The SCEAS System
Navigation Menu

Conferences in DBLP

USENIX Large Installation Systems Administration Conference (LISA) (lisa)
2002 (conf/lisa/2002)

  1. Paul Vixie
    "Who ARE These People?" Internet Governance, Peering, and Legislation. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:- [Conf]
  2. John Hurley
    Security on Macintosh OS X. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:- [Conf]
  3. Larry Wall
    Perl 6. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:- [Conf]
  4. Daniel V. Klein
    The Constitutional & Financial Argument Against Spam. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:- [Conf]
  5. Daniel V. Klein, Mark-Jason Dominus
    Perl/Scripting Gurus. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:- [Conf]
  6. Brad Knowles
    Domain Name Server Comparison: BIND 8 vs. BIND 9 vs. djbdns vs. ??? [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:- [Conf]
  7. Thomas A. Limoncelli, Christine Hogan
    How to Write a Book with Someone You Don't Know: Internet Collaboration for the Truly Geeky. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:- [Conf]
  8. Tim Nagle
    My Years with the NSA Red Team. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:- [Conf]
  9. Tim Pozar
    Large-Scale 802.11 Deployment. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:- [Conf]
  10. Curtis Preston
    Making Backups Easier with Disk. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:- [Conf]
  11. W. Curtis Preston
    Backups Guru. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:- [Conf]
  12. Paul Proctor
    The Intrusion Detection Timeline. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:- [Conf]
  13. Jim Reese
    Keynote: Scaling the Web: An Overview of Google (A Linux Cluster for Fun and Profit). [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:- [Conf]
  14. Peter H. Salus
    Internet Security: Beyond Firewalls, Passwords, and Crypto. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:- [Conf]
  15. Len Sassaman
    The Promise of Privacy. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:- [Conf]
  16. Nick Stoughton
    Consulting Guru. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:- [Conf]
  17. Steve Traugott
    Infrastructures Guru. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:- [Conf]
  18. Douglas Hughes
    System Monitoring Guru. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:- [Conf]
  19. David N. Blank-Edelman
    SysAdmin, Stories, and Signing: Learning from Communication Experts. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:- [Conf]
  20. Eric Allman
    So You Want to Do a Startup? [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:- [Conf]
  21. Lee Damon, Rob Kolstad
    The Evolving Ethics of System Administration. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:- [Conf]

  22. Panel: Nobody Notices Until It's Broken: Self-Marketing for Sysadmins. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:- [Conf]
  23. Tony Bourke
    Load Balancers. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:- [Conf]
  24. Strata Rose Chalup
    Project Management Guru. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:- [Conf]
  25. Paul Evans
    Risk-Taking vs. Management. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:- [Conf]
  26. Gerald Carter
    SAMBA Guru. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:- [Conf]
  27. Esther Filderman, Garry Zacheiss
    AFS Gurus. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:- [Conf]
  28. Eric Allman
    Email/MTAs Guru. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:- [Conf]
  29. Jeff R. Allen
    Performance Tuning Guru. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:- [Conf]
  30. Thomas Stepleton
    Work-Augmented Laziness with the Los Task Request System. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:1-12 [Conf]
  31. Deeann M. M. Mikula, Chris Tracy, Mike Holling
    Spam Blocking with a Dynamically Updated Firewall Ruleset. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:13-20 [Conf]
  32. Michael Gilfix
    Holistic Quota Management: The Natural Path to a Better, More Efficient Quota System. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:21-32 [Conf]
  33. Alain J. Mayer
    Application Aware Management of Internet Data Center Software. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:33-46 [Conf]
  34. Kevin Adams
    Geographically Distributed System for Catastrophic Recovery. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:47-64 [Conf]
  35. Jon Finke
    Embracing and Extending Windows 2000. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:65-74 [Conf]
  36. Uri Guttman
    Stem: The System Administration Enabler. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:75-82 [Conf]
  37. Lionel Cons, Piotr Poznanski
    Pan: A High-Level Configuration Language. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:83-98 [Conf]
  38. Steve Traugott
    Why Order Matters: Turing Equivalence in Automated Systems Administration. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:99-120 [Conf]
  39. Adam Sah
    A New Architecture for Managing Enterprise Log Data. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:121-132 [Conf]
  40. Tetsuji Takada, Hideki Koike
    MieLog: A Highly Interactive Visual Log Browser Using Information Visualization and Statistical Analysis. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:133-144 [Conf]
  41. Jon Finke
    Process Monitor: Detecting Events That Didn't Happen. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:145-154 [Conf]
  42. John Hart, Jeffrey D'Amelia
    An Analysis of RPM Validation Drift. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:155-166 [Conf]
  43. Robert Beverly
    RTG: A Scalable SNMP Statistics Architecture for Service Providers. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:167-174 [Conf]
  44. Mark Logan, Matthias Felleisen, David N. Blank-Edelman
    Environmental Acquisition in Network Management. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:175-184 [Conf]
  45. David A. Patterson
    A Simple Way to Estimate the Cost of Downtime. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:185-188 [Conf]
  46. Alexander Keller, Heiko Ludwig
    Defining and Monitoring Service-Level Agreements for Dynamic e-Business. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:189-204 [Conf]
  47. Noel Burton-Krahn
    HotSwap-Transparent Server Failover for Linux. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:205-212 [Conf]
  48. Richard van den Berg, Phil Dibowitz
    Over-Zealous Security Administrators Are Breaking the Internet. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:213-218 [Conf]
  49. V. N. Venkatakrishnan, R. Sekar, T. Kamat, S. Tsipa, Zhenkai Liang
    An Approach for Secure Software Installation. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:219-226 [Conf]
  50. Atsushi Totsuka, Hidenari Ohwada, Nobuhisa Fujita, Debasish Chakraborty, Glenn Mansfield Keeni, Norio Shiratori
    Network-based Intrusion Detection - Modeling for a Larger Picture. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:227-232 [Conf]
  51. Steve Beattie, Seth Arnold, Crispin Cowan, Perry Wagle, Chris Wright, Adam Shostack
    Timing the Application of Security Patches for Optimal Uptime. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:233-242 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002