DSG Seminar Series • Data Management for Emerging Problems in Large Networks
Please note: This seminar will take place in DC 1302.
Arijit Khan, Associate Professor
Department of Computer Science, Aalborg University
Arijit Khan, Associate Professor
Department of Computer Science, Aalborg University
Alex Wein, Assistant Professor
Department of Mathematics, University of California, Davis
Sara Qunaibi, Master’s candidate
David R. Cheriton School of Computer Science
Supervisor: Professor Samer Al-Kiswany
We present a comprehensive empirical study of the impact partial network partitions have on cluster managers in data analysis frameworks. Our study shows that modern scheduling approaches are vulnerable to partial network partitions. Partial partitions can lead to a complete cluster pause or a significant loss of performance.
Joshua Hildred, Master’s candidate
David R. Cheriton School of Computer Science
Supervisor: Professor Khuzaima Daudjee
Distributed deterministic database systems support OLTP workloads over geo-replicated data. Providing these transactions with ACID guarantees requires a delay of multiple wide-area network (WAN) round trips of messaging to totally order transactions globally.
Oana Balmau, Assistant Professor
School of Computer Science, McGill University
Joel Reardon, Associate Professor
Department of Computer Science, University of Calgary
Mozilla curates a set of root certificate authorities to validate hostnames for TLS in the Firefox browser. Many other software projects, such as Tor Browser and ca-certificates simply follow Mozilla’s list; other entities, such as Apple and Microsoft, make their own decisions for inclusion with considerations for Mozilla’s decisions and the associated public discussion.
John Speed Meyers
Security Data Scientist, Chainguard
Yiwei Lu, PhD candidate
David R. Cheriton School of Computer Science
Supervisor: Professor Yaoliang Yu
Indiscriminate data poisoning attacks aim to decrease a model’s test accuracy by injecting a small amount of corrupted training data. Despite significant interest, existing attacks remain relatively ineffective against modern machine learning (ML) architectures.
Ende Jin, Master’s candidate
David R. Cheriton School of Computer Science
Supervisors: Professors Yizhou Zhang, Ondřej Lhoták
With the growing practice of mechanizing language metatheories, it has become ever more pressing that interactive theorem provers make it easy to write reusable, extensible code and proofs.
Bailey Kacsmar, PhD candidate
David R. Cheriton School of Computer Science
Supervisor: Professor Florian Kerschbaum