RCS—a system for version control
Software—Practice & Experience
Experiences with the Amoeba distributed operating system
Communications of the ACM
Neural networks: algorithms, applications, and programming techniques
Neural networks: algorithms, applications, and programming techniques
Understanding DCE
A tutorial on Reed-Solomon coding for fault-tolerance in RAID-like systems
Software—Practice & Experience
Distributed resource administration using Cfengine
Software—Practice & Experience
Software reliability via run-time result-checking
Journal of the ACM (JACM)
Automated system administration with feedback regulation
Software—Practice & Experience
Automated System Monitoring and Notification With Swatch
LISA '93 Proceedings of the 7th USENIX conference on System administration
Config: A Mechanism for Installing and Tracking System Configurations
LISA '94 Proceedings of the 8th USENIX conference on System administration
Towards a High-Level Machine Configuration System
LISA '94 Proceedings of the 8th USENIX conference on System administration
Automating the Administration of Heterogeneous LANs
LISA '96 Proceedings of the 10th USENIX conference on System administration
Implementing a Generalized Tool for Network Monitoring: ("Best Paper" Award!)
LISA '97 Proceedings of the 11th USENIX conference on System administration
Adaptive Locks For Frequently Scheduled Tasks With Unpredictable Runtimes
LISA '97 Proceedings of the 11th USENIX conference on System administration
Automation of Site Configuration Management
LISA '97 Proceedings of the 11th USENIX conference on System administration
An Analysis of UNIX System Configuration
LISA '97 Proceedings of the 11th USENIX conference on System administration
Shockwave Rider
A Mathematical Theory of Communication
A Mathematical Theory of Communication
TCON'95 Proceedings of the USENIX 1995 Technical Conference Proceedings
A comparison of methods for implementing adaptive security policies
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Bro: a system for detecting network intruders in real-time
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Unified support for heterogeneous security policies in distributed systems
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Operating system protection for fine-grained programs
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
A secure environment for untrusted helper applications confining the Wily Hacker
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Building blocks for atomicity in electronic commerce
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Murphy's law and computer security
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Information security technology?...don't rely on it: a case study in social engineering
SSYM'95 Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5
Fault tolerance in a distributed CHORUS/MiX system
ATEC '96 Proceedings of the 1996 annual conference on USENIX Annual Technical Conference
Two Dimensional Time-Series for Anomaly Detection and Regulation in Adaptive Systems
DSOM '02 Proceedings of the 13th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management: Management Technologies for E-Commerce and E-Business Applications
Theoretical System Administration
LISA '00 Proceedings of the 14th USENIX conference on System administration
An Expectant Chat About Script Maturity
LISA '00 Proceedings of the 14th USENIX conference on System administration
Peep (The Network Auralizer): Monitoring Your Network with Sound
LISA '00 Proceedings of the 14th USENIX conference on System administration
The Maelstrom: Network Service Debugging via "Ineffective Procedures"
LISA '01 Proceedings of the 15th USENIX conference on System administration
TemplateTree II: The Post-Installation Setup Tool
LISA '01 Proceedings of the 15th USENIX conference on System administration
CfAdmin: A User Interface for cfengine
LISA '01 Proceedings of the 15th USENIX conference on System administration
Pan: A High-Level Configuration Language
LISA '02 Proceedings of the 16th USENIX conference on System administration
Why Order Matters: Turing Equivalence in Automated Systems Administration
LISA '02 Proceedings of the 16th USENIX conference on System administration
Designing a Configuration Monitoring and Reporting Environment
LISA '03 Proceedings of the 17th USENIX conference on System administration
Seeking Closure in an Open World: A Behavioral Agent Approach to Configuration Management
LISA '03 Proceedings of the 17th USENIX conference on System administration
Splat: A Network Switch/Port Configuration Management Tool
LISA '03 Proceedings of the 17th USENIX conference on System administration
How Do We Evaluate Artificial Immune Systems?
Evolutionary Computation
Voluntary cooperation in pervasive computing services
LISA '05 Proceedings of the 19th conference on Large Installation System Administration Conference - Volume 19
Large scale Linux configuration with LCFG
ALS'00 Proceedings of the 4th annual Linux Showcase & Conference - Volume 4
Biology, immunology and information security
Information Security Tech. Report
Conserved Self Pattern Recognition Algorithm
ICARIS '08 Proceedings of the 7th international conference on Artificial Immune Systems
Dynamics of Resource Closure Operators
AIMS '09 Proceedings of the 3rd International Conference on Autonomous Infrastructure, Management and Security: Scalability of Networks and Services
Management without (Detailed) Models
ATC '09 Proceedings of the 6th International Conference on Autonomic and Trusted Computing
The future of biologically-inspired security: is there anything left to learn?
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
Combining Learned and Highly-Reactive Management
MACE '09 Proceedings of the 4th IEEE International Workshop on Modelling Autonomic Communications Environments
Can we certify systems for freedom from malware
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 2
Authorizing and directing configuration updates in contemporary it infrastructures
Proceedings of the 3rd ACM workshop on Assurable and usable security configuration
Testable system administration
Communications of the ACM
Testable System Administration
Queue - System Administration
What a webserver can learn from a zebra and what we learned in the process
CHIMIT '11 Proceedings of the 5th ACM Symposium on Computer Human Interaction for Management of Information Technology
Mind out of programmable matter: exploring unified models of emergent autonomy
WRAC'05 Proceedings of the Second international conference on Radical Agent Concepts: innovative Concepts for Autonomic and Agent-Based Systems
Why the first glass of wine is better than the seventh
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
Artificial Immune Systems: Models, Applications, and challenges
Proceedings of the 27th Annual ACM Symposium on Applied Computing
Hi-index | 0.02 |