Check out the new USENIX Web site.
2004 USENIX Annual Technical Conference, June 27-July 2, 2004, Boston Marriott Copley Place, Boston, MA
USENIX '03 Home  | USENIX Home  | Events  | Publications  | Membership








Open Sessions











Complete Technical Sessions
By Day: Monday | Tuesday | Wednesday | Thursday | Friday
By Session: General Sessions | FREENIX | SIGs | Guru Is In | WiPs

Location: General Sessions will take place in Salon E.

Monday, June 28
8:45 a.m.–9:00 a.m. Monday

Opening Remarks & Awards
Andrea Arpaci-Dusseau and Remzi Arpaci-Dusseau, University of Wisconsin, Madison

9:00 a.m.–10:00 a.m. Monday
Plenary Session
Open Source and Proprietary Software: A Blending of Cultures
Alan Nugent, VP & CTO, Novell
MP3 IconListen in MP3 format
Linux/Open Source

As a 20-year provider of proprietary software for the enterprise market, Novell has built products and a culture around proprietary (or closed) software. Within the last 18 months, we have embraced open source development and Linux and have injected them into our corporate DNA. While different, the two approaches are not mutually exclusive. In fact, I would argue embracing open source as a proprietary company is more straightforward than an open source company trying to move "up the stack." In this talk I will examine the myths, challenges, and opportunities for companies attempting to understand the best of both worlds.

Alan F. Nugent serves as chief technology officer of Novell. Prior to Novell, Alan was the Managing Partner, Technology, at Palladian Partners. Mr. Nugent has successfully led many different technology organizations. He serves on the Board of Directors and on the Technical Committee for the Object Management Group and is a widely respected writer and speaker on OT, BPR, and Information Management. He sits on the board of directors of several technology startup companies.

10:00 a.m.–10:30 a.m.   Break  
10:30 a.m.–12:00 p.m. Monday
Instrumentation and Debugging
Session Chair: Val Henson, Sun Microsystems
Making the "Box" Transparent: System Call Performance as a First-Class Result
Yaoping Ruan and Vivek Pai, Princeton University

Dynamic Instrumentation of Production Systems
Bryan M. Cantrill, Michael W. Shapiro, and Adam H. Leventhal, Sun Microsystems

Flashback: A Lightweight Extension for Rollback and Deterministic Replay for Software Debugging
Sudarshan M. Srinivasan, Srikanth Kandula, Christopher R. Andrews, and Yuanyuan Zhou, University of Illinois, Urbana-Champaign

12:00 p.m.–1:30 p.m.   Lunch (on your own)  
1:30 p.m.–3:00 p.m. Monday
Swimming in a Sea of Data
Session Chair: Yuanyuan Zhou, UIUC
Email Prioritization: Reducing Delays on Legitimate Mail Caused by Junk Mail
Dan Twining, Matthew M. Williamson, Miranda J. F. Mowbray, and Maher Rahmouni, Hewlett-Packard Labs

Redundancy Elimination Within Large Collections of Files
Purushottam Kulkarni, University of Massachusetts; Fred Douglis, Jason LaVoie, and John M. Tracey, IBM T.J. Watson

Alternatives for Detecting Redundancy in Storage Systems Data
Calicrates Policroniades and Ian Pratt, Cambridge University

3:00 p.m.–3:30 p.m.   Break  
3:30 p.m.–5:00 p.m. Monday
Network Performance
Session Chair: Carl Staelin, HP Labs
Networking Sysadmin
Monkey See, Monkey Do: A Tool for TCP Tracing and Replaying
Yu-Chung Cheng, University of California, San Diego; Urs Hölzle and Neal Cardwell, Google; Stefan Savage and Geoffrey M. Voelker, University of California, San Diego

A Transport Layer Approach for Improving End-to-End Performance and Robustness Using Redundant Paths
Ming Zhang and Junwen Lai, Princeton University; Arvind Krishnamurthy, Yale University; Larry Peterson and Randolph Wang, Princeton University

Multihoming Performance Benefits: An Experimental Evaluation of Practical Enterprise Strategies
Aditya Akella and Srinivasan Seshan, Carnegie Mellon University; Anees Shaikh, IBM T.J. Watson

Tuesday, June 29
9:00 a.m.–10:00 a.m. Tuesday
Plenary Session
Network Complexity: How Do I Manage All of This? (PDF)
Eliot Lear, Corporate Irritant, Cisco Systems
MP3 IconListen in MP3 format
Networking Security Sysadmin

In the evolution of computers and networks, we have developed complex mechanisms to manage one, the other, or both. We organize teams based on technology or task, only to find that the tools they use converge at times and then diverge again. I'll discuss the latest convergences in the context of distributed systems management, network management, security, and voice in a world of ISPs, ASPs, Web services. It all boils down to this: why can't we manage the network just like one large UNIX box?

Eliot Lear started his career developing distributed management tools for UNIX in 1987 at Rutgers University. From 1991 through 1998 he was part of a team that ran a large computer manufacturer network. Since 1998, Eliot has been the Corporate Irritant of Cisco Systems, focusing on the area of network management, network applications, and cross-functional integration.

10:00 a.m.–10:30 a.m.   Break  
10:30 a.m.–12:00 p.m. Tuesday
Overlays in Practice
Session Chair: Fred Douglis, IBM Research
Networking Sysadmin
Awarded Best Paper!
Handling Churn in a DHT
Sean Rhea and Dennis Geels, University of California, Berkeley; Timothy Roscoe, Intel Research, Berkeley; John Kubiatowicz, University of California, Berkeley

A Network Positioning System for the Internet
T.S. Eugene Ng, Rice University; Hui Zhang, Carnegie Mellon University

Early Experience with an Internet Broadcast System Based on Overlay Multicast
Yang-hua Chu and Aditya Ganjam, Carnegie Mellon University; T.S. Eugene Ng, Rice University; Sanjay G. Rao, Kunwadee Sripanidkulchai, Jibin Zhan, and Hui Zhang, Carnegie Mellon University

12:00 p.m.–1:30 p.m.   Lunch (on your own)  
1:30 p.m.–3:00 p.m. Tuesday
Secure Services
Session Chair: Atul Adya, Microsoft Research
Reliability and Security in the CoDeeN Content Distribution Network
Limin Wang, KyoungSoo Park, Ruoming Pang, Vivek Pai, and Larry Peterson, Princeton University

Building Secure High-Performance Web Services with OKWS
Maxwell Krohn, MIT

REX: Secure, Extensible Remote Execution
Michael Kaminsky and Eric Peterson, MIT; Daniel B. Giffin, NYU; Kevin Fu, MIT; David Mazières, NYU; M. Frans Kaashoek, MIT

3:00 p.m.–3:30 p.m.   Break  
3:30 p.m.–5:00 p.m. Tuesday
The Network-Application Interface
Session Chair: Vivek Pai, Princeton University
Coding Networking
Network Subsystems Reloaded: A High-Performance, Defensible Network Subsystem
Anshumal Sinha, Sandeep Sarat, and Jonathan S. Shapiro, Johns Hopkins University

accept()able Strategies for Improving Web Server Performance
Tim Brecht, David Pariag, and Louay Gammo, University of Waterloo

Lazy Asynchronous I/O for Event-Driven Servers
Khaled Elmeleegy, Anupam Chanda, and Alan L. Cox, Rice University; Willy Zwaenepoel, EPFL, Lausanne

5:15 p.m.–6:00 p.m. Tuesday
Work-in-Progress Reports (WiPs)

Session Chair: Vivek Pai, Princeton University

Short, pithy, and fun, Work-in-Progress reports introduce interesting new or ongoing work. If you have work you would like to share or a cool idea that's not quite ready for publication, send a one- to two-page summary (in PDF format) to We are particularly interested in presenting students' work. A schedule of presentations will be posted at the conference, and the speakers will be notified in advance. Work-in-Progress reports are five-minute presentations; the time limit will be strictly enforced.

Submissions are due by 11:59 p.m. EST, May 27.

Wednesday, June 30
9:00 a.m.–10:00 a.m. Wednesday
Plenary Session
Thinking Sensibly About Security in an Uncertain World

Bruce Schneier, Counterpane Internet Security, Inc.
MP3 IconListen in MP3 format

All security decisions involve trade-offs: how much security you get, and what you give up to get it. When we decide whether to walk down a dimly lit street, purchase a home burglar alarm system, or implement an airline passenger profiling system, we're making a security trade-off. Everyone makes these trade-offs all the time. It's intuitive and natural, and fundamental to being alive. But paradoxically, people are astonishingly bad at making rational decisions about these trade-offs.

Security expert Bruce Schneier discusses this notion of security trade-offs and how we are all "security consumers." He makes use of a five-step process to explicate these intuitive trade-offs and shows how the process can be applied to decisions both small and large. Learn how security works in the real world, and what you can do to get the security you want . . . not the security that is forced upon you.

Internationally renowned security expert Bruce Schneier has written eight books, including Beyond Fear and Secrets and Lies, as well as the Blowfish and Twofish encryption algorithms. Schneier has appeared on numerous television and radio programs, has testified before Congress, and is a frequent writer and lecturer on issues surrounding security and privacy.

10:00 a.m.–10:30 a.m.   Break  
10:30 a.m.–12:00 p.m. Wednesday
Session Chair: Scott F. Kaplan, Amherst
Awarded Best Paper!
Energy Efficient Prefetching and Caching
Athanasios E. Papathanasiou and Michael L. Scott, University of Rochester

Time-based Fairness Improves Performance in Multi-Rate WLANs
Godfrey Tan and John Guttag, MIT

EmStar: A Software Environment for Developing and Deploying Wireless Sensor Networks
Lewis Girod, Jeremy Elson, Alberto Cerpa, Thanos Stathopoulos, Nithya Ramanathan, and Deborah Estrin, University of California, Los Angeles

?Need help? Use our Contacts page.

Last changed: 19 Oct. 2007 ac