4104 Upson Hall
Computer Science Department
Ithaca, NY 14853
I graduated! My Cornell Ph.D. was conferred in January 2013. From June 2010 onwards, I'd been on an extended internship at the IBM T. J. Watson Research Center. Now I am a Research Staff Member at Watson.
My research interests center around the development of cloud software, hypervisors, and operating system kernels.
My Ph.D. thesis research, advised by Hakim Weatherspoon at Cornell and Hani Jamjoom at IBM , focused on how to efficiently deploy large systems on clouds irrespective of whether they are public, private or a mixture of both. In particular, I investigated how to safely reduce under-utilization of resources through oversubscription with Overdriver, and addressed the inflexibility of today's cloud services with the Xen-Blanket.
Also at Cornell, I helped build the Nexus operating system from scratch and researched operating system mechanisms to support trustworthy computing; in particular, how to reduce the trusted computing base (TCB).
Shriram Rajagopalan, Dan Williams, and Hani Jamjoom. Pico Replication: A High Availability Framework for Middleboxes. (To Appear) In Proceedings of ACM SOCC, Santa Clara, CA, October 2013.
Dan Williams and Hani Jamjoom. Cementing High Availability in OpenFlow with RuleBricks. In Proceedings of ACM SIGCOMM HotSDN, Hong Kong, August 2013.
Vasileios Pappas, Hani Jamjoom and Dan Williams. AIN: A Blueprint for an All-IP Data Center Network. In Proceedings of USENIX HotCloud, San Jose, CA, June 2013.
Shriram Rajagopalan, Dan Williams, Hani Jamjoom, and Andrew Warfield. Escape Capsule: Explicit State Is Robust and Scalable. In Proceedings of USENIX HotOS, Santa Ana Pueblo, NM, May 2013.
Zuhair Khayyat, Karim Awara, Amani Alonazi, Hani Jamjoom, Dan Williams, and Panos Kalnis. Mizan: A System for Dynamic Load Balancing in Large-scale Graph Processing. In Proceedings of ACM EuroSys, Prague, Czech Republic, April 2013.
Shriram Rajagopalan, Dan Williams, Hani Jamjoom, and Andrew Warfield. Split/Merge: System Support for Elastic Execution in Virtual Middleboxes. In Proceedings of USENIX NSDI, Lombard, IL, April 2013.
Dan Williams, Hani Jamjoom, and Hakim Weatherspoon. Plug into the Supercloud. In IEEE Internet Computing Special Issue on Virtualization, March-April 2013 (vol. 17 no. 2).
Dan Williams, Hani Jamjoom, and Hakim Weatherspoon. The Xen-Blanket: Virtualize Once, Run Everywhere. In Proceedings of ACM EuroSys, Bern, Switzerland, April 2012.
Emin Gün Sirer, Willem de Bruijn, Patrick Reynolds, Alan Shieh, Kevin Walsh, Dan Williams, and Fred B. Schneider. Logical Attestation: An Authorization Architecture for Trustworthy Computing. In Proceedings of ACM SOSP, Cascais, Portugal, October 2011.
Dan Williams, Eslam Elnikety, Mohamed Eldehiry, Hani Jamjoom, Hai Huang, and Hakim Weatherspoon. Unshackle the Cloud! In Proceedings of USENIX HotCloud, Portland, OR, June 2011.
Dan Williams, Hani Jamjoom, Yew-Huey Liu, and Hakim Weatherspoon. Overdriver: Handling Memory Overload in an Oversubscribed Cloud. In Proceedings of ACM VEE, Newport Beach, CA, March 2011.
Dan Williams, Hani Jamjoom, Yew-Huey Liu, and Hakim Weatherspoon. Overdriver: Enabling High Data Center Utilization Through Aggressive Memory Oversubscription (invited talk). In INFORMS 2010 Cloud Computing Cluster, Austin, TX, November 2010.
Dan Williams, Patrick Reynolds, Kevin Walsh, Emin Gün Sirer, and Fred B. Schneider. Device Driver Safety Through a Reference Validation Mechanism . In Proceedings of USENIX OSDI, San Diego, CA, December 2008.
Alan Shieh, Dan Williams, Kevin Walsh, Oliver Kennedy, Patrick Reynolds, Emin Gün Sirer, and Fred B. Schneider. Nexus: A New Operating System for Building Trustworthy Applications (poster). In Proceedings of USENIX NSDI, Cambridge, MA, April 2007.
Alan Shieh, Dan Williams, Emin Gün Sirer, and Fred B. Schneider. Nexus: A New Operating System For Trustworthy Computing (extended abstract) . In Proceedings of ACM SOSP, Brighton, UK, October 2005.
Dan Williams and Emin Gün Sirer. Optimal Parameter Selection for Efficient Memory Integrity Verification Using Merkle Hash Trees. In Proceedings of IEEE (NCA) - Trustworthy Network Computing Workshop, Cambridge, MA, August 2004.