Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Steven E. Czerwinski is active.

Publication


Featured researches published by Steven E. Czerwinski.


architectural support for programming languages and operating systems | 2000

OceanStore: an architecture for global-scale persistent storage

John Kubiatowicz; David Bindel; Yan Chen; Steven E. Czerwinski; Patrick Eaton; Dennis Geels; Ramakrishna Gummadi; Sean Rhea; Hakim Weatherspoon; Westley Weimer; Chris Wells; Ben Y. Zhao

OceanStore is a utility infrastructure designed to span the globe and provide continuous access to persistent information. Since this infrastructure is comprised of untrusted servers, data is protected through redundancy and cryptographic techniques. To improve performance, data is allowed to be cached anywhere, anytime. Additionally, monitoring of usage patterns allows adaptation to regional outages and denial of service attacks; monitoring also enhances performance through pro-active movement of data. A prototype implementation is currently under development.


acm/ieee international conference on mobile computing and networking | 1999

An architecture for a secure service discovery service

Steven E. Czerwinski; Ben Y. Zhao; Todd D. Hodes; Anthony D. Joseph; Randy H. Katz

The widespread deployment of inexpensive communications technology, computational resources in the networking infrastructure, and network-enabled end devices poses an interesting problem for end users: how to locate a particular network service or device out of hundreds of thousands of accessible services and devices. This paper presents the architecture and implementation of a secure Service Discovery Service (SDS). Service providers use the SDS to advertise complex descriptions of available or already running services, while clients use the SDS to compose complex queries for locating these services. Service descriptions and queries use the eXtensible Markup Language (XML) to encode such factors as cost, performance, location, and deviceor service-specific capabilities. The SDS provides a highlyavailable, fault-tolerant, incrementally scalable service for locating services in the wide-area. Security is a core component of the SDS and, where necessary, communications are both encrypted and authenticated. Furthermore, the SDS uses an hybrid access control list and capability system to control access to service information.


Computer Networks | 2001

The Ninja architecture for robust Internet-scale systems and services373423

Steven D. Gribble; Matt Welsh; Rob von Behren; Eric A. Brewer; David E. Culler; Nikita Borisov; Steven E. Czerwinski; R. Gummadi; Jason L. Hill; Anthony D. Joseph; Randy H. Katz; Zhuoqing Morley Mao; Steven J. Ross; Ben Y. Zhao; Robert C. Holte

Abstract The Ninja project seeks to enable the broad innovation of robust, scalable, distributed Internet services, and to permit the emerging class of extremely heterogeneous devices to seamlessly access these services. Our architecture consists of four basic elements: bases, which are powerful workstation cluster environments with a software platform that simplifies scalable service construction; units, which are the devices by which users access the services; active proxies, which are transformational elements that are used for unit- or service-specific adaptation; and paths, which are an abstraction through which units, services, and active proxies are composed.


Wireless Networks | 2002

An architecture for secure wide-area service discovery

Todd D. Hodes; Steven E. Czerwinski; Ben Y. Zhao; Anthony D. Joseph; Randy H. Katz

The widespread deployment of inexpensive communications technology, computational resources in the networking infrastructure, and network-enabled end devices poses an interesting problem for end users: how to locate a particular network service or device out of hundreds of thousands of accessible services and devices. This paper presents the architecture and implementation of a secure wide-area Service Discovery Service (SDS). Service providers use the SDS to advertise descriptions of available or already running services, while clients use the SDS to compose complex queries for locating these services. Service descriptions and queries use the eXtensible Markup Language (XML) to encode such factors as cost, performance, location, and device- or service-specific capabilities. The SDS provides a fault-tolerant, incrementally scalable service for locating services in the wide-area. Security is a core component of the SDS: communications are both encrypted and authenticated where necessary, and the system uses a hybrid access control list and capability system to control access to service information. Wide-area query routing is also a core component of the SDS: all information in the system is potentially reachable by all clients.


international workshop on parallel processing | 2000

NinjaMail: the design of a high-performance clustered, distributed e-mail system

J.R. von Behren; Steven E. Czerwinski; Anthony D. Joseph; Eric A. Brewer; John Kubiatowicz

In todays Internet era, electronic mail is replacing telephony and postal mail as the primary means of communication for hundreds of millions of individuals. Free e-mail services, such as Microsofts Hotmail and Yahoos Yahoo Mail, each have tens of millions of subscribers. However, these and other current e-mail systems unfortunately are nor capable of handling the scale of Internet e-mail use, while still providing reliable, high performance and feature-rich services to users. This limitation is the result both of suboptimal use of cluster computing resources, and of highly variable performance of wide-area connections over the Internet. This paper presents NinjaMail, a novel geographically distributed, cluster-based e-mail system built on top of UC Berkeleys Ninja cluster architecture and OceanStore wide-area data storage architecture. NinjaMail is unique in that it uses a collection of clusters distributed through the wide-area to provide users with highly available, scalable and feature-rich services via a wide variety of access methods.


network computing and applications | 2001

Using simple remote evaluation to enable efficient application protocols in mobile environments

Steven E. Czerwinski; Anthony D. Joseph

This paper describes the REAP (Remote Evaluation in Application-level Protocols) toolkit, a reusable solution for enabling evaluation in such protocols. By using this toolkit, server developers can reduce the number of bytes sent/received and round-trip times used by their protocols to fulfill a user task, making them more efficient in high-latency, low-bandwidth networks. This is accomplished by allowing the clients to upload simple mobile procedures to the server to be executed locally. This paper provides an overview of the REAP toolkit design and architecture, and gives experimental results showing significant reduction in the latency of two popularly-used application-level protocols.


Wireless Networks | 2002

An Architecture for Secure Service Discovery Service

Todd D. Hodes; Steven E. Czerwinski; Ben Y. Zhao; Anthony D. Joseph; Randy H. Katz


ISCN | 2000

The Ninja architecture for robust Internet-scale systems and services

Steven D. Gribble; Matt Welsh; Robert von Behren; Eric A. Brewer; David E. Culler; Nikita Borisov; Steven E. Czerwinski; Ramakrishna Gummadi; Jonathan R. Hill; Anthony D. Joseph; Randy H. Katz; Zhuoqing Morley Mao; Steven J. Ross; Ben Y. Zhao


workshop on mobile computing systems and applications | 2004

Analysis of wide area user mobility patterns

Kevin D. Simler; Steven E. Czerwinski; Anthony D. Joseph


Wireless Networks | 2000

An architecture for a secure wide-area service discovery service

Todd D. Hodes; Steven E. Czerwinski; Ben Y. Zhao; Anthony D. Joseph; Randy H. Katz

Collaboration


Dive into the Steven E. Czerwinski's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ben Y. Zhao

University of California

View shared research outputs
Top Co-Authors

Avatar

Randy H. Katz

University of California

View shared research outputs
Top Co-Authors

Avatar

Todd D. Hodes

University of California

View shared research outputs
Top Co-Authors

Avatar

Eric A. Brewer

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Matt Welsh

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Steven J. Ross

University of California

View shared research outputs
Researchain Logo
Decentralizing Knowledge