Sciweavers

LISA
2003
14 years 27 days ago
Preventing Wheel Reinvention: The psgconf System Configuration Framework
Most existing Unix system configuration tools are designed monolithically. Each tool stores configuration data in its own way, has its own mechanism for enforcing policy, has a fi...
Mark D. Roth
LISA
2003
14 years 27 days ago
Using Service Grammar to Diagnose BGP Configuration Errors
Often network components work correctly, yet end-to-end services don’t. This happens if configuration parameters of components are set to incorrect values. Configuration is a fu...
Xiaohu Qie, Sanjai Narain
LISA
2003
14 years 27 days ago
Three Practical Ways to Improve Your Network
This paper presents three simple techniques for improving network service using relatively unknown features of many existing networks. The resulting system provides greater reliab...
Kevin Miller
LISA
2003
14 years 27 days ago
How to Get Your Papers Accepted at LISA
Thomas A. Limoncelli, Adam Moskowitz
LISA
2003
14 years 27 days ago
DryDock: A Document Firewall
Auditing a web site’s content is an arduous task. For any given page on a web server, system administrators are often ill-equipped to determine who created the document, why itâ...
Deepak Giridharagopal
LISA
2003
14 years 27 days ago
An Analysis of Database-Driven Mail Servers
This paper compares the performance of three different IMAP servers, each of which uses a different storage mechanism: Cyrus uses a database built on BerkeleyDB, Courier-IMAP uses...
Nick Elprin, Bryan Parno
LISA
2003
14 years 27 days ago
New NFS Tracing Tools and Techniques for System Analysis
Passive NFS traces provide an easy and unobtrusive way to measure, analyze, and gain an understanding of an NFS workload. Historically, such traces have been used primarily by fil...
Daniel Ellard, Margo I. Seltzer