Hasso-Plattner-Institut Potsdam Operating Systems and Middleware Group at HPI University of Potsdam, Germany
Operating Systems and Middleware Group at HPI

Operating Systems and Middleware Group

Seminar WS 2017/2018

Tuesday, 11:00 - 12:30, Building C, 1st Floor

About this seminar

The research seminar "Trends in Operating Systems" is targeted at students who are planning to do their Master's project or Master's thesis with the Operating Systems and Middleware group. We also invite Master's students who are generally interested in OS research.

Students can enroll in the seminar and earn 3 ECTS credits. In order to do so, a prospective candidate has to study recent publications (3) in a topic area (such as hierarchical NUMA/Multicore, fault-tolerance, accelerators, lock free data structures, resource constrained systems). The candidate then has to deliver a presentation in our seminar and hand in a report. Regular attendance is required in order to earn credits.

You report should Consist of roughly 8-12 pages LNCS or 4-6 pages IEEE.

List of Events

<-- SS17 SS18 -->
Date Time Topic Speaker
17.10. 11:00 Master Thesis Defense
Hardening Applications with Intel SGX
Fredrik Teschke
For requests contact lukas.pirl@hpi.uni-potsdam.de


  • Presentation: 30-45min
  • Hand in slides and report.
  • Talk to the supervisor prior to the presentation
    • At least three week prior to the presentation: define papers to read
    • At least one week prior to the presentation: discuss quality of slides
  • Be prepared for a Q&A (discussions, backup slides, ...)
  • Attendance is expected


  • EDCSearch: Optimization of a graph-based algorithm
  • Evaluation of cost models for hierachical parallel systems
  • Comparison of memory allocation strategies
  • Stream stores vs. coherent stores in vectorized applications
  • Advanced topology discovery with bandwith and latency measurements: find shared interconnects
  • Optimization strategies for matrix multiplication algorithms on business class servers
  • Linux Kernel NUMA experiments
  • Windows fault injection experiments
  • Formal verification of lock-free code
  • ...tba