Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/usenix-login/usenix-login35.bht:"
@article{DBLP:journals/usenix-login/Bjorgeengen10, author = {Jarle Bj{\o}rgeengen}, title = {Puppet and Cfengine Compared: Time and Resource Consumption}, journal = {login Usenix Mag.}, volume = {35}, number = {1}, year = {2010}, url = {https://www.usenix.org/publications/login/february-2010-volume-35-number-1/puppet-and-cfengine-compared-time-and-resource}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Bjorgeengen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Blank-Edelman10, author = {David N. Blank{-}Edelman}, title = {Practical Perl Tools: You Never Forget Your First Date (Object)}, journal = {login Usenix Mag.}, volume = {35}, number = {1}, year = {2010}, url = {https://www.usenix.org/publications/login/february-2010-volume-35-number-1/practical-perl-tools-you-never-forget-your-first}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Blank-Edelman10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Blank-Edelman10a, author = {David N. Blank{-}Edelman}, title = {Practical Perl Tools: Let Me Help You Get Regular}, journal = {login Usenix Mag.}, volume = {35}, number = {2}, year = {2010}, url = {https://www.usenix.org/publications/login/april-2010-volume-35-number-2/practical-perl-tools-let-me-help-you-get-regular}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Blank-Edelman10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Blank-Edelman10b, author = {David N. Blank{-}Edelman}, title = {Practical Perl Tools: Making Stuff Up}, journal = {login Usenix Mag.}, volume = {35}, number = {3}, year = {2010}, url = {https://www.usenix.org/publications/login/june-2010-volume-35-number-3/practical-perl-tools-making-stuff}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Blank-Edelman10b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Blank-Edelman10c, author = {David N. Blank{-}Edelman}, title = {Practical Perl Tools: Random Acts of Kindness}, journal = {login Usenix Mag.}, volume = {35}, number = {4}, year = {2010}, url = {https://www.usenix.org/publications/login/august-2010-volume-35-number-4/practical-perl-tools-random-acts-kindness}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Blank-Edelman10c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Blank-Edelman10d, author = {David N. Blank{-}Edelman}, title = {Practical Perl Tools: Perhaps Size Really Does Matter}, journal = {login Usenix Mag.}, volume = {35}, number = {5}, year = {2010}, url = {https://www.usenix.org/publications/login/october-2010-volume-35-number-5/practical-perl-tools-perhaps-size-really-does}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Blank-Edelman10d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Blank-Edelman10e, author = {David N. Blank{-}Edelman}, title = {Practical Perl Tools: Family Man}, journal = {login Usenix Mag.}, volume = {35}, number = {6}, year = {2010}, url = {https://www.usenix.org/publications/login/december-2010-volume-35-number-6/practical-perl-tools-family-man}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Blank-Edelman10e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Burgess10, author = {Mark Burgess}, title = {"The Cloud Minders"}, journal = {login Usenix Mag.}, volume = {35}, number = {1}, year = {2010}, url = {https://www.usenix.org/publications/login/february-2010-volume-35-number-1/cloud-minders}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Burgess10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/BurgessR10, author = {Mark Burgess and Carolyn Rowland}, title = {The Business Value of System Administration}, journal = {login Usenix Mag.}, volume = {35}, number = {2}, year = {2010}, url = {https://www.usenix.org/publications/login/april-2010-volume-35-number-2/business-value-system-administration}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/BurgessR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/CheckowaySR10, author = {Stephen Checkoway and Hovav Shacham and Eric Rescorla}, title = {Don't Take LaTeX Files from Strangers}, journal = {login Usenix Mag.}, volume = {35}, number = {4}, year = {2010}, url = {https://www.usenix.org/publications/login/august-2010-volume-35-number-4/dont-take-latex-files-strangers}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/CheckowaySR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/ChingS10, author = {Brandon Ching and Sam Stover}, title = {Book Reviews}, journal = {login Usenix Mag.}, volume = {35}, number = {3}, year = {2010}, url = {https://www.usenix.org/publications/login/june-2010-volume-35-number-3/book-reviews}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/ChingS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/ChoffnesB10, author = {David R. Choffnes and Fabi{\'{a}}n E. Bustamante}, title = {Taming the Torrent}, journal = {login Usenix Mag.}, volume = {35}, number = {1}, year = {2010}, url = {https://www.usenix.org/publications/login/february-2010-volume-35-number-1/taming-torrent}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/ChoffnesB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Couch10, author = {Alva L. Couch}, title = {Configuration Management Phenomenology}, journal = {login Usenix Mag.}, volume = {35}, number = {1}, year = {2010}, url = {https://www.usenix.org/publications/login/february-2010-volume-35-number-1/configuration-management-phenomenology}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Couch10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Couch10a, author = {Alva L. Couch}, title = {From Tasks to Assurances: Redefining System Administration}, journal = {login Usenix Mag.}, volume = {35}, number = {2}, year = {2010}, url = {https://www.usenix.org/publications/login/april-2010-volume-35-number-2/tasks-assurances-redefining-system-administration}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Couch10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Couch10b, author = {Alva L. Couch}, title = {Programming with Technological Ritual and Alchemy}, journal = {login Usenix Mag.}, volume = {35}, number = {3}, year = {2010}, url = {https://www.usenix.org/publications/login/june-2010-volume-35-number-3/programming-technological-ritual-and-alchemy}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Couch10b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Dickison10, author = {Anne Dickison}, title = {Calling All Bloggers}, journal = {login Usenix Mag.}, volume = {35}, number = {2}, year = {2010}, url = {https://www.usenix.org/publications/login/april-2010-volume-35-number-2/calling-all-bloggers}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Dickison10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Dilley10, author = {Ron Dilley}, title = {Making Sense of Logs}, journal = {login Usenix Mag.}, volume = {35}, number = {4}, year = {2010}, url = {https://www.usenix.org/publications/login/august-2010-volume-35-number-4/making-sense-logs}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Dilley10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Drunen10, author = {Rudi van Drunen}, title = {Peculiarities of Radio Devices}, journal = {login Usenix Mag.}, volume = {35}, number = {1}, year = {2010}, url = {https://www.usenix.org/publications/login/february-2010-volume-35-number-1/peculiarities-radio-devices}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Drunen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Drunen10a, author = {Rudi van Drunen}, title = {Small Embedded Systems}, journal = {login Usenix Mag.}, volume = {35}, number = {3}, year = {2010}, url = {https://www.usenix.org/publications/login/june-2010-volume-35-number-3/small-embedded-systems}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Drunen10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Evard10, author = {R{\'{e}}my Evard}, title = {Nominating Committee Report, 2010 Election for the {USENIX} Board of Directors}, journal = {login Usenix Mag.}, volume = {35}, number = {1}, year = {2010}, url = {https://www.usenix.org/publications/login/february-2010-volume-35-number-1/nominating-committee-report-2010-election-usenix}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Evard10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Farrow10, author = {Rik Farrow}, title = {Musings}, journal = {login Usenix Mag.}, volume = {35}, number = {1}, year = {2010}, url = {https://www.usenix.org/publications/login/february-2010-volume-35-number-1/musings}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Farrow10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Farrow10a, author = {Rik Farrow}, title = {Musings}, journal = {login Usenix Mag.}, volume = {35}, number = {2}, year = {2010}, url = {https://www.usenix.org/publications/login/april-2010-volume-35-number-2/musings}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Farrow10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Farrow10b, author = {Rik Farrow}, title = {The Barrelfish Multikernel: An Interview with Timothy Roscoe}, journal = {login Usenix Mag.}, volume = {35}, number = {2}, year = {2010}, url = {https://www.usenix.org/publications/login/april-2010-volume-35-number-2/barrelfish-multikernel-interview-timothy-roscoe}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Farrow10b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Farrow10c, author = {Rik Farrow}, title = {Musings}, journal = {login Usenix Mag.}, volume = {35}, number = {3}, year = {2010}, url = {https://www.usenix.org/publications/login/june-2010-volume-35-number-3/musings}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Farrow10c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Farrow10d, author = {Rik Farrow}, title = {Musings}, journal = {login Usenix Mag.}, volume = {35}, number = {4}, year = {2010}, url = {https://www.usenix.org/publications/login/august-2010-volume-35-number-4/musings}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Farrow10d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Farrow10e, author = {Rik Farrow}, title = {Musings}, journal = {login Usenix Mag.}, volume = {35}, number = {5}, year = {2010}, url = {https://www.usenix.org/publications/login/october-2010-volume-35-number-5/musings}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Farrow10e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Farrow10f, author = {Rik Farrow}, title = {19th {USENIX} Security Symposium Reports}, journal = {login Usenix Mag.}, volume = {35}, number = {6}, year = {2010}, url = {https://www.usenix.org/publications/login/december-2010-volume-35-number-6/19th-usenix-security-symposium-reports}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Farrow10f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Ferrell10, author = {Robert G. Ferrell}, title = {/dev/random: Project Management - APrimer}, journal = {login Usenix Mag.}, volume = {35}, number = {1}, year = {2010}, url = {https://www.usenix.org/publications/login/february-2010-volume-35-number-1/devrandom-project-management\%E2\%80\%94-primer}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Ferrell10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Ferrell10a, author = {Robert G. Ferrell}, title = {/dev/random: Less Successful Network Protocols}, journal = {login Usenix Mag.}, volume = {35}, number = {2}, year = {2010}, url = {https://www.usenix.org/publications/login/april-2010-volume-35-number-2/devrandom-less-successful-network-protocols}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Ferrell10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Ferrell10b, author = {Robert G. Ferrell}, title = {/dev/random: Five Common Misconceptions About Information Security}, journal = {login Usenix Mag.}, volume = {35}, number = {3}, year = {2010}, url = {https://www.usenix.org/publications/login/june-2010-volume-35-number-3/devrandom-five-common-misconceptions-about}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Ferrell10b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Ferrell10c, author = {Robert G. Ferrell}, title = {/dev/random: {A} Debatably Helpful Guide to {IT} Disaster Planning}, journal = {login Usenix Mag.}, volume = {35}, number = {4}, year = {2010}, url = {https://www.usenix.org/publications/login/august-2010-volume-35-number-4/devrandom-debatably-helpful-guide-it-disaster}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Ferrell10c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Ferrell10d, author = {Robert G. Ferrell}, title = {/dev/random: Airport Security and Other Myths}, journal = {login Usenix Mag.}, volume = {35}, number = {5}, year = {2010}, url = {https://www.usenix.org/publications/login/october-2010-volume-35-number-5/devrandom-airport-security-and-other-myths}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Ferrell10d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Ferrell10e, author = {Robert G. Ferrell}, title = {/dev/random}, journal = {login Usenix Mag.}, volume = {35}, number = {6}, year = {2010}, url = {https://www.usenix.org/publications/login/december-2010-volume-35-number-6/devrandom}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Ferrell10e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Galvin10, author = {Peter Baer Galvin}, title = {Pete's All Things Sun: Crossbow}, journal = {login Usenix Mag.}, volume = {35}, number = {1}, year = {2010}, url = {https://www.usenix.org/publications/login/february-2010-volume-35-number-1/petes-all-things-sun-crossbow}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Galvin10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Galvin10a, author = {Peter Baer Galvin}, title = {Pete's All Things Sun: Open Source and Free Deduplication}, journal = {login Usenix Mag.}, volume = {35}, number = {2}, year = {2010}, url = {https://www.usenix.org/publications/login/april-2010-volume-35-number-2/petes-all-things-sun-open-source-and-free}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Galvin10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Galvin10b, author = {Peter Baer Galvin}, title = {Pete's All Things Sun: Exadata {V2} Architecture and Why It Matters}, journal = {login Usenix Mag.}, volume = {35}, number = {3}, year = {2010}, url = {https://www.usenix.org/publications/login/june-2010-volume-35-number-3/petes-all-things-sun-exadata-v2-architecture-and-why}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Galvin10b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Galvin10c, author = {Peter Baer Galvin}, title = {Pete's All Things Sun: The Status of Sun Products}, journal = {login Usenix Mag.}, volume = {35}, number = {4}, year = {2010}, url = {https://www.usenix.org/publications/login/august-2010-volume-35-number-4/petes-all-things-sun-status-sun-products}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Galvin10c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Galvin10d, author = {Peter Baer Galvin}, title = {Pete's All Things Sun: The "Problem" with {NAS}}, journal = {login Usenix Mag.}, volume = {35}, number = {5}, year = {2010}, url = {https://www.usenix.org/publications/login/october-2010-volume-35-number-5/petes-all-things-sun-problem-nas}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Galvin10d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Galvin10e, author = {Peter Baer Galvin}, title = {Pete's All Things Sun: Comparing Solaris to RedHat Enterprise and {AIX}}, journal = {login Usenix Mag.}, volume = {35}, number = {6}, year = {2010}, url = {https://www.usenix.org/publications/login/december-2010-volume-35-number-6/petes-all-things-sun-comparing-solaris-redhat}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Galvin10e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Geer10, author = {Dan Geer}, title = {Vulnerable Compliance}, journal = {login Usenix Mag.}, volume = {35}, number = {6}, year = {2010}, url = {https://www.usenix.org/publications/login/december-2010-volume-35-number-6/vulnerable-compliance}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Geer10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/HicksFKMS10, author = {Matthew Hicks and Murph Finnicum and Samuel T. King and Milo M. K. Martin and Jonathan M. Smith}, title = {Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically}, journal = {login Usenix Mag.}, volume = {35}, number = {6}, year = {2010}, url = {https://www.usenix.org/publications/login/december-2010-volume-35-number-6/overcoming-untrusted-computing-base-detecting}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/HicksFKMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Josephsen10, author = {Dave Josephsen}, title = {iVoyeur: Breaking Up Is Hard to Do}, journal = {login Usenix Mag.}, volume = {35}, number = {1}, year = {2010}, url = {https://www.usenix.org/publications/login/february-2010-volume-35-number-1/ivoyeur-breaking-hard-do}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Josephsen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Josephsen10a, author = {Dave Josephsen}, title = {iVoyeur: {A} Question of Scale}, journal = {login Usenix Mag.}, volume = {35}, number = {2}, year = {2010}, url = {https://www.usenix.org/publications/login/april-2010-volume-35-number-2/ivoyeur-question-scale}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Josephsen10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Josephsen10b, author = {Dave Josephsen}, title = {iVoyeur: Pockets-o-Packets, Part 1}, journal = {login Usenix Mag.}, volume = {35}, number = {3}, year = {2010}, url = {https://www.usenix.org/publications/login/june-2010-volume-35-number-3/ivoyeur-pockets-o-packets-part-1}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Josephsen10b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Josephsen10c, author = {Dave Josephsen}, title = {iVoyeur: Pockets-o-Packets, Part 2}, journal = {login Usenix Mag.}, volume = {35}, number = {4}, year = {2010}, url = {https://www.usenix.org/publications/login/august-2010-volume-35-number-4/ivoyeur-pockets-o-packets-part-2}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Josephsen10c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Josephsen10d, author = {Dave Josephsen}, title = {iVoyeur: Pockets-o-Packets, Part 3}, journal = {login Usenix Mag.}, volume = {35}, number = {5}, year = {2010}, url = {https://www.usenix.org/publications/login/october-2010-volume-35-number-5/ivoyeur-pockets-o-packets-part-3}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Josephsen10d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Josephsen10e, author = {Dave Josephsen}, title = {iVoyeur: Ganglia on the Brain}, journal = {login Usenix Mag.}, volume = {35}, number = {6}, year = {2010}, url = {https://www.usenix.org/publications/login/december-2010-volume-35-number-6/ivoyeur-ganglia-brain}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Josephsen10e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/JosephsonBF010, author = {William K. Josephson and Lars Ailo Bongo and David Flynn and Kai Li}, title = {{DFS:} {A} File System for Virtualized Flash Storage}, journal = {login Usenix Mag.}, volume = {35}, number = {2}, year = {2010}, url = {https://www.usenix.org/publications/login/april-2010-volume-35-number-2/dfs-file-system-virtualized-flash-storage}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/JosephsonBF010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Kamath10, author = {Sean Kamath}, title = {Whither LISA?}, journal = {login Usenix Mag.}, volume = {35}, number = {1}, year = {2010}, url = {https://www.usenix.org/publications/login/february-2010-volume-35-number-1/whither-lisa}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Kamath10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/KatzS10, author = {Lou Katz and Peter H. Salus}, title = {In Memoriam: Lewis A. Law, 1932-2010}, journal = {login Usenix Mag.}, volume = {35}, number = {2}, year = {2010}, url = {https://www.usenix.org/publications/login/april-2010-volume-35-number-2/memoriam-lewis-law-1932\%E2\%80\%932010}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/KatzS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Keromytis10, author = {Angelos D. Keromytis}, title = {A Look at VoIP Vulnerabilities}, journal = {login Usenix Mag.}, volume = {35}, number = {1}, year = {2010}, url = {https://www.usenix.org/publications/login/february-2010-volume-35-number-1/look-voip-vulnerabilities}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Keromytis10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Kirouac10, author = {Brian Kirouac}, title = {Secure Email for Mobile Devices}, journal = {login Usenix Mag.}, volume = {35}, number = {5}, year = {2010}, url = {https://www.usenix.org/publications/login/october-2010-volume-35-number-5/secure-email-mobile-devices}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Kirouac10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Kolstad10, author = {Rob Kolstad}, title = {{USA} Wins World High School Programming Championships - Snaps Extended China Winning Streak}, journal = {login Usenix Mag.}, volume = {35}, number = {5}, year = {2010}, url = {https://www.usenix.org/publications/login/october-2010-volume-35-number-5/usa-wins-world-high-school-programming}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Kolstad10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/LeidnerB10, author = {Jochen L. Leidner and Gary Berosik}, title = {Building and Installing a Hadoop/Mapreduce Cluster from Commodity Components: {A} Case Study}, journal = {login Usenix Mag.}, volume = {35}, number = {1}, year = {2010}, url = {https://www.usenix.org/publications/login/february-2010-volume-35-number-1/building-and-installing-hadoopmapreduce-cluster}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/LeidnerB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/LiRA10, author = {Bo Li and Elena Reshetova and Tuomas Aura}, title = {Symbian {OS} Platform Security Model}, journal = {login Usenix Mag.}, volume = {35}, number = {4}, year = {2010}, url = {https://www.usenix.org/publications/login/august-2010-volume-35-number-4/symbian-os-platform-security-model}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/LiRA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Limoncelli10, author = {Thomas A. Limoncelli}, title = {Sample command-line tool invocation}, journal = {login Usenix Mag.}, volume = {35}, number = {5}, year = {2010}, url = {https://www.usenix.org/publications/login/october-2010-volume-35-number-5/sample-command-line-tool-invocation}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Limoncelli10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/MaltzahnMKNBW10, author = {Carlos Maltzahn and Esteban Molina{-}Estolano and Amandeep Khurana and Alex J. Nelson and Scott A. Brandt and Sage A. Weil}, title = {Ceph as a Scalable Alternative to the Hadoop Distributed File System}, journal = {login Usenix Mag.}, volume = {35}, number = {4}, year = {2010}, url = {https://www.usenix.org/publications/login/august-2010-volume-35-number-4/ceph-scalable-alternative-hadoop-distributed-file}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/MaltzahnMKNBW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/McKee10, author = {Troy McKee}, title = {Migrating from Hosted Exchange}, journal = {login Usenix Mag.}, volume = {35}, number = {5}, year = {2010}, url = {https://www.usenix.org/publications/login/october-2010-volume-35-number-5/migrating-hosted-exchange}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/McKee10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/PiatekK10, author = {Michael Piatek and Arvind Krishnamurthy}, title = {Improving the Performance and Robustness of {P2P} Live Streaming with Contracts}, journal = {login Usenix Mag.}, volume = {35}, number = {4}, year = {2010}, url = {https://www.usenix.org/publications/login/august-2010-volume-35-number-4/improving-performance-and-robustness-p2p-live}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/PiatekK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Piscitello10, author = {Dave Piscitello}, title = {{SSR:} Securing the Internet's Identifier Systems}, journal = {login Usenix Mag.}, volume = {35}, number = {1}, year = {2010}, url = {https://www.usenix.org/publications/login/february-2010-volume-35-number-1/ssr-securing-internets-identifier-systems}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Piscitello10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/RajabBMPZ10, author = {Moheeb Abu Rajab and Lucas Ballard and Panayiotis Mavrommatis and Niels Provos and Xin Zhao}, title = {The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution}, journal = {login Usenix Mag.}, volume = {35}, number = {6}, year = {2010}, url = {https://www.usenix.org/publications/login/december-2010-volume-35-number-6/nocebo-effect-web-analysis-fake-anti-virus}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/RajabBMPZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Ryanczak10, author = {Matt Ryanczak}, title = {IPv6 Transit: What You Need to Know}, journal = {login Usenix Mag.}, volume = {35}, number = {5}, year = {2010}, url = {https://www.usenix.org/publications/login/october-2010-volume-35-number-5/ipv6-transit-what-you-need-know}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Ryanczak10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Sangwine10, author = {Jim Sangwine}, title = {3D Web Contenders}, journal = {login Usenix Mag.}, volume = {35}, number = {3}, year = {2010}, url = {https://www.usenix.org/publications/login/june-2010-volume-35-number-3/3d-web-contenders}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Sangwine10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Schaumann10, author = {Jan Schaumann}, title = {Teaching System Administration in the Cloud}, journal = {login Usenix Mag.}, volume = {35}, number = {5}, year = {2010}, url = {https://www.usenix.org/publications/login/october-2010-volume-35-number-5/teaching-system-administration-cloud}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Schaumann10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Seely10, author = {Andrew Seely}, title = {Building a Virtual {DNS} Appliance Using Solaris 10, BIND, and VMware}, journal = {login Usenix Mag.}, volume = {35}, number = {3}, year = {2010}, url = {https://www.usenix.org/publications/login/june-2010-volume-35-number-3/building-virtual-dns-appliance-using-solaris-10-bind}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Seely10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Shvachko10, author = {Konstantin V. Shvachko}, title = {{HDFS} Scalability: The Limits to Growth}, journal = {login Usenix Mag.}, volume = {35}, number = {2}, year = {2010}, url = {https://www.usenix.org/publications/login/april-2010-volume-35-number-2/hdfs-scalability-limits-growth}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Shvachko10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Simmons10, author = {Matt Simmons}, title = {{LISA:} Beginning the Journey}, journal = {login Usenix Mag.}, volume = {35}, number = {3}, year = {2010}, url = {https://www.usenix.org/publications/login/june-2010-volume-35-number-3/lisa-beginning-journey}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Simmons10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/TanenbaumABCGHH10, author = {Andrew S. Tanenbaum and Raja Appuswamy and Herbert Bos and Lorenzo Cavallaro and Cristiano Giuffrida and Tom{\'{a}}s Hrub{\'{y}} and Jorrit N. Herder and Erik van der Kouwe and David C. van Moolenbroek}, title = {{MINIX} 3: Status Report and Current Research}, journal = {login Usenix Mag.}, volume = {35}, number = {3}, year = {2010}, url = {https://www.usenix.org/publications/login/june-2010-volume-35-number-3/minix-3-status-report-and-current-research}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/TanenbaumABCGHH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/WatsonALK10, author = {Robert N. M. Watson and Jonathan Anderson and Ben Laurie and Kris Kennaway}, title = {Introducing Capsicum: Practical Capabilities for {UNIX}}, journal = {login Usenix Mag.}, volume = {35}, number = {6}, year = {2010}, url = {https://www.usenix.org/publications/login/december-2010-volume-35-number-6/introducing-capsicum-practical-capabilities-unix}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/WatsonALK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/WiresW10, author = {Jake Wires and Andrew Warfield}, title = {Beyond Blocks and Files}, journal = {login Usenix Mag.}, volume = {35}, number = {2}, year = {2010}, url = {https://www.usenix.org/publications/login/april-2010-volume-35-number-2/beyond-blocks-and-files}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/WiresW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Young10, author = {Ellie Young}, title = {Thanks to Our Volunteers}, journal = {login Usenix Mag.}, volume = {35}, number = {1}, year = {2010}, url = {https://www.usenix.org/publications/login/february-2010-volume-35-number-1/thanks-our-volunteers}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Young10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Young10a, author = {Ellie Young}, title = {Thanks to Our Volunteers}, journal = {login Usenix Mag.}, volume = {35}, number = {6}, year = {2010}, url = {https://www.usenix.org/publications/login/december-2010-volume-35-number-6/thanks-our-volunteers}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Young10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/ZadokTS10, author = {Erez Zadok and Vasily Tarasov and Priya Sehgal}, title = {The Case for Specialized File Systems, or, Fighting File System Obesity}, journal = {login Usenix Mag.}, volume = {35}, number = {1}, year = {2010}, url = {https://www.usenix.org/publications/login/february-2010-volume-35-number-1/case-specialized-file-systems-or-fighting-file}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/ZadokTS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Zwicky10, author = {Elizabeth Zwicky}, title = {Brute Force and Ignorance}, journal = {login Usenix Mag.}, volume = {35}, number = {2}, year = {2010}, url = {https://www.usenix.org/publications/login/april-2010-volume-35-number-2/brute-force-and-ignorance}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Zwicky10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/ZwickyC10, author = {Elizabeth Zwicky and Brandon Ching}, title = {Book Reviews}, journal = {login Usenix Mag.}, volume = {35}, number = {2}, year = {2010}, url = {https://www.usenix.org/publications/login/april-2010-volume-35-number-2/book-reviews}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/ZwickyC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/ZwickyCS10, author = {Elizabeth Zwicky and Brandon Ching and Sam Stover}, title = {Book Reviews}, journal = {login Usenix Mag.}, volume = {35}, number = {4}, year = {2010}, url = {https://www.usenix.org/publications/login/august-2010-volume-35-number-4/book-reviews}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/ZwickyCS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/ZwickyCS10a, author = {Elizabeth Zwicky and Brandon Ching and Sam Stover}, title = {Book Reviews}, journal = {login Usenix Mag.}, volume = {35}, number = {5}, year = {2010}, url = {https://www.usenix.org/publications/login/october-2010-volume-35-number-5/book-reviews}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/ZwickyCS10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/ZwickyFS10, author = {Elizabeth Zwicky and Rik Farrow and Sam Stover}, title = {Book Reviews}, journal = {login Usenix Mag.}, volume = {35}, number = {6}, year = {2010}, url = {https://www.usenix.org/publications/login/december-2010-volume-35-number-6/book-reviews}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/ZwickyFS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Zwickya10, author = {Elizabeth Zwicky and et al.}, title = {Book Reviews}, journal = {login Usenix Mag.}, volume = {35}, number = {1}, year = {2010}, url = {https://www.usenix.org/publications/login/february-2010-volume-35-number-1/book-reviews}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Zwickya10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.