Search results

    An Introduction to Software Radio USENIX ATC '06Eric Blossom
    Hackers and Founders USENIX ATC '06Paul Graham
    Panel: Is University Systems Teaching and Research Relevant to Industry? USENIX ATC '06Gernot Heiser
    Architectures and Algorithms for Biomolecular Simulation USENIX ATC '06Cliff Young
    Permissive Action Links, Nuclear Weapons, and the History of Public Key Cryptography USENIX ATC '06Steven M. Bellovin
    Gold and Fool's Gold: Successes, Failures, and Futures in Computer Systems Research USENIX ATC '06Butler Lampson
    Opening RemarksUSENIX ATC '06
    PlanetLab: Evolution vs. Intelligent Design in Planetary-Scale Infrastructure USENIX ATC '06Larry Peterson
    Deploying a Sensor Network on an Active Volcano USENIX ATC '06Matt Welsh
    Panel: Open Source Software Business Models USENIX ATC '06Mike Olsen, Brian Aker, Miguel de Icaza
    Success, Failure, and Alternative Solutions for Network Security USENIX ATC '06Peiter "Mudge" Zatko
    Opening RemarksNSDI '06
    Greetings from a Filesystem UserFAST '05Jim Gray
    Silly Network Management TricksLISA '05Terry Slattery
    LISA Game ShowLISA '05Rob Kolstad, Dan Klein
    Picking Locks with CryptologyLISA '05Matt Blaze
    How Sysadmins Can Protect Free Speech and Privacy on the Electronic FrontierLISA '05Kevin Bankston
    Wireless SecurityLISA '05Michael H. Warfield
    Weblogs, Wikis, and RSS for System AdministratorsLISA '05Jonas Luster
    Using Your Body for Authentication: A Biometrics Guide for System AdministratorsLISA '05Michael R. Crusoe
    Automatic PC Desktop Management with Virtualization TechnologyLISA '05Monica Lam
    What's the Worst That Could Happen?LISA '05Peyton Engel
    Network Black Ops: Extracting Unexpected Functionality from Existing Networks LISA '05Dan Kaminsky
    Internet Counter-Intelligence: Offense and DefenseLISA '05Lance Cottrell
    Preventing Child Neglect in DNSSECbis Using Lookaside Validation (DLV)LISA '05Paul Vixie