Biblio

Export 12491 results:
1998
Wang Y-M, Lee W-J.  1998.  COMERA: COM Extensible Remoting Architecture. 4th Conference on Object-Oriented Technologies and Systems (COOTS 98).
Brace D, Gordon A, Teel S.  1998.  Compaq's New Engineering Compute Farm Environment: Moving Forward With Windows NT. Large Installation System Administration of Windows NT Conference (LISA-NT 98).
Gomberg M, Evard R, Stacey C.  1998.  A Comparison of Large Scale Software Installation on NT and UNIX. Large Installation System Administration of Windows NT Conference (LISA-NT 98).
Carney M, Loe B.  1998.  A Comparison of Methods for Implementing Adaptive Security Policies. 7th USENIX Security Symposium (USENIX Security 98).
Gil J, Gutterman Z.  1998.  Compile Time Symbolic Derivation with C++ Templates. 4th Conference on Object-Oriented Technologies and Systems (COOTS 98).
Burgess M.  1998.  Computer Immunology. 12th Systems Administration Conference (LISA 98).
[Anonymous].  1998.  Conference Dinner. 6th Annual Tcl/Tk Conference (6th Annual Tcl/Tk Conference).
da Silveira GElias, da Silva FQB.  1998.  A Configuration Distribution System for Heterogeneous Networks. 12th Systems Administration Conference (LISA 98).
Page CR.  1998.  Configuring Database Servers. 12th Systems Administration Conference (LISA 98).
Matheson B.  1998.  Console Server. 1998 USENIX Annual Technical Conference (USENIX ATC 98).
DeJong M, Bailey B, Konstan JA.  1998.  Creating a Multimedia Extension for Tcl Using the Java Media Framework. 6th Annual Tcl/Tk Conference (6th Annual Tcl/Tk Conference).
Shah A, Darugar T.  1998.  Creating High Performance Web Applications using Tcl, Display Templates, XML, and Database Content. 6th Annual Tcl/Tk Conference (6th Annual Tcl/Tk Conference).
Belani E, Vahdat A, Anderson TE, Dahlin M.  1998.  The CRISIS Wide Area Security Architecture. 7th USENIX Security Symposium (USENIX Security 98).
Schneier B, Kelsey J.  1998.  Cryptographic Support for Secure Logs on Untrusted Machines. 7th USENIX Security Symposium (USENIX Security 98).
Greenwood D, Winn J.  1998.  Current Mapping of PKI to the Law. 3rd USENIX Workshop on Electronic Commerce (EC 98).
Noer GJ.  1998.  Cygwin32: A Free UNIX Porting Layer for Win32. 2nd USENIX Windows NT Symposium (2nd USENIX Windows NT Symposium).
Lee W, Stolfo SJ.  1998.  Data Mining Approaches for Intrusion Detection. 7th USENIX Security Symposium (USENIX Security 98).
Howlett GA.  1998.  Data Objects. 6th Annual Tcl/Tk Conference (6th Annual Tcl/Tk Conference).
Clarke D.  1998.  DataMynah: A pseudo-NL interface to large multivariate datasets. 6th Annual Tcl/Tk Conference (6th Annual Tcl/Tk Conference).
Baker BS, Manber U.  1998.  Deducing Similarities in Java Sources from Bytecodes. 1998 USENIX Annual Technical Conference (USENIX ATC 98).
Gibbs JT.  1998.  Design and Implementation of a SCSI Subsystem. 1998 USENIX Annual Technical Conference (USENIX ATC 98).
Yang C.S, Luo M.Y.  1998.  Design and Implementation of an Administration System for Distributed Web Server. 12th Systems Administration Conference (LISA 98).
Fiuczynski ME, Lam VK, Bershad BN.  1998.  The Design and Implementation of an IPv6/IPv4 Network Address and Protocol Translator. 1998 USENIX Annual Technical Conference (USENIX ATC 98).
Jain P, Widoff S, Schmidt DC.  1998.  The Design and Performance of MedJava. 4th Conference on Object-Oriented Technologies and Systems (COOTS 98).
Workman K, Downs S, Featherstone M, Waud E.  1998.  Designing an Optimized Enterprise Backup Solution With Intelligent Data Management. Large Installation System Administration of Windows NT Conference (LISA-NT 98).

Pages