FIND
NSF NSF





Spring 2009 Find meeting
April 6-7, 2009
Arlington,VA

Agenda

 

Day 1: Monday, April 6

8:30-9:00      Continental breakfast
9:00-9:30      Introduction to meeting objective of meeting; the review panal
9:30-10:30    3 talks:
                     Deborah Estrin, UCLA, Mobile Personal Sensing: speculating about information flow control requirements and architecture (Slides)
                     Robin Kravets, UIUC, Enabling Post-disaster Communication (Slides)
                     S. Jain, WINLAB, Rutgers University, The Cache-and-Forward Architecture for mobile content Delivery
10:30-11:00  Break
11:00-12:00  3 talks:
                     Dmitri Krioukov, CAIDA/UCSD, Hidden Metric Spaces and Navigability of complex Networks (Slides)
                     Mung Chiang, Princeton University, Can random access be optimal? (Slides)
                     Mark Allman, ICSI, User-Oriented Networking (Slides)

12:00-1:00    Lunch
1:00-2:00     Work in progress session
                      Dan Massey (Slides)
                      Alex Snoeren (Slides)
                      Felix Wu (Slides)
                      Ken Birman (Slides)
                      Keren Bergman (Slides)

2:00-3:00       3 talks:
                      Henning Schulzrinne, Columia university, NetServ - dynamic in-network service deployment (Slides)
                      Aditya Akella, UW-Madison, Redundant Traffic Elimination as a Network-Wide Service (Slides)
                      Rajesh Talpade, Telcordia Technologies, Synthesis and Debugging of network Configurations: Case Study Of A Government Collaberation Infrastucture
3:00-3:30       Break
3:30-4:30       3 talks:
                      T. S. Eugene Ng, Rice University, The Struggle for Network Control: How Can Distributed and Centralized Controls Effectively Collaborate? (Slides)
                      Scott Jordan, University of California, Irvine, Impact of Communications Law and Economics upon Network Architecture (Slides)
                      Vincent Chan, MIT, Optical Network Architecture (Slides)
4:30-5:15       Panel on the impact of FIND
                      Scott Shenker, Berkeley
                      Deborah Estrin, UCLA
                      Lixia Zhang, UCLA
5:15-5:45       David Clark, MIT, Architecture from the Top Down (Slides)
5:45               Reception/dinner

Day 2, Tuesday, April 7

8:30-9:00       Continental breakfast
9:00-10:20     4 talks:
                      James Sterbenz, The University of Kansas, Topology and Challenge Generation for the PostModern Internet (Slides)
                      Ken Calvert, University of Kentucky, A Source-Routed Network Layer (Slides)
                      Ilia Baldine, Renaissance Computing Institute, SILO: a novel framework for flexible protocol composition (Slides)
                      Nirmala Shenoy, Rochester Inst. of Technology, An hybrid architecture with flexible addressing and robust protocol stack (Slides)
10:20-10:40   Break
10:40-12:00   4 talks:
                      Murat Yuksel, University of Nevada - Reno, Contract Switching: Value Flows in Inter-Domain Routing (Slides)
                      Roch Guerin, University of Pennsylvania, Exploring the adoption of new network technologies and architectures (Slides).
                      John Musacchio, University of California, Santa Cruz, Markets and Networks (Slides)
                      Xiaowei Yang, Duke University, TBD: Robust Resource Allocation in the Internet (Slides)
12:00-1:00     Lunch
1:00-2:00       Discussion with external reviewers
2:00-2:30       Break
2:30-4:10       5 talks:
                      Peter Steenkiste, CMU, CogNet (Slides)
                      Marco Gruteser, WINLAB, Rutgers University, A Geometric Stack for Location-Aware Networking (Slides)
                      Nick Feamster, Georgia Tech, Trellis (Slides)
                      Karen Sollins, MIT, Early thought on an architecture for network management (Slides)
                     Masaki Fukushima, KDDI and University of California, Irvine, A new secure computing architecture based on anonymity in a network and its quantitative analysis
4:10               Adjourn