|
Conferences in DBLP
- Damian Bentley, Gregory G. Rose, Tara Whalen
ssmail: Opportunistic Encryption in sendmail. [Citation Graph (0, 0)][DBLP] LISA, 1999, pp:1-8 [Conf]
- Vincent D. Skahan Jr., Robert Katz
MJDLM: Majordomo based Distribution List Management. [Citation Graph (0, 0)][DBLP] LISA, 1999, pp:9-20 [Conf]
- Eric Sorenson, Strata Rose Chalup
RedAlert: A Scalable System for Application Monitoring. [Citation Graph (0, 0)][DBLP] LISA, 1999, pp:21-34 [Conf]
- Thomas A. Limoncelli
Deconstructing User Requests and the Nine Step Model. [Citation Graph (0, 0)][DBLP] LISA, 1999, pp:35-44 [Conf]
- Matthew F. Ringel, Thomas A. Limoncelli
Adverse Termination Procedures -or- "How To Fire A System Administrator". [Citation Graph (0, 0)][DBLP] LISA, 1999, pp:45-52 [Conf]
- Steve Willoughby
Organizing the Chaos: Managing Request Tickets in a Large Environment. [Citation Graph (0, 0)][DBLP] LISA, 1999, pp:53-68 [Conf]
- Ram Periakaruppan, Evi Nemeth
GTrace: A Graphical Traceroute Tool. [Citation Graph (0, 0)][DBLP] LISA, 1999, pp:69-78 [Conf]
- Willem A. Schreüder, Maria Murillo
rat: A Secure Archiving Program With Fast Retrieval. [Citation Graph (0, 0)][DBLP] LISA, 1999, pp:79-86 [Conf]
- Jeremy Bargen, Seth Taplin
Cro-Magnon: A Patch Hunter-Gatherer. [Citation Graph (0, 0)][DBLP] LISA, 1999, pp:87-94 [Conf]
- Eric Anderson, David A. Patterson
A Retrospective on Twelve Years of LISA Proceedings. [Citation Graph (0, 0)][DBLP] LISA, 1999, pp:95-108 [Conf]
- Alexander V. Konstantinou, Yechiam Yemini, Sandeep N. Bhatt, Sivaramakrishnan Rajagopalan
Managing Security in Dynamic Networks. [Citation Graph (0, 0)][DBLP] LISA, 1999, pp:109-122 [Conf]
- Alva L. Couch, Michael Gilfix
It's Elementary, Dear Watson: Applying Logic Programming To Convergent System Management Processes. [Citation Graph (0, 0)][DBLP] LISA, 1999, pp:123-138 [Conf]
- Peter Valian, Todd K. Watson
NetReg: An Automated DHCP Registration System. [Citation Graph (0, 0)][DBLP] LISA, 1999, pp:139-148 [Conf]
- Robert Beck
Dealing with Public Ethernet Jacks: Switches, Gateways, and Authentication. [Citation Graph (0, 0)][DBLP] LISA, 1999, pp:149-154 [Conf]
- Josh Goldenhar
NetMapper: Hostname Resolution Based on Client Network Location. [Citation Graph (0, 0)][DBLP] LISA, 1999, pp:155-164 [Conf]
- Ricardo Labiaga
Enhancements to the Autofs Automounter. [Citation Graph (0, 0)][DBLP] LISA, 1999, pp:165-174 [Conf]
- David Robinson
The Advancement of NFS Benchmarking: SFS 2.0. [Citation Graph (0, 0)][DBLP] LISA, 1999, pp:175-186 [Conf]
- Vincent Cordrey, Doug Freyburger, Jordan Schwartz, Liza Weissler
Moving Large Filesystems On-Line, Including Exiting HSM Filesystems. [Citation Graph (0, 0)][DBLP] LISA, 1999, pp:187-196 [Conf]
- Jon Finke
ServiceTrak Meets NLOG/NMAP. [Citation Graph (0, 0)][DBLP] LISA, 1999, pp:197-206 [Conf]
- Eric Melski
Burt: The Backup and Recovery Tool. [Citation Graph (0, 0)][DBLP] LISA, 1999, pp:207-218 [Conf]
- Giray Pultar
Design and Implementation of a Failsafe Print System. [Citation Graph (0, 0)][DBLP] LISA, 1999, pp:219-228 [Conf]
- Martin Roesch
Snort: Lightweight Intrusion Detection for Networks. [Citation Graph (0, 0)][DBLP] LISA, 1999, pp:229-238 [Conf]
- D. Brian Larkins
Internet Routing and DNS Voodoo in the Enterprises. [Citation Graph (0, 0)][DBLP] LISA, 1999, pp:239-250 [Conf]
- John S. Denker, Steven M. Bellovin, Hugh Daniel, Nancy L. Mintz, Tom Killian, Mark Plotnick
Moat: a Virtual Private Network Appliance and Services Platform. [Citation Graph (0, 0)][DBLP] LISA, 1999, pp:251-260 [Conf]
- Dirk H. Hohndel, Fabian Herschel
Automated Installation of Linux Systems Using YaST. [Citation Graph (0, 0)][DBLP] LISA, 1999, pp:261-266 [Conf]
- Jason Heiss
Enterprise Rollouts with JumpStart. [Citation Graph (0, 0)][DBLP] LISA, 1999, pp:267-274 [Conf]
- Conrad E. Kimball, Vincent D. Skahan Jr., David J. Kasik, Roger L. Droz
Automated Client-side Integration of Distributed Application Servers. [Citation Graph (0, 0)][DBLP] LISA, 1999, pp:275-282 [Conf]
|