The SCEAS System
Navigation Menu

Conferences in DBLP

USENIX Large Installation Systems Administration Conference (LISA) (lisa)
2005 (conf/lisa/2005)

  1. Qi Lu
    Keynote Address: Scaling Search Beyond the Public Web. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:- [Conf]
  2. Garrett Wollman
    Building MIT's Stata Center: An IT Perspective. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:- [Conf]
  3. Michael H. Warfield
    Wireless Security. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:- [Conf]
  4. W. Curtis Preston
    Backups. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:- [Conf]
  5. Radia J. Perlman
    What's a PKI, Why Would I Want One, and How Should it Be Designed? [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:- [Conf]
  6. Jonas Luster
    Weblogs, Wikis, and RSS for System Administrators. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:- [Conf]
  7. Thomas A. Limoncelli
    What Big Sites Can Learn from Little Sites. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:- [Conf]
  8. Paul Vixie
    Preventing Child Neglect in DNSSECbis Using Lookaside Validation (DLV). [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:- [Conf]
  9. Dan Kaminsky
    Network Black Ops: Extracting Unexpected Functionality from Existing Networks. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:- [Conf]
  10. John Arrasjid, John Gannon
    Virtualization. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:- [Conf]
  11. Kevin Bankston
    How Sysadmins Can Protect Free Speech and Privacy on the Electronic Frontier. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:- [Conf]
  12. Robert Sparks
    VoIP. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:- [Conf]
  13. Thomas Limoncelli
    Time Management. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:- [Conf]
  14. Monica Lam
    Automatic PC Desktop Management with Virtualization Technology. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:- [Conf]
  15. Gene Kim
    Change Management. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:- [Conf]
  16. Douglas Hughes
    Spam. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:- [Conf]
  17. Peyton Engel
    What's the Worst That Could Happen? [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:- [Conf]
  18. Howard Chu
    LDAP. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:- [Conf]
  19. Brent Chapman
    Incident Command for IT: What We Can Learn from the Fire Department. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:- [Conf]
  20. Strata Rose Chalup
    Project Management. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:- [Conf]
  21. Esther Filderman
    AFS. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:- [Conf]
  22. Michael R. Crusoe
    Using Your Body for Authentication: A Biometrics Guide for System Administrators. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:- [Conf]
  23. Strata Rose Chalup
    Under 200: Applying IS Best Practices to Small Companies. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:- [Conf]
  24. Gregory G. Rose
    Security/Cryptography. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:- [Conf]
  25. Ben Laurie
    Apache/OpenSSL/DNSSEC. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:- [Conf]
  26. Jordan Hubbard
    Mac OS X. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:- [Conf]
  27. Bdale Garbee
    Computing on Amateur Satellites. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:- [Conf]
  28. Terry Slattery
    Silly Network Management Tricks. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:- [Conf]
  29. Andrew Cowie
    Modern Trends in UNIX and Linux Infrastructure Management. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:- [Conf]
  30. Matt Blaze
    Picking Locks with Cryptology. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:- [Conf]
  31. Gerald Carter
    Samba. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:- [Conf]
  32. Bryan Cantrill, Daniel Price, Liane Praza
    Solaris 10: System/DTrace/Zones/SMF. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:- [Conf]
  33. Lance Cottrell
    Internet Counter-Intelligence: Offense and Defense. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:- [Conf]
  34. Matt Selsky, Daniel Medina
    GULP: A Unified Logging Architecture for Authentication Data. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:1-5 [Conf]
  35. Chaos Golubitsky
    Toward an Automated Vulnerability Comparison of Open Source IMAP Servers (Awarded Best Student Paper!). [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:9-22 [Conf]
  36. Yi-Min Wang, Doug Beck
    Fast User-Mode Rootkit Scanner for the Enterprise. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:23-30 [Conf]
  37. Paul Anderson, Edmund Smith
    Configuration Tools: Working Together. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:31-37 [Conf]
  38. Narayan Desai, Rick Bradshaw, Scott Matott, Sandra Bittner, Susan Coghlan, Rémy Evard, Cory Lueninghoener, Ti Leggett, John-Paul Navarro, Gene Rackow, Craig Stacey, Tisha Stacey
    A Case Study in Configuration Management Tool Deployment. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:39-46 [Conf]
  39. Shaya Potter, Jason Nieh
    Reducing Downtime Due to System Maintenance and Upgrades (Awarded Best Student Paper!). [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:47-62 [Conf]
  40. Anton Schultschik
    About the Integration of Mac OS X Devices into a Centrally Managed UNIX Environment. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:63-71 [Conf]
  41. Brent ByungHoon Kang, Vikram Sharma, Pratik Thanki
    RegColl: Centralized Registry Framework for Infrastructure System Management. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:73-82 [Conf]
  42. Maarten Thibaut, Wout Mertens
    Herding Cats: Managing a Mobile UNIX Platform. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:83-88 [Conf]
  43. Bruce Campbell, Robyn Landers
    Open Network Administrator (ONA) - A Web-based Network Management Tool. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:89-101 [Conf]
  44. Robert M. Marmorstein, Phil Kearns
    An Open Source Solution for Testing NAT'd and Nested iptables Firewalls. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:103-112 [Conf]
  45. Evan Hughes, Anil Somayaji
    Towards Network Awareness. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:113-124 [Conf]
  46. Alva L. Couch, Ning Wu, Hengky Susanto
    Toward a Cost Model for System Administration (Awarded Best Paper!). [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:125-141 [Conf]
  47. Mark Burgess, Kyrre M. Begnum
    Voluntary Cooperation in Pervasive Computing Services. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:143-154 [Conf]
  48. Sanjai Narain
    Network Configuration Management via Model Finding. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:155-168 [Conf]
  49. William Yurcik
    Visualizing NetFlows for Security at Line Speed: The SIFT Tool Suite. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:169-176 [Conf]
  50. Cristian Estan, Garret Magin
    Interactive Traffic Analysis and Visualization with Wisconsin Netpy. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:177-184 [Conf]
  51. Seong Soo Kim, A. L. Narasimha Reddy
    NetViewer: A Network Traffic Visualization and Analysis Tool. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:185-196 [Conf]
  52. Eben M. Haber, Eser Kandogan, Allen Cypher, Paul P. Maglio, Rob Barrett
    A1: Spreadsheet-based Scripting for Developing Web Tools. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:197-208 [Conf]
  53. Thomas A. Limoncelli
    Hostdb: The Best Damn host2DNS/DHCP Script Ever Written. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:209-223 [Conf]
  54. Jonathan Adams, David Bustos, Stephen Hahn, David Powell, Liane Praza
    Solaris Service Management Facility: Modern System Startup and Administration. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:225-236 [Conf]
  55. James Deverick, Phil Kearns
    Towards a Deep-Packet-Filter Toolkit for Securing Legacy Resources. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:237-248 [Conf]
  56. Rakeshbabu Bobba, Serban I. Gavrila, Virgil D. Gligor, Himanshu Khurana, Radostina K. Koleva
    Administering Access Control in Dynamic Coalitions. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:249-261 [Conf]
  57. Jon Finke
    Manage People, Not Userids. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:263-277 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002