The SCEAS System
Navigation Menu

Conferences in DBLP

USENIX Large Installation Systems Administration Conference (LISA) (lisa)
2006 (conf/lisa/2006)

  1. Aloke Guha
    Power-Managed Storage: Longer Data Life and Lower Energy Consumption. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:- [Conf]
  2. Douglas Hughes
    Spam. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:- [Conf]
  3. Andrew Seely
    Command and Control: System Administration at U.S. Central Command. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:- [Conf]
  4. Mark Loveless
    Corporate Security: A Hacker Perspective. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:- [Conf]
  5. Thomas A. Limoncelli, Adam Moskowitz
    How to Get Your Paper Accepted at LISA. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:- [Conf]
  6. Thomas A. Limoncelli
    Site Reliability at Google/My First Year at Google. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:- [Conf]
  7. Michael Eisler
    NFSv4. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:- [Conf]
  8. Thomas Limoncelli
    Mac OS X. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:- [Conf]
  9. Thomas A. Limoncelli
    Time Management for System Administrators. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:- [Conf]
  10. W. Curtis Preston
    Backups. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:- [Conf]
  11. Danny O'Brien
    The Last, Best Hope: Sysadmins and DBAs as the Last Guardians of Privacy. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:- [Conf]
  12. Michael Baum 0002
    Virtualization: The Good, the Bad, the Ugly. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:- [Conf]
  13. Howard Chu
    LDAP. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:- [Conf]
  14. Esther Filderman
    AFS. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:- [Conf]
  15. Narayan Desai
    bcfg2. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:- [Conf]
  16. D. J. Byrne
    Open Source Software and Its Role in Space Exploration. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:- [Conf]
  17. Dan Kaminsky
    Black Ops 2006: Pattern Recognition. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:- [Conf]
  18. Lee Damon, Evan Marcus
    Is Entropy Winning? Drowning in the Data Tsunami. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:- [Conf]
  19. Dmitri Alperovitch
    Zombies and Botnets: Attacks on Messaging Security by Organized Criminal Enterprises. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:- [Conf]
  20. Douglas Hughes
    SNMP. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:- [Conf]
  21. Jon Finke
    Identity Management. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:- [Conf]
  22. Luke Kanies
    Puppet. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:- [Conf]
  23. Eric Hennessey
    High Availability: From Luxury to Commonplace Necessity in 10 Years. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:- [Conf]
  24. Cat Okita
    What Do You Mean, Identity 2.0?. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:- [Conf]
  25. Elizabeth D. Zwicky
    Teaching Problem Solving: You Can and You Should. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:- [Conf]
  26. Joseph Radin
    UNIX and Microsoft Interoperability. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:- [Conf]
  27. Robert Sparks
    VoIP. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:- [Conf]
  28. Mazda A. Marvasti
    Everything You Know About Monitoring Is Wrong. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:- [Conf]
  29. Adam Moskowitz
    Bad Interview Questions. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:- [Conf]
  30. Daniel V. Klein
    Perfect Data in an Imperfect World. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:- [Conf]
  31. Patrick McGovern
    Leveraging the IT Community. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:- [Conf]
  32. John Littell
    Spam. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:- [Conf]
  33. Chad Verbowski
    System Administration: Drowning in Management Complexity. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:- [Conf]
  34. Alex Muentz
    Sysadmins, Network Managers, and Wiretap Law. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:- [Conf]
  35. Cory Doctorow
    Keynote Address: Hollywood's Secret War on Your NOC. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:- [Conf]
  36. Adam Haberlach
    QA and the System Administrator. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:- [Conf]
  37. Chris Page
    Build a Linux Oracle RAC Cluster. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:- [Conf]
  38. John Arrasjid, John Gannon, Michael DiPetrillo
    Virtualization and the Virtual Infrastructure. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:- [Conf]
  39. W. Curtis Preston
    Seriously, Tape-Only Backup Systems Are Dead. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:- [Conf]
  40. Brent ByungHoon Kang, Gautam Singaraju, Sumeet Jain
    Privilege Messaging: An Authorization Framework over Email Infrastructure. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:1-16 [Conf]
  41. Roberto Cecchini, Fulvia Costa, Alberto D'Ambrosio, Domenico Diacono, Giacomo Fazio, Antonio Forte, Matteo Genghini, Michele Michelotto, Ombretta Pinazza, Alfonso Sparano
    Securing Electronic Mail on the National Research and Academic Network of Italy. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:17-29 [Conf]
  42. Daniel V. Klein
    A Forensic Analysis of a Distributed Two-Stage Web-Based Spam Attack (Awarded Honorable Mention!). [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:31-40 [Conf]
  43. Robert M. Marmorstein, Phil Kearns
    Firewall Analysis with Policy-based Host Classification. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:41-51 [Conf]
  44. Lap-Chung Lam, Yang Yu, Tzi-cker Chiueh
    Secure Mobile Code Execution Service. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:53-62 [Conf]
  45. Adam J. Slagell, Kiran Lakkaraju, Katherine Luo
    FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:63-77 [Conf]
  46. Anh-Quynh Nguyen, Ruo Ando, Yoshiyasu Takefuji
    Centralized Security Policy Support for Virtual Machine. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:79-87 [Conf]
  47. Melanie R. Rieback, Georgi Gaydadjiev, Bruno Crispo, Rutger F. H. Hofman, Andrew S. Tanenbaum
    A Platform for RFID Security and Privacy Administration (Awarded Best Paper!). [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:89-102 [Conf]
  48. Chetan Shiva Shankar, Vanish Talwar, Subu Iyer, Yuan Chen, Dejan S. Milojicic, Roy H. Campbell
    Specification-Enhanced Policies for Automated Management of Changes in IT Systems. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:103-118 [Conf]
  49. Ning Wu, Alva L. Couch
    Experience Implementing an IP Address Closure. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:119-130 [Conf]
  50. Mark Burgess, Alva L. Couch
    Modeling Next Generation Configuration Management Tools. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:131-147 [Conf]
  51. Archana Ganapathi, Viji Ganapathi, David A. Patterson
    Windows XP Kernel Crash Analysis. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:149-159 [Conf]
  52. Doo San Sim, V. N. Venkatakrishnan
    SUEZ: A Distributed Safe Execution Environment for System Administration Trials. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:161-173 [Conf]
  53. Rajiv Ramnath, Sufatrio, Roland H. C. Yap, Wu Yongzheng
    WinResMon: A Tool for Discovering Software Dependencies, Configuration, and Requirements in Microsoft Windows. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:175-186 [Conf]
  54. Chad Verbowski, Juhan Lee, Xiaogang Liu, Roussi Roussev, Yi-Min Wang
    LiveOps: Systems Management as a Service. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:187-203 [Conf]
  55. Kyrre M. Begnum
    Managing Large Networks of Virtual Machines. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:205-214 [Conf]
  56. Narayan Desai, Rick Bradshaw, Cory Lueninghoener
    Directing Change Using Bcfg2. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:215-220 [Conf]
  57. Brian Trammell, Carrie Gates
    NAF: The NetSA Aggregated Flow Tool Suite. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:221-231 [Conf]
  58. Athanasios Douitsis, Dimitrios Kalogeras
    Interactive Network Management Visualization with SVG and AJAX. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:233-245 [Conf]
  59. Glenn A. Fink, Vyas Duggirala, Ricardo Correa, Chris North
    Bridging the Host-Network Divide: Survey, Taxonomy, and Solution. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:247-262 [Conf]
  60. Andrew Pavlo, Peter Couvares, Rebekah Gietzel, Anatoly Karp, Ian D. Alderman, Miron Livny, Charles Bacon
    The NMI Build & Test Laboratory: Continuous Integration Framework for Distributed Computing Software. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:263-273 [Conf]
  61. Jon Finke
    Unifying Unified Voice Messaging. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:275-285 [Conf]
  62. Daniel S. Crosta, Matthew J. Singleton, Benjamin A. Kuperman
    Fighting Institutional Memory Loss: The Trackle Integrated Issue and Solution Tracking System. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:287-298 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002