LISA '09 | The Water Fountain vs. the Fire Hose: An Examination and Comparison of Two Large Enterprise Mail Service Migrations | Craig Stacey, Max Trefonides, Tim Kendall, Brian Finley |
LISA '08 | STORM: Simple Tool for Resource Management | Mark Dehus, Dirk Grunwald |
LISA '08 | IZO: Applications of Large-Window Compression to Virtual Machine Management | Mark A. Smith, Jan Pieper, Daniel Gruhl, Lucas Villa Real |
LISA '08 | Portable Desktop Applications Based on P2P Transportation and Virtualization | Youhui Zhang, Xiaoling Wang, Liang Hong |
LISA '08 | Topnet: A Network-aware top(1) | Antonis Theocharides, Demetres Antoniades, Michalis Polychronakis, Elias Athanasopoulos, Evangelos P. Markatos |
LISA '08 | Fast Packet Classification for Snort by Native Compilation of Rules | Alok Tongaonkar, Sreenaath Vasudevan, R. Sekar |
LISA '08 | Sysman: A Virtual File System for Managing Clusters | Mohammad Banikazemi, David Daly, Bulent Abali |
LISA '08 | Devolved Management of Distributed Infrastructures with Quattor | Stephen Childs, Marco Emilio Poleggi, Charles Loomis, Luis Fernando Muñoz Mejías, Michel Jouvin, Ronald Starink, Stijn De Weirdt, Germán Cancio Meliá |
LISA '08 | Authorisation and Delegation in the Machination Configuration System | Colin Higgs |
LISA '08 | Designing Tools for System Administrators: An Empirical Test of the Integrated User Satisfaction Model | Nicole F. Velasquez, Suzanne Weisband, Alexandra Durcikova |
LISA '08 | Dynamic Dependencies and Performance Improvement | Marc Chiarini, Alva Couch |
LISA '08 | Automatic Software Fault Diagnosis by Exploiting Application Signatures | Xiaoning Ding, Hai Huang, Yaoping Ruan, Anees Shaikh, Xiaodong Zhang |
LISA '08 | Petascale System Management Experiences | Rick Bradshaw, Cory Lueninghoener, Andrew Cherry, Susan Coghlan, William Scullin |
LISA '08 | Rapid Parallel Systems Deployment: Techniques for Overnight Clustering | Donna Cumberland, Randy Herban, Rick Irvine, Michael Shuey, Mathieu Luisier |
LISA '08 | ENAVis: Enterprise Network Activities Visualization | Qi Liao, Andrew Blaich, Aaron Striegel, Douglas Thain |
LISA '08 | Fast, Cheap, and in Control: Towards Pain-Free Security! | Sandeep Bhatt, Cat Okita, Prasad Rao |
LISA '08 | Concord: A Secure Mobile Data Authorization Framework for Regulatory Compliance | Gautam Singaraju, Brent Hoon Kang |
LISA '08 | Authentication on Untrusted Remote Hosts with Public-Key Sudo | Matthew Burnside, Mack Lu, Angelos Keromytis |
LISA '07 | PDA: A Tool for Automated Problem Determination | Hai Huang, Raymond Jennings III, Yaoping Ruan, Ramendra Sahoo, Sambit Sahu, Anees Shaikh |
LISA '07 | Usher: An Extensible Framework for Managing Clusters of Virtual Machines | Marvin McNett, Diwaker Gupta, Amin Vahdat, Geoffrey M. Voelker |
LISA '07 | Remote Control: Distributed Application Configuration, Management, and Visualization with Plush | Jeannie Albrecht, Ryan Braud, Darren Dao, Nikolay Topilski, Christopher Tuttle, Alex C. Snoeren |
LISA '07 | Everlab: A Production Platform for Research in Network Experimentation and Computation | Elliot Jaffe, Danny Bickson, Scott Kirkpatrick |
LISA '07 | NetFlow; or, How to Know What Your Network Really Did Without Going Broke | Michael W. Lucas |
LISA '07 | ZFS | |
LISA '07 | Jails, VMs, and Sandboxes | Bill Cheswick |