Check out the new USENIX Web site.
OSDI '04 Home           USENIX Home           Events           Publications           Membership


Author/Speakers

WORK-IN-PROGRESS REPORTS

Tuesday, December 7, 4:00 pm–5:30 p.m.
Session Chair: Jason Nieh, Columbia University
* denotes speaker

4:00 p.m.
pDNS: Parallelizing DNS Lookups to Improve Performance
Ben Leong* and Barbara Liskov, MIT

4:05 p.m.
Trickles: A Stateless Transport Protocol
Alan Shieh*, Andrew Myers, and Emin Gun Sirer, Cornell

4:10 p.m.
Surviving Internet Catastrophes
Flavio Junqueira*, Ranjita Bhagwan, Alejandro Hevia, Keith Marzullo, and Geoffrey M. Voelker, UC San Diego

4:15 p.m.
Honeycomb: Enabling Structured DHTs to Support High Performance Applications
Venugopalan Ramasubramanian*, Yee Jiun Song, and Emin Gun Sirer, Cornell

4:20 p.m.
PRACTI Replication for Large-Scale Systems
Mike Dahlin, Lei Gao, Amol Nayate*, Arun Venkataramani, Praveen Yalagandula, and Jiandan Zheng, UT Austin

4:25 p.m.
Shruti: Dynamic Adaptation of Aggregation Aggressiveness
Praveen Yalagandula and Mike Dahlin, UT Austin

4:30 p.m.
MOAT: A Multi-Object Assignment Toolkit
Haifeng Yu* and Phillip B. Gibbons, Intel Research Pittsburgh

4:35 p.m.
Causeway: Operating Systems Support for Distributed Resource
Management, Performance Analysis and Security Anupam Chanda*, Khaled Elmeleegy, Nathan Froyd, Alan L. Cox, and John Mellor-Crummey, Rice; Willy Zwaenepoel, EPFL

4:40 p.m.
PLuSH: A Tool for Remote Deployment, Management, and Debugging
Christopher Tuttle*, Jeannie Albrecht, Alex C. Snoeren, and Amin Vahdat, UC San Diego

4:45 p.m.
Using Inferred Emergent Behavior to Automate Resource Management
Patrick Reynolds*, Duke; Janet Wiener, HP Labs; Amin Vahdat, UC San Diego; Jeff Mogul and Marcos Aguilera, HP Labs

4:50 p.m.
Using Access Logs To Detect Application-Level Failures
Peter Bodik*, UC Berkeley; Greg Friedman, Lukas Biewald, and HT Levine Ebates.com; George Candea, Stanford

4:55 p.m.
A Trust-based Model for Collaborative Intrusion Response
Kapil Singh and Norman C. Hutchinson*, U British Columbia

5:00 p.m.
The Ghost of Intrusions Past
Ashlesha Joshi* and Peter M. Chen, U Michigan

5:05 p.m.
SoftwarePot: A Secure Software Circulation System
Yoshihiro Oyama*, U Tokyo and Kazuhiko Kato, U Tsukuba

5:10 p.m.
Implementing an OS Scheduler for Multithreaded Chip Multiprocessors
Alexandra Fedorova*, Harvard and Sun Microsystems; Margo Seltzer Harvard; Christopher Small, Sun Microsystems; Daniel Nussbaum, Sun Microsystems

5:15 p.m.
Charon: A Framework for Automated Kernel Specialization
Mohan Rajagopalan* and Saumya K Debray, U Arizona; Matti A Hiltunen, and Rick D Schlichting, AT&T Labs Research

5:20 p.m.
Java In The Small: Enabling Standard Java on Embedded Devices Through
Customization Alexandre Courbot* and Gilles Grimaud, LIFL; Jean-Jacques Vandewalle Gemplus Research Labs

5:25 p.m.
Singularity: Software Systems as Dependable, Self-Describing Artifacts
Galen Hunt*, Jim Larus, Paul Barham, Richard Black, John DeTreville, Manuel Fahndrich, Wolfgang Grieskamp, Ulfar Erlingsson, Orion Hodson, Rebecca Isaacs, Mike Jones, Rustan Leino, Steven Levi, Qunyan Mangus, Dushyanth Narayanan, Sriram Rajamani, Jakob Rehof, Wolfram Schulte, Dan Simon, Bjarne Steensgaard, David Tarditi, Ted Wobber, and Brian Zill, Ben Zorn, Microsoft Research; and Martin Abadi, UC Santa Cruz

?Need help? Use our Contacts page.

Last changed: 6 Dec. 2004 aw