Sunday, September 19th
Monday, September 20th
- 9:00-10:30 Sensor networks
Chair: Ant Rowstron
- Using Virtual Markets to Program Global Behavior in
Sensor Networks
Geoff Mainland, Laura Kang, Sebastien Lahaie, David
Parkes, Matt Welsh (Harvard University)
- Generic Role Assignment for Wireless Sensor Networks
Kay Römer, Christian Frank, Pedro José
Marrón, Christian Becker (ETH Zurich and University of Stuttgart)
- The Firecracker Protocol
Philip Levis, David Culler (University of California
at Berkeley)
- 10:30-11:00 Break
- 11:00-12:30 Storage systems
Chair: Maarten van Steen
- Lessons and challenges in automating data
dependability
Kimberly Keeton, Dirk Beyer, Jeffrey Chase, Arif
Merchant, Cipriano Santos, John Wilkes (HP Labs and Duke University)
- Transactional File Systems Can Be Fast
Barbara Liskov, Rodrigo Rodrigues (MIT CSAIL)
- Position: Short Object Lifetimes Require a
Delete-Optimized Storage System
Fred Douglis, John Palmer, Elizabeth Richards, David
Tao, William Tetzlaff, John Tracey, Jian Yin (IBM Research and U.S.
Department of Defense)
- 12:30-14:30 Lunch
- 14:40-16:00 Resource management
Chair: Willy Zwaenepoel
- Virtual Private Machines: User-Centric Performance
David Stewart, Richard Mortier (Microsoft Research)
- QoS for Internet Services - Done Right
Josep Blanquer, Antoni Batchelli, Klaus Schauser, Rich
Wolski (University of California at Santa Barbara)
- Chip Multithreading Systems Need a New Operating
System Scheduler
Alexandra Fedorova, Christopher Small, Daniel
Nussbaum, Margo Seltzer (Harvard University and Sun Microsystems)
- 16:00-16:30 Break
- 16:30 Visit to Stella Artois brewery
Tuesday, September 21st
- 9:00-10:30 Security
Chair: Miguel Castro
- Data Lifetime is a Systems Problem
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum
(Stanford University)
- Secure Bootstrap is Not Enough: Shoring up the
Trusted Computing Base
James Hendricks, Leendert van Doorn (Carnegie Mellon
University and IBM Research)
- Impeding Attrition Attacks in P2P Systems
Petros Maniatis, TJ Giuli, Mema Roussopoulos, David S.
H. Rosenthal, Mary Baker (Intel Corporation, Stanford University,
Harvard University, and HP Labs)
- 10:30-11:00 Break
- 11:00-12:30 Miscellaneous
Chair: Yolande Berbers
- Utilification
John Wilkes, Jeffrey Mogul, Jaap Suermondt (HP Labs)
- Energy-Efficient Cluster-based Service Discovery
Gregor Schiele, Christian Becker, Kurt Rothermel
(University of Stuttgart)
- Constructing Component-Based Extension Interfaces in
Legacy Systems Code
Gilles Muller, Julia Lawall, Jean-Marc Menaud, Mario
Sudholt (Ecole des Mines de Nantes and University of Copenhagen)
- 12:30-14:30 Lunch
- 14:40-16:00 Manageability
Chair: Gilles Muller
- Using Time Travel to Diagnose Computer Problems
Andrew Whitaker, Richard Cox, Steve Gribble
(University of Washington)
- Request extraction in Magpie: events, schemas and
temporal joins
Rebecca Isaacs, Paul Barham, James Bulpin, Richard
Mortier, Dushyanth Narayanan (Microsoft Research and University of
Cambridge)
- An Approach to Benchmarking Configuration Complexity
Aaron Brown, Joseph Hellerstein (IBM Research)
- 16:00-16:30 Break
- 16:30-17:30 Panel: Systems research in Europe
- 20:00 Dinner
Wednesday, September 22st
- 9:00-10:30 Overlay networks
Chair: Steven Hand
- Eluding Carnivores: File Sharing with Strong
Anonymity
Emin Gun Sirer, Sharad Goel, Mark Robson, Dogan Engin
(Cornell University)
- Exploiting Semantic Clustering in the eDonkey P2P
network
Sidath Handurukande, Anne-Marie Kermarrec, Fabrice Le
Fessant, Laurent Massoulié (EPFL, INRIA, and Microsoft Research)
- Defending against Eclipse attacks on overlay networks
Atul Singh, Miguel Castro, Peter Druschel, Antony
Rowstron (Rice University and Microsoft Research)
- 10:30-11:00 Break
- 11:00-12:30 Microkernels and virtual machines
Chair: Paul Barham
- Reducing TCB size by using untrusted components -
small kernels versus virtual-machine monitors
Michael Hohmuth, Michael Peter, Hermann Härtig,
Jonathan Shapiro (TU Dresden and Johns Hopkins University)
- Self-migration of Operating Systems
Jacob Gorm Hansen, Eric Jul (University of Copenhagen)
- A Sledgehammer Approach to Reuse of Legacy Device
Drivers
Joshua LeVasseur, Volkmar Uhlig (University of
Karlsruhe)
- 12:30-14:30 Lunch
|
Other papers accepted for publication:
- When Physical Is Not Real Enough
Frank Bellosa (University of Erlangen)
- A component-based approach to distributed system
management - A use case with self-manageable J2EE clusters
Sara Bouchenak, Fabienne Boyer, Emmanuel Cecchet,
Sébastien Jean, Alan Schmitt, Jean-Bernard Stefani (INRIA)
- Open Problems in Data Collection Networks
Jonathan Ledlie, Jeff Shneidman, Matt Welsh, Mema
Roussopoulos, Margo Seltzer (Harvard University)
- Separating Durability and Availability in
SelfManaged Storage
Geoffrey Lefebvre and Michael J. Feeley (University of
British Columbia)
- EERAID: energy efficient redundant and inexpensive disk
arrays
Dong Li, Jun Wang (University of Nebraska-Lincoln)
- AP3: Anonymization of Group Communication
Alan Mislove, Gaurav Oberoi, Ansley Post, Charles Reis,
Peter Druschel, Dan Wallach (Rice University and University of
Washington)
- Undo for anyone, anywhere, anytime
James O'Brien, Marc Shapiro (Microsoft Research)
- A Step Towards Ubiquitous Computing: an Efficient
Flexible micro-ORB
Frédéric Ogel, Bertil Folliot, Gaël
Thomas (INRIA, University Pierre et Marie Curie)
- Scalable Strong Consistency for Web Applications
Swaminathan Sivasubramanian, Guillaume Pierre, Maarten van
Steen (Vrije Universiteit)
- Using AOP to Develop Architectural-Neutral Operating
System Components
Olaf Spinczyk, Daniel Lohmann (University
Erlangen-Nuremberg)
- Long-term Time-share Guarantees are Necessary for
Wireless LANs
Godfrey Tan, John Guttag (MIT CSAIL)
- The Lonely NATed Node
Chad Yoshikawa, Brent Chun, Amin Vahdat, Fred Annexstein,
Ken Berman (University of Cincinnati, Intel Research, and University of
California San Diego)
- Trust but Verify: Accountability for Internet Services
Aydan Yumerefendi, Jeffrey Chase (Duke University)
|