Class
|
Date
|
Room
|
Paper title
|
Presenter
|
1
|
9/8
|
DH3076
|
Lest we
remember: cold boot attacks on encryption keys |
Beth
|
2
|
9/15
|
DH3076
|
Cancelled due to Hurricane Ike
|
|
3
|
9/22
|
DH3076
|
Floodless in SEATTLE:
A Scalable Ethernet Architecture for Large Enterprises |
Guohui |
4
|
9/29
|
DH3076
|
Tesseract: A
4D Network Control Plane
|
Jie
|
5
|
10/6
|
DH3076
|
Consensus
Routing: The Internet as a Distributed System
|
Bo
|
6
|
10/20
|
DH3076
|
All your
IFRAMEs point to us
|
Dan
|
7
|
10/27
|
DH3076
|
A Scalable, Commodity
Data Center Network Architecture
|
Jeff
|
8
|
11/3
|
DH3076
|
Bridging
the Gap between Software and Hardware Techniques for I/O Virtualization
|
Mike F.
|
9
|
11/10
|
DH3076
|
Hypervisor
suppport for identifying covertly executing binaries |
Michael D.
|
10
|
11/17
|
DH3076
|
Packet Caches on
Routers: The Implications of Universal Redundant Traffic Elimination
|
Florin |
11
|
11/24
|
DH3076
|
Virtual Routers on
the Move: Live Router Migration as a Network-Management Primitive
|
Zheng
|
12
|
12/1
|
DH3076
|
Data Detection and Dissemination with DIP |
Yanjun
|