Announcements:
Below are all the papers the class submitted, along with some of my commentary. Your task is to submit 2 evaluations in text or PDF formats, due by Friday 4/25.
Your paper reviews should consist of :
Classification of the paper into one of the catagories listed below.
The body of your review should explain why or why not the issues in the evaluation criteria have been addressed.
Comments to the author on how to improve the paper (this will be anonymous, or at least 50% anonymous) .
|
Student |
Paper to Review #1 |
Paper to Review #2 |
|---|---|---|
|
Andrew |
3 |
9 |
|
Chunling |
2 |
8 |
|
Kiran |
4 |
10 |
|
Lev |
8 |
4 |
|
Marina |
6 |
2 |
|
Neeraj |
1 |
7 |
|
Nitin |
5 |
1 |
|
Pandurang |
7 |
3 |
|
Vishal |
10 |
6 |
|
Zhijun |
9 |
5 |
|
Paper Tile |
Number and Link |
|---|---|
|
Access Control in Peer-to-Peer File Sharing System |
|
|
Multicast as a Viable Commercial Enterprise |
|
|
Virtual Machines are the Right Platform for Deploying Internet Services |
|
|
Centimeter Level Location Accuracy is unnecessary for Location-based services |
|
|
Java is the Language of Choice for Creating Internet Services Applications for Wireless Devices |
|
|
Application Security: the case for Open Source Software |
|
|
Information wants to be Free! |
|
|
Large Data Centers is the Wrong Direction for Internet Services |
|
|
Implementing Software within the Network |
|
|
On the Shared Memory vs. Message Passing Argument |