default search action
25th LISA 2011: Boston, MA, USA
- Thomas A. Limoncelli, Doug Hughes:
The Past, Present, and Future of System Administration: Proceedings of the 25th Large Installation System Administration Conference, LISA 2011, Boston, MA, USA, December 4-9, 2011. USENIX Association 2011 - Gong Zhang, Ling Liu:
Why Do Migrations Fail and What Can We Do about It? - Marc Chiarini:
Provenance for System Troubleshooting. - Rocky Bernstein:
Debugging Makefiles with remake. - Stefan Wallin, Claes Wikström:
Automating Network and Service Configuration Using NETCONF and YANG. - Jon Kuroda, Jeff Anderson-Lee, Albert Goto, Scott McNally:
Adventures in (Small) Datacenter Migration (Practice & Experience Report). - Thorsten Fischer, Thomas Hühn, Robin Kuck, Ruben Merz, Julius Schulz-Zander, Cigdem Sengul:
Experiences with BOWL: Managing an Outdoor WiFi Network (or How to Keep Both Internet Users and Researchers Happy?) (Practice & Experience Report). - Stefan Weigert, Matti A. Hiltunen, Christof Fetzer:
Community-based Analysis of Netflow for Early Detection of Security Incidents. - Melissa Danforth:
WCIS: A Prototype for Detecting Zero-Day Attacks in Web Server Requests. - Bertrand Sobesto, Michel Cukier, Matti A. Hiltunen, Dave Kormann, Gregg Vesonder, Robin Berthier:
DarkNOC: Dashboard for Honeypot Management. - Damiano Bolzoni, Christiaan Schade, Sandro Etalle:
A Cuckoo's Egg in the Malware Nest: On-the-fly Signature-less Malware Analysis, Detection, and Containment for Large Networks. - Georgios Kakavelakis, Joel Young:
Auto-learning of SMTP TCP Transport-Layer Features for Spam and Abusive Message Detection. - John F. Williamson, Sergey Bratus, Michael E. Locasto:
Using Active Intrusion Detection to Recover Network Trust. - Eric Shamow:
Getting to Elastic: Adapting a Legacy Vertical Application Environment for Scalability. - Nicolas Brousse:
Scaling on EC2 in a Fast-Paced Environment (Practice & Experience Report). - Haythum Babiker, Irena Nikolova, Kiran Kumar Chittimaneni:
Deploying IPv6 in the Google Enterprise Network: Lessons Learned (Practice & Experience Report). - Cory Lueninghoener, Daryl Grunau, Timothy Harrington, Kathleen Kelly, Quellyn Snead:
Bringing Up Cielo: Experiences with a Cray XE6 System, or, Getting Started with Your New 140k Processor System (Practice & Experience Report). - Mark Chamness:
Capacity Forecasting in a Backup Storage Environment (Practice & Experience Report). - Fred Douglis, Deepti Bhardwaj, Hangwei Qian, Philip Shilane:
Content-aware Load Balancing for Distributed Backup. - Roland M. van Rijswijk, Joost van Dijk:
Tiqr: A Novel Take on Two-Factor Authentication. - Brad Lhotsky:
Building Useful Security Infrastructure for Free (Practice & Experience Report). - Scott Campbell:
Local System Security via SSHD Instrumentation. - Pierre Vignéras:
Sequencer: Smart Control of Hardware and Software Components in Clusters (and Beyond). - Herry Herry, Paul Anderson, Gerhard Wickler:
Automated Planning for Configuration Changes. - Bart Van Brabant, Joris Peeraer, Wouter Joosen:
Fine-grained Access-control for the Puppet Configuration Language. - Chris St. Pierre, Matt Hermanson:
Staging Package Deployment via Repository Management. - Philip J. Guo:
CDE: Run Any Linux Application On-Demand Without Installation. - Shaya Potter, Jason Nieh:
Improving Virtual Appliance Management through Virtual Layered File Systems.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.