Conferences in DBLP
Aloke Guha Power-Managed Storage: Longer Data Life and Lower Energy Consumption. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:- [Conf ] Douglas Hughes Spam. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:- [Conf ] Andrew Seely Command and Control: System Administration at U.S. Central Command. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:- [Conf ] Mark Loveless Corporate Security: A Hacker Perspective. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:- [Conf ] Thomas A. Limoncelli , Adam Moskowitz How to Get Your Paper Accepted at LISA. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:- [Conf ] Thomas A. Limoncelli Site Reliability at Google/My First Year at Google. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:- [Conf ] Michael Eisler NFSv4. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:- [Conf ] Thomas Limoncelli Mac OS X. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:- [Conf ] Thomas A. Limoncelli Time Management for System Administrators. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:- [Conf ] W. Curtis Preston Backups. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:- [Conf ] Danny O'Brien The Last, Best Hope: Sysadmins and DBAs as the Last Guardians of Privacy. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:- [Conf ] Michael Baum 0002 Virtualization: The Good, the Bad, the Ugly. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:- [Conf ] Howard Chu LDAP. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:- [Conf ] Esther Filderman AFS. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:- [Conf ] Narayan Desai bcfg2. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:- [Conf ] D. J. Byrne Open Source Software and Its Role in Space Exploration. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:- [Conf ] Dan Kaminsky Black Ops 2006: Pattern Recognition. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:- [Conf ] Lee Damon , Evan Marcus Is Entropy Winning? Drowning in the Data Tsunami. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:- [Conf ] Dmitri Alperovitch Zombies and Botnets: Attacks on Messaging Security by Organized Criminal Enterprises. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:- [Conf ] Douglas Hughes SNMP. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:- [Conf ] Jon Finke Identity Management. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:- [Conf ] Luke Kanies Puppet. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:- [Conf ] Eric Hennessey High Availability: From Luxury to Commonplace Necessity in 10 Years. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:- [Conf ] Cat Okita What Do You Mean, Identity 2.0?. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:- [Conf ] Elizabeth D. Zwicky Teaching Problem Solving: You Can and You Should. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:- [Conf ] Joseph Radin UNIX and Microsoft Interoperability. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:- [Conf ] Robert Sparks VoIP. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:- [Conf ] Mazda A. Marvasti Everything You Know About Monitoring Is Wrong. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:- [Conf ] Adam Moskowitz Bad Interview Questions. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:- [Conf ] Daniel V. Klein Perfect Data in an Imperfect World. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:- [Conf ] Patrick McGovern Leveraging the IT Community. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:- [Conf ] John Littell Spam. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:- [Conf ] Chad Verbowski System Administration: Drowning in Management Complexity. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:- [Conf ] Alex Muentz Sysadmins, Network Managers, and Wiretap Law. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:- [Conf ] Cory Doctorow Keynote Address: Hollywood's Secret War on Your NOC. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:- [Conf ] Adam Haberlach QA and the System Administrator. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:- [Conf ] Chris Page Build a Linux Oracle RAC Cluster. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:- [Conf ] John Arrasjid , John Gannon , Michael DiPetrillo Virtualization and the Virtual Infrastructure. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:- [Conf ] W. Curtis Preston Seriously, Tape-Only Backup Systems Are Dead. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:- [Conf ] Brent ByungHoon Kang , Gautam Singaraju , Sumeet Jain Privilege Messaging: An Authorization Framework over Email Infrastructure. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:1-16 [Conf ] Roberto Cecchini , Fulvia Costa , Alberto D'Ambrosio , Domenico Diacono , Giacomo Fazio , Antonio Forte , Matteo Genghini , Michele Michelotto , Ombretta Pinazza , Alfonso Sparano Securing Electronic Mail on the National Research and Academic Network of Italy. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:17-29 [Conf ] Daniel V. Klein A Forensic Analysis of a Distributed Two-Stage Web-Based Spam Attack (Awarded Honorable Mention!). [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:31-40 [Conf ] Robert M. Marmorstein , Phil Kearns Firewall Analysis with Policy-based Host Classification. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:41-51 [Conf ] Lap-Chung Lam , Yang Yu , Tzi-cker Chiueh Secure Mobile Code Execution Service. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:53-62 [Conf ] Adam J. Slagell , Kiran Lakkaraju , Katherine Luo FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:63-77 [Conf ] Anh-Quynh Nguyen , Ruo Ando , Yoshiyasu Takefuji Centralized Security Policy Support for Virtual Machine. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:79-87 [Conf ] Melanie R. Rieback , Georgi Gaydadjiev , Bruno Crispo , Rutger F. H. Hofman , Andrew S. Tanenbaum A Platform for RFID Security and Privacy Administration (Awarded Best Paper!). [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:89-102 [Conf ] Chetan Shiva Shankar , Vanish Talwar , Subu Iyer , Yuan Chen , Dejan S. Milojicic , Roy H. Campbell Specification-Enhanced Policies for Automated Management of Changes in IT Systems. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:103-118 [Conf ] Ning Wu , Alva L. Couch Experience Implementing an IP Address Closure. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:119-130 [Conf ] Mark Burgess , Alva L. Couch Modeling Next Generation Configuration Management Tools. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:131-147 [Conf ] Archana Ganapathi , Viji Ganapathi , David A. Patterson Windows XP Kernel Crash Analysis. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:149-159 [Conf ] Doo San Sim , V. N. Venkatakrishnan SUEZ: A Distributed Safe Execution Environment for System Administration Trials. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:161-173 [Conf ] Rajiv Ramnath , Sufatrio , Roland H. C. Yap , Wu Yongzheng WinResMon: A Tool for Discovering Software Dependencies, Configuration, and Requirements in Microsoft Windows. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:175-186 [Conf ] Chad Verbowski , Juhan Lee , Xiaogang Liu , Roussi Roussev , Yi-Min Wang LiveOps: Systems Management as a Service. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:187-203 [Conf ] Kyrre M. Begnum Managing Large Networks of Virtual Machines. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:205-214 [Conf ] Narayan Desai , Rick Bradshaw , Cory Lueninghoener Directing Change Using Bcfg2. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:215-220 [Conf ] Brian Trammell , Carrie Gates NAF: The NetSA Aggregated Flow Tool Suite. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:221-231 [Conf ] Athanasios Douitsis , Dimitrios Kalogeras Interactive Network Management Visualization with SVG and AJAX. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:233-245 [Conf ] Glenn A. Fink , Vyas Duggirala , Ricardo Correa , Chris North Bridging the Host-Network Divide: Survey, Taxonomy, and Solution. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:247-262 [Conf ] Andrew Pavlo , Peter Couvares , Rebekah Gietzel , Anatoly Karp , Ian D. Alderman , Miron Livny , Charles Bacon The NMI Build & Test Laboratory: Continuous Integration Framework for Distributed Computing Software. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:263-273 [Conf ] Jon Finke Unifying Unified Voice Messaging. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:275-285 [Conf ] Daniel S. Crosta , Matthew J. Singleton , Benjamin A. Kuperman Fighting Institutional Memory Loss: The Trackle Integrated Issue and Solution Tracking System. [Citation Graph (0, 0)][DBLP ] LISA, 2006, pp:287-298 [Conf ]