Cornell Systems Lunch

CS 754 Fall 2003
Friday 12PM, Rhodes 655

E. GŁn Sirer and Andrew Myers

Sponsored by the Information Assurance Institute (IAI),
Computing and Information Science, Cornell

The Systems Lunch is a seminar for discussing recent, interesting papers in the systems area, broadly defined to span operating systems, distributed systems, networking, architecture, databases, and programming languages. The goal is to foster technical discussions among the Cornell systems research community. This fall, the Systems Lunch will focus on interesting papers from the upcoming SOSP, and recent Mobisys and Oakland conferences. We will meet once a week on Fridays at noon in Rhodes 655.

The systems lunch is open to all Cornell students interested in systems. First-year graduate students are especially welcome. Student participants are expected to sign up for CS 754, Systems Research Seminar, for one credit.

Past semesters:

Spring 03
Fall 02
Spring 02
Fall 01

Date Paper Presenter
August 29 Analysis of an Electronic Voting System
Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, Dan S. Wallach
Tom Roeder
September 5 Improving the Reliability of Commodity Operating Systems
Michael M. Swift, Brian N. Bershad, Henry M. Levy
Vivek Vishnumurthy
September 12 Mobile Computing Technologies from Microsoft Researchers & Product Teams
John SanGiovanni (MSR)
September 19 Measurement, Modeling, and Analysis of a Peer-to-Peer File-Sharing Workload
Krishna P. Gummadi, Richard J. Dunn, Stefan Saroiu, Steven D. Gribble, Henry M. Levy, John Zahorjan
Filip Radlinski
September 26 Terra: A Virtual-Machine Based Platform for Trusted Computing
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, Dan Boneh
Implementing an Untrusted Operating System on Trusted Hardware
David Lie, Chandramohan A. Thekkath, Mark Horowitz
Michael Clarkson & Dan Williams
October 3 User-level Internet Path Diagnosis
Ratul Mahajan, Neil Spring, David Wetherall, Thomas Anderson
Saikat Guha
October 10 Bullet: High Bandwidth Data Dissemination Using an Overlay Mesh
Dejan Kostic, Adolfo Rodriguez, Jeannie Albrecht, and Amin Vahdat
Fan Yang
October 17 Upgrading Transport Protocols using Untrusted Mobile Code
Parveen Patel, Andrew Whitaker, David Wetherall, Jay Lepreau, Tim Stack
Mohamed Elhawary
October 24 Beehive: Exploiting Power Law Query Distributions for O(1) Lookup Performance in Peer to Peer Overlays
Venugopalan Ramasubramanian and Emin Gun Sirer
NSDI 2004
October 31 Protecting Applications with Transient Authentication
Corner and Noble
Mobisys 2003
Vidhyashankar Venkataraman
November 7 A Survey of Peer-to-Peer Security Issues
Peer-to-peer (p2p) networking technologies have gained popularity as a mechanism for users to share files without the need for centralized servers. A p2p network provides a scalable and fault-tolerant mechanism to locate nodes anywhere on a network without maintaining a large amount of routing state. This allows for a variety of applications beyond simple file sharing. Examples include multicast systems, anonymous communications systems, and web caches. We survey security issues that occur in the underlying p2p routing protocols, as well as fairness and trust issues that occur in file sharing and other p2p applications. We discuss how techniques, ranging from cryptography, to random network probing, to economic incentives, can be used to address these problems.
Dan Wallach (Rice)
November 14 A Retrospective on
Robert Grimm (NYU)
November 21 Making Gnutella-like P2P Systems Scalable
Yatin Chawathe, Sylvia Ratnasamy, Lee Breslau, Nick Lanham, Scott Shenker.
Bernard Wong
November 28
No meeting, Happy Thanksgiving.
December 5 Staged Simulation: A General Technique for Improving Simulation Scale and Performance
Walsh and Sirer
Winter Simulation Conference
Kevin Walsh