Biblio

Export 11183 results:
Submitted
Haugh, II JF.  Submitted.  Introduction to the Shadow Password Suite.
Begnum K, Border C, Sijm N.  Submitted.  An Investigation of Learning Outcomes for MSc Programs in Network and System Administration. USENIX Journal of Election Technology and Systems (JETS). 1:10--24.
[Anonymous].  Submitted.  Is it the typeset or the type of statistics? Disfluent font does not reduce self-disclosure
[Anonymous].  Submitted.  Journal of Education in System Administration (JESA). Journal of Education in System Administration ({JESA}).
[Anonymous].  Submitted.  Journal of Education in System Administration (JESA). Journal of Education in System Administration ({JESA}).
[Anonymous].  Submitted.  Large-Scale Graph Processing on Emerging Storage Devices.
Rosenberg D.  Submitted.  Linux And The Commercial Market: How-To And What Next?
Hughes P.  Submitted.  Linux Connectivity For Humans.
Young B.  Submitted.  Linux Isn't A Product, It's A Process.
Hightower L.  Submitted.  Linux Means Business.
de Icaza M.  Submitted.  Linux RAID System.
Lewis T.  Submitted.  Linux Security.
Hall J.  Submitted.  Linux: The Little OS That Could.
Bachwani R, Crameri O, Bianchini R.  Submitted.  Mojave: A Recommendation System for Software Upgrades.
D. Chapman B.  Submitted.  Network (In)Security Through IP Packet Filtering.
[Anonymous].  Submitted.  OpenEC: Toward Unified and Configurable Erasure Coding Management in Distributed Storage Systems.
Jones D, Quisquater J-J, Inc. E R, RTFM,.  Submitted.  Opening Remarks.
[Anonymous].  Submitted.  Optimizing Systems for Byte-Addressable NVM by Reducing Bit Flipping.
[Anonymous].  Submitted.  Orion: A Distributed File System for Non-Volatile Main Memory and RDMA-Capable Networks.
[Anonymous].  Submitted.  Pay Migration Tax to Homeland: Anchor-based Scalable Reference Counting for Multicores.
[Anonymous].  Submitted.  Reaping the performance of fast NVM storage with AnonStore.
Maher M.  Submitted.  RPM (Red Hat Package Manager).
[Anonymous].  Submitted.  SCk: A Single-Machine Approach for Discovering Scalability Bugs in Large Systems.
Galvi JM, Balenson DM.  Submitted.  Security Aspects of a UNIX PEM Implementation.
Henderson R.  Submitted.  Shared Libraries from Ground Zero.

Pages