Technical Program
Wednesday through Friday, June 9-11, 1999
[Wednesday, June 9] [Thursday, June 10] [Friday, June 11] |
Thursday, June 10 9:00am-10:30am Joint Opening Session, Serra Grand Ballroom | ||
Steinbeck Forum
Gizmo Databases Every five years, database researchers meet to identify and discuss the
important issues in database research. Most recently, Gizmo databases
(databases embedded in devices such as smart cards, toasters, or
telephones) were singled out as one of the most important areas for
consideration over the next few years. In this talk, I will discuss the
unique challenges and considerations inherent in Gizmo databases and how
different database systems address those issues. I will also present a
summary of the recent panel at the 1999 SIGMOD (Special Interest Group on
the Management of Data) conference, which discussed mobile and embedded
systems.
|
Serra Grand Ballroom II
Security A Future-Adaptable Password Scheme
Cryptography in OpenBSD: An Overview
Minding Your Own Business: Platform for Privacy Preferences Project and Privacy Minder |
Serra Grand Ballroom I
Networking Trapeze/IP: TCP at Near-Gigabit Speeds
Managing Traffic with ALTQ
Opening the Source Repository with Anonymous CVS |
Thursday, June 10 10:30am-11:00am Break | ||
Thursday, June 10 11:00am-12:30pm
| ||
Steinbeck Forum
Tools and Platforms
Lightweight Structured Text Processing
SBOX: Put CGI Scripts in a Box
The MultiSpace: An Evolutionary Platform for Infrastructural Services |
Serra Grand Ballroom II
Deploying IP Multicast Over the past few years, IP multicast and IP multicast-capable applications have received significant attention. IP multicast infrastructure enables scaling by conserving the bandwidth required by one-to-many applications, such as broadcast Internet Television. In addition, IP multicast has enabled many new applications such as many-to-many video conferencing. This talk will focus on the building blocks of a multicast backbone, including Multicast BGP (MBGP), Multicast Source Discovery Protocol (MSDP), and Sparse Mode PIM, and describe recent experiences in deploying multicast infrastructure.
|
Serra Grand Ballroom I
Business
Open Software in a Commercial Operating System
Business Issues in Free Software Licensing
Doing Well, Doing Good, and Staying Sane: A Hybrid Model for Sustainably Producing Innovative Open Software |
Thursday, June 10 12:30pm-2:00pm Lunch (on your own) | ||
Thursday, June 10 2:00pm-3:30pm
| ||
Steinbeck Forum
Web Servers
Web++: A System for Fast and Reliable Web Service
Efficient Support for P-HTTP in Cluster-Based Web Servers
Flash: An Efficient and Portable Web Server |
Serra Grand Ballroom II
The Joys of Interpretive Languages: Real Programmers Don't Always Use C Many programmers are far too ready to roll up their sleeves and start writing C (C++, Java, Fortran, etc.) when they should be considering alternatives first. Interpretive languages are often a better way to do things, even fairly ambitious things. Sometimes a certain amount of C (or whatever) is indicated, but even then, often better results can be had with a partnership between primitives written in C and overall control written in something else. This talk will discuss why the instant resort to C is a bad idea, describe some of the alternatives, including mixing solutions, and explain how to make the choice.
|
Serra Grand Ballroom I
Systems
Sendmail Evolution: 8.10 and Beyond
The GNOME Desktop Project
Meta: A Freely Available Scalable MTA (Mail Transfer Agent) |
Thursday, June 10 3:30pm-4:00pm Break | ||
Thursday, June 10 4:00pm-5:30pm
| ||
Steinbeck Forum
Caching
NewsCache - A High Performance Cache Implementation for Usenet News
Reducing the Disk I/O of Web Proxy Server Caches
An Implementation Study of a Detection-Based Adaptive Block Replacement Scheme |
Serra Grand Ballroom II
E-mail Bombs, Countermeasures, and the Langley Cyber Attack The robustness of the Sendmail MTA program can be misused in numerous attack scenarios to create dangerously destructive SMTP e-mail bombs. These e-mail bombs are launched by readily available automated software tools which can easily crash chains of SMTP mail servers. SMTP mail relays can also be used covertly to distribute messages and files that could be seriously damaging to the integrity and brands of victims. This talk discusses SMTP mail-bombing techniques, automated attack tools, countermeasures, and "The Langley Cyber Attack." The speaker, who was the Chief Scientist during the 1997 attack, will discuss the analysis of the cyber attack, graphs illustrating the attack volume, and a statistical e-mail bomb early warning system. Recent anti-spam enhancements to sendmail are compared to the e-mail bomb countermeasures and the "blackhole strategy" used in the Langley Cyber Attack.
|
Serra Grand Ballroom I
Kernel
Porting Kernel Code to Four BSDs and Linux
strlcpy and strlcat - Consistent, Safe, String Copy and Concatenation
pk: A POSIX Threads Kernel |
USENIX '99 Technical Program [Wednesday, June 9] [Thursday, June 10] [Friday, June 11] |
| |||||
|
Conference Index Events Calendar USENIX home |