Papers

Search results

    ConferenceTitleAuthor(s)
    LISA '10Implementing IPv6 at ARINMatt Ryanczak
    LISA '10Internet on the EdgeAndrew Mundy
    LISA '10Managing Vendor Relations: A Case Study of Two HPC Network IssuesLoren Jan Wilson
    LISA '10Using Syslog Message Sequences for Predicting Disk FailuresR. Wesley Featherstun, Errin W. Fulp
    LISA '10Log Analysis and Event Correlation Using Variable Temporal Event Correlator (VTEC)Paul Krizak
    LISA '10Chukwa: A System for Reliable Large-Scale Log CollectionAriel Rabkin, Randy Katz
    LISA '10Empirical Virtual Machine Models for Performance GuaranteesHyong S. Kim
    LISA '10RC2—A Living Lab for Cloud ComputingKyung Dong Ryu, Xiaolan Zhang, Glenn Ammons, Vasanth Bala, Stefan Berger, Dilma M Da Silva, Jim Doran, Frank Franco, Alexei Karve, Herb Lee, James A Lindeman, Ajay Mohindra, Bob Oesterlin, Giovanni Pacifici, Dimitrios Pendarakis, Darrell Reimer, Mariusz Sabath
    LISA '10PeerMon: A Peer-to-Peer Network Monitoring SystemTia Newhall, Jānis Lībeks, Ross Greenwood, Jeff Knerr
    LISA '10Keeping Track of 70,000+ Servers: The Akamai Query SystemJeff Cohen, Thomas Repantis, Sean McDermott, Scott Smith, Joel Wein
    LISA '10Configuration Management for Mac OS X: It's Just Unix, Right?Janet Bass, David Pullman
    LISA '10Anycast as a Load Balancing FeatureFernanda Weiden, Peter Frost
    LISA '10iSCSI SANs Don't Have to SuckDerek J. Balling
    LISA '09TECHNICAL SESSIONS
    LISA '09Pushing Boulders Uphill: The Difficulty of Network Intrusion RecoveryMichael E. Locasto, Matthew Burnside, Darrell Bethea
    LISA '09Two-Person Control Administration: Preventing Administation Faults through DuplicationShaya Potter, Steven M. Bellovin, Jason Nieh
    LISA '09The Water Fountain vs. the Fire Hose: An Examination and Comparison of Two Large Enterprise Mail Service MigrationsCraig Stacey, Max Trefonides, Tim Kendall, Brian Finley
    LISA '09Crossbow Virtual Wire: Network in a BoxSunay Tripathi, Nicolas Droux, Kais Belgaied, Shrikrishna Khare
    LISA '09EVA: A Framework for Network Analysis and Risk AssessmentMelissa Danforth
    LISA '09An Analysis of Network Configuration ArtifactsDavid Plonka, Andres Jaan Tack
    LISA '09Secure Passwords Through Enhanced HashingBenjamin Strahs, Chuan Yue, Haining Wang
    LISA '09SEEdit: SELinux Security Policy Configuration System with Higher Level LanguageYuichi Nakamura, Yoshiki Sameshima, Toshihiro Tabata
    LISA '09An SSH-based Toolkit for User-based Network ServicesJoyita Sikder, Manigandan Radhakrishnan, Jon A. Solworth
    LISA '09Federated Access Control and Workflow Enforcement in Systems ConfigurationBart Vanbrabant, Thomas Delaet, Wouter Joosen
    LISA '09CIMDIFF: Advanced Difference Tracking Tool for CIM Compliant DevicesRamani Routray, Shripad Nadgowda

Pages