Papers

Search results

    ConferenceTitleAuthor(s)
    LISA '09The Water Fountain vs. the Fire Hose: An Examination and Comparison of Two Large Enterprise Mail Service MigrationsCraig Stacey, Max Trefonides, Tim Kendall, Brian Finley
    LISA '08STORM: Simple Tool for Resource ManagementMark Dehus, Dirk Grunwald
    LISA '08IZO: Applications of Large-Window Compression to Virtual Machine ManagementMark A. Smith, Jan Pieper, Daniel Gruhl, Lucas Villa Real
    LISA '08Portable Desktop Applications Based on P2P Transportation and VirtualizationYouhui Zhang, Xiaoling Wang, Liang Hong
    LISA '08Topnet: A Network-aware top(1)Antonis Theocharides, Demetres Antoniades, Michalis Polychronakis, Elias Athanasopoulos, Evangelos P. Markatos
    LISA '08Fast Packet Classification for Snort by Native Compilation of RulesAlok Tongaonkar, Sreenaath Vasudevan, R. Sekar
    LISA '08Sysman: A Virtual File System for Managing ClustersMohammad Banikazemi, David Daly, Bulent Abali
    LISA '08Devolved Management of Distributed Infrastructures with QuattorStephen Childs, Marco Emilio Poleggi, Charles Loomis, Luis Fernando Muñoz Mejías, Michel Jouvin, Ronald Starink, Stijn De Weirdt, Germán Cancio Meliá
    LISA '08Authorisation and Delegation in the Machination Configuration SystemColin Higgs
    LISA '08Designing Tools for System Administrators: An Empirical Test of the Integrated User Satisfaction ModelNicole F. Velasquez, Suzanne Weisband, Alexandra Durcikova
    LISA '08Dynamic Dependencies and Performance ImprovementMarc Chiarini, Alva Couch
    LISA '08Automatic Software Fault Diagnosis by Exploiting Application SignaturesXiaoning Ding, Hai Huang, Yaoping Ruan, Anees Shaikh, Xiaodong Zhang
    LISA '08Petascale System Management ExperiencesRick Bradshaw, Cory Lueninghoener, Andrew Cherry, Susan Coghlan, William Scullin
    LISA '08Rapid Parallel Systems Deployment: Techniques for Overnight ClusteringDonna Cumberland, Randy Herban, Rick Irvine, Michael Shuey, Mathieu Luisier
    LISA '08ENAVis: Enterprise Network Activities VisualizationQi Liao, Andrew Blaich, Aaron Striegel, Douglas Thain
    LISA '08Fast, Cheap, and in Control: Towards Pain-Free Security!Sandeep Bhatt, Cat Okita, Prasad Rao
    LISA '08Concord: A Secure Mobile Data Authorization Framework for Regulatory ComplianceGautam Singaraju, Brent Hoon Kang
    LISA '08Authentication on Untrusted Remote Hosts with Public-Key SudoMatthew Burnside, Mack Lu, Angelos Keromytis
    LISA '07PDA: A Tool for Automated Problem DeterminationHai Huang, Raymond Jennings III, Yaoping Ruan, Ramendra Sahoo, Sambit Sahu, Anees Shaikh
    LISA '07Usher: An Extensible Framework for Managing Clusters of Virtual MachinesMarvin McNett, Diwaker Gupta, Amin Vahdat, Geoffrey M. Voelker
    LISA '07Remote Control: Distributed Application Configuration, Management, and Visualization with PlushJeannie Albrecht, Ryan Braud, Darren Dao, Nikolay Topilski, Christopher Tuttle, Alex C. Snoeren
    LISA '07Everlab: A Production Platform for Research in Network Experimentation and ComputationElliot Jaffe, Danny Bickson, Scott Kirkpatrick
    LISA '07NetFlow; or, How to Know What Your Network Really Did Without Going BrokeMichael W. Lucas
    LISA '07ZFS
    LISA '07Jails, VMs, and SandboxesBill Cheswick

Pages