Conferences

Search results

    TitleConferenceSpeaker(s)
    Panel: Open Source Software Business Models USENIX ATC '06Mike Olsen, Brian Aker, Miguel de Icaza
    Success, Failure, and Alternative Solutions for Network Security USENIX ATC '06Peiter "Mudge" Zatko
    Panel: Is University Systems Teaching and Research Relevant to Industry? USENIX ATC '06Gernot Heiser
    Architectures and Algorithms for Biomolecular Simulation USENIX ATC '06Cliff Young
    Opening RemarksUSENIX ATC '06
    PlanetLab: Evolution vs. Intelligent Design in Planetary-Scale Infrastructure USENIX ATC '06Larry Peterson
    Opening RemarksNSDI '06
    Greetings from a Filesystem UserFAST '05Jim Gray
    How Sysadmins Can Protect Free Speech and Privacy on the Electronic FrontierLISA '05Kevin Bankston
    Wireless SecurityLISA '05Michael H. Warfield
    Weblogs, Wikis, and RSS for System AdministratorsLISA '05Jonas Luster
    Using Your Body for Authentication: A Biometrics Guide for System AdministratorsLISA '05Michael R. Crusoe
    Silly Network Management TricksLISA '05Terry Slattery
    LISA Game ShowLISA '05Rob Kolstad, Dan Klein
    Modern Trends in UNIX and Linux Infrastructure ManagementLISA '05Luke Kanies
    Incident Command for IT: What We Can Learn from the Fire DepartmentLISA '05Brent Chapman
    Automatic PC Desktop Management with Virtualization TechnologyLISA '05Monica Lam
    What's the Worst That Could Happen?LISA '05Peyton Engel
    Network Black Ops: Extracting Unexpected Functionality from Existing Networks LISA '05Dan Kaminsky
    Internet Counter-Intelligence: Offense and DefenseLISA '05Lance Cottrell
    Preventing Child Neglect in DNSSECbis Using Lookaside Validation (DLV)LISA '05Paul Vixie
    Picking Locks with CryptologyLISA '05Matt Blaze
    What Big Sites Can Learn from Little SitesLISA '05Tom Limoncelli
    Building MIT's Stata Center: An IT PerspectiveLISA '05Garrett Wollman
    Under 200: Applying IS Best Practices to Small CompaniesLISA '05Strata Rose Chalup

Pages