# The format consists of four fields separated by "|" (vertical bar, aka pipe)
# First two fields are begin and end time.
# Third field is description.
# Fourth field is "note" if there is a note attached.
# If there is a note, it follows starting on the next line,
# and continues until a line with just "end" .

Sunday, June 24, 2001 6:00pm|7:00pm|Welcome Get-Together|note
4th Floor Atrium
END

Sunday, June 24 7:00pm|8:00pm|Conference Kickoff & Student Orientation|note
Salon E
END

Thursday, June 28 5:30pm|7:00pm|Exhibition Happy Hour|note
University Hall, 3rd Floor
END

Friday, June 29 12:30pm|1:30pm|Exhibition Pizza and Soda|note
University Hall, 3rd floor
END

Friday, June 29 7:00pm|9:00pm|Conference Reception|note
Salon G
Reception/Party "Streets of Boston"
END

Thursday, June 28 12:00pm|7:00pm|USENIX 2001 Exhibition|note
University Hall, 3rd Floor
END

Friday, June 29 10:00am|4:00pm|USENIX 2001 Exhibition|note
University Hall, 3rd Floor
END

Wednesday, June 27 6:00pm|11:55pm|BoFs|note
Birds-of-a-Feather Sessions (BoFs)
Check the BoF Board in the Registration area for the latest schedule and room locations.
END

Thursday, June 28 7:00pm|11:55pm|BoFs|note
Birds-of-a-Feather Sessions (BoFs)
Check the BoF Board in the Registration area for the latest schedule and room locations.
END

Friday, June 29 9:00pm|11:55pm|BoFs|note
Birds-of-a-Feather Sessions (BoFs)
Check the BoF Board in the Registration area for the latest schedule and room locations.
END

Friday, June 29 5:45pm|6:45pm|USENIX Annual Meeting|note
Wellesley Room
END

Tuesday, June 26 9:00am|5:00pm|AFS Workshop|note
Salon A
END

Thursday, June 28 11:00am|12:30pm|The Guru Is In|note
Suffolk Room
History (UNIX, LINUX, Internet)
Peter Salus
END

2:00pm|3:30pm|The Guru Is In|note
Suffolk Room
Embedded Databases, Operating Systems, Algorithms
Keith Bostic
END

4:00pm|5:30pm|The Guru Is In|note
Suffolk Room
Legacy Systems/Big Data
Andrew Hume
END

Friday, June 29 9:00am|10:30am|The Guru Is In|note
Suffolk Room
Security
Bill Cheswick
END

11:00am|12:30pm|The Guru Is In|note
Suffolk Room
Database Administration
Ching-Ping Lin
END

2:00pm|3:30pm|The Guru Is In|note
PKI/Cryptography
Greg Rose
END

4:00pm|5:30pm|The Guru Is In|note
Security in Hardware/Electronics Design
Kingpin
END

Saturday, June 30 9:00am|10:30am|The Guru Is In|note
Firewall Design for the Paranoid
Hobbitt
END

11:00am|12:30pm|The Guru Is In|note
Network Measurement, Protocols
Vern Paxson
END

2:00pm|3:30pm|The Guru Is In|note
Student Issues
Margo Seltzer
END

# USENIX '01 Technical Sessions

Thursday, June 28 9:00am|10:30am|Opening Remarks & Awards|note
Opening Remarks & Awards
Salon E/F
Yoonho Park, USENIX '01 Program Chair, Clem Cole, FREENIX '01 Program Chair, and Dan Geer, USENIX President

Keynote: "Linux: A Strategic Disruptive Force"
Daniel D. Frye, Director of IBM Linux Technology Center

In much the same way that the Internet is a disruptive technology that has changed the way people live and work, Linux is a disruptive technology that will change the way people run their businesses. Linux is paving the way for e-business much like the Internet did, having as much impact as did electricity, phones, and faxes. Linux will make Internet business applications ubiquitous. No one vendor will be able to lock customers into buying specific hardware that runs specific applications. Software developers will be able to dramatically accelerate market access for the applications they write as they will readily run on any type of hardware. Moreover, increasing reliance on de facto standards produced by open source will fundamentally change the relationship between IT customers and IT suppliers.
END

11:00am|12:30pm|General: Operating Systems|note
General Track  Salon F

Operating Systems

Virtualizing I/O Devices on VMware Workstation's Hosted Virtual Machine Monitor
Jeremy Sugerman, Ganesh Venkitachalam and Beng-Hong Lim, VMware, Inc.

Magazines and Vmem: Extending the Slab Allocator to Many CPUs and Arbitrary Resources
Jeff Bonwick, Sun Microsystems, and Jonathan Adams, California Institute of Technology

Measuring Thin-Client Performance Using Slow-Motion Benchmarking
S. Jae Yang, Jason Nieh, and Naomi Novik, Columbia University
END

11:00am|12:30pm|Talks: WAP|note
Invited Talks  Salon E

Making the Internet Mobile: Lessons from the Wireless Application Protocol (WAP)
Sandeep Singhal, ReefEdge Inc.

Wireless operators around the world are deploying mobile Internet services based on the Wireless Application Protocol, a new suite of protocols and content formats tailored to the limited bandwidth, screen sizes, and input capabilities found in mobile devices. This talk will describe how the WAP protocols and content formats meet the challenge of extending the Internet to mobile devices and will place them in context with other emerging technologies. The talk will conclude with a discussion of the future of WAP.
END

11:00am|12:30pm|Freenix: Mac Security|note
FREENIX Track  Salon G

Mac Security
Session Chair: Dan Geer, @stake, Inc.

LOMAC: MAC You Can Live With
Timothy Fraser, NAI Labs

TrustedBSD: Adding Trusted Operating System Features to FreeBSD
Robert N. M. Watson, FreeBSD Project, NAI Labs

Integrating Flexible Support for Security Policies into the Linux Operating System
Peter Loscocco, NSA, and Stephen Smalley, NAI Labs
END

2:00pm|3:30pm|General: Security|note
General Track  Salon F

Security
Session Chair: Dan Wallach, Rice University

An Architecture for Secure Generation and Verification of Electronic Coupons
Rahul Garg, Parul Mittal, Vikas Agarwal, and Natwar Modani, IBM India Research Lab

Defective Sign & Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML
Don Davis, Shym Technology

Unifying File System Protection
Christopher A. Stein, Harvard University; John H. Howard, Sun Microsystems; and Margo I. Seltzer, Harvard University
END

2:00pm|3:30pm|Talks: IP Wireless Networking|note
Invited Talks  Salon E

Evolution of the Internet Core and Edge: IP Wireless Networking
Jim Bound, Nokia Networks, and Charles E. Perkins, Nokia Research Center

We discuss IP wireless and mobile computing, which are likely to once again revolutionize the Internet. The Internet core infrastructure and edge architecture will be affected, including adaptations to IP itself. New features and services will be installed to support billions of IP mobile nodes carried by home users, embedded devices, and professionals. Finally, we describe the evolution and integration of these new technologies into the existing Internet.
END

2:00pm|3:30pm|Freenix: Scripting|note
FREENIX Track  Salon G

Scripting
Session Chair: Erez Zadok, SUNY at Stony Brook

A Practical Scripting Environment for Mobile Devices
Brian Ward, University of Chicago

Nickle: Language Principles and Pragmatics
Bart Massey, Portland State University, and Keith Packard, SuSE Inc.

The Design and Implementation of the NetBSD rc.d System
Luke Mewburn, Wasabi Systems, Inc.
END

4:00pm|5:30pm|General: Storage I|note
General Track  Salon F

Storage I
Session Chair: Greg Ganger, Carnegie Mellon University

The Multi-Queue Replacement Algorithm for Second Level Buffer Caches
Yuanyuan Zhou and James Philbin, NEC Research Institute; and Kai Li, Princeton University

Design and Implementation of a Predictive File Prefetching Algorithm
Thomas M. Kroeger, Nokia Clustered IP Solutions, and Darrell D. E. Long, University of California, Santa Cruz

Extending Heterogeneity to RAID Level 5
T. Cortes and J. Laborta, Universitat Politcnica de Catalunya
END

4:00pm|5:30pm|Talks: Security Aspects of Napster and Gnutella|note
Invited Talks  Salon E

Security Aspects of Napster and Gnutella
Steven M. Bellovin, AT&T Labs-Research

Napster and Gnutella have attracted a great deal of attention because of their implications for (and conflicts with) copyright law, but they have much broader implications for network security. I recently analyzed both protocols, focusing on issues such as possible new attacks, traceability of behavior, and privacy. Both raise interesting questions, especially Gnutella.
END

4:00pm|5:30pm|Freenix: User Space|note
FREENIX Track  Salon G

User Space
Session Chair: Alan Nemeth, Compaq

User-Level Checkpointing for LinuxThreads Programs
William R. Dieter and James E. Lumpp, Jr., University of Kentucky

Building an Open-source Solaris-compatible Threads Library
John Wood, Compaq Computer UK Ltd

Are Mallocs Free of Fragmentation?
Aniruddha Bohra, Rutgers University, and Eran Gabber, Lucent Technologies-Bell Labs
END

Friday, June 29 9:00am|10:30am|Talks: Security for E-Voting in Public Elections|note
Invited Talks  Salon E

Security for E-Voting in Public Elections
Avi Rubin, AT&T Labs-Research

In this talk I will discuss the security considerations for remote electronic voting in public elections. In particular, I'll examine the feasibility of running national federal elections over the Internet. The focus of this talk is on the limitations of the current deployed infrastructure in terms of the security of the hosts and the Internet itself. I will conclude that at present, our infrastructure is inadequate for remote Internet voting.
END

Friday, June 29 9:00am|10:30am|Freenix: User Environment|note
FREENIX Track  Salon G

User Environment
Session Chair: Ken Coar, The Apache Software Foundation/IBM

Sandboxing Applications
Vassilis Prevelakis, University of Pennsylvania, and Diomidis Spinellis, Athens University

Building a Secure Web Browser
Sotiris Ioannidis, University of Pennsylvania, and Steven M. Bellovin, AT&T Labs-Research

Citrus Project: True Multilingual Support for BSD Operating Systems
Jun-ichiro itojun Hagino, Internet Initiative
END

11:00am|12:30pm|General: Tools|note
General Track  Salon F

Tools
Session Chair: Wuchi Feng, Ohio State University

Reverse-Engineering Instruction Encodings
Wilson C. Hsieh, University of Utah; Dawson Engler, Stanford University; and Godmar Back, University of Utah

An Embedded Error Recovery and Debugging Mechanism for Scripting Language Extensions
David M. Beazley, University of Chicago

Interactive Simultaneous Editing of Multiple Text Regions
Robert C. Miller and Brad A. Myers, Carnegie Mellon University
END

11:00am|12:30pm|Talks: Online Privacy|note
Invited Talks  Salon E

Online Privacy: Promise or Peril?
Lorrie Faith Cranor, AT&T Labs-Research

This talk will discuss the privacy concerns raised by online data-collection practices, as well as the efforts to address these concerns through laws, self-regulation, and technology. The talk will focus on the emerging Platform for Privacy Preferences (P3P) standard. P3P-enabled Web sites make statements about how they handle user data available in a machine-readable (XML) format. P3P-enabled browsers can 'read' these statements automatically and compare them to the user's privacy preferences.
END

11:00am|12:30pm|Freenix: Kernel|note
FREENIX Track  Salon G

Kernel
Session Chair: Drew Gallatin, Duke/FreeBSD

Kqueue-A Generic and Scalable Event Notification Facility
Jonathan Lemon, FreeBSD Project

Improving the FreeBSD SMP Implementation
Greg Lehey, IBM LTC Ozlabs

Page Replacement in Linux 2.4 Memory Management
Rik van Riel, Conectiva Inc.
END

12:30pm|2:00pm|Lunch in the exhibit hall|note
free pizza and sodas!
END

2:00pm|3:30pm|General: Web Servers|note
General Track  Salon F

Web Servers
Session Chair: Mohit Aron, Zambeel Inc.

High-Performance Memory-Based Web Servers: Kernel and User-Space Performance
Philippe Joubert, ReefEdge Inc.; Robert B. King, IBM Research; Richard Neves, ReefEdge Inc.; Mark Russinovich, Winternals Software; and John M. Tracey, IBM Research

Kernel Mechanisms for Service Differentiation in Overloaded Web Servers
Thiemo Voigt, Swedish Institute of Computer Science; Renu Tewari and Douglas Freimuth, IBM T.J. Watson Research Center; and Ashish Mehra, iScale Networks

Storage Management for Web Proxies
Elizabeth Shriver and Eran Gabber, Bell Labs; Lan Huang, SUNY Stony Brook; and Christopher A. Stein, Harvard University
END

2:00pm|3:30pm|Talks: Secure DNS|note
Invited Talks  Salon E

Getting to Grips with Secure DNS
Jim Reid, Nominum, Inc.

Secure DNS (DNSSEC) has been developed as a way of validating the data in the DNS and preventing spoofing attacks. The protocol uses public-key cryptography to digitally sign DNS traffic. This talk explains the new resource records that have been added to the DNS and how to use the tools in BIND9 that are provided for creating and maintaining signed zones. The practical and operational problems of deploying DNSSEC, notably key management, will also be discussed.
END

2:00pm|3:30pm|Freenix: Storage|note
FREENIX Track  Salon G

Storage
Session Chair: Clem Cole, Paceline Systems Corp.

User-Level Extensibility in the Mona File System
Paul W. Schermerhorn, Robert J. Minerick, Peter Rijks, and Vincent W. Freeh, University of Notre Dame

Volume Managers in Linux
David Teigland and Heinz Mauelshagen, Sistina Software, Inc.

The Design and Implementation of a Transparent Cryptographic File System for UNIX
Giuseppe Cattaneo, Luigi Catuogno, Aniello Del Sorbo, and Pino Persiano, Universit di Salerno
END

4:00pm|5:30pm|WiPs|note
Salon F

Work-in-Progress Reports
Session Chair: Greg Ganger, Carnegie Mellon University

Short, pithy, and fun, Work-in-Progress reports introduce interesting new or on-going work, and the USENIX audience provides valuable discussion and feedback. A schedule of presentations is posted in the Registration area.
END

4:00pm|5:30pm|Talks: Active Content|note
Invited Talks  Salon E

Active Content: Really Neat Technology or Impending Disaster?
Charlie Kaufman, Iris Associates

From Java-enabled Web pages to self-extracting zip files, the world has become addicted to active content. This powerful technique improves data compression, CPU and network efficiency, and interactive user interfaces. The price? It's nearly impossible to make secure. This talk discusses surprising places we use active content, the security threats we are ignoring, and what we as individuals and as a community can do about it.
END

Saturday, June 30 9:00am|10:30am|General: Scheduling|note
General Track  Salon F

Scheduling
Session Chair: Sheila Harnett, IBM Linux Technology Center

Pragmatic Nonblocking Synchronization for Real-Time Systems
Michael Hohmuth and Hermann Hrtig, Dresden University of Technology

Scalability of Linux Event-Dispatch Mechanisms
Abhishek Chandra, University of Massachusetts, Amherst, and David Mosberger, HP Labs

Virtual-Time Round-Robin: An O(1) Proportional Share Scheduler
Jason Nieh, Chris Vaill, and Hua Zhong, Columbia University
END

9:00am|10:30am|Talks: Myths, Missteps, and Folklore in Protocol Design|note
Invited Talks  Salon E

Myths, Missteps, and Folklore in Protocol Design
Radia Perlman, Sun Microsystems Laboratories

Network protocol design is not a nice, clean science, where what gets deployed is the best possible design. Instead, designs are influenced by issues such as politics, general confusion, and backward compatibility. Statements get repeated until it never occurs to anyone to question whether they're true. This talk discusses how some of the odder things we live with (e.g., bridges, SNAP encoding) came about, some common mistakes that have been made, and what really should matter when evaluating two competing designs. It's intended to make you question your assumptions.
END

9:00am|10:30am|Freenix: Graphics|note
FREENIX Track  Salon G

Graphics
Session Chair: Garry Paxinos, Metro Link/XFree86

Design and Implementation of the X Rendering Extension
Keith Packard, XFree86 Core Team, SuSE Inc.

Scwm: An Extensible Constraint-Enabled Window Manager
Greg J. Badros, InfoSpace.com; Jeffrey Nichols, Carnegie Mellon University; Alan Borning, University of Washington

The X Resize and Rotate Extension-RandR
Jim Gettys, Compaq, and Keith Packard, XFree86 Core Team, SuSE Inc.
END

11:00am|12:30pm|General: Storage II|note
General Track  Salon F

Storage II
Session Chair: Carla Ellis, Duke University

A Toolkit for User-Level File Systems
David Mazires, NYU

Charm: An I/O-Driven Execution Strategy for High-Performance Transaction Processing
Lan Huang and Tzi-cker Chiueh, State University of New York at Stony Brook

Fast Indexing: Support for Size-Changing Algorithms in Stackable File Systems
Erez Zadok, SUNY Stony Brook; Johan M. Andersen, Ion Badulescu, and Jason Nieh, Columbia University
END

11:00am|12:30pm|Talks: Venture-Backed Startups and Microsoft Acquisitions|note
Invited Talks  Salon E

Strangely Enough, It All Turns Out Well (Adventures in Venture-Backed Startups and Microsoft Acquisitions)
Stephen R. Walli, Microsoft Corp.

Building and running a software startup is an exciting and wild ride.  Six founders started Softway Systems in September 1995. Before Microsoft acquired it, Softway had taken four rounds of venture capital, built itself to almost forty people, had some brilliant successes and painful failures, and come close to being acquired several times by some surprising players. This talk on the start-up experience describes what it took, what worked, and what failed, from bootstrap excitement to acquisition angst (and assimiliation).
END

11:00am|12:30pm|Freenix: Securing Networks|note
FREENIX Track  Salon G

Securing Networks
Session Chair: Ted Faber, ISI/USC

MEF, Malicious Email Filter-A UNIX Mail Filter That Detects Malicious Windows Executables
Matthew G. Schultz and Eleazar Eskin, Columbia University; Erez Zadok, SUNY Stony Brook; Manasi Bhattacharyya and Salvatore J. Stolfo, Columbia University

Cost Effective Security for Small Businesses
Sean R. Brown, Applied Geographics, Inc.

Heimdal and Windows 2000 Kerberos: How to Get Them to Play Together
Assar Westerlund, Swedish Institute of Computer Science, and Johan Danielsson, Center for Parallel Computers, KTH
END

2:00pm|3:30pm|General: Networking|note
General Track  Salon F

Networking
Session Chair: Robert Miller, Carnegie Mellon University

Payload Caching: High-Speed Data Forwarding for Network Intermediaries
Kenneth Yocum and Jeffrey Chase, Duke University

A Waypoint Service Approach to Connect Heterogeneous Internet Address Spaces
T. S. Eugene Ng, Ion Stoica, and Hui Zhang, Carnegie Mellon University

Flexible Control of Parallelism in a Multiprocessor PC Router
Benjie Chen and Robert Morris, Massachusetts Institute of Technology
END

2:00pm|3:30pm|Talks: Future of Virtual Machines|note
Invited Talks  Salon E

The Future of Virtual Machines: A VMware Perspective
Ed Bugnion, VMware, Inc.

The virtual-machine concept goes back to 1960s mainframes. It has since been applied to executing legacy environments and to Java.  Today, VMware products allow multiple complete operating systems, from Linux to Windows, to run concurrently on Intel computers. This talk shows how virtual machines, which offer compatibility, isolation, encapsulation, and mobility, can solve current problems from desktops to data centers, and how this return to virtual machines may affect hardware and operating system trends.
END

2:00pm|3:30pm|Freenix: Resource Management|note
FREENIX Track  Salon G

Resource Management
Session Chair: Theodore Ts'o, VA Linux Systems

Predictable Management of System Resources for Linux
Mansoor Alicherry, Bell Labs, and K. Gopinath, Indian Institute of Science

Scalable Linux Scheduling
Stephen Molloy and Peter Honeyman, CITI-University of Michigan

A Universal Dynamic Trace for Linux and Other Operating Systems
Richard J Moore, IBM, Linux Technology Centre
END

4:00pm|5:00pm|Special Closing Session|note
Special Closing Session
Salon E

"The Art and Science of Sociable Machines"
Cynthia Breazeal, MIT Media Lab

Dr. Breazeal offers a compelling look at the science and psychology behind the hardware and software design of anthropomoprhic robots.  Dr. Breazeal has developed numerous autonomous robots, from planetary micro-rovers, to upper-torso humanoid robots, to highly expressive robotic faces.  Her current research focuses on social interaction and socially situated learning between people and life-like robots.
END

5:15pm|6:45pm|USENIX Quiz Show|note
USENIX Quiz Show
Salon G

Back by popular demand, Rob Kolstad and Dan Klein host this challenging test of wits for USENIX attendees.  Watch contestants wither under the dual spotlights of difficult questions and special attention of the moderators.
END
