Cornell Systems Lunch
CS 754 Fall 2003
Sponsored by the
Information Assurance Institute (IAI),
The Systems Lunch is a seminar for discussing recent, interesting papers in the systems area, broadly defined to span operating systems, distributed systems, networking, architecture, databases, and programming languages. The goal is to foster technical discussions among the Cornell systems research community. This fall, the Systems Lunch will focus on interesting papers from the upcoming SOSP, and recent Mobisys and Oakland conferences. We will meet once a week on Fridays at noon in Rhodes 655.
The systems lunch is open to all Cornell students interested in systems. First-year graduate students are especially welcome. Student participants are expected to sign up for CS 754, Systems Research Seminar, for one credit.
|August 29||Analysis of an Electronic Voting System
Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, Dan S. Wallach
|September 5||Improving the Reliability of Commodity Operating Systems
Michael M. Swift, Brian N. Bershad, Henry M. Levy
|September 12||Mobile Computing Technologies from Microsoft Researchers &
||John SanGiovanni (MSR)|
|September 19||Measurement, Modeling, and Analysis of a Peer-to-Peer File-Sharing Workload
Krishna P. Gummadi, Richard J. Dunn, Stefan Saroiu, Steven D. Gribble, Henry M. Levy, John Zahorjan
|September 26||Terra: A Virtual-Machine Based Platform for Trusted Computing
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, Dan Boneh
Implementing an Untrusted Operating System on Trusted Hardware
David Lie, Chandramohan A. Thekkath, Mark Horowitz
|Michael Clarkson & Dan Williams|
|October 3||User-level Internet Path Diagnosis
Ratul Mahajan, Neil Spring, David Wetherall, Thomas Anderson
Bullet: High Bandwidth Data Dissemination Using an Overlay Mesh
Dejan Kostic, Adolfo Rodriguez, Jeannie Albrecht, and Amin Vahdat
|October 17||Upgrading Transport Protocols using Untrusted Mobile Code
Parveen Patel, Andrew Whitaker, David Wetherall, Jay Lepreau, Tim Stack
|October 24||Beehive: Exploiting Power Law Query Distributions for O(1) Lookup Performance in Peer to Peer Overlays
Venugopalan Ramasubramanian and Emin Gun Sirer
|October 31||Protecting Applications with Transient Authentication
Corner and Noble
|November 7||A Survey of Peer-to-Peer Security Issues
Peer-to-peer (p2p) networking technologies have gained popularity as a mechanism for users to share files without the need for centralized servers. A p2p network provides a scalable and fault-tolerant mechanism to locate nodes anywhere on a network without maintaining a large amount of routing state. This allows for a variety of applications beyond simple file sharing. Examples include multicast systems, anonymous communications systems, and web caches. We survey security issues that occur in the underlying p2p routing protocols, as well as fairness and trust issues that occur in file sharing and other p2p applications. We discuss how techniques, ranging from cryptography, to random network probing, to economic incentives, can be used to address these problems.
|Dan Wallach (Rice)|
|November 14||A Retrospective on one.world
||Robert Grimm (NYU)|
|November 21||Making Gnutella-like P2P Systems Scalable
Yatin Chawathe, Sylvia Ratnasamy, Lee Breslau, Nick Lanham, Scott Shenker.
No meeting, Happy Thanksgiving.
|December 5||Staged Simulation: A General Technique for Improving Simulation Scale and Performance
Walsh and Sirer
Winter Simulation Conference