


default search action
login - The Usenix Magazine, Volume 32
Volume 32, Number 1, February 2007
- Rik Farrow:

Musings.
- Simson L. Garfinkel:

Commodity Grid Computing with Amazon's S3 and EC2. - Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Homburg, Andrew S. Tanenbaum:

Roadmap to a Failure-Resilient Operating System. - Steven Hand, Andrew Warfield, Keir Fraser:

Hardware Virtualization with Xen.
- Mark Burgess:

Configuration Management: Models and Myths. Part4: There's No I/O Without U. - Leigh Griffin, John Ronan:

Xen Installation and Configuration. - Robert M. Marmorstein, Phil Kearns:

Debugging a Firewall Policy with Policy Mapping.
- David N. Blank-Edelman:

Practical Perl Tools: Spawning. - Robert Haskins:

ISPadmin: DHCP Services. - Heison Chak:

Virtualizing Asterisk. - Robert G. Ferrell:

/dev/random.
- Elizabeth D. Zwicky, et al.:

Book Reviews.
- Hans Boehm, Bill Pugh, Doug Lea:

Multithreading in C and C++.
- Ellie Young:

USENIX Board of Directors Meetings and Actions. - Jane-Ellen Long:

SAGE Update.
Volume 32, Number 2, April 2007
- Rik Farrow:

Musings.
- Glenn A. Fink, Deborah A. Frincke:

Autonomic Computing: Freedom or Threat? - Chad Verbowski:

The Secret Lives of Computers Exposed: Flight Data Recorder for Windows. - Brendan Quinn:

Lessons Learned from Living with LDAP. - John Lloyd:

Introducing System Engineering to the System Admin. - Rik Farrow:

Promises, Promises: An Interview with Mark Burgess. - Daniel L. Appelman:

Spam and Blogs. Part 1: Spam: A Balancing Act. - Thomas Sluyter:

All Quiet on the Western Front: A Discussion on the Necessity of Good Reporting.
- David N. Blank-Edelman:

Practical Perl Tools: These Inodes Were Made for Walkin'. - Robert Haskins:

VoIP in an Internet Service Provider Network. - Heison Chak:

Asterisk Appliance. - Robert G. Ferrell:

/dev/random.
- Elizabeth Zwicky, et al.:

Book Reviews.
- Nicholas M. Stoughton:

Why Standardize?
- Jane-Ellen Long, Alva L. Couch:

SAGE Update.
Volume 32, Number 3, June 2007
- Rik Farrow:

Musings.
- Marshall K. McKusick:

A Brief History of the BSD Fast File System. - Pawel Jakub Dawidek, Marshall K. McKusick:

Porting the Solaris ZFS File System to the FreeBSD Operating System. - Avantika Mathur, Mingming Cao, Andreas Dilger:

Ext4: The Next Generation of the Ext3 File System.
- Dan Geer:

A Quant Looks at the Future. - Vassilis Prevelakis:

Supporting a Security Laboratory.
- Daniel L. Appelman:

Spam and Blogs. Part 2: Blogs, for Good or Ill. - Alexander Muentz:

Script Kiddies with Briefcases: The Legal System as Threat.
- David N. Blank-Edelman:

Practical Perl Tools: Impractical Perl Tools. - Robert G. Ferrell:

/dev/random.
- Elizabeth Zwicky, et al.:

Book Reviews.
- Alex Aiken:

In Memoriam: John W. Backus, 1924-2007.
Volume 32, Number 4, August 2007
- Rik Farrow:

Musings.
- Michael Piatek, Tomas Isdal, Thomas E. Anderson, Arvind Krishnamurthy, Arun Venkataramani:

Building BitTyrant, a (More) Strategic BitTorrent Client. - Alva L. Couch:

Should the Root Prompt Require a Road Test? - Octave Orgeron:

An Introduction to Logical Domains, Part 1. - Emin Gün Sirer, Rik Farrow:

Some Lesser-Known Laws of Computer Science. - Massimo Bernaschi, Francesco Casadei, Samuele Ruco:

Migration of Secure Connections Using SockMi.
- David N. Blank-Edelman:

Practical Perl Tools: Peter Piper Picked a Peck ofPDFs. - David Josephsen:

iVoyeur: A View from Someplace Nearby. - Heison Chak:

Deviating Alternatives to Asterisk. - Robert G. Ferrell:

/dev/random.
- Nick Stoughton:

An Update on Standards: Revision Fever.
- Elizabeth Zwicky, et al.:

Book Reviews.
- Toni Veglia:

Summary of USENIX Board of DirectorsMeetings and Actions. - Rob Kolstad:

Flame and STUG Awards. - Ellie Young:

USENIX Association Financial Report for 2006.
Volume 32, Number 5, October 2007
- Rik Farrow:

Musings.
- Andrey Mirtchovski, Latchesar Ionkov:

Why Some Dead OSes Still Matter.
- Cat Okita:

(Digital) Identity 2.0.
- Alexander Muentz:

Hardening Your Systems Against Litigation.
- Octave Orgeron:

An Introduction to Logical Domains, Part 2.
- Hemant Sengar:

IP Telephony.
- David N. Blank-Edelman:

Practical Perl Tools: Let Me Draw You a Picture. - David Josephsen:

iVoyeur: Opaque Brews. - Robert G. Ferrell:

/dev/random.
- Nicholas M. Stoughton:

Whither C++?
- Elizabeth Zwicky, et al.:

Book Reviews.
- Dan S. Wallach:

Creating the EVT Workshop. - Ellie Young:

2008 USENIX Nominating Committee.
Volume 32, Number 6, December 2007
- Rik Farrow:

Musings.
- David Dittrich, Sven Dietrich:

Command and Control Structures in Malware: From Handler/Agent to P2P. - Sam Stover, David Dittrich, John Hernandez, Sven Dietrich:

Analysis of the Storm and Nugache Trojans: P2P Is Here. - Tal Garfinkel, Andrew Warfield:

What Virtualization Can Do for Security. - Gernot Heiser:

Your System Is Secure? Prove It! - Gary McGraw, Rik Farrow:

Exploiting Online Games: An Interview.
- Mike Rash:

IDS Signature Matching with iptables, psad, and fwsnort.
- David N. Blank-Edelman:

Practical Perl Tools: Perl Meets Nmap and p0f. - David Josephsen:

iVoyeur: Mystical Flows. - Heison Chak:

Asterisk and LumenVox ASR. - Robert G. Ferrell:

/dev/random.
- Elizabeth Zwicky, et al.:

Book Reviews.
- Ellie Young:

Thanks to Our Volunteers. - Ellie Young:

2008 Election of the USENIX Board of Directors. - Rob Kolstad:

USACO Update.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














