Biblio

Export 12491 results:
1999
Ball S.  1999.  TkGecko: A Frill-Necked Lizard. 13th Systems Administration Conference (LISA 99).
Driscoll J.  1999.  Tools for Building Communities. Workshop on Embedded Systems (Workshop on Embedded Systems).
Gamsa B, Krieger O, Appavoo J, Stumm M.  1999.  Tornado: Maximizing Locality and Concurrency in a Shared Memory Multiprocessor Operating System. 3rd Symposium on Operating Systems Design and Implementation (OSDI 99).
Myers BA.  1999.  Towards More Natural Domain-Specific Languages. 2nd Conference on Domain-Specific Languages (DSL 99).
Buschkes R, Borning M.  1999.  Transaction-Based Anomaly Detection. 1st Workshop on Intrusion Detection and Network Monitoring (ID 99).
Gallatin A, Chase J, Yocum K.  1999.  Trapeze/IP: TCP at Near-Gigabit Speeds. 1999 USENIX Annual Technical Conference (USENIX ATC 99).
Limoncelli TA.  1999.  Tricks You Can Do If Your Firewall Is a Bridge. 1st Conference on Network Administration (NETA 99).
Vijaykrishnan N., Ranganathan N..  1999.  Tuning Branch Predictors to Support Java Method Invocation. 5th Conference on Object-Oriented Technologies and Systems (COOTS 99).
O'Keefe M.  1999.  A Universal Access Smart-Card-Based Secure File System. 3rd Annual Linux Showcase & Conference (ALS 1999).
Salus P.  1999.  UNIX to Linux in Perspective. 1999 USENIX Annual Technical Conference (USENIX ATC 99).
Pentland A.  1999.  Unwiring the World: Technology Enables Even Remote Areas to Participate Fully in the Global Economy. Workshop on Embedded Systems (Workshop on Embedded Systems).
Landau S.  1999.  U.S. Crypto Policy: Explaining the Inexplicable. 8th USENIX Security Symposium (USENIX Security 99).
[Anonymous].  1999.  The USENIX Quiz Show!. 1999 USENIX Annual Technical Conference (USENIX ATC 99).
Anupam V, Kristol DM, Mayer A.  1999.  A User's and Programmer's View of the New JavaScript Security Model. Second USENIX Symposium on Internet Technologies & Systems (USITS 99).
Bahn H, Noh SH, Koh K, Min SLyul.  1999.  Using Full Reference History for Efficient Document Replacement in Web Caches. Second USENIX Symposium on Internet Technologies & Systems (USITS 99).
Ezolt P.  1999.  Using Iprobe to optimize Apache on Alpha/Linux. 3rd Annual Linux Showcase & Conference (ALS 1999).
Parson DE.  1999.  Using Java Reflection to Automate Extension Language Parsing. 2nd Conference on Domain-Specific Languages (DSL 99).
Kangas K, Röning J.  1999.  Using Mobile Code Interfaces to Control Ubiquitous Embedded Systems. Workshop on Embedded Systems (Workshop on Embedded Systems).
Sirer EGuün, Bershad BN.  1999.  Using Production Grammars in Software Testing. 2nd Conference on Domain-Specific Languages (DSL 99).
Lawrenz CH, Madhuram RC.  1999.  Using Tcl to Build a Buzzword-Compliant Environment That Glues Together Legacy Analysis Programs. 13th Systems Administration Conference (LISA 99).
Cranor CD, Parulkar GM.  1999.  The UVM Virtual Memory System. 1999 USENIX Annual Technical Conference (USENIX ATC 99).
Choo T-H.  1999.  Vaulted VPN: Compartmented Virtual Private Networks on Trusted Operating SystemsTse-Huong Choo, Hewlett-Packard Laboratories . 8th USENIX Security Symposium (USENIX Security 99).
Jennings J, Beuscher E.  1999.  Verischemelog: Verilog Embedded in Scheme. 2nd Conference on Domain-Specific Languages (DSL 99).
Lehey G.  1999.  The Vinum Volume Manager. 1999 USENIX Annual Technical Conference (USENIX ATC 99).
Wang RY, Anderson TE, Patterson DA.  1999.  Virtual Log Based File Systems for a Programmable Disk. 3rd Symposium on Operating Systems Design and Implementation (OSDI 99).

Pages