Service-centric Networking

Final Theses

Topic areas

The Service-centric Networking group offers bachelor and master theses in five different subject areas:

  • Blockchain Technology
  • Cloud Computing
  • Data Science
  • Ubiquitous Computing
  • Social Computing

Please note!

If you are interested in a subject area, please contact our team assistants Andrea Hahn or Sandra Wild (info@snet.tu-berlin.de) and attach your CV, an grades overview and include some basic background information such as your degree program, main areas of study, and most importantly: two or three sentences about what general topic/ direction you would be interested. Our team assistants will put you in touch with matching SNET group members (topic coordinators) which you can then meet in order to discuss open topics in detail.

Supervised Thesis

2023

NameFirst NameBachelor - MasterarbeitTitleSupervisor
FuJianengMASecure messaging agent for 5G Core communicationHai Dinh Tuan
FuhrmannOliverBAPersistence Layer for a Cloud Application on the Example of PROCEEDKai Grunert
GharibnejadErfanBASecuring V2X communication and providing authenticity with DIDs and VCsArtur Philipp
HeitkampKristinaBAOn-device Modification of Mobile Application Security ConfigurationsTom Cory
HuynhThu-MyMADesign and Implementation of an Interactive Visualization Tool to Increase Transparency of Web TrackingPhilip Raschke
JeongSoo MinMAMatching Online and Offline Users for Hybrid Evaluation of Recommender AlgorithmsTobias Eichinger
KahlertAlwinBAEnabling Trusted Identifiers for Internet of ThingsAljoscha Schulte
KelbelVincentMAIntegration of SSI into the Blade IDM to Enable DIDComm-based Communication in BladeSebastian Göndör
Kengne TeneArmand BorelBAIntegration of Optimization Algorithms for Time Management of Course Preparations in Higher EducationPatrick Herbke
LöscheSimon LucaBATime-series Analysis of Android HTTP TrafficTom Cory
MlaouhiAlaaBAComparison of state management solutions for serverless computingMaria Mora Martinez
Orjuela PicoBrayan StevenMADecentralized Revocation of Verifiable CredentialsPatrick Herbke
PevznerSarah MorielBADIDComm as Communication Protocol for Self-hosted Decentralized Service FederationsSebastian Göndör
PfochLinusMADerivation of BPMN-based process models from SAP-based product structure dataKai Grunert
ReichMoritzMAA Plugin System for a Software as a Service Application based on the Example of PROCEEDKai Grunert
RiederWolfMADIDComm as Communication Protocol for Self-hosted Decentralized Service FederationsPhilip Raschke
RügerTomMARealizing Polyglot Software Modules in Decentralized and Extensible Service ArchitecturesSebastian Göndör
SchmolenskiNiklasBADetecting latent confounders in purely observational dataBoris Lorbeer
SharmaAnkushMALocation-aware Serverless Function Placement Approach in an Edge EnvironmentMaria Mora Martinez
ShawarbaNaseemBALocation-aware Serverless Function Placement Approach in an Edge EnvironmentTobias Eichinger
SixFlorianBAAdaptive Service Placement based on application level informationHai Dinh Tuan
WestlinningSteffenMAOptimizing Cold Start Latency in Serverless using Function DiscoverySanjeet Raj Pandey
WilhelmMai Khanh IsabelleMACreation of a Middleware for Multi-Vendor Communication with Mobile RobotsKai Grunert
WittigLuisaBAPerformance Analysis of Process Diagrams within the PROCEED Business Process Management SystemKai Grunert
ZountsasGeorgiosBAA platform for automated summaries generation for medical articlesAikaterini Katsarou

2022

NameFirst NameBachelor - Master ThesisTitleSupervisor
AbdelkhalekYousefMAIncorporating OCSP Stapling in EDHOC for Certificate Revocation in Resource Constrained EnvironmentsAljoscha Schulte
AkimovGrigoriMADetecting Liquidity Draining “Rug-Pull” Patterns in CPMM Cryptocurrency ExchangesFriedhelm Victor
AlissaFadelBACross-Browser Comparison of Web Tracker Activity Using T.EXPhilip Raschke
BarkemeyerDavidBAImplementing an NDNCERT Challenge based on Verifiable CredentialsAljoscha Schulte
BarmanKaustabhMAManaging Higher Education Certificates using Self-Sovereign Identity ParadigmPatrick Herbke
BaumannFlorianBAA Coarse Location-Service for Collaborating with Approximately Nearest NeighborsTobias Eichinger
ChadaWepanMAUnderstanding Adherence to Ecological Momentary Assessments in the Example of the TYDR AppAikaterini Katsarou
ColakCihadBAML-based Tracker Detection in Android ApplicationsTom Cory
DhakalUttamMAAbstractive text summarization of scientific articles from Bio - medical domainAikaterini Katsarou
DungsImkeBACreation of BPMN Processes with a Smart Voice AssistantKai Grunert
DoussNabilMAMulti-domain Sentiment Analysis with an Active learning MechanismAikaterini Katsarou
FrechBeritMAMOBIDID - Decentralized Mobile Messaging using DIDCommHakan Yildiz
GeorgeLukasBASTARK-based Chain RelaysMartin Westerkamp
HibatullahRayhan NaufalBAState management in 5G using Akka ServerlessMaria Mora Martinez
HofmannPascalBAAnalysis and Implementation of Secure Key Management in Mobile Wallet ApplicationsSebastian Göndör
HrusticAmiraBAAnalysing Web Tracking in Mobile Android HTTP TrafficTom Cory
Isaias Sanchez FigueroaAdrianBAIntegrating DIDComm Messaging in ActivityPub-based Social NetworksSebastian Göndör
JieAnnaMAAn Intelligent Decision Support System for Test Optimization PurposesAikaterini Katsarou
Joderi-ShoferiJanisBAAdaptive Processes in a decentralized Business Process Management SystemKai Grunert
KalzAndreaMASynergies between Verifiable Credentials and Information-Centric networks on the example of the Named Data Networking ProjectAljoscha Schulte
KellerLauraBAAnalysing the Effect of Android Permissions on Mobile TrackingTom Cory
KrauseJonasBAGraph Analysis of Revocation Registries in Hyperledger IndyPatrick Herbke
KmitAnastasiyaBAMachine Learning-supported Analysis of Mobile Application TrafficTom Cory
KsollMaximilianMAChallenges of implementing microservices as serverless functionsMaria Mora Martinez
KutalVolkanBAMobile Traffic Data Visualization for Web Tracker DetectionTom Cory, Philip Raschke
LamichaneAnantaMAA Hybrid Evaluation Scheme for Making Qualitative Feedback Available to Recommender Systems ResearchersTobias Eichinger
LiuLimingMACoordinated Resolution of Compute Request in the Compute-centric NetworksHai Dinh Tuan
LöscheJonasBATime-series Analysis of Android HTTP TrafficTom Cory
LukyanovichNastassiaBAVisualising Mobile Web Traffic Characteristics with an Interactive DashboardTom Cory
MatiniShirkouhMACryptocurrency volatility prediction using sentiment analysis from social mediaAikaterini Katsarou
MohsenMustafa IsmailBAComparative study of causal discovery methodsBoris Lorbeer
NawazHafiz UmarMAState persistance evaluation for the stateful serverless platformsMaria Mora Martinez
OdorferRolandMADecentralized Identity Management and its Application in Future Cellular NetworksSandro Rodriguez Garzon
OppermannLauraMAConcept and Design of an Efficient Search and Discovery Mechanism for Decentralized Ledger-based MarketplacesSebastian Göndör
RauJonathanMADistributed Ledgers as Shared Audit Trails for Carbon RemovalMarcel Müller, Robin Clemens
RhimiRadhouaneBAPlatform for crowdsourcing hate speechAikaterini Katsarou
RucajDenisaMAFeature-based Extractive Multi-document SummarisationBianca Lüders, Aikaterini Katsarou
SaadiJubaMADecentralized Scoring for Adjusting Publication Reach on Online Social NetworksSebastian Göndör
SchulenbergEmiliaBADesign and Implementation of a Cloud Wallet for Self-hosted Decentralized ServicesSebastian Göndör
SchwerdtnerHenryBAIdentifying Structural Web Tracker Characteristics With Real-Time Graph AnalysisPhilip Raschke
SivirinaAnastasiiaMAEnabling Verifiable Credentials Interoperability with the Enhancement of the ACAPY FrameworkHakan Yildiz
SkodzikMelanieMAAnalyzing Market Manipulation on Automated Market Maker based Decentralized Cryptocurrency ExchangesFriedhelm Victor
SongYong HuynBAA Comparison of Web Tracking and its Mobile CounterpartTom Cory
TsaplinaOlesiaBADatenschutz in dezentralen sozialen Netzwerkplattformen: Entwicklung von einem Dashboard zum verteilten DatenschutzmanagementPhilip Raschek, Sebastian Göndör
UrbanTobiasBAAnalyse der Evolution von Featuresets sozialer NetzwerkplattformenSebastian Göndör
WangMingzhiMAMATSim-based Data Diffusion Models for Dissemination-based Collaborative FilteringTobias Eichinger

2021

NameFirst NameBachelor - Master ThesisTitleSupervisor
AkimovGrigoriMADetecting Liquidity Draining “Rug-Pull” Patterns in CPMM Cryptocurrency ExchangesFriedhelm Victor
EbermannMarcelBAOn the Accuracy of Block Timestamp-based Time-sensitive Smart Contracts on Private Permissioned Ethereum BlockchainsTobias Eichinger
FanYuanzhangMAOptimizing content dissemination in federated online social networksSebastian Göndör
HerbkePatrickMADetection of Web Tracker Characteristics with Graph Analysis MethodsPhilp Raschke
HertwigKevinBADevelopment of an Identity and Access Management for a decentralized Business Process Management SystemKai Grunert
HrusticAmiraBAAnalysing Web Tracking in Mobile Android HTTP TrafficThomas Cory
JeneyRoxanaMAMulti-Domain Sentiment Classification using an LSTM-based Framework with Attention MechanismAikaterini Katsarou
KutalVolkanBAMobile Traffic Data Visualization for Web Tracker DetectionTom Cory, Philip Raschke
LangCarolin SophieBAMapping Company Information to Web Domains for Enhanced User TransparencyPhilip Raschke
LiZiyangBABest Practices for using JavaScript on Resource-Constrained Microcontrollers -> geändert: Memory Consumption Analysis for JavaScript Engines on MicrocontrollersKai Grunert
MohamedGehad Gamal Salem AwadBAIntercepting and Monitoring TLS Traffic in Mobile ApplicationsThomas Cory
NawazHafiz UmarMAState persistance evaluation for the stateful serverless platformsMaria Mora - Martinez
PandeySanjeet RajMASmart function placement for serverless applicationsMaria Mora - Martinez
PelzKonstantinBAA Context-aware Mobile App to Compute Location- and Air Pollution-based Emission Compensations for Car RidesSandro Rodriguez Garzon
PeppasDimitriosBADesign and Implementation of a Mobile Sensing App for Experience SamplingFelix Beierle
RiederWolf SiegfriedBAOn The Usefulness of HTTP Responses to Identify Differences Between Non- And Web TrackersPhilip Raschke
RucajDenisaMAFeature-based Extractive Multi-document SummarisationBianca Lüders, Katerina Katsarou
RyuYoungrakMAData storage in DHTs: A Framework for storing larger data in KademliaMartin Westerkamp, Dirk Thatmann
SarderUmaMADesign and Implementation of Control Flow and Permission Management for Polyglot Distributed Service Modules in the Blade EcosystemSebastian Göndör
SchneiderMaximilianBAA Web Service to Enable the Computation of Dynamic Air Pollution-aware Road User Charges on Mobile DevicesSandro Rodriguez Garzon
StumpfJulienBAUsing Ad Blocking Filter Lists for Automated Labeling of Web Tracker TrafficPhilip Raschke
Syed QasimHussainMABlockchain-based Trusted Execution Environments for Privacy-preserving Medical ResearchMarcel Müller
YangHuaningBAHow Representative Is Measured Network Traffic: Individual Browsing Behavior And Its Technical ManifestationPhilip Raschke

Graduate Seminar

The graduate seminar is a forum for scientific discussions. Students have the possibility to discuss their theses amongst fellow students, graduates and the professor of SNET. In the early phase of their work, their thesis approach is discussed, while at the end the results are presented. Students who are currently working on their thesis at our chair are required to attend each of the meetings, especially if other related topics are being presented. We are also looking forward to welcoming other students who are interested in the seminar or are about to write a thesis at our chair.

Additional Information

Students who decide to write a thesis at our chair are required to talk about their topic and the approach they are going to follow in an initial presentation in the early phase of their thesis time. This presentation should take 10 minutes with 5 minutes of questions and answers afterwards.
After finishing their thesis, students have to defend it by giving a talk, in which they demonstrate the results achieved in the thesis. Bachelor students should talk 15 minutes with 5 minutes of questions and answers, whereas Master students are required to present 20 minutes and discuss it afterwards for 10 minutes.

2023

November 1, 2023

TitlePresentationStudentsTimeSupervisor
Securing V2X communication and providing authenticity with DIDs and VCsBachelor DefenseErfan Gharibnejad14.15Artur Philipp
Optimizing Cold Start Latency in Serverless using Function DiscoveryMaster DefenseSteffen Westlinning14.45Sanjeet Raj Pandey
DIDComm over QUIC and HTTP/3: An EvaluationBachelor InitialHong Ming Guo15.25Sanjeet Raj Pandey
Derivation of BPMN-based process models from SAP-based product structure dataMaster DefenseLinus Pfoch15.45Kai Grunert
Increasing Transparency Through Automated Web Tracking DetectionBachelor InitialThu My Huyn16.25Philip Raschke
A QUIC look at mobile privacyMaster InitialDaria Seita16.45Tom Cory

October 4, 2023

TitlePresentationStudentsTimeSupervisor
Detecting latent confounders in purely observational dataBachelor DefenseNiklas Schmolenski14.15Boris Lorbeer
Authentication with DIDs and VCs in mTLSMaster InitialDennis Natusch14.45Sandro Rodriguez Garzon
Forensic Checkpointing for Microservice PortabilityMaster InitialJialun Jiang15.05Hai Dinh Tuan
Separated Company Environment in Cloud Applications on the example of PROCEEDBachelor InitialFelipe Trost15.25Kai Grunert
Realizing Polyglot Software Modules in Decentralized and Extensible ServiceMaster DefenseTom Rüger15.45Sanjeet Raj Pandey

September 6, 2023

TitlePresentationStudentsTimeSupervisor
A sensor and Wi-Fi based approach for indoor localization on smartphonesBachelor InitialAdam Knothe14.15Christian René Sechting
Development of an interactive digital campus map with navigation functionality for mobile devicesBachelor InitialPatrick Zdanowski14.35Christian René Sechting
Real-time Web Tracker DetectionMaster DefenseHenry Schwerdtner14.55Philip Raschke
Monolithic to Serverless TransformationMaster InitialJonathan Eichenhofer15.35Sanjeet Raj Pandey
Calculating of Process PropertiesBachelor DefenseLuisa Wittig15:55Kai Grunert
Extending iFogSim2 for ServerlessMaster InitalDimitrios Peppas16.25Hai Ding Tuan

August 2, 2023

TitlePresentationStudentsTimeSupervisor
Adaptive services placement based on application-level informationBachelor DefenseFlorian Six14.15Hai Dinh Tuan
Privacy-Preserving Telemetry for HeimdallBachelor InitialAlex Leonkov14.45Tom Cory
Leveraging DIDComm V2 for Enhanced Off-chain Applications UtilizationMaster InitialTanzira Ulfat Mohana15.05Patrick Herbke
Location-aware Serverless Function Placement Approach in an Edge EnvironmentMaster DefenseAnkush Sharma15.25Maria Mora Martinez

July 5, 2023

TitlePresentationStudentsTimeSupervisor
Extending iFogSim2 for ServerlessMaster InitialDimitrios Peppas14.15Hai Dinh Tuan
A Deep Learning and NLP-Based Approach for Trace Forecasting in Predictive Process MiningBachelor InitialMaximilian Oliver Fisch14.35Patrick Herbke
Forensic Checkpointing for microservice portabilityMaster InitialJialun Jiang14.55Hai Dinh Tuan
Privacy Policies vs RealityBachelor InitialAnna Ruban15.15Tom Cory

June 7, 2023

TitlePresentationStudentsTimeSupervisor
Secure Web of Things Discovery with DIDs and VCsBachelor InitialKevin Hai Nam Pham14:15Artur Philipp
Creation of a middleware for multi-vendor communication with mobile robotsMaster DefenseIsabelle Wilhelm14:35Kai Grunert
On-device Mobile Application Traffic Monitoring on iOSMaster InitialBenjamin Appendino15:15Tom Cory
Verifiable Credentials for Network Access ControlMaster InitialNick Stender15:35Artur Philipp
Policy Development for Kademlia-based Revocation of Verifiable CredentialsBachelor InitialPhilip Brozicevic15:55Patrick Herbke
DIDComm v2 client for 5G Core networksMaster DefenseJianeng Fu16:15Hai Dinh Tuan

May 3, 2023

TitlePresentationStudentsTimeSupervisor
Plugin Architecture on the Example of PROCEEDMaster InitialMoritz Reich14.15Kai Grunert
SSI Profile: Using SSI for W3C Web of Things (WoT) Thing Description authenticityBachelor InitialJean-Pascal Sindermann14.35Artur Philipp
A platform for automated summaries generation for medical articlesBachelor DefenseGeorgios Zountsas14.55Aikaterini Katsarou
Leveraging NDN trust in IoTBachelor InitialAlwin Kahlert15.35Aljoscha Schulte
DIDComm v2 client for 5G Core networksMaster DefenseJianeng Fu15.55Hai Dinh Tuan
Securing V2X communication and providing authenticity with DIDs and VCsBachelor InitialErfan Gharibnejad16.35Artur Philipp

April 5, 2023

TitlePresentationStudentsTimeSupervisor
Blade as DIDComm MediatorBachelor DefenseMoriel Pevzner14.15Sebastian Göndör
DIDComm SSI VDRMaster DefenseVincent Kelbel14.45Sebastian Göndör
Evaluation and Implementation of a Persistence Layer for a Cloud ApplicationBachelor InitialOliver Fuhrmann15.25Kai Grunert
Dynamic AGV Allocation in PROCEEDMaster DefenseIsabelle Wilhelm15.45Kai Grunert
Detecting latent confounders in purely observational dataBachelor InitialNiklas Schmolenski16.25Boris Lorbeere
Evaluation of the functionality of an open source 5G core deployed using serverless computingMaster InitialPaula Lopez Medina16.45Hai Dinh Tuan, Maria Mora Martinez

March 1, 2023

TitlePresentationStudentsTimeSupervisor
Graph Analysis of Revocation Registries in Hyperledger IndyBachelor DefenseJonas Krause14.15Patrick Herbke
Cold-Starts reduction using Serverless Application DiscoveryMaster InitialSteffen Westlinning14.45Sanjeet Raj Pandey
Matching Online and Offline Users for Hybrid Evaluation of Recommender AlgorithmsMaster DefenseSoo Min Jeong15.05Tobias Eichinger
On-device Modification of Mobile Application Security ConfigurationsBachelor DefenseKristina Heitkamp15.45Tom Cory
Developing a Laboratory for Analysing Trust Mechanisms in Decentralized NetworksMaster InitialBrayan Steven Orjuela Pico16.15Patrick Herbke

February 1, 2023

TitlePresentationStudentsTimeSupervisor
Challenges of implementing microservices as serverless functionsMaster DefenseMaximilian Ksoll14.15Maria Mora Martinez
Comparison of state management solutions for serverless computingBachelor DefenseAlaa Mlaouhii14.50Maria Mora Martinez
Multi-faceted on-device Analysis of Android AppsBachelor Initial 15.10Tom Cory
Time-series Analysis of Android HTTP TrafficBachelor DefenseSimon Lösche15.35Tom Cory

January 4, 2023

TitlePresentationStudentsTimeSupervisor
Increasing Transparency Through Automated Web Tracking DetectionBachelor InitialThu My Huyn14.15Philip Raschke
Polyglott Blade ModulesMaster InitialTom Rüger14.50Sebastian Göndör
Incorporating OCSP Stapling in EDHOC for Certificate Revocation in Resource Constrained EnvironmentsMaster DefenseYousef Abdelkhalek15.25Aljoscha Schulte
IP - Enabling SSI Interoperability with Aries DIDComm v2 ImplementationMaster InitialJudith Högerl16.05Hakan Yildiz
Platform for crowdsourcing hate speechBachelor DefenseRadhouane Rhimi16.40Katerina Katsarou
Managing Higher Education Certificates using Self-Sovereign Identity ParadigmMaster DefenseKaustabh Barman17.20Patrick Herbke

2022

December 7, 2022

TitlePresentationStudentsTimeSupervisor
Machine-learning Supported Analysis of Mobile Application TrafficBachelor DefenseAnastasiya Kmit14.15Tom Cory
Calculating process propertiesBachelor InitialLuisa Wittig14.55Kai Grunert
Decentralized resource management in Kubernetes (Title TBA)Bachelor InitialFlorian Six15.30Hai Dinh Tuan
Serverless function placement based on distance to the userMaster InitialAnkush Sharma16.05Maria Mora Martinez
Analysing the Effect of Android Permissions on Mobile TrackingBachelor DefenseLaura Keller16.40Tom Cory
A Policy Editor for the JSON-Serialization of Privacy Policies Written in Natural LanguageBachelor InitialNaseem Shawarba17.20Tobias Eichinger
Web-based Time Optimization for LecturerBachelor InitialArmand Borel Kengne Tene17.55Patrick Herbke

November 2, 2022

TitlePresentationStudentsTimeSupervisor
Distributed Ledgers as Shared Audit Trails for Carbon RemovalMaster DefenseJonathan Rau Marcel Müller
A comparative study of causal discovery methodsBachelor DefenseMustafa Ismail Mohsen Boris Lorbeer
ML-based Tracker Detection in Android ApplicationsBachelor DefenseCihad Colak Tom Cory
Visualising Mobile Web Traffic Characteristics with an Interactive DashboardBachelor DefenseNastassia Lukyanovich Tom Cory
A Policy Editor for the Formalization of Privacy Policies Written in Natural LanguageBachelor InitialNaseem Shawarba Tobias Eichinger
A platform for automated summaries generation for medical articlesBachelor InitialGeorgios Zountsas Katerina Katsarou

September 28, 2022

TitlePresentationStudentsTimeSupervisor
Synergies between Verifiable Credentials and Information-Centric networks on the example of the Named Data Networking ProjectMaster InitialAndreas Kalz14.15Aljoscha Schulte
A Hybrid Evaluation Scheme for Making Qualitative Feedback Available to Recommender Systems ResearchersMaster DefenseAnanta Lamichhane14.45Tobias Eichinger
STARK-based Chain RelaysBachelor DefenseLukas Lee George15.15Martin Westerkamp
Enabling Verifiable Credentials Interoperability with the Enhancement of the ACAPY FrameworkMaster InitialAnastasiia Sivirina15.45Hakan Yildiz
State management in 5G using Akka ServerlessBachelor DefenseRayhan Naufal Hibatullah16.15Maria Mora Martinez

September 7, 2022

TitlePresentationStudentsTimeSupervisor
Implementing a NDNCERT Challenge based on Verifiable CredentialsBachelor DefenseDavid Barkemeyer14.15Aljoscha Schulte
SSI ActivityPub for MastodonBachelor DefenseAdrian Isaias Sanchez14.45Sebastian Göndör
P2P Communication between End Users wtih DIDcomm MessagingMaster InitialBerit Frech15.15Hakan Yildiz
Blade as DIDComm MediatorBachelor InitialMoriel Pevzner15.45Sebastian Göndör
DIDComm MicrobloggingMaster InitialVincent Kelbel16.15Sebastian Göndör
DIDComm v2 client for 5G Core networksMaster InitialJianeng Fu16.45Hai Dinh Tuan

August 3, 2022

TitelPräsentationStudierendeUhrzeitBetreuer
A Framework for the Implementation of a SSI-based Energy Management System for the Charging of Electric VehiclesMaster InitialRigerta Tola14.15Patrick Herbke
Adaptive Processes in a decentralized Business Process Management SystemBachlelor DefenseJanis Joderishoferi14.45Kai Grunert
A MATSim-based Data Diffusion Model for Dissemination-based Collaborative FilteringMaster DefenseMingzhi Wang15.15Tobias Eichinger
A Comparison of Web Tracking and its Mobile CounterpartBachlelor DefenseYong Hyun Song15.45Tom Cory
DIDComm v2 client for 5G Core networksMaster InitialJianeng Fu16.15Hai Dinh Tuan
Cryptocurrency volatility prediction using sentiment analysis from social mediaMaster InitialShirkouh Matini16.45Katerina Katsarou

July 6, 2022

TitlePresentationStudentsTimeSupervisor
Concept and Design of an Efficient Search and Discovery Mechanism for Decentralized Ledger-based MarketplacesMaster DefenseLaura Oppermann14.15Sebastian Göndör
Comparison of state management solutions for serverless computingBachelor InitialAlaa Mlaouhi14.45Maria Mora Martinez
Multi-domain Sentiment Analysis with an Active learning MechanismMaster DefenseNabil Douss15.15Aikaterini Katsarou
On-device Modification of Mobile Application Security PoliciesBachelor InitialKristina Heitkamp15.45Tom Cory

June 22, 2022

TitlePresentationStudentsTimeSupervisor
A Matchmaking Service for Hybrid Evaluation of Recommender AlgorithmsMaster InitialSoo Min Jeong14.15Tobias Eichinger
Understanding IoT blockchainsMaster InitialJile Sorout14.45Friedhelm Victor, René Sechting
HTTP/S Response Classifier v2.0Master InitialWolf Rieder15.15Philip Raschke
Platform for crowdsourcing hate speechBachelor InitialRadhwen Rhimi15.45Aikaterini Katsarou

June 1, 2022

TitlePresentationStudentsTimeSupervisor
Graph analysis of Revocation Registries in Hyperledger IndyBachelor InitialJonas Krause14.15Patrick Herbke
Analysis and Implementation of Secure Key Management in Mobile Wallet ApplicationsBachelor DefensePascal Hoffmann14.45Sebastian Göndör
Decentralized Identity Management and its Application in Future Cellular NetworksMaster DefenseRoland Odorfer15.15Sandro Rodriguez Garzon
A Coarse Location-Service for Collaborating with Approximately Nearest NeighborsBachelor InitialFlorian Baumann15.45Tobias Eichinger
Implementation of an SSI-based Process for German Federal ElectionBachelor InitialFlorian Wehner16.15Patrick Herbke
Platform for Crowdsourcing Hate SpeechBachelor InitialRadhwen Rhimi16.45Aikaterini Katsarou

4. Mai 2022

TitlePresentationStudentsTimeSupervisor
Dynamic AGV Allocation in PROCEEDMaster InitialIsabelle Wilhelm14.15Kai Grunert
Managing Higher Education Certificates in a Self-Sovereign Identity EcosystemMaster InitialKaustabh Barman14.45Patrick Herbke
Platform for crowdsourcing hate speechBachelor InitialRadhwen Rhimi15.15Aikaterini Katsarou
Analysing the Effect of Android Permissions on Mobile TrackingBachelor InitialLaura Keller15.45Tom Cory
Enabling Verifiable Credentials Interoperability with the Enhancement of the ACAPY FrameworkMaster InitialAnastasiia Sivirina16.15Hakan Yildiz

April 6, 2022

TitlePresentationStudentsTimeSupervisor
Challenges of implementing microservices as serverless functionsMaster InitialMaximilian Ksoll14.15Maria Mora Martinez
Decentralized Scoring for Adjusting Publication Reach on Online Social NetworksMaster DefenseJuba Saadi14.45Sebastian Göndör
Blade as DIDComm MediatorBachelor InitialArian Variri15.15Sebastian Göndör
ML-based Tracker Detection in Android ApplicationsBachelor InitialCihad Colak15.45Tom Cory
Interconnection of SAP and dBPMSMaster InitialLinus Pfoch16.15Kai Grunert
Time-series Analysis of Android HTTP TrafficBachelor InitialSimon Lösche16.45Tom Cory

March 2, 2022

TitlePresentationStudentsTimeSupervisor
tbdMaster InitialJonathan Rau14.15Marcel Müller, Robin Klemens
Implementing a stateful serverless application on Akka ServerlessBachelor InitialRayhan Naufal Hibatullah14.45Maria Mora Martinez
Analyse der Evolution von Featuresets sozialer NetzwerkplattformenBachelor DefenseTobias Urban15.15Sebastian Göndör
Understanding Adherence to Ecological Momentary Assessments in the Example of the TYDR AppMaster DefenseWepan Chade15.45Katerina Katsarou, Felix Beierle
SSI ActivityPub for MastodonBachelor InitialAdrian Isaias Sanchez16.15Sebastian Göndör
Design and Implementation of a Cloud Wallet for Self-hosted Decentralized ServicesBachelor DefenseEmilia Schulenberg16.45Sebastian Göndör
Comparative study of causal discovery methodsBachelor InitialMustafa Mohsen17.15Boris Lorbeer

February 2, 2022

TitlePresentationStudentsTimeSupervisor
Decentralized Scoring for Adjusting Publication Reach on Online Social NetworksMaster DefenseJuba Saadi14.15Sebastian Göndör
Abstractive text summarization of scientific articles from the Biomedical domainMaster DefenseUttam Dhakal14.45Aikaterini Katsarou
Implementing a NDNCERT Challenge based on Verifiable CredentialsBachelor InitialDavid Barkemeyer15.15Aljoscha Schulte
Implementing Verifiable Credentials in ICN/NDNMaster InitialAndreas Kalz15.45Aljoscha Schulte
State Persistence Evaluation for Stateful Serverless PlatformsMaster DefenseUmar Nawaz16.15Maria Mora Martinez
Feature-based Multi-Document SummarisationMaster DefenseDenisa Rucaj16.45Bianca Lüders, Aikaterini Katsarou

January 26, 2022

TitlePresentationStudentsTimeSupervisor
Analyzing AMM Liquidity Draining EventsMaster DefenseGrigori Akimov14.15Friedhelm Victor
Fraud Detection on Automated Market Maker ExchangesMaster DefenseMelanie Skodzik14.45Friedhelm Victor
Runtime Process Adaption in PROCEEDBachelor InitialJanis Joderi Shoferi15.15Kai Grunert
Process Creation with a Voice AssistantBachelor DefenseImke Dungs15.45Kai Grunert
Identifying Structural Web Tracker Characteristics With Real-Time Graph AnalysisBachelor DefenseHenry Schwerdtner16.15Philip Raschke
An Intelligence Decision Support System for Test Optimization PurposesMaster DefenseJie Liu16.45Aikaterini Katsarou

January 5, 2022

TitlePresentationStudentsTimeSupervisor
Coordinated Resolution of Compute Request in the Compute-Centric NetworksMaster DefenseLiming Liu14.15Hai Dinh Tuan
STARK-based Chain RelaysBachelor InitialLukas Lee George14.45Martin Westerkamp
Cross-Browser Comparison of Web Tracker Activity Using T.EXBachelor InitialFadel Alissa15.45Philip Raschke
Datenschutz in dezentralen sozialen Netzwerkplattformen: Entwicklung von einem Dashboard zum verteilten DatenschutzmanagementBachelor DefenseOlesia Tsaplina16.15Sebastian Göndör, Philip Raschke

2021

December 1, 2021

TitlePresentationStudentsTimeSupervisor
STARK-based Chain RelaysBachelor InitialLukas Lee George14.15Martin Westerkamp
Cryptocurrency volatility prediction using sentiment analysis from social mediaMaster InitialShirkouh Matini14.45Aikaterini Katsarou
Multi-domain Sentiment Analysis with an Active learning MechanismMaster InitialNabil Douss15.15Aikaterini Katsarou
Cross-Browser Comparison of Web Tracker Activity Using T.EXBachelor InitialFadel Alissa15.45Philip Raschke
A Hybrid Evaluation Scheme for Making Qualitative Feedback Available to Recommender Systems ResearchersMaster InitialAnanta Lamichhane16.15Tobias Eichinger
A MATSim-based Data Diffusion Model for Dissemination-based Collaborative FilteringMaster InitialMingzhi Wang16.45Tobias Eichinger

FAQ

This section covers general topics and frequently asked questions about the organizational process of bachelor, master and diploma theses at our department. Please read this page carefully before contacting one of the supervisors so that you are well prepared when you express your interest and discuss the topics with the supervisors.

Workflow

The organizational workflow of a bachelor's, master's or diploma thesis at SNET is described below:

  1.  Please, contact the secretariat of the department. The secretariat will check possible options within the team.
  2. You will receive feedback from one of our team members or from the secretariat.
  3. As soon as the contact with a possible supervisor could be established, you discuss the desired topic with him. 
  4. You will have 2-4 weeks to consider and familiarize yourself with the topic.
  5. If you choose this topic, we expect you to write an outline of your thesis in these 2-4 weeks, which we will evaluate. This outline will help you and us clarify the work that needs to be done on your topic.
  6.  In the next graduate seminar, you will have to give a first presentation of your work: 10 minutes + 5 minutes question and answer. When you get the final OK from the professor, you can proceed to step 5.
  7. Register your topic with the Examination Office; from now on, attendance at the Graduate Seminar is mandatory (your email address will be added to a mailing list for invitations, please also check our website regularly).
  8. There may be several graduate seminars and meetings with your advisor while you are working.
  9. Submission of the dissertation; now attendance at the graduate seminar is not mandatory except for the dissertation defense. Bachelor's students give a 15 minute presentation + 5 minutes question and answer, while Master's students give 20 minutes + 10 minutes question and answer.
  10. After the defense, a thesis report with the grade will be sent to the examining authority.

Please note that it must be submitted at least 6 weeks before the end of the semester to ensure that you receive your grade in the same semester. Therefore, you must register your thesis with the Examination Office at least 4 months + 6 weeks for Bachelor's theses and 6 months + 6 weeks for Master's theses prior to submission.

Also when preparing a thesis, please observe the following instructions:

  • Please check the APO of Faculty IV, especially § 13 (Final Theses)
  • Please write your thesis in German (BA)/ English (BA/ MA)
  • For Bachelor's theses, you should write approx. 30-50 pages and for Master's theses approx. 50-90 pages
  • The abstract must be written twice, in German and English
  • Please use the LaTeX template of the chair
  • Do not copy text passages without quoting the author (plagiarism)