Check out the new USENIX Web site.


 LISA '10 Home
 Conference Overview
 Important Dates/Contact Information
 Conference Organizers
 Need Help with Your Submission?
 Refereed Papers
 Practice and Experience Reports
 Web Submission Form for Papers and Reports
 Training Program
 Invited Talks and The Guru Is In
 Workshops, Posters, WiPs, and BoFs
 Possible Topics for Authors and Speakers
 Sponsorship and Exhibit Opportunities

Call for Participation in PDF

LISA '10 Call for Participation

Refereed Papers

Refereed papers explore techniques, tools, theory, and case histories that extend our understanding of system and network administration. They present results in the context of previous related work.

System administration is a broad topic, and good papers take a variety of approaches. A few examples:

  • Description/analysis of a new technique, tool, technology, or theory
  • Applying an existing technique, tool, etc., in a novel or maybe controversial way
  • Critical analysis of the alternatives for solving a common problem, including new recommendations
  • New lessons learned from a detailed and honest evaluation of a case history
The crucial component of all of these is something new or timely, maybe controversial, and something that was not previously available, discussed, considered, or recognized.

The program committee is particularly interested in contributions from full-time students. Cash prizes will be awarded at the conference for the best refereed paper and the best refereed paper with a student as lead author. Writing a refereed paper for LISA is a rewarding challenge. A properly crafted paper can make a difference in the thinking or practice of thousands of your peers and colleagues. An ideal paper is understandable by an intermediate-level system administrator while containing ideas that are new and timely for expert administrators. It is particularly important to fit your own work into the context of past work and practice. LISA papers must provide references to prior relevant work and describe the differences between that work and their own. Authors should browse proceedings of previous LISA conferences for references and can use the online proceedings (going back to 1993).

Need help with your submission? You're not alone or in the dark. Please see our page about getting assistance with your submission.

Submission Details

Authors must submit extended abstracts, 500–1500 words, excluding figures, tables, and references. A brief outline of the final paper should be attached. Full papers and papers lacking outlines will not be accepted for review. The title and author name(s) and affiliation(s) should appear on the first page of the submission. (LISA reviewing is single blind.) Authors should make sure that their submission prints properly on U.S.-style 8.5"x11" paper.

General submission rules:

  • All submissions must be electronic, in PDF only, via the Web form. The Web form will ask for contact information for the paper and allows for the submission of your full paper file. Please do not email submissions.

  • The first page of each submission must include the name, affiliation, and email address of the author(s).

  • Submissions should include a list of appropriate topic keywords or tags above the body text of the draft paper.
    • Tags: security, research, IPv6
    Suggested tags include security, research, case study, backups, configuration management, database, Web, printing, filesystem, authentication, and VMs. Authors may include additional tags as well.

  • Submissions whose main purpose is to promote a commercial product or service will not be accepted.

  • Submissions may be submitted only by the author of the paper. No third-party submissions will be accepted.

  • All accepted papers must be presented at the LISA conference by at least one author. One author per paper will receive a registration discount of $200. USENIX will offer a complimentary registration for the technical program upon request.

  • Authors of an accepted paper must provide a final paper for publication in the conference proceedings. Final papers are limited to 18 pages, including diagrams, figures, references, and appendices. Complete instructions will be sent to the authors of accepted papers. To aid authors in creating a paper suitable for LISA's audience, authors of accepted proposals will be assigned one or more shepherds to help with the process of completing the paper. The shepherds will read one or more intermediate drafts and provide advice and assistance, as needed, before the authors complete the final draft.

  • All papers will be available online to registered attendees before the conference. If your accepted paper should not be published prior to the event, please notify The papers will be available online to everyone beginning on November 10, 2010.

  • Simultaneous submission of the same work to multiple venues, submission of previously published work, or plagiarism constitutes dishonesty or fraud. USENIX, like other scientific and technical conferences and journals, prohibits these practices and may take action against authors who have committed them. See the USENIX Conference Submissions Policy for details. Questions? Contact your program chair,, or the USENIX office,

  • Papers accompanied by nondisclosure agreement forms will not be considered. Accepted submissions will be treated as confidential prior to publication on the LISA '10 Web site; rejected submissions will be permanently treated as confidential.

For more information, please consult the detailed author guidelines.

Extended Abstracts are due by 11:59 p.m. PDT on May 17, 2010.

Authors will be notified by July 1, 2010, whether their abstracts have been accepted. The final papers are due August 24, 2010.

Next page

? Need help?

Last changed: 2 March 2010 ch
LISA '10 Home