Papers

Search results

    ConferenceTitleAuthor(s)
    LISA '09Transparent Mobile Storage Protection in Trusted Virtual DomainsLuigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Marcel Winandy
    LISA '08Designing Tools for System Administrators: An Empirical Test of the Integrated User Satisfaction ModelNicole F. Velasquez, Suzanne Weisband, Alexandra Durcikova
    LISA '08Dynamic Dependencies and Performance ImprovementMarc Chiarini, Alva Couch
    LISA '08Automatic Software Fault Diagnosis by Exploiting Application SignaturesXiaoning Ding, Hai Huang, Yaoping Ruan, Anees Shaikh, Xiaodong Zhang
    LISA '08Petascale System Management ExperiencesRick Bradshaw, Cory Lueninghoener, Andrew Cherry, Susan Coghlan, William Scullin
    LISA '08Rapid Parallel Systems Deployment: Techniques for Overnight ClusteringDonna Cumberland, Randy Herban, Rick Irvine, Michael Shuey, Mathieu Luisier
    LISA '08ENAVis: Enterprise Network Activities VisualizationQi Liao, Andrew Blaich, Aaron Striegel, Douglas Thain
    LISA '08Fast, Cheap, and in Control: Towards Pain-Free Security!Sandeep Bhatt, Cat Okita, Prasad Rao
    LISA '08Concord: A Secure Mobile Data Authorization Framework for Regulatory ComplianceGautam Singaraju, Brent Hoon Kang
    LISA '08Authentication on Untrusted Remote Hosts with Public-Key SudoMatthew Burnside, Mack Lu, Angelos Keromytis
    LISA '08STORM: Simple Tool for Resource ManagementMark Dehus, Dirk Grunwald
    LISA '08IZO: Applications of Large-Window Compression to Virtual Machine ManagementMark A. Smith, Jan Pieper, Daniel Gruhl, Lucas Villa Real
    LISA '08Portable Desktop Applications Based on P2P Transportation and VirtualizationYouhui Zhang, Xiaoling Wang, Liang Hong
    LISA '08Topnet: A Network-aware top(1)Antonis Theocharides, Demetres Antoniades, Michalis Polychronakis, Elias Athanasopoulos, Evangelos P. Markatos
    LISA '08Fast Packet Classification for Snort by Native Compilation of RulesAlok Tongaonkar, Sreenaath Vasudevan, R. Sekar
    LISA '08Sysman: A Virtual File System for Managing ClustersMohammad Banikazemi, David Daly, Bulent Abali
    LISA '08Devolved Management of Distributed Infrastructures with QuattorStephen Childs, Marco Emilio Poleggi, Charles Loomis, Luis Fernando Muñoz Mejías, Michel Jouvin, Ronald Starink, Stijn De Weirdt, Germán Cancio Meliá
    LISA '08Authorisation and Delegation in the Machination Configuration SystemColin Higgs
    LISA '07PolicyVis: Firewall Security Policy Visualization and InspectionTung Tran, Ehab Al-Shaer, Raouf Boutaba
    LISA '07NetADHICT: A Tool for Understanding Network TrafficHajime Inoue, Dana Jansens, Abdulrahman Hijazi, Anil Somayaji
    LISA '07Databases: Hit the Ground, Running?John Sellens
    LISA '07Everything You Need to Know About Spam (in 15 Minutes)Chris St. Pierre
    LISA '07Datacenter Design IssuesDoug Hughes
    LISA '07Active Directory Group Policy for UNIXGerald Carter
    LISA '07Autonomic Computing: Our Hopes, Dreams, and FearsGlenn Fink

Pages