Cornell Systems LunchCS 754 Fall 2003
|
Sponsored by the
Information Assurance Institute (IAI),
|
||
The Systems Lunch is a seminar for discussing recent, interesting papers in the systems area, broadly defined to span operating systems, distributed systems, networking, architecture, databases, and programming languages. The goal is to foster technical discussions among the Cornell systems research community. This fall, the Systems Lunch will focus on interesting papers from the upcoming SOSP, and recent Mobisys and Oakland conferences. We will meet once a week on Fridays at noon in Rhodes 655.
The systems lunch is open to all Cornell students interested in systems. First-year graduate students are especially welcome. Student participants are expected to sign up for CS 754, Systems Research Seminar, for one credit.
Date | Paper | Presenter |
---|---|---|
August 29 | Analysis of an Electronic Voting System
Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, Dan S. Wallach |
Tom Roeder |
September 5 | Improving the Reliability of Commodity Operating Systems
Michael M. Swift, Brian N. Bershad, Henry M. Levy SOSP |
Vivek Vishnumurthy |
September 12 | Mobile Computing Technologies from Microsoft Researchers &
Product Teams
|
John SanGiovanni (MSR) |
September 19 | Measurement, Modeling, and Analysis of a Peer-to-Peer File-Sharing Workload
Krishna P. Gummadi, Richard J. Dunn, Stefan Saroiu, Steven D. Gribble, Henry M. Levy, John Zahorjan SOSP |
Filip Radlinski |
September 26 | Terra: A Virtual-Machine Based Platform for Trusted Computing
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, Dan Boneh Implementing an Untrusted Operating System on Trusted Hardware David Lie, Chandramohan A. Thekkath, Mark Horowitz SOSP | Michael Clarkson & Dan Williams |
October 3 | User-level Internet Path Diagnosis
Ratul Mahajan, Neil Spring, David Wetherall, Thomas Anderson SOSP |
Saikat Guha |
October 10 |
Bullet: High Bandwidth Data Dissemination Using an Overlay Mesh
Dejan Kostic, Adolfo Rodriguez, Jeannie Albrecht, and Amin Vahdat SOSP |
Fan Yang |
October 17 | Upgrading Transport Protocols using Untrusted Mobile Code
Parveen Patel, Andrew Whitaker, David Wetherall, Jay Lepreau, Tim Stack SOSP |
Mohamed Elhawary |
October 24 | Beehive: Exploiting Power Law Query Distributions for O(1) Lookup Performance in Peer to Peer Overlays
Venugopalan Ramasubramanian and Emin Gun Sirer NSDI 2004 |
Rama |
October 31 | Protecting Applications with Transient Authentication
Corner and Noble Mobisys 2003 |
Vidhyashankar Venkataraman |
November 7 | A Survey of Peer-to-Peer Security Issues
Peer-to-peer (p2p) networking technologies have gained popularity as a mechanism for users to share files without the need for centralized servers. A p2p network provides a scalable and fault-tolerant mechanism to locate nodes anywhere on a network without maintaining a large amount of routing state. This allows for a variety of applications beyond simple file sharing. Examples include multicast systems, anonymous communications systems, and web caches. We survey security issues that occur in the underlying p2p routing protocols, as well as fairness and trust issues that occur in file sharing and other p2p applications. We discuss how techniques, ranging from cryptography, to random network probing, to economic incentives, can be used to address these problems. |
Dan Wallach (Rice) |
November 14 | A Retrospective on one.world |
Robert Grimm (NYU) |
November 21 | Making Gnutella-like P2P Systems Scalable
Yatin Chawathe, Sylvia Ratnasamy, Lee Breslau, Nick Lanham, Scott Shenker. SIGCOMM |
Bernard Wong |
November 28 | No meeting, Happy Thanksgiving. |
- |
December 5 | Staged Simulation: A General Technique for Improving Simulation Scale and Performance
Walsh and Sirer Winter Simulation Conference |
Kevin Walsh |