Search results

    USENIX Mach III SymposiumUnix File Access and Caching in a Multicomputer EnvironmentPaul J. Roy
    USENIX Mach III SymposiumIn-Kernel Servers on Mach 3.0: Implementation and PerformanceJay Lepreau, Mike Hibler, Bryan Ford, Jeffrey Law, Douglas Orr
    USENIX Mach III SymposiumUsing the Mach Communication Primitives in X11Michael Ginsberg, Brian N. Bershad, Robert V. Baron
    USENIX Mach III SymposiumUsing Continuations to Build a User-Level Threads LibraryRandall Dean
    USENIX Mach III SymposiumReal Memory MachPhilippe Bernadat, David Black
    USENIX Mach III SymposiumMIKE: A Distributed object-oriented programming platform on top of the Mach micro-kernelMiguel Castro, Nuno Neves, Pedro Trancuso, Pedro Sousa
    USENIX Mach III SymposiumSprite on MachMichael D. Kupfer
    USENIX Winter 1993 ConferencePhoneStation, Moving the Telephone onto the Virtual DesktopStephen A. Uhler
    USENIX Winter 1993 ConferenceThe BSD Packet Filter: A New Architecture for User-level Packet CaptureSteven McCanne, Van Jacobson
    USENIX Winter 1993 ConferenceAn Implementation of a Log-Structured File System for UNIXMargo Seltzer, Keith Bostic, Marshall Kirk McKusick, Carl Staelin
    USENIX Winter 1993 ConferenceThe Nachos Instructional Operating SystemWayne A. Christopher, Steven J. Procter, Thomas E. Anderson
    UNIX Security '92The Greatest Cracker-Case in Denmark: The Detecting, Tracing, and Arresting of Two International CrackersJörgen Bo Madsen
    UNIX Security '92Experiences of Internet Security in ItalyAlessandro Berni, Paolo Franchi, Joy Marino
    UNIX Security '92An Internet GatekeeperHerve Schauer, Christophe Wolfhugel
    UNIX Security '92Restricting Network Access to System Daemons Under SunOSWilliam LeFebvre
    UNIX Security '92There Be DragonsSteve Bellovin
    UNIX Security '92An Internet GatekeeperHerve Schauer, Christophe Wolfhugel
    UNIX Security '92Network (In)Security Through IP Packet FilteringD. Brent Chapman
    UNIX Security '92SOCKSDavid Koblas, Michelle R. Koblas
    UNIX Security '92TCP Wrapper: Network Monitoring, Access Control, and Booby TrapsWietse Venema
    UNIX Security '92Centralized System Monitoring with SwatchStephen E. Hansen, E. Todd Atkins
    UNIX Security '92Security Aspects of a UNIX PEM ImplementationJames M. Galvin, David M. Balenson
    UNIX Security '92Introduction to the Shadow Password SuiteJohn F. Haugh II
    UNIX Security '92Giving Customers the Tools to Protect ThemselvesShabbir J. Safdar
    USENIX Summer 1992 Technical ConferenceImplementing Lightweight ThreadsD. Stein, D. Shah