

The papers are named as s-n.[ps,pdf], where s is the session number in the program below and n is the paper number within the session.
The papers that appeared in the proceedings but were not presented at the workshop are named by the last name of the first author.



Monday, September 20th
9:00-10:30 Sensor networks
Chair: Ant Rowstron


Using Virtual Markets to Program Global Behavior in Sensor Networks
Geoff Mainland, Laura Kang, Sebastien Lahaie, David Parkes, Matt Welsh (Harvard University)


Generic Role Assignment for Wireless Sensor Networks
Kay Rmer, Christian Frank, Pedro Jos Marrn, Christian Becker (ETH Zurich and University of Stuttgart)


The Firecracker Protocol
Philip Levis, David Culler (University of California at Berkeley)


10:30-11:00 Break


11:00-12:30 Storage systems
Chair: Maarten van Steen


Lessons and challenges in automating data dependability
Kimberly Keeton, Dirk Beyer, Jeffrey Chase, Arif Merchant, Cipriano Santos, John Wilkes (HP Labs and Duke University)


Transactional File Systems Can Be Fast
Barbara Liskov, Rodrigo Rodrigues (MIT CSAIL)


Position: Short Object Lifetimes Require a Delete-Optimized Storage System
Fred Douglis, John Palmer, Elizabeth Richards, David Tao, William Tetzlaff, John Tracey, Jian Yin (IBM Research and U.S. Department of Defense)


12:30-14:30 Lunch


14:40-16:00 Resource management
Chair: Willy Zwaenepoel


Virtual Private Machines: User-Centric Performance
David Stewart, Richard Mortier (Microsoft Research)


QoS for Internet Services - Done Right
Josep Blanquer, Antoni Batchelli, Klaus Schauser, Rich Wolski (University of California at Santa Barbara)


Chip Multithreading Systems Need a New Operating System Scheduler
Alexandra Fedorova, Christopher Small, Daniel Nussbaum, Margo Seltzer (Harvard University and Sun Microsystems)


16:00-16:30 Break


16:30 Visit to Stella Artois brewery



Tuesday, September 21st
9:00-10:30 Security
Chair: Miguel Castro


Data Lifetime is a Systems Problem
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum (Stanford University)


Secure Bootstrap is Not Enough: Shoring up the Trusted Computing Base
James Hendricks, Leendert van Doorn (Carnegie Mellon University and IBM Research)


Impeding Attrition Attacks in P2P Systems
Petros Maniatis, TJ Giuli, Mema Roussopoulos, David S. H. Rosenthal, Mary Baker (Intel Corporation, Stanford University, Harvard University, and HP Labs)


10:30-11:00 Break 


11:00-12:30 Miscellaneous
Chair: Yolande Berbers


Utilification 
John Wilkes, Jeffrey Mogul, Jaap Suermondt (HP Labs)


Energy-Efficient Cluster-based Service Discovery
Gregor Schiele, Christian Becker, Kurt Rothermel (University of Stuttgart)


Constructing Component-Based Extension Interfaces in Legacy Systems Code
Gilles Muller, Julia Lawall, Jean-Marc Menaud, Mario Sudholt (Ecole des Mines de Nantes and University of Copenhagen)


12:30-14:30 Lunch


14:40-16:00 Manageability
Chair: Gilles Muller


Using Time Travel to Diagnose Computer Problems
Andrew Whitaker, Richard Cox, Steve Gribble (University of Washington)


Request extraction in Magpie: events, schemas and temporal joins
Rebecca Isaacs, Paul Barham, James Bulpin, Richard Mortier, Dushyanth Narayanan (Microsoft Research and University of Cambridge)


An Approach to Benchmarking Configuration Complexity
Aaron Brown, Joseph Hellerstein (IBM Research)


16:00-16:30 Break


16:30-17:30 Panel: Systems research in Europe


20:00 Dinner



Wednesday, September 22st
9:00-10:30 Overlay networks
Chair: Steven Hand


Eluding Carnivores: File Sharing with Strong Anonymity
Emin Gun Sirer, Sharad Goel, Mark Robson, Dogan Engin (Cornell University)


Exploiting Semantic Clustering in the eDonkey P2P network
Sidath Handurukande, Anne-Marie Kermarrec, Fabrice Le Fessant, Laurent Massouli (EPFL, INRIA, and Microsoft Research)


Defending against Eclipse attacks on overlay networks
Atul Singh, Miguel Castro, Peter Druschel, Antony Rowstron (Rice University and Microsoft Research)


10:30-11:00 Break


11:00-12:30 Microkernels and virtual machines
Chair: Paul Barham


Reducing TCB size by using untrusted components - small kernels versus virtual-machine monitors
Michael Hohmuth, Michael Peter, Hermann Hrtig, Jonathan Shapiro (TU Dresden and Johns Hopkins University)


Self-migration of Operating Systems
Jacob Gorm Hansen, Eric Jul (University of Copenhagen)


A Sledgehammer Approach to Reuse of Legacy Device Drivers
Joshua LeVasseur, Volkmar Uhlig (University of Karlsruhe)


12:30-14:30 Lunch



 
Other papers accepted for publication:
When Physical Is Not Real Enough 
Frank Bellosa (University of Erlangen) 


A component-based approach to distributed system management - A use case with self-manageable J2EE clusters 
Sara Bouchenak, Fabienne Boyer, Emmanuel Cecchet, Sbastien Jean, Alan Schmitt, Jean-Bernard Stefani (INRIA) 


Open Problems in Data Collection Networks 
Jonathan Ledlie, Jeff Shneidman, Matt Welsh, Mema Roussopoulos, Margo Seltzer (Harvard University) 


Separating Durability and Availability in SelfManaged Storage
Geoffrey Lefebvre and Michael J. Feeley (University of British Columbia)


EERAID: energy efficient redundant and inexpensive disk arrays 
Dong Li, Jun Wang (University of Nebraska-Lincoln)


AP3: Anonymization of Group Communication 
Alan Mislove, Gaurav Oberoi, Ansley Post, Charles Reis, Peter Druschel, Dan Wallach (Rice University and University of Washington)


Undo for anyone, anywhere, anytime 
James O'Brien, Marc Shapiro (Microsoft Research) 


A Step Towards Ubiquitous Computing: an Efficient Flexible micro-ORB
Frdric Ogel, Bertil Folliot, Gal Thomas (INRIA, University Pierre et Marie Curie) 


Scalable Strong Consistency for Web Applications 
Swaminathan Sivasubramanian, Guillaume Pierre, Maarten van Steen (Vrije Universiteit) 


Using AOP to Develop Architectural-Neutral Operating System Components 
Olaf Spinczyk, Daniel Lohmann (University Erlangen-Nuremberg)


Long-term Time-share Guarantees are Necessary for Wireless LANs 
Godfrey Tan, John Guttag (MIT CSAIL) 


The Lonely NATed Node 
Chad Yoshikawa, Brent Chun, Amin Vahdat, Fred Annexstein, Ken Berman (University of Cincinnati, Intel Research, and University of California San Diego)


Trust but Verify: Accountability for Internet Services 
Aydan Yumerefendi, Jeffrey Chase (Duke University) 


 
