300 likes | 622 Views
3 rounds (3, 5, and 7 reviews) 705 reviews in total. PC meeting with heavy-load members. Conflicted PC members left. Shadow PC. Best paper awards ...
E N D
Slide 2:Thanks for coming!
Slide 3:Thanks for coming!
Slide 4:Program highlights
25 presentations WIP session Poster session SIGOPS Business meeting Awards Hall of fame papers Mark Weiser Many opportunities to mingle
Slide 5:No invited speaker
Ed Lazowska fell ill, but is recovering well Please sign Get-well card later today or tomorrow.
Slide 6:Change in the program
Swapped Concurrency and BFT Moved one talk from Distributed systems to BFT Start 30 min later on Tuesday
Slide 7:Selection process
25 out of 131 submissions Double-blind Larger PC 13 Heavy-load 13 Light-load 3 rounds (3, 5, and 7 reviews) 705 reviews in total PC meeting with heavy-load members Conflicted PC members left Shadow PC
Slide 8:Best paper awards
Secure Web Applications via Automatic Partitioning Zyzzyva: Speculative Byzantine Fault Tolerance Sinfonia: A New Paradigm for Building Scalable Distributed Systems
Slide 9:Audience choice
Each registered attendance can rank each paper on a scale of 1 (good) through 4 (seminal) Web site shows current top 3 ranked papers http://sosp2007.org Your voting ID is e61bc0a6 Purpose: compliment authors, not to hack the system!
Slide 10:Thanks to submitters and PC
Slide 11:Thanks to the general chair
Picked the location Ran all logistics Put the team together Managed finances . Is worrying about every detail Tom Bressoud
Slide 12:My Thanks to the Team
Slide 13:My Thanks for the Generous Support
Conference General Students
Slide 14:My Thanks for the Generous Support
Womens Workshop Sponsors Speakers Students
Slide 15:The Bottom Line
In 2001: 50 student scholarships In 2003: 67 student scholarships In 2005: 55 student scholarships In 2007: 117 student scholarships 51 womens scholarships
Slide 16:Whos Here
Slide 17:Academia/Industry Mix
Slide 18:Men/Women Mix
Slide 19:Announcements
Go easy on the Internet Shuttle Skamania on the hour Best Western at :15 Bonneville at :30 Presentations will be video-taped Presenters: can you sign release form?
Slide 20:SIGOPS Hall of Fame Awards
Instituted in 2005 To recognize the most influential Operating Systems papers that have appeared in the peer-reviewed literature at least ten years in the past. 5 Awards authorized for this year Award committee: 8 recent SOSP/OSDI chairs/co-chairs
Slide 21:Process
Nominations by community or by committee members Clear conflict-of-interest rules Committee unanimously agreed on the final list Announced in order of publication Process discussion: at business meeting
Slide 22:Leslie Lamport Time, Clocks, and the Ordering of Events in a Distributed System Communications of the ACM 21(7):558-565, July 1978
Slide 23:Time, Clocks, and the Ordering of Events in a Distributed System
Perhaps the first true distributed systems paper, it introduced the concept of causal ordering, which turned out to be useful in many settings. The paper proposed the mechanism it called logical clocks, but everyone now calls these Lamport clocks.
Slide 24:Andrew D. Birrell Bruce Jay Nelson Implementing Remote Procedure Calls ACM Transactions on Computer Systems 2(1):39-59, Feb. 1984
Slide 25:Implementing Remote Procedure Calls
This is the paper on RPC, which has become the standard for remote communication in distributed systems and the internet. The paper does an excellent job laying out the basic model for RPC and the implementation options.
Slide 26:J. H. Saltzer D. P. Reed D. D. Clark End-To-End Arguments in System Design ACM Transactions on Computer Systems 2(4):277-288, Nov. 1984
Slide 27:End-To-End Arguments in System Design
This paper gave system designers, and especially Internet designers, an elegant framework for making sound decisions. A paper that launched a revolution and, ultimately, a religion.
Slide 28:Michael Burrows Martín Abadi Roger Needham A Logic of Authentication ACM Transactions on Computer Systems 8(1):18-36, Feb. 1990
Slide 29:A Logic of Authentication
This paper introduced to the systems community a logic-based notation for authentication protocols to precisely describe certificates, delegations, etc. With this precise description a designer can easily reason whether a protocol is correct or not, and avoid the security flaws that have plagued protocols. Speaks-for and says are now standard tools for system designers.
Slide 30:Fred B. Schneider Implementing Fault-Tolerant Services Using the State Machine Approach: a tutorial ACM Computing Surveys 22(4):299-319, Dec. 1990
Slide 31:Implementing Fault-Tolerant Services Using the State Machine Approach:a tutorial
The paper that explained how we should think about replication ... A model that turns out to underlie Paxos, Virtual Synchrony, Byzantine replication, and even Transactional 1-Copy Serializability.