Conferences in DBLP
Chad Verbowski , John Dunagan , Brad Daniels , Yi-Min Wang Experience Talk: FDR: A Flight Data Recorder Using Black-BoxAnalysis of Persistent State Changes for Managing Change and Configuration. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:- [Conf ] Simson L. Garfinkel Used Disk Drives. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:- [Conf ] Howard Ginsberg Keynote Address: Going Digital at CNN. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:- [Conf ] Joshua Goodman Filtering, Stamping, Blocking, Anti-Spoofing: How to Stop the Spam. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:- [Conf ] John Graham-Cumming What Spammers Are Doing to Get Around Bayesian Filtering & What We Can Expect for the Future. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:- [Conf ] Trey Harris A New Approach to Scripting. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:- [Conf ] Douglas Hughes Lessons Learned Reimplementing an ISP Mail Service Infrastructure to Cope with Spam. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:- [Conf ] Douglas Hughes , Darren Dunham RAID/HA/SAN (with a Heavy Dose of Veritas). [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:- [Conf ] Daniel V. Klein Flying Linux. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:- [Conf ] John Nicholson What Information Security Laws Mean For You. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:- [Conf ] Jim Nisbet The Security Role of Linguistic Content Analysis. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:- [Conf ] David W. Parter Professional Growth. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:- [Conf ] Brian Pawlowski NFS, Its Applications and Future. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:- [Conf ] Lisa Phillips , Brad Fitzpatrick LiveJournal's Backend and memcached: Past, Present, and Future. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:- [Conf ] W. Curtis Preston Storage Security: You're Fooling Yourself. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:- [Conf ] W. Curtis Preston Backups. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:- [Conf ] Peter H. Salus The Administrator, Then and Now. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:- [Conf ] Robert Sparks VoIP and IETF Standards. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:- [Conf ] Bdale Garbee Linux. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:- [Conf ] Mark Burgess Anomaly Detection: Whatever Happened to Computer Immunology? [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:- [Conf ] Michael Bartosh Mac OS X. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:- [Conf ] Gene Kim Configuration Management. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:- [Conf ] Gerald Carter Samba. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:- [Conf ] Alva L. Couch What Is This Thing Called System Configuration? [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:- [Conf ] Michael Ciavarella Documentation. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:- [Conf ] Esther Filderman , Ken McInnis Grid Computing: Just What Is It and Why Should I Care? [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:- [Conf ] Esther Filderman AFS. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:- [Conf ] Bill Van Etten A System Administrator's Introduction to Bioinformatics. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:- [Conf ] Keri Carpenter , Thomas A. Limoncelli Lessons Learned from Howard Dean's Digital Campaign. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:- [Conf ] David N. Blank-Edelman System Administration and Sex Therapy: The Gentle Art of Debugging. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:- [Conf ] Jeremy Blosser , David Josephsen Scalable Centralized Bayesian Spam Mitigation with Bogofilter (Awarded Best Paper!). [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:1-20 [Conf ] Nils Einar Eide , Andreas N. Blaafadt , Baard H. Rehn Johansen , Frode Eika Sandnes DIGIMIMIR: A Tool for Rapid Situation Analysis of Helpdesk and Support Email. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:21-32 [Conf ] Yi-Min Wang , Roussi Roussev , Chad Verbowski , Aaron Johnson , Ming-Wei Wu , Yennun Huang , Sy-Yen Kuo Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:33-46 [Conf ] Sufatrio , Roland H. C. Yap , Liming Zhong A Machine-Oriented Vulnerability Database for Automated Vulnerability Detection and Processing. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:47-58 [Conf ] Axelle Apvrille , David Gordon , Serge E. Hallyn , Makan Pourzandi , Vincent Roy DigSig: Runtime Authentication of Binaries at Kernel Level. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:59-66 [Conf ] Swapnil Patil , Anand Kashyap , Gopalan Sivathanu , Erez Zadok I3 FS: An In-Kernel Integrity Checker and Intrusion Detection File System. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:67-78 [Conf ] Eelco Dolstra , Merijn de Jonge , Eelco Visser Nix: A Safe and Policy-Free System for Software Deployment. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:79-92 [Conf ] William LeFebvre , David Snyder Auto-configuration by File Construction: Configuration Management with newfig. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:93-104 [Conf ] Sergei Mikhailov , Jonathan Robert Stanton AIS: A Fast, Disk Space Efficient "Adaptable Installation System" Supporting Multitudes of Diverse Software Configurations. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:105-112 [Conf ] Christopher J. Tengi , James M. Roberts , Joseph R. Crouthamel , Chris M. Miller , Christopher M. Sanchez autoMAC: A Tool for Automating Network Moves, Adds, and Changes. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:113-120 [Conf ] Carrie Gates , Michael Collins , Michael Duggan , Andrew Kompanek , Mark Thomas More Netflow Tools for Performance and Security. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:121-132 [Conf ] John P. Rouillard Real-time Log File Analysis Using the Simple Event Correlator (SEC). [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:133-150 [Conf ] Ni Lao , Ji-Rong Wen , Wei-Ying Ma , Yi-Min Wang Combining High Level Symptom Descriptions and Low Level State Information for Configuration Fault Diagnosis. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:151-158 [Conf ] Ted Bonkenburg , Dejan Diklic , Benjamin Reed , Mark Smith , Michael Vanover , Steve Welch , Roger Williams LifeBoat: An Autonomic Backup and Restore Solution. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:159-170 [Conf ] Joseph R. Crouthamel , James M. Roberts , Christopher M. Sanchez , Christopher J. Tengi PatchMaker: A Physical Network Patch Manager Tool. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:171-176 [Conf ] Gregory Pluta , Larry Brumbaugh , William Yurcik , Joseph Tucek Who Moved My Data? A Backup Tracking System for Dynamic Workstation Environments. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:177-186 [Conf ] Marc Dougherty Making a Game of Network Security. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:187-194 [Conf ] Paul Brett , Mic Bowman , Jeff Sedayao , Robert Adams , Rob C. Knauerhase , Aaron Klingaman Securing the PlanetLab Distributed Testbed: How to Manage Security in an Environment with No Firewalls, with All Users Having Root, and No Direct Physical Control of Any System. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:195-202 [Conf ] Robert A. Napier Secure Automation: Achieving Least Privilege with SSH, Sudo, and Suid. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:203-212 [Conf ] Steven Schwartzberg , Alva L. Couch Experience in Implementing an HTTP Service Closure. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:213-230 [Conf ] Jon Finke Meta Change Queue: Tracking Changes to People, Places, and Things. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:231-240 [Conf ] Daniel Price , Andrew Tucker Solaris Zones: Operating System Support for Consolidating Commercial Workloads. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:241-254 [Conf ]