The SCEAS System
Navigation Menu

Conferences in DBLP

USENIX Large Installation Systems Administration Conference (LISA) (lisa)
2000 (conf/lisa/2000)

  1. Edward W. Felten
    Dr. Felton Goes to Washington: A Personal View of the Microsoft Antitrust Case. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:- [Conf]
  2. Barb Dijker
    SAGE Update. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:- [Conf]
  3. Leif Hedstrom
    Integrating LDAP in a Heterogeneous Environment. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:- [Conf]
  4. Alexander Kent, James Clifford
    Network Information Management and Distribution in a Heterogeneous and Decentralized Enterprise Environment. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:- [Conf]
  5. Brad Knowles
    The Design and Implementation of Highly Scalable Email Systems. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:- [Conf]
  6. Steven Levine
    Why the Documentation Sucks and What You Can Do About It. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:- [Conf]
  7. Jon Rochlis
    How Not to Get Fleeced with Employee Stock Options. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:- [Conf]
  8. W. Curtis Preston
    SANs--From A To Reality. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:- [Conf]
  9. Bill Cheswick
    Mapping Corporate Intranets and Internets. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:- [Conf]
  10. Lorette Cheswick
    The Digital House. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:- [Conf]
  11. Michael W. Shaffer
    A Linux Appliance Construction Setv. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:- [Conf]
  12. Steve Romig
    Experiences with Incident Response at The Ohio State University. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:- [Conf]
  13. Mark Burgess
    Theoretical System Administration. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:1-13 [Conf]
  14. Alva L. Couch
    An Expectant Chat About Script Maturity. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:15-28 [Conf]
  15. Jon Finke
    An Improved Approach for Generating Configuration Files from a Database. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:29-38 [Conf]
  16. Robert Beck, Steve Holstead
    FOKSTRAUT and Samba--Dealing with Authentication and Performance Issues on a Large-scale Samba Service. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:39-42 [Conf]
  17. Robert Drzyzgula
    Designing a Data Center Instrumentation System. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:43-58 [Conf]
  18. Karl Larson, Todd Stansell
    Improving Availability in VERITAS Environments. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:59-66 [Conf]
  19. Douglas Hughes
    User-Centric Account Management with Heterogeneous Password Changing. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:67-76 [Conf]
  20. Matt Curtin, Sandy Farrar, Tami King
    Pelendur: Steward of the Sysadmin. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:77-83 [Conf]
  21. Rocky Bernstein
    xps--Dynamic Process Tree Watching Under X. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:95-100 [Conf]
  22. Matthew Bing, Carl Erickson
    Extending UNIX System Logging with SHARP. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:101-107 [Conf]
  23. Michael Gilfix, Alva L. Couch
    Peep (The Network Auralizer): Monitoring Your Network with Sound. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:109-117 [Conf]
  24. John Sellens
    Thresh--A Data-Directed SNMP Threshold Poller. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:119-130 [Conf]
  25. Jarra Voleynik
    eEMU: A Practical Tool and Language for System Monitoring and Event Management. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:131-137 [Conf]
  26. Jake D. Brutlag
    Aberrant Behavior Detection in Time Series for Network Monitoring. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:139-146 [Conf]
  27. Robert Osterlund
    PIKT: Problem Informant/Killer Tool. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:147-165 [Conf]
  28. Allan Miller, Alex Donnini
    Relieving the Burden of System Administration Through Support Automation. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:167-180 [Conf]
  29. Alexei Novikov, Martin Hamilton
    FTP Mirror Tracker: A Few Steps Towards URN. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:181-186 [Conf]
  30. Kyle Oppenheim, Patrick McCormick
    Deployme: Tellme's Package Management and Deployment System. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:187-196 [Conf]
  31. Christopher Hemmerich
    Automating Request-based Software Distribution. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:197-205 [Conf]
  32. David Ressman, John Valdés
    Use of Cfengine for Automated, Multi-Platform Software and Patch Distribution. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:207-218 [Conf]
  33. Lee "Leonardo" Amatangelo
    Unleashing the Power of JumpStart: A New Technique for Disaster Recovery, Cloning, or Snapshotting a Solaris System. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:219-228 [Conf]
  34. Rajeev Agrawala, Rob Fulmer, Shaun Erickson
    Automating Dual Boot (Linux and NT) Installations. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:245-254 [Conf]
  35. Jon T. Meek
    Wide Area Network Packet Capture and Analysis. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:255-264 [Conf]
  36. P. Krishnan, Tejas Naik, Ganesan Ramu, Roshan Sequeira
    Sequencing of Configuration Operations for IP Networks. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:265-274 [Conf]
  37. Ellen L. Mitchell, Eric Nelson, David Hess
    ND: A Comprehensive Network Administration and Analysis Tool. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:275-283 [Conf]
  38. Bill Nickless, John-Paul Navarro, Linda Winkler
    Combining Cisco NetFlow Exports with Relational Database Technology for Usage Statistics, Intrusion Detection, and Network Forensics. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:285-290 [Conf]
  39. Steve Romig, Mark Fullmer, Ron Luman
    The OSU Flow-tools Package and CISCO NetFlow Logs. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:291-303 [Conf]
  40. David Plonka
    FlowScan: A Network Traffic Flow Reporting and Visualization Tool. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:305-317 [Conf]
  41. Hal Burch, Bill Cheswick
    Tracing Anonymous Packets to Their Approximate Source. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:319-327 [Conf]
  42. Sven Dietrich, Neil Long, David Dittrich
    Analyzing Distributed Denial of Service Tools: The Shaft Case. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:329-339 [Conf]
  43. Jean Chouanard
    YASSP! A Tool for Improving Solaris Security. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:341-354 [Conf]
  44. Crispin Cowan, Steve Beattie, Greg Kroah-Hartman, Calton Pu, Perry Wagle, Virgil D. Gligor
    SubDomain: Parsimonious Server Security. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:355-368 [Conf]
  45. Bruce Barnett
    NOOSE - Networked Object-Oriented Security Examiner. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:369-378 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002