Conferences in DBLP
Paul Vixie "Who ARE These People?" Internet Governance, Peering, and Legislation. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:- [Conf ] John Hurley Security on Macintosh OS X. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:- [Conf ] Larry Wall Perl 6. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:- [Conf ] Daniel V. Klein The Constitutional & Financial Argument Against Spam. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:- [Conf ] Daniel V. Klein , Mark-Jason Dominus Perl/Scripting Gurus. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:- [Conf ] Brad Knowles Domain Name Server Comparison: BIND 8 vs. BIND 9 vs. djbdns vs. ??? [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:- [Conf ] Thomas A. Limoncelli , Christine Hogan How to Write a Book with Someone You Don't Know: Internet Collaboration for the Truly Geeky. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:- [Conf ] Tim Nagle My Years with the NSA Red Team. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:- [Conf ] Tim Pozar Large-Scale 802.11 Deployment. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:- [Conf ] Curtis Preston Making Backups Easier with Disk. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:- [Conf ] W. Curtis Preston Backups Guru. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:- [Conf ] Paul Proctor The Intrusion Detection Timeline. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:- [Conf ] Jim Reese Keynote: Scaling the Web: An Overview of Google (A Linux Cluster for Fun and Profit). [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:- [Conf ] Peter H. Salus Internet Security: Beyond Firewalls, Passwords, and Crypto. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:- [Conf ] Len Sassaman The Promise of Privacy. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:- [Conf ] Nick Stoughton Consulting Guru. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:- [Conf ] Steve Traugott Infrastructures Guru. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:- [Conf ] Douglas Hughes System Monitoring Guru. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:- [Conf ] David N. Blank-Edelman SysAdmin, Stories, and Signing: Learning from Communication Experts. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:- [Conf ] Eric Allman So You Want to Do a Startup? [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:- [Conf ] Lee Damon , Rob Kolstad The Evolving Ethics of System Administration. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:- [Conf ] Panel: Nobody Notices Until It's Broken: Self-Marketing for Sysadmins. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:- [Conf ] Tony Bourke Load Balancers. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:- [Conf ] Strata Rose Chalup Project Management Guru. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:- [Conf ] Paul Evans Risk-Taking vs. Management. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:- [Conf ] Gerald Carter SAMBA Guru. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:- [Conf ] Esther Filderman , Garry Zacheiss AFS Gurus. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:- [Conf ] Eric Allman Email/MTAs Guru. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:- [Conf ] Jeff R. Allen Performance Tuning Guru. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:- [Conf ] Thomas Stepleton Work-Augmented Laziness with the Los Task Request System. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:1-12 [Conf ] Deeann M. M. Mikula , Chris Tracy , Mike Holling Spam Blocking with a Dynamically Updated Firewall Ruleset. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:13-20 [Conf ] Michael Gilfix Holistic Quota Management: The Natural Path to a Better, More Efficient Quota System. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:21-32 [Conf ] Alain J. Mayer Application Aware Management of Internet Data Center Software. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:33-46 [Conf ] Kevin Adams Geographically Distributed System for Catastrophic Recovery. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:47-64 [Conf ] Jon Finke Embracing and Extending Windows 2000. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:65-74 [Conf ] Uri Guttman Stem: The System Administration Enabler. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:75-82 [Conf ] Lionel Cons , Piotr Poznanski Pan: A High-Level Configuration Language. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:83-98 [Conf ] Steve Traugott Why Order Matters: Turing Equivalence in Automated Systems Administration. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:99-120 [Conf ] Adam Sah A New Architecture for Managing Enterprise Log Data. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:121-132 [Conf ] Tetsuji Takada , Hideki Koike MieLog: A Highly Interactive Visual Log Browser Using Information Visualization and Statistical Analysis. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:133-144 [Conf ] Jon Finke Process Monitor: Detecting Events That Didn't Happen. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:145-154 [Conf ] John Hart , Jeffrey D'Amelia An Analysis of RPM Validation Drift. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:155-166 [Conf ] Robert Beverly RTG: A Scalable SNMP Statistics Architecture for Service Providers. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:167-174 [Conf ] Mark Logan , Matthias Felleisen , David N. Blank-Edelman Environmental Acquisition in Network Management. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:175-184 [Conf ] David A. Patterson A Simple Way to Estimate the Cost of Downtime. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:185-188 [Conf ] Alexander Keller , Heiko Ludwig Defining and Monitoring Service-Level Agreements for Dynamic e-Business. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:189-204 [Conf ] Noel Burton-Krahn HotSwap-Transparent Server Failover for Linux. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:205-212 [Conf ] Richard van den Berg , Phil Dibowitz Over-Zealous Security Administrators Are Breaking the Internet. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:213-218 [Conf ] V. N. Venkatakrishnan , R. Sekar , T. Kamat , S. Tsipa , Zhenkai Liang An Approach for Secure Software Installation. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:219-226 [Conf ] Atsushi Totsuka , Hidenari Ohwada , Nobuhisa Fujita , Debasish Chakraborty , Glenn Mansfield Keeni , Norio Shiratori Network-based Intrusion Detection - Modeling for a Larger Picture. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:227-232 [Conf ] Steve Beattie , Seth Arnold , Crispin Cowan , Perry Wagle , Chris Wright , Adam Shostack Timing the Application of Security Patches for Optimal Uptime. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:233-242 [Conf ]