16. LISA 2002:
Philadelphia,
PA,
USA
Proceedings of the 16th Conference on Systems Administration (LISA 2002), Philadelphia, PA, November 3-8, 2002.
USENIX 2002, ISBN 1-931971-03-X @proceedings{DBLP:conf/lisa/2002,
title = {Proceedings of the 16th Conference on Systems Administration
(LISA 2002), Philadelphia, PA, November 3-8, 2002},
booktitle = {LISA},
publisher = {USENIX},
year = {2002},
isbn = {1-931971-03-X},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
Opening Remarks,
Awards,
and Keynote
- Jim Reese:
Keynote: Scaling the Web: An Overview of Google (A Linux Cluster for Fun and Profit).
Working Smarter
Service,
Risk,
and Scale
- Alain J. Mayer:
Application Aware Management of Internet Data Center Software.
33-46
- Kevin Adams:
Geographically Distributed System for Catastrophic Recovery.
47-64
- Jon Finke:
Embracing and Extending Windows 2000.
65-74
Practical Theory
Short Subjects
Security
- V. N. Venkatakrishnan, R. Sekar, T. Kamat, S. Tsipa, Zhenkai Liang:
An Approach for Secure Software Installation.
219-226
- Atsushi Totsuka, Hidenari Ohwada, Nobuhisa Fujita, Debasish Chakraborty, Glenn Mansfield Keeni, Norio Shiratori:
Network-based Intrusion Detection - Modeling for a Larger Picture.
227-232
- Steve Beattie, Seth Arnold, Crispin Cowan, Perry Wagle, Chris Wright, Adam Shostack:
Timing the Application of Security Patches for Optimal Uptime.
233-242
General Track
Logging and Monitoring
- Adam Sah:
A New Architecture for Managing Enterprise Log Data.
121-132
- Tetsuji Takada, Hideki Koike:
MieLog: A Highly Interactive Visual Log Browser Using Information Visualization and Statistical Analysis.
133-144
- Jon Finke:
Process Monitor: Detecting Events That Didn't Happen.
145-154
Service and Network Upgrades
Invited Talks
Work-in-Progress Reports (WiPs)
Networking
Security
Guru Sessions
Copyright © Fri Mar 12 17:18:19 2010
by Michael Ley (ley@uni-trier.de)