Sciweavers

OSDI
2000
ACM
14 years 1 months ago
Design and Evaluation of a Continuous Consistency Model for Replicated Services
The tradeoffs between consistency, performance, and availability are well understood. Traditionally, however, designers of replicated systems have been forced to choose from eithe...
Haifeng Yu, Amin Vahdat
LISA
2000
14 years 1 months ago
Peep (The Network Auralizer): Monitoring Your Network with Sound
Activities in complex networks are often both too important to ignore and too tedious to watch. We created a network monitoring system, Peep, that replaces visual monitoring with ...
Michael Gilfix, Alva L. Couch
LISA
2000
14 years 1 months ago
Aberrant Behavior Detection in Time Series for Network Monitoring
The open-source software RRDtool and Cricket provide a solution to the problem of collecting, storing, and visualizing service network time series data for the real-time monitorin...
Jake D. Brutlag
LISA
2000
14 years 1 months ago
Pelendur: Steward of the Sysadmin
Here we describe Pelendur, a system for the management of common system operation tasks. Specifically, Pelendur focuses on the management of user accounts and related information ...
Matt Curtin, Sandy Farrar, Tami King
LISA
2000
14 years 1 months ago
SubDomain: Parsimonious Server Security
Crispin Cowan, Steve Beattie, Greg Kroah-Hartman, ...
LISA
2000
14 years 1 months ago
Tracing Anonymous Packets to Their Approximate Source
Most denial-of-service attacks are characterized by a flood of packets with random, apparently valid source addresses. These addresses are spoofed, created by a malicious program ...
Hal Burch, Bill Cheswick
LISA
1998
14 years 1 months ago
Mailman: The GNU Mailing List Manager
John Viega, Barry Warsaw, Ken Manheimer
LISA
1998
14 years 1 months ago
Bootstrapping an Infrastructure
Steve Traugott, Joel Huddleston