Computer Science CS 553 Internet Services

Spring 2020

Times: Friday, 12:00 noo - 3:00 PM
Place: Science and Engineering Resource Center, room 203
Instructor: Richard Martin

The class work will consist of:

  1. Weekly homework and participation (33%): Short answers (as homeworks) on the weekly paper readings.
  2. Group project: (33%)two written project checkpoints, final presentation to the class, final written report.
  3. Position paper: (33%) Initial position paper, reviews of other student papers, a revised final paper

Position Paper

The Position Paper assignment can be found here


The project can be one of several types:
  1. Building a system or web-service and demonstrating it.
  2. Measuring the performance of an existing system.
  3. Measuring some aspect of human behavior related to Internet Services.
  4. Analyzing the behavior of some aspect of an Internet Service.
  5. Building and measuring a prototype of a core technology of a larger service.
A list of project ideas can be found at this link


Although over 40 years old, the Internet and its related services continue evolving and expanding at a rapid pace. It's beginnings included services such as file transfer, remote terminal, and email. The 1990's saw the rise of hypertext linked documents, and advertising supported search and retrieval. New services continue to evolve, including recent ones centered on social networking, cloud storage and computing, video streaming, and file sharing. The design, construction, and deployment of modern Internet Services requires a broad understanding and conceptualization of many areas in Computer Science and related fields. This course is thus a broad survey of many areas, including values in design, dependabilty, Emerging Platforms, Wearables, Security, Clouds, Big Data, and Accelerators.


  1. Overview
  2. Values in Design
  3. Reliability
  4. Cloud Processing
  5. Machine Learning Systems
  6. Security
  7. Accelerators
  8. Video
  9. Storage
  10. Digital Currency
  11. Disease Tracking

Reading Schedule: http s
Week Week Topics Readings Questions Work
number Date s (Sakai Tests&Quizzes) Due
1 Jan. 24 Introduction none none
2 Jan. 31 Values in Design knobel,friedman, Nissenbaum Sakai Form Project Groups
3 Feb. 7 Reliability Avizienis, Oppenheimer Yuan Xu
5 Feb. 14th Architecture Brewer, ArmBrust, Nygren Project Proposals Due Fri. Feb 14th
7 Feb. 21 System Design Briscoe Lampson, Gabriel Sakai
6 Feb. 28th Energy Verma, Manousakis Wu Faraz Sakai
4 Mar. 6 Security Panky,Mitchell, Bonneau, Florencio,Holz Project Checkpoint 1 due
8 Mar. 13 Accelerators Han, Lim Sakai Position Paper 1st Draft Due
9 Mar. 20 SPRING BREAK! Spring Break
9 Mar. 27 Storage Ghemawat,Chang Sakai
10 Apr. 3 Video Bae,Huang Sakai Position Paper Reviews Due
11 Apr. 10 Computing Dean, Zaharia Sakai Project Checkpoint 2
12 Apr. 17 Disease Tracking Paul,Lazar Hashemian Sakai
13 Apr. 24 Project Presentations (1) Project Presentations (1)
14 May 1 Project Presentations (2) Project Presentations (2) Revised Position Papers


Values in Design

  1. Cory Knobel and Geoffrey C. Bowker,Computing Ethics Values in Design,Communications of the ACM, vol.54, no. 7, July 2011. HTML

  2. Friedman, B., and Kahn, P. H., Jr. (2003). Human values, ethics, and design. In J. A. Jacko and A. Sears (Eds.), The human-computer interaction handbook, 1177-1201. Mahwah, NJ: Lawrence Erlbaum Associates. [Revised second edition, 2008, pp. 1241-1266.] PDF

  3. Nissenbaum, H. "Will Security Enhance Trust Online, or Supplant It?" Trust and Distrust in Organizations: Dilemmas and Approaches. Roderick M. Kramer & Karen S. Cook, Editors Volume VII in the Russell Sage Foundation Series on Trust. Russell Sage Foundation, New York, 2004. (See the Sakai Site Resources Section)


  4. A. Avizienis, J.-C. Laprie, B. Randell, Fundamental concepts in dependability,Proceedings of the Third Information Survivability Workshop, October 2000. PDF

  5. Oppenheimer, et. al. Why do Internet Services Fail, What Can Be Done About It? USENIX USITS 2003, PDF

  6. J. Meza, Q. Wu, S. Kumar, O. Mutlum A large-scale study of flash memory failures in the field, Sigmetrics 2015, PDF

  7. Ding Yuan, Yu Luo, Xin Zhuang, Guilherme Renna Rodrigues, Xu Zhao, Simple Testing Can Prevent Most Critical Failures: An Analysis of Production Failures in Distributed Data-Intensive Systems, USENIX 11th USENIX Symposium on Operating Systems Design and Implementation, 2014 PDF

  8. Eduardo Pinheiro, Wolf-Dietrich Weber, and Luiz Andre Barroso, Failure Trends in a Large Disk Drive Population, USENIX 2007 PDF

  9. Hey, You Have Given Me Too Many Knobs! Tianyin Xu, Long Jin, Xuepeng Fan, Yuanyuan Zhou,Proceedings of the 2015 10th Joint Meeting on Foundations of Software , 2015 PDF

  10. Schroeder, B and Gibson, G.A., A large-scale study of failures in high-performance computing systems, IEEE Transaction on Dependable and Secure Computing, Vol.7, Iss. 4, Feb. 2009. PDF (inside Rutgers) PDF (from Sakai)


  11. Panky, Crypto Primer: Understanding encryption, public/private key, signatures and certificates, HTML

  12. John Mitchell, Cryptography Overview, PDF, PPT

  13. Bonneau, Joseph and Herley, Cormac and Oorschot, Paul C. van and Stajano, Frank ,The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes, ,Proceedings of the 2012 IEEE Symposium on Security and Privacy, 2012, HTML

  14. Dinei Florencio and Cormac Herley, Paul C. van Oorschot, An Administrator’s Guide to Internet Password Research, USENIX LISA 2014, PDF

  15. Thorsten Holz,Moritz Steiner,Frederic Dahl,Ernst Biersack Felix Freiling, Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, Article No. 9 PDF

  16. Kevin Fu, Emil Sit, Kendra Smith, Nick Feamster, Dos and Don'ts of Client Authentication on the Web PDF, HTML

    Service Architecture

  17. Luiz Andre Barroso,Jimmy Clidaras, Urs Holzle, The Datacenter as a Computer An Introduction to the Design of Warehouse-Scale Machines, Second Edition,2013 PDF

  18. Brewer. Lessons from Giant-Scale Services.  IEEE Internet Computing, July/August, 2001. PDF

  19. Armbrust, Michael, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz, Andy Konwinski, Gunho Lee et al. "A view of cloud computing." Communications of the ACM 53, no. 4 (2010): 50-58. PDF

  20. Barroso et al. Web Search for a Planet: The Google Cluster Architecture.  IEEE Micro, March/April, 2003. PDF

  21. Verma, Abhishek, Luis Pedrosa, Madhukar Korupolu, David Oppenheimer, Eric Tune, and John Wilkes. "Large-scale cluster management at Google with Borg." In Proceedings of the Tenth European Conference on Computer Systems, p. 18. ACM, 2015. PDF

  22. Nygren et al. The Akamai Network: A Platform for High-Performance Internet Applications. ACM SIGOPS Vol.44, No. 3, July 2010 PDF

  23. Briscoe, Bob, Anna Brunstrom, Andreas Petlund, David Hayes, David Ros, Jyh Tsang, Stein Gjessing, Gorry Fairhurst, Carsten Griwodz, and Michael Welzl. "Reducing internet latency: A survey of techniques and their merits." IEEE Communications Surveys & Tutorials 18, no. 3 (2014): 2149-2196. PDF

    System Design

  24. Butler W. Lampson, Hints for Computer System Design,July 1983. PDF

  25. Richard P. Gabriel,The rise is Worse is Better., 1989 HTML

    Machine Learning for Services

  26. V.N. Gudivada, M.T. Irfan, E. Fathi, and D.L. Rao, Cognitive Analytics: Going Beyond Big Data Analytics and Machine Learning, PDF

  27. Abadi, et. al., TensorFlow: A System for Large-Scale Machine Learning., ODSI 2016, PDF

    27. Martin Abadi,Michael Isard, Derek G. Murray, A Computational Model for TensorFlow, An Introduction. PDF

    Hardware Accelerators

  28. Jouppi, et. al., In-Datacenter Performance Analysis of a Tensor Processing Unit,, Apr. 2017, PDF

  29. Putnam, et. al., A reconfigurable fabric for accelerating large-scale datacenter services, ISCA 2014, PDF

  30. Han, Sangjin, Keon Jang, KyoungSoo Park, and Sue Moon, PacketShader: a GPU-accelerated software router, In ACM SIGCOMM Computer Communication Review, 2010. PDF

  31. Lim, Kevin, David Meisner, Ali G. Saidi, Parthasarathy Ranganathan, and Thoms F. Wenisch. "Thin servers with smart pipes: designing SoC accelerators for memcached." In ACM SIGARCH Computer Architecture News, vol. 41, no. 3, pp. 36-47. ACM, 2013. PDF

    Energy Efficiency

  32. Madhu Sharma, Kartik Arunachalam and Dharani Sharma,Analyzing the Data Center Efficiency by using PUE to make Data Centers More Energy Efficient by Reducing the Electrical Consumption and Exploring New Strategies,Procedia Computer Science, Volume 48, 2015 PDF

  33. Ioannis Manousakis, Sriram Sankar,Gregg McKnight, Thu D. Nguyen and Ricardo Bianchini, Environmental Conditions and Disk Reliability in Free-Cooled Datacenters, PDF, FAST 2016

  34. Faraz Ahmad and T. N. Vijaykumar, Joint Optimization of Idle and Cooling Power in Data Centers While Maintaining Response Time, ASPLOS 2010, PDF

  35. Qiang Wu, Qingyuan Deng, Lakshmi Ganesh, Chang-Hong Hsu∗,Yun Jin, Sanjeev Kumar†, Bin Li, Justin Meza, and Yee Jiun Song, Dynamo: Facebook’s Data Center-Wide Power Management System, ISCA 2016, PDF

    Identity Management

  36. A Conceptual Model of Multiple Dimensions of Identity Susan R. Jones Marylu K. McEwen PDF

  37. John R. Suler, Identity Management in Cyberspace, Journal of Applied Psychoanalytic Studies, Vol. 4, No. 4, October 2002 HTML

  38. Meredith M. Skeels and Jonathan Grudin, When Social Networks Cross Boundaries: A Case Study of Workplace Use of Facebook and LinkedIn,Proceedings of the ACM 2009 international conference on Supporting group work, ACM, 2009

  39. Andrew Besmer and Heather Richter Lipford Moving Beyond Untagging: Photo Privacy in a Tagged World

  40. Arvind Narayanan and Vitaly Shmatikov, Robust De-anonymization of Large Sparse Datasets, PDF

    Large-Scale Cloud Storage

  41. Ghemawat et al. The Google File System. SOSP, 2003. PDF

  42. Chang et al. Bigtable: A Distributed Storage System for Structured Data. OSDI 2006. PDF

  43. Candia et al. Dynamo: Amazon's Highly Available Key-value Store.  SOSP, 2007. PDF

  44. Beaver et al. Finding a Needle in Haystack: Facebook's Photo Storage. OSDI, 2010. PDF

    Compute Models

  45. Dean and Ghemawat. MapReduce: Simplified Data Processing on Large Clusters. OSDI, 2004. PDF

  46. Zaharia, Matei, Mosharaf Chowdhury, Michael J. Franklin, Scott Shenker, and Ion Stoica. "Spark: cluster computing with working sets." In Proceedings of the 2nd USENIX conference on Hot topics in cloud computing, vol. 10, p. 10. 2010. PDF

  47. Christopher Olston, Benjamin Reed, Utkarsh Srivastava, Ravi Kumar, Andrew Tomkins, Pig Latin: A Not So-Foreign Language for Data Processing. SIGMOD, 2008. PDF

  48. Barham et al. Xen and the Art of Virtualization. ACM SOSP, 2003. PDF

    Disease Tracking

  49. Paul and Dredze, You Are What You Tweet: Analyzing Twitter for Public Health, Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media, 2011 PDF

  50. Lazar,,The Parable of Google Flu: Traps in Big Data Analysis, Science 343, no. 6176 (2014): 1203-1205. PDF

  51. Hashemian, et. al., Human Network Data Collection in the Wild: The Epidemiological Utility of Micro-contact and Location Data, In Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium, 2012. PDF

    Digital Currencies

  52. Nakamoto, Satoshi. "Bitcoin: A peer-to-peer electronic cash system." Consulted 1.2012 (2008): 28.

  53. Fergal Reid and Martin Harrigan,An Analysis of Anonymity in the Bitcoin System PDF

    Lifelogging and LifeStreams

  54. Cathal Gurrin, Alan F. Smeaton, Aiden R. Doherty LifeLogging: Personal Big Data

  55. Sellen, Abigail J., and Steve Whittaker. "Beyond total capture: a constructive critique of lifelogging." Communications of the ACM 53, no. 5 (2010): 70-77.

    Mobile Health

  56. Feasibility of Popular m-Health Technologies for Activity Tracking Among Individuals with Serious Mental Illness

  57. Naslund John A., Aschbrenner Kelly A., Barre Laura K., and Bartels Stephen J.. Telemedicine and e-Health. March 2015, 21(3): 213-216. doi:10.1089/tmj.2014.0105.

  58. Deborah Estrin and Ida Sim, An Engine for Health Care Innovation, Science, Nov. 2010 PDF

  59. Tomlinson et. al. mHealth: Where Is the Evidence?, PLOS Medicine, Feb, 2013 PDF


  60. Te-Yuan Huang, Ramesh Johari, Nick McKeown, Matthew Trunnell, Mark Watson, A buffer-based approach to rate adaptation: evidence from a large video streaming service, in SIGCOMM, 2014 PDF

  61. The QUIC Transport Protocol: Adam Langley, Alistair Riddoch, Alyssa Wilk, et. al., The QUIC Transport Protocol: Design and Internet-Scale Deployment, SIGCOMM 2017, PDF

  62. Bae, Sangwook, Dahyun Jang, and KyoungSoo Park, Why is HTTP adaptive streaming so hard?, In Proceedings of the 6th Asia-Pacific Workshop on Systems, 2015, PDF

  63. James D. Salehi, Zhi-Li Zhang, James F. Kurose, and Don Towsley, Supporting stored video: reducing rate variability and end-to-end resource requirements through optimal smoothing, SIGMETRICS, 1996. PDF

    Personal Storage

  64. Mun, Min, et al. "Personal data vaults: a locus of control for personal data streams." Proceedings of the 6th International Conference. ACM, 2010.

  65. Jiaqiu Wang and Zhongjie A Survey on Personal Data The Scientific World Journal, vol. 2014, Article ID 969150, 13 pages, 2014. doi:10.1155/2014/969150

  66. Linked Data - The Story So Far Christian Bizer (Freie UniversitBerlin, Germany), Tom Heath (Talis Information Ltd, UK) and Tim Berners-Lee (Massachusetts Institute of Technology, USA)

  67. User-Managed Access Control in Web Based Social Networks Lorena Gonzalez-Manzano, Ana I. Gonzalez-Tablas, Jose M. de Fuentes, Arturo Ribagorda.

  68. A Critical Look at Decentralized Personal Data Architectures Arvind Narayanan, Vincent Toubiana, Solon Barocas, Helen Nissenbaum, Dan Boneh

  69. Comparison of software and protocols for distributed social networking

    Distributed Systems

  70. Lamport.  Time, Clocks and the Ordering of Events in a Distributed Systems. CACM 21(7), 1978.

  71. Ousterhout.  The Role of Distributed State. CMU Computer Science: a 25th Anniversary Commemorative, 1991.

  72. Lamport.  Paxos Made Simple. ACM SIGACT News 32(4), 2001.

  73. Burrows.  The Chubby Lock Service for Loosely-Coupled Distributed Systems.  OSDI, 2006.

  74. Michael Piatek, Tomas Isdal, Thomas Anderson, Arvind Krishnamurthy, Arun Venkataramani, Do incentives build robustness in BitTorrent?