Papers

Search results

    ConferenceTitleAuthor(s)
    LISA '97A Large-Scale Data Warehouse Application Case StudyDan Pollack
    LISA '97SHUSE at TwoHenry Spencer
    LISA '97A Web-Based Backup/Restore Method for Intel-Based PCsTyler Barnett, Kyle McPeek, Larry S. Lile, Ray Hyatt, Jr.
    LISA '97Managing PC Operating Systems With A Revision Control SystemGottfried Rudorfer
    LISA '97BAL: A Tool to Synchronize Document Collections Between ComputersJuergen Christoffel
    LISA '97Increased Server Availibility Through Failover CapabilityMichael R. Barber
    LISA '97The Cyclic News Filesystem: Getting INN To Do More With LessScott Lystig Fritchie
    LISA '97Adaptive Locks for Frequently Scheduled Tasks With Unpredictable RuntimesMark Burgess, Demosthenes Skipitaris
    LISA '97Creating the Network for Lucent Bell Labs Research Tom Limoncelli, Thomas Reingold, Ravi Narayan, Ralph Loura
    LISA '97Pinpointing System Performance IssuesDouglas L. Urner
    LISA '97Chaos Out of Order: A Simple, Scalable File Distribution Facility For 'Intentionally Heterogeneous' NetworksAlva Couch
    LISA '97An Analysis of UNIX System ConfigurationRemy Evard
    LISA '97Tuning Sendmail for Large Mailing ListsRob Kolstad
    LISA '97Selectively Rejecting Spam Using Sendmail check_RulesetsRobert Harker
    LISA '97A Better Email BouncerRich Holland
    USENIX Security '96A Secure Environment for Untrusted Helper ApplicationsIan Goldberg, David Wagner, Randi Thomas, Eric A. Brewer
    USENIX Security '96Confining Root Programs with Domain and Type EnforcementKenneth M. Walker, Daniel F. Sterne, M. Lee Badger, Michael J. Petkac, David L. Sherman, Karen A. Oostendorp
    USENIX Security '96Dual-workfactor Encrypted Key Exchange: Efficiently Preventing Password Chaining and Dictionary AttacksBarry Jaspan
    USENIX Security '96A Revocable Backup SystemDan Boneh, Richard J. Lipton
    USENIX Security '96A Framework for Building an Electronic Currency SystemLei Tang
    USENIX Security '96Chrg-http: A Tool for Micropayments on the World Wide WebLei Tang, Steve Low
    USENIX Security '96Building Systems That Flexibly Download Executable ContentTrent Jaeger, Atul Prakash, Avi Rubin
    USENIX Security '96Public Key Distribution with Secure DNSJames M. Galvin
    USENIX Security '96Compliance Defects in Public Key CryptographyDon Davis
    USENIX Security '96Texas A&M University Anarchistic Key Authorization (AKA)David Safford, Douglas Schales, David Hess

    Pages