Emin Gün Sirer
4119A Upson Hall, (607) 255-7673, egs@cs
Office Hours: Monday and Friday 2:30 pm - 3:30 pm (or by appt.)
Day | Time | Location | Person |
---|---|---|---|
Monday | 10:30-11:30 | 328 Upson | Shrini |
Monday | 2:30-3:30 | 4119A Upson | Gun |
Tuesday | 10:00-11:00 | 326 Upson | Ranjita |
Thursday | 3:00-4:00 | 5153 Upson | Indranil |
Friday | 11:00-12:00 | 5138 Upson | Ben |
Friday | 2:30-3:30 | 4119A Upson | Gun |
CS 414/415 covers introductory operating system design and implementation. We will cover the basics of operating systems, namely structure, concurrency, scheduling, synchronization, memory management, filesystems, security and networking. We will also discuss advanced topics such as ubiquitous computing and extensible systems. The course is open to any undergraduate who has mastered the material in CS 314. All students enrolled in 414 this spring must also be enrolled in 415 and complete the practicum project. The project will require a substantial programming effort.
This class has three components: lectures, weekly reading assignments, and a class project. You are expected to keep up with and excel at all three.
Reading assignments are from the textbook unless noted otherwise.
Abraham Silberschatz and Peter Galvin. Operating System Concepts. Fifth Edition, Addison-Wesley Longman, Mass., 1998.
You may discuss homework problems with other students in the class, but you may not collaborate on the actual writing of the problem sets or development of solutions. Under no circumstances would it be acceptable for two or more students to turn in substantially similar answers to a homework problem, or to have possession of each others' homeworks. Everyone with whom you discussed the homework set must be cited on the submitted homeworks. No part of the homework may be copied from or be based on solution sets on the web - also keep in mind that the solution sets on the web are often incomplete and incorrect.
The same standards apply for group projects, though at the group level. Group members are expected to turn in the result of their collaborative work with other members of the same group. They may discuss their strategy with other groups. No group should at any time be in possession of another group's solution. It is your responsibility to protect your work from unauthorized access.
Any violations of the academic integrity code will be penalized according to the Cornell Academic Integrity Policy, and may result in failure in the course, suspension, or expulsion from the university.