Operating Systems Techniques

COP 6614 - Operating Systems Techniques

TueThu 4:30 p.m. - 5:45 p.m.
Fall 2004, ENG-II 105

Instructor: Euripides Montagne

News: I have posted all presentations sent to me. One student is yet to send me his presentation. I am trying to contact him, but if any of you happen to know him, please ask him to send me the presentations. .!!!


Introduction
Course organization and Review.
Groups
Projects
Review Lectures
Interrupt Handling Review
Fundamentals of Distributed Systems
Hoare, C.A.R., J.Communicating Sequential Processes, Communications of the ACM, August 1978, pp. 666-677.
(Radhey Shah - 10/05/04) Presentation Slides

Lauer, H.C., and Needham, R. M.,,On the Duality of Operating System Structures, Proc. Second Int'l Symposium on Operating Systems, IRIA, October 1978, reprinted in Operating Systems Review, Vol. 13, No. 2, April 1979, pp. 3-19
(Nicholas Lovett - 10/05/04) Presentation Slides

Birrell, A.D. and Nelson, B. J.,Implementing Remote Procedure Calls, ACM Transactions on Computer Systems, February 1984, pages 39-59.
(Saraswathy Somasundaram - 10/07/04) Presentation Slides

Lamport, L.,, Time, Clocks, and the Ordering of Events in a Distributed System, Communications of the ACM, July 1978, pages 558-565
(Leif Halvorsen - 10/07/04) Presentation Slides

Ricart, G. and Agrawala, A. K.,, An Optimal Algorithm for Mutual Exclusion in Computer Networks, Communications of the ACM, January 1981, pages 9-17
(Shawn Embleton - 10/12/04) Presentation Slides

Lamport, L., Shostak, R., and Pease, M., The Byzantine Generals Problem, ACM Transaction on Programming Languages and Systems, July 1982, pp. 382-401.
(Harish Ramakrishnan - 10/12/04) Presentation Slides

Bartlett, J. F., A Nonstop Kernel, In Proceedings of the 8th ACM Symposium on Operating Systems Principles, Dec. 1981, pp. 22-29.
(Craig Fruetel - 10/14/04) Presentation Slides

Douglis, F., Kaashoek, M.F., Ousterhout, J. K., and Tanebaum, A. S. A Comparison of Two Distributed Systems: Amoeba and Sprite , Computing Systems, December 1991, pp. 353-384.
(Finny Varghese - 10/14/04) Presentation Slides

Ghemawat, S., Gobioff, H., and Leung, S. The Google File System , Proceedings of the Nineteenth ACM symposium on Operating systems principles, October 2003, pp. 29-43.
(Pankaj Mahajan - 10/19/04)
Protection and Security
Dennis, J. B. and Van Horn, E. C., Programming Semantics for Multiprogrammed Computations, Communications of the ACM 9(3), March 1974, pp. 143-155.
(Sharon Rajan - 10/19/04) Presentation Slides

Schroeder, M. D. and Saltzer, J. H. , A Hardware Architecture for Implementing Protection Rings, Communications of the ACM 15(3), March 1972, pp. 157-170.
(Sheetal Shankaregowda - 10/21/04) Presentation Slides

INTEL., Pentium Protection Rings, Architecture and Programming Manual Vol. 3, Chapter 12, 1995, pp. 12-1-12-27.
(Sherri Sparks - 10/21/04) Presentation Slides

Fabry, R. S., Capability-Based Addressing, Communications of the ACM 17(7), July 1974, pp. 403-412.
(Rajan John Thomas - 11/04/04) Presentation Slides

England, D.M., The Capability Concept Mechanism and Structure in System 250, IRIA International Workshop on Protection in Operating Systems, Rocquencourt, (1974), pp. 63-82.
(Christian Diercks - 11/04/04) Presentation Slides

Saltzer, J. H. and Schroeder, M. D. , The Protection of Information in Computer Systems, Proceedings of the IEEE, 63(9), September 1975, pp. 1278-1308.
(KeeHong Pang - 11/09/04) Presentation Slides

Cohen, E. and Jefferson, D., Protection in The Hydra Operating System, Proceedings of the fifth ACM symposium on Operating systems principles, June 1975, pp. 141-160.
(Farhan Saleem Khan - 11/09/04) Presentation Slides

Denning, D. E. and Denning, P. J., Data Security, Computing Surveys, 11(3), September 1979, pp. 227-249.
(Jeffrey L. Welch - 11/11/04) Presentation Slides

Morris, R., and Thompson, K., Password Security: A Case History, Communications of the ACM, 22(11), November 1979, pp. 594-597.
(Matthew Little - 11/11/04) Presentation Slides

Lampson, B. W. A Note on the Confinement Problem, Communications of the ACM, 16(10), October 1973, pp. 613-615.
(James Campbell - 11/16/04) Presentation Slides

Needham, R.M. and Schroeder, M.D. Using Encryption for Authentication in Large Networks of Computers , Communications of the ACM, Vol. 21, No. 12 (December 1978), pp. 993-999.
(Musawir Shah - 11/16/04) Presentation Slides

Steiner, J.G., Neuman, C., and Schiller, J.I Kerberos: An Authentication Service for Open Network Systems , USENIX Winter Conference Proceedings, February 1988, pp. 191-202.
(Gautami Shirhatti - 11/18/04) Presentation Slides