CS 395T schedule (Spring 2011)
Instructor: Simon S. Lam
Date | Topic | Review due |
Lecturer |
Jan 21 | Course description and overview | ||
Jan 21 |
Review of Little's Law and TCP congestion control Matthew Mathis, Jeffrey Semke, Jamshid Mahdavi, The Macroscopic Behavior of the TCP Congestion Avoidance Algorithm, ACM Computer Communicatons Review, 27(3), pp. 67-82, 1997. ( pdf ) |
No, but read first 2 pages |
SSL (slides) |
Jan 28 2 p.m. |
Submit via
email your priority list of papers to present |
||
Jan 28 | Jitendra Padhye, Victor Firoiu, Don Towsley, and Jim Kurose, Modeling TCP Throughput: A Simple Model and its Empirical Validation, Proceedings ACM SIGCOMM, 1998. ( pdf ) (You can skim over the math derivations. I will show you the highlights in my lecture.) | Yes | SSL (slides) |
Jan 28 | Y. Richard Yang and Simon Lam, General AIMD Congestion Control Proceedings ICNP 2000, Osaka, Japan, November 2000 ( pdf ) | Yes | SSL (slides) |
Feb 4 | University closed due to snow | ||
Feb 11 |
Chung Kei Wong, Mohamed Gouda, and Simon S. Lam, Secure Group Communications Using Key Graphs, Proceedings ACM SIGCOMM '98, Vancouver, B.C., September 1998. ( pdf , journal version ) |
Yes | SSL (slides) |
Feb 11 |
Chung Kei Wong and Simon S. Lam, Digital Signatures for Flows and Multicasts, IEEE/ACM Transactions on Networking, August 1999. ( pdf ) |
Yes | SSL (slides) |
Feb 18 | Huaiyu Liu and Simon S. Lam, Neighbor Table Construction and Update in a Dynamic Peer-to-Peer Network, Proceedings IEEE ICDCS 2003, Providence, RI, May 2003. ( pdf ) Read Sections 1-3 carefully. Try to understand the notation. Subsection 3.3 contains the key ideas for correct protocol design. You can read the rest of the paper quickly. Okay to skip pseudocode in Figures 5-12 and the Lemmas and Propositions in subsection 5.1. Proofs for this paper are in a UTCS TR ( pdf ) | Yes | SSL (slides) |
Feb 18 | overflow from Feb 11 | ||
Feb 25 | GradFest 2011 (class starts at 3:30 p.m.) | ||
Feb 25 3:30 p.m. |
Dong-Young Lee and Simon S. Lam, Efficient and Accurate Protocols for Distributed Delaunay Triangulation under Churn, Proceedings IEEE ICNP 2008, Orlando, Florida, October 2008. ( pdf ) |
Yes | Chen Q. |
Mar 4 |
Simon S. Lam and Chen Qian, Geographic Routing in d-dimensional Spaces with Guaranteed Delivery and Low Stretch, Technical Report TR-10-03, Department of Computer Science, UT-Austin, January 19, 2010; revised, October 29, 2010( pdf ); to appear in Proc. ACM SIGMETRICS, 2011. |
Yes | Chen Q. |
Mar 4 | Simon S. Lam and Huaiyu Liu, Failure Recovery for Structured P2P Networks: Protocol Design and Performance Evaluation, Proceedings ACM SIGMETRICS 2004, New York City, June 2004. ( pdf , journal version ) | SSL (slides) | |
Mar 11 |
Xiaowei Yang and David Wetherall, Source Selectable Path Diversity via Routing Deflections, Proceedings ACM SIGCOMM, 2006. ( pdf ) |
Yes | Arun S. |
Mar 11 |
A. Broder and M. Mitzenmacher, Network applications of Bloom filters: A survey, Internet Mathematics, vol. 1 no. 4, pp. 485-509, 2004. ( pdf ) |
Yes | Hongkun Y. |
Mar 18 | Spring Break, no class | ||
Mar 25 | Choice-of-topic proposal due | ||
Mar 25 |
Murtaza Motiwala, Megan Elmore, Nick Feamster, and Santosh Vempala, Path Splicing, Proceedings ACM SIGCOMM, 2008. ( pdf ) |
Yes | Song H. |
Mar 25 |
Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter Reiher, Lixia Zhang, SAVE: Source Address Validity Enforcement Protocol, Proceedings IEEE INFOCOM 2002. ( pdf ) |
Yes | Xiuming Z. |
Apr 1 |
Zheng Zhang, Ying Zhang, Y. Charlie Hu, Z. Morley Mao, Randy Bush, iSPY: Detecting IP Prefix Hijacking on My Own, Proceedings ACM SIGCOMM 2008. ( pdf ) |
Yes | Jaeyoun K. |
Apr 1 |
Changhoon Kim, Matthew Caesar, and Jennifer Rexford, Floodless in SEATTLE: A Scalable Ethernet Architecture for Large Enterprises, Proceedings ACM SIGCOMM, 2008. ( pdf ) |
Yes | Taehwan C. |
Apr 8 |
Wenliang Du, Jing Deng, Yunghsiang S. Han, and Pramod Varshney, A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks, Proceedings of the 10th ACM Conference on Computer and Communications Security, Washington DC, October 2003. ( pdf ) |
Yes | Hongkun Y. |
Apr 8 |
Jiejun Kong, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia Zhang, Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks, Proceedings IEEE ICNP 2001. ( pdf ) Reference: Adi Shamir, How to Share a Secret, CACM, November 1979. ( pdf ) |
Yes | Arun S. |
Apr 15 |
Haiyong Xie, Yang Richard Yang, Arvind Krishnamurthy, Yanbin Liu, and Avi Silberschatz, P4P: Provider Portal for Applications, Proceedings of ACM SIGCOMM 2008. ( pdf ) |
Yes | Taehwan C. |
Apr 15 |
Van Jacobson, Diana K. Smetters, James D. Thornton, Michael F. Plass, Nicholas H. Briggs, and Rebecca L. Braynard, Networking Named Content, Proceedings ACM CoNext, 2009. ( pdf ) |
Yes | Jaeyoun K. |
Apr 22 |
WirelessHART Protocols |
No |
Song. H. |
Apr 22 |
Luigi Rizzo, Effective Erasure Codes for Reliable Computer Communication Protocols, ACM SIGCOMM Computer Communication Review, April 1997. ( pdf ) |
Yes | SSL (slides) |
Apr 29 |
Chen Qian and Simon S. Lam, Greedy Distance Vector Routing, to appear in Proc. IEEE ICDCS, 2011. ( pdf ) |
No | Chen Q. |
May 4, Wednesday, 5 p.m. | Term paper due - please submit a hard copy in my mailbox in CS department office (ACES 5.214) in case you don't find me in my office. | ||
May 6 |
Term project presentation |
Arun S. | |
May 6 |
Term project presentation |
Hongkun Y. |