Conferences

Search results

    TitleConferenceSpeaker(s)
    Preventing the Revealing of Online Passwords to Inappropriate Websites with LoginInspectorLISA '12Chuan Yue
    XUTools: Unix Commands for Processing Next-Generation Structured TextLISA '12Gabriel A. Weaver, Sean W. Smith
    Managing User Requests With the Grand Unified Task System (GUTS) LISA '12Andrew Stromme, Danica J. Sutherland, Nicholas Felt, Alex Burka, Ben Lipton, Rebecca Roelofs, Daniel-Elia Feist-Alexandrov, Steve Dini, Allen Welkie
    Bayllocator: A Proactive System to Predict Server Utilization and Dynamically Allocate Memory Resources Using Bayesian Networks and Ballooning LISA '12Vangelis Tasoulas, H.rek Haugerud, Kyrre Begnum
    A Sustainable Model for ICT Capacity Building in Developing Countries LISA '12Rudy Gaevart
    Teaching System AdministrationLISA '12Steve VanDevender
    Training and Professional Development in an IT CommunityLISA '12George William Herbert
    Extensible Monitoring with Nagios and Messaging MiddlewareLISA '12Jonathan Reams
    Efficient Multidimensional Aggregation for Large Scale Monitoring LISA '12Lautaro Dolberg, Jerome Francois, Thomas Engel
    On the Accurate Identification of Network Service Dependencies in Distributed SystemsLISA '12Barry Peddycord III, Peng Ning, Sushil Jajodia
    What Your CDN Won't Tell You: Optimizing a News Website for Speed and StabilityLISA '12Julian Dunn, Blake Crosby
    Building a 100K log/sec Logging InfrastructureLISA '12David Lang
    Building a Protocol Validator for Business to Business Communications LISA '12Rudi van Drunen
    Building the Network Infrastructure for the International Mathematics Olympiad LISA '12Rudi van Drunen
    Lessons Learned When Building a Greenfield High Performance Computing EcosystemLISA '12Andrew Keen
    Building a Wireless Network for a High Density of Users LISA '12David Lang
    TTL of a PenetrationLISA '12Branson Matheson
    The Internet of Things and Sensors and Actuators!LISA '12Vint Cerf
    The Evolution of EthernetLISA '12John D'Ambrosia, Chauncey Schwartz II
    IPv6: A Guide to Address PlanningLISA '12Owen DeLong
    OpenStack: Leading the Open Source Cloud RevolutionLISA '12Vish Ishaya
    Analysis of an Internet-wide Stealth Scan from a BotnetLISA '12kc claffy, Alberto Dainotti
    Database Server Safety Nets: Options for Predictive Server AnalyticsLISA '12Joe Conway, Jeff Hamann
    Ceph: Managing a Distributed Storage System at ScaleLISA '12Sage Weil
    System Log Analysis Using BigQuery LISA '12Gustavo Franco

Pages