Das Fachgebiet Service-centric Networking bietet Bachelor- und Masterarbeiten in fünf verschiedenen Themenbereichen an:
Bitte beachten Sie!
Wenn Sie sich für einen Themenbereich interessieren, wenden Sie sich bitte an unsere Teamassistentinnen Andrea Hahn oder Sandra Wild (info@snet.tu-berlin.de) und fügen Sie Ihren Lebenslauf, eine Notenübersicht und einige grundlegende Hintergrundinformationen bei, wie z.B. Ihren Studiengang, Ihre Studienschwerpunkte und ganz wichtig: zwei oder drei Sätze darüber, welches Thema Sie generell interessieren würde.
Name | Vorname | Bachelor - Masterarbeit | Titel der Arbeit | Betreuer |
Fu | Jianeng | MA | Secure messaging agent for 5G Core communication | Hai Dinh Tuan |
Fuhrmann | Oliver | BA | Persistence Layer for a Cloud Application on the Example of PROCEED | Kai Grunert |
Gharibnejad | Erfan | BA | Securing V2X communication and providing authenticity with DIDs and VCs | Artur Philipp |
Heitkamp | Kristina | BA | On-device Modification of Mobile Application Security Configurations | Tom Cory |
Huynh | Thu-My | MA | Design and Implementation of an Interactive Visualization Tool to Increase Transparency of Web Tracking | Philip Raschke |
Jeong | Soo Min | MA | Matching Online and Offline Users for Hybrid Evaluation of Recommender Algorithms | Tobias Eichinger |
Kahlert | Alwin | BA | Enabling Trusted Identifiers for Internet of Things | Aljoscha Schulte |
Kelbel | Vincent | MA | Integration of SSI into the Blade IDM to Enable DIDComm-based Communication in Blade | Sebastian Göndör |
Kengne Tene | Armand Borel | BA | Integration of Optimization Algorithms for Time Management of Course Preparations in Higher Education | Patrick Herbke |
Lösche | Simon Luca | BA | Time-series Analysis of Android HTTP Traffic | Tom Cory |
Mlaouhi | Alaa | BA | Comparison of state management solutions for serverless computing | Maria Mora Martinez |
Orjuela Pico | Brayan Steven | MA | Decentralized Revocation of Verifiable Credentials | Patrick Herbke |
Pfoch | Linus | MA | Derivation of BPMN-based process models from SAP-based product structure data | Kai Grunert |
Pevzner | Sarah Moriel | BA | DIDComm as Communication Protocol for Self-hosted Decentralized Service Federations | Sebastian Göndör |
Reich | Moritz | MA | A Plugin System for a Software as a Service Application based on the Example of PROCEED | Kai Grunert |
Rieder | Wolf | MA | DIDComm as Communication Protocol for Self-hosted Decentralized Service Federations | Philip Raschke |
Rüger | Tom | MA | Realizing Polyglot Software Modules in Decentralized and Extensible Service Architectures | Sebastian Göndör |
Schmolenski | Niklas | BA | Detecting latent confounders in purely observational data | Boris Lorbeer |
Sharma | Ankush | BA | Location-aware Serverless Function Placement Approach in an Edge Environment | Maria Mora Martinez |
Shawarba | Naseem | BA | A Policy Editor for the JSON-Serialization of Privacy Policies Written in Natural Language | Tobias Eichinger |
Six | Florian | BA | Adaptive Service Placement based on application level information | Hai Dinh Tuan |
Westlinning | Steffen | MA | Optimizing Cold Start Latency in Serverless using Function Discovery | Sanjeet Raj Pandey |
Wilhelm | Mai Khanh Isabelle | MA | Creation of a Middleware for Multi-Vendor Communication with Mobile Robots | Kai Grunert |
Wittig | Luisa | BA | Performance Analysis of Process Diagrams within the PROCEED Business Process Management System | Kai Grunert |
Zountsas | Georgios | BA | A platform for automated summaries generation for medical articles | Aikaterini Katsarou |
Name | Vorname | Bachelor - Masterarbeit | Titel der Arbeit | Betreuer |
Abdelkhalek | Yousef | MA | Incorporating OCSP Stapling in EDHOC for Certificate Revocation in Resource Constrained Environments | Aljoscha Schulte |
Akimov | Grigori | MA | Detecting Liquidity Draining “Rug-Pull” Patterns in CPMM Cryptocurrency Exchanges | Friedhelm Victor |
Alissa | Fadel | BA | Cross-Browser Comparison of Web Tracker Activity Using T.EX | Philip Raschke |
Baumann | Florian | BA | A Coarse Location-Service for Collaborating with Approximately Nearest Neighbors | Tobias Eichinger |
Barkemeyer | David | BA | Implementing an NDNCERT Challenge based on Verifiable Credentials | Aljoscha Schulte |
Barman | Kaustabh | MA | Managing Higher Education Certificates using Self-Sovereign Identity Paradigm | Patrick Herbke |
Chada | Wepan | MA | Understanding Adherence to Ecological Momentary Assessments in the Example of the TYDR App | Aikaterini Katsarou |
Colak | Cihad | BA | ML-based Tracker Detection in Android Applications | Tom Cory |
Dhakal | Uttam | MA | Abstractive text summarization of scientific articles from Bio - medical domain | Aikaterini Katsarou |
Dungs | Imke | BA | Creation of BPMN Processes with a Smart Voice Assistant | Kai Grunert |
Douss | Nabil | MA | Multi-domain Sentiment Analysis with an Active learning Mechanism | Aikaterini Katsarou |
Frech | Berit | MA | MOBIDID - Decentralized Mobile Messaging using DIDComm | Hakan Yildiz |
George | Lukas | BA | STARK-based Chain Relays | Martin Westerkamp |
Hibatullah | Rayhan Naufal | BA | State management in 5G using Akka Serverless | Maria Mora Martinez |
Hofmann | Pascal | BA | Analysis and Implementation of Secure Key Management in Mobile Wallet Applications | Sebastian Göndör |
Hrustic | Amira | BA | Analysing Web Tracking in Mobile Android HTTP Traffic | Tom Cory |
Isaias Sanchez Figueroa | Adrian | BA | Integrating DIDComm Messaging in ActivityPub-based Social Networks | Sebastian Göndör |
Jie | Anna | MA | An Intelligent Decision Support System for Test Optimization Purposes | Aikaterini Katsarou |
Joderi-Shoferi | Janis | BA | Adaptive Processes in a decentralized Business Process Management System | Kai Grunert |
Kalz | Andrea | MA | Synergies between Verifiable Credentials and Information-Centric networks on the example of the Named Data Networking Project | Aljoscha Schulte |
Keller | Laura | BA | Analysing the Effect of Android Permissions on Mobile Tracking | Tom Cory |
Kmit | Anastasia | BA | Machine Learning-supported Analysis of Mobile Application Traffic | Tom Cory |
Krause | Jonas | BA | Managing Higher Education Certificates using Self-Sovereign Identity Paradigm | Patrick Herbke |
Ksoll | Maximilian | MA | Challenges of implementing microservices as serverless functions | Maria Mora Martinez |
Kutal | Volkan | BA | Mobile Traffic Data Visualization for Web Tracker Detection | Tom Cory, Philip Raschke |
Lamichane | Ananta | MA | A Hybrid Evaluation Scheme for Making Qualitative Feedback Available to Recommender Systems Researchers | Tobias Eichinger |
Liu | Liming | MA | Coordinated Resolution of Compute Request in the Compute-centric Networks | Hai Dinh Tuan |
Lösche | Simon | BA | Time-series Analysis of Android HTTP Traffic | Tom Cory |
Lukyanovich | Nastassia | BA | Visualising Mobile Web Traffic Characteristics with an Interactive Dashboard | Tom Cory |
Matini | Shirkouh | MA | Cryptocurrency volatility prediction using sentiment analysis from social media | Aikaterini Katsarou |
Mohsen | Mustafa Ismail | BA | Comparative study of causal discovery methods | Boris Lorbeer |
Nawaz | Hafiz Umar | MA | State persistance evaluation for the stateful serverless platforms | Maria Mora Martinez |
Odorfer | Roland | MA | Decentralized Identity Management and its Application in Future Cellular Networks | Sandro Rodriguez Garzon |
Oppermann | Laura | MA | Concept and Design of an Efficient Search and Discovery Mechanism for Decentralized Ledger-based Marketplaces | Sebastian Göndör |
Rau | Jonathan | MA | Distributed Ledgers as Shared Audit Trails for Carbon Removal | Marcel Müller, Robin Clemens |
Rhimi | Radhouane | BA | Platform for crowdsourcing hate speech | Aikaterini Katsarou |
Rucaj | Denisa | MA | Feature-based Extractive Multi-document Summarisation | Bianca Lüders, Aikaterini Katsarou |
Saadi | Juba | MA | Decentralized Scoring for Adjusting Publication Reach on Online Social Networks | Sebastian Göndör |
Schulenberg | Emilia | BA | Design and Implementation of a Cloud Wallet for Self-hosted Decentralized Services | Sebastian Göndör |
Schwerdtner | Henry | BA | Identifying Structural Web Tracker Characteristics With Real-Time Graph Analysis | Philip Raschke |
Sivirina | Anastasiia | MA | Enabling Verifiable Credentials Interoperability with the Enhancement of the ACAPY Framework | Hakan Yildiz |
Skodzik | Melanie | MA | Analyzing Market Manipulation on Automated Market Maker based Decentralized Cryptocurrency Exchanges | Friedhelm Victor |
Song | Yong Huyn | BA | A Comparison of Web Tracking and its Mobile Counterpart | Tom Cory |
Tsaplina | Olesia | BA | Datenschutz in dezentralen sozialen Netzwerkplattformen: Entwicklung von einem Dashboard zum verteilten Datenschutzmanagement | Philip Raschek, Sebastian Göndör |
Urban | Tobias | BA | Analyse der Evolution von Featuresets sozialer Netzwerkplattformen | Sebastian Göndör |
Wang | Mingzhi | MA | MATSim-based Data Diffusion Models for Dissemination-based Collaborative Filtering | Tobias Eichinger |
Name | Vorname | Bachelor - Masterarbeit | Titel der Arbeit | Betreuer |
Akimov | Grigori | MA | Detecting Liquidity Draining “Rug-Pull” Patterns in CPMM Cryptocurrency Exchanges | Friedhelm Victor |
Ebermann | Marcel | BA | On the Accuracy of Block Timestamp-based Time-sensitive Smart Contracts on Private Permissioned Ethereum Blockchains | Tobias Eichinger |
Fan | Yuanzhang | MA | Optimizing content dissemination in federated online social networks | Sebastian Göndör |
Herbke | Patrick | MA | Detection of Web Tracker Characteristics with Graph Analysis Methods | Philp Raschke |
Hertwig | Kevin | BA | Development of an Identity and Access Management for a decentralized Business Process Management System | Kai Grunert |
Hrustic | Amira | BA | Analysing Web Tracking in Mobile Android HTTP Traffic | Thomas Cory |
Jeney | Roxana | MA | Multi-Domain Sentiment Classification using an LSTM-based Framework with Attention Mechanism | Aikaterini Katsarou |
Kutal | Volkan | BA | Mobile Traffic Data Visualization for Web Tracker Detection | Tom Cory, Philip Raschke |
Lang | Carolin Sophie | BA | Mapping Company Information to Web Domains for Enhanced User Transparency | Philip Raschke |
Li | Ziyang | BA | Best Practices for using JavaScript on Resource-Constrained Microcontrollers -> geändert: Memory Consumption Analysis for JavaScript Engines on Microcontrollers | Kai Grunert |
Mohamed | Gehad Gamal Salem Awad | BA | Intercepting and Monitoring TLS Traffic in Mobile Applications | Thomas Cory |
Nawaz | Hafiz Umar | MA | State persistance evaluation for the stateful serverless platforms | Maria Mora - Martinez |
Pandey | Sanjeet Raj | MA | Smart function placement for serverless applications | Maria Mora - Martinez |
Pelz | Konstantin | BA | A Context-aware Mobile App to Compute Location- and Air Pollution-based Emission Compensations for Car Rides | Sandro Rodriguez Garzon |
Peppas | Dimitrios | BA | Design and Implementation of a Mobile Sensing App for Experience Sampling | Felix Beierle |
Rieder | Wolf Siegfried | BA | On The Usefulness of HTTP Responses to Identify Differences Between Non- And Web Trackers | Philip Raschke |
Rucaj | Denisa | MA | Feature-based Extractive Multi-document Summarisation | Bianca Lüders, Katerina Katsarou |
Ryu | Youngrak | MA | Data storage in DHTs: A Framework for storing larger data in Kademlia | Martin Westerkamp, Dirk Thatmann |
Sarder | Uma | MA | Design and Implementation of Control Flow and Permission Management for Polyglot Distributed Service Modules in the Blade Ecosystem | Sebastian Göndör |
Schneider | Maximilian | BA | A Web Service to Enable the Computation of Dynamic Air Pollution-aware Road User Charges on Mobile Devices | Sandro Rodriguez Garzon |
Stumpf | Julien | BA | Using Ad Blocking Filter Lists for Automated Labeling of Web Tracker Traffic | Philip Raschke |
Syed Qasim | Hussain | MA | Blockchain-based Trusted Execution Environments for Privacy-preserving Medical Research | Marcel Müller |
Yang | Huaning | BA | How Representative Is Measured Network Traffic: Individual Browsing Behavior And Its Technical Manifestation | Philip Raschke |
Das Seminar ist ein Forum für wissenschaftliche Diskussionen und aktiven Austausch. Studierende haben die Möglichkeit, ihre Abschlussarbeiten unter Kommilitonen:innen, Absolventen:innen, den Mitarbeitenden des Fachgebietes und dem Professor zu diskutieren. In der frühen Phase ihrer Arbeit wird ihr Thesenansatz diskutiert, während am Ende die Ergebnisse präsentiert werden. Studierende, die derzeit an unserem Lehrstuhl an ihrer Abschlussarbeit arbeiten, sind verpflichtet, an allen Terminen teilzunehmen, insbesondere wenn andere verwandte Themen präsentiert werden. Wir freuen uns auch über weitere Studierende, die sich für das Seminar interessieren oder zukünftig eine Abschlussarbeit an unserem Lehrstuhl schreiben werden.
Bitte beachten Sie:
Studierende, die sich für eine Abschlussarbeit an unserem Lehrstuhl entscheiden, müssen in einer ersten Präsentation in der Anfangsphase ihrer Abschlussarbeit ihr Thema und den Ansatz, den sie verfolgen werden, vorstellen. Diese Präsentation sollte 10 Minuten dauern, wobei anschließend 5 Minuten für Fragen und Antworten zur Verfügung stehen.
Nach Abschluss der Arbeit müssen die Studierenden diese in einem Vortrag verteidigen, in dem sie die in der Arbeit erzielten Ergebnisse darlegen. Bachelor-Studierende sollten 15 Minuten präsentieren und 5 Minuten für Fragen und Antworten einplanen, während Master-Studierende 20 Minuten präsentieren und anschließend 10 Minuten lang auf Fragen und Antworten eingehen.
Titel | Präsentation | Studierende | Uhrzeit | Betreuer |
Securing V2X communication and providing authenticity with DIDs and VCs | Bachelor Defense | Erfan Gharibnejad | 14.15 | Artur Philipp |
Optimizing Cold Start Latency in Serverless using Function Discovery | Master Defense | Steffen Westlinning | 14.45 | Sanjeet Raj Pandey |
DIDComm over QUIC and HTTP/3: An Evaluation | Bachelor Initial | Hong Ming Guo | 15.25 | Sanjeet Raj Pandey |
Derivation of BPMN-based process models from SAP-based product structure data | Master Defense | Linus Pfoch | 15.45 | Kai Grunert |
Increasing Transparency Through Automated Web Tracking Detection | Bachelor Initial | Thu My Huyn | 16.25 | Philip Raschke |
A QUIC look at mobile privacy | Master Initial | Daria Seita | 16.45 | Tom Cory |
Titel | Präsentation | Studierende | Uhrzeit | Betreuer |
Detecting latent confounders in purely observational data | Bachelor Defense | Niklas Schmolenski | 14.15 | Boris Lorbeer |
Authentication with DIDs and VCs in mTLS | Master Initial | Dennis Natusch | 14.45 | Sandro Rodriguez Garzon |
Forensic Checkpointing for Microservice Portability | Master Initial | Jialun Jiang | 15.05 | Hai Dinh Tuan |
Separated Company Environment in Cloud Applications on the example of PROCEED | Bachelor Initial | Felipe Trost | 15.25 | Kai Grunert |
Realizing Polyglot Software Modules in Decentralized and Extensible Service | Master Defense | Tom Rüger | 15.45 | Sanjeet Raj Pandey |
Titel | Präsentation | Studierende | Uhrzeit | Betreuer |
A sensor and Wi-Fi based approach for indoor localization on smartphones | Bachelor Initial | Adam Knothe | 14.15 | Christian René Sechting |
Development of an interactive digital campus map with navigation functionality for mobile devices | Bachelor Initial | Patrick Zdanowski | 14.35 | Christian René Sechting |
Real-time Web Tracker Detection | Master Defense | Henry Schwerdtner | 14.55 | Philip Raschke |
Monolithic to Serverless Transformation | Master Initial | Jonathan Eichenhofer | 15.35 | Sanjeet Raj Pandey |
Calculating of Process Properties | Bachelor Defense | Luisa Wittig | 15.55 | Kai Grunert |
Extending iFogSim2 for Serverless | Master Initial | Dimitris Peppas | 16.25 | Hai Dinh Tuan |
Titel | Präsentation | Studierende | Uhrzeit | Betreuer |
Adaptive services placement based on application-level information | Bachelor Defense | Florian Six | 14.15 | Hai Dinh Tuan |
Privacy-Preserving Telemetry for Heimdall | Bachelor Initial | Alex Leonkov | 14.45 | Tom Cory |
Leveraging DIDComm V2 for Enhanced Off-chain Applications Utilization | Master Initial | Tanzira Ulfat Mohana | 15.05 | Patrick Herbke |
Location-aware Serverless Function Placement Approach in an Edge Environment | Master Defense | Ankush Sharma | 15.25 | Maria Mora Martinez |
Titel | Präsentation | Studierende | Uhrzeit | Betreuer |
Extending iFogSim2 for Serverless | Master Initial | Dimitrios Peppas | 14.15 | Hai Dinh Tuan |
A Deep Learning and NLP-Based Approach for Trace Forecasting in Predictive Process Mining | Bachelor Initial | Maximilian Oliver Fisch | 14.35 | Wolf Rieder |
Forensic Checkpointing for microservice portability | Master Initial | Jialun Jiang | 14.55 | Hai Dinh Tuan |
Privacy Policies vs Reality | Bachelor Initial | Anna Ruban | 15.15 | Tom Cory |
Titel | Präsentation | Studierende | Uhrzeit | Betreuer |
Secure Web of Things Discovery with DIDs and VCs | Bachelor Initial | Kevin Hai Nam Pham | 14:15 | Artur Philipp |
Dynamic AGV Creation of a middleware for multi-vendor communication with mobile robots | Master Defense | Isabelle Wilhelm | 14:35 | Kai Grunert |
On-device Mobile Application Traffic Monitoring on iOS | Master Initial | Benjamin Appendino | 15:15 | Tom Cory |
Verifiable Credentials for Network Access Control | Master Initial | Nick Stender | 15:35 | Artur Philipp |
Policy Development for Kademlia-based Revocation of Verifiable Credentials | Bachelor Initial | Philip Brozicevic | 15:55 | Patrick Herbke |
DIDComm v2 client for 5G Core networks | Master Defense | Jianeng Fu | 16:15 | Hai Dinh Tuan |
Titel | Präsentation | Studierende | Uhrzeit | Betreuer |
Plugin Architecture on the Example of PROCEED | Master Initial | Moritz Reich | 14.15 | Kai Grunert |
SSI Profile: Using SSI for W3C Web of Things (WoT) Thing Description authenticity | Bachelor Initial | Jean-Pascal Sindermann | 14.35 | Artur Philipp |
A platform for automated summaries generation for medical articles | Bachelor Defense | Georgios Zountsas | 15.05 | Aikaterini Katsarou |
Leveraging NDN trust in IoT | Bachelor Initial | Alwin Kahlert | 15.35 | Aljoscha Schulte |
DIDComm v2 client for 5G Core networks | Master Defense | Jianeng Fu | 15.55 | Hai Dinh Tuan |
Securing V2X communication and providing authenticity with DIDs and VCs | Bachelor Initial | Erfan Gharibnejad | 16.35 | Artur Philipp |
Titel | Präsentation | Studierende | Uhrzeit | Betreuer |
Blade as DIDComm Mediator | Bachelor Defense | Moriel Pevzner | 14.15 | Sebastian Göndör |
DIDComm SSI VDR | Master Defense | Vincent Kelbel | 14.45 | Sebastian Göndör |
Evaluation and Implementation of a Persistence Layer for a Cloud Application | Bachelor Initial | Oliver Fuhrmann | 15.25 | Kai Grunert |
Dynamic AGV Allocation in PROCEED | Master Defense | Isabelle Wilhelm | 15.45 | Kai Grunert |
Detecting latent confounders in purely observational data | Bachelor Initial | Niklas Schmolenski | 16.25 | Boris Lorbeer |
Evaluation of the functionality of an open source 5G core deployed using serverless computing | Master Initial | Paula Lopez Medina | 16.45 | Hai Dinh Tuan, Maria Mora Martinez |
Titel | Präsentation | Studierende | Uhrzeit | Betreuer |
Graph Analysis of Revocation Registries in Hyperledger Indy | Bachelor Defense | Jonas Krause | 14.15 | Patrick Herbke |
Cold-Starts reduction using Serverless Application Discovery | Master Initial | Steffen Westlinning | 14.45 | Sanjeet Raj Pandey |
Matching Online and Offline Users for Hybrid Evaluation of Recommender Algorithms | Master Defense | Soo Min Jeong | 15.05 | Tobias Eichinger |
On-device Modification of Mobile Application Security Configurations | Bachelor Defense | Kristina Heitkamp | 15.45 | Tom Cory |
Developing a Laboratory for Analysing Trust Mechanisms in Decentralized Networks | Master Initial | : Brayan Steven Orjuela Pico | 16.15 | Patrick Herbke |
Titel | Präsentation | Studierende | Uhrzeit | Betreuer |
Challenges of implementing microservices as serverless functions | Master Defense | Maximilian Ksoll | 14.15 | Maria Mora Martinez |
Comparison of state management solutions for serverless computing | Bachelor Defense | Alaa Mlaouhii | 14.50 | Maria Mora Martinez |
Multi-faceted on-device Analysis of Android Apps | Bachelor Initial | 15.10 | Tom Cory | |
Time-series Analysis of Android HTTP Traffic | Bachelor Defense | Simon Lösche | 15.35 | Tom Cory |
Titel | Präsentation | Studierende | Uhrzeit | Betreuer |
Increasing Transparency Through Automated Web Tracking Detection | Bachelor Initial | Thu My Huyn | 14.15 | Philip Raschke |
Polyglott Blade Modules | Master Initial | Tom Rüger | 14.50 | Sebastian Göndör |
Incorporating OCSP Stapling in EDHOC for Certificate Revocation in Resource Constrained Environments | Master Defense | Yousef Abdelkhalek | 15.25 | Aljoscha Schulte |
IP - Enabling SSI Interoperability with Aries DIDComm v2 Implementation | Master Initial | Judith Högerl | 16.05 | Hakan Yildiz |
Platform for crowdsourcing hate speech | Bachelor Defense | Radhouane Rhimi | 16.40 | Katerina Katsarou |
Managing Higher Education Certificates using Self-Sovereign Identity Paradigm | Master Defense | Kaustabh Barman | 17.20 | Patrick Herbke |
Titel | Präsentation | Studierende | Uhrzeit | Betreuer |
Machine-learning Supported Analysis of Mobile Application Traffic | Bachelor Defense | Anastasiya Kmit | 14.15 | Tom Cory |
Calculating process properties | Bachelor Initial | Luisa Wittig | 14.55 | Kai Grunert |
Decentralized resource management in Kubernetes (Title TBA) | Bachelor Initial | Florian Six | 15.30 | Hai Dinh Tuan |
Serverless function placement based on distance to the user | Master Initial | Ankush Sharma | 16.05 | Maria Mora Martinez |
Analysing the Effect of Android Permissions on Mobile Tracking | Bachelor Defense | Laura Keller | 16.40 | Tom Cory |
A Policy Editor for the JSON-Serialization of Privacy Policies Written in Natural Language | Bachelor Initial | Naseem Shawarba | 17.20 | Tobias Eichinger |
Web-based Time Optimization for Lecturer | Bachelor Initial | Armand Borel Kengne Tene | 17.55 | Patrick Herbke |
Titel | Präsentation | Studierende | Uhrzeit | Betreuer |
Distributed Ledgers as Shared Audit Trails for Carbon Removal | Master Defense | Jonathan Rau | 14.15 | Marcel Müller |
A comparative study of causal discovery methods | Bachelor Defense | Mustafa Ismail Mohsen | 14.45 | Boris Lorbeer |
ML-based Tracker Detection in Android Applications | Bachelor Defense | Cihad Colak | 15.15 | Tom Cory |
Visualising Mobile Web Traffic Characteristics with an Interactive Dashboard | Bachelor Defense | Nastassia Lukyanovich | 15.45 | Tom Cory |
A Policy Editor for the Formalization of Privacy Policies Written in Natural Language | Bachelor Initial | Naseem Shawarba | 16.15 | Tobias Eichinger |
A platform for automated summaries generation for medical articles | Bachelor Initial | Georgios Zountsas | 16.45 | Katerina Katsarou |
Titel | Präsentation | Studierende | Uhrzeit | Betreuer |
Synergies between Verifiable Credentials and Information-Centric networks on the example of the Named Data Networking Project | Master Initial | Andreas Kalz | 14.15 | Aljoscha Schulte |
A Hybrid Evaluation Scheme for Making Qualitative Feedback Available to Recommender Systems Researchers | Master Defense | Ananta Lamichhane | 14.45 | Tobias Eichinger |
STARK-based Chain Relays | Bachelor Defense | Lukas Lee George | 15.15 | Martin Westerkamp |
Enabling Verifiable Credentials Interoperability with the Enhancement of the ACAPY Framework | Master Initial | Anastasiia Sivirina | 15.45 | Hakan Yildiz |
State management in 5G using Akka Serverless | Bachelor Defense | Rayhan Naufal Hibatullah | 16.15 | Maria Mora Martinez |
Titel | Präsentation | Studierende | Uhrzeit | Betreuer |
Implementing a NDNCERT Challenge based on Verifiable Credentials | Bachelor Defense | David Barkemeyer | 14.15 | Aljoscha Schulte |
SSI ActivityPub for Mastodon | Bachelor Defense | Adrian Isaias Sanchez | 14.45 | Sebastian Göndör |
P2P Communication between End Users wtih DIDcomm Messaging | Master Initial | Berit Frech | 15.15 | Hakan Yildiz |
Blade as DIDComm Mediator | Bachelor Initial | Moriel Pevzner | 15.45 | Sebastian Göndör |
DIDComm Microblogging | Master Initial | Vincent Kelbel | 16.15 | Sebastian Göndör |
DIDComm v2 client for 5G Core networks | Master Initial | Jianeng Fu | 16.45 | Hai Dinh Tuan |
Titel | Präsentation | Studierende | Uhrzeit | Betreuer |
A Framework for the Implementation of a SSI-based Energy Management System for the Charging of Electric Vehicles | Master Initial | Rigerta Tola | 14.15 | Patrick Herbke |
Adaptive Processes in a decentralized Business Process Management System | Bachlelor Defense | Janis Joderishoferi | 14.45 | Kai Grunert |
A MATSim-based Data Diffusion Model for Dissemination-based Collaborative Filtering | Master Defense | Mingzhi Wang | 15.15 | Tobias Eichinger |
A Comparison of Web Tracking and its Mobile Counterpart | Bachlelor Defense | Yong Hyun Song | 15.45 | Tom Cory |
DIDComm v2 client for 5G Core networks | Master Initial | Jianeng Fu | 16.15 | Hai Dinh Tuan |
Cryptocurrency volatility prediction using sentiment analysis from social media | Master Initial | Shirkouh Matini | 16.45 | Katerina Katsarou |
Titel | Präsentation | Studierende | Uhrzeit | Supervisor |
Concept and Design of an Efficient Search and Discovery Mechanism for Decentralized Ledger-based Marketplaces | Master Defense | Laura Oppermann | 14.15 | Sebastian Göndör |
Comparison of state management solutions for serverless computing | Bachelor Initial | Alaa Mlaouhi | 14.45 | Maria Mora Martinez |
Multi-domain Sentiment Analysis with an Active learning Mechanism | Master Defense | Nabil Douss | 15.15 | Aikaterini Katsarou |
On-device Modification of Mobile Application Security Policies | Bachelor Initial | Kristina Heitkamp | 15.45 | Tom Cory |
Titel | Präsentation | Studierende | Uhrzeit | Supervisor |
A Matchmaking Service for Hybrid Evaluation of Recommender Algorithms | Master Initial | Soo Min Jeong | 14.15 | Tobias Eichinger |
Understanding IoT blockchains | Master Initial | Jile Sorout | 14.45 | Friedhelm Victor, René Sechting |
HTTP/S Response Classifier v2.0 | Master Initial | Wolf Rieder | 15.15 | Philip Raschke |
Platform for crowdsourcing hate speech | Bachelor Initial | Radhwen Rhimi | 15.45 | Aikaterini Katsarou |
Titel | Präsentation | Studierende | Uhrzeit | Supervisor |
Graph analysis of Revocation Registries in Hyperledger Indy | Bachelor Initial | Jonas Krause | 14.15 | Patrick Herbke |
Analysis and Implementation of Secure Key Management in Mobile Wallet Applications | Bachelor Defense | Pascal Hoffmann | 14.45 | Sebastian Göndör |
Decentralized Identity Management and its Application in Future Cellular Networks | Master Defense | Roland Odorfer | 15.15 | Sandro Rodriguez Garzon |
A Coarse Location-Service for Collaborating with Approximately Nearest Neighbors | Bachelor Initial | Florian Baumann | 15.45 | Tobias Eichinger |
Implementation of an SSI-based Process for German Federal Election | Bachelor Initial | Florian Wehner | 16.15 | Patrick Herbke |
Platform for Crowdsourcing Hate Speech | Bachelor Initial | Radhwen Rhimi | 16.45 | Aikaterini Katsarou |
Titel | Präsentation | Studierende | Uhrzeit | Betreuer |
Dynamic AGV Allocation in PROCEED | Master Initial | Isabelle Wilhelm | 14.15 | Kai Grunert |
Managing Higher Education Certificates in a Self-Sovereign Identity Ecosystem | Master Initial | Kaustabh Barman | 14.45 | Patrick Herbke |
Platform for crowdsourcing hate speech | Bachelor Initial | Radhwen Rhimi | 15.15 | Aikaterini Katsarou |
Analysing the Effect of Android Permissions on Mobile Tracking | Bachelor Initial | Laura Keller | 15.45 | Tom Cory |
Enabling Verifiable Credentials Interoperability with the Enhancement of the ACAPY Framework | Master Initial | Anastasiia Sivirina | 16.15 | Hakan Yildiz |
Titel | Präsentation | Studierende | Uhrzeit | Betreuer |
Challenges of implementing microservices as serverless functions | Master Initial | Maximilian Ksoll | 14.15 | Maria Mora Martinez |
Decentralized Scoring for Adjusting Publication Reach on Online Social Networks | Master Defense | Juba Saadi | 14.45 | Sebastian Göndör |
Blade as DIDComm Mediator | Bachelor Initial | Arian Variri | 15.15 | Sebastian Göndör |
ML-based Tracker Detection in Android Applications | Bachelor Initial | Cihad Colak | 15.45 | Tom Cory |
Interconnection of SAP and dBPMS | Master Initial | Linus Pfoch | 16.15 | Kai Grunert |
Time-series Analysis of Android HTTP Traffic | Bachelor Initial | Simon Lösche | 16.45 | Tom Cory |
Titel | Präsentation | Studierende | Uhrzeit | Supervisor |
Distributed Ledgers as Shared Audit Trails for Carbon Removal | Master Initial | Jonathan Rau | 14.15 | Marcel Müller, Robin Klemens |
Implementing a stateful serverless application on Akka Serverless | Bachelor Initial | Rayhan Naufal Hibatullah | 14.45 | Maria Mora Martinez |
Analyse der Evolution von Featuresets sozialer Netzwerkplattformen | Bachelor Defense | Tobias Urban | 15.15 | Sebastian Göndör |
Understanding Adherence to Ecological Momentary Assessments in the Example of the TYDR App | Master Defense | Wepan Chade | 15.45 | Katerina Katsarou, Felix Beierle |
SSI ActivityPub for Mastodon | Bachelor Initial | Adrian Isaias Sanchez | 16.15 | Sebastian Göndör |
Design and Implementation of a Cloud Wallet for Self-hosted Decentralized Services | Bachelor Defense | Emilia Schulenberg | 16.45 | Sebastian Göndör |
Comparative study of causal discovery methods | Bachelor Initial | Mustafa Mohsen | 17.15 | Boris Lorbeer |
Titel | Präsentation | Studierende | Uhrzeit | Supervisor |
Decentralized Scoring for Adjusting Publication Reach on Online Social Networks | Master Defense | Juba Saadi | 14.15 | Sebastian Göndör |
Abstractive text summarization of scientific articles from the Biomedical domain | Master Defense | Uttam Dhakal | 14.45 | Aikaterini Katsarou |
Implementing a NDNCERT Challenge based on Verifiable Credentials | Bachelor Initial | David Barkemeyer | 15.15 | Aljoscha Schulte |
Implementing Verifiable Credentials in ICN/NDN | Master Initial | Andreas Kalz | 15.45 | Aljoscha Schulte |
State Persistence Evaluation for Stateful Serverless Platforms | Master Defense | Umar Nawaz | 16.15 | Maria Mora Martinez |
Feature-based Multi-Document Summarisation | Master Defense | Denisa Rucaj | 16.45 | Bianca Lüders, Aikaterini Katsarou |
Titel | Präsentation | Studierende | Uhrzeit | Supervisor |
Analyzing AMM Liquidity Draining Events | Master Defense | Grigori Akimov | 14.15 | Friedhelm Victor |
Fraud Detection on Automated Market Maker Exchanges | Master Defense | Melanie Skodzik | 14.45 | Friedhelm Victor |
Adaptive Processes in a decentralized Business Process Management System | Bachelor Initial | Janis Joderi Shoferi | 15.15 | Kai Grunert |
Creation of BPMN processes with a Smart Voice Assistant | Bachelor Defense | Imke Dungs | 15.45 | Kai Grunert |
Identifying Structural Web Tracker Characteristics With Real-Time Graph Analysis | Bachelor Defense | Henry Schwerdtner | 16.15 | Philip Raschke |
An Intelligence Decision Support System for Test Optimization Purposes | Master Defense | Jie Liu | 16.45 | Aikaterini Katsarou |
Titel | Präsentation | Studierende | Uhrzeit | Supervisor |
Coordinated Resolution of Compute Request in the Compute-Centric Networks | Master Defense | Liming Liu | 14.15 | Hai Dinh Tuan |
STARK-based Chain Relays | Bachelor Initial | Lukas Lee George | 14.45 | Martin Westerkamp |
Cross-Browser Comparison of Web Tracker Activity Using T.EX | Bachelor Initial | Fadel Alissa | 15.45 | Philip Raschke |
Datenschutz in dezentralen sozialen Netzwerkplattformen: Entwicklung von einem Dashboard zum verteilten Datenschutzmanagement | Bachelor Defense | Olesia Tsaplina | 16.15 | Sebastian Göndör, Philip Raschke |
Titel | Präsentation | Studierende | Uhrzeit | Supervisor |
Cryptocurrency volatility prediction using sentiment analysis from social media | Master Initial | Shirkouh Matini | 14.45 | Aikaterini Katsarou |
Multi-domain Sentiment Analysis with an Active learning Mechanism | Master Initial | Nabil Douss | 15.15 | Aikaterini Katsarou |
A Hybrid Evaluation Scheme for Making Qualitative Feedback Available to Recommender Systems Researchers | Master Initial | Ananta Lamichhane | 16.15 | Tobias Eichinger |
A MATSim-based Data Diffusion Model for Dissemination-based Collaborative Filtering | Master Initial | Mingzhi Wang | 16.45 | Tobias Eichinger |
In diesem Abschnitt werden allgemeine Themen und häufig gestellte Fragen zum organisatorischen Ablauf von Bachelor-, Master- und Diplomarbeiten an unserem Lehrstuhl behandelt. Bitte lesen Sie diese Seite sorgfältig durch, bevor Sie sich an einen der Betreuer wenden, damit Sie gut vorbereitet sind, wenn Sie Ihr Interesse bekunden und die Themen mit den Betreuern besprechen.
Arbeitsablauf
Der organisatorische Ablauf einer Bachelor-, Master- oder Diplomarbeit bei SNET wird im Folgenden beschrieben:
Bitte beachten Sie, dass die Abgabe spätestens 6 Wochen vor Ende des Semesters erfolgen muss, um zu gewährleisten, dass Sie Ihre Note noch im selben Semester erhalten. Daher muss die Anmeldung der Arbeit beim Prüfungsamt mindestens 4 Monate + 6 Wochen für Bachelorarbeiten und 6 Monate + 6 Wochen für Masterarbeiten vor der Abgabe erfolgen.
Bitte beachten Sie:
Bitte beachten Sie bei der Anfertigung einer Abschlussarbeit die folgenden Hinweise: