Nodes Research Methodologies
| Year | Semester | Date | Period | Language | In charge |
|---|---|---|---|---|---|
| 2013 | spring | 11.03-26.04. | 4-4 | English | Lea Kutvonen |
Lectures
| Time | Room | Lecturer | Date |
|---|---|---|---|
| Thu 10-12 | D122 | Lea Kutvonen | 11.03.2013-26.04.2013 |
Information for international students
Overview
The NODES research group coordinates the various research groups at the Department of Computer Science on the area of Networking and services. The NODES group interestes range from the effective organisation of Internet protocols and wireless communication to the new challenges of globally interoperating business services. The focus areas are networked systems and their enablers: interoperability (e.g., service and software platforms, interoperability management, contracting, trust management, privacy), mobility (technology and location independence, wireless computing), information networks, service networks, context awareness and ubiquitous computing. The group combines the departmental tradition of wireless and mobile computing to new research themes. The focus of the group has been extending for the last years from platform protocols to solving application layer challenges.
Schedule (subject to changes!)
-
Thu 14.3. 2013 Opening and overview
-
Lea Kutvonen: Opening
- Organisation of the course, method of passing the course
- Research process and categories of results and research methods
- Communication on research
-
NODES Research group introductions (area of study, research goals, research methods, highlights)
- Collaborative and Interoperable Computing (CINCO) (presented, slides)
- Collaborative Networking (CoNe) (to be presented, slides)
- Content-centric structures and networking (COSN) (presented, slides)
- Interactive Systems (presented, slides)
- Wireless Internet (WInt) (presented, slides)
- Secure Systems (presented, slides)
- Research assets: NODES Lab (presented, slides)
- This weeks exercise: find your favourite of the NODES research groups by studying their web pages. Use the google form here for submitting your responses. Exercise responses / cumulative learning diary entries are to be submitted each week separately, by the next meeting start time (as some solutions may be opened at the next session).
-
Lea Kutvonen: Opening
-
Thu 21.3. 2013
- We complete the overviews of the remaining research groups
- N. Asokan: Methodologies for designing secure systems
- Exercise of the week (learning diary entry, to be sent to Lea by email or through this weeks google form here) is expressed as a quiz on slide 24 in Asokan's slides above. Exercise responses / cumulative learning diary entries are to be submitted each week separately, by the next meeting start time (as some solutions may be opened at the next session).
-
Hint: El Gamal is not CCA-secure. Try to construct an adversary A who modifies c and c' to get a c'' in such a way that when he gets back its decryption m'' he can figure out if c was an encryption of m_0 or m_1
-
Thu 28.3. 2013 - Easter break
- .
-
Thu 4.4. 2013
- Toni Ruokolainen: Use of formal methods in distributed systems construction and analysis
- Teemu Kerola: Queuing networks
- Assignment for the cumulative learning diary entries:
- a) For what kind of research questions each of these techniques is applicable?
- b) What prequisite skills you need to obtain to successfully utilise these techniques? (e.g., parts of statistics ...)
- google form to appear hear soon
-
Thu 11.4. 2013
- Markku Kojo: Protocol performance measurements
- Laila Daniel, Petri Savolainen: Simulation
-
Thu 18.4. 2013
- Ilkka Kosunen, Giulio Jacucci: User and Interaction Research Methods (Ethnographic Field trials, qualitative and quantitative methods, Experiment Design in HCI)
- Liang: Emulation?
-
Thu 25.4. 2013 Discussion groups
- Process and tasks to be announced
Materials and links (under construction)
- S. Keshav. How to Read a Paper. ACM SIGCOMM Computer Communication Review. Volume 37, Number 3, July 2007. http://ccr.sigcomm.org/online/files/p83-keshavA.pdf
- William Strunk Jr. and E. B. White. The Elements of Style. Longman, 4th edition, 2000.
Simulation Studies
- K. Pawlikowski et al. On Credibility of Simulation Studies of Telecommunication Networks. IEEE Communications Magazine, January 2002. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=978060&tag=1
- I. Stojmenovic. Simulations in Wireless Sensor and Ad Hoc Networks: Matching and Advancing Models, Metrics, and Solutions. IEEE Communications Magazine. December 2008. http://www.site.uottawa.ca/~ivan/Simulations-CM.pdf
Wireless Experiments
- C. Tala et al. Guidelines for the accurate design of empirical studies in wireless networks. Tridentcom 2011. http://www-sop.inria.fr/members/Thierry.Turletti/tridentcom11.pdf
Secure systems
- Supplementary material for the lecture: Ivan Damgård, "A proof-reading" of some issues in Cryptography" http://www.daimi.au.dk/~ivan/positionpaper.pdf
- Pointers for further study - verification tools for security protocols:
- Critical view: Ralf Kneuper, Limits of Formal Methods. Formal aspects of computing (1997) 3:1-000.
Text book:
Rogers, Y., Sharp, H., & Preece, J. (2011). Interaction Design: Beyond Human Computer Interaction.
Queuing networks

