LISA '09 | Transparent Mobile Storage Protection in Trusted Virtual Domains | Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Marcel Winandy |
LISA '08 | Designing Tools for System Administrators: An Empirical Test of the Integrated User Satisfaction Model | Nicole F. Velasquez, Suzanne Weisband, Alexandra Durcikova |
LISA '08 | Dynamic Dependencies and Performance Improvement | Marc Chiarini, Alva Couch |
LISA '08 | Automatic Software Fault Diagnosis by Exploiting Application Signatures | Xiaoning Ding, Hai Huang, Yaoping Ruan, Anees Shaikh, Xiaodong Zhang |
LISA '08 | Petascale System Management Experiences | Rick Bradshaw, Cory Lueninghoener, Andrew Cherry, Susan Coghlan, William Scullin |
LISA '08 | Rapid Parallel Systems Deployment: Techniques for Overnight Clustering | Donna Cumberland, Randy Herban, Rick Irvine, Michael Shuey, Mathieu Luisier |
LISA '08 | ENAVis: Enterprise Network Activities Visualization | Qi Liao, Andrew Blaich, Aaron Striegel, Douglas Thain |
LISA '08 | Fast, Cheap, and in Control: Towards Pain-Free Security! | Sandeep Bhatt, Cat Okita, Prasad Rao |
LISA '08 | Concord: A Secure Mobile Data Authorization Framework for Regulatory Compliance | Gautam Singaraju, Brent Hoon Kang |
LISA '08 | Authentication on Untrusted Remote Hosts with Public-Key Sudo | Matthew Burnside, Mack Lu, Angelos Keromytis |
LISA '08 | STORM: Simple Tool for Resource Management | Mark Dehus, Dirk Grunwald |
LISA '08 | IZO: Applications of Large-Window Compression to Virtual Machine Management | Mark A. Smith, Jan Pieper, Daniel Gruhl, Lucas Villa Real |
LISA '08 | Portable Desktop Applications Based on P2P Transportation and Virtualization | Youhui Zhang, Xiaoling Wang, Liang Hong |
LISA '08 | Topnet: A Network-aware top(1) | Antonis Theocharides, Demetres Antoniades, Michalis Polychronakis, Elias Athanasopoulos, Evangelos P. Markatos |
LISA '08 | Fast Packet Classification for Snort by Native Compilation of Rules | Alok Tongaonkar, Sreenaath Vasudevan, R. Sekar |
LISA '08 | Sysman: A Virtual File System for Managing Clusters | Mohammad Banikazemi, David Daly, Bulent Abali |
LISA '08 | Devolved Management of Distributed Infrastructures with Quattor | Stephen Childs, Marco Emilio Poleggi, Charles Loomis, Luis Fernando Muñoz Mejías, Michel Jouvin, Ronald Starink, Stijn De Weirdt, Germán Cancio Meliá |
LISA '08 | Authorisation and Delegation in the Machination Configuration System | Colin Higgs |
LISA '07 | PolicyVis: Firewall Security Policy Visualization and Inspection | Tung Tran, Ehab Al-Shaer, Raouf Boutaba |
LISA '07 | NetADHICT: A Tool for Understanding Network Traffic | Hajime Inoue, Dana Jansens, Abdulrahman Hijazi, Anil Somayaji |
LISA '07 | Databases: Hit the Ground, Running? | John Sellens |
LISA '07 | Everything You Need to Know About Spam (in 15 Minutes) | Chris St. Pierre |
LISA '07 | Datacenter Design Issues | Doug Hughes |
LISA '07 | Active Directory Group Policy for UNIX | Gerald Carter |
LISA '07 | Autonomic Computing: Our Hopes, Dreams, and Fears | Glenn Fink |