The SCEAS System
Navigation Menu

Conferences in DBLP

USENIX Large Installation Systems Administration Conference (LISA) (lisa)
2003 (conf/lisa/2003)

  1. Paul Vixie
    Internet Governance Reloaded. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:- [Conf]
  2. John Graham-Cumming
    Adaptive Filtering: One Year On. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:- [Conf]
  3. Geoff Halprin
    Organizational Maturity Models: Achieving Success and Happiness in Modern IT Environments. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:- [Conf]
  4. Robert Haskins
    Emerging Spam-Fighting Techniques. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:- [Conf]
  5. Lance Hayden
    High Risk Information: Safe Handling for System Administrators. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:- [Conf]
  6. Paul Kilmartin
    Inside eBay.com: The System Administrator's Perspective. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:- [Conf]
  7. Bevis King, Roger Webb, Graeme Wilford
    The Realities of Deploying Desktop Linux. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:- [Conf]
  8. Thomas A. Limoncelli, Adam Moskowitz
    How to Get Your Papers Accepted at LISA. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:- [Conf]
  9. Declan McCullagh
    What Washington Still Doesn't Get. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:- [Conf]
  10. Jon T. Meek, Frank Colosimo
    Tossing Packets Over the Wall Using Transmit-Only Ethernet Cables. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:- [Conf]
  11. Kevin Miller
    Three Practical Ways to Improve Your Network. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:- [Conf]
  12. David Moore
    Network Telescopes: Tracking Denial-of-Service Attacks and Internet Worms Around the Globe. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:- [Conf]
  13. John Nicholson
    Outsourcing: Common Problems and Current Trends in the Outsourcing Industry. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:- [Conf]
  14. Ross Oliver
    Stick, Rudder, and Keyboard: How Flying My Airplane Makes Me a Better Sysadmin. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:- [Conf]
  15. David W. Parter
    Professional Growth and Development. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:- [Conf]
  16. David Plonka
    A Case Study in Internet Pathology: Flawed Routers Flood University's Network. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:- [Conf]
  17. Gregory G. Rose
    PKI/Cryptography. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:- [Conf]
  18. Abe Singer
    Security Without Firewalls. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:- [Conf]
  19. Bdale Garbee
    Linux. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:- [Conf]
  20. David N. Blank-Edelman
    Through the Lens Geekly: How Sysadmins Are Portrayed in Pop Culture. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:- [Conf]
  21. Hugh Daniel
    IPsec. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:- [Conf]
  22. Gene Kim
    Security Lessons from "Best in Class" Organizations. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:- [Conf]
  23. Peyton Engel
    Coping with the Disappearance of Network Boundaries. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:- [Conf]

  24. Panel Discussion: Current Best Practices and Forthcoming Advances. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:- [Conf]
  25. Rémy Evard
    Security vs. Science: Changing the Security Culture of a National Lab. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:- [Conf]
  26. Mark Burgess
    Talking to the Walls (Again). [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:- [Conf]
  27. Paul Anderson, Steve Traugott
    Automated System Administration/Infrastructure. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:- [Conf]
  28. Brent Chapman
    MBAs for Sys Admins. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:- [Conf]
  29. Esther Filderman, Garry Zacheiss
    AFS. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:- [Conf]
  30. Wesley D. Craig, Patrick M. McNeal
    Radmind: The Integration of Filesystem Integrity Checking with Filesystem Management. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:1-6 [Conf]
  31. Elizabeth D. Zwicky
    Further Torture: More Testing of Backup and Archive Programs. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:7-14 [Conf]
  32. Nick Elprin, Bryan Parno
    An Analysis of Database-Driven Mail Servers. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:15-22 [Conf]
  33. Roger Crandell, James Clifford, Alexander Kent
    A Secure and Transparent Firewall Web Proxy. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:23-30 [Conf]
  34. Joshua S. Simon, Liza Weissler
    Designing, Developing, and Implementing a Document Repository. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:31-40 [Conf]
  35. Deepak Giridharagopal
    DryDock: A Document Firewall. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:41-50 [Conf]
  36. William K. Robertson, Christopher Krügel, Darren Mutz, Fredrik Valeur
    Run-time Detection of Heap-based Overflows. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:51-60 [Conf]
  37. Xev Gittler, Ken Beer
    Designing a Configuration Monitoring and Reporting Environment. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:61-72 [Conf]
  38. Daniel Ellard, Margo I. Seltzer
    New NFS Tracing Tools and Techniques for System Analysis. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:73-86 [Conf]
  39. Mark C. Benvenuto, Angelos D. Keromytis
    EasyVPN: IPsec Remote Access Made Easy. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:87-94 [Conf]
  40. Carrie Gates, Jason Rouse
    The Yearly Review, or How to Evaluate Your Sys Admin. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:95-104 [Conf]
  41. Stacy Purcell, Sally Hambridge, David Armstrong, Tod Oace, Matt Baker, Jeff Sedayao
    Peer Certification: Techniques and Tools for Reducing System Admin Support Burdens While Improving Customer Service. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:105-114 [Conf]
  42. Luke Kanies
    ISconf: Theory, Practice, and Beyond. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:115-124 [Conf]
  43. Alva L. Couch, John Hart, Elizabeth G. Idhaw, Dominic Kallas
    Seeking Closure in an Open World: A Behavioral Agent Approach to Configuration Management. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:125-148 [Conf]
  44. Tuva Stang, Fahimeh Pourbayat, Mark Burgess, Geoffrey Canright, Kenth Engø, Åsmund Weltzien
    Archipelago: A Network Security Analysis Tool. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:149-158 [Conf]
  45. Yi-Min Wang, Chad Verbowski, John Dunagan, Yu Chen, Helen J. Wang, Chun Yuan, Zheng Zhang
    STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:159-172 [Conf]
  46. Ted Cabeen, Job Bogan
    CDSS: Secure Distribution of Software Installation Media Images in a Heterogeneous Environment. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:173-180 [Conf]
  47. Constantine P. Sapuntzakis, David Brumley, Ramesh Chandra, Nickolai Zeldovich, Jim Chow, Monica S. Lam, Mendel Rosenblum
    Virtual Appliances for Deploying and Maintaining Software. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:181-194 [Conf]
  48. Jon Finke
    Generating Configuration Files: The Director's Cut. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:195-204 [Conf]
  49. Mark D. Roth
    Preventing Wheel Reinvention: The psgconf System Configuration Framework. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:205-212 [Conf]
  50. Paul Anderson, Patrick Goldsack, Jim Paterson
    SmartFrog Meets LCFG: Autonomous Reconfiguration with Central Policy Control. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:213-222 [Conf]
  51. Tim Hunter, Paul Terry, Alan Judge
    Distributed Tarpitting: Impeding Spam Across Multiple Servers. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:223-236 [Conf]
  52. Xiaohu Qie, Sanjai Narain
    Using Service Grammar to Diagnose BGP Configuration Errors. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:237-246 [Conf]
  53. Cary Abrahamson, Michael Blodgett, Adam Kunen, Nathan Mueller, David W. Parter
    Splat: A Network Switch/Port Configuration Management Tool. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:247-256 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002