LISA '03 | Distributed Tarpitting: Impeding Spam Across Multiple Servers | Tim Hunter, Paul Terry, Alan Judge |
LISA '03 | Using Service Grammar to Diagnose BGP Configuration Errors | Xiaohu Qie, Sanjai Narain |
LISA '03 | Splat: A Network Switch/Port Configuration Management Tool | Cary Abrahamson, Michael Blodgett, Adam Kunen, Nathan Mueller |
LISA '02 | Work-Augmented Laziness with the Los Task Request System | Thomas Stepleton |
LISA '02 | Spam Blocking with a Dynamically Updated Firewall Ruleset | Deeann M.M. Mikula, Chris Tracy, Mike Holling |
LISA '02 | Holistic Quota Management: The Natural Path to a Better, More Efficient Quota System | Michael Gilfix |
LISA '02 | Application Aware Management of Internet Data Center Software | Alain Mayer |
LISA '02 | Geographically Distributed System for Catastrophic Recovery | Kevin Adams |
LISA '02 | Embracing and Extending Windows 2000 | Jon Finke |
LISA '02 | Stem: The System Administration Enabler | Uri Guttman |
LISA '02 | Pan: A High-Level Configuration Language | Lionel Cons, Piotr Poznanski |
LISA '02 | Why Order Matters: Turing Equivalence in Automated Systems Administration | Steve Traugott, Lance Brown |
LISA '02 | A New Architecture for Managing Enterprise Log Data | Adam Sah |
LISA '02 | MieLog: A Highly Interactive Visual Log Browser Using Information Visualization and Statistical Analysis | Tetsuji Takada, Hideki Koike |
LISA '02 | Process Monitor: Detecting Events That Didn't Happen | |
LISA '02 | An Analysis of RPM Validation Drift | John Hart, Jeffrey D'Amelia |
LISA '02 | RTG: A Scalable SNMP Statistics Architecture for Service Providers | Robert Beverly |
LISA '02 | Environmental Acquisition in Network Management | Mark Logan, Matthias Felleisen, David Blank-Edelman |
LISA '02 | A Simple Way to Estimate the Cost of Downtime | David A. Patterson |
LISA '02 | Defining and Monitoring Service-Level Agreements for Dynamic e-Business | Alexander Keller, Heiko Ludwig |
LISA '02 | HotSwap–Transparent Server Failover for Linux | Noel Burton-Krahn |
LISA '02 | Over-Zealous Security Administrators Are Breaking the Internet | Richard van den Berg, Phil Dibowitz |
LISA '02 | An Approach for Secure Software Installation | V.N. Venkatakrishnan, R. Sekar, T. Kamat, S. Tsipa, Z. Liang |
LISA '02 | Network-based Intrusion Detection–Modeling for a Larger Picture | Atsushi Totsuka, Hidenari Ohwada, Nobuhisa Fujita, Debasish Chakraborty, Glenn Mansfield Keeni, Norio Shiratori |
LISA '02 | Timing the Application of Security Patches for Optimal Uptime | Steve Beattie, Seth Arnold, Crispin Cowan, Perry Wagle, Chris Wright, Adam Shostack |