The SCEAS System
Navigation Menu

Conferences in DBLP

USENIX Large Installation Systems Administration Conference (LISA) (lisa)
2007 (conf/lisa/2007)

  1. Samba. [Citation Graph (, )][DBLP]

  2. The Security Butterfly Effect. [Citation Graph (, )][DBLP]

  3. Ganeti: An Open Source Multi-Node HA Cluster Based on Xen. [Citation Graph (, )][DBLP]

  4. Prince Caspian on Location: Commodity Hardware and Gaffer Tape. [Citation Graph (, )][DBLP]

  5. Datacenter Design Issues. [Citation Graph (, )][DBLP]

  6. Experiences with Scalable Network Operations at Akamai. [Citation Graph (, )][DBLP]

  7. Active Directory Group Policy for UNIX. [Citation Graph (, )][DBLP]

  8. Databases: Hit the Ground, Running? [Citation Graph (, )][DBLP]

  9. Autonomic Computing: Our Hopes, Dreams, and Fears. [Citation Graph (, )][DBLP]

  10. A Service-Oriented Data Grid: Beyond Storage Virtualization. [Citation Graph (, )][DBLP]

  11. Using Throttling and Traffic Shaping to Combat Botnet Spam. [Citation Graph (, )][DBLP]

  12. ZFS. [Citation Graph (, )][DBLP]

  13. No Terabyte Left Behind. [Citation Graph (, )][DBLP]

  14. Should the Root Prompt Require a Road Test? [Citation Graph (, )][DBLP]

  15. LDAP. [Citation Graph (, )][DBLP]

  16. AFS. [Citation Graph (, )][DBLP]

  17. Data Center Design. [Citation Graph (, )][DBLP]

  18. NTP. [Citation Graph (, )][DBLP]

  19. Virtualization/VMware. [Citation Graph (, )][DBLP]

  20. Legal Issues/Forensics. [Citation Graph (, )][DBLP]

  21. SIP/VoIP. [Citation Graph (, )][DBLP]

  22. Autonomic Administration: HAL 9000 Meets Gene Roddenberry. [Citation Graph (, )][DBLP]

  23. Hardening Your Systems Against Litigation. [Citation Graph (, )][DBLP]

  24. ZFS. [Citation Graph (, )][DBLP]

  25. Cookin' at the Keyboard. [Citation Graph (, )][DBLP]

  26. Scaling Production Repairs and QA Operations in a Live Environment. [Citation Graph (, )][DBLP]

  27. Ganeti: An Open Source High-Availability Cluster Based on Xen. [Citation Graph (, )][DBLP]

  28. Deploying Nagios in a Large Enterprise Environment. [Citation Graph (, )][DBLP]

  29. How to Get Your LISA Paper Accepted. [Citation Graph (, )][DBLP]

  30. Data Center Growing Pains. [Citation Graph (, )][DBLP]

  31. Everything You Need to Know About Spam (in 15 Minutes). [Citation Graph (, )][DBLP]

  32. Jails, VMs, and Sandboxes. [Citation Graph (, )][DBLP]

  33. The Biggest Game of Clue You Have Ever Played. [Citation Graph (, )][DBLP]

  34. Eco Computing: Improving Data Center Energy Efficiency. [Citation Graph (, )][DBLP]

  35. The Economic Meltdown of Moore's Law and the Green Data Center. [Citation Graph (, )][DBLP]

  36. UNIX and Microsoft Interoperability. [Citation Graph (, )][DBLP]

  37. Homeless Vikings: BGP Prefix Hijacking and the Spam Wars. [Citation Graph (, )][DBLP]

  38. OpenLDAP: Highlights for 2.4. [Citation Graph (, )][DBLP]

  39. VoIP with NATs and Firewalls. [Citation Graph (, )][DBLP]

  40. The LHC Computing Challenge. [Citation Graph (, )][DBLP]

  41. NetFlow; or, How to Know What Your Network Really Did Without Going Broke. [Citation Graph (, )][DBLP]

  42. Scaling Production Repairs and QA Operations in a Live Environment. [Citation Graph (, )][DBLP]

  43. Beyond NAC: What's Your Next Step? [Citation Graph (, )][DBLP]

  44. Who's the Boss? Autonomics and New-Fangled Security Gizmos with Minds of Their Own. [Citation Graph (, )][DBLP]

  45. Ruby: Productivity or Penance?. [Citation Graph (, )][DBLP]

  46. PolicyVis: Firewall Security Policy Visualization and Inspection. [Citation Graph (, )][DBLP]

  47. Inferring Higher Level Policies from Firewall Rules. [Citation Graph (, )][DBLP]

  48. Assisted Firewall Policy Repair Using Examples and History. [Citation Graph (, )][DBLP]

  49. NetADHICT: A Tool for Understanding Network Traffic. [Citation Graph (, )][DBLP]

  50. CAMP: A Common API for Measuring Performance. [Citation Graph (, )][DBLP]

  51. Application Buffer-Cache Management for Performance: Running the World's Largest MRTG. [Citation Graph (, )][DBLP]

  52. Stork: Package Management for Distributed VM Environments. [Citation Graph (, )][DBLP]

  53. Decision Support for Virtual Machine Re-Provisioning in Production Environments. [Citation Graph (, )][DBLP]

  54. OS Circular: Internet Client for Reference. [Citation Graph (, )][DBLP]

  55. Secure Isolation of Untrusted Legacy Applications. [Citation Graph (, )][DBLP]

  56. Policy-Driven Management of Data Sets. [Citation Graph (, )][DBLP]

  57. ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems. [Citation Graph (, )][DBLP]

  58. PDA: A Tool for Automated Problem Determination. [Citation Graph (, )][DBLP]

  59. Usher: An Extensible Framework for Managing Clusters of Virtual Machines. [Citation Graph (, )][DBLP]

  60. Remote Control: Distributed Application Configuration, Management, and Visualization with Plush. [Citation Graph (, )][DBLP]

  61. Everlab: A Production Platform for Research in Network Experimentation and Computation. [Citation Graph (, )][DBLP]

  62. Master Education Programmes in Network and System Administration. [Citation Graph (, )][DBLP]

  63. On Designing and Deploying Internet-Scale Services. [Citation Graph (, )][DBLP]

  64. RepuScore: Collaborative Reputation Management Framework for Email Infrastructure. [Citation Graph (, )][DBLP]

  65. Moobi: A Thin Server Management System Using BitTorrent. [Citation Graph (, )][DBLP]

  66. PoDIM: A Language for High-Level Configuration Management. [Citation Graph (, )][DBLP]

  67. Network Patterns in Cfengine and Scalable Data Aggregation. [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002