Sciweavers

LISA
2008
13 years 9 months ago
Devolved Management of Distributed Infrastructures with Quattor
In recent times a new kind of computing system has emerged: a distributed infrastructure composed of multiple physical sites in different administrative domains. This model introd...
Stephen Childs, Marco Emilio Poleggi, Charles Loom...
LISA
2008
13 years 9 months ago
Dynamic Dependencies and Performance Improvement
The art of performance tuning is, alas, still an art; there are few tools to help predict the effects of changes that are motivated by performance needs. In this work, we present ...
Marc Chiarini, Alva L. Couch
LISA
2008
13 years 9 months ago
Fast Packet Classification for Snort by Native Compilation of Rules
Signature matching, which includes packet classification and content matching, is the most expensive operation of a signature-based network intrusion detection system (NIDS). In t...
Alok Tongaonkar, Sreenaath Vasudevan, R. Sekar
LISA
2008
13 years 9 months ago
Authentication on Untrusted Remote Hosts with Public-Key Sudo
Two common tools in Linux- and UNIX-based environments are SSH for secure communications and sudo for performing administrative tasks. These are independent programs with substant...
Matthew Burnside, Mack Lu, Angelos D. Keromytis
USENIX
2007
13 years 9 months ago
Reboots Are for Hardware: Challenges and Solutions to Updating an Operating System on the Fly
Patches to modern operating systems, including bug fixes and security updates, and the reboots and downtime they require, cause tremendous problems for system users and administr...
Andrew Baumann, Jonathan Appavoo, Robert W. Wisnie...
LISA
2008
13 years 9 months ago
Sysman: A Virtual File System for Managing Clusters
Sysman is a system management infrastructure for clusters and data centers similar to the /proc file system. It provides a familiar yet powerful interface for the management of se...
Mohammad Banikazemi, David Daly, Bülent Abali
LISA
2008
13 years 9 months ago
Rapid Parallel Systems Deployment: Techniques for Overnight Clustering
Automated system deployment frameworks and configuration management systems have been in wide use for a number of years. However, due to increasing pressures to maintain high avai...
Donna Cumberland, Randy Herban, Rick Irvine, Micha...
LISA
2008
13 years 9 months ago
Petascale System Management Experiences
Petascale HPC systems are among the largest systems in the world. Intrepid, one such system, is a 40,000 node, 556 teraflop Blue Gene/P system that has been deployed at Argonne Na...
Narayan Desai, Rick Bradshaw, Cory Lueninghoener, ...
USENIX
2007
13 years 9 months ago
Load Shedding in Network Monitoring Applications
Monitoring and mining real-time network data streams is crucial for managing and operating data networks. The information that network operators desire to extract from the network...
Pere Barlet-Ros, Gianluca Iannaccone, Josep Sanju&...
LISA
2008
13 years 9 months ago
Designing Tools for System Administrators: An Empirical Test of the Integrated User Satisfaction Model
System administrators are unique computer users. As power users in complex and high-risk work environments, intuition tells us that they may have requirements of the tools they us...
Nicole F. Velasquez, Suzanne P. Weisband, Alexandr...