evanston, IL, USA, focusing on QoS research. She is on
sabbatical leave (July 2017-September 2018), visiting the Technical
University of Munich (TUM), Siemens AG Corporate Technology, and
University of Lisbon as well as the portuguese National Cybersecurity
Center (CNCS, Lisbon). Her sabbatical research is focused on Networked
Cyber-Physical Systems, with emphasis on network mining and pervasive
data analytics for wireless networks.&lt;/p&gt;
</content>
      <pubDate>10.07.2017</pubDate>
    </item>
    <item>
      <title>Seminar Information Session for the IITM and FI Seminar</title>
      <link>http://www.net.in.tum.de/news/2017/seminar-information-session.html</link>
      <description>
      </description>
      <content>&lt;p&gt;The information session for the IITM and FI seminar in Winter Term 2017/18 will take place on 7.7.17; 16:30 in MI Hörsaal 2 (00.04.011)&lt;/p&gt;
</content>
      <pubDate>07.07.2017</pubDate>
    </item>
    <item>
      <title/>
      <link>http://www.net.in.tum.de/news/2017/kolloq-kolios.html</link>
      <description>
      </description>
      <content>&lt;h1 id="abstract"&gt;Abstract&lt;/h1&gt;

&lt;p&gt;After introducing the KIOS CoE and the overall vision of the
center this talk will delve into a technical presentation of ProximAid.
ProximAid is an innovative wireless adhoc emergency response protocol that
aims to complement traditional communication means in cases of natural
(fire, earthquakes) or man-made (war) disasters. Using an ad-hoc based
approach introduces resilience and enables the introduction of features
that are hard to get with traditional communication services. ProximAid has
been implemented an as Android application that uses Wi-Fi direct to
establish the ad-hoc network and run the overlay communication protocols.
This work emphasizes the development of the algorithm, explains the app
services, and presents challenges and future research directions.&lt;/p&gt;

&lt;h1 id="bio"&gt;Bio&lt;/h1&gt;

&lt;p&gt;Panayiotis Kolios received his BEng and PhD degree in
Telecommunications Engineering from Kings College London in 2008 and 2011,
respectively. He is currently a senior researcher at the KIOS Research
Centre of the University of Cyprus, conducting both basic and applied
research on networked intelligent systems. His expertise include primarily
optimization for efficient monitoring and control of intelligent systems,
as well as novel networking solutions for next generation applications and
services.&lt;/p&gt;
</content>
      <pubDate>03.07.2017</pubDate>
    </item>
    <item>
      <title>TMA'17: Best Paper Award and Best Dataset Award</title>
      <link>http://www.net.in.tum.de/news/2017/tma-bpa-bda.html</link>
      <description>
      </description>
      <content>&lt;p&gt;
&lt;b&gt;I8 teams awarded Best Paper Award and Best Dataset Award at TMA 2017&lt;/b&gt;
&lt;/p&gt;
&lt;p&gt;
Teams from TUM's Chair of Network Architectures and Services have been
awarded the prices for Best Paper Award and Best Dataset Award at the
2017 "Network Traffic Measurement and Analysis Conference" (TMA'17).
&lt;a href="http://tma.ifip.org"&gt;TMA'17 Web Page&lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;
The publication awarded with the Best Paper Award, "Push Away Your Privacy: Precise User Tracking Based on TLS Client Certificate Authentication"
describes privacy implications in Apple Push Notification Service (APNs), that have been
discovered, thoroughly described and responsibly disclosed by a team of I8 researchers.
Before publication, Apple released a fix in January 2017.
&lt;a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2383"&gt;CVE&lt;/a&gt;
&lt;a href="https://support.apple.com/en-au/HT207482"&gt;Apple Release Note&lt;/a&gt;
&lt;a href="https://github.com/tumi8/cca-privacy"&gt;Code &amp; Dataset&lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;
The publication awarded with the Best Dataset Award, "HLOC: Hints-Based Geolocation Leveraging Multiple Measurement Frameworks",
develops and evalutes a novel method for the geolocation of Internet infrastructure.
This approach easily integrates ready-to-use measurement frameworks such as RIPE Atlas.
The dataset includes latency and location data for millions of IPv4 and IPv6 routers.
&lt;a href="https://github.com/tumi8/hloc"&gt;Code &amp; Dataset&lt;/a&gt;
&lt;/p&gt;
&lt;table&gt;
&lt;tr&gt;
&lt;td class='sort-date'&gt;
2017-06-01
&lt;/td&gt;
&lt;td class='bibtexitem'&gt;
Quirin Scheitle, Oliver Gasser, Patrick Sattler, Georg Carle, “HLOC: Hints-Based Geolocation Leveraging Multiple Measurement Frameworks,” in Network Traffic Measurement and Analysis Conference (TMA), Best Dataset Award, Dublin, Ireland, Jun. 2017.
[&lt;a href="https://www.net.in.tum.de/fileadmin/bibtex/publications/papers/tma17_hloc_CAMERAREADY.pdf"&gt;Pdf&lt;/a&gt;]
[&lt;a href="https://www.net.in.tum.de/fileadmin/bibtex/publications/papers/tma17_hloc_slides.pdf"&gt;Slides&lt;/a&gt;]
[&lt;a href="https://mediatum.ub.tum.de/1359182"&gt;Rawdata&lt;/a&gt;]
[&lt;a href="https://arxiv.org/abs/1706.09331"&gt;Arxiv&lt;/a&gt;]
[&lt;a href="/publications/bibtex/scheitle2017hloc.bib"&gt;Bib&lt;/a&gt;]
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class='sort-date'&gt;
2017-06-01
&lt;/td&gt;
&lt;td class='bibtexitem'&gt;
Matthias Wachs, Quirin Scheitle, Georg Carle, “Push Away Your Privacy: Precise User Tracking Based on TLS Client Certificate Authentication,” in Network Traffic Measurement and Analysis Conference (TMA), Best Paper Award TMA’17, IEEE ComSoc ITC Best Paper Award 2017, Jun. 2017.
[&lt;a href="https://www.net.in.tum.de/fileadmin/bibtex/publications/papers/tma17-tls-cca_CAMERAREADY.pdf"&gt;Pdf&lt;/a&gt;]
[&lt;a href="https://www.net.in.tum.de/fileadmin/bibtex/publications/papers/tma17-tls-cca_PRESENTED.pdf"&gt;Slides&lt;/a&gt;]
[&lt;a href="https://www.youtube.com/watch?v=VLbMnbuHW2o"&gt;Recording&lt;/a&gt;]
[&lt;a href="/publications/bibtex/tls-cca-tma17.bib"&gt;Bib&lt;/a&gt;]
&lt;/td&gt;
&lt;/tr&gt;
&lt;/table&gt;

</content>
      <pubDate>26.06.2017</pubDate>
    </item>
    <item>
      <title/>
      <link>http://www.net.in.tum.de/news/2017/kolloq-zseby.html</link>
      <description>
      </description>
      <content>&lt;h1 id="abstract"&gt;Abstract&lt;/h1&gt;
&lt;p&gt;Covert channels conceal the information transfer between communication
partners by hiding it in an existing unsuspicious data exchange.  In
TCP/IP traffic there are many possibilities to hide information in
header fields or packet timing.  Such techniques can be used by
sophisticated malware for clandestine data exfiltration or to establish
hidden command and control structures.  The detection of covert
communication is very challenging if the hidden data replicates
statistical properties of classical TCP/IP communication.&lt;/p&gt;

&lt;p&gt;In this talk a set of methods, the DAT (Descriptive Analytics of
Traffic) detectors, for detecting covert channels in TCP/IP traffic are
introduced.  The detectors are based on lightweight statistical analysis
methods and provide a collection of technique to assess the probability
of covert communication in a given traffic trace.  The DAT detectors are
also used in the TU Wien network steganography lab as part of the
Network Security Advanced class.  The lab material (exercises, data,
grading) is made available to other lecturers in the area of network
security and data analysis.&lt;/p&gt;

&lt;h1 id="bio"&gt;Bio&lt;/h1&gt;
&lt;p&gt;Tanja Zseby is a full professor of communication networks and head of
the Institute of Telecommunications at the Faculty of Electrical
Engineering and Information Technology at TU Wien.  She received her
diploma degree (Dipl.-Ing.) in electrical engineering and her doctoral
degree (Dr.-Ing.) from TU Berlin, Germany.  Before joining TU Wien, she
lediglich the Competence Center for Network Research at the Fraunhofer
Institute for Open Communication Systems (FOKUS) in Berlin and worked as
visiting scientist at the University of California, San Diego.  Her
research focus is network security, anomaly detection and secure smart
grid communication.&lt;/p&gt;
</content>
      <pubDate>15.05.2017</pubDate>
    </item>
    <item>
      <title/>
      <link>http://www.net.in.tum.de/news/2017/kolloq-grothoff.html</link>
      <description>
      </description>
      <content>&lt;h1 id="abstract"&gt;Abstract&lt;/h1&gt;

&lt;p&gt;Starting with a horrific Big Data application that literally sprung from a 1984
movie, the talk will explore the limits of Little Data analysis when it comes
to fighting trolls before proposing a design for a future with No Such Data.&lt;/p&gt;

&lt;p&gt;Supervised learning and exotic applications of cryptography abound, but not to
a degree that would warrant a Top Secret classification on those grounds.&lt;/p&gt;

&lt;h1 id="bio"&gt;Bio&lt;/h1&gt;

&lt;p&gt;Christian Grothoff is leading the Décentralisé team at Inria Rennes. He
maintains GNUnet, a network designed with the goal to provide privacy and
security without the need for trusted third parties. He earned his PhD in
computer science from UCLA, an M.S. in computer science from Purdue University,
and a Diplom in mathematics from the University of Wuppertal.&lt;/p&gt;
</content>
      <pubDate>23.03.2017</pubDate>
    </item>
    <item>
      <title/>
      <link>http://www.net.in.tum.de/news/2017/kolloq-holz.html</link>
      <description>
      </description>
      <content>&lt;h1 id="abstract"&gt;Abstract&lt;/h1&gt;

&lt;p&gt;Over the last six years, blockchains have developed into a 'mainstream'
technology that entire industry sectors are talking about. The latest
generation even supports smart contracts - programs that are executed by all
participants and that may govern everything from simple transactions to the
setup of organisations. Taking a closer look, however, we find that there is
very little deployment beyond the two most prominent examples, Bitcoin and
Ethereum. In this talk, we are going to look at some of the reasons: the
problem of dependability and abortion of transactions, which is crucial for
enterprises; the influence of the underlying network structure on transaction
execution; and the problem of exploitable smart contracts. Correspondingly, we
discuss some research directions that could prove fruitful in a number of
systems, blockchains or beyond.&lt;/p&gt;

&lt;h1 id="bio"&gt;Bio&lt;/h1&gt;

&lt;p&gt;Ralph Holz is Lecturer in Networks and Security at the School of IT at the
University of Sydney, where he leads the Node for Cybersecurity and Usable
Security inside the Human-Centred Technologies cluster. He works closely with
Data61|CSIRO, Australia's prime innovation body, and is a Visiting Fellow at
the University of New South Wales. Ralph's research interest is empirical
security, in particular measuring the deployment properties of critical
infrastructure (including blockchains) and the effects and causes of network
and routing incidents. He led the research efforts that culminated in the
world's first large-scale, long- term analysis of the deployment of the Web
Public Key Infrastructure. Most recently, he has turned his attention to
analysing the security and dependability of blockchain networks. Ralph received
his PhD from Technical University of Munich (TUM) in May 2014.&lt;/p&gt;
</content>
      <pubDate>03.03.2017</pubDate>
    </item>
    <item>
      <title>Joint Meeting of the VDE/ITG Sections Network Security &amp; IP and Mobility</title>
      <link>http://www.net.in.tum.de/news/2016/itg.html</link>
      <description>
      </description>
      <content>&lt;h2 id="joint-meeting-of-the-vdeitg-sections-522-network-security--524-ip-and-mobility"&gt;Joint Meeting of the VDE/ITG Sections 5.2.2 (Network Security &amp;amp; 5.2.4 (IP and Mobility)&lt;/h2&gt;
&lt;p&gt;Workshop Topic: "Network and Services Security towards 5G" &lt;br /&gt;
Date: December 5th, 2016 &lt;br /&gt;
Location: Technical University of Munich (TUM), &lt;br /&gt;
IAS Faculty Club, Lichtenbergstraße 2a, Garching, Germany &lt;br /&gt;&lt;/p&gt;

&lt;p&gt;See our &lt;a href="/research/organizations/itg/"&gt;ITG-page&lt;/a&gt; for more information.&lt;/p&gt;

</content>
      <pubDate>05.12.2016</pubDate>
    </item>
    <item>
      <title>Price of the Association of German Computer Science Departments for the best Computer Science Thesis awarded to Daniel Hugenroth</title>
      <link>http://www.net.in.tum.de/news/2016/fti-hugenroth.html</link>
      <description>
      </description>
      <content>&lt;p&gt;
&lt;b&gt;Price of the Association of German Computer Science Departments for the best Computer Science Thesis awarded to Daniel Hugenroth&lt;/b&gt;
&lt;/p&gt;
&lt;p&gt;
The price of the Association of German Computer Science Departments for
the best Computer Science Thesis was awarded to the Thesis
&lt;/p&gt;
&lt;p&gt;"HRTP: A Broadcast-Based System for Unobservable Internet Telephony"&lt;/p&gt;
&lt;p&gt;
of Daniel Hugenroth (Technical University of Munich), Advisor Lukas
Schwaighofer, Supervisor Prof. Dr.-Ing. Georg Carle.
&lt;/p&gt;
&lt;p&gt;
The price was handed over to Daniel Hugenroth at the evening reception
of the Annual Conference of the German Computer Science Society in
Klagenfurt, Austria, on September 28, 2016.
&lt;/p&gt;
&lt;p&gt;
The thesis was selected for this price because of its convincing breadth
(formalisation, proof, implementation, validation), depth and
originality (unobservable meta-data) and the societal relevance of the
topic.
&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;td&gt;
Author
&lt;/td&gt;
&lt;td&gt;Title&lt;/td&gt;
&lt;td&gt;Type&lt;/td&gt;
&lt;td&gt;Advisors&lt;/td&gt;
&lt;td&gt;Year&lt;/td&gt;
&lt;td&gt;Links&lt;/td&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
Daniel  Hugenroth
&lt;/td&gt;
&lt;td&gt;
HRTP: A Broadcast-Based System for Unobservable Internet Telephony
&lt;/td&gt;
&lt;td&gt;
&lt;span class='thesis_type_abbreviation'&gt;&lt;/span&gt;
&lt;abbr title="Master's Thesis"&gt;MA&lt;/abbr&gt;
&lt;/td&gt;
&lt;td&gt;
Advisor: Lukas Schwaighofer, Supervisor: Prof. Georg Carle
&lt;/td&gt;
&lt;td&gt;
2015
&lt;/td&gt;
&lt;td&gt;
&lt;a href="https://www.net.in.tum.de/fileadmin/bibtex/publications/theses/hugenroth2015masterthesis.pdf" style="text-decoration: none; border: 0px;"&gt;&lt;img src="../../img/pdf-607fc3e6.svg" style="height: 33px;" alt="" /&gt;&lt;/a&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;

</content>
      <pubDate>28.09.2016</pubDate>
    </item>
    <item>
      <title/>
      <link>http://www.net.in.tum.de/news/2016/kolloq-pardal.html</link>
      <description>
      </description>
      <content>&lt;h1 id="abstract"&gt;Abstract&lt;/h1&gt;

&lt;p&gt;Miguel is exploring security solutions for Internet of Things and Cloud in his
more recent work. He will present UpdaThing, a framework for IoT gateway
updates; and GarlicStrap, a defense for vampire attacks in small sensors
running Contiki. The SafeCloud project prototypes will also be presented,
covering vulnerability-tolerant TLS, route hijacking detection and multi-path
communication for security purposes.&lt;/p&gt;

&lt;h1 id="bio"&gt;Bio&lt;/h1&gt;

&lt;p&gt;Miguel L. Pardal is a researcher at INESC-ID in the Distributed Systems Group
(GSD) and an Assistant Professor at Instituto Superior Técnico, Universidade de
Lisboa. He is currently participating in the Safe Cloud EU Project (H2020) in
partnership with TUM and others. During his PhD, he was a visiting student at
the Auto-ID Labs at MIT. He currently has more than 30 publications and his
main research interests are: Distributed Systems, Security, Internet of Things,
Cloud Computing, and Enterprise Systems.&lt;/p&gt;
</content>
      <pubDate>16.09.2016</pubDate>
    </item>
    <item>
      <title>Pre-course meeting iLabs: January 22, 10:30 in MI&amp;nbsp;HS&amp;nbsp;2</title>
      <link>http://www.net.in.tum.de/news/archive/pre-course-i.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;The pre-course meeting for the &amp;quot;iLab&amp;quot; lab courses takes place on Thursday, January 22, 10:30 in MI HS 2.&lt;/p&gt;

</content>
      <pubDate>22.01.2016</pubDate>
    </item>
    <item>
      <title>Pre-course meeting seminar courses: January 21, 14:30 in room 00.07.014</title>
      <link>http://www.net.in.tum.de/news/archive/pre-course-m.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;The pre-course meeting for the chair's seminar courses &amp;quot;Future Internet&amp;quot; and &amp;quot;Innovative Internet Technologies and Mobile Communications&amp;quot; takes place on Thursday, January 21, 14:30 in room 00.07.014.&lt;/p&gt;

</content>
      <pubDate>21.01.2016</pubDate>
    </item>
    <item>
      <title>Student Awards at the Graduation Ceremony</title>
      <link>http://www.net.in.tum.de/news/2016/student-award.html</link>
      <description>
      </description>
      <content>&lt;p&gt;At this year's &lt;a href="http://absolventen.in.tum.de/index_en.html"&gt;Graduation Ceremony of the department for Informatics at Technische Universität München&lt;/a&gt;, two students who wrote their Master's Thesis at our chair received an award.&lt;/p&gt;

&lt;p&gt;Daniel Hugenroth received the &lt;a href="https://www.in.tum.de/forschung/auszeichnungen/detail/newsarticle/siemens-preis-fuer-daniel-hugenroth-und-tobias-hlavka.html"&gt;Siemens Award&lt;/a&gt; for completing his Master's Degree as one of the top students. In his Master's thesis he worked on a protocol for unobservable VoIP and developed a prototype for Android. &lt;a href="files/2015_siemenspreis_hugenroth.pdf"&gt;[more info]&lt;/a&gt;
The Master's Thesis written by Rainer Schönberger on the design and implementation of a high performance software router based on DPDK received the "Master Coder" Award from TNG. &lt;a href="files/2015_meistercoderpreis_schoenberger.pdf"&gt;[more info]&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The Chair of Network Architectures and Services congratulates its graduates!&lt;/p&gt;
</content>
      <pubDate>04.12.2015</pubDate>
    </item>
    <item>
      <title/>
      <link>http://www.net.in.tum.de/news/2016/kolloq-widmer.html</link>
      <description>
      </description>
      <content>&lt;h1 id="abstract"&gt;Abstract&lt;/h1&gt;

&lt;p&gt;State-of-the-art wireless communication already operates close to Shannon capacity and one of the most promising options to further increase data rates is to increase the communication bandwidth. Very high bandwidth channels are only available in the extremely high frequency part of the radio spectrum, the millimeter wave band (mm-wave). Upcoming communication technologies, such as IEEE 802.11ad, are already starting to exploit this part of the radio spectrum to achieve data rates of several GBit/s. However, communication at such high frequencies also suffers from high attenuation and signal absorption, often restricting communication to line-of-sight (LOS) scenarios and requiring the use of highly directional antennas. This in turn requires a radical rethinking of wireless network design. On the one hand side, such channels experience little interference, allowing for a high degree of spatial reuse and potentially simpler MAC and interference management mechanisms. On the other hand, such an environment is extremely dynamic and channels may appear and disappear over very short time intervals, in particular for mobile devices. This talk will highlight some of the challenges of and possible approaches for networking in the mm-wave band.&lt;/p&gt;

&lt;h1 id="bio"&gt;Bio&lt;/h1&gt;

&lt;p&gt;Joerg Widmer is Research Professor at Institute IMDEA Networks in Madrid, Spain. He received his M.S. and PhD degrees in computer science from the University of Mannheim, Germany in 2000 and 2003, respectively.  His research focuses primarily on wireless networks, ranging from extremely high frequency millimeter-wave communication and MAC layer design to mobile network architectures. From 2005 to 2010, he was manager of the Ubiquitous Networking Research Group at DOCOMO Euro-Labs in Munich, Germany, leading several projects in the area of mobile and cellular networks. Before, he worked as post-doctoral researcher at EPFL, Switzerland on ultra-wide band communication and network coding.  He was a visiting researcher at the International Computer Science Institute in Berkeley, CA, USA and University College London, UK. Joerg Widmer authored more than 100 conference and journal papers and three IETF RFCs, holds 13 patents, serves on the editorial board of IEEE Transactions on Communications, and regularly participates in program committees of several major conferences. Recently he was awarded an ERC consolidator grant as well as a Spanish Ramon y Cajal grant. He is senior member of IEEE and ACM.&lt;/p&gt;
</content>
      <pubDate>27.11.2015</pubDate>
    </item>
    <item>
      <title>Vortrag &amp; Live Hack: IT-Security Awareness</title>
      <link>http://www.net.in.tum.de/news/2016/it-security-awareness.html</link>
      <description>
      </description>
      <content>&lt;p&gt;Im Rahmen unseres Proseminars Network Hacking laden wir herzlich zu dem öffentlichen Talk zum Thema IT-Security Awareness unseres Gastredners Andreas Rieb von der Firma brainsecurity ein. Der Talk wird durch einige Live Hacks ergänzt.&lt;/p&gt;

&lt;p&gt;Themen:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;Social Engineering und Information Leakage&lt;/li&gt;
  &lt;li&gt;Password Attacks&lt;/li&gt;
  &lt;li&gt;Phishing mit Hardware&lt;/li&gt;
  &lt;li&gt;Bad USB Devices&lt;/li&gt;
  &lt;li&gt;Linux Rootkits&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Anschließend ist Zeit für eine Diskussion mit dem Vortragenden.&lt;/p&gt;

</content>
      <pubDate>23.10.2015</pubDate>
    </item>
    <item>
      <title/>
      <link>http://www.net.in.tum.de/news/2016/kolloq-sterbenz.html</link>
      <description>
      </description>
      <content>&lt;h1 id="abstract"&gt;Abstract&lt;/h1&gt;
&lt;p&gt;As the Internet becomes increasingly important to all aspects of society, the consequences of disruption are increasingly severe. Thus it is critical to increase the resilience and survivability of the future networks in general, and the Internet in particular. We define resilience as the ability of the network to provide desired service even when the network is challenged by attacks, large-scale disasters and other failures. Resilience subsumes the disciplines of survivability, fault-tolerance, disruption-tolerance, traffic-tolerance, dependability, performability and security. This presentation will provide a brief introduction to the disciplines and challenges to network resilience and to our ResiliNets strategy for resilient network design. Then this presentation will describe the complex multilevel structure of the Internet topology, along with complex-systems analysis and heuristics to improve infrastructure resilience under cost constraints. Then this presentation will describe ongoing work in the design and analysis of a new composable, cross-layered resilient transport (ResTP) and geodiverse multipath routing protocol (GeoDivRP). These protocols are designed to are being developed to provide resilience and survivability in the face of targeted attacks and large-scale disasters to the network infrastructure.&lt;/p&gt;

&lt;h1 id="bio"&gt;Bio&lt;/h1&gt;
&lt;p&gt;James P.G. Sterbenz is Professor of Electrical Engineering &amp;amp; Computer Science and a member of technical staff at the Information &amp;amp; Telecommunication Technology Center at The University of Kansas, is a Visiting Professor of in the School of Computing and Communications in InfoLab 21 at Lancaster University in the UK, an adjunct professor in the Computing Department at The Hong Kong Polytechnic University and has been a Visiting Guest Professor in the Communication Systems Group at ETH Zürich. He has previously held senior staff and research management positions at BBN Technologies, GTE Laboratories and IBM Research. His research interests include resilient, survivable and disruption tolerant networking, future Internet architectures, active and programmable networks and high-speed networking and components. He is the director of the ResiliNets Research Group and has been PI in a number of projects including the NSF FIND and GENI programs, the EU FIRE ResumeNet project, leads the GpENI international programmable network testbed project and has lead a US DoD project in highly-mobile ad hoc disruption-tolerant networking. He received a DSc in computer science from Washington University in 1991. He has been program chair for IEEE GI, GBN and HotI; IFIP RNDM, IWSOS, PfHSN and IWAN; and was on the editorial board of IEEE Network. He is principal author of the book High-Speed Networking: A Systematic Approach to High-Bandwidth Low-Latency Communication.&lt;/p&gt;
</content>
      <pubDate>07.10.2015</pubDate>
    </item>
    <item>
      <title/>
      <link>http://www.net.in.tum.de/news/2016/kolloq-reisslein.html</link>
      <description>
      </description>
      <content>&lt;h1 id="abstract"&gt;Abstract&lt;/h1&gt;

&lt;p&gt;In this presentation, I will give an overview of recent advances in access and sensor networking in my group at ASU. In the area of access networks involving an optical fiber component, we have recently completed extensive studies on passive optical networks (PONs) as well as fiber-wireless (FiWi) access networks. Presently, we are examining the combination of high-speed PON access networks with slower-speed digital subscriber line (DSL) networks.&lt;/p&gt;

&lt;p&gt;In the area of purely wireless access networks, we have analyzed the connection establishment in LTE-A networks. We found that for access systems with a long timeout and high barring probability, the numbers of user equipment (UE) nodes participating in random access contention in successive slots tend to Poisson process, irrespective of the arrival process (e.g., even for Markov Modulated Poisson Process arrivals).&lt;/p&gt;

&lt;p&gt;In the area of sensor networks, we are working on developing a complete video sensor network solution ranging from the sensor node platform to the application layer streaming protocol. I will briefly outline a novel Wireless Sensor Node Platform (WSNP) approach to Dynamic Adaptive Streaming over HTTP (DASH).&lt;/p&gt;

&lt;h1 id="bio"&gt;Bio&lt;/h1&gt;

&lt;p&gt;Martin Reisslein is a Professor in the School of Electrical, Computer, and Energy Engineering at Arizona State University, Tempe. He received the Dipl.-Ing. (FH) degree from the Fachhochschule Dieburg, Germany, in 1994, and the M.S.E. degree from the University of Pennsylvania, Philadelphia, in 1996. Both in electrical engineering. He received his Ph.D. in systems engineering from the University of Pennsylvania in 1998. During the academic year 1994-1995 he visited the University of Pennsylvania as a Fulbright scholar. From July 1998 through October 2000 he was a scientist with the German National Research Center for Information Technology (GMD Fraunhofer FOKUS), Berlin and lecturer at the Technical University Berlin. From October 2000 through 2005 he was an Assistant Professor and from 2005 through 2011 he was an Associate Professor at ASU.&lt;/p&gt;

&lt;p&gt;Martin Reisslein has published over 120 journal articles and over 60 conference papers in the areas of multimedia networking over wired and wireless network, video traffic characterization, optical networking, and engineering education. His Google Scholar h-index is 39, and his ISI Web of Science h-index is 21. He received the NSF Career Award in 2002.  He served as Editor-in-Chief of the IEEE Communications Surveys and Tutorials from January 2003 through February 2007, and serves currently as Associate EiC for this journal. He served as Associate Editor for the IEEE/ACM Transactions on Networking (2009-2013), and currently serves as Associate Editor for Computer Networks (Elsevier), Optical Switching and Networking (Elsevier), the Journal of Communications and Networks, and the IEEE Transactions on Education. He has served on the Technical Program Committees of IEEE Infocom, IEEE Globecom, and IEEE ICC. He is a Fellow of the IEEE (Class of 2014) and a Senior Member of the ACM.&lt;/p&gt;
</content>
      <pubDate>23.07.2015</pubDate>
    </item>
    <item>
      <title/>
      <link>http://www.net.in.tum.de/news/2016/kolloq-liebeherr.html</link>
      <description>
      </description>
      <content>&lt;h1 id="abstract"&gt;Abstract&lt;/h1&gt;

&lt;p&gt;Self-organizing networks have emerged as a powerful paradigm for providing network services. Unlike traditional infrastructure-based networks, self-organizing networks are formed and operated in a fully distributed manner, and do not rely on centralized mechanisms for network formation, management, or operation. Compared to conventional networks, self-organizing networks are better suited to adapt to changes of network topology, traffic mix, and service requirements. This talk will make a case that self-organizing networks are suitable to dynamically adapt network services offered to applications. We present our recent efforts on developing mechanism to deploy customizable data delivery services. In our approach, a data delivery service is expressed in terms of an XML specification, which defines a finite-state machine for the service. Network nodes dynamically load a service specification and instantiate finite-state machines on-demand without the need to update the protocol implementation. An evaluation of these mechanisms in the HyperCast overlay middleware, sheds light on the performance tradeoffs of the approach.&lt;/p&gt;

&lt;h1 id="bio"&gt;Bio&lt;/h1&gt;

&lt;p&gt;Jörg Liebeherr received the Ph.D. degree in Computer Science from the Georgia Institute of Technology in 1991. After a Postdoc at the University of California, Berkeley, he joined the Department of Computer Science at the University of Virginia in 1992. Since Fall 2005, he is with the Department of Electrical and Computer Engineering of the University of Toronto. He has served on editorial boards and organization committees of several journals and conferences in computer networking. He was Editor-in-Chief of IEEE Network in 1999-2000. He is a co-author of the textbook ``Mastering Networks: An Internet Lab Manual'', published by Addison-Wesley in 2004. He was co-recipient of a best paper award at ACM Sigmetrics 2005. He served on the Board of Governors of the IEEE Communications Society in 2003-2005. He was Co-chair of ACM CoNext 2009 and ACM Sigcomm 2011. He is a Fellow of the IEEE. His current research interests are self-organizing networks and network calculus.&lt;/p&gt;
</content>
      <pubDate>22.07.2015</pubDate>
    </item>
    <item>
      <title>Prof. Dr.-Ing. Eike Jessen * 28. August 1933, † 18. März 2015</title>
      <link>http://www.net.in.tum.de/news/2016/traueranzeige-jessen.html</link>
      <description>
      </description>
      <content>
&lt;p&gt;Prof. Dr.-Ing. Eike Jessen * 28. August 1933, † 18. März 2015&lt;/p&gt;

&lt;p&gt;Die Nachricht vom Tode von Prof. Dr.-Ing. Eike Jessen, der von 1983 bis 2001 Inhaber des Lehrstuhls Informatik 8 der TU München war, traf uns schmerzlich.
Die Welt ist um einen wunderbaren Menschen ärmer geworden, der mit seiner beispielhaften Haltung vielen ein Vorbild war.&lt;/p&gt;

&lt;p&gt;Im Namen des gesamten Lehrstuhls&lt;/p&gt;

&lt;p&gt;Georg Carle&lt;/p&gt;

&lt;p&gt;Man lebt zweimal:&lt;br /&gt;
das erste Mal in der Wirklichkeit,&lt;br /&gt;
das zweite Mal in der Erinnerung.&lt;br /&gt;
                          Honoré de Balzac&lt;/p&gt;

&lt;p&gt;trauer.sueddeutsche.de/Traueranzeige/Eike-Jessen&lt;/p&gt;
</content>
      <pubDate>23.03.2015</pubDate>
    </item>
    <item>
      <title/>
      <link>http://www.net.in.tum.de/news/2016/kolloq-deep.html</link>
      <description>
      </description>
      <content>&lt;h1 id="abstract"&gt;Abstract&lt;/h1&gt;

&lt;p&gt;Network virtualization allows flexibility to configure virtual networks in a dynamic manner. In such a setting, to provide resilient services to virtual networks, we consider the situation where the substrate network provider wants to have standby virtual routers ready to serve the virtual networks in the event of a failure. Such a failure can affect one or more virtual routers in multiple virtual networks. The goal of our work is to make the optimal selection of standby virtual routers so that virtual networks can be dynamically reconfigured back to their original topologies after a failure. We present an optimization formulation and a heuristic for this problem. By considering a number of factors, we present numerical studies to show how the optimal selection is affected, and the results showed that the proposed heuristic's performance was close to the optimization model when there are sufficient standby virtual routers for each virtual networks and the substrate nodes have capability to support multiple standby virtual routers to be in service concurrently. We also report on an experimental study with a wide-area virtual network platform.&lt;/p&gt;

</content>
      <pubDate>13.03.2015</pubDate>
    </item>
    <item>
      <title>Mit Peeroskop auf der CeBIT</title>
      <link>http://www.net.in.tum.de/news/2016/peeroskop-cebit.html</link>
      <description>
      </description>
      <content>&lt;p&gt;Der Lehrstuhl für Netzarchitekturen und Netzdienste ist vom 15.03. bis 19.03. mit dem Projekt Peeroskop am BMBF-Stand auf der CeBIT vertreten.&lt;/p&gt;

&lt;p&gt;Weitere Details finden sich auf den Seiten des BMBF:
www.bmbf.de/de/messen.php&lt;/p&gt;
</content>
      <pubDate>15.11.2014</pubDate>
    </item>
    <item>
      <title/>
      <link>http://www.net.in.tum.de/news/2016/kolloq-laskov.html</link>
      <description>
      </description>
      <content>&lt;h1 id="abstract"&gt;Abstract&lt;/h1&gt;

&lt;p&gt;Many recent high-profile security incidents have been categorized as "Advanced Persistent Threats" (APT). Their characteristic features include exploitation of previously unknown vulnerabilities and sophisticated social engineering carefully tailored to a specific recipient. To mitigate the growing risk of APT attacks arising from the economic and political motivation, novel detection methodology must be developed to complement the traditional signature-based techniques.  In this talk, I will review the key features of APT and discuss the technical challenges arising in their detection. In particular, I will focus on methods for retrospective identification of 0-day attacks and evasion-resistant detection of malicious PDF documents commonly used for delivery of APT attacks. As an outlook, I will discuss potential architectures for security products which should provide adequate protection against APT.&lt;/p&gt;

&lt;h1 id="bio"&gt;Bio&lt;/h1&gt;

&lt;p&gt;Pavel Laskov graduated from the Moscow Institute of Radio, Electronics and Automation (Russia) in 1994 with a diploma in computer engineering.  He received a M.Sc. and a Ph.D. in computer science from the University of Delaware (Newark, DE, USA) in 1996 and 2001 respectively. From 2001 to 2010 he was a senior researcher at the Fraunhofer Institute FIRST in Berlin. In 2004 he started investigation of machine learning methods for intrusion detection and has lead the development of a self-learning intrusion detection system ReMIND. From 2009 to 2014 he was a Heisenberg Fellow of the German Science Foundation at the University of Tuebingen.  In September 2014 he joined Huawei's European Research Center in Munich as the head of the Security Product Innovation Team responsible for advanced architectural and technological design of security products.  His research interests span intrusion detection, static and dynamic malware analysis, applications of machine learning and big data to security and many other related topics.&lt;/p&gt;
</content>
      <pubDate>10.11.2014</pubDate>
    </item>
    <item>
      <title>Christopher Palow, topic: Facebook¹s Anti-Phishing System</title>
      <link>http://www.net.in.tum.de/news/archive/christopher.html</link>
      <description>
      </description>
      <content>&lt;h1 id="abstract"&gt;Abstract&lt;/h1&gt;
&lt;p&gt;Facebook prevents and mitigates many forms of abuse from a variety of actors most commonly focused on making money. Facebook's Site Integrity team combats these abuses in order to protect people using the service. This talk outlines the anti-phishing system at Facebook protecting the logins of the 1.35 billion people who visit Facebook every month.
#Bio
Christopher Palow leads engineering teams at Facebook's London office focused on account security. Over the past seven years Chris has focused on stopping abuse on Facebook from phishing, fake accounts, malware, and various other scams through various detection and response systems. Prior to joining Facebook Chris spent two years each at MITRE and Crossbeam Systems working on the Linux kernel in the networking stack. Chris graduated with a BS &amp;amp; MS from CMU.&lt;/p&gt;

</content>
      <pubDate>06.11.2014</pubDate>
    </item>
    <item>
      <title>Vortrag: "Cyber Crime"</title>
      <link>http://www.net.in.tum.de/news/archive/ilab-resear-1.html</link>
      <description>
      </description>
      <content> &lt;div class="indent"&gt;&lt;h1 style="margin-top:11.52pt; margin-bottom:0pt; margin-left:.38in; text-indent: -.38in; text-align:center; direction:ltr; unicode-bidi:embed; vertical-align:baseline; punctuation-wrap:hanging"&gt;&lt;span style="font-family: Arial; font-size: 27px; font-weight: normal; text-indent: -36.4799995422363px; "&gt;Vortrag zum Thema&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;p style="margin-top:11.52pt; margin-bottom:0pt; margin-left:.38in; text-indent: -.38in; text-align:center; direction:ltr; unicode-bidi:embed; vertical-align:baseline; punctuation-wrap:hanging" class="bodytext"&gt;&lt;span style="text-indent: -0.38in; font-size: 48pt; font-family: Arial; font-weight: bold; "&gt;Cyber&lt;/span&gt;&lt;span style="text-indent: -0.38in; font-size: 48pt; font-family: Arial; font-weight: bold; "&gt; Crime&lt;/span&gt;&lt;/p&gt;
&lt;p style="margin-top:4.8pt; margin-bottom:0pt; margin-left:.38in; text-indent: -.38in; text-align:center; direction:ltr; unicode-bidi:embed; vertical-align:baseline; punctuation-wrap:hanging" class="bodytext"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="margin-top:4.8pt; margin-bottom:0pt; margin-left:.38in; text-indent: -.38in; text-align:center; direction:ltr; unicode-bidi:embed; vertical-align:baseline; punctuation-wrap:hanging" class="bodytext"&gt;&lt;span style="font-size: 20.0pt; font-family:Arial; color:black; language:de-DE"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="margin-top:4.8pt; margin-bottom:0pt; margin-left:.38in; text-indent: -.38in; text-align:center; direction:ltr; unicode-bidi:embed; vertical-align:baseline; punctuation-wrap:hanging" class="bodytext"&gt;&lt;span style="font-size: 20.0pt; font-family:Arial; color:black; language:de-DE"&gt;&lt;b&gt;Sprecher:&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="margin-top:4.8pt; margin-bottom:0pt; margin-left:.38in; text-indent: -.38in; text-align:center; direction:ltr; unicode-bidi:embed; vertical-align:baseline; punctuation-wrap:hanging" class="bodytext"&gt;&lt;span style="font-size: 20.0pt; font-family:Arial; color:black; language:de-DE"&gt;Günter Seibold&lt;/span&gt;&lt;/p&gt;
&lt;p style="margin-top:4.8pt; margin-bottom:0pt; margin-left:.38in; text-indent: -.38in; text-align:center; direction:ltr; unicode-bidi:embed; vertical-align:baseline; punctuation-wrap:hanging" class="bodytext"&gt;&lt;span style="font-size: 20.0pt; font-family:Arial; color:black; language:de-DE"&gt;Dezernatsleiter &lt;/span&gt;&lt;span style="font-size:20.0pt; font-family:Arial; color:black; language:de-DE"&gt;Cyber&lt;/span&gt;&lt;span style="font-size:20.0pt; font-family:Arial; color:black; language:de-DE"&gt; Crime LKA Bayern&lt;/span&gt;&lt;/p&gt;
&lt;p style="margin-top:4.8pt; margin-bottom:0pt; margin-left:.38in; text-indent: -.38in; text-align:center; direction:ltr; unicode-bidi:embed; vertical-align:baseline; punctuation-wrap:hanging" class="bodytext"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="margin-top:4.8pt; margin-bottom:0pt; margin-left:.38in; text-indent: -.38in; text-align:center; direction:ltr; unicode-bidi:embed; vertical-align:baseline; punctuation-wrap:hanging" class="bodytext"&gt;&lt;span style="font-size: 20.0pt; font-family:Arial; color:black; language:de-DE"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="margin-top:4.8pt; margin-bottom:0pt; margin-left:.38in; text-indent: -.38in; text-align:center; direction:ltr; unicode-bidi:embed; vertical-align:baseline; punctuation-wrap:hanging" class="bodytext"&gt;&lt;span style="font-size: 20.0pt; font-family:Arial; color:black; language:de-DE"&gt;&lt;b&gt;Inhalt:&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="margin-top:4.8pt; margin-bottom:0pt; margin-left:.38in; text-indent: -.38in; text-align:center; direction:ltr; unicode-bidi:embed; vertical-align:baseline; punctuation-wrap:hanging" class="bodytext"&gt;&lt;span style="font-size: 20.0pt; font-family:Arial; color:black; language:de-DE"&gt;Internetvergehen und Möglichkeiten zu deren Verfolgung&lt;/span&gt;&lt;/p&gt;
&lt;p style="margin-top:4.8pt; margin-bottom:0pt; margin-left:.38in; text-indent: -.38in; text-align:center; direction:ltr; unicode-bidi:embed; vertical-align:baseline; punctuation-wrap:hanging" class="bodytext"&gt;&lt;span style="font-size: 20.0pt; font-family:Arial; color:black; language:de-DE"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="margin-top:4.8pt; margin-bottom:0pt; margin-left:.38in; text-indent: -.38in; text-align:center; direction:ltr; unicode-bidi:embed; vertical-align:baseline; punctuation-wrap:hanging" class="bodytext"&gt;&lt;span style="font-size: 20.0pt; font-family:Arial; color:black; language:de-DE"&gt;&lt;b&gt;Zeit und Ort:&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="margin-top:4.8pt; margin-bottom:0pt; margin-left:.38in; text-indent: -.38in; text-align:center; direction:ltr; unicode-bidi:embed; vertical-align:baseline; punctuation-wrap:hanging" class="bodytext"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="margin-top:4.8pt; margin-bottom:0pt; margin-left:.38in; text-indent: -.38in; text-align:center; direction:ltr; unicode-bidi:embed; vertical-align:baseline; punctuation-wrap:hanging" class="bodytext"&gt;&lt;span style="font-size: 20.0pt; font-family:Arial; color:black; language:de-DE"&gt;24.10.2014&lt;/span&gt;&lt;/p&gt;
&lt;p style="margin-top:4.8pt; margin-bottom:0pt; margin-left:.38in; text-indent: -.38in; text-align:center; direction:ltr; unicode-bidi:embed; vertical-align:baseline; punctuation-wrap:hanging" class="bodytext"&gt;&lt;span style="font-size: 20.0pt; font-family:Arial; color:black; language:de-DE"&gt;14:14&lt;/span&gt;&lt;/p&gt;
&lt;p style="margin-top:4.8pt; margin-bottom:0pt; margin-left:.38in; text-indent: -.38in; text-align:center; direction:ltr; unicode-bidi:embed; vertical-align:baseline; punctuation-wrap:hanging" class="bodytext"&gt;&lt;span style="font-size: 20.0pt; font-family:Arial; color:black; language:de-DE"&gt;HS2 FMI Gebäude&lt;/span&gt;&lt;/p&gt;

</content>
      <pubDate>24.10.2014</pubDate>
    </item>
    <item>
      <title>iLab: Research Experience (ilab2): Places available</title>
      <link>http://www.net.in.tum.de/news/archive/ilab-resear.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;We have two places left for the iLab: Research Experience (ilab2). If you are interested contact &lt;%= protected_email("ilab2@net.in.tum.de")%.&lt;/p&gt;
</content>
      <pubDate>06.10.2014</pubDate>
    </item>
    <item>
      <title>Dimitri Papadimtriou "Analytical methods in system analysis"</title>
      <link>http://www.net.in.tum.de/news/archive/dimitri-papa.html</link>
      <description>
      </description>
      <content>&lt;p class="bodytext"&gt;18.9.2014, 2:00 pm, FMI 03.05.033 (MI-Building, Campus Garching), this talk will be held in English  Abstract: Predictive simulations provide insight into the physics that drive complex systems enabling identification of key mechanisms and allows for rigorous and robust optimization/design. However, predictive simulation requires careful assessment of all sources of numerical errors (discretization, resolution, etc.) and uncertainty (sampling, model parameters and equations, etc.) in particular, when aleatory (inherent to the variability present in system and its surroundings) and irreducible. Uncertainty propagation methods quantifies uncertainties in system output from all sources of input uncertainty by means of computational model (forward uncertainty propagation), determines which uncertainties contribute the most to output uncertainties (sensitivity analysis) and characterizes uncertainty. In turn, uncertainty quantification assists in model prediction (interpolation, extrapolation, etc.) and thus decision making. In this context, validation (process of determining the degree to which a model is an accurate representation of the real world for) of computational models for establishing confidence in model predictions plays a fundamental role. While predictive methods are mostly based on sampling, this talk investigates the use of analytical methods (such as reliability methods) to compute the probability of failure of structural systems.   &lt;br/&gt;contact person:&lt;br/&gt; Heiko Niedermayer &lt;br/&gt; phone: +49.89.289.18012 &lt;br/&gt; Email: &lt;a href="mailto:niedermayer@net.in.tum.de"&gt;niedermayer&lt;img src="../../img/at-c5e3636c.gif" alt="" /&gt;net.in.tum.de&lt;/a&gt; &lt;/p&gt;

</content>
      <pubDate>18.09.2014</pubDate>
    </item>
    <item>
      <title/>
      <link>http://www.net.in.tum.de/news/archive/kolloq-nask.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;Tuesday, 29th of July 2014, 1:00 pm,&amp;nbsp; FMI 03.07.023 (MI-Building, Campus Garching) this talk will be held in English&lt;/p&gt;
&lt;p class="bodytext"&gt;Abstract:  This talk will explore the current state of web browser security. It will cover the basic design architecture behind the Chromium browser, what has been done to make it harder to attack and exploit, the different approaches the security team takes and more. Security is a road with no end in sight, but the talk will discuss ongoing projects to further improve in the future.&lt;/p&gt;
&lt;p class="bodytext"&gt;Bio: Nasko Oskov is a security engineer working on the Chromium browser. He has spent most of his energy on the defensive side of computer security working on the building blocks of technology - operating systems, authentication protocols, and now browsers.&lt;/p&gt;
&lt;p class="bodytext"&gt;&lt;br/&gt;contact person:&lt;br/&gt; Ralph Holz &lt;br/&gt; phone: +49.89.289.18043 &lt;br/&gt; Email: &lt;a href="mailto:holz@net.in.tum.de"&gt;holz&lt;img src="../../img/at-c5e3636c.gif" alt="" /&gt;net.in.tum.de&lt;/a&gt; &lt;/p&gt;

</content>
      <pubDate>29.07.2014</pubDate>
    </item>
    <item>
      <title/>
      <link>http://www.net.in.tum.de/news/archive/kolloq-dr.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;22.7.2014, 2:00 pm, FMI 00.12.019 (MI-Building, Campus Garching), this talk will be held in English  Abstract: The current Internet design is not capable of supporting communications in environments characterized by very long delays and frequent network partitions. To allow devices to communicate in such environments, delay-tolerant networking solutions have been proposed by exploiting opportunistic message forwarding, with limited expectations of end-to-end connectivity and node resources. However, such proposals present two major drawbacks: first, they ignore the impact that human behavior has on the dynamics of the network; and second, they focus on low density scenarios. This talk presents a study about the impact that human behavior has on opportunistic forwarding showing: i) that performance can be improved by taking the dynamics of the network into account; and ii) to show that delay-tolerant networking can also be used to reduce communication costs in networks with high density by considering the users' behavior.   Bio: Paulo Mendes is the vice-director of the Cognition and People centric computing Research Center (COPELabs) at University Lusofona, where he is associated professor, and director of the Ph.D program on Informatics - New Media and Pervasive Systems (NEMPS). In 2004 he got his Ph.D. degree in Informatics Engineering from the University of Coimbra, having performed his Ph.D. thesis work as a visiting Scholar at Columbia University, New York. Before COPELABS, Paulo was a senior researcher at NTT DOCOMO Euro-labs for 4 years, and a research coordinator at the portuguese research lab INESCTEC for 3 years. The publication record includes over 100 scientific articles, 14 international patents, and contributions of IETF.   &lt;br/&gt;contact person:&lt;br/&gt; Georg Carle &lt;br/&gt; phone: +49.89.289.18030 &lt;br/&gt; Email: carle@net.in.tum.de &lt;/p&gt;

</content>
      <pubDate>22.07.2014</pubDate>
    </item>
    <item>
      <title/>
      <link>http://www.net.in.tum.de/news/archive/kolloq-rebe.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;15.7.2014, 2:00 pm, FMI 03.07.023 (MI-Building, Campus Garching), this talk will be held in English &lt;/p&gt;
&lt;p class="bodytext"&gt;Abstract:  Stylometry is a form of authorship attribution that relies on the linguistic information found in documents. This paper focuses on the cross-domain case where the known and suspect documents differ in what setting they were created in. These domains include Twitter feeds, blog entries, Reddit comments, and emails. We determine that state-of-the-art methods in stylometry do not perform as well in cross-domain situations as they do in in-domain situations and propose a method that increases the accuracy in the cross-domain setting. We are able to improve the accuracy of cross-domain stylometry to as high as 80%. Being able to identify authors across domains facilitates linking identities across the Internet making this a key security and privacy concern; users can take other measures to ensure their anonymity, but due to their unique writing style, they may not be as anonymous as they believe.   &lt;br/&gt;contact person:&lt;br/&gt; Christian Grothoff &lt;br/&gt; phone: +49.89.289.18040 &lt;br/&gt; Email: &lt;a href="javascript:linkTo_UnCryptMailto('nbjmup+ojmt/uivfsfzAuvn/ef');" &gt;grothoff@net.in.tum.de&lt;/a&gt;&lt;/p&gt;

</content>
      <pubDate>15.07.2014</pubDate>
    </item>
    <item>
      <title/>
      <link>http://www.net.in.tum.de/news/archive/kolloq-pete.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;7.7.2014, 6:00 pm, FMI 00.02.001 (MI-Building, Friedrich L. Bauer  Hörsaal, Campus Garching), this talk will be held in German &lt;/p&gt;
&lt;p class="bodytext"&gt;Abstract:  Überwachung gibt es bereits seit Jahrhunderten. Aber erst das Internet und die umfassende Digitalisierung ermöglichen eine Totalüberwachung in Echtzeit. Im Vortrag geht es um die Frage, was dagegen unternommen werden kann.  Bio:  Vorsitzender der Europäischen Akademie für Informationsfreiheit und Datenschutz, Lehrbeauftragter an der Universität Hamburg, 2003-2013 Bundesbeauftragter für den Datenschutz und die Informationsfreiheit.  Buchveröffentlichungen: Datenschutz im Internet (2002), Das Ende der Privatsphäre - Der Weg in die Überwachungsgesellschaft (2007), Total überwacht - Wie wir in Zukunft unsere Daten schützen (2014).  Auszeichnungen: Preis der Friedrich-Ebert-Stiftung „Das politische Buch 2008“ für sein Werk Das Ende der Privatsphäre; „eco Internet AWARD 2008“ der deutschen Internetwirtschaft, „Deutscher Datenschutzpreis“ der Gesellschaft für Datenschutz und Datensicherheit (GDD) 2013; “Louis D. Brandeis Privacy Award 2014” der US-Patientenrechteorganisation Patients Privacy Rights.   &lt;br/&gt;contact person:&lt;br/&gt; Christian Grothoff &lt;br/&gt; phone: +49.89.289.18040 &lt;br/&gt; Email: &lt;a href="javascript:linkTo_UnCryptMailto('nbjmup+ojmt/uivfsfzAuvn/ef');" &gt;grothoff@net.in.tum.de&lt;/a&gt;&lt;/p&gt;
</content>
      <pubDate>07.07.2014</pubDate>
    </item>
    <item>
      <title>Proseminar Vorbesprechung</title>
      <link>http://www.net.in.tum.de/news/archive/kickoff-ilab-9.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;Die Vorbesprechung des diesjährigen Proseminars &amp;quot;Network Hacking und Abwehr&amp;quot; findet am 27.06.2014 um 13:00 in Raum 03.07.023 statt. Dauer ca. 30 Minuten.&lt;/p&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;p class="bodytext"&gt;Neben einer Vorstellung der wichtigsten Spielregeln werden wir kurz Themen vorstellen. Eine Vergabe erfolgt erst&amp;nbsp;nach den Semesterferien. Der Zeitpunkt der Vergabeveranstaltung wird noch bekannt gegeben.&lt;/p&gt;&lt;/div&gt;

</content>
      <pubDate>27.06.2014</pubDate>
    </item>
    <item>
      <title>Smart Space Orchestration Hands-On | 9h00# @LRZ (copy 1)</title>
      <link>http://www.net.in.tum.de/news/archive/smart-space.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;&lt;a href="http://s2o.net.in.tum.de/?site=galileoWorkshopMay14" target="_blank" &gt;Go to the event page: here.&lt;/a&gt;&lt;/p&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;p class="bodytext"&gt;&lt;a href="http://www.facebook.com/ds2os" target="_blank" &gt;Facebook&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;p class="bodytext"&gt;&lt;a href="http://www.twitter.com/ds2os" target="_blank" &gt;Twitter&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;

</content>
      <pubDate>21.05.2014</pubDate>
    </item>
    <item>
      <title>Kickoff iLab2 | 10h00# @room 03.07.023</title>
      <link>http://www.net.in.tum.de/news/archive/kickoff-ilab-10.html</link>
      <description>
      </description>
      <content>  &lt;p class="bodytext"&gt;&lt;span style="white-space: normal; "&gt;If you want to participate in the iLab² practical exercise joining this meeting is mandatory as we will build the teams and schedule your lab slots.&lt;/span&gt;&lt;/p&gt;&lt;p class="bodytext"&gt;&lt;span style="white-space: normal; "&gt;The first meeting will not only be used for administrative things but we will get right into the topic. First we will do a recap of static and dynamic routing followed by a lecture about the Border Gateway Protocol.&lt;/span&gt;&lt;/p&gt;&lt;p class="bodytext" style="font-family: Arial, Helvetica, sans-serif; font-style: normal; white-space: normal; text-decoration: none; "&gt;If you did not register for the exercise yet please do so&amp;nbsp;&lt;span style="font-family: Arial, Helvetica, sans-serif; text-decoration: none; color: rgb(59, 115, 171); "&gt;&lt;a href="https://ilab2.net.in.tum.de/?address=register" target="_blank" &gt;here&lt;/a&gt;&lt;/span&gt;.&lt;/p&gt;  
</content>
      <pubDate>10.04.2014</pubDate>
    </item>
    <item>
      <title/>
      <link>http://www.net.in.tum.de/news/archive/kolloq-top-1.html</link>
      <description>
      </description>
      <content> &lt;div&gt;&lt;p class="bodytext"&gt;Abstract:&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p class="bodytext"&gt;This session consists of three talks of 30 minutes each. The first talk, by Barry Wellman, has the topic: &amp;nbsp;“Triple revolution: the intersection of social network analysis, &amp;nbsp; the far-flung personalized internet, and the mobile revolution”. The second speaker, David Clark, will talk about &amp;nbsp; “Evaluating Network Architectures”. Finally, Marcelo Thompson will give a presentation entitled &amp;nbsp; “The (Moral) Responsibility of Internet Intermediaries”.&lt;/p&gt;
&lt;p class="bodytext"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p class="bodytext"&gt;Bio Berry Wellman: Professor Barry Wellman studies networks: community, communication, computer, and social. &amp;nbsp;His research examines virtual community, the virtual workplace, social support, community, kinship, friendship, and social network theory and methods. &amp;nbsp;Based at the University of Toronto, he directs NetLab at the Faculty of Information, is the former S.D. &amp;nbsp;Clark Professor at the Department of Sociology, and is a member of the Cities Centre and the Knowledge Media Design Institute. &amp;nbsp;Wellman is the co-author of the prize-winning Networked: The New Social Operating System (with Lee Rainie, Director of the Pew Internet and American Life Project) published by MIT Press in Spring 2012. &amp;nbsp;The book analyzes the social nature of networked individualism, growing out of the Social Network Revolution, the Internet Revolution, and the Mobile Revolution.&lt;/p&gt;
&lt;p class="bodytext"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p class="bodytext"&gt;Bio David Clark: David Clark is a Senior Research Scientist at the MIT Computer Science and Artificial Intelligence Laboratory, where he has worked since receiving his Ph.D. there in 1973. &amp;nbsp;Since the mid 70s, Dr. Clark has been leading the development of the Internet; from 1981-1989 he acted as Chief Protocol Architect in this development, and chaired the Internet Activities Board. &amp;nbsp;His current research looks at re-definition of the architectural underpinnings of the Internet, and the relation of technology and architecture to economic, societal and policy considerations. &amp;nbsp;He is helping the U.S. National Science foundation organize their Future Internet Design program. &amp;nbsp;Dr. Clark is past chairman of the Computer Science and Telecommunications Board of the National Academies, and has contributed to a number of studies on the societal and policy impact of computer communications. &amp;nbsp;He is co-director of the MIT Communications Futures Program, a project for industry collaboration and coordination along the&amp;nbsp;communications value chain.&lt;/p&gt;
&lt;p class="bodytext"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p class="bodytext"&gt;Bio Marcelo Thompson: Marcelo Thompson is an Assistant Professor of Law and Deputy Director of the LLM in Information Technology and Intellectual Property Law at the Faculty of Law, The University of Hong Kong. &amp;nbsp;Courses Marcelo teaches or has taught at HKU include “Law and Society”, “Legal Theory”, “Privacy and Data Protection” and “Regulation of Cyberspace”. &amp;nbsp;Marcelo's core research interests lie in the intersection between law, political theory and the study of technological change. &amp;nbsp;He is particularly interested in what the entrenchment of new forms of normativity in the design of the information environment means for the life of law and politics in the 21st century.&lt;/p&gt;
&lt;p class="bodytext"&gt;&amp;nbsp;&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;p class="bodytext"&gt;contact persons: &lt;br/&gt; Georg Carle &lt;br/&gt; phone: +49.89.289.18030 &lt;br/&gt; Email: &lt;a href="mailto:carle@net.in.tum.de"&gt;carle&lt;img src="../../img/at-c5e3636c.gif" alt="" /&gt;net.in.tum.de&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p class="bodytext"&gt;Heiko Niedermayer &lt;br/&gt; phone: +49.89.289.18012 &lt;br/&gt; Email: &lt;a href="mailto:niedermayer@net.in.tum.de"&gt;niedermayer&lt;img src="../../img/at-c5e3636c.gif" alt="" /&gt;net.in.tum.de&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;

</content>
      <pubDate>25.11.2013</pubDate>
    </item>
    <item>
      <title>Kickoff iLab2 | 10h00# @room 03.07.023</title>
      <link>http://www.net.in.tum.de/news/archive/kickoff-ilab-6.html</link>
      <description>
      </description>
      <content>  &lt;p class="bodytext"&gt;If you want to participate at the practical exercise please join the first meeting as we will build the teams and schedule your lab slots then.&lt;/p&gt;&lt;p class="bodytext"&gt;The first meeting will not only be used for administrative things but we will right get into the topic by reminding you to the world of static routing.&lt;/p&gt;&lt;p class="bodytext"&gt;If you did not register for the exercise yet please do so&amp;nbsp;&lt;span style="font-family: Arial, Helvetica, sans-serif; text-decoration: none; color: rgb(59, 115, 171); "&gt;&lt;a href="https://ilab2.net.in.tum.de/?address=register" target="_blank" &gt;here&lt;/a&gt;&lt;/span&gt;.&lt;/p&gt;  

</content>
      <pubDate>17.10.2013</pubDate>
    </item>
    <item>
      <title>Info Meeting Proseminar "Network Hacking"</title>
      <link>http://www.net.in.tum.de/news/archive/kickoff-ilab-7.html</link>
      <description>
      </description>
      <content>  &lt;p class="bodytext" style="font-family: Arial, Helvetica, sans-serif; font-style: normal; white-space: normal; text-decoration: none; "&gt;The first info meeting of this winter term's&amp;nbsp;Proseminar &amp;quot;Network Hacking&amp;quot; will take place at&lt;/p&gt;&lt;p class="bodytext" style="font-family: Arial, Helvetica, sans-serif; font-style: normal; white-space: normal; text-decoration: none; "&gt;* 05.07.2013 * 13:00 (s.t.) * Room 03.07.023&lt;/p&gt;&lt;p class="bodytext" style="font-family: Arial, Helvetica, sans-serif; font-style: normal; white-space: normal; text-decoration: none; "&gt;More information and online registration at the &lt;a href="en/teaching/earlier-teaching/ws1314/seminare/proseminar-network-hacking/" target="_self" &gt;Proseminar Homepage&lt;/a&gt;.&lt;/p&gt;  

</content>
      <pubDate>05.07.2013</pubDate>
    </item>
    <item>
      <title/>
      <link>http://www.net.in.tum.de/news/archive/kolloq-prof.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;&lt;b&gt;HybridNN: An accurate and scalable network location service based on the inframetric model &lt;/b&gt;&lt;/p&gt;
&lt;p class="bodytext"&gt;&lt;i&gt;Abstract: &lt;/i&gt; Locating servers that have shortest interactive delay towards an  Internet host provides an important service for large-scale latency  sensitive networked applications, such as VoIP, online network games,  or interactive network services on the cloud. Existing algorithms  assume that the delay space is a metric space, which implies that the  delay between two nodes is symmetric and the triangle inequality  holds. In practice, the delay space is not metric, which lowers the  accuracy of metric-based algorithms. We develop a new scheme whose  theoretical foundation is based on the inframetric model, which has  weaker assumptions than the metric model. We prove that the location  requests can be completed efficiently if the delay space exhibits  modest inframetric dimensions, which we can confirm empirically.  Finally, we propose HybridNN (Hybrid N earest Service N ode Location)  that finds the closest service node accurately thanks to the  inframetric model and scalably by combining delay predictions with  direct probes to a pruned set of neighbors. Simulation results show  that HybridNN locates in nearly all cases the true nearest service  nodes. Experiments on PlanetLab show that with modest query overhead  and maintenance traffic HybridNN can provide accurate nearest service  nodes that are close to optimal.  This is joint work with Y. Fu and Y. Wang from National University of  Defense Technology, Hunan province, 410073, China    &lt;i&gt;Bio: &lt;/i&gt; Ernst Biersack studied computer science at the Technische Universität  München and at the University of North Carolina at Chapel Hill. He  received the Dipl. Infom. (M.S.) and Dr. rer. nat. (Ph.D.) degrees in  computer science from the Technische Universität München, and the  Habilitation à Diriger des Recherches from the University of Nice,  France. From March 1989 to February 1992, he was a Member of Technical  Staff with the Computer Communications Research District of Bell  Commu- nications Research, Morristown, US. Since March 1992, he has  been a Professor in telecommunications at Eurecom, Sophia Antipolis,  France. His current research is on peer-to peer systems and network  tomography.   &lt;/p&gt;

</content>
      <pubDate>04.07.2013</pubDate>
    </item>
    <item>
      <title>Kickoff iLab1 | 16h00# @room 00.13.009A</title>
      <link>http://www.net.in.tum.de/news/archive/kickoff-ilab-4.html</link>
      <description>
      </description>
      <content>  &lt;p class="bodytext"&gt;If you want to participate at the practical exercise please join the first meeting as we will build the teams and schedule your lab slots then.&lt;/p&gt;&lt;p class="bodytext"&gt;&amp;nbsp;&lt;/p&gt;  

</content>
      <pubDate>18.04.2013</pubDate>
    </item>
    <item>
      <title>Kickoff iLab2 | 10h00# @room 03.07.023</title>
      <link>http://www.net.in.tum.de/news/archive/kickoff-ilab-5.html</link>
      <description>
      </description>
      <content>  &lt;p class="bodytext"&gt;If you want to participate at the practical exercise please join the first meeting as we will build the teams and schedule your lab slots then.&lt;/p&gt;&lt;p class="bodytext"&gt;The first meeting will not only be used for administrative things but we will right get into the topic by reminding you to the world of static routing.&lt;/p&gt;&lt;p class="bodytext"&gt;If you did not register for the exercise yet please do so&amp;nbsp;&lt;span style="font-family: Arial, Helvetica, sans-serif; text-decoration: none; color: rgb(59, 115, 171); "&gt;&lt;a href="https://ilab2.net.in.tum.de/?address=register" target="_blank" &gt;here&lt;/a&gt;&lt;/span&gt;.&lt;/p&gt;  

</content>
      <pubDate>18.04.2013</pubDate>
    </item>
    <item>
      <title>Kickoff Hauptseminar ACN2013 | 18h00# @room 03.07.023</title>
      <link>http://www.net.in.tum.de/news/archive/kickoff-haup.html</link>
      <description>
      </description>
      <content>  &lt;p class="bodytext"&gt;In summer term 2013 we will introduce a new form of seminar. The ACN2013 will be organised like a conference. You will submit and review a paper, you will defend it against the reviewer's comments, you will moderate a talk, and your talk will be recorded so that you can improve your style by watching yourself.&lt;/p&gt;&lt;p class="bodytext"&gt;Have a look at the &lt;a href="#" title="conference page" target="_blank" &gt;conference page&lt;/a&gt; and come to the kickoff!&lt;/p&gt;  

</content>
      <pubDate>31.01.2013</pubDate>
    </item>
    <item>
      <title>Anmeldung zu den Seminaren im SS 13 - Kickoff 28.1.13, 15:30 p.m. @ 03.07.023</title>
      <link>http://www.net.in.tum.de/news/archive/vorbesprechu-14.html</link>
      <description>
      </description>
      <content> &lt;div&gt;&lt;p class="bodytext"&gt;Wie jedes Semester bietet der Lehrstuhl wieder folgende Masterseminare an: &lt;/p&gt;&lt;ol&gt;&lt;li&gt;&lt;a href="en/teaching/earlier-teaching/ss13/seminare/blockseminar-future-internet/" target="_self" &gt;Future Internet&lt;/a&gt; - FI (Blockveranstaltung 11.-12.04.2013, ganztägig)&lt;/li&gt;&lt;li&gt;&lt;a href="en/teaching/earlier-teaching/ss13/seminare/hauptseminar-innovative-internettechnologien-und-mobilkommunikation/" target="_self" &gt;Innovative Internettechnologien und Mobilkommunikation&lt;/a&gt; - IITM (wöchentlich freitags 14:00-16:00 Uhr)&lt;/li&gt;&lt;/ol&gt;&lt;p class="bodytext"&gt;  Die Hauptseminarsprache ist jeweils Deutsch. Die angebotenen Themen sind herausvordernd und setzen teilweise Vorwissen voraus. In den Seminaren können sowohl deutsche als auch englische Vorträge gehalten und Ausarbeitungen abgegeben werden. Jeder Student kann die Sprache selber wählen!  &lt;/p&gt;
&lt;div&gt;&lt;strong&gt;Informationsveranstaltungen finden wie folgt statt:&lt;/strong&gt;&lt;/div&gt;
&lt;p class="bodytext"&gt;&amp;nbsp;&lt;/p&gt;
&lt;div&gt;&lt;strong&gt;&lt;b&gt;28.01.2013 - 15:30-17:30 Uhr, FMI 03.07.023&lt;/b&gt;&lt;/strong&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;Seminar Future Internet inkl. Themenvergabe&lt;/li&gt;&lt;li&gt;Seminar Innovative Internettechnologien und Mobilkommunikation (weitere Veranstaltung am 19.04.2013 mit Themenvorstellung und Themenvergabe)&lt;/li&gt;&lt;/ul&gt;&lt;p class="bodytext"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p class="bodytext"&gt;Um einen groben Überblick über die Anzahl der Interessenten zu bekommen, bitten wir um eine unverbindliche Anmeldung zu den Seminaren:  &lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;div&gt;&lt;strong&gt;Anmeldung Future Internet&lt;/strong&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;h1&gt;Anmeldung IITM&lt;/h1&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p class="bodytext"&gt;  Erst wenn Sie ein Thema gewählt und zugeteilt bekommen haben, ist die Teilnahme bindend.&amp;nbsp; Sie können gerne zur Infoveranstaltung erscheinen, auch wenn Sie sich noch nicht sicher sind, ob Sie wirklich am Seminar teilnehmen möchten.  Unser Lehrstuhl freut sich, Sie bei der Informationsveranstaltung und später auch im Seminar begrüßen zu dürfen und Ihnen einen Einblick in unsere Forschungsgebiete geben zu können.&lt;/p&gt;&lt;/div&gt; 

</content>
      <pubDate>28.01.2013</pubDate>
    </item>
    <item>
      <title>Folien online / Ankündigung Vortrag "Eine kleine Historie der IT-Sicherheit: Von den (Mainframe-) Dinosauriern bis zur Cloud."</title>
      <link>http://www.net.in.tum.de/news/archive/kickoff-ilab-2.html</link>
      <description>
      </description>
      <content>  &lt;p class="bodytext"&gt;&lt;/p&gt;&lt;p class="p1" style="font-family: Verdana, sans-serif; "&gt;Wir freuen uns&amp;nbsp;Sie zu einen weiteren Vortrag im Rahmen unseres Proseminars Network Hacking einladen zu dürfen. In diesem Jahr haben wir einen Sprecher gewonnen, der bereits in den 80er Jahren als IT Security Experte aktiv war. Herr Kurth wirkte u.A. beim bekannten &amp;quot;KGB-Hack&amp;quot; (&lt;a href="http://de.wikipedia.org/wiki/KGB-Hack" target="_blank" &gt;http://de.wikipedia.org/wiki/KGB-Hack&lt;/a&gt;) als Ermittler mit. Heute ist Herr Kurth wissenschaftlicher Leiter beim Münchener IT-Security Spezialisten atsec.&lt;/p&gt;&lt;p class="p1" style="font-family: Verdana, sans-serif; "&gt;Der Vortrag wird wie folgt stattfinden:&lt;/p&gt;&lt;p class="p1" style="font-family: Verdana, sans-serif; "&gt;&lt;strong&gt;Freitag, 19. Oktober 2012, 14:30 - 16:30 Uhr Ivar-Ugi-Hörsaal, Laborgebäude CH 2&lt;/strong&gt;&lt;/p&gt;&lt;p class="p1" style="font-family: Verdana, sans-serif; "&gt;Wir freuen uns&amp;nbsp;- trotz des weiten Fußwegs bis zur Chemie - auf Ihr zahlreiches Erscheinen und einen interessanten Vortrag.&lt;/p&gt;&lt;p class="p1" style="font-family: Verdana, sans-serif; "&gt;&amp;nbsp;&lt;/p&gt;&lt;p class="p1" style="font-family: Verdana, sans-serif; "&gt;Update:&amp;nbsp;&lt;/p&gt;&lt;p class="p1" style="font-family: Verdana, sans-serif; "&gt;Die Materialien zum Vortrag sind &lt;a href="http://www.net.in.tum.de/pub/kurth/material.zip" target="_blank" &gt;hier&lt;/a&gt; zu finden!&lt;/p&gt;

</content>
      <pubDate>19.10.2012</pubDate>
    </item>
    <item>
      <title>Kickoff iLab2 | Oct 18 @ 10:15 | room 03.07.023</title>
      <link>http://www.net.in.tum.de/news/archive/kickoff-ilab-3.html</link>
      <description>
      </description>
      <content>  &lt;p class="bodytext"&gt;If you want to participate at the practical exercise please join the first meeting as we will build the teams and schedule your lab slots then.&lt;/p&gt;&lt;p class="bodytext"&gt;The first meeting will not only be used for administrative things but we will right get into the topic by reminding you to the world of static routing.&lt;/p&gt;&lt;p class="bodytext"&gt;If you did not register for the exercise yet please do so&amp;nbsp;&lt;span style="font-family: Arial, Helvetica, sans-serif; text-decoration: none; color: rgb(59, 115, 171); "&gt;&lt;a href="https://ilab2.net.in.tum.de/?address=register" target="_blank" &gt;here&lt;/a&gt;&lt;/span&gt;.&lt;/p&gt;  

</content>
      <pubDate>18.10.2012</pubDate>
    </item>
    <item>
      <title>Talk by Richard Stallman| Jul 11 18:00 | MW 2001</title>
      <link>http://www.net.in.tum.de/news/archive/talk-by-rich.html</link>
      <description>
      </description>
      <content>&lt;p class="bodytext"&gt;Richard Stallman will be visiting us in  Munich in mid-July.On July 11th at 18:00 he will give a public talk in  English on &amp;quot;Copyright vs. Community&amp;quot; at the Technische Universität  München.&lt;/p&gt;
&lt;p class="bodytext"&gt; The talk will be in the &amp;quot;Rudolf-Diesel&amp;quot; Hörsal &amp;quot;MW 2001&amp;quot; on the Campus Garching. &lt;b&gt;The talk is open to the public and attendance is free.&lt;/b&gt;  Registration is not required, but you can register with the Free  Software Foundation for notifications about related activities &lt;a href="https://crm.fsf.org/civicrm/profile/create?gid=98&amp;amp;reset=1" target="_blank" &gt;here&lt;/a&gt;. &lt;/p&gt;
&lt;h3&gt;Summary&lt;/h3&gt;
&lt;p class="bodytext"&gt; Copyright developed in the age of the printing press, and was designed  to fit with the system of centralized copying imposed by the printing  press.  But the copyright system does not fit well with computer  networks, and only draconian punishments can enforce it. The global  corporations that profit from copyright are lobbying for draconian  punishments, and to increase their copyright powers, while suppressing  public access to technology.&lt;/p&gt;
&lt;p class="bodytext"&gt;This applies to scientific publishing too: scholarly articles must  permit redistribution and remix for the good of science. We must strip  the journal publishers of the power to prevent this.&lt;/p&gt;
&lt;p class="bodytext"&gt;If we seriously hope for copyright to serve its only legitimate  purpose --to promote progress, for the benefit of the public-- then we  must make changes in the other direction. &lt;/p&gt;
&lt;h3&gt;About the Speaker&lt;/h3&gt;
&lt;p class="bodytext"&gt; Richard Stallman launched the free software movement in 1983 and started the development of the &lt;a href="http://www.gnu.org/" target="_blank" &gt;GNU operating system&lt;/a&gt;  in 1984.  GNU is free software: everyone has the freedom to copy it and  redistribute it, with or without changes.  The GNU/Linux system,  basically the GNU operating system with Linux added, is used on tens of  millions of computers today.  Stallman has received the ACM Grace Hopper  Award, a MacArthur Foundation fellowship, the Electronic Frontier  Foundation's Pioneer Award, and the the Takeda Award for Social/Economic  Betterment, as well as several honorary doctorates. &lt;/p&gt;
 &amp;nbsp;  

</content>
      <pubDate>11.07.2012</pubDate>
    </item>
    <item>
      <title>Talk Internet Censorship and the Tor network</title>
      <link>http://www.net.in.tum.de/news/archive/anmeldung-zu-1.html</link>
      <description>
      </description>
      <content>Invitation to a &amp;quot;TUM Informatik-Kolloquium&amp;quot;  &lt;table class="contenttable"&gt;&lt;tbody&gt;&lt;tr style="vertical-align: top;"&gt;&lt;td&gt; &lt;b&gt;Internet Censorship and the Tor network  &lt;/b&gt;&lt;b&gt;S&lt;/b&gt;&lt;b&gt;peaker: Jacob Applebaum&lt;/b&gt; &lt;b&gt;University of Washington  &lt;/b&gt;&lt;b&gt;Date: Tuesday, 7th of February 2012, 6:30pm&lt;/b&gt; &lt;b&gt;Location: FMI Interimshörsaal 2(Campus Garching, Boltzmannstr. 5)&lt;/b&gt; &lt;b&gt; This talk will be held in English&lt;/b&gt;  &lt;/tbody&gt;&lt;/table&gt;&lt;p class="bodytext"&gt;Abstract: Internet censorship as done by governments is a very real problem faced by many people  all over the planet. This is a lecture about who censors and why they censor. Specifically,  the talk covers how governments and corporations attempt to censor access to the Tor  anonymisation network and to what lengths governments have gone to stop Tor as a way to  communicate safely with the outside world. The talk will cover some real world examples  that the Tor network has faced and continues to face and it will discuss deployed solutions  and provide a forum for discussion of possible future developments.  Speaker's bio: Jacob Appelbaum is a computer security researcher currently employed by  the University of Washington.  He is also a core member of the Tor project. He is a  founding member of the hacklab Noisebridge in San Francisco where he indulges his  interests in magnetics, cryptography and consensus based governance. He was a driving  force in the team behind the creation of the Cold Boot Attacks; winning both the Pwnie  for Most Innovative Research award and the Usenix Security best student paper award in  2008.  Contact persons:
    &lt;br/&gt;Christian Grothoff &lt;br/&gt; phone: 089/ 289-18032 &lt;br/&gt; Email: &lt;a href="mailto:grothoff@net.in.tum.de"&gt;grothoff&lt;img src="../../img/at-c5e3636c.gif" alt="" /&gt;net.in.tum.de&lt;/a&gt;  &lt;/p&gt;&lt;/div&gt;

</content>
      <pubDate>07.02.2012</pubDate>
    </item>
    <item>
      <title>"Live Hacking" Demo &amp; Talk</title>
      <link>http://www.net.in.tum.de/news/archive/live-hackin.html</link>
      <description>
      </description>
      <content> &lt;div&gt;&lt;p class="bodytext"&gt;Im Rahmen unseres Proseminars &amp;quot;&lt;a href="en/teaching/earlier-teaching/ws1112/seminare/proseminar-network-hacking/" target="_self" &gt;Network Hacking &amp;amp; Abwehr&lt;/a&gt;&amp;quot; leden wir regelmäßig Redner aus der Industrie ein, um unseren Studenten praxisrelevantes Wissen zu vermitteln&amp;nbsp;und Kontakt zur Wirtschaft zu schaffen.&amp;nbsp;Wir konnten den aus TV und Presse bekannten IT-Sicherheitsexperten Herrn Sebastian Schreiber von der &lt;a href="http://www.syss.de/" target="_blank" &gt;Syss GmbH&lt;/a&gt; als Redner gewinnen. Herr Schreiber wird einen lehrreichen und unterhaltsamen Vortrag über Angriffe auf Geräte, Dienste und Netzwerke halten. Nach dem Vortrag laden wir die interessierten Gäste zur Diskussion ein.&lt;/p&gt;
&lt;p class="bodytext"&gt;&lt;b&gt;Zeit:&lt;/b&gt; Freitag, 3.2.2012 um 14:30 (bis ca. 16:30) &lt;b&gt;Ort:&lt;/b&gt; Interimshörsaal 1&lt;/p&gt;&lt;/div&gt; 

</content>
      <pubDate>03.02.2012</pubDate>
    </item>
    <item>
      <title>Anmeldung zu den Seminaren im SS 12 freigeschaltet (copy 1)</title>
      <link>http://www.net.in.tum.de/news/archive/anmeldung-zu-2.html</link>
      <description>
      </description>
      <content> &lt;div&gt;&lt;p class="bodytext"&gt;Wie jedes Semester bietet der Lehrstuhl wieder folgende Masterseminare an: &lt;/p&gt;&lt;ol&gt;&lt;li&gt;&lt;a href="en/teaching/earlier-teaching/ss12/seminare/blockseminar-future-internet/" target="_self" &gt;Future Internet&lt;/a&gt; - FI (Blockveranstaltung 12.-13.04.2012, ganztägig)&lt;/li&gt;&lt;li&gt;&lt;a href="en/teaching/earlier-teaching/ss12/seminare/hauptseminar-innovative-internettechnologien-und-mobilkommunikation/" target="_self" &gt;Innovative Internettechnologien und Mobilkommunikation&lt;/a&gt; - IITM (wöchentlich freitags 14:00-16:00 Uhr)&lt;/li&gt;&lt;li&gt;&lt;a href="../" &gt;Aerospace Networks&lt;/a&gt; (abhängig von Teilnehmeranzahl wöchentlich oder Blockveranstaltung) &lt;/li&gt;&lt;li&gt;&lt;a href="en/teaching/earlier-teaching/ss12/seminare/blockseminar-sensorknoten-betrieb-netze-anwendungen/" target="_self" &gt;Sensorknoten: Betrieb, Netze &amp;amp; Anwendungen&lt;/a&gt; (Blockveranstaltung 23.-24.07.2012)&lt;/li&gt;&lt;/ol&gt;&lt;p class="bodytext"&gt;  Die Hauptseminarsprache ist jeweils Deutsch. Die angebotenen Themen sind herausvordernd und setzen teilweise Vorwissen voraus. In den Seminaren können sowohl deutsche als auch englische Vorträge gehalten und Ausarbeitungen abgegeben werden. Jeder Student kann die Sprache selber wählen!  &lt;/p&gt;
&lt;div&gt;&lt;strong&gt;Informationsveranstaltungen finden wie folgt statt:&lt;/strong&gt;&lt;/div&gt;
&lt;p class="bodytext"&gt;&amp;nbsp;&lt;/p&gt;
&lt;div&gt;&lt;strong&gt;&lt;b&gt;24.01.2012 - 12:00-14:00 Uhr, FMI 03.07.023&lt;/b&gt;&lt;/strong&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;Seminar Future Internet inkl. Themenvergabe&lt;/li&gt;&lt;li&gt;Seminar Aerospace Networks inkl. 1. Themenvergabe&lt;/li&gt;&lt;li&gt;Seminar Innovative Internettechnologien und Mobilkommunikation (weitere Veranstaltung am 20.04.2012 mit Themenvorstellung und Themenvergabe)&lt;/li&gt;&lt;/ul&gt;&lt;p class="bodytext"&gt;&amp;nbsp;&lt;/p&gt;
&lt;div&gt;&lt;strong&gt;&lt;b&gt;31.01.2012 - 12:00-14:00 Uhr, FMI 03.07.023&lt;/b&gt;&lt;/strong&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;Seminar Sensorknoten inkl. 1. Themenvergabe (weitere Veranstaltung zu Beginn des SS 12, wenn noch Plätze frei)&lt;/li&gt;&lt;/ul&gt;&lt;p class="bodytext"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p class="bodytext"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p class="bodytext"&gt;Um einen groben Überblick über die Anzahl der Interessenten zu bekommen, bitten wir um eine unverbindliche Anmeldung zu den Seminaren:   &lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;div&gt;&lt;strong&gt;Anmeldung Future Internet&lt;/strong&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;h1&gt;Anmeldung IITM&lt;/h1&gt;&lt;/li&gt;&lt;li&gt;&lt;h1&gt;&lt;a href="en/teaching/earlier-teaching/ss12/seminare/hauptseminar-aerospace-networks/anmeldeformular/" target="_self" &gt;Anmeldung Aerospace Networks&lt;/a&gt;&lt;/h1&gt;&lt;/li&gt;&lt;li&gt;&lt;h1&gt;Anmeldung Sensorknoten: Betrieb, Netze &amp;amp; Anwendungen&lt;/h1&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p class="bodytext"&gt;  Erst wenn Sie ein Thema gewählt und zugeteilt bekommen haben, ist die Teilnahme bindend.&amp;nbsp; Sie können gerne zur Infoveranstaltung erscheinen, auch wenn Sie sich noch nicht sicher sind, ob Sie wirklich am Seminar teilnehmen möchten.  Unser Lehrstuhl freut sich, Sie bei der Informationsveranstaltung und später auch im Seminar begrüßen zu dürfen und Ihnen einen Einblick in unsere Forschungsgebiete geben zu können.&lt;/p&gt;&lt;/div&gt;

</content>
      <pubDate>24.01.2012</pubDate>
    </item>
    <item>
      <title>Hauptseminar IITM noch Plätze frei</title>
      <link>http://www.net.in.tum.de/news/archive/hauptseminar.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;Wie jedes Semester bietet der Lehrstuhl wieder folgendes Haupt- (Master-) Seminar an:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Innovative Internettechnologien und Mobilkommunikation - IITM (wöchentlich montags 14:00-16:00 Uhr)&lt;/li&gt;&lt;/ul&gt;&lt;p class="bodytext"&gt; In dem Seminar können sowohl deutsche als auch englische  Vorträge gehalten und Ausarbeitungen abgegeben werden. Jeder Student  kann die Sprache selber wählen! Veranstaltung wird seitens der Organisation in Deutsch gehalten.&lt;/p&gt;
&lt;p class="bodytext"&gt;Aktuell gibt es noch 5 freie Plätze, die bis zum 21.10.2011 vergeben werden können. Die Folien zur Vergabeveranstaltungen mit allen Themen sind &lt;a href="en/teaching/earlier-teaching/ws1112/seminare/hauptseminar-innovative-internettechnologien-und-mobilkommunikation/" target="_self" &gt;hier&lt;/a&gt; zu finden. Mit dem Themenvorschlag bitte Kontakt zur Seminarleitung aufnehmen.  Unser Lehrstuhl freut sich, Sie im Seminar begrüßen zu  dürfen und Ihnen einen Einblick in unsere Forschungsgebiete geben zu  können.&lt;/p&gt; 

</content>
      <pubDate>21.10.2011</pubDate>
    </item>
    <item>
      <title>Kickoff iLab | Oct 20 @ 16:00 |Room 03.07.023</title>
      <link>http://www.net.in.tum.de/news/archive/kickoff-ilab-1.html</link>
      <description>
      </description>
      <content>  &lt;p class="bodytext"&gt;If you want to participate at the practical exercise please join the first meeting as we will build the teams and schedule your lab slots then.&lt;/p&gt;&lt;p class="bodytext"&gt;The first meeting will not only be used for administrative things but we will right get into the topic by reminding you to the world of static routing.&lt;/p&gt;&lt;p class="bodytext"&gt;&amp;nbsp;&lt;/p&gt;  

</content>
      <pubDate>20.10.2011</pubDate>
    </item>
    <item>
      <title>Kickoff iLab2 | Oct 20 @ 10:15 |Room 03.07.023</title>
      <link>http://www.net.in.tum.de/news/archive/kickoff-ilab.html</link>
      <description>
      </description>
      <content>  &lt;p class="bodytext"&gt;If you want to participate at the practical exercise please join the first meeting as we will build the teams and schedule your lab slots then.&lt;/p&gt;&lt;p class="bodytext"&gt;The first meeting will not only be used for administrative things but we will right get into the topic by reminding you to the world of static routing.&lt;/p&gt;&lt;p class="bodytext"&gt;If you did not register for the exercise yet please do so&amp;nbsp;&lt;span style="font-family: Arial, Helvetica, sans-serif; text-decoration: none; color: rgb(59, 115, 171); "&gt;&lt;a href="https://ilab2.net.in.tum.de/?address=register" target="_blank" &gt;here&lt;/a&gt;&lt;/span&gt;.&lt;/p&gt;  

</content>
      <pubDate>20.10.2011</pubDate>
    </item>
    <item>
      <title>Info iLab2 | Jul 28 @ 12:15 |Room 03.07.023</title>
      <link>http://www.net.in.tum.de/news/archive/vorbesprechu-16.html</link>
      <description>
      </description>
      <content>  &lt;p class="bodytext"&gt;Wie in jedem Semester bieten wir das iLab 2 (Internetpraktikum) für unsere&amp;nbsp;Studenten an. &lt;/p&gt;&lt;p class="bodytext"&gt;Weitere Informationen finden Sie auf der Homepage zum Praktikum. &lt;span style="font-family: Arial, Helvetica, sans-serif; text-decoration: none; color: rgb(59, 115, 171); "&gt;&lt;a href="http://ilab.net.in.tum.de/" target="_blank" &gt;http://ilab.net.in.tum.de/&lt;/a&gt;&lt;/span&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;&lt;p class="bodytext"&gt;&lt;b&gt;Der Termin für die zweite Informationsveranstaltung und Bildung der Zweier-Teams&amp;nbsp;wird noch bekannt gegeben.&lt;/b&gt;&amp;nbsp;Falls Sie sich schon jetzt&amp;nbsp;anmelden wollen,&amp;nbsp;können sie dies&amp;nbsp;&lt;span style="font-family: Arial, Helvetica, sans-serif; text-decoration: none; color: rgb(59, 115, 171); "&gt;&lt;a href="#" target="_blank" &gt;hier&lt;/a&gt;&lt;/span&gt;&amp;nbsp; tun.&lt;/p&gt;  

</content>
      <pubDate>28.07.2011</pubDate>
    </item>
    <item>
      <title>Workshop: Future Networked IT for Buildings online</title>
      <link>http://www.net.in.tum.de/news/archive/vorbesprechu-15.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt; &lt;p class="bodytext"&gt;&lt;/p&gt;&lt;h2 style="font-size: 15px; color: rgb(51, 51, 51); "&gt;&lt;span style="color: red; "&gt;Workshop:&amp;nbsp;&lt;/span&gt;Future Networked IT for Buildings&lt;/h2&gt;&lt;/p&gt;&lt;div&gt;&lt;p class="bodytext"&gt;Am 18.5.2011 fand am&amp;nbsp;&lt;a href="http://www.net.in.tum.de/" target="_blank" &gt;Lehrstuhl für Netzarchitekturen und Netzdienste&lt;/a&gt;&amp;nbsp;an der&amp;nbsp;&lt;a href="http://www.tu-muenchen.de/" target="_blank" &gt;Technischen Universität München&lt;/a&gt;&amp;nbsp;der Workshop &amp;quot;Future networked IT for Buildings&amp;quot; statt.&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p class="bodytext"&gt;Die zugehörige Website ist nun online:&lt;/p&gt;&lt;/div&gt;&lt;p class="bodytext"&gt;&lt;/p&gt;&lt;p class="bodytext"&gt;&lt;a href="http://www.net.in.tum.de/EnablingSmartBuildings/" target="_blank" &gt;http://www.net.in.tum.de/EnablingSmartBuildings/&lt;/a&gt;&lt;/p&gt;&lt;/p&gt; 

</content>
      <pubDate>28.07.2011</pubDate>
    </item>
    <item>
      <title>Vorbesprechung zu den Seminaren FI und IITM im WS 11/12 am 25.7.2011 in Raum 03.07.023 von 14:00-16:00 Uhr   (copy 1)</title>
      <link>http://www.net.in.tum.de/news/archive/vorbesprechu-17.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;Wie jedes Semester bietet der Lehrstuhl wieder folgende Masterseminare an:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Future Internet - FI (Blockveranstaltung 13./14.10.2011, ganztägig)&lt;/li&gt;&lt;li&gt;Innovative Internettechnologien und Mobilkommunikation - IITM (wöchentlich montags 14:00-16:00 Uhr)&lt;/li&gt;&lt;/ul&gt;&lt;p class="bodytext"&gt; In den Seminaren können sowohl deutsche als auch englische Vorträge gehalten und Ausarbeitungen abgegeben werden. Jeder Student kann die Sprache selber wählen!  &lt;b&gt;Zu den beiden Seminaren findet am 25.7.2011 von 14:00-16:00 Uhr in Raum 03.07.023 eine Informationsveranstaltung statt.&lt;/b&gt; Für das Seminar Future Internet werden im Rahmen dieser Veranstaltung auch gleich die Themen verteilt. Die übrig bleibenden Themen werden erweitert und stehen dann für die Vergabeveranstaltung des Seminars IITM am 17.10.2011 zur Verfügung.  Um einen groben Überblick über die Anzahl der Interessenten zu bekommen, bitten wir um eine unverbindliche Anmeldung zu den Seminaren (wird in den nächsten Tagen aktiviert):  &lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="en/teaching/earlier-teaching/ss11/seminare/blockseminar-future-internet/anmeldeformular/" target="_self" &gt;Anmeldung Future Internet&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="en/teaching/earlier-teaching/ws1112/seminare/hauptseminar-innovative-internettechnologien-und-mobilkommunikation/anmeldeformular/" target="_self" &gt;Anmeldung IITM&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p class="bodytext"&gt; Erst wenn Sie ein Thema gewählt und zugeteilt bekommen haben, ist die Teilnahme bindend.&amp;nbsp; Sie können gerne zur Infoveranstaltung erscheinen, auch wenn Sie sich noch nicht sicher sind, ob Sie wirklich am Seminar teilnehmen möchten.  Unser Lehrstuhl freut sich, Sie bei der Informationsveranstaltung und später auch im Seminar begrüßen zu dürfen und Ihnen einen Einblick in unsere Forschungsgebiete geben zu können.&lt;/p&gt; 

</content>
      <pubDate>25.07.2011</pubDate>
    </item>
    <item>
      <title>Vorbesprechung Proseminar 21.07.2011 13:00 in Raum 03.07.023</title>
      <link>http://www.net.in.tum.de/news/archive/vorbesprechu-5.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;Für das Proseminar Network Hacking findet die erste Informationsveranstaltung am 21.07.2010 um 14:00 in Raum 03.07.023 statt.  &lt;/p&gt;
&lt;p class="bodytext"&gt;Weitere Informationen &lt;a href="en/teaching/earlier-teaching/ws1011/seminars/proseminar-network-hacking/" target="_self" &gt;hier&lt;/a&gt;&lt;a href="http://www.net.in.tum.de/de/lehre/ws0910/seminare/proseminar-network-hacking/" target="_blank" &gt; &lt;/a&gt;&lt;/p&gt; 

</content>
      <pubDate>21.07.2011</pubDate>
    </item>
    <item>
      <title>Vorbesprechung iLab (Bachelor/Master) am 21.07.11 um 12:00 Uhr in Raum 03.07.023</title>
      <link>http://www.net.in.tum.de/news/archive/vorbesprechu-11.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt; &lt;p class="bodytext"&gt;Wie in jedem Semester bieten wir das iLab (Internetpraktikum) für unsere&amp;nbsp;Studenten an. In diesem Semester ist die Teilnahme sowohl von&amp;nbsp;Bachelor- als auch von Master-Studenten möglich. Für Studenten im Master-Studiengang,&amp;nbsp;die bereits das iLab besucht haben, bieten wir ein zusätzliches Praktikum für Fortgeschrittene an:&amp;nbsp;iLab².&lt;/p&gt;&lt;p class="bodytext"&gt;Das Ziel des iLab ist es sowohl theoretische Kenntnisse zu vermitteln bzw. zu wiederholen als auch diese durch praktische Versuche in unserem Labornetzwerk zu vertiefen. Die Versuche werden in Teams von jeweils zwei Personen durchgeführt.&amp;nbsp;&lt;/p&gt;&lt;p class="bodytext"&gt; Wir behandeln folgende Themen:&lt;/p&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;allgemeine Grundlagen (IP, ARP, Schichtenmodell, ...)&lt;/li&gt;&lt;li&gt;statisches und dynamisches Routing&lt;/li&gt;&lt;li&gt;TCP/UDP&lt;/li&gt;&lt;li&gt;DNS/DNSSec&lt;/li&gt;&lt;li&gt;NAT/DHCP/IPv6&lt;/li&gt;&lt;li&gt;Sicherheitsmechanismen (Firewalls, kryptographische Protokolle wie TLS, IPSec, ...)&lt;/li&gt;&lt;li&gt;WLAN (Sicherheit, Konfiguration, Access Control, ...)&lt;/li&gt;&lt;/ul&gt;&lt;p class="bodytext"&gt;Weitere Informationen finden Sie auf der&amp;nbsp;&lt;span style="font-family: Arial, Helvetica, sans-serif; text-decoration: none; color: rgb(59, 115, 171); "&gt;&lt;a href="http://ilab.net.in.tum.de/" target="_blank" &gt;Homepage des iLab&lt;/a&gt;&lt;/span&gt;.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;&lt;p class="bodytext"&gt;&lt;b&gt;Der Termin für die zweite Informationsveranstaltung und Bildung der Zweier-Teams&amp;nbsp;wird noch bekannt gegeben.&lt;/b&gt;&amp;nbsp;Falls Sie sich schon jetzt&amp;nbsp;anmelden wollen,&amp;nbsp;können sie dies&amp;nbsp;&lt;span style="font-family: Arial, Helvetica, sans-serif; text-decoration: none; color: rgb(59, 115, 171); "&gt;&lt;a href="#" target="_blank" &gt;hier&lt;/a&gt;&lt;/span&gt;&amp;nbsp; tun.&lt;/p&gt;&lt;/p&gt;

</content>
      <pubDate>21.07.2011</pubDate>
    </item>
    <item>
      <title>Vorbesprechung zu den Masterseminaren  IITM und Sensorknoten im SS 2011 am 6.5.2011 in Raum 03.07.023 </title>
      <link>http://www.net.in.tum.de/news/archive/vorbesprechu-7.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;Wie jedes Semester bietet der Lehrstuhl wieder folgende Masterseminare an:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Innovative Internettechnologien und Mobilkommunikation - IITM (wöchentlich freitags 14:00-16:00 Uhr)&lt;ul&gt;&lt;li&gt;Informationsveranstaltung mit Themenvergabe: 6.5.2011, 14:15 Uhr, Raum 00.08.038&lt;/li&gt;&lt;li&gt;&lt;a href="en/teaching/earlier-teaching/ss11/seminare/hauptseminar-innovative-internettechnologien-und-mobilkommunikation/anmeldeformular/" target="_self" &gt;Anmeldeliste&lt;/a&gt; (aktuelle Anmeldungen landen auf der Warteliste)&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;Sensorknoten - Betrieb, Netze und Anwendungen (Blockveranstaltung im Juli)&lt;ul&gt;&lt;li&gt;Informationsveranstaltung und Themenvergabe: 6.5.2011, 16:00 Uhr, Raum 00.08.038&lt;/li&gt;&lt;li&gt;&lt;a href="en/teaching/earlier-teaching/ss11/seminare/hauptseminar-sensorknoten-betrieb-netze-anwendungen/anmeldeformular/" target="_self" &gt;Anmeldeliste&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p class="bodytext"&gt; In den Seminaren können sowohl deutsche als auch englische Vorträge gehalten und Ausarbeitungen abgegeben werden. Jeder Student kann die Sprache selber wählen!  Um einen groben Überblick über die Anzahl der Interessenten zu bekommen, bitten wir um eine unverbindliche Anmeldung zu den Seminaren. Erst wenn Sie ein Thema gewählt und zugeteilt bekommen haben, ist die Teilnahme bindend.&amp;nbsp; Sie können gerne zur Infoveranstaltung erscheinen, auch wenn Sie sich noch nicht sicher sind, ob Sie wirklich am Seminar teilnehmen möchten.  Unser Lehrstuhl freut sich, Sie bei der Informationsveranstaltung und später auch im Seminar begrüßen zu dürfen und Ihnen einen Einblick in unsere Forschungsgebiete geben zu können.&lt;/p&gt; 

</content>
      <pubDate>06.05.2011</pubDate>
    </item>
    <item>
      <title>Kick-Off for master practical exercise iLab2</title>
      <link>http://www.net.in.tum.de/news/archive/only-few-pla.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;&lt;b&gt;Only few&amp;nbsp;places left... be fast to register!&lt;/b&gt;&lt;/p&gt;
&lt;p class="bodytext"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p class="bodytext"&gt;The registration for the &lt;a href="http://ilab2.net.in.tum.de/" target="_blank" &gt;ilab2&lt;/a&gt; is possible now: &lt;a href="#" target="_blank" &gt;register here&lt;/a&gt;.&lt;/p&gt;
&lt;p class="bodytext"&gt;&lt;a href="http://ilab2.net.in.tum.de/" target="_blank" &gt;&lt;img src="uploads/RTEmagicC_ea9d103d9e_02.png.png" alt="ilab2-logo" height="200" width="200" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="bodytext"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p class="bodytext"&gt;The kickoff&amp;nbsp;event will be on &lt;/p&gt;
&lt;p class="bodytext"&gt;2011-05-05 @ 10h15 in 03.07.023&lt;/p&gt;
&lt;p class="bodytext"&gt;&lt;a href="fileadmin/TUM/members/pahl/2010-07-08_ilab2_announce.jpg" &gt;&lt;img src="fileadmin/TUM/members/pahl/2010-07-08_ilab2_announce.jpg" height="285" width="380" alt="" /&gt;&lt;/a&gt;&lt;/p&gt;

</content>
      <pubDate>05.05.2011</pubDate>
    </item>
    <item>
      <title>Vorbesprechung iLab (Bachelor/Master) am 05.05.11 um 16:00 Uhr in Raum 03.07.023 (copy 1)</title>
      <link>http://www.net.in.tum.de/news/archive/vorbesprechu-12.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt; &lt;p class="bodytext"&gt;Wie in jedem Semester bieten wir das iLab (Internetpraktikum) für unsere&amp;nbsp;Studenten an. In diesem Semester ist die Teilnahme sowohl von&amp;nbsp;Bachelor- als auch von Master-Studenten möglich. Für Studenten im Master-Studiengang,&amp;nbsp;die bereits das iLab besucht haben, bieten wir ein zusätzliches Praktikum für Fortgeschrittene an:&amp;nbsp;iLab².&lt;/p&gt;&lt;p class="bodytext"&gt;Das Ziel des iLab ist es sowohl theoretische Kenntnisse zu vermitteln bzw. zu wiederholen als auch diese durch praktische Versuche in unserem Labornetzwerk zu vertiefen. Die Versuche werden in Teams von jeweils zwei Personen durchgeführt.&amp;nbsp;&lt;/p&gt;&lt;p class="bodytext"&gt; Wir behandeln folgende Themen:&lt;/p&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;allgemeine Grundlagen (IP, ARP, Schichtenmodell, ...)&lt;/li&gt;&lt;li&gt;statisches und dynamisches Routing&lt;/li&gt;&lt;li&gt;TCP/UDP&lt;/li&gt;&lt;li&gt;DNS/DNSSec&lt;/li&gt;&lt;li&gt;NAT/DHCP/IPv6&lt;/li&gt;&lt;li&gt;Sicherheitsmechanismen (Firewalls, kryptographische Protokolle wie TLS, IPSec, ...)&lt;/li&gt;&lt;li&gt;WLAN (Sicherheit, Konfiguration, Access Control, ...)&lt;/li&gt;&lt;/ul&gt;&lt;p class="bodytext"&gt;Weitere Informationen finden Sie auf der&amp;nbsp;&lt;span style="font-family: Arial, Helvetica, sans-serif; text-decoration: none; color: rgb(59, 115, 171); "&gt;&lt;a href="http://ilab.net.in.tum.de/" target="_blank" &gt;Homepage des iLab&lt;/a&gt;&lt;/span&gt;.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;&lt;p class="bodytext"&gt;&lt;b&gt;Die zweite Informationsveranstaltung und Bildung der Zweier-Teams&amp;nbsp;wird am 05.05.2011 um 16:00 Uhr in Raum 03.07.023 stattfinden.&lt;/b&gt;&amp;nbsp;Falls Sie sich noch nicht angemeldet haben,&amp;nbsp;können sie dies&amp;nbsp;&lt;span style="font-family: Arial, Helvetica, sans-serif; text-decoration: none; color: rgb(59, 115, 171); "&gt;&lt;a href="#" target="_blank" &gt;hier&lt;/a&gt;&lt;/span&gt;&amp;nbsp;noch tun. Nachmeldungen sind bis 12.05.2011 möglich.&lt;/p&gt;&lt;/p&gt;

</content>
      <pubDate>05.05.2011</pubDate>
    </item>
    <item>
      <title>MunichJS - Javascript User Group Meetup</title>
      <link>http://www.net.in.tum.de/news/archive/vortrag-und-2.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;JavaScript ist eine Sprache um bunte Effekte auf Webseiten zu bauen! Das war vielleicht&amp;nbsp;wahr, aber die Dinge haben sich geändert. Man kann mit JavaScript ernsthafte Softwareprojekte umsetzen - und dabei Spass haben. Du glaubst uns nicht? Dann komm doch einfach zum nächsten Usergroup-Treffen!&lt;/p&gt;
&lt;p class="bodytext"&gt;In Zusammenarbeit mit der Münchner JavaScript-Usergroup MunichJS&amp;nbsp;veranstaltet der Lehrstuhl das aktuelle Meetup mit Vorträgen und Diskussionsrunde.   Wolfram Kiesling von Uxebu und Philipp Fehre vom Lehrstuhl I8 werden Vorträge zum Thema Javascript halten:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Wolfram Kiesling - JavaScript is a toy language!&lt;/li&gt;&lt;li&gt;Philipp Fehre - Low-level networking with Node.js&lt;/li&gt;&lt;/ul&gt;&lt;p class="bodytext"&gt;Zeit: 04.05.2011, 19:00 Ort: Medienraum 00.13.009A, FMI-Gebäude&amp;nbsp;&lt;/p&gt;
&lt;p class="bodytext"&gt;Bitte registriert euch unter&amp;nbsp;&lt;span style="color: rgb(153, 0, 0); text-decoration: none; "&gt;&lt;a href="http://munichjs.org/" target="_blank" &gt;munichjs.org&lt;/a&gt;&lt;/span&gt;&amp;nbsp;(oder direkt bei&amp;nbsp;&lt;span style="color: rgb(153, 0, 0); text-decoration: none; "&gt;&lt;a href="http://munichjs.eventbrite.com/" target="_blank" &gt;eventbride&lt;/a&gt;&lt;/span&gt;) da die Plätze begrenzt ist.&lt;/p&gt; 

</content>
      <pubDate>04.05.2011</pubDate>
    </item>
    <item>
      <title>Vorbesprechung zu den Seminaren FI und IITM im SS 2011 am 11.2.2011 in Raum 03.07.023 von 14:00-16:00 Uhr  (copy 1)</title>
      <link>http://www.net.in.tum.de/news/archive/vorbesprechu-10.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;Wie jedes Semester bietet der Lehrstuhl wieder folgende Masterseminare an:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Future Internet - FI (Blockveranstaltung 18./19.4.2011, ganztägig)&lt;/li&gt;&lt;li&gt;Innovative Internettechnologien und Mobilkommunikation - IITM (wöchentlich freitags 14:00-16:00 Uhr)&lt;/li&gt;&lt;/ul&gt;&lt;p class="bodytext"&gt; In den Seminaren können sowohl deutsche als auch englische Vorträge gehalten und Ausarbeitungen abgegeben werden. Jeder Student kann die Sprache selber wählen!  &lt;b&gt;Zu den beiden Seminaren findet am 11.2.2011 von 14:00-16:00 Uhr in Raum 03.07.023 eine Informationsveranstaltung statt.&lt;/b&gt; Für das Seminar Future Internet werden im Rahmen dieser Veranstaltung auch gleich die Themen verteilt. Die übrig bleibenden Themen werden erweitert und stehen dann für die Vergabeveranstaltung des Seminars IITM am 6.5.2011 zur Verfügung.  Um einen groben Überblick über die Anzahl der Interessenten zu bekommen, bitten wir um eine unverbindliche Anmeldung zu den Seminaren (wird in den nächsten Tagen aktiviert):  &lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="en/teaching/earlier-teaching/ss11/seminare/blockseminar-future-internet/anmeldeformular/" target="_self" &gt;Anmeldung Future Internet&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="en/teaching/earlier-teaching/ss11/seminare/hauptseminar-innovative-internettechnologien-und-mobilkommunikation/anmeldeformular/" target="_self" &gt;Anmeldung IITM&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p class="bodytext"&gt; Erst wenn Sie ein Thema gewählt und zugeteilt bekommen haben, ist die Teilnahme bindend.&amp;nbsp; Sie können gerne zur Infoveranstaltung erscheinen, auch wenn Sie sich noch nicht sicher sind, ob Sie wirklich am Seminar teilnehmen möchten.  Unser Lehrstuhl freut sich, Sie bei der Informationsveranstaltung und später auch im Seminar begrüßen zu dürfen und Ihnen einen Einblick in unsere Forschungsgebiete geben zu können.&lt;/p&gt; 

</content>
      <pubDate>11.02.2011</pubDate>
    </item>
    <item>
      <title>Information ilab2 in 03.05.033 | Registration now possible</title>
      <link>http://www.net.in.tum.de/news/archive/information-1.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;The registration for the &lt;a href="http://ilab2.net.in.tum.de/" target="_blank" &gt;ilab2&lt;/a&gt; is possible now: &lt;a href="#" target="_blank" &gt;register here&lt;/a&gt;.&lt;/p&gt;
&lt;p class="bodytext"&gt;&lt;a href="http://ilab2.net.in.tum.de/" target="_blank" &gt;&lt;img src="uploads/RTEmagicC_ea9d103d9e_01.png.png" alt="ilab2-logo" height="200" width="200" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="bodytext"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p class="bodytext"&gt;The informational event will be on &lt;/p&gt;
&lt;p class="bodytext"&gt;2011-02-10 @ 15h15 in 03.05.033&lt;/p&gt;
&lt;p class="bodytext"&gt;&lt;a href="fileadmin/TUM/members/pahl/2010-07-08_ilab2_announce.jpg" &gt;&lt;img src="fileadmin/TUM/members/pahl/2010-07-08_ilab2_announce.jpg" height="285" width="380" alt="" /&gt;&lt;/a&gt;&lt;/p&gt;

</content>
      <pubDate>10.02.2011</pubDate>
    </item>
    <item>
      <title>Vorbesprechung iLab (Bachelor-Kurs) am 10.02.11 um 16:00 Uhr in Raum 03.07.023</title>
      <link>http://www.net.in.tum.de/news/archive/vorbesprechu-8.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;Wie in jedem Semester bieten wir das iLab (Internetpraktikum) für Bachelor-Studenten an. Das Ziel des iLab ist sowohl theoretische Kenntnisse zu vermitteln bzw. zu wiederholen als auch diese durch praktische Versuche in unserem Labornetzwerk zu vertiefen. Die Versuche werden in Teams von jeweils zwei Personen durchgeführt.   Wir behandeln folgende Themen:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;allgemeine Grundlagen (IP, ARP, Schichtenmodell, ...)&lt;/li&gt;&lt;li&gt;statisches und dynamisches Routing&lt;/li&gt;&lt;li&gt;TCP/UDP&lt;/li&gt;&lt;li&gt;DNS/DNSSec&lt;/li&gt;&lt;li&gt;NAT/DHCP/IPv6&lt;/li&gt;&lt;li&gt;Sicherheitsmechanismen (Firewalls, kryptographische Protokolle wie TLS, IPSec, ...)&lt;/li&gt;&lt;li&gt;WLAN (Sicherheit, Konfiguration, Access Control, ...)&lt;/li&gt;&lt;/ul&gt;&lt;p class="bodytext"&gt;Weitere Informationen finden Sie auf der &lt;a href="http://ilab.net.in.tum.de/" target="_blank" &gt;Homepage des iLab&lt;/a&gt;.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p class="bodytext"&gt;&lt;b&gt;Die erste Informationsveranstaltung zum iLab wird am 10.02.2011 um 16:00 Uhr in Raum 03.07.023 stattfinden.&lt;/b&gt; Das Anmeldesystem ist &lt;a href="#" target="_blank" &gt;hier&lt;/a&gt; zu finden. Am 05.05.2011 um 16:00 Uhr wird in Raum 03.07.023 die zweite Informationsveranstaltung und die Zusammenstellung der Zweierteams stattfinden.  Bitte beachten Sie: Für das iLab² für Master-Studenten wird eine gesonderte Informationsveranstaltung angeboten.&lt;/p&gt;

</content>
      <pubDate>10.02.2011</pubDate>
    </item>
    <item>
      <title>Vorbesprechung zum Seminar Sensorknoten im SS 2011 am 8.2.2011 in Raum 03.07.023 von 16:15-18:00 Uhr  </title>
      <link>http://www.net.in.tum.de/news/archive/vorbesprechu-9.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;Wie jedes Sommersemester bietet unser Lehrstuhl in Kooperation mit dem Lehrstuhl Informatik 13 (Prof. Baumgarten) wieder das Masterseminar &amp;quot;Sensorknoten - Betrieb, Netze und Anwendungen&amp;quot; an.&lt;/p&gt;
&lt;p class="bodytext"&gt;&lt;b&gt;Die 1. Vorbesprechung wird am 8.2.2011 von 16:15-18:00 Uhr in Raum 03.07.023 stattfinden.&lt;/b&gt; Das Seminar wird als Blockveranstaltung im Juli stattfinden. Nähere Informationen können auf der &lt;a href="en/teaching/earlier-teaching/ss11/seminare/hauptseminar-sensorknoten-betrieb-netze-anwendungen/" target="_self" &gt;Seminarhomepage&lt;/a&gt; entnommen werden. &lt;/p&gt;
&lt;p class="bodytext"&gt;Im Seminar können sowohl deutsche als auch englische Vorträge gehalten und Ausarbeitungen abgegeben werden. Jeder Student kann die Sprache selber wählen!  &lt;b&gt;&lt;/b&gt;Um einen groben Überblick über die Anzahl der Interessenten zu bekommen, bitten wir um eine unverbindliche Anmeldung zum Seminar:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="en/teaching/earlier-teaching/ss11/seminare/hauptseminar-sensorknoten-betrieb-netze-anwendungen/anmeldeformular/" target="_self" &gt;Anmeldung Sensorknoten&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p class="bodytext"&gt; Erst wenn Sie ein Thema gewählt und zugeteilt bekommen haben, ist die Teilnahme bindend.&amp;nbsp; Sie können gerne zur Infoveranstaltung erscheinen, auch wenn Sie sich noch nicht sicher sind, ob Sie wirklich am Seminar teilnehmen möchten.  Unsere beiden  Lehrstühle freuen sich, Sie bei der Informationsveranstaltung und später auch im Seminar begrüßen zu dürfen und Ihnen einen Einblick in unsere Forschungsgebiete geben zu können.&lt;/p&gt; 

</content>
      <pubDate>08.02.2011</pubDate>
    </item>
    <item>
      <title>Gastvortrag Herr Dr. Dirk Henrici (Telefonica o2 Germany)</title>
      <link>http://www.net.in.tum.de/news/archive/vortrag-und.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;Im Rahmen des Hauptseminars &amp;quot;Innovative Internettechnologien und Mobilkommunikation&amp;quot; dürfen wir als Gastredner Herrn &lt;a href="http://henrici.biz/company/history.html" target="_blank" &gt;Dr. Dirk Henrici &lt;/a&gt;von Telefonica o2 Germany begrüßen. Er wird voraussichtlich einen Vortrag über RFIDs halten.  Im Anschluss an die Präsentation laden wir die Zuschauer zu einer Diskussionsrunde ein.  Zeit: .7.02.2011, 14:00 Ort: 03.07.023, FMI&lt;/p&gt; 

</content>
      <pubDate>07.02.2011</pubDate>
    </item>
    <item>
      <title>Vortrag und Demo: "Web 2.0-Hacking" </title>
      <link>http://www.net.in.tum.de/news/archive/vortrag-und-1.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;Im Rahmen des Proseminars &amp;quot;Network Hacking und Abwehr&amp;quot; veranstaltet der Lehrstuhl zusammen mit der Secaron AG München, eine Unternehmensberatung im Bereich der Informationssicherheit, einen Vortrag zum Thema &amp;quot;Web 2.0 Hacking&amp;quot;.   Herr Phillip Rocholl von Secaron wird über Angriffe auf Web 2.0 Dienste sprechen. Zu den Inhalten seines Vortrags zählen u.A. SQL-Injection- und Cross-Site-Scripting-Attacken. Der Vortrag wird durch mehrere live durchgeführte Demo-Hacks und Informationen über den Beruf des Security-Consultants abgerundet.  Im Anschluss an die Präsentation laden wir die Zuschauer zu einer Diskussionsrunde ein.  Zeit: 28.01.2011, 14:00 Ort: Hörsaal 2, FMI-Gebäude&lt;/p&gt; 

</content>
      <pubDate>28.01.2011</pubDate>
    </item>
    <item>
      <title>Umfrage zum Sicherheitsbewusstsein in Sozialen Netzwerken</title>
      <link>http://www.net.in.tum.de/news/archive/umfrage-zum.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;Wir führen auf Facebook eine &lt;a href="../http://" target="http//apps.facebook.com/sicherheit-umfrage/?ref=bookmarks&amp;count=0" &gt;Umfrage zum Sicherheitsbewusstsein&lt;/a&gt; in Sozialen Netzwerken durch. Wir freuen uns über zahlreiche Teilnahme.&lt;/p&gt; 

</content>
      <pubDate>04.01.2011</pubDate>
    </item>
    <item>
      <title>Weihnachtsfeier 2010</title>
      <link>http://www.net.in.tum.de/news/archive/weihnachtsfe-2.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;Wie in jedem Jahr veranstaltet unser Lehrstuhl eine Weihnachtsfeier zu der wir unsere (zukünftigen) Studenten und Hiwis einladen möchten.&lt;/p&gt;&lt;div class="indent"&gt;&lt;div class="indent"&gt;&lt;div class="indent"&gt;&lt;p class="bodytext"&gt;&lt;b&gt;Datum:&lt;/b&gt; 21.12.2010 &lt;b&gt;Zeit: &lt;/b&gt;ab 18:00 Uhr &lt;b&gt;Ort:&lt;/b&gt; MI 03.07.023&lt;/p&gt;
&lt;p class="bodytext"&gt;Wir bitten um eine kurze Anmeldung, damit wir die Anzahl der Teilnehmer abschätzen können.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt; 

</content>
      <pubDate>21.12.2010</pubDate>
    </item>
    <item>
      <title>iLab - Weitere 10 Plätze verfügbar</title>
      <link>http://www.net.in.tum.de/news/archive/ilab-weite.html</link>
      <description>
      </description>
      <content> &lt;div style="font-family: Verdana,sans-serif; font-size: 12px; margin: 0px; padding: 3px; background-color: rgb(255, 255, 255); border-width: 0px;"&gt;&lt;p class="bodytext"&gt;Wir haben erneut&amp;nbsp;weitere Praktikumsplätze in unserem&amp;nbsp;Bachelor-Level Praktikum&amp;nbsp;iLab geschaffen. Zur Anmeldung bitte&amp;nbsp;&lt;span style="color: rgb(153, 0, 0); text-decoration: none;"&gt;&lt;a href="#" target="_blank" &gt;hier&lt;/a&gt;&lt;/span&gt;&amp;nbsp;klicken. Weitere Informationen gibt es&amp;nbsp;&lt;span style="color: rgb(153, 0, 0); text-decoration: none;"&gt;&lt;a href="http://ilab.net.in.tum.de/" target="_blank" &gt;hier&lt;/a&gt;&lt;/span&gt;.&lt;/p&gt;&lt;/div&gt;

</content>
      <pubDate>19.10.2010</pubDate>
    </item>
    <item>
      <title>Seminar IITM - Plätze frei</title>
      <link>http://www.net.in.tum.de/news/archive/vorbesprechu-6.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;Wie jedes Semester bietet der Lehrstuhl während des Vorlesungsbetriebes wieder ein  Hauptseminar an:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="en/teaching/earlier-teaching/ws1011/seminars/hauptseminar-innovative-internettechnologien-und-mobilkommunikation/" target="_self" &gt;Innovative Internettechnologien und Mobilkommunikation - IITM&lt;/a&gt; (wöchentlich montags 14:00-16:00 Uhr, Raum 03.07.023)&lt;/li&gt;&lt;/ul&gt;&lt;p class="bodytext"&gt; Im Seminar können sowohl deutsche als auch englische Vorträge gehalten und Ausarbeitungen abgegeben werden. Jeder Student kann die Sprache selber wählen!  &lt;b&gt;Die Informations- und Vergabeveranstaltung findet am 18.10.2010 ab 14:00 Uhr in Raum 03.07.023 statt.&lt;/b&gt;  Um einen groben Überblick über die Anzahl der Interessenten zu bekommen, bitten wir um eine unverbindliche Anmeldung zum Seminar:  &lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="en/teaching/earlier-teaching/ws1011/seminars/hauptseminar-innovative-internettechnologien-und-mobilkommunikation/anmeldeformular-zum-hauptseminar-iitm/" target="_self" &gt;Anmeldung IITM&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p class="bodytext"&gt; Erst wenn Sie ein Thema gewählt und zugeteilt bekommen haben, ist die Teilnahme bindend.&amp;nbsp; Sie können gerne zur Infoveranstaltung erscheinen, auch wenn Sie sich noch nicht sicher sind, ob Sie wirklich am Seminar teilnehmen möchten.  Unser Lehrstuhl freut sich, Sie bei der Informationsveranstaltung und später auch im Seminar begrüßen zu dürfen und Ihnen einen Einblick in unsere Forschungsgebiete geben zu können.&lt;/p&gt; 

</content>
      <pubDate>18.10.2010</pubDate>
    </item>
    <item>
      <title>iLab1 erster Termin/Teameinteilung Do, 21.10.2010, 16 Uhr, Raum 03.07.023</title>
      <link>http://www.net.in.tum.de/news/archive/ilab1-erster.html</link>
      <description>
      </description>
      <content></content>
      <pubDate>15.10.2010</pubDate>
    </item>
    <item>
      <title>iLab - Weitere Plätze verfügbar</title>
      <link>http://www.net.in.tum.de/news/archive/ilab-nur-z.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;Wir haben weitere Praktikumsplätze in unserem&amp;nbsp;Bachelor-Level Praktikum&amp;nbsp;iLab geschaffen.&amp;nbsp;Derzeit sind noch sechs&amp;nbsp;Plätze frei (Stand: 14.9.10). Zur Anmeldung bitte &lt;a href="#" target="_blank" &gt;hier&lt;/a&gt; klicken. Weitere Informationen gibt es &lt;a href="http://ilab.net.in.tum.de/" target="_blank" &gt;hier&lt;/a&gt;.&lt;/p&gt;

</content>
      <pubDate>02.09.2010</pubDate>
    </item>
    <item>
      <title>IPTComm 2010 August 2 and 3, 2010 </title>
      <link>http://www.net.in.tum.de/news/archive/iptcomm-2010.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;&lt;a href="http://www.iptcomm.org/" target="_blank" &gt;IPTComm 2010&lt;/a&gt; will take place at the Leibniz Supercomputing Center, Munich at August 2 and 3. The chair will participate with one paper and a demo that will show security in future home networks.&lt;/p&gt; 

</content>
      <pubDate>02.08.2010</pubDate>
    </item>
    <item>
      <title>Vorbesprechung Proseminar 23.07.2010 14:00 in Raum 03.07.023 (copy 1)</title>
      <link>http://www.net.in.tum.de/news/archive/vorbesprechu-13.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;Für das Proseminar Network Hacking findet die erste Informationsveranstaltung am 23.07.2010 um 14:00 in Raum 03.07.023 statt. Weitere Informationen &lt;a href="http://www.net.in.tum.de/de/lehre/ws1011/seminare/proseminar-network-hacking/" target="_blank" &gt;hier&lt;/a&gt;&lt;a href="http://www.net.in.tum.de/de/lehre/ws0910/seminare/proseminar-network-hacking/" target="_blank" &gt; &lt;/a&gt;&lt;/p&gt; 

</content>
      <pubDate>23.07.2010</pubDate>
    </item>
    <item>
      <title>Information ilab2 in 03.05.033 | Registration now possible</title>
      <link>http://www.net.in.tum.de/news/archive/kickoff-meet-3.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;The registration for the &lt;a href="http://ilab2.net.in.tum.de/" target="_blank" &gt;ilab2&lt;/a&gt; is possible now: &lt;a href="#" target="_blank" &gt;register here&lt;/a&gt;.&lt;/p&gt;
&lt;p class="bodytext"&gt;&lt;a href="http://ilab2.net.in.tum.de/" target="_blank" &gt;&lt;img src="uploads/RTEmagicC_ea9d103d9e.png.png" alt="ilab2-logo" height="200" width="200" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="bodytext"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p class="bodytext"&gt;The informational event will be on &lt;/p&gt;
&lt;p class="bodytext"&gt;2010-07-15 @ 14h15 in 03.05.033&lt;/p&gt;
&lt;p class="bodytext"&gt;&lt;a href="fileadmin/TUM/members/pahl/2010-07-08_ilab2_announce.jpg" &gt;&lt;img src="fileadmin/TUM/members/pahl/2010-07-08_ilab2_announce.jpg" height="285" width="380" alt="" /&gt;&lt;/a&gt;&lt;/p&gt;

</content>
      <pubDate>15.07.2010</pubDate>
    </item>
    <item>
      <title>Vorbesprechung zu den Seminaren FI und IITM im WS 10/11 am 13.7.2010 in Raum 03.07.023 von 12:00-14:00 Uhr</title>
      <link>http://www.net.in.tum.de/news/archive/vorbesprechu-4.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;Wie jedes Semester bietet der Lehrstuhl wieder folgende Hauptseminare an:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="en/teaching/earlier-teaching/ws1011/seminars/blockseminar-future-internet/" target="_self" &gt;Future Internet - FI&lt;/a&gt; (Blockveranstaltung am 4./5.10.2010 ganztägig)&lt;/li&gt;&lt;li&gt;&lt;a href="en/teaching/earlier-teaching/ws1011/seminars/hauptseminar-innovative-internettechnologien-und-mobilkommunikation/" target="_self" &gt;Innovative Internettechnologien und Mobilkommunikation - IITM&lt;/a&gt; (wöchentlich montags 14:00-16:00 Uhr)&lt;/li&gt;&lt;/ul&gt;&lt;p class="bodytext"&gt; In den Seminaren können sowohl deutsche als auch englische Vorträge gehalten und Ausarbeitungen abgegeben werden. Jeder Student kann die Sprache selber wählen!  &lt;b&gt;Zu den beiden Seminaren findet am 13.7.2010 von 12:00-14:00 Uhr in Raum 03.07.023 eine Informationsveranstaltung statt.&lt;/b&gt; Für das Seminar Future Internet werden im Rahmen dieser Veranstaltung auch gleich die Themen verteilt. Die übrigen bleibenden Themen werden erweitert und stehen dann für die Vergabeveranstaltung des Seminars IITM am 18.10.2010 zur Verfügung.  Um einen groben Überblick über die Anzahl der Interessenten zu bekommen, bitten wir um eine unverbindliche Anmeldung zu den Seminaren (wird in den nächsten Tagen aktiviert):  &lt;/p&gt;&lt;ul&gt;&lt;li&gt;Anmeldung Future Internet&lt;/li&gt;&lt;li&gt;Anmeldung IITM&lt;/li&gt;&lt;/ul&gt;&lt;p class="bodytext"&gt; Erst wenn Sie ein Thema gewählt und zugeteilt bekommen haben, ist die Teilnahme bindend.&amp;nbsp; Sie können gerne zur Infoveranstaltung erscheinen, auch wenn Sie sich noch nicht sicher sind, ob Sie wirklich am Seminar teilnehmen möchten.  Unser Lehrstuhl freut sich, Sie bei der Informationsveranstaltung und später auch im Seminar begrüßen zu dürfen und Ihnen einen Einblick in unsere Forschungsgebiete geben zu können.&lt;/p&gt; 

</content>
      <pubDate>13.07.2010</pubDate>
    </item>
    <item>
      <title>Information iLab in 01.06.011 | Registration now possible</title>
      <link>http://www.net.in.tum.de/news/archive/information.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;An introduction to the iLab will be given at 12.07.2010 at 16:15 in Room 01.06.011. &lt;/p&gt;
&lt;p class="bodytext"&gt;You can find more information and the application form here:&lt;/p&gt;&lt;div&gt; &lt;a href="#" target="_blank" class="moz-txt-link-freetext" &gt;http://ilab.net.in.tum.de/extern/apply/index.php&lt;/a&gt; &lt;/div&gt;

</content>
      <pubDate>12.07.2010</pubDate>
    </item>
    <item>
      <title>Gastvortrag von Prof. Wolfinger am 17.06.10 um 17:15 </title>
      <link>http://www.net.in.tum.de/news/archive/gastvortrag-2.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;Es spricht:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;  &lt;b&gt;Prof. Bernd Wolfinger&lt;/b&gt; Universität Hamburg&lt;/p&gt;
&lt;p class="bodytext"&gt; &lt;b&gt;Termin:&lt;/b&gt;  Donnerstag, den 17.06.10 um 17:15 &lt;b&gt; Ort:&lt;/b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;  Raum MI Hörsaal 2  (MI-Gebäude, Campus Garching)    &lt;b&gt;Thema:&lt;/b&gt;&amp;nbsp;  Performance Engineering and Traffic Engineering  for Multimedia Applications in the Internet and in Mobile Networks&lt;/p&gt;
&lt;p class="bodytext"&gt;Abstract:  Performance Engineering of computer and communication networks, among  others, comprises practices, methods and tools which can be applied in  order to design, implement and operate networks and their applications  in such a way that given performance and Quality-of-Service (QoS)  requirements are fulfilled. ‘Traffic Engineering’ for networks – in  its broader sense – comprises formal specification, measurement,  modelling, characterization and manipulation (routing, traffic shaping, &amp;nbsp;etc) as well as the generating of traffic loads in networks.  Performance engineering and traffic engineering are particularly  relevant in the context of the Internet and of mobile networks, more  so, if those networks are used for real-time communications.  The talk summarizes the long-term experiences in traffic and  performance engineering within the Telecommunications and Computer  Networks Division at Hamburg University. In particular, emphasis will  be given to our recent research results related to measurement-based  load characterization of audio and video streams, to formal load  specification and analytical modelling of load transformations  (stochastic load transformations as they are currently studied within  the DFG project LUPUS) as well as to the elaboration of two powerful  performance and traffic engineering tools: a distributed load  generator for multimedia traffic in service-integrated networks and a  network emulator to reflect the packet delay and loss behaviour of,  possibly interconnected, computer and communication networks. A case  study will be presented to illustrate the broad applicability of our  load generator (UniLoG) and network emulator (NetEmu) prototypes.  These experiments will also show that valid QoS-related studies for  distributed real-time applications can be flexibly supported by a  combined usage of both, the network emulator and the load generator  tool. With our approach the strict separation between network-oriented  and application-oriented performance studies is no longer required –  an important step towards a realistic QoS evaluation from an  end-user’s point of view.  Bio:  Prof. Dr. Bernd E. Wolfinger has been with the Computer Science  Department of Hamburg University since 1981, where he is presently  heading the Telecommunications and Computer Networks (TKRN)  Subdivision. Dr. Wolfinger has obtained degrees from Université  Claude-Bernard, Lyon/F. (Maîtrise, ‘74), University of Karlsruhe/D  (Diploma, Mathematics ‘75; Ph.D., Comp. Sc. ’79). He has spent  long-term sabbaticals at IBM Research / Yorktown, N.Y. (‘85),  Internat. Computer Science Institute / Berkeley, Ca. (’91,’96), as  well as at Université P. et M. Curie, LIP 6, Paris (’01, ‘06).  Professor Wolfinger is active in Networking research since 1975, has  been responsible for numerous conference organizations and has served  on a large variety of TPCs. He has been editor of books and special  issues of journals; he has published more than 100 papers in areas  such as High-speed &amp;amp; Wireless Networks and Real-time (audio/video)  Communications as well as in Modeling (Simulation &amp;amp; Queueing Networks) , Measurement, Traffic Engineering, Performance &amp;amp; Reliability  Evaluation, QoS Management and eLearning.   &lt;br/&gt;contact person:&lt;br/&gt; Prof. Georg Carle &lt;br/&gt; phone: 089/ 289-18032 &lt;br/&gt; Email: calre@in.tum.de&lt;/p&gt; 

</content>
      <pubDate>17.06.2010</pubDate>
    </item>
    <item>
      <title>ACMP auf der Langen Nacht der Wissenschaften am 15.5.2010 von 18:00-24:00Uhr</title>
      <link>http://www.net.in.tum.de/news/archive/kickoff-meet-2.html</link>
      <description>
      </description>
      <content>&lt;p class="bodytext"&gt; Mit unser &lt;a href="http://pahl.de/?site=__research" target="_blank" &gt;autonomen Control und Managementplatform (ACMP)&lt;/a&gt; nehmen wir an der Langen Nacht der Wissenschaften 2010 an der Technischen Universität München teil.  Mehr Information &lt;a href="http://www.in.tum.de/metanavigation/personen-services/fakultaets-events/fakultaets-events-2010/lange-nacht-der-wissenschaft/projektausstellungen-forschung-an-der-fakultaet-fuer-informatik.html" target="_blank" &gt;hier&lt;/a&gt;.  &lt;b&gt;Wir freuen uns, Sie willkommen zu heißen!&lt;/b&gt;&lt;/p&gt; 

</content>
      <pubDate>15.05.2010</pubDate>
    </item>
    <item>
      <title>Es sind noch Plätze im iLab frei! nächstes Meeting: Do 29.04. 16:00 @ 00.08.038</title>
      <link>http://www.net.in.tum.de/news/archive/kickoff-meet.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;Im &lt;b&gt;Internet-Praktikum&lt;/b&gt; (Bachelor, 10 ECTS) lernen Sie  in praktischen Versuchen viele &lt;b&gt;Kerntechnologien und Services  des Interne&lt;/b&gt;t kennen. &lt;/p&gt;
&lt;p class="bodytext"&gt;Es sind noch Plätze frei!&lt;/p&gt;
&lt;p class="bodytext"&gt;Neue Teilnehmer sind auch bei der nächsten Veranstaltung am 29.04.2010 um 16:00 Uhr im Raum 00.08.038 willkommen  &lt;/p&gt;
&lt;p class="bodytext"&gt;Zusätzliche Informationen und Registrierung &lt;a href="en/teaching/earlier-teaching/ss10/praktika/internet-praktikum/" target="_self" &gt;hier.&lt;/a&gt;&lt;/p&gt; 

</content>
      <pubDate>22.04.2010</pubDate>
    </item>
    <item>
      <title>Kickoff meeting ilab² 04/20/2010 @ 16h15 in 00.08.038 (for master students) [Currently 1 place left]  &lt;br&gt;&lt;br&gt; Kick-off for ilab1 (Bachelor): 22.4.10 16h00 @ MI 00.13.009A</title>
      <link>http://www.net.in.tum.de/news/archive/informationa.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;Kickoff meeting for the new practical exercise on master level &lt;b&gt;ilab²&lt;/b&gt; will be on&lt;/p&gt;
&lt;p class="bodytext"&gt;04/20/2010 @ 16h15 in 00.08.038&lt;b&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="bodytext"&gt;More information &lt;a href="http://ilab2.net.in.tum.de/" target="_blank" &gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p class="bodytext"&gt;&lt;b&gt;Currently 1 place left.&lt;/b&gt;&lt;/p&gt; 

</content>
      <pubDate>20.04.2010</pubDate>
    </item>
    <item>
      <title>Vorbesprechung zum Internetpraktikum am 11.2.2010, 16-17 Uhr, Raum 00.13.009A</title>
      <link>http://www.net.in.tum.de/news/archive/vorbesprechu-2.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;Die Infoveranstaltung zum Internetpraktikum findet am 11.2. um 16:00 in 00.13.009A statt.&lt;/p&gt;
&lt;p class="bodytext"&gt;Nähere Informationen zum Praktikum gibt es&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Auf der &lt;a href="en/teaching/earlier-teaching/ss10/praktika/internet-praktikum/" target="_self" &gt;Lehrstuhlseite zum Internetpraktikum&lt;/a&gt; oder  &lt;/li&gt;&lt;li&gt;direkt auf der &lt;a href="http://ilab.net.in.tum.de/" target="_blank" &gt;Startseite des Labsystems&lt;/a&gt;.&lt;/li&gt;&lt;/ul&gt; 

</content>
      <pubDate>11.02.2010</pubDate>
    </item>
    <item>
      <title>Informational meeting ilab² 02/09/2010 @ 16h15 in 03.05.033 (for master students)</title>
      <link>http://www.net.in.tum.de/news/archive/vorbesprechu-3.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;Informational meeting for the new practical exercise on master level &lt;b&gt;ilab²&lt;/b&gt; will be on&lt;/p&gt;
&lt;p class="bodytext"&gt;02/09/2010 @ 16h15 in 03.05.033&lt;/p&gt;
&lt;p class="bodytext"&gt;More information &lt;a href="http://ilab2.net.in.tum.de/" target="_blank" &gt;here&lt;/a&gt;.&lt;/p&gt; 

</content>
      <pubDate>09.02.2010</pubDate>
    </item>
    <item>
      <title>Gastvortrag von Dr. Henning Sanneck am 08.02.2010 um 14:15</title>
      <link>http://www.net.in.tum.de/news/archive/gastvortrag-1.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;Es spricht:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;  &lt;b&gt;Dr. Henning Sanneck&lt;/b&gt; Research Manager OAM Automation Research, Technology &amp;amp; Platforms Nokia Siemens Networks GmbH&amp;amp;Co KG, München&lt;/p&gt;
&lt;p class="bodytext"&gt;&lt;a href="http://sanneck.net/" target="_blank" &gt;http://sanneck.net&lt;/a&gt;   &lt;b&gt;Termin:&lt;/b&gt;  Montag, den 08.02.2010, 14:15 Uhr &lt;b&gt; Ort:&lt;/b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;  Raum MI Multimediaraum 00.08.038  (MI-Gebäude, Campus Garching, Finger 8, Erdgeschoss)    &lt;b&gt;Thema:&lt;/b&gt;&amp;nbsp;  Mobile Network Management Research&lt;/p&gt;
&lt;p class="bodytext"&gt;Due to the high cost pressure put on mobile network operators, the  efficient Management of Mobile Networks (Deployment, Operation,  Maintenance) has gained a lot of importance and visibility. Particularly  automation solutions (&amp;quot;Self Organizing Networks&amp;quot;) are considered to be a  key building block for LTE networks by operators and network equipment  vendors. Based on an overview on mobile networks and their management, a  concrete example (self-configuration of basestations) will be discussed,  showing the opportunities and challenges in this area. Additionally the  presentation gives some insights into the product development process  (idea -&amp;gt; concept -&amp;gt; product-feature) and the tasks of a research group  within a large network equipment manufacturer.&lt;/p&gt;
&lt;p class="bodytext"&gt;&lt;b&gt;Bio:&lt;/b&gt; Henning Sanneck is Research Manager at Nokia Siemens Networks in Munich  where he is leading projects on Self-Organizing Networks for LTE. &lt;/p&gt;
&lt;p class="bodytext"&gt;Dr. Henning Sanneck studied Electrical Engineering at the University of  Erlangen-Nuremberg, Germany. He was a Visiting Student (ERASMUS  scholarship) at the University of Nantes, France, in 1993. After  receiving his Diploma in 1995, he joined GMD Fokus (now: Fraunhofer  Fokus) in Berlin. At Fokus, Dr. Sanneck worked as a Researcher in the  area of Quality-of-Service (QoS) support for Real-Time Services in  IP-based networks. He received his Dr.-Ing. (PhD) degree in Electrical  Engineering from the Technical University of Berlin with a thesis on  Voice over IP QoS in 2000.  In 2001 Dr. Sanneck joined Siemens - Mobile Networks in Munich, working  as a Senior Research Engineer on cross-layer design for IP-based Radio  Access Networks (RANs), Software Technologies for Mobile Networks and  Technology Management. He became a Project Manager for technology  innovation projects in the area of Network Management for 3G and beyond  RANs in 2003. Since the formation of Nokia Siemens Networks in 2007 he  is heading the &amp;quot;OAM Automation&amp;quot; group in the Research, Technology &amp;amp;  Platforms unit.  &lt;/p&gt; 

</content>
      <pubDate>08.02.2010</pubDate>
    </item>
    <item>
      <title>Vorbesprechung zu den Hauptseminaren "Future Internet" und "Innovative Internettechnologien und Mobilkommunikation" am 1.2.2010, 14ct-16 Uhr, Raum 00.08.038</title>
      <link>http://www.net.in.tum.de/news/archive/vorbesprechu.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;Weiter Informationen zu den Seminaren unter der jeweiligen Semianrhomepage zu finden:  &lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="en/teaching/earlier-teaching/ss10/seminare/blockseminar-future-internet/" target="_self" &gt;Future Internet&lt;/a&gt; (max. 16 Plätze)&lt;/li&gt;&lt;li&gt;&lt;a href="en/teaching/earlier-teaching/ss10/seminare/hauptseminar-innovative-internettechnologien-und-mobilkommunikation/" target="_self" &gt;Innovative Internettechnologien und Mobilkommunikation&lt;/a&gt; &lt;/li&gt;&lt;/ul&gt; 

</content>
      <pubDate>25.01.2010</pubDate>
    </item>
    <item>
      <title>Vorbesprechung zu dem Seminar "Sensorknoten: Betrieb, Netze und Anwendungen" am 5.2.2010, 12-14 Uhr, Raum 03.07.023</title>
      <link>http://www.net.in.tum.de/news/archive/vorbesprechu-1.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;weitere Informationen sind auf der &lt;a href="en/teaching/earlier-teaching/ss10/seminare/hauptseminar-sensorknoten-betrieb-netze-anwendungen/" target="_self" &gt;Seminarhomepage&lt;/a&gt; zu finden.&lt;/p&gt; 

</content>
      <pubDate>25.01.2010</pubDate>
    </item>
    <item>
      <title>Weihnachtsfeier 2009</title>
      <link>http://www.net.in.tum.de/news/archive/weihnachtsfe.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;Wie in jedem Jahr veranstaltet der Lehrstuhl eine Weihnachtsfeier zu der wir unsere (zukünftigen) Studenten und Hiwis einladen möchten.  &lt;b&gt;Datum:&lt;/b&gt; 21.12.2009 &lt;b&gt;Zeit&lt;/b&gt;: ab 18:00 &lt;b&gt;Ort:&lt;/b&gt;  FMI, Raum 03.07.023  Wir bitten um eine kurze &lt;a href="en/miscellaneous/anmeldeformular-weihnachtsfeier-2009/" target="_self" &gt;&lt;b&gt;Anmeldung&lt;/b&gt;&lt;/a&gt;, damit wir die Anzahl der Teilnehmer einschätzen können.&lt;/p&gt; 

</content>
      <pubDate>21.12.2009</pubDate>
    </item>
    <item>
      <title>Live Hacking Demo am 13.11.09</title>
      <link>http://www.net.in.tum.de/news/archive/live-hacking.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;Im Rahmen des Proseminars &amp;quot;&lt;a href="http://www.net.in.tum.de/de/lehre/ws0910/seminare/proseminar-network-hacking/" target="_self" &gt;Network Hacking&lt;/a&gt;&amp;quot; veranstaltet der Lehrstuhl zusammen mit der Firma &lt;a href="http://www.syss.de/" target="_blank" &gt;Syss&lt;/a&gt; eine &amp;quot;Live Hacking Demo&amp;quot;.   Herr Sebastian Schreiber, Geschäftsführer von Syss, wird während der Live-Demo eine Vielzahl von Hackertechniken demonstrieren und erläutern. Insbesondere finden Angriffe auf Systeme in Netzwerken und dem Internet statt. Im Anschluss laden wir die Anwesenden zu einer Diskussion ein.&lt;/p&gt;
&lt;p class="bodytext"&gt;Weitere Informationen &lt;a href="en/teaching/earlier-teaching/ws0910/seminars/proseminar-network-hacking/live-hacking-demo/" target="_self" &gt;hier&lt;/a&gt;.  &lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Zeit:&lt;/b&gt;&lt;/h2&gt;
&lt;p class="bodytext"&gt;Freitag, der 13. November 2009 14:00 - 16:00   &lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Ort:&lt;/b&gt;&lt;/h2&gt;
&lt;p class="bodytext"&gt;Fakultät für Maschinenwesen Hörsaal 1801  Boltzmann Straße 15     85748 Garching&lt;/p&gt; 

</content>
      <pubDate>13.11.2009</pubDate>
    </item>
    <item>
      <title>Proceedings IITM und Sensorknoten abholbereit</title>
      <link>http://www.net.in.tum.de/news/archive/proceedings.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;Im Rahmen unsere Seminare im SS2009 haben wir ein gemeinsames Proceeding (NET-2009-10-1)angefertigt, welches folgende Seminare beinhaltet:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Innovative Internettechnologien und Mobilkommunikation (IITM)&lt;/li&gt;&lt;li&gt;Sensorknoten: Betrieb, Netze und Anwendungen (SN)&lt;/li&gt;&lt;/ul&gt;&lt;p class="bodytext"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p class="bodytext"&gt;Das gebundene Proceeding kann ab sofort in unserem Sekretariat abgeholt werden. Eine PDF-Version ist zu finden unter &lt;a href="http://www.net.in.tum.de/publications/NET/" target="_blank" &gt;http://www.net.in.tum.de/publications/NET/&lt;/a&gt; .&lt;/p&gt;

</content>
      <pubDate>09.11.2009</pubDate>
    </item>
    <item>
      <title>TUM Informatik I8-Sonderkolloquium mit James Sterbenz am 05.10.09</title>
      <link>http://www.net.in.tum.de/news/archive/tum-informat.html</link>
      <description>
      </description>
      <content>
 &lt;div&gt;&lt;strong&gt;&lt;b&gt;E I N L A D U N G &lt;/b&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;p class="bodytext"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;    zu einem TUM Informatik I8-Sonderkolloquium:    Es spricht:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;  &lt;b&gt;Prof. James P.G. Sterbenz, Ph.D. &lt;/b&gt; The University of Kansas, U.S.A.  &lt;a href="http://www.ittc.ku.edu/%7Ejpgs" target="_blank" class="moz-txt-link-freetext" &gt;http://www.ittc.ku.edu/~jpgs&lt;/a&gt;    &lt;b&gt;Termin&lt;/b&gt;: Montag, den 05.10.09, 14 Uhr  &lt;b&gt;Ort&lt;/b&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;  Raum MI Besprechungsraum Informatik8 03.05.033  (MI-Gebäude, Campus Garching, 3. OG, Finger 5)    &lt;b&gt;Thema&lt;/b&gt;:&amp;nbsp; Resilience, Survivability, and Heterogeneity in the Postmodern Internet   James P.G. Sterbenz    &lt;b&gt;Abstract &lt;/b&gt;   Society increasingly relies on computer networks in general, and the  Internet in particular. Consumers rely on networks for access to  information and services, personal finance, and for communication with  others. The Internet has become indispensable to the routine operation  of businesses and to the global economy. The military depends on network  centric operations and warfare. Governments depend on networks for their  daily operation, service delivery, and response to natural disaster and  terrorist attacks. Furthermore, the Internet is being used in ways not  anticipated by its designers and evolution of the protocols, in  particular: TCP, IP, BGP, DNS, and HTTP. Emerging application paradigms  and mashups coupled with usage scenarios that are increasingly  disconnected and mobile challenge the current architecture. This has  been recognised by research and development initiatives including NSF  FIND (Future Internet Design), GENI (Global Environments for Network  Innovation), and EU FIRE (Future Internet Research and Experimentation).  &amp;nbsp;This presentation will focus on two key aspects of the future  Internet: resilience and heterogeneity.    Resilience: The consequences to disruption of the Internet are  increasingly severe, and threaten the lives of individuals, the  financial health of business, and the economic stability and security of  nations and the world. With the increasing importance of the Internet,  so follows it's attractiveness as a target from bad guys: recreational  and professional crackers, terrorists, and from information warfare. The  EU FIRE ResumeNet project is exploring resilience and survivability as  critical properties of the future Internet architecture.    Heterogeneity: New applications and usage scenarios stress the Internet  architecture that has evolved assuming a stable wired infrastructure.  While the current hourglass waist provided by IP, DNS, and BGP has  served the Internet well, the demand for heterogeneity stresses the  least-common-denominator of the waist. The NSF FIND Postmodern Internet  project (PoMo) is exploring heterogeneity as a first-class citizen in  the Postmodern Internet, in which a new internetworking protocol serves  as the glue for heterogeneous realms with explicit support for trust and  policy boundaries.    The Great Plains Environment for Network Innovation (GpENI) is  constructing part of the GENI infrastructure, which will in part be used  as a platform to test and evaluate ResumeNet and PoMo architecture.  Additionally, research in two domain-specific realms will be described.    &lt;b&gt;Highly Dynamic Airborne Networking &lt;/b&gt;   Highly dynamic mobile wireless networks present unique challenges to  end-to-end communication, particularly caused by the time varying  connectivity of high-velocity nodes combined with the unreliability of  the wireless communication channel. Addressing these challenges requires  the design of new protocols and mechanisms specific to this environment.  Our research explores the tradeoffs in the location of functionality  such as error control and location management for high-velocity multihop  airborne-sensor networks and presents cross-layer optimizations between  the MAC, link, network, and transport layers to enable a domain specific  network architecture, which provides high reliability for telemetry  applications. We have designed new transport, network, and routing  protocols for this environment: TCP-friendly AeroTP, IP-compatible  AeroNP, and AeroRP, which show significant performance improvement over  the traditional TCP/IP/MANET protocol stack.    &lt;b&gt;Weather Disruption-Tolerant Millimeter-Wave Mesh Networking &lt;/b&gt;   Millimeter-wave networks have the potential to supplement fiber in  providing high-speed Internet access, as well as backhaul for emerging  mobile 3G and 4G services. However, due to the high frequency of  operation (70-90 GHz), such networks are highly susceptible to  attenuation from rain. A resilient mesh topology with cross-layering  between the physical and network layer has the potential to  self-optimise under the presence of unstable links. Our research  investigates mechanisms to overcome the disruptive effects of rain  storms on network connectivity and service reliability. We propose two  novel domain-specific predictive routing algorithms: P-WARP that uses  real-time radar data to dynamically reroute traffic in advance of link  failures, as well as a modified link-state algorithm XL-OSPF that uses  cross-layering to instantaneously react to link failures. Simulations  evaluate the effectiveness of the proposed algorithms based on data from  real storms in the Midwest US.   &lt;b&gt; Bio &lt;/b&gt;   Dr. James P.G. Sterbenz is Associate Professor of Electrical Engineering  &amp;amp; Computer Science and on staff at the Information &amp;amp; Telecommunication  Technology Center at the University of Kansas, and is a Visiting  Professor of Computing in InfoLab 21 at Lancaster University in the UK.  He has previously held senior staff and research management positions at  BBN Technologies, GTE Laboratories, and IBM Research. His research  interests include resilient, survivable, and disruption tolerant  networking, future Internet architectures, active and programmable  networks, and high-speed networking and components. He is currently in  the NSF-funded FIND and GENI programs, and the EU-funded FIRE ResumeNet  project. He received a doctorate in computer science from Washington  University in 1991. He has been program chair for IEEE GBN and HotI,  IFIP IWSOS, PfHSN, and IWAN, and is on the editorial board of IEEE  Network. He is principal author of the book High-Speed Networking: A  Systematic Approach to High-Bandwidth Low-Latency Communication.    &lt;/p&gt;

</content>
      <pubDate>05.10.2009</pubDate>
    </item>
    <item>
      <title>Neue Hiwi-Stellen im Angebot</title>
      <link>http://www.net.in.tum.de/news/archive/neue-hiwi-st.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;Der Lehrstuhl i8 sucht zum nächstmöglichen Zeitpunkt mehrere Hilfswissenschaftler.  &lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Hiwis gesucht für Emmy-Noether Nachwuchsgruppe &lt;/b&gt;(&lt;a href="fileadmin/TUM/offers/2009-09-hiwi-grothoff-gnu.pdf" &gt;PDF&lt;/a&gt;)  &lt;/li&gt;&lt;li&gt;&lt;b&gt;Hiwis für Webseiten- und Netzwerkadministration gesucht&lt;/b&gt; (&lt;a href="fileadmin/TUM/offers/2009-09-hiwi-fouquet-korsten-admin.pdf" &gt;PDF&lt;/a&gt;)&lt;/li&gt;&lt;/ul&gt;&lt;p class="bodytext"&gt;Alle aktuellen Hiwi-Auschreibungen gibt es unter &amp;quot;&lt;a href="/joboffers/" target="_self" &gt;Angebote&lt;/a&gt;&amp;quot;.&lt;/p&gt;

</content>
      <pubDate>03.09.2009</pubDate>
    </item>
    <item>
      <title>Gastvortrag von Prof. Dr. Jörn Altmann am 20.07. um 13:00</title>
      <link>http://www.net.in.tum.de/news/archive/gastvortrag.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;Es spricht:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;  &lt;b&gt;Prof. Dr. Jörn Altmann &lt;/b&gt; Seoul National University, South Korea  &lt;a href="http://www.my-groups.de/altmann/?page_id=19" target="_blank" class="moz-txt-link-freetext" &gt;http://www.my-groups.de/altmann/?page_id=19&lt;/a&gt;    &lt;b&gt;Termin:&lt;/b&gt;  Montag, den 20.07.09, 13 Uhr  &lt;b&gt; Ort:&lt;/b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;  Raum MI Seminarraum 03.07.023   (MI-Gebäude, Campus Garching, 3. OG, Finger 7)    &lt;b&gt;Thema:&lt;/b&gt;&amp;nbsp;  Capacity Planning for Cloud Computing Resources   Due to the few options of computing resources currently available in the existing market, capacity planning is simple to perform. However, envisioning a market for commercial computing resources as part of a Cloud computing environment, capacity planning will become more complex due to the availability of many different resource types at variable prices. In this situation, the user will require support for handling the capacity planning process and for making use of Cloud computing in a cost-effective manner. The support could come from an online, stand-alone Capacity Planning Service, enabling companies to outsource their capacity planning task. This talk describes the Cloud Capacity Planning Service and demonstrates the workings of the service.  This work on capacity planning has been partly performed within the EC-funded project GridEcon, Grid Economics and Business Models. GridEcon introduced the design and implementation of the GridEcon Marketplace, which not only provides the market mechanism for trading computing resources on a pay-per-use basis but also provides an environment for value-added support services for using the Cloud computing market more efficiently. The Marketplace and market mechanism were validated by using the GridEcon Platform, which is a service-oriented platform for composing market scenarios. The talk will also give an overview about the GridEcon Project and its Marketplace.   &lt;b&gt;Bio: &lt;/b&gt;  Jörn Altmann is Associate Professor for Technology Management, Economics, and Policy at Seoul National University, where he heads the group on Computer Network Economics. Prior to this, he taught computer networks at UC Berkeley, worked as a Senior Scientist at Hewlett-Packard Labs, and has been a postdoc at EECS and ICSI of UC Berkeley. Dr. Altmann received his B.Sc. degree, his M.Sc. degree, and his Ph.D. from the University of Erlangen-Nuremberg. Dr. Altmann's current research centres on economics of Internet services and Internet infrastructures, integrating economic models into distributed systems. On these topics, he has major publications, serves on editorial bodies of journals and program committees, chaired international workshops, and has given several invited talks. He also served on review panels for next generation Internet research in Europe and USA.   &lt;/p&gt; 

</content>
      <pubDate>20.07.2009</pubDate>
    </item>
    <item>
      <title>Anmeldeformulare zum Proseminar Network Hacking und zum Internet-Praktikum sind freigeschaltet.</title>
      <link>http://www.net.in.tum.de/news/archive/anmeldeformu.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;Die Anmeldeformulare für das Internet-Praktikum und das Proseminar &amp;quot;Network Hacking&amp;quot; sind jetzt freigeschaltet.&lt;/p&gt;
&lt;p class="bodytext"&gt;Nähere Informationenen, auch zu Infoveranstaltungen am Ende des Sommersemesters, gibt es auf den entsprechenden Seiten:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="en/teaching/earlier-teaching/ws0910/labs/internet-praktikum/" target="_self" &gt;Internet-Praktikum im WS09/10&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="en/teaching/earlier-teaching/ws0910/seminars/proseminar-network-hacking/" target="_self" &gt;Proseminar Network Hacking im WS09/10 &lt;/a&gt;&lt;/li&gt;&lt;/ul&gt; 

</content>
      <pubDate>06.07.2009</pubDate>
    </item>
    <item>
      <title>Anmeldung zu den Hauptseminaren Future Internet und IITM im WS09/10 freigeschaltet</title>
      <link>http://www.net.in.tum.de/news/archive/anmeldung-zu.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;Im kommenden Wintersemester 09/10 werden von unserem Lehrstuhl u.a. die Haupteminare &lt;a href="en/teaching/earlier-teaching/ws0910/seminars/blockseminar-future-internet/" target="_self" &gt;Future Internet&lt;/a&gt; (max. 12 Plätze, Blockveranstaltung) und Innovative &lt;a href="en/teaching/earlier-teaching/ws0910/seminars/hauptseminar-innovative-internettechnologien-und-mobilkommunikation/" target="_self" &gt;Internettechnologien &amp;amp; Mobilkommunikation&lt;/a&gt; (semesterbegleitend) angeboten. Die Anmeldungen sind ab sofort freigeschaltet.  Die Vorbesprechungen sind verschoben worden auf Montag, den 20.7.09, 16-18 Uhr in Raum 03.07.023.&amp;nbsp;&lt;/p&gt; 

</content>
      <pubDate>01.07.2009</pubDate>
    </item>
    <item>
      <title>TUM Informatik-Sonderkolloquium mit Prof. Jörg Liebeherr am 12.06. um 11:15 in Raum 00.13.009a</title>
      <link>http://www.net.in.tum.de/news/archive/tum-informat-1.html</link>
      <description>
      </description>
      <content></content>
      <pubDate>12.06.2009</pubDate>
    </item>
    <item>
      <title>Proceedings Seminar Future Internet (SS09) und IITM (WS08/09) können abgeholt werden</title>
      <link>http://www.net.in.tum.de/news/archive/proceedings-1.html</link>
      <description>
      </description>
      <content>&lt;p class="bodytext"&gt;WS 2008/2009  Seminar „Innovative Internettechnologien und Mobilkommunikation“ (&lt;a href="../publications/net/NET-2009-01-1.pdf" &gt;pdf&lt;/a&gt;)  &lt;/p&gt;
&lt;p class="bodytext"&gt;SS 2009 Seminar „Future Internet“ (&lt;a href="../publications/net/NET-2009-04-1.pdf" &gt;pdf&lt;/a&gt;)&lt;/p&gt;

</content>
      <pubDate>08.06.2009</pubDate>
    </item>
    <item>
      <title>Freie Plätze im Seminar IITM und Seminar Sensorknoten</title>
      <link>http://www.net.in.tum.de/news/archive/freie-plaetze.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;In unseren Seminaren&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="en/teaching/earlier-teaching/ss09/seminars/hauptseminar-innovative-internettechnologien-und-mobilkommunikation/" target="_self" &gt;Innovative Internettechnologien und Mobilkommunikation&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="en/teaching/earlier-teaching/ss09/seminars/hauptseminar-sensorknoten-betrieb-netze-anwendungen/" target="_self" &gt;Sensorknoten: Betrieb, Netze und Anwendungen &lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p class="bodytext"&gt;sind noch freie Plätze. Die Vorbesprechung und Themenvergabe findet am 20.4.09 statt. Uhrzeit und Ort bitte den Seminarseiten entnehmen.&lt;/p&gt; 

</content>
      <pubDate>14.04.2009</pubDate>
    </item>
    <item>
      <title>Promotionsvortrag von Michael Kleis</title>
      <link>http://www.net.in.tum.de/news/archive/promotionsvo.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;Im Rahmen seines Promotionsverfahrens hält      &lt;b&gt;Herr Dipl.-Math. Michael Kleis &lt;/b&gt;     am Montag, 30.03.2009, 11.00 Uhr, im Raum 01.07.023, MI-Gebäude, Boltzmannstr. 3 in Garching einen Vortrag zum Thema      &lt;b&gt;&amp;quot;CSP, Cooperative Service Provisioning using Peer-to-Peer Principles&amp;quot; &lt;/b&gt;     Betreuer: Prof. Georg Carle     &lt;/p&gt;
&lt;h2&gt;Zusammenfassung &lt;/h2&gt;
&lt;p class="bodytext"&gt; Current challenges for Internet service provisioning include  incorporating an increasing number of wireless and wired network  technologies, a variety of heterogeneous end user terminals and the  requirements of delay and bandwidth sensitive multimedia services.    There are two main obstacles for flexible media provisioning on top of  today's Internet. First the end-to-end networking paradigm which is  based on a service and data unaware transport, and secondly a lack of  high level communication abstractions.    To address the first point this thesis proposes a methodology to  integrate the Network Provider into the process of service provisioning.  The proposed cooperative service provisioning (CSP) demands an  interaction between Service Provider, Network Provider and Client.  CSP can be applied to Provider as well as Peer-to-Peer scenarios.    To address the second point, the thesis adopts a Service Overlay  approach. It is studied how the principle of Distributed Hash Tables  (DHTs) can be extended to realise a distributed control plane for a  decentral and reactive creation of Service Overlays. As a prerequisite,  a methodology to reduce Service Overlay related routing problems to  search problems is developed.    With regard to the required Quality of Service (QoS) measurements, the  thesis focuses on scalable and time efficient estimation techniques. As  a result, two new delay prediction schemes have been developed which  improve estimation accuracy when compared to the state of the art.  Furthermore, a novel approach to bandwidth estimation is investigated.  It combines methods from landmark based delay estimation with a  transformation step and has favourable estimation accuracy. &lt;/p&gt; 

</content>
      <pubDate>30.03.2009</pubDate>
    </item>
    <item>
      <title>Gastvorträge von Hakima Chaouchi und Apostolia Papapostolou am 13.02. um 10:00</title>
      <link>http://www.net.in.tum.de/news/archive/gastvortraege.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;Es sprechen:&amp;nbsp;&amp;nbsp;&amp;nbsp;  &lt;b&gt;Hakima Chaouchi  &lt;/b&gt;&lt;a href="http://www-public.int-evry.fr/%7Echaouchi/" target="_blank" class="moz-txt-link-freetext" &gt;http://www-public.int-evry.fr/~chaouchi/&lt;/a&gt;  Telecom Sud Paris &lt;/p&gt;
&lt;p class="bodytext"&gt; &lt;b&gt;Apostolia Papapostolou&lt;/b&gt; Telecom Sud Paris    &lt;b&gt;Termin&lt;/b&gt;: Freitag, den 13.02.09, 10:00 Uhr   &lt;b&gt;Ort&lt;/b&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp; Seminarraum 03.07.023  &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p class="bodytext"&gt;  &lt;b&gt;Talk 1: On Security in Ad Hoc Networks &lt;/b&gt;   Abstract: Access control concerns in MANETs are very serious and  considered as a crucial challenge for operators who prospects to employ  unrivaled capabilities of such networks for different applications. We  propose a novel hierarchical distributed AAA architecture for proactive  link state routing protocols notably OLSR . This proposal contains a  lightweight and secure design of an overlay authentication and  authorization paradigm for mobile nodes as well as a reliable accounting  system to enable operators to charge nodes based on their connection  duration time. We also suggest a hierarchical distributed AAA  (Authentication, Authorization, and Accounting) server architecture with  resource and location aware election mechanism. Moreover, this proposal  mitigates the OLSR security issues&amp;nbsp; noticeably and eventually defines a  node priority-based quality of service.    Dr. Hakima CHAOUCHI is associate professor at the Telecommunication  Institute in France. She received her PhD in 2004 in telecommunications  and networking. Previously, she was a research fellow at Paris VI  University, and also joined the Centre for Telecommunication Research of  London (CTR) as a research associate. Her research work is related to  wireless and mobile networks and Security. She was involved in European  and French research projects. She is currently coordinating one of the  first French projects on Internet of Things SUN (Situated and Ubiquitous  Networks). She is the co-editor of the “Security in Wireless and mobile  networks” book (ISTE 2009) and the “emerging wireless technologies, IEEE  standard” book (Hermes 2008) and the last one coming end of 2009 on  “Internet of Things”. She recently co-organized the first and the second  workshop in mobile and wireless network security (MWNS 2008, MWNS 2009)  and is a member of several technical program committees.     &lt;b&gt; Talk 2: Wife: Wireless Indoor Positioning Fingerprint based Evaluation &lt;/b&gt;   Abstract: Location awareness of a user or device has always been  considered as a key element for enhancing network performance and  improving user experience by enabling innovative location-based  services. In this paper, we present WIFE (Wireless Indoor positioning  based on Finger- print Evaluation), a user-based location determination  system which is based on the received Signal Strength (SS) received from  the surrounding Access Points (APs) inside a building. We focus on a  WiFi environment for its low cost and ease of deployment and study  Fingerprint-based deterministic techniques for their simplicity and  reduced processing time and resource requirements. We first address the  inherent impairments of an indoor environment and then describe our  proposed methodology for mitigating them.    Apostolia Papapostolou is a second year Ph.D. candidate at the Telecom  Institute in South of Paris in France. She obtained her bachelor degree  from the department of Computer and Communications Engineering at the  University of Thessaly (Greece) in 2006 and her Master of Science degree  from the department of Mobile and Personal Communications at King's  College, University of London in 2007. Her research interests include  wireless and mobile networks. Her current focus is on positioning,  mobility management techniques and location based services.     &lt;/p&gt; 

</content>
      <pubDate>12.02.2009</pubDate>
    </item>
    <item>
      <title>Anmeldung Internetpraktikum SS2009 läuft. Infoveranstaltung 28.1.2009 - 14:15 - 01.06.011.</title>
      <link>http://www.net.in.tum.de/news/archive/anmeldung-in.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext" /&gt;
&lt;p class="bodytext"&gt;Sie können sich ab sofort über das Webformular für das Internetpraktikum anmelden.  Die Praktikumswebsite finden Sie &lt;a href="http://ilab.net.in.tum.de" target="_blank" &gt;hier&lt;/a&gt;.  Weitere Information zur &lt;b&gt;Anmeldung&lt;/b&gt; finden Sie &lt;b&gt;&lt;a href="#" target="_blank" &gt;hier&lt;/a&gt;&lt;/b&gt;.&lt;/p&gt;

</content>
      <pubDate>18.01.2009</pubDate>
    </item>
    <item>
      <title>Weihnachtsfeier 2008, 18.12.2008</title>
      <link>http://www.net.in.tum.de/news/archive/weihnachtsfe-1.html</link>
      <description>
      </description>
      <content></content>
      <pubDate>18.12.2008</pubDate>
    </item>
    <item>
      <title>TUM Informatik-Sonderkolloquium mit Stephan Heckmüller am 10.12.08 um 13 Uhr in MI 01.06.011</title>
      <link>http://www.net.in.tum.de/news/archive/tum-informat-2.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt; Gastvortrag von &lt;b&gt;Herrn Dipl-Inf. Stephan Heckmüller&lt;/b&gt; (TKRN, Universitiät Hamburg) zum Thema &lt;b&gt;&amp;quot;Lasttransformation in Rechnernetzen und ihre Invertierung&amp;quot;&lt;/b&gt;.&lt;/p&gt;
&lt;p class="bodytext"&gt;&lt;b&gt;Zeit: Mittwoch, 10.12.08, 13:00 Uhr  &lt;/b&gt; &lt;b&gt;Ort: Raum MI 01.06.011 &lt;/b&gt; &lt;b&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="bodytext"&gt;Heutige Rechnernetze werden von einer Vielzahl von netzbasierten Anwendungen genutzt, die Verkehr mit teilweise stark unterschiedlichen Eigenschaften induzieren. Diese Eigenschaften werden darüber hinaus innerhalb des Netzes durch eine Vielzahl von Verarbeitungsvorgängen modifiziert. Um trotz der Komplexität des resultierenden, heterogenen Verkehrs-Mixes realistische Leistungsbewertungen vornehmen zu können, ist eine valide Charakterisierung und Modellierung des Verkehrs unverzichtbar.   Im Rahmen des Vortrags werden insbesondere die Einflüsse der Verarbeitungsvorgänge innerhalb des typischen Protokollstapels heutiger Rechnernetze betrachtet. Die hier erfolgenden Modifikationen der Lasteigenschaften bezeichnen wir als Lasttransformationen. Die Berücksichtigung dieser Transformationen erlaubt die Modellierung von Lasten an tieferen Schnittstellen aufbauend auf der ursprünglichen Lastcharakterisierung und den Eigenschaften des spezifischen Transformationsvorgangs.   Der Vortrag befasst sich zunächst mit der Modellierung solcher Lasttransformationen als Abbildungen auf Batch Markovian Arrival Processes (BMAPs). Neben der Vorstellung des grundsätzlichen Konzeptes wird auf die bisher betrachteten Lasttransformationen eingegangen. Insbesondere wird hierbei eine Transformation, welche den Einfluss eines Token-Bucket-Moduls modelliert, näher betrachtet. Mit Hilfe einer Fallstudie wird die erfreulich hohe Genauigkeit der entwickelten Transformationen aufgezeigt.   Neben der Vorhersage von Lasteigenschaften nach der Transformation ist die Invertierung von Lasttransformationen ebenfalls von Interesse. Dies gilt insbesondere dann, wenn Lasten nur an tieferliegenden Schnittstellen innerhalb des Protokollstapels beobachtbar sind und Eigenschaften an höheren Schnittstellen rekonstruiert werden sollen. Potentielle Anwendungsgebiete umfassen Anwendungsklassifikation, Angriffserkennung und Lastmodellierung für nicht beobachtbare Schnittstellen. Es werden erste Ergebnisse bezüglich der Rekonstruktion von Längeneigenschaften und von zeitlichem Verhalten präsentiert.&lt;/p&gt; 

</content>
      <pubDate>10.12.2008</pubDate>
    </item>
    <item>
      <title>TUM Informatik-Sonderkolloquium mit Herrn Prof. Dr. Ernst Biersack findet am 12.11.08 um 10 Uhr in Raum MI 00.08.038 statt</title>
      <link>http://www.net.in.tum.de/news/archive/tum-informat-3.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;  Es spricht: &lt;b&gt;Prof. Dr. Ernst Biersack&lt;/b&gt;&lt;/p&gt;
&lt;p class="bodytext"&gt;EURECOM  Sophia Antipolis zu Gast bei I8, Raum&amp;nbsp; MI 03.05.043   &lt;b&gt;Termin: Mittwoch, den 12.11.08, 10:00 Uhr  &lt;/b&gt; &lt;b&gt;Ort: Raum MI 00.08.038 (MI-Gebude, Campus Garching)  &lt;/b&gt; &lt;b&gt;Thema: Funktionsweise und Leistungsfähigkeit in Peer-to-Peer Systemen am Beispiel von KAD  &lt;/b&gt;  Peer-to-Peer Systeme haben in den letzten Jahren einen großen Aufschwung erlebt. Die populärsten P2P Anwendung wie File-sharing oder Video  streaming sind sehr weit verbreitet und werden täglich millionenfach benutzt um Inhalte aller Art auszutauschen. Ein ganz wesentlicher Vorzug  von P2P Systemen ist ihre ausgezeichnete Skalierbarkeit.   Wir werden zunächst eine kurze Zusammenfassung der Forschungsarbeiten unserer Gruppe im Bereich P2P und Netz-Tomographie geben.  Anschließend werden wir dann das P2P System KAD näher betrachten hinsichtlich seiner Funktionsweise, Leistungsfähigkeit sowie  Sicherheitslücken.  

</content>
      <pubDate>12.11.2008</pubDate>
    </item>
    <item>
      <title>Einsicht in die Nachholklausur GRNVS am 10.11.08 von 16-17 Uhr in Raum 03.05.058</title>
      <link>http://www.net.in.tum.de/news/archive/einsicht-in.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;Die Nachholklausur zur Vorlesung &amp;quot;Grundlagen: Rechnernetze und Verteilte Systeme&amp;quot; wurde korrigiert. Einsicht kann am 10.11.08 von 16-17 Uhr in Raum 03.05.058 genommen werden.&lt;/p&gt; 

</content>
      <pubDate>06.11.2008</pubDate>
    </item>
    <item>
      <title>Anmeldung für die Vorlesung/Übung "Netzsicherheit"</title>
      <link>http://www.net.in.tum.de/news/archive/anmeldung-fue.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;Die Anmeldung für die Vorlesung bzw. Übung in &amp;quot;&lt;a href="en/teaching/earlier-teaching/ws0809/lectures/network-security/" target="_self" &gt;Netzsicherheit&lt;/a&gt;&amp;quot; läuft noch.  &lt;/p&gt; 

</content>
      <pubDate>16.10.2008</pubDate>
    </item>
    <item>
      <title>Raumänderung für die Vorbesprechung zum Seminar "Innovative Internettechnologien und Mobilkommunikation": Raum 03.07.023 </title>
      <link>http://www.net.in.tum.de/news/archive/raumaenderung.html</link>
      <description>
      </description>
      <content> &lt;p class="bodytext"&gt;Die Vorbesprechung findet am 16.10.2008 ausnahmsweise in &lt;b&gt;Raum 03.07.023&lt;/b&gt; von 16:00-18:00 Uhr statt.&lt;/p&gt; 

</content>
      <pubDate>10.10.2008</pubDate>
    </item>
  </channel>
</rss>
