First read these project logistics. Next, check out the list of suggested projects and FFTP project description. You will need to get an MIT certificate to read these files. Please do not place a copy of the suggestions list anywhere else on the Web. Thanks!
The suggestions list mentions that one of the projects (fast file transfer) is outlined in more detail.
You might find the projects done in previous years useful. Also, check out the FAQ.
The following is the project presentation schedule for Fall 2003. All talks are in NE43-516.
10:20 |
Alp Simsek, Isaac Cambron, Rupesh Kanthan |
Inferring Router Behavior |
10:40 |
Shan Sinha, Srikanth Kandula |
HTTPGuard: Protecting Web Servers from Automated Content Request Floods |
11:00 |
Josh Baratz, Ryan, Jazayeri, Greg Dennis |
Inferring the Buffer Management Scheme of a Router |
11:20 |
Vladimir Bychkovsky, Sachin Katti |
Evaluation of repair request compression schmes for reliable
out-of-order delivery mechnism in sensor networks |
11:40 | Clifford Frey, James Roewe, Gerardo Viedma |
A User-level Congestion Manager Using Tesla |
12:00 - 1:00 |
BREAK |
|
1:00 |
Timothy Chan, Edward Faulkner, David Ziegler |
A System for Multi-Path File Transmission |
1:20 | Reina Riemann, Keith Winstein |
Can Forward Error Correction Improve TCP Performance? |
1:40 |
Tom Lasko, Tim Olsen, Chris Taylor |
A Fast File Transfer Protocol |
2:00 |
Brian Leung, Julia Zhang |
Active and Passive End-To-End Inference of Router Behavior |
2:20 |
Kristina Foster and Tazeen Mahtab |
Fundamental Properties for Behavior-based Detection of Email Viruses |
2:40 |
William Tetteh, Miguel Ferreira |
A Distributed Congestion Management Protocol for P2P Networks |
3:00 |
I-Ting Angelina Lee, Neha Singh, Winnie Cheng |
A new scheduling scheme for wireless ad hoc networks |
3:20 |
Charles O'Donnell, Vinod Vaikuntanathan |
Information Leak in Chord Networks by Passive Adversaries |
3:40 |
Abdallah Jabbour, Jim Psota, Alexey Radul |
A probabilistic routing protocol for mobile ad hoc networks |
10:00 |
Daniel Abadi, Vimal Bhalodia |
Performing Joins of Sensor Data With Static Tables in a
Sensor Network Under Space Constraints |
10:20 |
Mike Afergan, Evdokia Nikolova |
Pricing Mechanisms for Internet-like Routing |
10:40 |
Anuja Doshi, Megan Ginter, Jessica Huang |
MobileSync: Efficient Remote Data Synchronization for the Pocket PC |
11:00 |
Kathryn Chen, Loai Na'amani, Karim Yehia |
Chord Pointers |
11:20 |
Kaijen Hsiao, Othman Laraki, Alex Narvaez |
Distributed Time Division Multiplexing in Cricket Beacons |
11:40 |
Steven Gerding, Jeremy Stribling
|
Examining the Tradeoffs of Structured Overlays in a Dynamic Non-Transitive Network |
12:00 |
Michael Salib, Kelly Koskelin |
Controlling Network Congestion Caused by Peer to Peer Applications with
ACK Pacing |
12:20 |
Apostolos Fertis |
k-Core-Stateless Fair Queueing (k-CSFQ) : An Algorithm for Achieving Fair Bandwidth Allocation Using Constant Amount of Information for k Flows |