Class
|
Date
|
Room
|
Paper title
|
Presenter
|
1
|
1/25
|
DH3076
|
Improving
Application Security with Data Flow Assertions |
Yuliy
|
2
|
2/1
|
DH3076
|
CENTAUR:
Realizing the Full Potential of Centralized WLANs through a Hybrid Data
Path |
Florin
|
3
|
2/8
|
DH3076
|
Heat-ray:
Combating Identity Snowball Attacks using Machine Learning,
Combinatorial Optimization and Attack Graphs |
Caleb
|
4
|
2/15
|
DH3076
|
Native
Client: A Sandbox for Portable, Untrusted x86 Native Code |
Mike
|
5
|
2/22
|
4:00pm McMurtry Auditorium
|
David Patterson -- The Parallel
Revolution Has Started: Are You Part of the Solution or Part of the
Problem?
|
|
6
|
3/8
|
DH3076
|
A
Comparison of Approaches to Large-Scale Data Analysis |
Luis
|
7
|
3/15
|
DH3076
|
Static
Enforcement of Web Application Integrity Through Strong Typing
|
Anping
|
8
|
3/22
|
4:00pm McMurtry Auditorium
|
Hector Ruiz -- It's All About Competition |
|
9
|
3/29
|
DH3076
|
RouteBricks:
Exploiting Parallelism to Scale Software Routers
|
Zheng
|
10
|
4/5
|
DH3076
|
MapReduce
Online
|
Zhuhua
|
11
|
4/12
|
DH3076
|
Delay-Hiding
Energy Management Mechanisms for DRAM |
Myeongjae
|
12
|
4/19
|
DH3076
|
Design,
Implementation, and Evaluation of an Efficient Opportunistic
Retransmission Protocol |
Wei-Cheng |