Nodes Research Methodologies

582701
2
Networking and Services
Advanced studies
Year Semester Date Period Language In charge
2013 spring 11.03-26.04. 4-4 English Lea Kutvonen

Lectures

Time Room Lecturer Date
Thu 10-12 D122 Lea Kutvonen 11.03.2013-26.04.2013

Information for international students

Overview

The NODES research group coordinates the various research groups at the Department of Computer Science on the area of Networking and services. The NODES group interestes range from the effective organisation of Internet protocols and wireless communication to the new challenges of globally interoperating business services. The focus areas are networked systems and their enablers: interoperability (e.g., service and software platforms, interoperability management, contracting, trust management, privacy), mobility (technology and location independence, wireless computing), information networks, service networks, context awareness and ubiquitous computing. The group combines the departmental tradition of wireless and mobile computing to new research themes. The focus of the group has been extending for the last years from platform protocols to solving application layer challenges.

The NODES group also coordinates the BSc, MSc and PhD level education on this area. At this front, the NODES group mission is to educate experts and strategic leaders  for the design and realisation of new,  global platforms or infrastructures for example in collaboration and interoperability, mobility,   information networks / service networks, and  context awareness.
 
The professional skills of graduating students from any university program include those of research methodologies in their selected topic area. Students who become researchers must be able to conduct their work according to accepted norms on their field, and potentially, also further develop these methodologies. Students who seek into positions in companies or governmental institutions, or create their own companies, must understand the quality of the research results they are applying in their work.
 
The common thing in scientific methods is the constant questioning of previous hypothesis and improvement of already reached solutions. Beyond that, the research methods differ in terms of the artefacts produced and the techniques applied in testing their qualities and adoptability. 
 
This course is structured as a series of independent talks from the principal investigators or their representatives from the NODES group member groups. Each talk will introduce a specific research methodology and exemplify how that specific group has applied the methodology in their research work. In addition to that, some classical texts about research methodologies with their strengths and weaknesses will be read, and as a concluding exercise, some group discussions on pontential research challenges and methodology selection are conducted.
 
 

 

Schedule (subject to changes!)

 
  • Thu 14.3. 2013 Opening and overview
  • Thu 21.3. 2013  
    • We complete the overviews of the remaining research groups​
    • N. Asokan: Methodologies for designing secure systems
    • Exercise of the week (learning diary entry, to be sent to Lea by email or through this weeks google form here) is expressed as a quiz on slide 24 in Asokan's slides above. Exercise responses / cumulative learning diary entries are to be submitted each week separately, by the next meeting start time (as some solutions may be opened at the next session). 
    • Hint: El Gamal is not CCA-secure.  Try to construct an adversary A who modifies c and c' to get a c'' in such a way that when he gets back  its decryption m'' he can figure out if c was an encryption of m_0 or m_1
  • Thu 28.3. 2013  - Easter break
    • .
  • Thu 4.4. 2013  
  • Thu 11.4. 2013
    • Markku Kojo: Protocol performance measurements
    • Laila Daniel, Petri Savolainen: Simulation
  • Thu 18.4. 2013 
    • Ilkka Kosunen, Giulio Jacucci: User and Interaction Research Methods (Ethnographic Field trials, qualitative and quantitative methods, Experiment Design in HCI)
    • Liang: Emulation?
  • Thu 25.4. 2013 Discussion groups
    • ​Process and tasks to be announced

 

 

Materials and links (under construction)

 
Reading, writing and presenting scientific results
 

 

Simulation Studies

Wireless Experiments

Secure systems

 
Formal methods
 
Basic intro
  • Critical view: Ralf Kneuper, Limits of Formal Methods. Formal aspects of computing (1997) 3:1-000.
User and Interaction Research Methods

Text book:

Rogers, Y., Sharp, H., & Preece, J. (2011). Interaction Design: Beyond Human Computer Interaction.

Queuing networks

litterature