The SCEAS System
Navigation Menu

Conferences in DBLP

USENIX Large Installation Systems Administration Conference (LISA) (lisa)
2004 (conf/lisa/2004)

  1. Chad Verbowski, John Dunagan, Brad Daniels, Yi-Min Wang
    Experience Talk: FDR: A Flight Data Recorder Using Black-BoxAnalysis of Persistent State Changes for Managing Change and Configuration. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:- [Conf]
  2. Simson L. Garfinkel
    Used Disk Drives. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:- [Conf]
  3. Howard Ginsberg
    Keynote Address: Going Digital at CNN. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:- [Conf]
  4. Joshua Goodman
    Filtering, Stamping, Blocking, Anti-Spoofing: How to Stop the Spam. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:- [Conf]
  5. John Graham-Cumming
    What Spammers Are Doing to Get Around Bayesian Filtering & What We Can Expect for the Future. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:- [Conf]
  6. Trey Harris
    A New Approach to Scripting. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:- [Conf]
  7. Douglas Hughes
    Lessons Learned Reimplementing an ISP Mail Service Infrastructure to Cope with Spam. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:- [Conf]
  8. Douglas Hughes, Darren Dunham
    RAID/HA/SAN (with a Heavy Dose of Veritas). [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:- [Conf]
  9. Daniel V. Klein
    Flying Linux. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:- [Conf]
  10. John Nicholson
    What Information Security Laws Mean For You. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:- [Conf]
  11. Jim Nisbet
    The Security Role of Linguistic Content Analysis. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:- [Conf]
  12. David W. Parter
    Professional Growth. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:- [Conf]
  13. Brian Pawlowski
    NFS, Its Applications and Future. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:- [Conf]
  14. Lisa Phillips, Brad Fitzpatrick
    LiveJournal's Backend and memcached: Past, Present, and Future. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:- [Conf]
  15. W. Curtis Preston
    Storage Security: You're Fooling Yourself. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:- [Conf]
  16. W. Curtis Preston
    Backups. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:- [Conf]
  17. Peter H. Salus
    The Administrator, Then and Now. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:- [Conf]
  18. Robert Sparks
    VoIP and IETF Standards. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:- [Conf]
  19. Bdale Garbee
    Linux. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:- [Conf]
  20. Mark Burgess
    Anomaly Detection: Whatever Happened to Computer Immunology? [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:- [Conf]
  21. Michael Bartosh
    Mac OS X. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:- [Conf]
  22. Gene Kim
    Configuration Management. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:- [Conf]
  23. Gerald Carter
    Samba. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:- [Conf]
  24. Alva L. Couch
    What Is This Thing Called System Configuration? [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:- [Conf]
  25. Michael Ciavarella
    Documentation. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:- [Conf]
  26. Esther Filderman, Ken McInnis
    Grid Computing: Just What Is It and Why Should I Care? [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:- [Conf]
  27. Esther Filderman
    AFS. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:- [Conf]
  28. Bill Van Etten
    A System Administrator's Introduction to Bioinformatics. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:- [Conf]
  29. Keri Carpenter, Thomas A. Limoncelli
    Lessons Learned from Howard Dean's Digital Campaign. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:- [Conf]
  30. David N. Blank-Edelman
    System Administration and Sex Therapy: The Gentle Art of Debugging. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:- [Conf]
  31. Jeremy Blosser, David Josephsen
    Scalable Centralized Bayesian Spam Mitigation with Bogofilter (Awarded Best Paper!). [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:1-20 [Conf]
  32. Nils Einar Eide, Andreas N. Blaafadt, Baard H. Rehn Johansen, Frode Eika Sandnes
    DIGIMIMIR: A Tool for Rapid Situation Analysis of Helpdesk and Support Email. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:21-32 [Conf]
  33. Yi-Min Wang, Roussi Roussev, Chad Verbowski, Aaron Johnson, Ming-Wei Wu, Yennun Huang, Sy-Yen Kuo
    Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:33-46 [Conf]
  34. Sufatrio, Roland H. C. Yap, Liming Zhong
    A Machine-Oriented Vulnerability Database for Automated Vulnerability Detection and Processing. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:47-58 [Conf]
  35. Axelle Apvrille, David Gordon, Serge E. Hallyn, Makan Pourzandi, Vincent Roy
    DigSig: Runtime Authentication of Binaries at Kernel Level. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:59-66 [Conf]
  36. Swapnil Patil, Anand Kashyap, Gopalan Sivathanu, Erez Zadok
    I3FS: An In-Kernel Integrity Checker and Intrusion Detection File System. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:67-78 [Conf]
  37. Eelco Dolstra, Merijn de Jonge, Eelco Visser
    Nix: A Safe and Policy-Free System for Software Deployment. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:79-92 [Conf]
  38. William LeFebvre, David Snyder
    Auto-configuration by File Construction: Configuration Management with newfig. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:93-104 [Conf]
  39. Sergei Mikhailov, Jonathan Robert Stanton
    AIS: A Fast, Disk Space Efficient "Adaptable Installation System" Supporting Multitudes of Diverse Software Configurations. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:105-112 [Conf]
  40. Christopher J. Tengi, James M. Roberts, Joseph R. Crouthamel, Chris M. Miller, Christopher M. Sanchez
    autoMAC: A Tool for Automating Network Moves, Adds, and Changes. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:113-120 [Conf]
  41. Carrie Gates, Michael Collins, Michael Duggan, Andrew Kompanek, Mark Thomas
    More Netflow Tools for Performance and Security. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:121-132 [Conf]
  42. John P. Rouillard
    Real-time Log File Analysis Using the Simple Event Correlator (SEC). [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:133-150 [Conf]
  43. Ni Lao, Ji-Rong Wen, Wei-Ying Ma, Yi-Min Wang
    Combining High Level Symptom Descriptions and Low Level State Information for Configuration Fault Diagnosis. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:151-158 [Conf]
  44. Ted Bonkenburg, Dejan Diklic, Benjamin Reed, Mark Smith, Michael Vanover, Steve Welch, Roger Williams
    LifeBoat: An Autonomic Backup and Restore Solution. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:159-170 [Conf]
  45. Joseph R. Crouthamel, James M. Roberts, Christopher M. Sanchez, Christopher J. Tengi
    PatchMaker: A Physical Network Patch Manager Tool. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:171-176 [Conf]
  46. Gregory Pluta, Larry Brumbaugh, William Yurcik, Joseph Tucek
    Who Moved My Data? A Backup Tracking System for Dynamic Workstation Environments. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:177-186 [Conf]
  47. Marc Dougherty
    Making a Game of Network Security. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:187-194 [Conf]
  48. Paul Brett, Mic Bowman, Jeff Sedayao, Robert Adams, Rob C. Knauerhase, Aaron Klingaman
    Securing the PlanetLab Distributed Testbed: How to Manage Security in an Environment with No Firewalls, with All Users Having Root, and No Direct Physical Control of Any System. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:195-202 [Conf]
  49. Robert A. Napier
    Secure Automation: Achieving Least Privilege with SSH, Sudo, and Suid. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:203-212 [Conf]
  50. Steven Schwartzberg, Alva L. Couch
    Experience in Implementing an HTTP Service Closure. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:213-230 [Conf]
  51. Jon Finke
    Meta Change Queue: Tracking Changes to People, Places, and Things. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:231-240 [Conf]
  52. Daniel Price, Andrew Tucker
    Solaris Zones: Operating System Support for Consolidating Commercial Workloads. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:241-254 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002