Alle Vorträge werden Online unter Benutzung des BBB Tools gehalten. Die BBB Session wird durch einen Betreuer vorbereitet und die Session Daten werden vorher per Email bekannt gegeben. Ich möchte darum bitten, dass alle am Seminar beteiligten Studierenden an den Vortragstermine Online teilnehmen.
28.07.2020 14:00 Uhr: Researching on open-source tools for building an edge-cloud computing system
During last years, serverless Computing has been gaining traction in cloud-based application architectures where currently most of cloud service providers already offer Function as a Service (FaaS) platforms. The emerging trend on Edge Computing is also benefiting from the Serverless concept and different open-source platforms haven already been proposed to work out of the cloud. The objective of this seminar is to survey the current most used Serverless frameworks such as OpenFaaS, Kubeless, Fission or OpenWhisk, and make a comparison between them in terms of usability, stability, underlying technology, compatibility, etc.
18.08.2020 14:00 Uhr: Federated AI
Federated Artificial Intelligence (AI) is a new paradigm in the area of AI. It was introduced recently to make it possible for AI algorithms to gain experience from a vast range of data located at different sites. Federated AI brings flexibility to organisations to collaborate together by building AI models without the need to share private data. The main task for the student is to survey the architecture of Federated AI and its applications.
18.08.2020 15:00 Uhr: HTTP/3
HTTP/3 is the third version of the HTTP, previously known as HTTP-over-QUIC (Quick UDP Internet Connections), initially developed by Google. Study reference implementations and performance studies in order to implement and analyse the current version of HTTP/3 in its draft format. The main task for the student is the analysis of HTTP/3 protocol.
18.08.2020 16:00 Uhr: Machine Learning for Detection of Security Threats
In communication networks, the defense mechanisms against security attacks are usually based on cryptographic protocols. However, network infrastructure and web applications used to share the resources through the Internet often contain misconfigurations or bugs that enable different security threats. The student is expected to give an overview of Machine Learning applications, which can help to automatically find and fix the vulnerabilities of network infrastructure, protocols and web applications as well as recognize and handle security threats.