LISA '10 | Implementing IPv6 at ARIN | Matt Ryanczak |
LISA '10 | Internet on the Edge | Andrew Mundy |
LISA '10 | Managing Vendor Relations: A Case Study of Two HPC Network Issues | Loren Jan Wilson |
LISA '10 | Using Syslog Message Sequences for Predicting Disk Failures | R. Wesley Featherstun, Errin W. Fulp |
LISA '10 | Log Analysis and Event Correlation Using Variable Temporal Event Correlator (VTEC) | Paul Krizak |
LISA '10 | Chukwa: A System for Reliable Large-Scale Log Collection | Ariel Rabkin, Randy Katz |
LISA '10 | Empirical Virtual Machine Models for Performance Guarantees | Hyong S. Kim |
LISA '10 | RC2—A Living Lab for Cloud Computing | Kyung Dong Ryu, Xiaolan Zhang, Glenn Ammons, Vasanth Bala, Stefan Berger, Dilma M Da Silva, Jim Doran, Frank Franco, Alexei Karve, Herb Lee, James A Lindeman, Ajay Mohindra, Bob Oesterlin, Giovanni Pacifici, Dimitrios Pendarakis, Darrell Reimer, Mariusz Sabath |
LISA '10 | PeerMon: A Peer-to-Peer Network Monitoring System | Tia Newhall, Jānis Lībeks, Ross Greenwood, Jeff Knerr |
LISA '10 | Keeping Track of 70,000+ Servers: The Akamai Query System | Jeff Cohen, Thomas Repantis, Sean McDermott, Scott Smith, Joel Wein |
LISA '10 | Configuration Management for Mac OS X: It's Just Unix, Right? | Janet Bass, David Pullman |
LISA '10 | Anycast as a Load Balancing Feature | Fernanda Weiden, Peter Frost |
LISA '10 | iSCSI SANs Don't Have to Suck | Derek J. Balling |
LISA '09 | TECHNICAL SESSIONS | |
LISA '09 | Pushing Boulders Uphill: The Difficulty of Network Intrusion Recovery | Michael E. Locasto, Matthew Burnside, Darrell Bethea |
LISA '09 | Two-Person Control Administration: Preventing Administation Faults through Duplication | Shaya Potter, Steven M. Bellovin, Jason Nieh |
LISA '09 | The Water Fountain vs. the Fire Hose: An Examination and Comparison of Two Large Enterprise Mail Service Migrations | Craig Stacey, Max Trefonides, Tim Kendall, Brian Finley |
LISA '09 | Crossbow Virtual Wire: Network in a Box | Sunay Tripathi, Nicolas Droux, Kais Belgaied, Shrikrishna Khare |
LISA '09 | EVA: A Framework for Network Analysis and Risk Assessment | Melissa Danforth |
LISA '09 | An Analysis of Network Configuration Artifacts | David Plonka, Andres Jaan Tack |
LISA '09 | Secure Passwords Through Enhanced Hashing | Benjamin Strahs, Chuan Yue, Haining Wang |
LISA '09 | SEEdit: SELinux Security Policy Configuration System with Higher Level Language | Yuichi Nakamura, Yoshiki Sameshima, Toshihiro Tabata |
LISA '09 | An SSH-based Toolkit for User-based Network Services | Joyita Sikder, Manigandan Radhakrishnan, Jon A. Solworth |
LISA '09 | Federated Access Control and Workflow Enforcement in Systems Configuration | Bart Vanbrabant, Thomas Delaet, Wouter Joosen |
LISA '09 | CIMDIFF: Advanced Difference Tracking Tool for CIM Compliant Devices | Ramani Routray, Shripad Nadgowda |