Final presentation for COMP352: Computer Networks
The final presentation will summarize a state-of-the-art
research paper on networking. Each student or team of
students will pick a different paper from the conference
NSDI 2008 (also known as the "Fifth USENIX
Symposium on Networked Systems Design and
Implementation"), read the paper and any necessary
background literature, and present a summary of the
paper. The list of papers to choose from is available
in the online NSDI
proceedings.
The course schedule
lists due dates for several milestones related to the
presentation, as follows:
- Pres1: notify the instructor of the paper you have
chosen. Notification is by email to the instructor.
Papers are selected on a first-come first-served
basis.
- Pres2: submit a 1-2 page document that includes:
- a high-level summary of your chosen paper (around 0.5-1 pages)
- a brief description of your strategy for
presenting the paper, including what will be the
important main points, and what will be left
out.
- a list of background reading that will be
completed (a minimum of one other research paper
is suggested, most likely selected from the
references in your chosen paper)
The Pres2 milestone will be awarded a grade worth 5%
of the final presentation grade.
- Pres3: the final presentation itself.
A detailed rubric for
grading of the presentation is provided.
The most important points to observe are:
- Presentations are limited to 12 minutes, plus 3
minutes for questions.
- The objective of the presentation is to
communicate the main interesting idea of the paper
to your classmates. You will need to present
sufficient background or explanatory information for
your classmates to understand the research, without
wasting time on unnecessary details.
Paper selections:
- Bachmann and Angevine: "Efficiency Through
Eavesdropping: Link-layer Packet Caching"
- Wittman: "One Hop Reputations for Peer to Peer
File Sharing Workloads"
- Flanagan: "Reducing Network Energy Consumption via Sleeping
and Rate-Adaptation"
- Carmine: "Phalanx: Withstanding Multimillion-Node
Botnets"
- Yu: "Detecting In-Flight Page Changes with Web Tripwires"
- Sola: "Swift: A Fast Dynamic Packet Filter"
- Koszowski: "Ostra: Leveraging trust to thwart unwanted
communication"
- Pesner: "Energy-Aware Server Provisioning and
Load Dispatching for Connection-Intensive Internet
Services"
- McArdle: