Cornell Systems Lunch

Spring 2002

Emin Gun Sirer and Andrew Myers

Sponsored by the Information Assurance Institute (IAI),
Computing and Information Science, Cornell

This spring, we will continue to read recent papers in systems, particularly in operating systems, P2P distributed systems, networking and security.

We will meet once a week on mondays at noon in the systems lab (Upson 331). We are planning to offer free lunch for the participants, contingent upon their participation in the paper discussion (i.e. there is no such thing as a free lunch).

The systems lunch is open to all Cornell students interested in systems. First-year graduate students are especially welcome.

Past systems seminars: Fall 01


Date Paper Presenter
January 21 Programming for Pervasive Computing Environments
Robert Grimm, Janet Davis, Eric Lemar, Adam MacBeth, Steven Swanson, Steven Gribble, Tom Anderson, Brian Bershad, Gaetano Borriello, David Wetherall.
Technical report UW-CSE-01-06-01, University of Washington, Department of Computer Science and Engineering, June 2001.
Dan Grossman
January 28 Application-level Multicast using Content-Addressable Networks.
S. Ratnasamy, M. Handley, S. Shenker, and R. Karp.
International Workshop on Networked Group Communication 2001.
Dan Kifer
February 8 An Architecture for Content Routing Support in the Internet
Mark Gritter and David R. Cheriton.
USITS 2001
February 15 COCA: A Secure Distributed On-Line Certification Authority
Lidong Zhou, Fred B. Schneider and Robbert van Renesse
February 22 Measurement and Analysis of a Streaming-Media Workload
Maureen Chesire and Alec Wolman, Geoffrey M. Voelker, Henry M. Levy.
USITS 2001
Mike Marsh
March 1 Secure gossip. Yaron Minsky and Fred B. Schneider.
Additional papers:
Failure detectionvan Renesse, Minsky and Hayden.
Set Reconciliation Minsky, Trachtenberg, Zippel.
Yaron Minsky
March 8 Bayeux: An Architecture for Wide-Area, Fault-Tolerant Data Dissemination
Shelley Zhuang (University of California-Berkeley), Ben Zhao (University of California-Berkeley), Anthony D. Joseph (University of California at Berkeley), Randy H. Katz (University of California at Berkeley), John Kubiatowicz (University of California-Berkeley)
March 15 Hash-Based IP Traceback
Alex C. Snoeren (MIT), Craig Partridge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio, Stephen T. Kent, W. Timothy Strayer (BBN Technologies)
March 22 Spring break, no meeting.
March 29 Mostly-copying Reachability-based Orthogonal Persistence Antony L. Hosking, Jiawan Chen
Nate Nystrom
April 5 On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets
Kihong Park, Heejo Lee (Purdue University).
Lantian Zheng
April 12 ACSU/Faculty Lunch. No presenter.
April 19 Intercepting Mobile Communications: The Insecurity of 802.11
Nikita Borisov, Ian Goldberg, David Wagner
Mobicom 2001
Dos and Donts of Client Authentication on the Web
Kevin Fu, Emil Sit, Kendra Smith, and Nick Feamster.
USENIX Security Symposium 2001.
Yanling Wang & Ke Wang
April 26 Speculative Precomputation: Long-range Prefetching of Delinquent Loads
Jamison D. Collins, Hong Wang, Dean M. Tullsen, Christopher Hughes,
Yong-Fong Lee, Dan Lavery, and John P. Shen. ISCA 2001
Mainak Chaudhuri
May 3 Protium, an Infrastructure for Partitioned Applications
Cliff Young, Y. N. Lakshman, Tom Szymanski, John Reppy, David Presotto, Rob Pike, Girija Narlikar, Sape Mullender and Eric Grosse
HOTOS 2002.
Rimon Barr