{"id":10,"date":"2018-12-31T19:05:51","date_gmt":"2018-12-31T19:05:51","guid":{"rendered":"https:\/\/wordpress-courses1819.wolfware.ncsu.edu\/csc724-sprg-2019-yh55qbm\/?page_id=10"},"modified":"2026-04-17T21:19:41","modified_gmt":"2026-04-17T21:19:41","slug":"index","status":"publish","type":"page","link":"https:\/\/wordpress-courses2527.wolfware.ncsu.edu\/csc-724-001-sprg-2026\/","title":{"rendered":"CSC 724: Advanced Distributed Systems"},"content":{"rendered":"<p style=\"text-align: center\"><strong>CSC 724: Advanced Distributed Systems<\/strong><\/p>\n<p style=\"text-align: center\"><strong>Spring 2026<br \/>Credits: 3<br \/>Meeting Times: Tuesday\/Thursday, 11:45am &#8211; 1pm<br \/>Meeting Location: Fitts-Woolard Hall 02121<br \/><a href=\"https:\/\/moodle-courses2527.wolfware.ncsu.edu\/course\/view.php?id=8373\">Moodle<\/a><br \/><a href=\"https:\/\/moodle-courses2527.wolfware.ncsu.edu\/mod\/url\/view.php?id=955172\">Piazza<\/a><\/strong><\/p>\n<h3>Instructor Information<\/h3>\n<ul>\n<li>Xiaohui (Helen) Gu<\/li>\n<li>Office Hours: Tuesday\/Thursday 3:30pm-4pm<\/li>\n<li>Email : xgu AT ncsu.edu<\/li>\n<\/ul>\n<h3>Teaching Assistant<\/h3>\n<ul>\n<li>Tural Mehtiyev<\/li>\n<li>Office Hours : Friday 2:00 pm-3 pm (<a href=\"https:\/\/moodle-courses2527.wolfware.ncsu.edu\/mod\/url\/view.php?id=1008933\">Zoom Link<\/a>)<\/li>\n<li>Email : tmehtiy AT ncsu.edu<\/li>\n<\/ul>\n<h3>Course Objectives<\/h3>\n<p>This course explores design and implementation principles in modern distributed systems. In particular, the course will emphasize on recent techniques used by real-world distributed systems such as cloud systems, enterprise data center, and peer-to-peer file sharing (e.g., BitTorrent). Students will learn the state of the art in distributed system architectures, algorithms, and performance evaluation methodologies. Topics include canonical distributed concepts such as remote procedure call, distributed objects, replication, distributed system security, concensus protocol, and recent distributed system technologies such as peer-to-peer, grid, autonomic computing, distributed massive data processing\/Google map-reduce, system machine learning, distributed system debugging, multi-core systems, distributed virtualization. On completing this course, the student should be able to the following:<\/p>\n<ul>\n<li>Identify research problems and challenges in distributed systems, (assessed by review and presentation);<\/li>\n<li>List the state-of-art tools and techniques for addressing research problems and challenges in distributed systems (assessed by review and presentation);<\/li>\n<li>Develop and implement new ideas to solve open problems in distributed systems (assessed by project);<\/li>\n<li>Conduct technical reviews, technical writing, and technical presentations (assessed by review, project, paper, presentation).<\/li>\n<\/ul>\n<h3>Text Books<\/h3>\n<p>There are no assigned textbooks for this course. Topics will be covered during in-class lectures, and through course notes made available on this web page.<\/p>\n<p>Links to the supplementary material in the form of research papers related to each topic are included in this <a href=\"https:\/\/wordpress-courses2527.wolfware.ncsu.edu\/csc-724-001-sprg-2026\/syllabus\/\">syllabus<\/a>. PDF for most papers is available through the <a href=\"http:\/\/www.lib.ncsu.edu\/\">NCSU library web site<\/a>, which has full-text access to most recent ACM and IEEE journals and conferences. A number of supplemental distributed system textbooks are also available:<\/p>\n<p><a href=\"http:\/\/www.amazon.com\/Distributed-Systems-Concepts-Design-3rd\/dp\/0201619180\">Distributed Systems: Concepts and Design<\/a>, (4th Edition), G. Coulouris, J. Dollimore, and T. Kindberg<\/p>\n<p><a href=\"http:\/\/www.amazon.com\/Distributed-Systems-2nd-Sape-Mullender\/dp\/0201624273\">Distributed Systems<\/a> (2nd Edition), Sape Mullender<\/p>\n<p><a href=\"http:\/\/www.amazon.com\/Distributed-Systems-Principles-Paradigms-2nd\/dp\/0132392275\/ref=pd_bxgy_b_text_b\/002-0461668-4888807\">Distributed Systems: Principles and Paradigms<\/a>, Andrew S. Tanenbaum, Maarten van Steen<\/p>\n<h3>Course Description<\/h3>\n<p>Distributed systems have become the fundamental computing infrastructure for many important real-world applications such as Internet search engine, media streaming servers, online file sharing, information analytics, and scientific exploration. This course explores design and implementation principles in modern distributed systems. In particular, the course will emphasize on recent techniques used by real-world distributed systems such as peer-to-peer file sharing (e.g., BitTorrent), enterprise data center, and Internet search engine (Google). Students will learn the state of the art in distributed system architectures, algorithms, and performance evaluation methodologies. Topics include i) traditional distriubted computing concepts (e.g., distriubted objects, middleware, replication, distributed system security, and concensus protocol); and ii) recent emergent distributed system techniques such as peer-to-peer systems, massive data processing, Grid, and autonomic computing. Students will have opportunities to not only learn the common design methodology of many important distributed systems, but also gain hands-on experience through project implementations. The majority of course materials will be drawn from classic papers and current state-of-the-art work. The instructor will lecture for the first half of the semester and students will present papers and projects in the second half of the semester. Students will read and review papers ahead of time, participate in class discussions, present at least one research topic during the course, and do a term project individually or in a two-member team. Students will also write a paper (as well as review other students&#8217; papers) describing their project and present their work at the end of the course, in a &#8220;conference&#8221; format designed to give students an experience similar to that of participating in a professional conference.<\/p>\n<h3>Prerequisites<\/h3>\n<p>CSC501 or equivalents. Programming in C++ or Java in Unix environment. If you are not sure whether you can attend this course, please consult the instructor.<\/p>\n<h3>Tentative Grading Policy<\/h3>\n<p>Written reviews 20%, class participation 20% (presentation: 10%, discussion: 10%), project 60% (proposal writeup 5%, proposal presentation 5%, Project MidReview Presentation 5%, demo 15%, final presentation 10%, Final write-up 20%)<\/p>\n<h3>Late policy<\/h3>\n<p>Calculated by the time recorded in the assignment emails received to the instructor. Students will lose 25% for each 24-hour period they are late on reviews, project, or paper.<\/p>\n<h3>Paper Review<\/h3>\n<p>Review guidelines: Provide a paragraph of summary about the paper, a paragraph of 2-3 strong points of the paper (i.e., Why the paper should be accepted), a paragraph of 2-3 weak points of the paper (i.e., why the paper should be rejected), brainstorming ideas for developing new research ideas related to the work described in the paper(optional).<\/p>\n<ul>\n<li><a href=\"http:\/\/www-cse.ucsd.edu\/users\/wgg\/CSE210\/howtoread.html\">How to read an engineering research paper<\/a> by Bill Griswold<\/li>\n<li><a href=\"http:\/\/www1.cs.columbia.edu\/%7Ekaiser\/relatedwork.htm\">Suggested guidelines for finding &#8220;related work&#8221; for conference papers<\/a> by Gail Kaiser<\/li>\n<li><a href=\"http:\/\/pag.csail.mit.edu\/%7Emernst\/advice\/review-technical-paper.html\">Reviewing a technical paper<\/a> by Mike Ernst<\/li>\n<\/ul>\n<h3>Project<\/h3>\n<ul>\n<li><a href=\"https:\/\/wordpress-courses2527.wolfware.ncsu.edu\/csc-724-001-sprg-2026\/suggested-term-project-topics\/\">Suggested Term Project Topics<\/a> (NCSU unity ID required).<\/li>\n<li>Course project development environment: Amazon AWS, Google Cloud, VCL<\/li>\n<\/ul>\n<p>Both project proposal and final report should follow typical paper requirements using <a href=\"http:\/\/www.acm.org\/sigs\/publications\/proceedings-templates\">ACM Double-Column Paper format<\/a>. The project proposal should include abstract, introduction, proposed approaches, and related work. The final project report should include a full paper content including abstract, introduction, design and algorithms, experiment evaluation, related work, and conclusion. We will organize a mini-conference for the students to present their project work. Three best papers will be selected during the mini-conference.<\/p>\n<h3>Class Schedule (<i>Tentative<\/i>)<\/h3>\n<table border=\"1\" width=\"1256\">\n<tbody>\n<tr>\n<td width=\"2%\">W<\/td>\n<td width=\"5%\">Date<\/td>\n<td width=\"15%\">Topic<\/td>\n<td width=\"50%\">Assigned Readings<\/td>\n<td width=\"24%\">Assignments<\/td>\n<\/tr>\n<tr>\n<td colspan=\"1\" rowspan=\"2\">1<\/td>\n<td>1\/13<\/td>\n<td colspan=\"1\" rowspan=\"1\">\n<p style=\"text-align: center\">Introduction<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/moodle-courses2527.wolfware.ncsu.edu\/mod\/resource\/view.php?id=1002997\">[slides]<\/a><\/p>\n<\/td>\n<td>\n<ul>\n<li>Chapter 1, Distributed Systems: Concepts and Design<\/li>\n<\/ul>\n<\/td>\n<td colspan=\"1\" rowspan=\"2\">Investigate your term project idea and do preparation for it. A list of candidate project topics will also be provided to you on the class. Talk to the instructor about your project idea and talk to other students in forming a two-three members group. Email the instructor to setup the appointment.\n<p><strong>1\/18 midnight: review due<\/strong> for<\/p>\n<ul>\n<li><a href=\"http:\/\/research.microsoft.com\/users\/lamport\/pubs\/time-clocks.pdf\">Time, clocks and the ordering of events in a distributed system<\/a>, L. Lamport, Communications ACM 1978. and<\/li>\n<li><a href=\"http:\/\/portal.acm.org\/citation.cfm?id=214456&amp;coll=GUIDE&amp;dl=GUIDE&amp;CFID=26963081&amp;CFTOKEN=98284324\">Distributed snapshots: determining global states of distributed systems<\/a>, Chandy and Lamport, ACM TOCS 1985.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>1\/15<\/td>\n<td>\n<p style=\"text-align: center\">Replication<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/moodle-courses2527.wolfware.ncsu.edu\/mod\/resource\/view.php?id=1007804\">[slides]<\/a><\/p>\n<\/td>\n<td>\n<ul>\n<li>Chapter 14, <a href=\"http:\/\/www.amazon.com\/Distributed-Systems-Concepts-Design-3rd\/dp\/0201619180\">Distributed Systems: Concepts and Design<\/a><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td colspan=\"1\" rowspan=\"2\" width=\"2%\">2<\/td>\n<td width=\"5%\">1\/20<\/td>\n<td width=\"15%\">\n<p style=\"text-align: center\">Project Testbed<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/moodle-courses2527.wolfware.ncsu.edu\/mod\/resource\/view.php?id=1022697\">[slides]<\/a><\/p>\n<\/td>\n<td width=\"50%\">\u00a0<\/td>\n<td colspan=\"1\" rowspan=\"2\" width=\"24%\">Investigate your term project idea and do preparation for it. Talk to the instructor about your project idea and talk to other students in forming a group if you would like to work in a group.\n<p><strong>1\/25 midnight: review due<\/strong> for<\/p>\n<ul>\n<li>Rowstron and P. Druschel, &#8220;<a href=\"https:\/\/research.microsoft.com\/en-us\/um\/people\/antr\/PAST\/pastry.pdf\">Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems<\/a>&#8220;. Middleware, 2001 and<\/li>\n<li>Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, and Hari Balakrishnan, &#8220;<a href=\"http:\/\/pdos.csail.mit.edu\/papers\/chord:sigcomm01\/chord_sigcomm.pdf\">Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications<\/a>&#8220;, Proc. of SIGCOMM, 2001.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>1\/22<\/td>\n<td>\n<p style=\"text-align: center\">Project Testbed<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/moodle-courses2527.wolfware.ncsu.edu\/mod\/resource\/view.php?id=1022697\">[slides]<\/a><\/p>\n<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"2\" width=\"2%\">3<\/td>\n<td width=\"5%\">1\/27<\/td>\n<td width=\"15%\">\n<p style=\"text-align: center\">Project Testbed<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/moodle-courses2527.wolfware.ncsu.edu\/mod\/resource\/view.php?id=1022697\">[slides]<\/a><\/p>\n<\/td>\n<td width=\"50%\">\n<p>&nbsp;<\/p>\n<\/td>\n<td rowspan=\"2\" width=\"24%\"><strong>2\/1 midnight: review due<\/strong> for\n<ul>\n<li>I. Cohen and S. Zhang and M. Goldszmidt and J. Symons and T. Kelly and A. Fox, <a href=\"http:\/\/www.ifp.uiuc.edu\/%7Eiracohen\/publications\/Cohen_etalSOSP2005.pdf\">Capturing, indexing, clustering, and retrieving system history<\/a>, Proc. of SOSP, 2005.<\/li>\n<li>I. Cohen and M. Goldszmidt and T. Kelly and J. Symons and J. S. Chase, <a href=\"http:\/\/www.ifp.uiuc.edu\/%7Eiracohen\/publications\/OSDI2004.pdf\">Correlating Instrumentation Data to System States: A Building Block for Automated Diagnosis and Control<\/a>, Proc. of OSDI, 2004.<\/li>\n<\/ul>\n<p><strong>Sunday midnight: Paper presentation signup<\/strong> due. Please send an email to the <strong>TA<\/strong> to bid three papers in the list below and list your choices in decreasing order. You will be allocated with one paper to present based on the FCFS policy and paper availability.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"5%\">1\/29<\/td>\n<td width=\"15%\">\n<p style=\"text-align: center\">Consensus Protocol<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/moodle-courses2527.wolfware.ncsu.edu\/mod\/resource\/view.php?id=1026332\">[slides]<\/a><\/p>\n<\/td>\n<td width=\"50%\">\n<ul>\n<li><a href=\"http:\/\/portal.acm.org\/citation.cfm?id=214121&amp;coll=portal&amp;dl=ACM&amp;CFID=11971489&amp;CFTOKEN=43811585\">Impossibility of distributed consensus with one faulty process<\/a>, Fischer, Lynch and Patterson, Journal ACM 1985.<\/li>\n<li><a href=\"http:\/\/research.microsoft.com\/users\/lamport\/pubs\/time-clocks.pdf\">Time, clocks and the ordering of events in a distributed system<\/a>, L. Lamport, Communications ACM 1978.<\/li>\n<li><a href=\"http:\/\/portal.acm.org\/citation.cfm?id=214456&amp;coll=GUIDE&amp;dl=GUIDE&amp;CFID=26963081&amp;CFTOKEN=98284324\">Distributed snapshots: determining global states of distributed systems<\/a>, Chandy and Lamport, ACM TOCS 1985.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"2\" width=\"2%\">4<\/td>\n<td width=\"5%\">2\/3<\/td>\n<td width=\"15%\">\n<p style=\"text-align: center\">Autonomic Computing<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/moodle-courses2527.wolfware.ncsu.edu\/mod\/resource\/view.php?id=1031883\">[slides]<\/a><\/p>\n<\/td>\n<td width=\"50%\">\n<ul>\n<li>J. Kephart and D. Chess, <a href=\"http:\/\/www.research.ibm.com\/autonomic\/research\/papers\/AC_Vision_Computer_Jan_2003.pdf\">The Vision of Autonomic Computing<\/a>, Computer Magazine, IEEE, 2003.<\/li>\n<li>Jeffrey O. Kephart: Research challenges of autonomic computing. ICSE 2005: 15-22.<\/li>\n<li>I. Cohen and M. Goldszmidt and T. Kelly and J. Symons and J. S. Chase, <a href=\"http:\/\/www.ifp.uiuc.edu\/%7Eiracohen\/publications\/OSDI2004.pdf\">Correlating Instrumentation Data to System States: A Building Block for Automated Diagnosis and Control<\/a>, Proc. of OSDI, 2004.<\/li>\n<li>I. Cohen and S. Zhang and M. Goldszmidt and J. Symons and T. Kelly and A. Fox, <a href=\"http:\/\/www.ifp.uiuc.edu\/%7Eiracohen\/publications\/Cohen_etalSOSP2005.pdf\">Capturing, indexing, clustering, and retrieving system history<\/a>, Proc. of SOSP, 2005.<\/li>\n<\/ul>\n<\/td>\n<td rowspan=\"2\" width=\"24%\">\n<p><strong>2\/8 midnight: reviews due<\/strong><\/p>\n<ul>\n<li>Daniel Dean, Hiep Nguyen, Xiaohui Gu, Hui Zhang, Junghwan Rhee, Nipun Arora, Geoff Jiang, <a href=\"http:\/\/dance.csc.ncsu.edu\/papers\/socc14.pdf\">PerfScope: Practical Online Server Performance Bug Inference in Production Cloud Computing Infrastructures<\/a>&#8220;, Proc. of SOCC 2014.<\/li>\n<li>Hiep Nguyen, Daniel J. Dean, Kamal Kc, Xiaohui Gu, <a href=\"http:\/\/dance.csc.ncsu.edu\/papers\/ATC14.pdf\">Insight: In-situ Online Service Failure Path Inference in Production Computing Infrastructures<\/a>&#8220;, Proc. of USENIX ATC 2014.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"5%\">2\/5<\/td>\n<td width=\"15%\">\n<p style=\"text-align: center\">Peer-to-Peer Systems<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/moodle-courses2527.wolfware.ncsu.edu\/mod\/resource\/view.php?id=1031885\">[slides]<\/a><\/p>\n<\/td>\n<td width=\"50%\">\n<ul>\n<li>Rowstron and P. Druschel, &#8220;<a href=\"http:\/\/freepastry.rice.edu\/PAST\/pastry.pdf\">Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems<\/a>&#8220;. Proc. of Middleware, 2001.<\/li>\n<li>Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, and Hari Balakrishnan, &#8220;<a href=\"http:\/\/pdos.csail.mit.edu\/papers\/chord:sigcomm01\/chord_sigcomm.pdf\">Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications<\/a>&#8220;, Proc. of SIGCOMM, 2001.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td colspan=\"1\" rowspan=\"2\" width=\"2%\">5<\/td>\n<td width=\"5%\">2\/10<\/td>\n<td width=\"15%\">\n<p style=\"text-align: center\">Overlay Networks\u00a0<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/moodle-courses2527.wolfware.ncsu.edu\/mod\/resource\/view.php?id=1031886\">[slides]<\/a><\/p>\n<\/td>\n<td width=\"50%\">\n<ul>\n<li>D. Andersen and H. Balakrishnan and F. Kaashoek and R. Morris, <a href=\"http:\/\/nms.lcs.mit.edu\/papers\/ron-sosp2001.pdf\">Resilient Overlay Networks<\/a>, Proc. 18th ACM SOSP, 2001.<\/li>\n<li>Y. Chu and S. G. Rao and S. Seshan and H. Zhang, <a href=\"http:\/\/esm.cs.cmu.edu\/technology\/papers\/Sigmetrics.CaseForESM.2000.pdf\">A Case For End System Multicast<\/a>, IEEE Journal on Selected Areas in Communication (JSAC), Special Issue on Networking Support for Multicast&#8221;, 2002.<\/li>\n<\/ul>\n<\/td>\n<td colspan=\"1\" rowspan=\"2\" width=\"24%\">\n<p><strong>2\/15 <\/strong><strong>midnight: project proposal due.<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\">2\/12<\/td>\n<td style=\"text-align: center\">Big Data<\/td>\n<td>\n<p>&nbsp;<\/p>\n<ul>\n<li>Jeffrey Dean and Sanjay Ghemawat, <a href=\"http:\/\/www.usenix.org\/events\/osdi04\/tech\/full_papers\/dean\/dean.pdf\">MapReduce: Simplified Data Processing on Large Clusters<\/a>. Proc. of OSDI 2004.<\/li>\n<li>Fay Chang, Jeffrey Dean, Sanjay Ghemawat, Wilson C. Hsieh, Deborah A. Wallach, Mike Burrows, Tushar Chandra, Andrew Fikes, and Robert E. Gruber, <a href=\"http:\/\/labs.google.com\/papers\/bigtable-osdi06.pdf\">Bigtable: A Distributed Storage System for Structured Data<\/a>, OSDI 2006.<\/li>\n<li>Bu\u011fra Gedik, Henrique Andrade, Kun-Lung Wu, Philip S. Yu, and MyungCheol Doo. <a href=\"http:\/\/portal.acm.org\/citation.cfm?doid=1376616.1376729\">SPADE: The System S Declarative Stream Processing Engine<\/a>. International Conference on Management of Data, ACM SIGMOD, 2008.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"2\" width=\"2%\">6<\/td>\n<td width=\"5%\">2\/17<\/td>\n<td style=\"text-align: center\" width=\"15%\"><strong>Wellness Day\u00a0<\/strong><\/td>\n<td width=\"50%\">\n<ul>\n<li>No Class<\/li>\n<\/ul>\n<\/td>\n<td rowspan=\"2\" width=\"24%\">\n<p><strong>2\/22 midnight:\u00a0<\/strong><strong>reviews due<\/strong><\/p>\n<ul>\n<li>T. Xu, et al., <a href=\"http:\/\/delivery.acm.org\/10.1145\/2530000\/2522727\/p244-xu.pdf?ip=74.72.67.12&amp;id=2522727&amp;acc=OA&amp;key=24B49002E011608CF08962C63678233A&amp;CFID=390234581&amp;CFTOKEN=43836950&amp;__acm__=1387576623_690938a3fdf7c2a8887cae554ccd6d2f\">Do Not Blame Users for Misconfigurations<\/a>, Proc. of ACM SOSP 2013.<\/li>\n<li>Mona Attariyan, Michael Chow, Jason Flinn, &#8220;<a href=\"http:\/\/notrump.eecs.umich.edu\/papers\/xray.pdf\">X-ray: Automating Root-Cause Diagnosis of Performance Anomalies in Production Software<\/a>&#8220;, Proc. of OSDI 2012.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"5%\">2\/19<\/td>\n<td style=\"text-align: center\" width=\"15%\">Big Data<\/td>\n<td width=\"50%\">\n<ul>\n<li>Jeffrey Dean and Sanjay Ghemawat, <a href=\"http:\/\/www.usenix.org\/events\/osdi04\/tech\/full_papers\/dean\/dean.pdf\">MapReduce: Simplified Data Processing on Large Clusters<\/a>. Proc. of OSDI 2004.<\/li>\n<li>Fay Chang, Jeffrey Dean, Sanjay Ghemawat, Wilson C. Hsieh, Deborah A. Wallach, Mike Burrows, Tushar Chandra, Andrew Fikes, and Robert E. Gruber, <a href=\"http:\/\/labs.google.com\/papers\/bigtable-osdi06.pdf\">Bigtable: A Distributed Storage System for Structured Data<\/a>, OSDI 2006.<\/li>\n<li>Bu\u011fra Gedik, Henrique Andrade, Kun-Lung Wu, Philip S. Yu, and MyungCheol Doo. <a href=\"http:\/\/portal.acm.org\/citation.cfm?doid=1376616.1376729\">SPADE: The System S Declarative Stream Processing Engine<\/a>. International Conference on Management of Data, ACM SIGMOD, 2008.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"2\" width=\"2%\">7<\/td>\n<td width=\"5%\">2\/24<\/td>\n<td width=\"15%\">\n<p style=\"text-align: center\">\u00a0Big Data<\/p>\n<p style=\"text-align: center\">&amp;<\/p>\n<p style=\"text-align: center\">System Research Methodology<\/p>\n<\/td>\n<td width=\"50%\">\n<ul>\n<li>Jeffrey Dean and Sanjay Ghemawat, <a href=\"http:\/\/www.usenix.org\/events\/osdi04\/tech\/full_papers\/dean\/dean.pdf\">MapReduce: Simplified Data Processing on Large Clusters<\/a>. Proc. of OSDI 2004.<\/li>\n<li>Fay Chang, Jeffrey Dean, Sanjay Ghemawat, Wilson C. Hsieh, Deborah A. Wallach, Mike Burrows, Tushar Chandra, Andrew Fikes, and Robert E. Gruber, <a href=\"http:\/\/labs.google.com\/papers\/bigtable-osdi06.pdf\">Bigtable: A Distributed Storage System for Structured Data<\/a>, OSDI 2006.<\/li>\n<li>Bu\u011fra Gedik, Henrique Andrade, Kun-Lung Wu, Philip S. Yu, and MyungCheol Doo. <a href=\"http:\/\/portal.acm.org\/citation.cfm?doid=1376616.1376729\">SPADE: The System S Declarative Stream Processing Engine<\/a>. International Conference on Management of Data, ACM SIGMOD, 2008.<\/li>\n<li>Roy Levin and David D. Redell, <a href=\"http:\/\/www.cs.umbc.edu\/cra\/etw98\/writing-papers.pdf\">An Evaluation of the Ninth SOSP Submissions; or, How (and How Not) to Write a Good Systems Paper<\/a>, ACM SIGOPS Operating Systems Review, Vol. 17, No. 3 (July, 1983), pages 35-40.<\/li>\n<li><a href=\"http:\/\/people.csail.mit.edu\/mernst\/advice\/write-technical-paper.html\">Writing a technical paper by Michael Ernst<\/a><\/li>\n<\/ul>\n<\/td>\n<td rowspan=\"2\" width=\"24%\"><strong>3\/1 midnight: reviews due<\/strong>\n<ul>\n<li>Mart\u00edn Abadi et al., <a href=\"https:\/\/www.usenix.org\/system\/files\/conference\/osdi16\/osdi16-abadi.pdf\">TensorFlow: A System for Large-Scale Machine Learning<\/a>, Proc. of OSDI 2016.<\/li>\n<li>Hiep Nguyen, Zhiming Shen, Xiaohui Gu, Sethuraman Subbiah, John Wilkes, &#8220;<a href=\"http:\/\/dance.csc.ncsu.edu\/papers\/icac2013.pdf\">AGILE: elastic distributed resource scaling for Infrastructure-as-a-Service<\/a>&#8220;, Proc. of USENIX International Conference on Autonomic Computing (ICAC), San Jose, CA, June, 2013.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\" width=\"5%\">2\/26<\/td>\n<td style=\"text-align: center\" width=\"15%\">Project Proposal Presentation<\/td>\n<td width=\"50%\">\n<p class=\"p1\">Topics\/Teams:<\/p>\n<ol>\n<li class=\"p1\">Semantic Concurrency Control for Shared Memory in Multi-Agent Systems\u00a0 \u00a0 \u00a0<strong>Ayush Gala, Ashwattha Phatak<\/strong><\/li>\n<li>\n<p class=\"p1\">Implementation and Modernization of UBL: Unsupervised Behavior Learning for Performance Anomaly Prediction<\/p>\n<p class=\"p1\"><strong>Aum Pandya, Darsh Rank, <span style=\"font-family: inherit;font-size: inherit\">Narasimhareddy Dilip Kumar<\/span><\/strong><\/p>\n<\/li>\n<li>\n<p class=\"p1\">Black-Box Root Cause Analysis for Microservice Anomalies<\/p>\n<p class=\"p1\"><strong>Aryan Sharma Inguva, Bhavishya Tarun, <span style=\"font-family: inherit;font-size: inherit\">Manav Shah<\/span><\/strong><\/p>\n<\/li>\n<\/ol>\n<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"2\" width=\"2%\">8<\/td>\n<td width=\"5%\">3\/3<\/td>\n<td style=\"text-align: center\" width=\"15%\">Project Proposal Presentation<\/td>\n<td width=\"50%\">\n<p>Topics\/Teams:<\/p>\n<ol>\n<li>\n<div>Semantic-Aware Kernel Snapshots: Transparent Distributed State Capture using eBPF<\/div>\n<div>\u00a0<\/div>\n<p><strong>Adithya Srinivasan, Niharika Maruvanahalli Suresh, Youbin Kim<\/strong><\/p>\n<\/li>\n<li>\n<p class=\"p1\">A Dynamo-Inspired Distributed Key-Value Store with Tunable Consistency<\/p>\n<p class=\"p1\"><strong>SAI TARUN YELLAMRAJU, SMEET NAGDA,YASH MOR<\/strong><\/p>\n<\/li>\n<li>\n<p class=\"p1\"><span style=\"font-family: inherit;font-size: inherit\">Experimental Evaluation of Scalable Gossip-Based Dissemination Strategies\u00a0 \u00a0\u00a0<\/span><\/p>\n<p class=\"p1\"><strong>Sandhiya Shunmugavel, Om Kumar Singh, Bestin Lalu<\/strong><\/p>\n<\/li>\n<\/ol>\n<\/td>\n<td rowspan=\"2\" width=\"24%\">No paper reading assigned. You should spend time on your term projects.<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\" width=\"5%\">3\/5<\/td>\n<td style=\"text-align: center\" width=\"15%\">Student presentation<\/td>\n<td>\n<p><strong>Presenters:<\/strong><\/p>\n<p>Chenyuan Yang, et al., KNighter: <a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3731569.3764827\">Transforming Static Analysis with LLM-Synthesized Checkers<\/a>, Proc. of SOSP 2025.&#8211;&gt;<strong>Aum Yagneshkumar Pandya<\/strong><\/p>\n<p>Olufogorehan Tunde-Onadele, Feiran Qin, Xiaohui Gu, Yuhang Lin, &#8220;<a href=\"https:\/\/dance.csc.ncsu.edu\/papers\/ACSOS24.pdf\">ClearCausal: Cross Layer Causal Analysis for Automatic Microservice Performance Debugging<\/a>&#8220;, 5th IEEE International Conference on Autonomic Computing and Self-Organizing Systems, 2025.&#8211;&gt;<strong>Adithya Srinivasan<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"2\" width=\"2%\">9<\/td>\n<td width=\"5%\">3\/10<\/td>\n<td style=\"text-align: center\" width=\"15%\">Student presentation<\/td>\n<td>\n<p><strong>Presenters:<\/strong><\/p>\n<p>Jingzhu He, Ting Dai, Xiaohui Gu, and Guoliang Jin, &#8220;<a href=\"https:\/\/dance.csc.ncsu.edu\/papers\/SOCC20.pdf\">HangFix: Automatically Fixing Software Hang Bugs for Production Cloud Systems<\/a>&#8220;, Proc. of ACM Symposium on Cloud Computing (SOCC), Renton, WA, October, 2020, pp. 344-357.&#8211;&gt;<strong>Om Kumar Singh<\/strong><\/p>\n<p>Daniel Dean, Hiep Nguyen, Xiaohui Gu, Hui Zhang, Junghwan Rhee, Nipun Arora, Geoff Jiang, <a href=\"http:\/\/dance.csc.ncsu.edu\/papers\/socc14.pdf\">PerfScope: Practical Online Server Performance Bug Inference in Production Cloud Computing Infrastructures<\/a>&#8220;, Proc. of SOCC 2014.&#8211;&gt;<strong>Ashwattha Phatak<\/strong><\/p>\n<\/td>\n<td colspan=\"1\" rowspan=\"2\">No paper reading assigned. You should spend time on your term projects.<\/td>\n<\/tr>\n<tr>\n<td width=\"5%\">3\/12<\/td>\n<td style=\"text-align: center\" width=\"15%\">Student presentation<\/td>\n<td>\n<p><strong>Presenters:<\/strong><\/p>\n<p><a href=\"https:\/\/www.usenix.org\/conference\/osdi25\/presentation\/lin-jinkun\">Jinkun Lin et al, Understanding Stragglers in Large Model Training Using What-if Analysis, Proc. of OSDI 2025.<\/a>&#8211;&gt; <strong>Ayush Gala<\/strong><\/p>\n<p><a href=\"https:\/\/www.usenix.org\/conference\/osdi24\/presentation\/wang-rui\">Philipp Moritz et al., Ray: A Distributed Framework for Emerging AI Applications, Proc. of OSDI 2018<\/a>&#8212;<strong>Aryan Inguva<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td colspan=\"1\" rowspan=\"2\">10<\/td>\n<td>3\/17<\/td>\n<td style=\"text-align: center\"><strong>Spring break<\/strong><\/td>\n<td>\n<ul>\n<li>No Class<\/li>\n<\/ul>\n<\/td>\n<td colspan=\"1\" rowspan=\"2\">No paper reading assigned. You should spend time on your term projects.<\/td>\n<\/tr>\n<tr>\n<td>3\/19<\/td>\n<td style=\"text-align: center\"><strong>Spring Break<\/strong><\/td>\n<td>\n<ul>\n<li>No Class<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td colspan=\"1\" rowspan=\"2\">11<\/td>\n<td>3\/24<\/td>\n<td style=\"text-align: center\">Student presentation<\/td>\n<td>\n<p><strong>Presenters:<\/strong><\/p>\n<p>Hiep Nguyen, Zhiming Shen, Yongmin Tan, Xiaohui Gu, &#8220;<a href=\"http:\/\/dance.csc.ncsu.edu\/papers\/icdcs2013.pdf\">FChain: Toward Black-box Online Fault Localization for Cloud Systems<\/a>&#8220;, Proc. of ICDCS 2013.&#8211;&gt;<strong>Manav Shah<\/strong><\/p>\n<\/td>\n<td colspan=\"1\" rowspan=\"2\">No paper reading assigned. You should spend time on your term projects.<\/td>\n<\/tr>\n<tr>\n<td>3\/26<\/td>\n<td style=\"text-align: center\">Student presentation<\/td>\n<td>\n<p><strong>Presenters:<\/strong><\/p>\n<p>Mart\u00edn Abadi et al., <a href=\"https:\/\/www.usenix.org\/system\/files\/conference\/osdi16\/osdi16-abadi.pdf\">TensorFlow: A System for Large-Scale Machine Learning<\/a>, Proc. of OSDI 2016.&#8211;&gt;<strong>Smeet Nagda<\/strong><\/p>\n<p>Tom Kuchler et al., <a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3731569.3764803\">Unlocking True Elasticity for the Cloud-Native Era with Dandelion<\/a>, Proc. of SOSP 2025.&#8211;&gt;<strong>Narasimhareddy Dilip Kumar Irala<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td colspan=\"1\" rowspan=\"2\">12<\/td>\n<td width=\"5%\">3\/31<\/td>\n<td style=\"text-align: center\" width=\"15%\">Project Mid Review Presentation<\/td>\n<td>\n<p>Topics\/Teams:<\/p>\n<ol>\n<li>\n<div>SnapSpec:\u00a0Improving distributed snapshots with Redirect-on-Write<\/div>\n<p><strong>Adithya Srinivasan, Niharika Maruvanahalli Suresh, Youbin Kim<\/strong><\/p>\n<\/li>\n<li>\n<p>Black-Box Root Cause Analysis for Microservice Anomalies<\/p>\n<p><strong>Aryan Sharma Inguva, Bhavishya Tarun, Manav Shah<\/strong><\/p>\n<\/li>\n<li>\n<p><span style=\"font-family: inherit;font-size: inherit\">Evaluation of Scalable Gossip-Based Dissemination Strategies\u00a0 \u00a0\u00a0<\/span><\/p>\n<p class=\"p1\"><strong>Sandhiya Shunmugavel, Om Kumar Singh, Bestin Lalu<\/strong><\/p>\n<\/li>\n<\/ol>\n<\/td>\n<td colspan=\"1\" rowspan=\"2\">No paper reading assigned. You should spend time on your term projects.<\/td>\n<\/tr>\n<tr>\n<td>4\/2<\/td>\n<td style=\"text-align: center\">Project Mid Review Presentation<\/td>\n<td>\n<p class=\"p1\">Topics\/Teams:<\/p>\n<ol>\n<li class=\"p1\">Semantic Concurrency Control for Shared Memory in Multi-Agent Systems\u00a0 \u00a0 \u00a0<strong>Ayush Gala, Ashwattha Phatak<\/strong><\/li>\n<li>\n<p class=\"p1\">Implementation and Modernization of UBL: Unsupervised Behavior Learning for Performance Anomaly Prediction<\/p>\n<p class=\"p1\"><strong>Aum Pandya, Darsh Rank, <span style=\"font-family: inherit;font-size: inherit\">Narasimhareddy Dilip Kumar<\/span><\/strong><\/p>\n<\/li>\n<li>\n<p class=\"p1\">A Dynamo-Inspired Distributed Key-Value Store with Tunable Consistency<\/p>\n<p class=\"p1\"><strong>SAI TARUN YELLAMRAJU, SMEET NAGDA,YASH MOR<\/strong><\/p>\n<\/li>\n<\/ol>\n<\/td>\n<\/tr>\n<tr>\n<td colspan=\"1\" rowspan=\"2\">13<\/td>\n<td>4\/7<\/td>\n<td style=\"text-align: center\">Student presentation<\/td>\n<td>\n<p><strong>Presenters:<\/strong><\/p>\n<p>Hiep Nguyen, Zhiming Shen, Xiaohui Gu, Sethuraman Subbiah, John Wilkes, &#8220;<a href=\"http:\/\/dance.csc.ncsu.edu\/papers\/icac2013.pdf\">AGILE: elastic distributed resource scaling for Infrastructure-as-a-Service<\/a>&#8220;, Proc. of USENIX International Conference on Autonomic Computing (ICAC), San Jose, CA, June, 2013.&#8211;&gt; <strong>Youbin Kim<\/strong><\/p>\n<p><a href=\"https:\/\/www.usenix.org\/conference\/osdi24\/presentation\/wang-rui\">Y. Sheng et al., Fairness in Serving Large Language Models, Proc. of OSDI 2024<\/a>&#8212;<strong>Darsh Rank<\/strong><\/p>\n<\/td>\n<td colspan=\"1\" rowspan=\"2\">No paper reading assigned. You should spend time on your term projects.<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\">4\/9<\/td>\n<td style=\"text-align: center\">Student presentation<\/td>\n<td>\n<p><strong>Presenters:<\/strong><\/p>\n<p>Olufogorehan Tunde-Onadele, Yuhang Lin, Xiaohui Gu, and Jingzhu He, &#8220;<a href=\"https:\/\/dance.csc.ncsu.edu\/papers\/IC2E22.pdf\">Understanding Software Security Vulnerabilities in Cloud Server Systems<\/a>&#8220;, Proc. of the 10th IEEE International Conference on Cloud Engineering (IC2E), Pacific Grove, CA, September, 2022&#8211;&gt;<strong>Niharika Maruvanahalli Suresh<\/strong><\/p>\n<p>Yuhang Lin, Olufogorehan Tunde-Onadele, Xiaohui Gu, Jingzhu He, and Hugo Latapie, <a href=\"https:\/\/dance.csc.ncsu.edu\/papers\/ACSOS22.pdf\">SHIL: Self-Supervised Hybrid Learning for Security Attack Detection in Containerized Applications<\/a>&#8220;, Proc. of the 3rd IEEE International Conference on Autonomic Computing and Self-Organizing Systems (ACSOS), Los Angeles, CA, September, 2022&#8211;&gt;<strong>Bhavishya Tarun<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td colspan=\"1\" rowspan=\"2\">14<\/td>\n<td>4\/14<\/td>\n<td style=\"text-align: center\">Student presentation<\/td>\n<td>\n<p><strong>Presenters:<\/strong><\/p>\n<p>Yuhang Lin, Olufogorehan Tunde-Onadele, and Xiaohui Gu, &#8220;<a href=\"https:\/\/dance.csc.ncsu.edu\/papers\/ACSAC20.pdf\">CDL: Classified Distributed Learning for Detecting Security Attacks in Containerized Applications<\/a>&#8220;, Proc. of Annual Computer Security Applications Conference (ACSAC), Austin, TX, December, 2020.&#8211;&gt;<strong>Yash Mor<\/strong><\/p>\n<p>Olufogorehan Tunde-Onadele, Yuhang Lin, Jingzhu He, and Xiaohui Gu, &#8220;<a href=\"http:\/\/dance.csc.ncsu.edu\/papers\/ACSOS20.pdf\">Self-Patch: Beyond Patch Tuesday for Containerized Applications<\/a>&#8220;, Proc. of IEEE International Conference on Autonomic Computing and Self-Organizing Systems (ACSOS), Washington, DC, August, 2020, pp. 21-27.&#8211;&gt;<strong>Sai Tarun Yellamraju<\/strong><\/p>\n<\/td>\n<td colspan=\"1\" rowspan=\"2\">No paper reading assigned. You should spend time on your term projects.<\/td>\n<\/tr>\n<tr>\n<td width=\"5%\">4\/16<\/td>\n<td style=\"text-align: center\">Student presentation<\/td>\n<td width=\"15%\">\n<p><strong>Presenters:<\/strong><\/p>\n<p>Rui Shu et al., <a href=\"http:\/\/dance.csc.ncsu.edu\/papers\/codaspy17.pdf\">A Study of Security Vulnerabilities on Docker Hub<\/a>, Proc. of CODASPY 2017&#8211;&gt;<strong>Bestin Lalu<\/strong><\/p>\n<p>Zhiming Shen, Sethuraman Subbiah, Xiaohui Gu, and John Wilkes, <a href=\"http:\/\/dance.csc.ncsu.edu\/papers\/socc11-cloudscale.pdf\">CloudScale: Elastic Resource Scaling for Multi-Tenant Cloud Systems<\/a>, Proc. of ACM SOCC 2011.&#8211;&gt;<strong>Sandhiya Shunmugavel<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"2\" width=\"2%\">15<\/td>\n<td width=\"5%\">4\/21<\/td>\n<td style=\"text-align: center\" width=\"15%\">Project Demo<\/td>\n<td colspan=\"1\" rowspan=\"1\" width=\"50%\">\u00a0<\/td>\n<td colspan=\"1\" rowspan=\"2\" width=\"50%\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td>4\/23<\/td>\n<td style=\"text-align: center\">Project Demo<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td>16<\/td>\n<td>4\/28<\/td>\n<td style=\"text-align: center\">Project Presentation<\/td>\n<td>\n<p><strong>Location:<\/strong> EBII 3265<\/p>\n<p><strong>Time: <\/strong>9:30am-12:30am on April 28th<\/p>\n<p>&nbsp;<\/p>\n<p>Presentation Order:<\/p>\n<ol>\n<li>\n<p>Black-Box Root Cause Analysis for Microservice Anomalies<\/p>\n<p><strong>Aryan Sharma Inguva, Bhavishya Tarun, Manav Shah<\/strong><\/p>\n<\/li>\n<li>\n<p><span style=\"font-family: inherit;font-size: inherit\">Evaluation of Scalable Gossip-Based Dissemination Strategies\u00a0 \u00a0\u00a0<\/span><\/p>\n<p class=\"p1\"><strong>Sandhiya Shunmugavel, Om Kumar Singh, Bestin Lalu<\/strong><\/p>\n<\/li>\n<li>\n<p class=\"p1\">A Dynamo-Inspired Distributed Key-Value Store with Tunable Consistency<\/p>\n<p class=\"p1\"><strong>SAI TARUN YELLAMRAJU, SMEET NAGDA,YASH MOR<\/strong><\/p>\n<\/li>\n<li>\n<div>SnapSpec:\u00a0Improving distributed snapshots with Redirect-on-Write<\/div>\n<p><strong>Adithya Srinivasan, Niharika Maruvanahalli Suresh, Youbin Kim<\/strong><\/p>\n<\/li>\n<li class=\"p1\">Semantic Concurrency Control for Shared Memory in Multi-Agent Systems\u00a0 \u00a0 \u00a0<strong>Ayush Gala, Ashwattha Phatak<\/strong><\/li>\n<li>\n<p class=\"p1\">Implementation and Modernization of UBL: Unsupervised Behavior Learning for Performance Anomaly Prediction<\/p>\n<p class=\"p1\"><strong>Aum Pandya, Darsh Rank, <span style=\"font-family: inherit;font-size: inherit\">Narasimhareddy Dilip Kumar<\/span><\/strong><\/p>\n<\/li>\n<\/ol>\n<\/td>\n<td>Final Report Deadline: May 3 at midnight<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>Suggested Topics for Student Presentations<\/h3>\n<p>(You can suggest to the instructor the papers that are not in this list but you would like to present):<\/p>\n<h4>AI-Driven Distributed System Management<\/h4>\n<ol>\n<li>Chenyuan Yang, et al., KNighter: <a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3731569.3764827\">Transforming Static Analysis with LLM-Synthesized Checkers<\/a>, Proc. of SOSP 2025.&#8211;&gt;<strong>Aum Yagneshkumar Pandya<\/strong><\/li>\n<li>Olufogorehan Tunde-Onadele, Feiran Qin, Xiaohui Gu, Yuhang Lin, &#8220;<a href=\"https:\/\/dance.csc.ncsu.edu\/papers\/ACSOS24.pdf\">ClearCausal: Cross Layer Causal Analysis for Automatic Microservice Performance Debugging<\/a>&#8220;, 5th IEEE International Conference on Autonomic Computing and Self-Organizing Systems, 2025.&#8211;&gt;<strong>Adithya Srinivasan<\/strong><\/li>\n<li>Jingzhu He, Yuhang Lin, Xiaohui Gu, Chin-Chia Michael Yeh, and Zhongfang Zhuang, &#8220;<a href=\"https:\/\/dance.csc.ncsu.edu\/papers\/ICSE22.pdf\">PerfSig: Extracting Performance Bug Signatures via Multi-modality Causal Analysis<\/a>&#8220;, Proc. of the 44th International Conference on Software Engineering (ICSE), Pittsburgh, PA, May, 2022, pp. 1669-1680.<\/li>\n<li>Jingzhu He, Ting Dai, Xiaohui Gu, and Guoliang Jin, &#8220;<a href=\"https:\/\/dance.csc.ncsu.edu\/papers\/SOCC20.pdf\">HangFix: Automatically Fixing Software Hang Bugs for Production Cloud Systems<\/a>&#8220;, Proc. of ACM Symposium on Cloud Computing (SOCC), Renton, WA, October, 2020, pp. 344-357.&#8211;&gt;<strong>Om Kumar Singh<\/strong><\/li>\n<li>Ting Dai, Jingzhu He, Xiaohui Gu, Shan Lu, and Peipei Wang, &#8220;<a href=\"http:\/\/dance.csc.ncsu.edu\/papers\/SOCC18.pdf\">DScope: Detecting Real-World Data Corruption Hang Bugs in Cloud Server Systems<\/a>&#8220;, Proc. of ACM Symposium on Cloud Computing (SOCC), Carlsbad, CA, October, 2018.<\/li>\n<li>Jingzhu He, Ting Dai, and Xiaohui Gu, &#8220;<a href=\"http:\/\/dance.csc.ncsu.edu\/papers\/ICAC18.pdf\">TScope: Automatic Timeout Bug Identification for Server Systems<\/a>&#8220;, Proc. of IEEE International Conference on Autonomic Computing (ICAC), Trento, Italy, September, 2018.<\/li>\n<li>Daniel Dean, Hiep Nguyen, Xiaohui Gu, Hui Zhang, Junghwan Rhee, Nipun Arora, Geoff Jiang, <a href=\"http:\/\/dance.csc.ncsu.edu\/papers\/socc14.pdf\">PerfScope: Practical Online Server Performance Bug Inference in Production Cloud Computing Infrastructures<\/a>&#8220;, Proc. of SOCC 2014.&#8211;&gt;<strong>Ashwattha Phatak<\/strong><\/li>\n<li>Hiep Nguyen, Zhiming Shen, Yongmin Tan, Xiaohui Gu, &#8220;<a href=\"http:\/\/dance.csc.ncsu.edu\/papers\/icdcs2013.pdf\">FChain: Toward Black-box Online Fault Localization for Cloud Systems<\/a>&#8220;, Proc. of ICDCS 2013.&#8211;&gt;<strong>Manav Shah<\/strong><\/li>\n<li>Daniel Dean, Hiep Nguyen, Xiaohui Gu, &#8220;<a href=\"http:\/\/dance.csc.ncsu.edu\/papers\/UBL.pdf\">UBL: Unsupervised Behavior Learning for Predicting Performance Anomalies in Virtualized Cloud Systems<\/a>&#8220;, Proc. of ACM International Conference on Autonomic Computing (ICAC), San Jose, CA, September, 2012.<\/li>\n<\/ol>\n<h4>AI Infrastrucutre &amp; Cloud Computing<\/h4>\n<ol>\n<li>Siddhant Ray et al., <a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3731569.3764855\">METIS: Fast Quality-Aware RAG Systems with Configuration Adaptation<\/a>, Proc. of SOSP 2025.<\/li>\n<li><a href=\"https:\/\/www.usenix.org\/conference\/osdi25\/presentation\/lin-jinkun\">Jinkun Lin et al, Understanding Stragglers in Large Model Training Using What-if Analysis, Proc. of OSDI 2025.<\/a>&#8211;&gt; <strong>Ayush Gala<\/strong><\/li>\n<li><a href=\"https:\/\/www.usenix.org\/conference\/osdi24\/presentation\/wang-rui\">Y. Sheng et al., Fairness in Serving Large Language Models, Proc. of OSDI 2024<\/a>&#8212;<strong>Darsh Rank<\/strong><\/li>\n<li><a href=\"https:\/\/www.usenix.org\/conference\/osdi24\/presentation\/wang-rui\">Philipp Moritz et al., Ray: A Distributed Framework for Emerging AI Applications, Proc. of OSDI 2018<\/a>&#8212;<strong>Aryan Inguva<\/strong><\/li>\n<li>Mart\u00edn Abadi et al., <a href=\"https:\/\/www.usenix.org\/system\/files\/conference\/osdi16\/osdi16-abadi.pdf\">TensorFlow: A System for Large-Scale Machine Learning<\/a>, Proc. of OSDI 2016.&#8211;&gt;<strong>Smeet Nagda<\/strong><\/li>\n<li>Tom Kuchler et al., <a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3731569.3764803\">Unlocking True Elasticity for the Cloud-Native Era with Dandelion<\/a>, Proc. of SOSP 2025.&#8211;&gt;<strong>Narasimhareddy Dilip Kumar Irala<\/strong><\/li>\n<li>Hiep Nguyen, Zhiming Shen, Xiaohui Gu, Sethuraman Subbiah, John Wilkes, &#8220;<a href=\"http:\/\/dance.csc.ncsu.edu\/papers\/icac2013.pdf\">AGILE: elastic distributed resource scaling for Infrastructure-as-a-Service<\/a>&#8220;, Proc. of USENIX International Conference on Autonomic Computing (ICAC), San Jose, CA, June, 2013.&#8211;&gt; <strong>Youbin Kim<\/strong><\/li>\n<li>Zhiming Shen, Sethuraman Subbiah, Xiaohui Gu, and John Wilkes, <a href=\"http:\/\/dance.csc.ncsu.edu\/papers\/socc11-cloudscale.pdf\">CloudScale: Elastic Resource Scaling for Multi-Tenant Cloud Systems<\/a>, Proc. of ACM SOCC 2011.&#8211;&gt;<strong>Sandhiya Shunmugavel<\/strong><\/li>\n<li>Xiaohui Gu, Klara Nahrstedt, <a href=\"https:\/\/dance.csc.ncsu.edu\/gu\/publications-files\/hpdc02.pdf\">A Scalable QoS-Aware Service Aggregation Model for Peer-to-Peer Computing Grids<\/a>, Proc. of IEEE International Symposium on High Performance Distributed Computing (HPDC 2002)<\/li>\n<\/ol>\n<h4>Distributed Systems Security<\/h4>\n<ol>\n<li>Zihao Zhang, Ti Zhou, Christa Jenkins, Omar Chowdhury, Shuai Mu, <a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3731569.3764822\">AutoMan: Facilitating Verified Distributed Systems Development Through Automatic Code Generation and Manual Optimizations<\/a>, Proc. of SOSP 2025.<\/li>\n<li>Olufogorehan Tunde-Onadele, Yuhang Lin, Xiaohui Gu, and Jingzhu He, &#8220;<a href=\"https:\/\/dance.csc.ncsu.edu\/papers\/IC2E22.pdf\">Understanding Software Security Vulnerabilities in Cloud Server Systems<\/a>&#8220;, Proc. of the 10th IEEE International Conference on Cloud Engineering (IC2E), Pacific Grove, CA, September, 2022&#8211;&gt;<strong>Niharika Maruvanahalli Suresh<\/strong><\/li>\n<li>Yuhang Lin, Olufogorehan Tunde-Onadele, Xiaohui Gu, Jingzhu He, and Hugo Latapie, <a href=\"https:\/\/dance.csc.ncsu.edu\/papers\/ACSOS22.pdf\">SHIL: Self-Supervised Hybrid Learning for Security Attack Detection in Containerized Applications<\/a>&#8220;, Proc. of the 3rd IEEE International Conference on Autonomic Computing and Self-Organizing Systems (ACSOS), Los Angeles, CA, September, 2022&#8211;&gt;<strong>Bhavishya Tarun<\/strong><\/li>\n<li>Yuhang Lin, Olufogorehan Tunde-Onadele, and Xiaohui Gu, &#8220;<a href=\"https:\/\/dance.csc.ncsu.edu\/papers\/ACSAC20.pdf\">CDL: Classified Distributed Learning for Detecting Security Attacks in Containerized Applications<\/a>&#8220;, Proc. of Annual Computer Security Applications Conference (ACSAC), Austin, TX, December, 2020.&#8211;&gt;<strong>Yash Mor<\/strong><\/li>\n<li>Olufogorehan Tunde-Onadele, Yuhang Lin, Jingzhu He, and Xiaohui Gu, &#8220;<a href=\"http:\/\/dance.csc.ncsu.edu\/papers\/ACSOS20.pdf\">Self-Patch: Beyond Patch Tuesday for Containerized Applications<\/a>&#8220;, Proc. of IEEE International Conference on Autonomic Computing and Self-Organizing Systems (ACSOS), Washington, DC, August, 2020, pp. 21-27.&#8211;&gt;<strong>Sai Tarun Yellamraju<\/strong><\/li>\n<li>Rui Shu et al., <a href=\"http:\/\/dance.csc.ncsu.edu\/papers\/codaspy17.pdf\">A Study of Security Vulnerabilities on Docker Hub<\/a>, Proc. of CODASPY 2017&#8211;&gt;<strong>Bestin Lalu<\/strong><\/li>\n<\/ol>\n<h3>Academic Integrity<\/h3>\n<p>The university provides a detailed policy on academic integrity. This policy can be found in the <a href=\"http:\/\/www.ncsu.edu\/policies\/student_services\/student_discipline\/POL11.35.1.php\">Code of Student Conduct<\/a>. It is understood that when you submit your homework, you are implicitly agreeing to the university honor pledge: &#8220;I have neither given nor received unauthorized aid on this test or assignment.&#8221;<\/p>\n<p>Academic dishonesty (e.g., cheating or plagiarism) will not be tolerated under any circumstances. If you are having difficultly with any part of the course material, please see me as soon as possible. I will do everything I can to help you with any course-related problems you may be having. If you are found to be guilty of academic dishonesty, however, I will then do everything I can to see that you are punished as forcefully as possible. This may include asking to have you suspended or expelled from the course, the program, and\/or the university. At a minimum, you will receive -50% for the assignment in question, and your name will be placed on record with the university as having committed an academic offence. Multiple offences during your academic career will result in suspension or expulsion from the university. I take absolutely no pleasure in pursuing cases of academic misconduct, and would ask that you please do not put me in this position.<\/p>\n<h3>Students With Disabilities<\/h3>\n<p>All effort will be made to ensure that no students with disabilities are denied any opportunity to successfully complete this course. If you have specific requirements that need to be addressed, please contact me immediately. Possible changes can include (but are not necessarily limited to) rescheduling classes from inaccessible to accessible buildings, or providing access to auxiliary aids such as tape recorders, special lab equipment, or other services such as readers, note takers, or interpreters. This may also include oral or taped tests, readers, scribes, separate testing rooms, or extension of time limits.<\/p>\n<h3>Lab Safety Issues<\/h3>\n<p>None.<\/p>\n<h3>Pass-Through Costs<\/h3>\n<p>None.<\/p>\n\n","protected":false},"excerpt":{"rendered":"<p>CSC 724: Advanced Distributed Systems Spring 2026Credits: 3Meeting Times: Tuesday\/Thursday, 11:45am &#8211; 1pmMeeting Location: Fitts-Woolard Hall 02121MoodlePiazza Instructor Information Xiaohui (Helen) Gu Office Hours: Tuesday\/Thursday 3:30pm-4pm Email : xgu AT ncsu.edu Teaching Assistant Tural Mehtiyev Office Hours : Friday 2:00 pm-3 pm (Zoom Link) Email : tmehtiy AT ncsu.edu Course Objectives This course explores design [&hellip;]<\/p>\n","protected":false},"author":3482,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-10","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/wordpress-courses2527.wolfware.ncsu.edu\/csc-724-001-sprg-2026\/wp-json\/wp\/v2\/pages\/10","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wordpress-courses2527.wolfware.ncsu.edu\/csc-724-001-sprg-2026\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/wordpress-courses2527.wolfware.ncsu.edu\/csc-724-001-sprg-2026\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/wordpress-courses2527.wolfware.ncsu.edu\/csc-724-001-sprg-2026\/wp-json\/wp\/v2\/users\/3482"}],"replies":[{"embeddable":true,"href":"https:\/\/wordpress-courses2527.wolfware.ncsu.edu\/csc-724-001-sprg-2026\/wp-json\/wp\/v2\/comments?post=10"}],"version-history":[{"count":55,"href":"https:\/\/wordpress-courses2527.wolfware.ncsu.edu\/csc-724-001-sprg-2026\/wp-json\/wp\/v2\/pages\/10\/revisions"}],"predecessor-version":[{"id":639,"href":"https:\/\/wordpress-courses2527.wolfware.ncsu.edu\/csc-724-001-sprg-2026\/wp-json\/wp\/v2\/pages\/10\/revisions\/639"}],"wp:attachment":[{"href":"https:\/\/wordpress-courses2527.wolfware.ncsu.edu\/csc-724-001-sprg-2026\/wp-json\/wp\/v2\/media?parent=10"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}