The SCEAS System
Navigation Menu

Conferences in DBLP

USENIX Large Installation Systems Administration Conference (LISA) (lisa)
2001 (conf/lisa/2001)

  1. W. Curtis Preston
    Backups. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  2. Daniel V. Klein
    150/5, 000 Years of (E-)Commerce: History Repeats Itself Again. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  3. Victor Hazlewood
    Invited Talk: San Diego Supercomputer Center's Blue Horizon. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  4. Geoff Halprin
    The Problem with Developers. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  5. Steve Simmons, Elizabeth D. Zwicky
    Rules of Thumb of System Administration. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  6. Thomas J. Hacker
    TCP Performance Tuning. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  7. Bill Labrie
    Sysadmin for Suits. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  8. Michael T. Stolarchuk
    BPF Meets UVM. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  9. Aeleen Frisch
    Beyond File Permissions: Controlling User Actions. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  10. Lee Tien
    What Sysadmins Need to Know About the New Intellectual Property Laws. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  11. William LeFebvre
    CNN.com: Facing a World Crisis. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  12. Thomas A. Limoncelli
    Writing Papers for Usenix Refereed Track. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  13. Peter H. Salus
    2001: A Communications Anniversary. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  14. W. Curtis Preston
    SANs and NAS. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  15. Ernest Prabhakar
    Keynote: Rebuilding the Digital Enterprise Around Internet Standards. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  16. Gregory G. Rose
    PKI/Cryptography. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  17. Hal Pomeranz
    Are Baseline Computer Security Standards the Answer? [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  18. Michel Pelletier
    Zope. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  19. Aviel D. Rubin
    Security for E-Voting in Public Elections. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  20. Adam Moskowitz
    Computer Room Design/Layout. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  21. Gregory G. Rose
    Where Has All the Crypto Gone? Long Time Coming: A Speculative and Historical Talk. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  22. Ruth Milner
    Reducing System Complexity: A Case Study in Converging Environments. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  23. John S. Flowers
    Inspection, Detection & Deflection: Armoring the Next Wave of Security Technology. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  24. Esther Filderman, Kevin Sullivan, Victor Hazlewood
    Wrap-Up and Q & A. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  25. Greg Bear
    Keynote Address: Slime vs. Silicon. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  26. Jim Waldo
    JINI Networking Technology and Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  27. Phil Cox
    Hardening Windows 2000. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  28. Gordon Cook
    Whither End-to-End: Placing Bandwidth and Trust at the Edge. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  29. Avishai Wool
    How Not to Configure Your Firewall: A Field Guide to Common Firewall Configurations. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  30. Kimberly C. Claffy
    Internet Measurement: Myths About Internet Data. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  31. Eric Allman
    Email MTAs. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  32. Esther Filderman, Garry Zacheiss
    AFS. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  33. Esther Filderman, Kevin Sullivan, Victor Hazlewood
    Panel: An Overview of Terascale Computing. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  34. Esther Filderman, Kevin Sullivan
    Managing the Terascale: Lessons from a 750-Node Supercomputer. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]

  35. Panel: Written Any Good Books Lately? [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]

  36. Panel: The Future of Computer Security. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  37. Steve Traugott
    Infrastructure Architecture. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  38. David N. Blank-Edelman
    If I Could Talk to the Animals--What Sysadmins Can Learn About Diagnostic Skills from Another Profession. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  39. Steve Burnett
    Crypto Blunders. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]

  40. Panel: Scripting Languages Bake-Off. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  41. Mark Epstein
    A Non-Traditional Approach to Network Security Control. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  42. Shane Caraveo
    PHP for System Administration. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  43. Gerald Carter
    LDAP. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  44. Mark D. Roth
    Defining the Role of Service Manager: Sanity Through Organizational Evolution. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:1-6 [Conf]
  45. Dejan Diklic, Venkatesh Velayutham, Steve Welch, Roger Williams
    Remote Outsourcing Services for Multiple Branch Offices and Small Businesses via the Internet. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:7-14 [Conf]
  46. Peter D. Gray
    SUS, an Object Reference Model for Distributing UNIX Super User Privileges. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:15-18 [Conf]
  47. Reiner Sailer, Arup Acharya, Mandis Beigi, Raymond Jennings, Dinesh C. Verma
    IPSECvalidate: A Tool to Validate IPSEC Configurations. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:19-24 [Conf]
  48. Niels Provos, Peter Honeyman
    ScanSSH: Scanning the Internet for SSH Servers. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:25-30 [Conf]
  49. Robert Apthorpe
    A Probabilistic Approach to Estimating Computer System Reliability (Awarded Best Theory Paper!). [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:31-46 [Conf]
  50. Frode Eika Sandnes
    Scheduling Partially Ordered Events in a Randomised Framework: Empirical Results and Implications for Automatic Configuration Management. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:47-62 [Conf]
  51. Alva L. Couch, Noah Daniels
    The Maelstrom: Network Service Debugging via "Ineffective Procedures". [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:63-78 [Conf]
  52. Patrick O'Rourke, Mike Keefe
    Performance Evaluation of Linux Virtual Server. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:79-92 [Conf]
  53. Larry Lancaster, Alan Rowe
    Measuring Real-World Data Availability. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:93-100 [Conf]
  54. Hårek Haugerud, Sigmund Straumsnes
    Simulation of User-Driven Computer Behaviour. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:101-108 [Conf]
  55. Jürgen Schönwälder
    Specific Simple Network Management Tools. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:109-120 [Conf]
  56. Victor Götsch, Albert Wuersch, Tobias Oetiker
    Gossips: System and Service Monitor. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:121-132 [Conf]
  57. David Moore, Ken Keys, Ryan Koga, Edouard Lagache, Kimberly C. Claffy
    The CoralReef Software Suite as a Tool for System and Network Administrators. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:133-144 [Conf]
  58. Yizhan Sun, Alva L. Couch
    Global Impact Analysis of Dynamic Library Dependencies. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:145-150 [Conf]
  59. Serge E. Hallyn, Phil Kearns
    Tools to Administer Domain and Type Enforcement. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:151-156 [Conf]
  60. Lee "Leonardo" Amatangelo, W. Curtis Preston
    Solaris Bare-Metal Recovery from a Specialized CD and Your Enterprise Backup Solution. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:157-162 [Conf]
  61. Willem A. Schreüder
    Accessing Files on Unmounted Filesystems. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:163-168 [Conf]
  62. Todd Poynor
    Automating Infrastructure Composition for Internet Services. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:169-178 [Conf]
  63. Tobias Oetiker
    TemplateTree II: The Post-Installation Setup Tool. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:179-186 [Conf]
  64. Matt Holgate, Will Partain
    The Arusha Project: A Framework for Collaborative UNIX System Administration. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:187-198 [Conf]
  65. Mike Wyer, Susan Eisenbach
    LEXIS: An EXam Invigilation System (Awarded Best Applied Paper!). [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:199-210 [Conf]
  66. Ellen Spertus, Mills College, Robin Jeffries, Kiem Sie
    Dynamic Sublists: Scaling Unmoderated Mailing Lists. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:211-218 [Conf]
  67. Stephen J. Okay, Gale E. Pedowitz
    GEORDI: A Handheld Tool for Remote System Administration. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:219-230 [Conf]
  68. Marina Fomenkov, Kimberly C. Claffy, Bradley Huffaker, David Moore
    Macroscopic Internet Topology and Performance Measurements from the DNS Root Name Servers. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:231-240 [Conf]
  69. Nevil Brownlee, Kimberly C. Claffy, Evi Nemeth
    DNS Root/g TLD Server Measurements. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:241-256 [Conf]
  70. Robin Garner
    Pelican DHCP Automated Self-Registration System: Distributed Registration and Centralized Management. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:257-267 [Conf]
  71. R. P. Channing Rodgers, Ziying Sherwin
    A Management System for Network-Shareable Locally Installed Software: Merging RPM and the Depot Scheme Under Solaris. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:267-273 [Conf]
  72. Andrew Mayhew
    File Distribution Efficiencies: cfengine Versus rsync. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:273-276 [Conf]
  73. Charles Beadnall, Andrew Mayhew
    CfAdmin: A User Interface for cfengine. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:277-281 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002