Biblio

Export 12686 results:
1998
Jaeger T, Liedtke J, Islam N.  1998.  Operating System Protection for Fine-Grained Programs. 7th USENIX Security Symposium (USENIX Security 98).
[Anonymous].  1998.  Palm Pilot Magic. 12th Systems Administration Conference (LISA 98).
Cavazos E.  1998.  Panel: Computer Security and Legal Liability. 7th USENIX Security Symposium (USENIX Security 98).
Minnich R, Glover F, Walker B, Rashid R.  1998.  Panel Discussion: Is a Clustered Computer In Your Future? 1998 USENIX Annual Technical Conference (USENIX ATC 98).
Keromytis A.D, Ioannidis J, Ts'o T, Daniel H.  1998.  Panel Discussion: Whither IPSec. 1998 USENIX Annual Technical Conference (USENIX ATC 98).
[Anonymous].  1998.  Panel: Technical Summaries. 12th Systems Administration Conference (LISA 98).
[Anonymous].  1998.  Panel: The Web versus Distributed Objects. 4th Conference on Object-Oriented Technologies and Systems (COOTS 98).
Carter G.  1998.  Patch32: A System for Automated Client OS Updates. Large Installation System Administration of Windows NT Conference (LISA-NT 98).
Riedel E, van Ingen C, Gray J.  1998.  A Performance Study of Sequential I/O on Windows NT 4.0. 2nd USENIX Windows NT Symposium (2nd USENIX Windows NT Symposium).
Itoi N, Honeyman P.  1998.  Pluggable Authentication Modules for Windows NT. 2nd USENIX Windows NT Symposium (2nd USENIX Windows NT Symposium).
Loewis MV.  1998.  Portable NTFS Driver. 1998 USENIX Annual Technical Conference (USENIX ATC 98).
Mohindra A, Purakayastha A, Zukowski D, Devarakonda M.  1998.  Programming Network Components Using NetPebbles: An Early Report. 4th Conference on Object-Oriented Technologies and Systems (COOTS 98).
Limoncelli TA, Fulmer R, Reingold T, Levine A, Loura R.  1998.  Providing Reliable NT Desktop Services by Avoiding NT Server. Large Installation System Administration of Windows NT Conference (LISA-NT 98).
Rodriguez-Torrent J, Cohn S.  1998.  Public Key Implementation Case Study. 3rd USENIX Workshop on Electronic Commerce (EC 98).
Frolund S, Koistinen J.  1998.  Quality of Service Specification in Distributed Object Systems Design. 4th Conference on Object-Oriented Technologies and Systems (COOTS 98).
Zhang X, Shanmugan R, Barreintos M, J. Chen B.  1998.  RACC: An Approach to Cluster-Based Web Servers. 2nd USENIX Windows NT Symposium (2nd USENIX Windows NT Symposium).
Spencer H.  1998.  Real Programmers Don't Always Use C. 1998 USENIX Annual Technical Conference (USENIX ATC 98).
Perry JA, Safdar S.  1998.  Real World Security Practices. 7th USENIX Security Symposium (USENIX Security 98).
[Anonymous].  1998.  Reception at the Flight Museum. 2nd USENIX Windows NT Symposium (2nd USENIX Windows NT Symposium).
Ritchie D.  1998.  Reflections on the `73 CACM Paper. 1998 USENIX Annual Technical Conference (USENIX ATC 98).
Okamoto J.  1998.  Repetitive Strain Injury (RSI)}}}}: Causes, Treatment, and Prevention. 1998 USENIX Annual Technical Conference (USENIX ATC 98).
Rhett J.  1998.  Request v3: A Modular, Extensible Task Tracking Tool. 12th Systems Administration Conference (LISA 98).
Feldman S.  1998.  Research Directions in Electronic Commerce. 3rd USENIX Workshop on Electronic Commerce (EC 98).
Lee J-H.  1998.  A Resilient Access Control Scheme for Secure Electronic Transactions. 3rd USENIX Workshop on Electronic Commerce (EC 98).
Levy JY, Demailly L, Ousterhout J, Welch B.  1998.  The Safe-Tcl Security Model. 1998 USENIX Annual Technical Conference (USENIX ATC 98).

Pages