Colloquium Archive

The Microprocessor Ten Years From Now: How Do We Harness The Raw Power Technology Will Provide?

Yale Patt, University of Texas, Austin

02/17/2005

Processor technology is alive and well: within a few years, more than one billiontransistors on each silicon die, with geometries so small that we will run these chips atfrequencies in excess of 10 GHz. However, it is already the case that this increase inraw power is not being effectively utilized. In fact, the naysayers suggest that theproblems will get worse, and we may as well just give up trying. In this talk, I willattempt to identify the problems and suggest ways to keep us on track to takeadvantage of what device technology will provide.

The Full Function Ims Hdam, Hidam And Haldbdatabases From Ibm

Brian J. Marshall, Computer Associates International, Napa

02/24/2005

What is the physical layout of IBM Hierarchical (HDAM, HIDAM and HALDB) Databases? What are the underlying methods by which the IMS DBMS stores data inthese databases? What is the meaning of Segment Codes and Relative Byte Addresses? How does the IMS go about locating space for segments in the database?

Honeyd - A Virtual Honeypot Framework

Niels Provos , Google, Mountain View

03/03/2005

A honeypot is a closely monitored network decoy serving several purposes: itcan distract adversaries from more valuable machines on a network, can provide early warning about new attack and exploitation trends, or allowin-depth examination of adversaries during and after exploitation of ahoneypot. Deploying a physical honeypot is often time intensive andexpensive as different operating systems require specialized hardware andevery honeypot requires its own physical system. This talk presents Honeyd, a framework for virtual honeypots that simulates virtual computer systems atthe network level. The simulated computer systems appear to run onunallocated network addresses. To deceive network fingerprinting tools, Honeyd simulates the networking stack of different operating systems andcan provide arbitrary routing topologies and services for an arbitrary numberof virtual systems. This talk discusses Honeyd's design and shows how theHoneyd framework helps in many areas of system security, e.g. detecting anddisabling worms, distracting adversaries, or preventing the spread of spamemail.

Anatomy Of An Algorithm

Bryan Higgins, Motet, Berkeley

03/10/2005

Bryan Higgins was one of the principal developers of OmniPage, the top-sellingoptical character recognition (OCR) program. The talk focuses on one algorithm fromthat program, examining how the hardware constraints of the day influenced thealgorithm's design, and how changing technology and market forces influenced its evolution.

Interactive Rendering Of Planetary-Scale Geometry And Texture

Kenneth I. Joy, University of California, Davis

03/17/2005

The real-time display of huge geometry and imagery databases involves view-dependent approximations, typically through the use of precomputed hierarchies that are selectively refined at runtime. This talk focuses on the problem of terrainvisualization, in which planetary databases involving billions of elevation and color values are displayed in PC graphics hardware at high frame rates. We show how innovative data structures, new out-of-core storage organization based on space-filling curves, and optimization using graphics processors can be used to solve this problem.

Pages