|
GENERAL SESSIONS
Complete Technical Sessions
By Day: Monday | Tuesday | Wednesday | Thursday | Friday
By Session: General Sessions | FREENIX | SIGs | Guru Is In | WiPs
Location: General Sessions will take place in Salon E.
|
Monday, June 28
|
8:45 a.m.9:00 a.m.
|
Monday
|
Opening Remarks & Awards
Andrea Arpaci-Dusseau and Remzi Arpaci-Dusseau, University of Wisconsin, Madison
|
|
9:00 a.m.10:00 a.m.
|
Monday
|
As a 20-year provider of proprietary software for the enterprise market, Novell has built products and a culture around proprietary (or closed) software. Within the last 18 months, we have embraced open source development and Linux and have injected them into our corporate DNA. While different, the two approaches are not mutually exclusive. In fact, I would argue embracing open source as a proprietary company is more straightforward than an open source company trying to move "up the stack." In this talk I will examine the myths, challenges, and opportunities for companies attempting to understand the best of both worlds.
Alan F. Nugent serves as chief technology officer of Novell. Prior to Novell, Alan was the Managing Partner, Technology, at Palladian Partners. Mr. Nugent has successfully led many different technology organizations. He serves on the Board of Directors and on the Technical Committee for the Object Management Group and is a widely respected writer and speaker on OT, BPR, and Information Management. He sits on the board of directors of several technology startup companies.
|
|
10:00 a.m.10:30 a.m. Break
|
|
|
10:30 a.m.12:00 p.m.
|
Monday
|
GENERAL SESSION PAPERS
Instrumentation and Debugging
Session Chair: Val Henson, Sun Microsystems
|
|
Making the "Box" Transparent: System Call Performance as a First-Class Result
Yaoping Ruan and Vivek Pai, Princeton University
Dynamic Instrumentation of Production Systems
Bryan M. Cantrill, Michael W. Shapiro, and Adam H. Leventhal, Sun Microsystems
Flashback: A Lightweight Extension for Rollback and Deterministic Replay for Software Debugging
Sudarshan M. Srinivasan, Srikanth Kandula, Christopher R. Andrews,
and Yuanyuan Zhou, University of Illinois, Urbana-Champaign
|
|
12:00 p.m.1:30 p.m. Lunch (on your own)
|
|
|
1:30 p.m.3:00 p.m.
|
Monday
|
GENERAL SESSION PAPERS
Swimming in a Sea of Data
Session Chair: Yuanyuan Zhou, UIUC
|
|
Email Prioritization: Reducing Delays on Legitimate Mail Caused by Junk Mail
Dan Twining, Matthew M. Williamson, Miranda J. F. Mowbray, and Maher Rahmouni, Hewlett-Packard Labs
Redundancy Elimination Within Large Collections of Files
Purushottam Kulkarni, University of Massachusetts; Fred Douglis, Jason
LaVoie, and John M. Tracey, IBM T.J. Watson
Alternatives for Detecting
Redundancy in Storage Systems Data
Calicrates Policroniades and Ian Pratt, Cambridge University |
|
3:00 p.m.3:30 p.m. Break
|
|
|
3:30 p.m.5:00 p.m.
|
Monday
|
GENERAL SESSION PAPERS
Network Performance
Session Chair: Carl Staelin, HP Labs
|
|
|
Monkey See, Monkey Do: A Tool for TCP Tracing and Replaying
Yu-Chung Cheng, University of California, San Diego; Urs Hölzle and Neal Cardwell, Google; Stefan
Savage and Geoffrey M. Voelker, University of California, San Diego
A Transport Layer Approach for Improving End-to-End Performance and Robustness Using Redundant Paths
Ming Zhang and Junwen Lai, Princeton University; Arvind
Krishnamurthy, Yale University; Larry Peterson and Randolph Wang, Princeton University
Multihoming Performance Benefits: An Experimental Evaluation of Practical Enterprise Strategies
Aditya Akella and Srinivasan Seshan, Carnegie Mellon University; Anees Shaikh, IBM T.J. Watson
|
|
|
Tuesday, June 29
|
9:00 a.m.10:00 a.m.
|
Tuesday
|
In the evolution of computers and networks, we have developed complex
mechanisms to manage one, the other, or both. We organize teams based
on technology or task, only to find that the tools they use converge at times
and then diverge again. I'll discuss the latest convergences in the
context of distributed systems management, network management, security,
and voice in a world of ISPs, ASPs, Web services. It all boils down to
this: why can't we manage the network just like one large UNIX box?
Eliot Lear started his career developing distributed management tools
for UNIX in 1987 at Rutgers University. From 1991 through 1998 he was
part of a team that ran a large computer manufacturer network. Since
1998, Eliot has been the Corporate Irritant of Cisco Systems, focusing
on the area of network management, network applications, and cross-functional integration.
|
|
10:00 a.m.10:30 a.m. Break
|
|
|
10:30 a.m.12:00 p.m.
|
Tuesday
|
GENERAL SESSION PAPERS
Overlays in Practice
Session Chair: Fred Douglis, IBM Research
|
|
|
Awarded Best Paper!
Handling Churn in a DHT
Sean Rhea and Dennis Geels, University of California, Berkeley; Timothy Roscoe, Intel
Research, Berkeley; John Kubiatowicz, University of California, Berkeley
A Network Positioning System for the Internet
T.S. Eugene Ng, Rice University; Hui Zhang, Carnegie Mellon
University
Early Experience with an Internet Broadcast System Based on Overlay Multicast
Yang-hua Chu and Aditya Ganjam, Carnegie
Mellon University; T.S. Eugene Ng, Rice University; Sanjay G. Rao, Kunwadee Sripanidkulchai, Jibin Zhan, and Hui Zhang, Carnegie
Mellon University |
|
12:00 p.m.1:30 p.m. Lunch (on your own)
|
|
|
1:30 p.m.3:00 p.m.
|
Tuesday
|
GENERAL SESSION PAPERS
Secure Services
Session Chair: Atul Adya, Microsoft Research
|
|
Reliability and Security in the CoDeeN Content Distribution Network
Limin Wang, KyoungSoo Park, Ruoming Pang, Vivek Pai, and Larry Peterson,
Princeton University
Building Secure High-Performance Web Services with OKWS
Maxwell Krohn, MIT
REX: Secure, Extensible Remote Execution
Michael Kaminsky and Eric Peterson, MIT; Daniel B. Giffin, NYU; Kevin
Fu, MIT; David Mazières, NYU; M. Frans Kaashoek, MIT
|
|
3:00 p.m.3:30 p.m. Break |
|
|
3:30 p.m.5:00 p.m.
|
Tuesday
|
GENERAL SESSION PAPERS
The Network-Application Interface
Session Chair: Vivek Pai, Princeton University
|
|
|
Network Subsystems Reloaded: A High-Performance, Defensible Network Subsystem
Anshumal Sinha, Sandeep Sarat, and Jonathan S. Shapiro, Johns Hopkins University
accept()able Strategies for Improving Web Server Performance
Tim Brecht, David Pariag, and Louay Gammo, University of Waterloo
Lazy Asynchronous I/O for Event-Driven Servers
Khaled Elmeleegy, Anupam Chanda, and Alan L. Cox, Rice University; Willy
Zwaenepoel, EPFL, Lausanne
|
5:15 p.m.6:00 p.m. |
Tuesday
|
Work-in-Progress Reports (WiPs)
Session Chair: Vivek Pai, Princeton University
Short, pithy, and fun, Work-in-Progress reports introduce interesting
new or ongoing work. If you have work you would like to share or a cool
idea that's not quite ready for publication, send a one- to
two-page summary (in PDF format) to usenix04wips@usenix.org. We are particularly
interested in presenting students' work. A schedule of presentations
will be posted at the conference, and the speakers will be notified in
advance. Work-in-Progress reports are five-minute presentations; the
time limit will be strictly enforced.
Submissions are due by 11:59 p.m. EST, May 27.
|
|
Wednesday, June 30
|
9:00 a.m.10:00 a.m.
|
Wednesday
|
Plenary Session
Thinking Sensibly About Security in an Uncertain World
Bruce Schneier, Counterpane Internet Security, Inc.
Listen in MP3 format
|
|
All security decisions involve trade-offs: how much security you get, and
what you give up to get it. When we decide whether to walk down a dimly
lit street, purchase a home burglar alarm system, or implement an airline
passenger profiling system, we're making a security trade-off. Everyone
makes these trade-offs all the time. It's intuitive and natural, and
fundamental to being alive. But paradoxically, people are astonishingly
bad at making rational decisions about these trade-offs.
Security expert Bruce Schneier discusses this notion of security trade-offs
and how we are all "security consumers." He makes use of a five-step
process to explicate these intuitive trade-offs and shows how the process
can be applied to decisions both small and large. Learn how security works
in the real world, and what you can do to get the security you want . . .
not the security that is forced upon you.
Internationally renowned security expert Bruce Schneier has written eight
books, including Beyond Fear and Secrets and Lies, as well as the Blowfish
and Twofish encryption algorithms. Schneier has appeared on numerous
television and radio programs, has testified before Congress, and is a
frequent writer and lecturer on issues surrounding security and privacy.
|
|
10:00 a.m.10:30 a.m. Break |
|
|
10:30 a.m.12:00 p.m. |
Wednesday
|
GENERAL SESSION PAPERS
Unplugged
Session Chair: Scott F. Kaplan, Amherst
|
|
Awarded Best Paper!
Energy Efficient Prefetching and Caching
Athanasios E. Papathanasiou and Michael L. Scott,
University of Rochester
Time-based Fairness Improves Performance in Multi-Rate WLANs
Godfrey Tan and John Guttag, MIT
EmStar: A Software Environment for Developing and Deploying Wireless Sensor Networks
Lewis Girod, Jeremy Elson, Alberto Cerpa, Thanos Stathopoulos, Nithya Ramanathan, and Deborah Estrin, University of California, Los Angeles |
|
|