Sponsored by the
Information Assurance Institute (IAI),
We will meet once a week on mondays at noon in the systems lab (Upson 331). We are planning to offer free lunch for the participants, contingent upon their participation in the paper discussion (i.e. there is no such thing as a free lunch).
The systems lunch is open to all Cornell students interested in systems. First-year graduate students are especially welcome.
Past systems seminars: Fall 01
|January 21||Programming for Pervasive Computing Environments
Robert Grimm, Janet Davis, Eric Lemar, Adam MacBeth, Steven Swanson, Steven Gribble, Tom Anderson, Brian Bershad, Gaetano Borriello, David Wetherall.
Technical report UW-CSE-01-06-01, University of Washington, Department of Computer Science and Engineering, June 2001.
|January 28||Application-level Multicast using Content-Addressable Networks.
S. Ratnasamy, M. Handley, S. Shenker, and R. Karp.
International Workshop on Networked Group Communication 2001.
An Architecture for Content Routing Support in the Internet
Mark Gritter and David R. Cheriton.
COCA: A Secure Distributed On-Line Certification Authority
Lidong Zhou, Fred B. Schneider and Robbert van Renesse
Measurement and Analysis of a Streaming-Media Workload
Maureen Chesire and Alec Wolman, Geoffrey M. Voelker, Henry M. Levy.
Secure gossip. Yaron Minsky and Fred B. Schneider.
Failure detectionvan Renesse, Minsky and Hayden.
Set Reconciliation Minsky, Trachtenberg, Zippel.
Bayeux: An Architecture for Wide-Area, Fault-Tolerant Data Dissemination
Shelley Zhuang (University of California-Berkeley), Ben Zhao (University of California-Berkeley), Anthony D. Joseph (University of California at Berkeley), Randy H. Katz (University of California at Berkeley), John Kubiatowicz (University of California-Berkeley)
Hash-Based IP Traceback
Alex C. Snoeren (MIT), Craig Partridge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio, Stephen T. Kent, W. Timothy Strayer (BBN Technologies)
|March 22||Spring break, no meeting.|
Antony L. Hosking, Jiawan Chen
On the Effectiveness of Route-Based Packet Filtering for
Distributed DoS Attack Prevention in Power-Law Internets
Kihong Park, Heejo Lee (Purdue University).
|April 12||ACSU/Faculty Lunch.||No presenter.|
Intercepting Mobile Communications: The Insecurity of 802.11
Nikita Borisov, Ian Goldberg, David Wagner
Dos and Donts of Client Authentication on the Web
Kevin Fu, Emil Sit, Kendra Smith, and Nick Feamster.
USENIX Security Symposium 2001.
|Yanling Wang & Ke Wang|
Speculative Precomputation: Long-range Prefetching of Delinquent Loads
Jamison D. Collins, Hong Wang, Dean M. Tullsen, Christopher Hughes,
Yong-Fong Lee, Dan Lavery, and John P. Shen. ISCA 2001
Protium, an Infrastructure for Partitioned Applications
Cliff Young, Y. N. Lakshman, Tom Szymanski, John Reppy, David Presotto, Rob Pike, Girija Narlikar, Sape Mullender and Eric Grosse