Biblio

Export 12480 results:
1992
Spencer H, Collyer G.  1992.  #ifdef Considered Harmful, or Portability Experience with C News. USENIX Summer 1992 Technical Conference (USENIX Summer 1992 Technical Conference).
Stein D., Shah D..  1992.  Implementing Lightweight Threads. USENIX Summer 1992 Technical Conference (USENIX Summer 1992 Technical Conference).
Vo K-P, Chen Y-F.  1992.  Incl: A Tool to Analyze Include Files. USENIX Summer 1992 Technical Conference (USENIX Summer 1992 Technical Conference).
Schauer H, Wolfhugel C.  1992.  An Internet Gatekeeper. UNIX Security Symposium III (UNIX Security 92).
Schauer H, Wolfhugel C.  1992.  An Internet Gatekeeper. UNIX Security Symposium III (UNIX Security 92).
Salz R.  1992.  InterNetNews: Usenet Transport for Internet Sites. USENIX Summer 1992 Technical Conference (USENIX Summer 1992 Technical Conference).
Haugh, II JF.  1992.  Introduction to the Shadow Password Suite. UNIX Security Symposium III (UNIX Security 92).
[Anonymous].  1992.  The Justice Department's Computer Crime Initiative. USENIX Summer 1992 Technical Conference (USENIX Summer 1992 Technical Conference).
Tilbrook D, Crook R.  1992.  Large Scale Porting through Parameterization. USENIX Summer 1992 Technical Conference (USENIX Summer 1992 Technical Conference).
Baud J-P., Boissat C., Cane F., Hemmer F., Jagel E., Kumar A., Lee G., Panzer-Steindel B., Robertson L., Segal B. et al..  1992.  Mainframe Services from Gigabit-Networked Workstations. USENIX Summer 1992 Technical Conference (USENIX Summer 1992 Technical Conference).
Pham TQ, Garg PK.  1992.  On Migrating a Distributed Application to a Multi-Threaded Environment. USENIX Summer 1992 Technical Conference (USENIX Summer 1992 Technical Conference).
Maybee P.  1992.  NeD: The Network Extensible Debugger. USENIX Summer 1992 Technical Conference (USENIX Summer 1992 Technical Conference).
D. Chapman B.  1992.  Network (In)Security Through IP Packet Filtering. UNIX Security Symposium III (UNIX Security 92).
da Silva J, Guömundsson Ó, Mosse D.  1992.  Performance of a Parallel Network Backup Manager. USENIX Summer 1992 Technical Conference (USENIX Summer 1992 Technical Conference).
Salemi C, Shah S, Lund E.  1992.  A Privilege Mechanism for UNIX System V Release 4 Operating Systems. USENIX Summer 1992 Technical Conference (USENIX Summer 1992 Technical Conference).
Baker M, Sullivan M.  1992.  The Recovery Box: Using Fast Recovery to Provide High Availability in the UNIX Environment. USENIX Summer 1992 Technical Conference (USENIX Summer 1992 Technical Conference).
Libes D.  1992.  Regression Testing and Conformance Testing Interactive Programs. USENIX Summer 1992 Technical Conference (USENIX Summer 1992 Technical Conference).
LeFebvre W.  1992.  Restricting Network Access to System Daemons Under SunOS. UNIX Security Symposium III (UNIX Security 92).
Balan R, Gollhardt K.  1992.  A Scalable Implementation of Virtual Memory HAT Layer for Shared Memory Multiprocessor Machines. USENIX Summer 1992 Technical Conference (USENIX Summer 1992 Technical Conference).
Galvin JM, Balenson DM.  1992.  Security Aspects of a UNIX PEM Implementation. UNIX Security Symposium III (UNIX Security 92).
Koblas D, Koblas MR.  1992.  SOCKS. UNIX Security Symposium III (UNIX Security 92).
Venema W.  1992.  TCP Wrapper: Network Monitoring, Access Control, and Booby Traps. UNIX Security Symposium III (UNIX Security 92).
Crowther N, Graham J.  1992.  TCP/IP and OSI Interoperability with the X Window System. USENIX Summer 1992 Technical Conference (USENIX Summer 1992 Technical Conference).
Brachman B, Neufeld G.  1992.  TDBM: A DBM Library with Atomic Transactions. USENIX Summer 1992 Technical Conference (USENIX Summer 1992 Technical Conference).
Bellovin S.  1992.  There Be Dragons. {USENIX} Summer 1992 Technical Conference ({USENIX} Summer 1992 Technical Conference).

Pages