Biblio

Export 12436 results:
1995
Vincenzetti D, Taino S, Bolognesi F.  1995.  STEL: Secure TELnet. 5th USENIX UNIX Security Symposium (USENIX Security 95).
Montenegro G, Drach S.  1995.  System Isolation and Network Fast-Fail Capability in Solaris. Second USENIX Symposium on Mobile and Location-Independent Computing ( Second USENIX Symposium on Mobile and Location-Independent Computing).
Howlett GG.  1995.  A Table-based Layout Editor. USENIX Third Annual Tcl/Tk Workshop ( USENIX Third Annual Tcl/Tk Workshop).
Stajano F, Walker R.  1995.  Taming the Complexity of Distributed Multimedia Applications. USENIX Third Annual Tcl/Tk Workshop ( USENIX Third Annual Tcl/Tk Workshop).
Crowley C, Konstan JA, McLennan MJ.  1995.  Tcl and Tk in the Classroom: Lessons Learned. USENIX Third Annual Tcl/Tk Workshop ( USENIX Third Annual Tcl/Tk Workshop).
Herlocker JL, Konstan JA.  1995.  Tcl Commands as Media in a Distributed Multimedia Toolkit. USENIX Third Annual Tcl/Tk Workshop ( USENIX Third Annual Tcl/Tk Workshop).
Shonwalder J., Langendörfer H..  1995.  Tcl Extensions for Network Management Applications. USENIX Third Annual Tcl/Tk Workshop ( USENIX Third Annual Tcl/Tk Workshop).
Rouse FR, Christopher W.  1995.  A Tcl to C Compiler. USENIX Third Annual Tcl/Tk Workshop ( USENIX Third Annual Tcl/Tk Workshop).
Liu PT, Smith B, Rowe L.  1995.  Tcl-DP Name Server. USENIX Third Annual Tcl/Tk Workshop ( USENIX Third Annual Tcl/Tk Workshop).
Iyengar S, Konstan JA.  1995.  TclProp: A Data-Propagation Formula Manager for Tcl and Tk. USENIX Third Annual Tcl/Tk Workshop ( USENIX Third Annual Tcl/Tk Workshop).
Crowley C.  1995.  TkReplay: Record and Replay for Tk. USENIX Third Annual Tcl/Tk Workshop ( USENIX Third Annual Tcl/Tk Workshop).
L. Camp J, Sirbu M, Tygar J.D..  1995.  Token and Notational Money in Electronic Commerce. First USENIX Workshop on Electronic Commerce ( First USENIX Workshop on Electronic Commerce).
Walters R.  1995.  Tracking Hardware Configurations in a Heterogeneous Network with syslogd. 9th System Administration Conference (LISA 95).
Berman A, Bourassa V, Selberg E.  1995.  TRON: Process-Specific File Protection for the UNIX Operating System. USENIX 1995 Technical Conference (USENIX 1995 Technical Conference).
Talbot J.  1995.  Turning the AIX Operating System into an MP-capable OS. USENIX 1995 Technical Conference (USENIX 1995 Technical Conference).
Phelps TA.  1995.  Two Years with TkMan: Lessons and Innovations. USENIX Third Annual Tcl/Tk Workshop ( USENIX Third Annual Tcl/Tk Workshop).
Pendry J-S, McKusick MKirk.  1995.  Union Mounts in 4.4BSD-Lite. USENIX 1995 Technical Conference (USENIX 1995 Technical Conference).
Itoh J-ichiro, Yokote Y, Lea R.  1995.  Using Meta-Objects to Support Optimisation in the Apertos Operating System. USENIX Conference on Object-Oriented Technologies (COOTS 95).
Itoh J-ichiro, Yokote Y, Lea R.  1995.  Using Meta-Objects to Support Optimisation in the Apertos Operating System. {USENIX} Conference on Object-Oriented Technologies ({COOTS} 95).
Moon GC, Lee A, Lindsey S.  1995.  Using Tcl/Tk to Program a Full Functional Geographic Information System. USENIX Third Annual Tcl/Tk Workshop ( USENIX Third Annual Tcl/Tk Workshop).
Bellovin SM.  1995.  Using the Domain Name System for System Break-ins. 5th USENIX UNIX Security Symposium (USENIX Security 95).
Muffet A.  1995.  WAN-hacking with AutoHack: Auditing Security Behind the Firewall. 5th USENIX UNIX Security Symposium (USENIX Security 95).
Roseman M.  1995.  When is an object not an object? USENIX Third Annual Tcl/Tk Workshop ( USENIX Third Annual Tcl/Tk Workshop).
Walker ST.  1995.  Why are our Systems Insecure? Must they always be? 5th {USENIX} {UNIX} Security Symposium ({USENIX} Security 95).
Trotter J, Cravatts M.  1995.  Wireless Adapter Architecture for Mobile Computing. Second USENIX Symposium on Mobile and Location-Independent Computing ( Second USENIX Symposium on Mobile and Location-Independent Computing).

Pages