/home

Papers that I have read

Paper title: Ipfs-content addressed, versioned, p2p file system

Authors: Juan Benet What I learned: Distributed networking protocols, distributed hash tables, Merkle DAG. The future of the WWW lies in distributed technologies.

Paper title:Quantitative assessment of Operational security: Models and tools.

Authors: Marc Dacier, Yves Deswarte, Mohamed Kaaniche What I learned: Operational security can be quantifiably measured... with Markov chains.

Paper title: Information security culture

Authors: A. Martins, Jan Eloff What I learned: Information security culture is best implemented in an organisation via a best example method.

Paper title: Filecoin: A cryptocurrency operated file storage network

Authors: filecoin.io What I learned: This paper introduced a new interesting cryptocurrency that would base its proof of concept on providing a decentralized data storage facility to users rather than just random numbers.

Paper title: A digital dark ages? Challenges in the preservation of electronic information?

Authors: terry Kuny What I learned: The importance of archiving digital information. This paper also describes a problem commonly known as 'bit rot' and the looming dangers of a digital dark age of disappearing information.

Paper title: Small animal physical activity monitoring system

Authors: Renata Kovačević, Tin Kramberger, Davor Cafuta, Ivica Dodig What I learned: The IoT can be used to allow pet owners to monitor their pets, especially nocturnal pets.

Paper title: Enabling text corrections marking in Adobe indesign by using scripting technologies

Authors: Sanja Brekalo, Klaudio Pap, Nevenka Breslauer What I learned: Scripting in additional fuctionality can make software products easier to use for the general public and therefore it improves the quality of the end product. It allows more experienced users to be of help to less experienced users.

Paper title: OPSEC in the information age

Authors: Robert G. Michnowicz What I learned: OPSEC is an always evolving issue that should be addressed with the evolution of new information technologies. Even large organizations, especially large organizations need to take care of OPSEC.

Paper title: Towards operational measures of computer security

Authors: Bev Littlewood, Sarah Brocklehurst, Norman Fenton, John Dobson, John McDonald, Dieter Gollmann What I learned: How operational security can be measured via effort and or time. Also how security compares with reliability.

Paper title: Operations security(OPSEC)

Authors: Garry Williams What I learned: What is OPSEC. How attackers can gain information trough bad OPSEC. Examples of OPSEC failures.

Paper title: Expermineting with quantitative evaluation tools for monitoring operational security

Authors: Rodolhe Ortalo, Yves Deswarte, Mohamed Kaaniche What I learned: OPSEC can be quantitatively measured with graphs.

Paper title: Devices for network traffic control and analysis

Authors: Mladen Maksimović, Valter Perinović, Dubravko Žigman What I learned: Network analysis devices help to improve the overall network QoS and indirectly help to improve Network security.

Paper title: Wireless network setup with RADIUS authentication

Authors: Dario Pintarić, Zvonimir Begić, Dubravko Žigman What I learned: RADIUS is useful to imprvoe the security of a computer network. Other useful RADIUS features are it's accounting capability, the possibility of creating user groups, and it's VLAN and domain support.

Paper title: OSPF within switch networks

Authors: Stjepan Jambrak, Dubravko Žigman What I learned: Advanced OSPF features as well as the fact that OSPF is good for inter vendor routing.

Paper title: Extending PHP with modules

Authors: Davor Lozić, Alen Šimec What I learned: If you want to master PHP it is good to also learn C, so you can extend PHP with modules.

Paper title: Safety and security problems of basic wireless network protection protocols in everyday life.

Authors: Tomislav Marjanović What I learned: The intricacies of WEP, WPA1 and WPA2 security, wireless criminal law as well as prevalence of wireless security protocols.

Paper title: Against 'measurement'

Authors: john Bell
What I learned: The problematics of fully formulating measurements in quantum mechanics. How do we define what is a good enough measurement of a 'system' for all intents and purposes? how precise is precise?

Paper title: Importance of nanotechnology for the economy

Authors: Stjepan Car
What I learned: Nanotechnology R&D could be a big boon for the economy. Nanotechnology could enable us to create completely new and so far unimaginable materials. The problem with nanotechnology research lies in the fact how interdisciplinary it is.

Paper title: On measures of entropy and information

Authors: Alfred Renyi
What I learned: What is information and how does it relate to entropy.

Paper title: Can Quantum-Mechanical description of physical reality be considered complete?

Authors: A. Einstein, B. Podolsky and N. Rosen
What I learned: No matter how precise the measuring instrument may be, it will always disturb the measured system and change it's properties at least to a very minimal degree.

Paper title: Otaku world

Authors: Kris Sangani
What I learned: Japanese anime fans are increasingly becoming a part of the engineering workforce. Not only that, but their economic power and preferences are creating a whole new market. How can businesses use this to their advantage?

Paper title: Anime otaku: Japanese animation fans outside Japan

Authors: Annalee Newitz
What I learned: How does Japanese animation attract and create it's abroad subculture and what are it's effects and characteristics on it's abroad fandom.

Paper title: Kusanagi's body: Gender and technology in mecha-anime

Authors: Joseph Christopher Schaub
What I learned: The view of gender and humanity in a potential cyborg sci-fi future. Does it matter if you are male or female if you can transplant your brain at will into another either male or female cyborg body in a matter of minutes?

Paper title: Transcultural otaku: Japanese representations of fandom and representations of Japan in anime/manga fan cultures.

Authors: Matt Hills
What I learned: How the western Japanese animation fandom have appropriated the Japanese animation subculture. And how does japanese animation interreact with the western fandom.

Paper title: Linux network traffic control overview

Authors: Werner Almesberger
What I learned: Linux Network traffic control consists of qeueing disciplines, classes, filters and policing. It is a modular design which can be used in most modern traffic control tasks and it can be exteded on will. It can create a DiffServ type of QoS.

Paper title: Virtualization

Authors: Robert Zovko, Dubravko Žigman
What I learned: The history of virtualization and its advantages and disadvantages.

Paper title: Document security technologies

Authors: Jana Žiljak Vujić, Ljiljana Matuško Antonić, Slaven Crnjac
What I learned: Documents can be protected both with graphical watermarks as well with computer protections and online document databases. This paper also projected an interesting document printing protection system which protected the document during the printing process.

Paper title: Videoconference as a tool for enhancing student collaboration

Authors: Petar Osterman
What I learned: Video conferencing when integrated into the learning process can help improve learning in group learning environments.

Paper title: Virtual local area networks

Authors: Damir Mehić, Dubravko Žigman, Danijela Pongrac
What I learned: VLANs are a great tool to help create network segmentation.

Paper title: Using video journals in academic service learning

Authors: Nives Mikelić Preradović, Petar Jandrić
What I learned: Keeping video journals improves the learning process for all ages.

Paper title: An exploratory study of the otaku adolescent consumer

Authors: Han-Jen Niu, Yung-Sung Chiang, Hsien-Tang Tsai
What I learned: This paper tries to research the buying and economical habits of the japanese animation fandom.

Paper title: Kerberos: An authentication service for open network systems

Authors: Jennifer G. Steiner, Clifford Neuman, Jeffrey I. schiller
What I learned: This paper gives a detailed overview of the kerberos authentication protocol and how it operates.

Paper title: An algorithm for distributed computation of a spanning tree in an extended LAN

Authors: Radia Perlman
What I learned: The inner working of the Spanning tree protocol used in networks switches.

Paper title: Designing behaviors for information agents

Authors: Keith Decker, Anandeep Pannu, Katia Sycara, Mike Williamson
What I learned: The behaviour and design of Information agents. In a way this paper is a precursor to 3 tier applications as well as many modern smartphone applications and software bots.

Paper title: Network information flow

Authors: Rudolf Ahlswede, ning Cai, Shuo-Yen Robert Li, Raymond W. Yeung
What I learned: How does information flow trough a network. Also this paper starts research on network coding rather than just broadcasting information trough all the switches.