Main Menu

spencer rugaber how to read a research paper

Schedule Date Topic Readings (from Reading List) Presenters Slides 1/22 Course Overview; Survey of Wireless Networks Chapter on Wireless Networks in Kurose, Ross or other networking text Instructor Lecture 1 1/29 Survey of Cryptographic Protocols Appendix A (Buttyan, Hubaux) or any security/crypto textbook Instructor Lecture 2 1/29 Security of Existing Wireless Networks Chapter 1 (Buttyan, Hubaux) Instructor Lecture 3 2/5 Security of Emerging Wireless Networks Chapter 2, 3 (Buttyan, Hubaux) Instructor Lecture 4 2/12, 2/19  Secure Addressing & Naming; Establishing Security Associations Chapter 4, 5 (Buttyan, Hubaux) Instructor Lecture 5 2/26 Establishing Security Associations  Resurrecting Duckling, SPINS Venkatesh, Eric spins rd 3/4 Establishing Security Associations LEAP+, ChanPS Adam, Aparna leap, cps 3/18  Establishing Security Assocations HubauxBC, URSA Imran, John ursa, HubauxBC 3/25 Secure Routing KarlofWagner, Wormhole Attacks Meixing, Venkatesh secure-routing, wormhole 4/1 Secure Routing Ariadne, ParnoLGP Eric, Adam ariadne, ParnoLGP 4/8 Secure Services and Applications Guest Lecture (secure aggregation), Guest Lecture (Node replication attacks) Sankar Roy, Mauro Conti 4/22 Secure Services and Applications TinySeRSync, CapkunRCS, Meixing, Imran capkunRCS, tinysersync 4/29 Privacy MolnarWagner, CapkunHJ Aparna, John CapkunHJ MolnarWagner 5/6 Project Presentations.
1. Finding a Topic (Dianne Prost O'Leary, University of Maryland)2. Guide for writing a research proposal (Joseph Levine, Michigan State University)3. Critically analysing information sources (Cornell University library)C4. How to read a research paper (Spencer Rugaber, Georgia Tech University)5. Critical Reading (University of Toronto)6. Previewing, Skimming and Scanning (University of Toronto)7. A few tips on conducting a literature review (University of Toronto) 1. Organizing an Essay (University of Toronto)2. Outlining (Writing Center, Harvard University)3. Using Thesis statements (University of Toronto)4. Introductions and Conclusions (University of Toronto)5. Paragraphs (Purdue University)6. Topic Sentences (Writing Center, Harvard University).
            HOW TO READ A RESEARCH PAPER Among the questions that you should ask yourself when reading a research paper are the following. 1. What is the research paradigm that the author is using?  Example paradigms    are psychological experiments, formalization and theorem proving, and    artifact design and construction.  If the paper is part of a well    established field, you should describe the field and its current state. 2. What is the problem area with which the paper is concerned?  For example,     Automatic Generation of Compilers from Denotational Semantic Descriptions    of the Source Code  would describe a research paper on compilation. 3. What is the author's thesis?  That is, what is he/she trying to convince    you of? 4. Summarize the author's argument.  That is, how does the author go about    trying to convince you of the thesis? 5. Does the author describe other work in the field?  If so, how does the    research described in the paper differ from the other work? 6. Does the paper succeed?  Are you convinced of the thesis by the time that    you have finished reading the paper? 7. Does the author indicate how the work should be followed up on?  Does the    paper generate new ideas. 8. Some papers implicitly or explicitly provide a new way of doing things or    of thinking about problems.  If your paper does so, describe the approach.
Course Description This course will discuss advanced topics and research issues in operating systems. Topics will be drawn from a variety of operating systems areas such as distributed systems and languages, networking, security, and protection, real-time and embedded systems, modeling and analysis, etc. We will take a broad view of systems research and consider common issues that emerge across operating systems, database systems, networked systems, distributed systems, mobile systems, and embedded systems. The design of computer systems -- whether building-size or hand-held, file system or database -- faces many common challenges and pitfalls. Fortunately, many of the principles and practices are common as well. This class will focus on identifying and understanding the enduring principles and practices in computer systems design and implementation, and will prepare students to carry our substantial independent systems research projects. Syllabus (Tentative) Mtg Date Readings Lead Week 1 Jan 10 Introduction to EECS 582 The TerraSwarm Research Center, Edward A. Lee, et al. UC Berkeley EECS Technical Report No. UCB/EECS-2012-207 (slides) prabal Classic Systems Week 2 Jan 15andJan 17 The UNIX Time-Sharing System, Dennis M. Ritchie and Ken Thompson, Communications of the ACM, Vol. 17, No. 7, Jul 1974, pp. 365-375. (no summary) A Protocol for Packet Network Intercommunication, Vinton G. Cerf and Robert E. Kahn, IEEE Trans on Comm. Vol. 22, No. 5, May 1974, pp. 637-648. (no summary) prabal Week 3 Jan 22andJan 24 A History and Evolution of System R, Donald D. Chamberlin, et al., Communications of the ACM, Vol. 24, No. 10, Oct 1981, pp. 632-646. (no summary) A Case for Redundant Arrays of Inexpensive Disks (RAID), David A. Patterson, Garth Gibson, and Randy H. Katz, ACM SIGMOD Conference on Management of Data, Chicago IL, June 1988. (no summary) prabal The Home and Office.



« (Previous News)