
2006
Past Presentations 2006
DATE |
CW |
REFERENT |
TITLE |
WEEKDAY |
TIME |
ROOM |
PROJECT |
KEYWORDS |
PRESENTATION(PPT, PDF, ...) |
December 2006 |
|||||||||
December 14 |
52 |
Measuring Anonymity |
Thursday |
15h00 |
A02 |
MESH-Sequencer |
Anonymity, Information Theory |
- |
|
December 14 |
52 |
Reaching Privacy through k-anonymity |
Thursday |
14h00 |
A02 |
MESH-Sequencer |
Privacy, k-anonymity |
||
December 13 |
51 |
Security of heterogenious and distributed systems |
Wednesday |
15h00 |
C02 |
Credit Suisse / LIASIT |
Security, Distributed Systems |
- |
|
December 11 |
50 |
Capacity of Mesh Networks II |
Monday |
15h00 |
C02 |
Mesh-Sequencer |
- |
- |
|
December 07 |
49 |
Joanna Smula |
Thursday |
16h00 |
C02 |
Guest |
Mathematical Modeling |
- |
|
December 04 |
49 |
Matthias Nickles |
Monday |
15h30 |
C02 |
ILLIAS |
- |
- |
|
November 2006 |
|||||||||
November 22 |
47 |
Character Estimation - Hidden Markov Models for Trust |
Wednesday |
15h30 |
C02 |
MESH-Sequencer |
Trust, Hidden-Markov-Model (HMM), Selfishness |
Models for Trust |
|
November 15 |
46 |
Wednesday |
15h00 |
C02 |
- |
- |
- |
||
November 13 |
46 |
Delay Tolerant Networks - A concept for next generation networking? |
Monday |
14h00 |
B02 |
LIASIT |
ad hoc networks, networking, challenged environments |
||
November 7 |
45 |
Repeating the Past (Or Not): Experimental and Empirical Methods in Computer Security |
Tuesday |
11h15 |
C02 |
INTRA |
Security, Intrusions |
- |
|
October 2006 |
|||||||||
October 23 |
43 |
Monday |
14h00 |
B02 |
ICC |
Embodied Conversational Agents, Interactive and multi-modal system, HCI |
- |
||
October 18 |
42 |
Dov Gabbay |
TBD |
Wednesday |
TBD |
TBD |
- |
||
October 11 |
41 |
David Makinson |
Wednesday |
15:00 |
C02 |
- |
|||
September 2006 |
|||||||||
September 27 |
24 |
Wednesday |
10h00 |
C02 |
Security, UML |
||||
June 2006 |
|||||||||
June 13 |
24 |
Performance of Wireless Mesh Networks |
Tuesday |
14h30 |
A02 |
Wireless Mesh Networks, Bandwidth, STDMA |
- |
||
May 2006 |
|||||||||
May 30 |
22 |
Digital Cities |
Tuesday |
14h30 |
as usual |
ICC and Cooperation with City of Luxembourg |
Digital Cities, Social Science, Waiting |
- |
|
May 18 |
20 |
Malware Reverse Engineering |
Tuesday |
17:30 |
C02 |
malware TFE - SES Astra - CSRRT |
Malware |
||
May 16 |
20 |
Towards a Threat Model for Mobile Ad-Hoc Networks |
Tuesday |
14:30 |
C02 |
Mesh-Sequencer |
threats, adversary, attacks |
||
April 2006 |
|||||||||
April 26 |
17 |
Dr. Christopher Wolf, Ecole Normale Superieure, Paris, France |
An Introduction to Public Key Systems using Multivariate Quadratic Polynomials |
Wed |
5:30pm |
B02 |
GI. e.V. & LIASIT |
Cryptography |
|
March 2006 |
|||||||||
March 28 |
14 |
Joris Hulstijn, Vrije Universiteit Amsterdam |
Thu |
2:30pm |
A02 |
Trust, eCommerce, Escrow Service |
|||
March 23 |
13 |
Wolfgang Giere |
Pilvergiftungen und Computerdiagnostiks |
Thu |
5:30pm |
B02 |
Invited talk by UL, GI e.V., ALFORMEC |
JW Goethe FfM: Medical Computer Science |
|
March 7 |
11 |
Bjoern Koester |
Applied FCA: Holistic data exploration with Web Search Engines |
Tue |
2:30pm |
A02 |
TU Darmstadt: Abstract Algebra / Computer Science |
Abstract Algebra, Formal Concepts, Applications |
|
February 2006 |
|||||||||
February 21 |
8 |
Overview of formal methods (deductive and algorithmic verification) |
Tue |
2:30pm |
C14 |
||||
Februar 14 |
7 |
Some Conclusions About a Good Strategy to Model Trust |
Tue |
2:30pm |
C14 |
||||
January 2006 |
|||||||||
January 24 |
4 |
ADAM - where to go |
Tue |
2:30pm |
C14 |
Information Retrieval, Information Integration |
Talk about his PhD |
||
January 10 |
2 |
Mrs. Katja Luther, TU Berlin |
An Agent-based Artificial Immune System for Intrusion Detection |
Tue |
2:30pm |
C14 |
, INTRA, organized by |
Artificial Immune Systems |
Talk about her Diploma Thesis (DIA Group, TU Berlin; supervision of Verena Hafner) |
URL: https://wwwfr.uni.lu/recherche/fstm/communicative_systems_laboratory_com_sys/news_events/internal_seminar_series/2006 | Date: vendredi 03 février 2023 17:35:24 |