15-712: Advanced Operating Systems & Distributed Systems
Paper Summary Guidelines
An important component of 712 is critical reading of the assigned papers
and coming to class ready to discuss them.
To help you in this process, we require that you hand in a short
review of each paper at the beginning of the class during which we
will discuss the paper.
Your summaries should:
- State the 3 most important things the paper says. These could be
some combination of their motivations, observations, interesting parts
of the design, or clever parts of their implementation.
- Describe the paper's single most glaring deficiency. Every paper
has some fault. Perhaps an experiment was poorly designed or the main
idea had a narrow scope or applicability. Being able to assess
weaknesses as well as strengths is an important skill for this course
- Describe what conclusion you draw from the paper as to how to
build systems in the future. Most of the assigned papers are have
to the systems community and have had some lasting impact on the area.
We do not want a book report or a repeat of the paper's abstract.
Rather, we want your considered opinions about the key points indicated
Of course, if you have an insight that doesn't fit the
above format, please include it as well.
We want the reviews to be short, between 1/4 and 1/2 a page. Reviews
must be typed.
All reviews will be counted, and a random sample of the reviews will
be graded. Do not skip class or come late just to finish a review --
we expect that everyone will miss a few, though skipping more than
10% will have a negative impact on your grade.
A summary of each paper will be posted after students have submitted
Note, - we may email you asking for an electronic copy of a summary that you
submitted, so that we can post it here.
- 1. Track-Aligned Extents: Matching Access Patterns to Disk Characteristics
J. Schindler, J. Griffin, C. Lumb, G. Ganger, under review.
- 2. Virtual Log Based File Systems for a Programmable Disk
R. Wang, T. Anderson, D. Patterson, Symposium on Operating Systems
Design and Implementation, February 1999.
- 3. The Design and Implementation of a Log-Structured File System
M. Rosenblum, J. Ousterhout, ACM Transactions on Computer Systems,
vol. 10, no. 1, February 1992, pp. 26-52.
- 4. Soft Updates: A Solution to the Metadata Update Problem in File Systems
G. Ganger, M.K. McKusick, C. Soules, Y. Patt, ACM Transactions on
Computer Systems, vol. 18, no. 2, pp. 127-153.
- 5. Scale and Performance in a Distributed File System
J. Howard, M. Kazar, et. al, ACM Transactions on Computer Systems,
vol. 6, no. 1, February 1988, pp. 51-81.
- 6. File System Design for an NFS File Server Appliance
D. Hitz, J. Lau, M. Malcolm, USENIX Winter Technical Conference,
January 1994, pp. 235-246.
- 7. A Cost-Effective, High-Bandwidth Storage Architecture
G. Gibson, D. Nagle, et. al, 8th Conf. on Architectural Support
for Programming Languages and Operating Systems, October 1998,
- 8. Serverless Network File Systems
T. Anderson, M. Dahlin, et. al, ACM Transactions on Computer
Systems, vol. 14, no. 1, February 1996, pp. 41-79.
- 9. Implementing Remote Procedure Call
A. Birrell, B. Nelson, ACM Transactions on Computer Systems,
vol. 2, no. 1, February 1984, pp. 39-59.
- 10. Cluster I/O with River: Making the Fast Case Common
R. Arpaci-Dusseau, E. Anderson, et. al, Workshop on Input/Output
for Parallel and Distributed Systems (IOPADS), May 1999, pp. 10-22.
- 11. Fine-Grained Mobility in the Emerald System
E. Jul, H. Levy, N. Hutchinson, A. Black, ACM Transactions on
Computer Systems, vol. 6, no. 1, February 1988, pp. 109-133.
- 12. Dynamic Function Placement for Data-Intensive Cluster Computing
K. Amiri, D. Petrou, G. Ganger, G. Gibson, Usenix Annual Technical
Conference, June 2000, pp. 307-322.
- 13. Reflections on Trusting Trust (no summary)
K. Thompson, Communications of the ACM, vol. 27, no. 8,
August 1984, pp. 761-763.
- 14. Why Cryptosystems Fail
R. Anderson, Communications of the ACM, vol. 37, no. 11,
November 1994, pp. 32-40.
- 15. Crisis and Aftermath (no summary)
E. Spafford, Communications of the ACM, vol. 32, no. 6,
June 1989, pp. 678-687.
- 16. The protection of information in computer systems
J. Saltzer, M. Schroeder, Proceedings of the IEEE, vol. 63, no. 9,
September 1975, pp. 1278-1300.
- 17. Better Security via Smarter Devices
G. Ganger, D. Nagle, HotOS-VIII, May 2001.
- 18. An Evaluation of the Ninth SOSP Submissions
- 19. Using Threads in Interactive Systems: A Case Study
C. Hauser, C. Jacobi, et. al, ACM Symposium on Operating
Systems Principles, December 1993, pp. 94-105.
- 20. On Optimistic Methods for Concurrency Control
H.T. Kung, J. Robinson, ACM Transactions on Database Systems,
vol. 6, no. 2, June 1981, pp. 213-226.
- 21. Time, Clocks, and the Ordering of Events in a Distributed System
L. Lamport, Communications of the ACM, vol. 21, no. 7, July 1978,
- 22. The Byzantine General's Problem
L. Lamport, R. Shostak, M. Pease, ACM Transactions on Programming
Languages and Systems, vol. 4, no. 3, July 1982, pp. 382-401.
- 23. Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial
F. Schneider, ACM Computing Surveys, vol. 22, no. 4, December 1990.
- 24. Practical Byzantine Fault Tolerance
M. Castro, B. Liskov, USENIX Symposium on Operating Systems Design
and Implementation (OSDI), February 1999.
- 25. Password Hardening Based on Keystroke Dynamics
F. Monrose, M. Reiter, S. Wetzel, International Journal on
Information Security, To be published.
- 26. End-to-end authorization
J. Howell, D. Kotz, Symposium on Operating Systems Design and
Implementation, October 2000, pp. 151-164.
- 27. Legion: An Operating System
for Wide-Area Computing
Grimshaw, A.; Ferrari, A.; Knabe, F.; Humphrey.
Information flow based event distribution middleware
Banavar, G.; Kaplan, M.; Shaw, K.; Strom, R.E.; Sturman, D.C.; Wei Tao,
19th IEEE International Conference on Distributed Computing Systems,
Workshops on Electronic Commerce and Web-based Applications.
Middleware Year: 1999.
- 29. Publius: A robust, tamper-evident, censorship-resistant, web publishing system
M. Waldman, A. Rubin, and L. Cranor, 9th USENIX Security Symposium, August, 2000.
- 30. The Design, Implementation, and Operation of an Email Pseudonym Server
D. Mazieres, and M.F. Kaashoek, 5th ACM Conference on Computer and Communications Security, 1998.
- 31. Recovery Management in Quicksilver
R. Haskin, Y. Malachi, W. Sawdon, G. Chan, ACM Transactions on
Computer Systems, vol. 6, no. 1, February 1988, pp. 82-108.
- 32. Hive: Fault Containment for Shared-Memory Multiprocessors
J. Chapin, M. Rosenblum, et. al, ACM Symposium on Operating
Systems Principles, December 1995, pp. 12-25.
- 33. The computer for the 21st century
Mark Weiser, Scientific American, vol. 265, no. 3, September 1991, pp. 94-104.
- 34. Active Names: Flexible Location and Transport of Wide-Area Resources
A. Vahdat, M. Dahlin, T. Anderson, A. Aggarwal, USENIX Symposium on Internet Technologies and Systems (USITS), October 1999.
Last modified: Thu Nov 29 23:43:15 Eastern Standard Time 2001