ACM SIGOPS European Workshop 2004
Organization | Call for Papers | Program | Registration | Accomodation | Venue | Panel Session

xPapers accepted for presentation and publication x       xOther papers accepted for publication x

Sunday, September 19th

Monday, September 20th

  • 9:00-10:30 Sensor networks
    Chair: Ant Rowstron

    • Using Virtual Markets to Program Global Behavior in Sensor Networks
      Geoff Mainland, Laura Kang, Sebastien Lahaie, David Parkes, Matt Welsh (Harvard University)

    • Generic Role Assignment for Wireless Sensor Networks
      Kay Römer, Christian Frank, Pedro José Marrón, Christian Becker (ETH Zurich and University of Stuttgart)

    • The Firecracker Protocol
      Philip Levis, David Culler (University of California at Berkeley)

  • 10:30-11:00 Break

  • 11:00-12:30 Storage systems
    Chair: Maarten van Steen

    • Lessons and challenges in automating data dependability
      Kimberly Keeton, Dirk Beyer, Jeffrey Chase, Arif Merchant, Cipriano Santos, John Wilkes (HP Labs and Duke University)

    • Transactional File Systems Can Be Fast
      Barbara Liskov, Rodrigo Rodrigues (MIT CSAIL)

    • Position: Short Object Lifetimes Require a Delete-Optimized Storage System
      Fred Douglis, John Palmer, Elizabeth Richards, David Tao, William Tetzlaff, John Tracey, Jian Yin (IBM Research and U.S. Department of Defense)

  • 12:30-14:30 Lunch

  • 14:40-16:00 Resource management
    Chair: Willy Zwaenepoel

    • Virtual Private Machines: User-Centric Performance
      David Stewart, Richard Mortier (Microsoft Research)

    • QoS for Internet Services - Done Right
      Josep Blanquer, Antoni Batchelli, Klaus Schauser, Rich Wolski (University of California at Santa Barbara)

    • Chip Multithreading Systems Need a New Operating System Scheduler
      Alexandra Fedorova, Christopher Small, Daniel Nussbaum, Margo Seltzer (Harvard University and Sun Microsystems)

  • 16:00-16:30 Break

  • 16:30 Visit to Stella Artois brewery

Tuesday, September 21st

  • 9:00-10:30 Security
    Chair: Miguel Castro

    • Data Lifetime is a Systems Problem
      Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum (Stanford University)

    • Secure Bootstrap is Not Enough: Shoring up the Trusted Computing Base
      James Hendricks, Leendert van Doorn (Carnegie Mellon University and IBM Research)

    • Impeding Attrition Attacks in P2P Systems
      Petros Maniatis, TJ Giuli, Mema Roussopoulos, David S. H. Rosenthal, Mary Baker (Intel Corporation, Stanford University, Harvard University, and HP Labs)

  • 10:30-11:00 Break

  • 11:00-12:30 Miscellaneous
    Chair: Yolande Berbers

    • Utilification
      John Wilkes, Jeffrey Mogul, Jaap Suermondt (HP Labs)

    • Energy-Efficient Cluster-based Service Discovery
      Gregor Schiele, Christian Becker, Kurt Rothermel (University of Stuttgart)

    • Constructing Component-Based Extension Interfaces in Legacy Systems Code
      Gilles Muller, Julia Lawall, Jean-Marc Menaud, Mario Sudholt (Ecole des Mines de Nantes and University of Copenhagen)

  • 12:30-14:30 Lunch

  • 14:40-16:00 Manageability
    Chair: Gilles Muller

    • Using Time Travel to Diagnose Computer Problems
      Andrew Whitaker, Richard Cox, Steve Gribble (University of Washington)

    • Request extraction in Magpie: events, schemas and temporal joins
      Rebecca Isaacs, Paul Barham, James Bulpin, Richard Mortier, Dushyanth Narayanan (Microsoft Research and University of Cambridge)

    • An Approach to Benchmarking Configuration Complexity
      Aaron Brown, Joseph Hellerstein (IBM Research)

  • 16:00-16:30 Break

  • 16:30-17:30 Panel: Systems research in Europe

  • 20:00 Dinner

Wednesday, September 22st

  • 9:00-10:30 Overlay networks
    Chair: Steven Hand

    • Eluding Carnivores: File Sharing with Strong Anonymity
      Emin Gun Sirer, Sharad Goel, Mark Robson, Dogan Engin (Cornell University)

    • Exploiting Semantic Clustering in the eDonkey P2P network
      Sidath Handurukande, Anne-Marie Kermarrec, Fabrice Le Fessant, Laurent Massoulié (EPFL, INRIA, and Microsoft Research)

    • Defending against Eclipse attacks on overlay networks
      Atul Singh, Miguel Castro, Peter Druschel, Antony Rowstron (Rice University and Microsoft Research)

  • 10:30-11:00 Break

  • 11:00-12:30 Microkernels and virtual machines
    Chair: Paul Barham

    • Reducing TCB size by using untrusted components - small kernels versus virtual-machine monitors
      Michael Hohmuth, Michael Peter, Hermann Härtig, Jonathan Shapiro (TU Dresden and Johns Hopkins University)

    • Self-migration of Operating Systems
      Jacob Gorm Hansen, Eric Jul (University of Copenhagen)

    • A Sledgehammer Approach to Reuse of Legacy Device Drivers
      Joshua LeVasseur, Volkmar Uhlig (University of Karlsruhe)

  • 12:30-14:30 Lunch

Other papers accepted for publication:

  • When Physical Is Not Real Enough
    Frank Bellosa (University of Erlangen)

  • A component-based approach to distributed system management - A use case with self-manageable J2EE clusters
    Sara Bouchenak, Fabienne Boyer, Emmanuel Cecchet, Sébastien Jean, Alan Schmitt, Jean-Bernard Stefani (INRIA)

  • Open Problems in Data Collection Networks
    Jonathan Ledlie, Jeff Shneidman, Matt Welsh, Mema Roussopoulos, Margo Seltzer (Harvard University)

  • Separating Durability and Availability in Self­Managed Storage
    Geoffrey Lefebvre and Michael J. Feeley (University of British Columbia)

  • EERAID: energy efficient redundant and inexpensive disk arrays
    Dong Li, Jun Wang (University of Nebraska-Lincoln)

  • AP3: Anonymization of Group Communication
    Alan Mislove, Gaurav Oberoi, Ansley Post, Charles Reis, Peter Druschel, Dan Wallach (Rice University and University of Washington)

  • Undo for anyone, anywhere, anytime
    James O'Brien, Marc Shapiro (Microsoft Research)

  • A Step Towards Ubiquitous Computing: an Efficient Flexible micro-ORB
    Frédéric Ogel, Bertil Folliot, Gaël Thomas (INRIA, University Pierre et Marie Curie)

  • Scalable Strong Consistency for Web Applications
    Swaminathan Sivasubramanian, Guillaume Pierre, Maarten van Steen (Vrije Universiteit)

  • Using AOP to Develop Architectural-Neutral Operating System Components
    Olaf Spinczyk, Daniel Lohmann (University Erlangen-Nuremberg)

  • Long-term Time-share Guarantees are Necessary for Wireless LANs
    Godfrey Tan, John Guttag (MIT CSAIL)

  • The Lonely NATed Node
    Chad Yoshikawa, Brent Chun, Amin Vahdat, Fred Annexstein, Ken Berman (University of Cincinnati, Intel Research, and University of California San Diego)

  • Trust but Verify: Accountability for Internet Services
    Aydan Yumerefendi, Jeffrey Chase (Duke University)

Back to index page Back to index page Back to index page

Nedstat Basic - Free web site statistics   Last Changed : 15 July 2004

  Contents of this page : Yolande Berbers

  Webmaster : Davy Preuveneers

Valid HTML 4.01! Valid CSS! DistriNet