Hasso-Plattner-Institut Potsdam Operating Systems and Middleware Group at HPI University of Potsdam, Germany
Operating Systems and Middleware Group at HPI

Operating Systems and Middleware Group

Seminar WS 2017/2018

Tuesday, 11:00 - 12:30, Building C, 1st Floor

About this seminar

The research seminar "Trends in Operating Systems" is targeted at students who are planning to do their Master's project or Master's thesis with the Operating Systems and Middleware group. We also invite Master's students who are generally interested in OS research.

Students can enroll in the seminar and earn 3 ECTS credits. In order to do so, a prospective candidate has to study recent publications (~3-5) in a topic area (see the list at the bottom of this page). The candidate then has to deliver a presentation in our seminar and hand in a report. Regular attendance is required in order to earn credits.

You report should consist of roughly 8-12 pages LNCS or 4-6 pages IEEE.

List of Events

<-- SS17 SS18 -->
Date Topic Speaker
17.10. Master Thesis Defense
Hardening Applications with Intel SGX
Fredrik Teschke
24.10. Introduction: seminar concept, requirements and topics
31.10. no seminar: Reformationstag
07.11. Organisatorisches OSM Group
14.11. 5th Operating the Cloud Symposium OSM Group
21.11. Netzwerkprotokolle: Einsatzgebiete, Neuerungen Alexander Meißner
28.11. Blockchain für Ingenieure Jossekin Beilharz
05.12. Intelligente Pumpen, TU Berlin OSM Group
Master Thesis Defense
Memory Management on POWER Systems with NUMA Characteristics based on the PGASUS Programming Framework
Karsten Tausche
19.12. Chaosmonkeys Christoph Anders
26.12. no seminar: Christmas holidays
02.01. no seminar: academic holidays
09.01. 802.11p Christian Werling
16.01. SAP Leonardo, IBM Watson, Azure ML, GCP Sebastian Kliem
Dynamic Resource Allocation for Distributed Dataflows Lauritz Thamsen
23.01. tba
30.01. tba
06.02. tba
20.03. Master Thesis Defense
Resource contention of competing processes in parallel systems
Christian Würz
For requests regarding the schedule, feel free to contact lukas.pirl@hpi.de.


  • Presentation: 30-45min
  • Hand in slides and report
  • Talk to the supervisor prior to the presentation
    • At least three weeks prior to the presentation: define directions and papers to read
    • At least one week prior to the presentation: discuss quality of slides
  • Be prepared for a Q&A (discussions, backup slides, ...)
  • Attendance is expected


The following is a list of possible topics, mainly inspired by the current research directions at the chair.
However, feel free to suggest cross-cutting and further topics.
  • Dependability of software systems
    • Assessment
    • Fault tolerance of service-oriented architectures
    • Fault injection in distributed systems
  • Microservice architectures
  • Decentralized architectures
  • Internet of Things (e.g., Rail2X)
  • Machine learning
  • Dynamic workload management in distributed systems
  • Dynamic, workload-dependent resource scaling (dynamic LPARs)
  • Memory optimizations for virtual machines (e.g., memory migration benchmarks)
  • Heterogeneous hardware/accelerators: integrated GPUs, APUs, workload offloading, latency-critical workloads
  • Programming languages & frameworks: SNAP, Radeon Open Comute, C++17
  • PGASUS (PGAS framework): applications, case studies, benchmarks
  • Architectures of future server systems
  • Memory-centric architectures
  • Lock-free data structures
  • Embedded systems
  • Resource-constrained systems
  • Introspection and network tracing
  • Log analysis, prediction of maintenance and load
  • Multicore/NUMA
  • EDCSearch: Optimization of a graph-based algorithm
  • Evaluation of cost models for hierachical parallel systems
  • Comparison of memory allocation strategies
  • Stream stores vs. coherent stores in vectorized applications
  • Advanced topology discovery with bandwith and latency measurements: find shared interconnects
  • Optimization strategies for matrix multiplication algorithms on business class servers
  • Linux kernel experiments
  • Windows fault injection experiments
  • Formal verification of lock-free code