The course is managed as a few discussion groups, each is focused around
a selected research topic. Each group investigates far-reaching ideas,
and designs and implements a useful semester-long project related to the topic.
Generally, we have a meeting every Tuesday and Thursday 3-4:15pm.
These tend to go longer based on interest.
For more information about the course please contact the instructor.
During the Spring 2013 semester we are working on the following projects:
Here are the projects conducted during the Spring 2011 semester:
Here are the projects conducted during the Fall 2008 semester:
Here are the projects conducted during the Spring 2007 semester:
- Fighting E-mail Spam
Spam is one of the major problems on the Internet, making e-mail a lot less effective tool.
Spam filters are quite effective, blocking about 90% of spam messages. However, due to the
large volume of spam, 10% is still quite significant compared with the number of non-spam
messages. This project had two goals: first, to increase the effectiveness of the filters
to 95% (reducing the ratio of unfiltered spam to filtered spam by a factor of 2). Second,
to try to exact some cost on computers that send spam at the time they actually send
a spam message.
- Privacy for Web-based Applications
Web based applications such as Google Docs and Spreadsheets represent a new take on the
old thin-client / the-network-is-the-computer computing paradigm. Current providers
such as Google and Zoho store user files and provide applications that manipulate
these files within the framework of an Internet browser. The content of these files
is accessible to the provider, presenting a serious privacy problem (or feature, in the
eye of the provider). This project investigates the possibility of providing user
privacy using the existing applications and application providers, without undermining
- A Dynamic Web Service.
- Wireless Mesh Network with Push-to-Talk Support.
- Distributed Systems ( 600.437 )
- Tueday 3-4:15pm, NEB 213
- Thursday 3-4:15pm, NEB 213
Academic Honesty and Ethical behavior are required in this course, as it is in all
courses at Johns Hopkins University. This course will strictly enforce the Computer Science
Department Academic Integrity policy which can be found at the department's web page.
Questions or comments to: firstname.lastname@example.org
TEL: (410) 516-5562
FAX: (410) 516-6134
Center for Networking and Distributed Systems|
Computer Science Department
Johns Hopkins University
3400 N. Charles Street
Baltimore, MD 21218-2686