TECHNICAL SESSIONS

Tech Sessions: Wednesday, April 11 | Thursday, April 12 | Friday, April 13
Wednesday, April 11

8:45 a.m.–9:00 a.m. Wednesday
Opening Remarks
Program Chairs: Hari Balakrishnan, Massachusetts Institute of Technology; Peter Druschel, Max Planck Institute for Software Systems

MP3 IconListen in MP3 format


9:00 a.m.–10:00 a.m. Wednesday
Keynote Address
Security of Voting Systems

Ronald L. Rivest, Viterbi Professor of Computer Science, Massachusetts Institute of Technology

MP3 IconListen in MP3 format

While running an election sounds simple, it is in fact extremely challenging. Not only are there millions of voters to be authenticated and millions of votes to be carefully collected, counted, and stored, there are now millions of "voting machines" containing millions of lines of code to be evaluated for security vulnerabilities. Moreover, voting systems have a unique requirement: the voter must not be given a "receipt" that would allow them to prove how they voted to someone else—otherwise the voter could be coerced or bribed into voting a certain way. This lack of receipts makes the security of voting system much more challenging than, say, the security of banking systems (where receipts are the norm).

We discuss some of the recent trends and innovations in voting systems, as well as some of the new requirements being placed upon voting systems in the U.S., and describe some promising directions for resolving the conflicts inherent in voting system requirements, including some approaches based on cryptography. We'll also briefly discuss "Internet voting."

10:00 a.m.–10:30 a.m.    Break
10:30 a.m.–noon Wednesday
Content Delivery
Session Chair: Petros Maniatis, Intel Research, Berkeley

Awarded Best Student Paper!
Do Incentives Build Robustness in BitTorrent?
Michael Piatek, Tomas Isdal, Thomas Anderson, and Arvind Krishnamurthy, University of Washington; Arun Venkataramani, University of Massachusetts Amherst

Exploiting Similarity for Multi-Source Downloads Using File Handprints
Himabindu Pucha, Purdue University; David G. Andersen, Carnegie Mellon University; Michael Kaminsky, Intel Research Pittsburgh

Cobra: Content-based Filtering and Aggregation of Blogs and RSS Feeds
Ian Rose, Rohan Murty, Peter Pietzuch, Jonathan Ledlie, Mema Roussopoulos, and Matt Welsh, Harvard University

noon–1:30 p.m.    Symposium Luncheon
1:30 p.m.–3:00 p.m. Wednesday
Overlays and Multicast
Session Chair: Alex Snoeren, University of California, San Diego

Information Slicing: Anonymity Using Unreliable Overlays
Sachin Katti, Jeff Cohen, and Dina Katabi, Massachusetts Institute of Technology

SAAR: A Shared Control Plane for Overlay Multicast
Animesh Nandi, Rice University and Max Planck Institute for Software Systems; Aditya Ganjam, Carnegie Mellon University; Peter Druschel, Max Planck Institute for Software Systems; T.S. Eugene Ng, Rice University; Ion Stoica, University of California, Berkeley; Hui Zhang, Carnegie Mellon University; Bobby Bhattacharjee, University of Maryland

Ricochet: Lateral Error Correction for Time-Critical Multicast
Mahesh Balakrishnan and Ken Birman, Cornell University; Amar Phanishayee, Carnegie Mellon University; Stefan Pleisch, Cornell University

3:00 p.m.–3:30 p.m.    Break
3:30 p.m.–5:00 p.m. Wednesday
Wireless
Session Chair: Brad Karp, University College, London

WiLDNet: Design and Implementation of High Performance WiFi Based Long Distance Networks
Rabin Patra and Sergiu Nedevschi, University of California, Berkeley, and Intel Research, Berkeley; Sonesh Surana, University of California, Berkeley; Anmol Sheth, University of Colorado, Boulder; Lakshminarayanan Subramanian, New York University; Eric Brewer, University of California, Berkeley, and Intel Research, Berkeley

S4: Small State and Small Stretch Routing Protocol for Large Wireless Sensor Networks
Yun Mao, University of Pennsylvania; Feng Wang, Lili Qiu, and Simon S. Lam, The University of Texas at Austin; Jonathan M. Smith, University of Pennsylvania

A Location-Based Management System for Enterprise Wireless LANs
Ranveer Chandra, Jitendra Padhye, Alec Wolman, and Brian Zill, Microsoft Research

6:00 p.m.–8:00 p.m. Wednesday
Reception and Poster Session
Poster Session Chairs: Krishna Gummadi, Max Planck Institute for Software Systems; Jinyang Li, New York University

See the list of accepted posters.

Tech Sessions: Wednesday, April 11 | Thursday, April 12 | Friday, April 13
Thursday, April 12

9:00 a.m.–10:30 a.m. Thursday
Tolerating Faults and Misbehavior
Session Chair: Emin Gün Sirer, Cornell University

Beyond One-Third Faulty Replicas in Byzantine Fault Tolerant Systems
Jinyuan Li, VMware, Inc.; David Mazières, Stanford University

Ensuring Content Integrity for Untrusted Peer-to-Peer Content Distribution Networks
Nikolaos Michalakis, Robert Soulé, and Robert Grimm, New York University

TightLip: Keeping Applications from Spilling the Beans
Aydan R. Yumerefendi, Benjamin Mickle, and Landon P. Cox, Duke University

10:30 a.m.–11:00 a.m.    Break
11:00 a.m.–noon Thursday
Network Measurement
Session Chair: Jinyang Li, New York University Peering Through the Shroud: The Effect of Edge Opacity on IP-Based Client Identification
Martin Casado and Michael J. Freedman, Stanford University

A Systematic Framework for Unearthing the Missing Links: Measurements and Impact
Yihua He, Georgos Siganos, Michalis Faloutsos, and Srikanth Krishnamurthy, University of California, Riverside

noon–1:30 p.m.    Symposium Luncheon
1:30 p.m.–3:00 p.m. Thursday
Emulation and Virtualization
Session Chair: Peter Druschel, Max Planck Institute for Software Systems

The Flexlab Approach to Realistic Evaluation of Networked Systems
Robert Ricci, Jonathon Duerig, Pramod Sanaga, Daniel Gebhardt, Mike Hibler, Kevin Atkinson, Junxing Zhang, Sneha Kasera, and Jay Lepreau, University of Utah

An Experimentation Workbench for Replayable Networking Research
Eric Eide, Leigh Stoller, and Jay Lepreau, University of Utah

Black-box and Gray-box Strategies for Virtual Machine Migration
Timothy Wood, Prashant Shenoy, and Arun Venkataramani, University of Massachusetts Amherst; Mazin Yousif, Intel, Portland

3:00 p.m.–3:30 p.m.    Break
3:30 p.m.–5:30 p.m. Thursday
Debugging and Diagnosis
Session Chair: Mike Dahlin, University of Texas at Austin

Awarded Best Paper!
Life, Death, and the Critical Transition: Finding Liveness Bugs in Systems Code
Charles Killian, James W. Anderson, Ranjit Jhala, and Amin Vahdat, University of California, San Diego

WiDS Checker: Combating Bugs in Distributed Systems
Xuezheng Liu, Wei Lin, Aimin Pan, and Zheng Zhang, Microsoft Research Asia

X-Trace: A Pervasive Network Tracing Framework
Rodrigo Fonseca, George Porter, Randy H. Katz, Scott Shenker, and Ion Stoica, University of California, Berkeley

Friday: Global Comprehension for Distributed Replay
Dennis Geels, Google, Inc.; Gautam Altekar, University of California at Berkeley; Petros Maniatis, Intel Research Berkeley; Timothy Roscoe, ETH Zürich; Ion Stoica, University of California at Berkeley

Tech Sessions: Wednesday, April 11 | Thursday, April 12 | Friday, April 13
Friday, April 13

9:00 a.m.–10:00 a.m. Friday
Network Localization
Session Chair: Eugene Ng, Rice University

Network Coordinates in the Wild
Jonathan Ledlie, Harvard University; Paul Gardner, Aelitis; Margo Seltzer, Harvard University

Octant: A Comprehensive Framework for the Geolocalization of Internet Hosts
Bernard Wong, Ivan Stoyanov, and Emin Gün Sirer, Cornell University

10:00 a.m.–10:30 a.m.    Break
10:30 a.m.–12:30 p.m. Friday
Internet Infrastructure
Session Chair: Krishna Gummadi, Max Planck Institute for Software Systems

dFence: Transparent Network-based Denial of Service Mitigation
Ajay Mahimkar, Jasraj Dange, Vitaly Shmatikov, Harrick Vin, and Yin Zhang, The University of Texas at Austin

R-BGP: Staying Connected in a Connected World
Nate Kushman, Srikanth Kandula, and Dina Katabi, Massachusetts Institute of Technology; Bruce M. Maggs, Carnegie Mellon University

Mutually Controlled Routing with Independent ISPs
Ratul Mahajan, Microsoft Research; David Wetherall, University of Washington and Intel Research; Thomas Anderson, University of Washington

Tesseract: A 4D Network Control Plane
Hong Yan, Carnegie Mellon University; David A. Maltz, Microsoft Research; T.S. Eugene Ng, Rice University; Hemant Gogineni and Hui Zhang, Carnegie Mellon University; Zheng Cai, Rice University

footer
?Need help? Use our Contacts page.

Last changed: 19 Oct. 2007 ac