Search results

    LISA '96PC Administration Tools: Using Linux to Manage Personal ComputersJim Trocki
    LISA '96Abstract Yourself With ModulesJohn L. Furlani, Peter W. Osel
    LISA '96SLINK: Simple, Effective Filesystem Maintenance Abstractions for Community-Based AdministrationAlva L. Couch
    LISA '96Managing and Distributing Application SoftwarePh. Defert, M. Goossens, O. Le Moigne, A. Peyrat, I. Reguero, E. Fernandez
    LISA '96A New Twist on Teaching System AdministrationRaven Tompkins
    LISA '96Institute White Pages as a System Administration ProblemJon Finke
    LISA '96New Fangled Phone Systems Pose New Challenges for System AdministratorsSnoopy
    LISA '96Priv: Secure and Flexible Privileged Access DisseminationBrian C. Hill
    LISA '96The Igor System Administration ToolClinton Pierce
    LISA '96Centralized Administration of Distributed FirewallsMark Miller, Joe Morris
    LISA '96Shuse: Multi-Host Account AdministrationHenry Spencer
    LISA '96The Design and Implementation of a Network Account Management SystemJ. Archer Harris, Gregory Gingerich
    LISA '96UNIX Host Administration in a Hererogeneous Distributed Computing EnvironmentGregory S. Thomas, James O. Schroeder, Merrilee E. Orcutt, Desiree C. Johnson, Jeffrey T. Simmelink, John P. Moore
    LISA '96Visualizing Huge Tracefiles with XscalAlva L. Couch
    LISA '96Using Visualization in System and Network AdministrationDoug Hughes
    LISA '96How to Avoid Learning Expect -or- Automating Automating Interactive ProgramsDon Libes
    LISA '96An LPD for the 90sMark Fletcher
    LISA '96RUST: Managing Problem Reports and To-Do ListsCraig Ruefenacht
    LISA '96Renumbering: Threat or MenaceEliot Lear, Jennifer Katinsky, Jeff Coffin, Diane Tharp
    LISA '96OC3MON: Flexible, Affordable, High Performance Staistics CollectionJoel Apisdorf, k claffy (NLANR), Kevin Thompson, Rick Wilder
    LISA '96IP Multiplexing by Transparent Port-Address TranslatorHeon Y. Yeom, Jungsoo Ha, Ilhwan Kim
    LISA '96How to Get There From Here: Scaling the Enterprise-Wide Mail InfrastructureMichael Grubb
    LISA '96Automatic and Reliable Elimination of E-mail Loops Based on Statistical AnalysisE. Solana, V. Baggiolini, M. Ramluckun, J. Harms
    USENIX Security '96A Framework for Building an Electronic Currency SystemLei Tang
    USENIX Security '96A Secure Environment for Untrusted Helper ApplicationsIan Goldberg, David Wagner, Randi Thomas, Eric A. Brewer