Conferences

Search results

    TitleConferenceSpeaker(s)
    Deterministic System AdministrationLISA '08Andrew Hume
    Designing, Building, and Populating a 10-Megawatt DatacenterLISA '08Doug Hughes
    "Standard Deviations" of the "Average" System AdministratorLISA '08Alva L. Couch
    System Administration and the Economics of PlentyLISA '08Tom Limoncelli
    Inside DreamWorks Animation Studios: A Look at Past, Present, and Future ChallengesLISA '08Sean Kamath, Mike Cutler
    Beyond VDI: Why Thin Client Computing and Virtual Desktop Infrastructures Aren't Cutting ItLISA '08Monica Lam
    LISA Quiz ShowLISA '08Jeremy Allison
    Keynote Address Implementing Intellipedia Within a "Need to Know" CultureLISA '08Sean Dennehy
    Integrating Linux (and UNIX and Mac) Identity Management in Microsoft Active DirectoryLISA '08Mike Patnode
    Programming the Virtual InfrastructureLISA '08Paul Anderson
    How to Proceed When 1000 Call Agents Tell You, "My Computer Is Slow": Creating a User Experience Monitoring SystemLISA '08Tobias Oetiker
    How to Stop Hating MySQL: Fixing Common Mistakes and MythsLISA '08Sheeri K. Cabral
    Does Your House Have Lions? Controlling for the Risk from Trusted InsidersLISA '08Marcel Simon
    Spine: Automating Systems Configuration and ManagementLISA '08Rafi Khardalian
    Verifying Compliance of Trusted ProgramsUSENIX Security '08Sandra Rueda, Dave King, Trent Jaeger
    Helios: Web-based Open-Audit VotingUSENIX Security '08Ben Adida
    VoteBox: A Tamper-evident, Verifiable Electronic Voting SystemUSENIX Security '08Daniel Sandler, Kyle Derr, Dan S. Wallach
    The Ghost in the Browser and Other Frightening Stories About Web MalwareUSENIX Security '08Niels Provos
    An Empirical Security Study of the Native Code in the JDKUSENIX Security '08Gang Tan, Jason Croft
    AutoISES: Automatically Inferring Security Specification and Detecting ViolationsUSENIX Security '08Lin Tan, Xiaolan Zhang, Xiao Ma, Weiwei Xiong, Yuanyuan Zhou
    Real-World Buffer Overflow Protection for Userspace & KernelspaceUSENIX Security '08Michael Dalton, Hari Kannan, Christos Kozyrakis
    Managing Insecurity: Practitioner Reflections on Social Costs of SecurityUSENIX Security '08Darren Lacey
    BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet DetectionUSENIX Security '08Guofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee
    Measurement and Classification of Humans and Bots in Internet ChatUSENIX Security '08Steven Gianvecchio, Mengjun Xie, Zhengyu Wu, Haining Wang
    To Catch a Predator: A Natural Language Approach for Eliciting Malicious PayloadsUSENIX Security '08Sam Small, Joshua Mason, Niels Provos, Adam Stubblefield

Pages