Cornell Systems Lunch

CS 754 Fall 2006
Friday 12PM, Upson 315

E. Gün Sirer and Andrew Myers


Sponsored by the Information Assurance Institute (IAI),
Computing and Information Science, Cornell

The Systems Lunch is a seminar for discussing recent, interesting papers in the systems area, broadly defined to span operating systems, distributed systems, networking, architecture, databases, and programming languages. The goal is to foster technical discussions among the Cornell systems research community. We meet once a week on Fridays at noon in Upson 315.

The systems lunch is open to all Cornell students interested in systems. First-year graduate students are especially welcome. Student participants are expected to sign up for CS 754, Systems Research Seminar, for one credit.

Date Paper Presenter
August 25 Pip: Detecting the Unexpected in Distributed Systems
Patrick Reynolds, Charles Killian, Janet L. Wiener, Jeffrey C. Mogul, Mehul A. Shah, and Amin Vahdat
NSDI 2006
Patrick Reynolds
September 01 An Architecture for Internet Data Transfer
Niraj Tolia, Michael Kaminsky, David G. Andersen and Swapnil Patil
NSDI 2006
Yeejiun Song
September 08 OCALA: An Architecture for Supporting Legacy Applications over Overlays
Dilip Joseph, Jayanth Kannan, Ayumu Kubota, Karthik Lakshminarayanan, Ion Stoica, and Klaus Wehrle
NSDI 2006
Ryan Peterson
September 15 Geographic Routing Without Planarization
Ben Leong, Barbara Liskov and Robert Morris
NSDI 2006
Tudor Marian
September 22 Subtleties in Tolerating Correlated Failures in Wide-area Storage Systems
Suman Nath, Haifeng Yu, Phillip B. Gibbons, Srinivasan Seshan
NSDI 2006
Kelvin So
September 29 Fundamental Limits on the Anonymity Provided by the MIX Technique
Dakshi Agrawal, Dogan Kesdogan, Vinh Pham, Dieter Rautenbach
Oakland 2006
Ian Kash
October 06 SafeDrive: Safe and Recoverable Extensions Using Language-Based Techniques
Feng Zhou, Jeremy Condit, Zachary Anderson, and Ilya Bagrak, Rob Ennals, Matthew Harren, George C. Necula, and Eric Brewer
OSDI 2006
Bruno Abrahao
October 13 Open Versus Closed: A Cautionary Tale
Bianca Schroeder, Adam Wierman, and Mor Harchol-Balter
NSDI 2006
Mahesh Balakrishnan
October 20 An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data
Nick L. Petroni, Jr., Timothy Fraser, AAron Walters, William A. Arbaugh
USENIX Security 2006
Alan Shieh
October 27 N-Variant Systems: A Secretless Framework for Security through Diversity
Benjamin Cox, David Evans, Adrian Filipi, Jonathan Rowanhill, Wei Hu, Jack Davidson, John Knight, Anh Nguyen-Tuong, and Jason Hiser
USENIX Security 2006
Chi Ho
November 03 Chunkyspread: Heterogeneous Unstructured End System Multicast
Vidhyashankar Venkataraman, Kaoru Yoshida, Paul Francis
ICNP 2006
Vidhyashankar Venkataraman
November 10 Scaling Global IP Routing with the Core Router-Integrated Overlay
X. Zhang, P. Francis, J. Wang, K. Yoshida
ICNP 2006
Joy Zhang
November 17 vTPM: Virtualizing the Trusted Platform Module
Stefan Berger, Ramon Caceres, Kenneth A. Goldman, Ronald Perez, Reiner Sailer, and Leendert van Doorn
USENIX Security 2006
Oliver Kennedy
November 24 Happy Thanksgiving, no meeting.
December 01 Lessons from the Sony CD DRM Episode
J. Alex Halderman and Edward W. Felten
USENIX Security 2006
Michael Clarkson