COMP 620: Graduate Seminar in Computer Systems
Rice University
Spring 2008


Meeting Time and Place

Friday 2:00pm - 3:00pm
DH3076

Description

In this seminar, we will study papers from different areas in Computer Systems such as Operating Systems, Networking, Mobile Wireless, File and Storage Systems, Architecture, etc.

To get the most out of COMP620 and learn from the presentation experience, you should assume the paper you are presenting is your own paper. You should therefore prepare the presentation and defend the paper based on your own ideas. You should design your own presentation as you see fit. Ask your advisor to help review your presentation before the seminar. You will also receive feedbacks after the talk. You may use detailed figures (e.g. figures of results) that are hard to reproduce from the paper itself and from online slides, but be sure to acknowledge the source of the material. Always respect the copyright of material from other sources and do not plagiarize. You should not use an existing presentation found on-line. COMP620 is one of the few places where you can hone your presentation skills in a friendly environment. So, put your own personal touch on your presentation and get the most from it!


Seminar Schedule

Class
Date
Room
Paper title
Presenter
1
1/18
DH3076
Ethane: Taking Control of the Enterprise Bo
2
1/25
DH3076
Resolving Inter-Domain Policy Disputes Florin
3
2/1
DH3076
Class cancelled

4
2/8
DH3076
Explode: A Lightweight, General System for Finding Serious Storage System Errors Jie
5
2/15
DH3076
Sharing and Protection in a Single-Address-Space Operating System
Dan
6
2/22
DH3076
No class

7
2/29
DH3076
SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for Commodity OSes Kaushik
8
3/14
DH3076
Capabilities Myths Demolished (Click here for the USENIX Security reviews)
Seth
9
3/21
DH3076
Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Yanjun
10
3/28
DH3076
CONMan: A Step Towards Network Manageability Guohui
11
4/11
DH3076
Efficient Network-wide SLA Compliance Monitoring
Zheng
12
4/18
DH3076
Bouncer: Securing Software by Blocking Bad Input Scott

Paper List