Search

We found 527 hits for your search of 'Algorithms and Complexity'.
  1. Data Networks - Summer 2021

    /departments/inet/teaching/data-networks-lecture-summer-2021

    mechanisms, implementation principles, network algorithms, advanced network architectures, network simulations, measurements, protocol specifications, and verification techniques. This course is worth 9 [...] website. An official announcement will be given during the lecture and repeated in the tutorials. Literature (non-compulsory) James F. Kurose and Keith W. Ross. Computer Networking: A Top-Down Approach . Ad [...] Semester 2021 Update on the second round of exams: The second round of exams will take place between 19th and 30th October. The conditions will be the same as for the first round. Please refer to the course's

  2. Data Networks - Summer 2022

    /departments/inet/teaching/data-networks-lecture-summer-2022

    mechanisms, implementation principles, network algorithms, advanced network architectures, network simulations, measurements, protocol specifications, and verification techniques. This course is worth 9 [...] the internet including the basics of internet communication. We will start at the application layer and investigate services like web (HTTP), mail (SMTP, POP, IMAP), domain name systems (DNS), or routing

  3. Data Networks - Summer 2023

    /departments/inet/teaching/data-networks-lecture-summer-2023

    into how data networks work, and how they work together to create the network of networks we know as the Internet. After going on this journey from the history of networks and protocols to newest developments [...] every layer of the stack – from the physical wire to the applications – like the Web and Email – everyone knows and uses. After successful completion of this course, you will be able to: Describe the relevant [...] Network, Transport, and Application) to a given case, e.g., use a routing protocol to determine how packets would traverse a given network. Analyze multiple protocols for a given use-case and evaluate which

  4. Data Networks - Summer 2024

    /departments/inet/teaching/data-networks-lecture-summer-2024

    into how data networks work, and how they work together to create the network of networks we know as the Internet. After going on this journey from the history of networks and protocols to newest developments [...] every layer of the stack – from the physical wire to the applications – like the Web and Email – everyone knows and uses. After successful completion of this course, you will be able to: Describe the relevant [...] Network, Transport, and Application) to a given case, e.g., use a routing protocol to determine how packets would traverse a given network. Analyze multiple protocols for a given use-case and evaluate which

  5. Data Networks - Summer 2025

    /departments/inet/teaching/data-networks-lecture-summer-2025

    into how data networks work, and how they work together to create the network of networks we know as the Internet. After going on this journey from the history of networks and protocols to newest developments [...] every layer of the stack – from the physical wire to the applications – like the Web and Email – everyone knows and uses. After successful completion of this course, you will be able to: Describe the relevant [...] Network, Transport, and Application) to a given case, e.g., use a routing protocol to determine how packets would traverse a given network. Analyze multiple protocols for a given use-case and evaluate which

  6. Data Networks - Winter 2019

    /departments/inet/teaching/data-networks-lecture-ws-20182019

    mechanisms, implementation principles, network algorithms, advanced network architectures, network simulations, measurements and protocol specifications and verification techniques. Organization Language [...] announcement will be given during the lecture and repeated in the tutorials. Literature <span style="font-size: 8pt">(non-compulsory) James F. Kurose and Keith W. Ross. Computer Networking: A Top-Down [...] Internet. Pearson Studium (Prentice Hall), München, Deutschland, 2002. (deutsch) Larry L. Peterson and Bruce S. Davie. Computer Networks: A Systems Approach. Morgan Kaufmann, fourth edition, 2007. (english)

  7. David Stutz

    /departments/computer-vision-and-machine-learning/people/alumni-and-former-members/david-stutz

    , TITLE = {Random and Adversarial Bit Error Robustness: {E}nergy-Efficient and Secure {DNN} Accelerators}, AUTHOR = {Stutz, David and Chandramoorthy, Nandhini and Hein, Matthias and Schiele, Bernt}, LANGUAGE [...] Adversarial Training without Perturbing all Examples}, AUTHOR = {Losch, Max and Omran, Mohamed and Stutz, David and Fritz, Mario and Schiele, Bernt}, LANGUAGE = {eng}, URL = {https://openreview.net/forum? [...] Chandramoorthy, M. Hein, and B. Schiele “Random and Adversarial Bit Error Robustness: Energy-Efficient and Secure DNN Accelerators,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol

  8. Day2

    /departments/alumni/ganzinger/workshop-on-programming-logics/pictures/day2

    navigation Institute D1 Algorithms & Complexity D2 Computer Vision and Machine Learning D3 Internet Architecture D4 Computer Graphics D5 Databases and Information Systems D6 Visual Computing and Artificial Intelligence [...] Intelligence BIO Research Group Computational Biology RG1 Automation of Logic RG2 Network and Cloud Systems RG3 Multimodal Language Processing Alumni Deutsch Departments Alumni Ganzinger Workshop on Programming

  9. Dealing with Selfishness in Optimization

    /news/spotlight-articles/guarantees/dealing-with-selfishness-in-optimization

    van Stee DEPT. 1 Algorithms and Complexity Phone +49 681 9325-1005 Email vanstee@mpi-inf.mpg.de Distributed Algorithms for Fault-tolerant Hardware Exact Solving of Polynomial Systems and Applications in [...] load), and the p-norm of the loads. An approximation scheme is a family of approximation algorithms that, in addition to the given machines and jobs, takes a positive value epsilon as input and produces [...] optimal value for these jobs and machines. This improves and generalizes on previous approximation schemes, which depended on randomization, required many special cases and a difficult analysis, or were

  10. Deciphering the Second Code – Computational Epigenetics

    /news/spotlight-articles/deciphering-the-second-code-computational-epigenetics

    3 Computational Biology and Applied Algorithmics Phone: +49 681 9325-3009 Email: yassen@mpi-inf.mpg.de Konstantin Halachev DEPT. 3 Computational Biology and Applied Algorithmics Phone: +49 681 9325-3112 [...] encodes the appearance and behavior of our cells. However, there is a multitude of additional layers of control that regulate the ways in which the DNA is packed and processed and thus determine the fate [...] this second, epigenetic code in order to foster the molecular understanding of development and disease and in the long term to improve cancer therapies. Methylation of DNA influences its accessibility