A Bibliography of Publications of the USENIX Association: 2000–2009

Total Page:16

File Type:pdf, Size:1020Kb

A Bibliography of Publications of the USENIX Association: 2000–2009 A Bibliography of Publications of the USENIX Association: 2000{2009 Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233 Salt Lake City, UT 84112-0090 USA Tel: +1 801 581 5254 FAX: +1 801 581 4148 E-mail: [email protected], [email protected], [email protected] (Internet) WWW URL: http://www.math.utah.edu/~beebe/ 14 October 2017 Version 2.13 Title word cross-reference [Ano04h, Ano04e, Ano04i, Ano04c, Ano04f, Ano05b, Ano05l]. '05 [Ano05e, Ano05k, Ano05m, Ano05n, Ano06a, Ano06b, Ano06c]. 3[CB00].>> [Pat02a]. N [Sal00d]. O(1) 1 [App07a, Bur06b]. 101 [NVZ01]. x = 1 [Cou08a]. [Gal08d, Nic02b, Uhl03]. 102 [Gal08e]. 106461 [LaB00]. 10th [Ano01b]. 11th .profile [How03]. [Ano02a, USE02b]. 12th [Ano03a]. 13th [Ano01i, Ano04c]. 14th /dev [Kam02]. /dev/random [Ano00a, Ano01c, Ano05a]. 15th [Fer06a, Fer06b, Fer06c, Fer06d, Fer07a, [Ano02g, Ano03b, USE01a]. 17th [Ano04d]. Fer07b, Fer07c, Fer07d, Fer07e, Fer07f, 180x86 [Law00]. 18th [Ano05b]. 19th Fer08a, Fer08b, Fer08c, Fer08d, Fer08e, [Ano06b]. 1st [Ano01d, Ano01e]. Fer08f, Fer09f, Fer09a, Fer09b, Fer09c, Fer09d, Fer09e]. /etc [Sim03]. 2 [App07b, Bur06c, Luc00, Mar01b]. 2.0 [Bla01a, Cor00]. 2.4 [vR01a]. 2.4.17 '00s [Zad02]. '01 [Ano00g, Ano00f, Ano00d, [BFH02]. 2000 [BCGD00, Luc00, USE00a]. Ano01e, Ano01j, USE01g, USE01c]. '02 2001 [Ano01g]. 2002 [Ano02f, USE02c, USE02f]. '03 [Jos02, Ano02e, Ano02h]. 2003 [Ano03f, Ano04d, Kam04, Ano03g]. '04 1 2 [Ano03o, Ano03j, Ano03k, Ano04g, Ano04d]. [Tyl02d]. Actions 2004 [Ano03p, Ano04a, Ano05g]. 2006 [MY04, Mul05a, Mul05b, MY06, Veg07, [Ano05s, Ano06d]. 216-Processor [MDH00]. You06c, You07e, You08a, You09b]. 21st [Joh06]. 28-30 [USE02c]. 2k [USE00e]. Activations [Wil02]. Active 2nd [Ark02a, Die02, JBH+00, Orm00a]. [Ano02d, Ano03e, Ano04b, Ano05e, Chu04b]. Activities [Sto06a]. Activity [MVS01, Orm00b]. Ad 3 [Bea09, Bur06d, HBG+06]. 3.0 [MS00]. [Bur06d, Cha01d, SLR02, SDN+08]. 32-bit [Min00]. 36-User [Sol08]. 390 Ad-Hoc [SLR02]. Ad-Hocracy [Bur06d]. [Tho00b]. 3D [KD02]. 3rd [Ano00d, Ano01j, Adaptation [ABC+00, dLWZ00, dLWZ01]. Ano04e, Ano04f, USE00b, USE01c]. Adaptive [CKV+02, FSAK01, HBC+01, JZ01, MW05, MFJPPMK04, NSK04]. Add 4 [Bur07, Gal09f]. 4.x [HC00, Siv03]. 4000 [WS01]. Added [Dar03a]. Adding [Fly03c]. 4th [BC06, Wat01]. Address [Ano00e, Ano03f, Ano06a, USE00c, USE00d]. [BM00a, NSZ01, Sch00c, And01]. Addressable [Mud00a]. Addresses [GB01]. 5 [CL01]. 5.2 [McK04a]. 5th Addressing [BCD+00, Che00b, GB01]. [Ano01f, USE01d]. Admin [Jos08a, Llo07]. Administration [AHK+02, Ano00a, Ano01c, Ano02g, Ano04d, 6 [Pis08, Sal01b]. 64 [vdL02]. 6th Ano05b, Ano06b, Bru09a, Bur00b, Bur00c, [Ano00f, Ano05f, USE01e]. Bur00d, Bur00e, Bur05, Car00b, Cou08c, ECF+00, Kan05b, MD00, MNH00, See06, 7th [USE00e]. Sta00, Tra02, USE00g, USE00b, USE01a]. Administrative [SZ02]. Administrator 802.1 [Nik02]. [Cou08b, Dij00d]. Administrators [Gal09a, Mil05, Pei05]. Advanced 9 [CGP+02, Pik00a, Siv03]. [Ger02, GHH06, Dan01]. Adventures [Man02]. AES [Dan01]. Affiliated [Sch01]. a.k.a [Far04e]. Aberrant [Bru00b]. Ability Affordable [KHF01]. AFS [FZ01]. After [RI00b]. Abstract [McC04c]. Abstraction [SS05]. Against [BST00, Hoh01, KS00, [RMSK00]. Abyss [EKNG+05]. KM01, Mue07a, Pro01, Syv01]. Age [CK01]. Accelerator [RCK02]. Access Agent [DD07, McC00g, RB01]. Agentk [BSF02, Bye02b, Bye02a, Fou02, HRF00, [McC00g]. Agents [Fly04e]. AGFL [KV02]. Jos09c, KHDC01, Mag02, MAF+02, Aggressive [JN00]. Agile [Sch02b]. Aging MoCA+02, SGLG02, SV02b, SZ02, VB00]. [Whi00]. AGNI [RBPM00]. Ago Access-Control [BSF02]. Accessory [Sal00d, Sal00c, Sal00a, Sal00b, Sal03f, [Won01]. Account [Hug00]. Accuracy Sal03e, Sal03c, Sal04i, Sal04a, Sal04k, Sal05d, [HR01a]. Accurate [BBD+01, GSS+02]. Sal05h, Sal05i, Sal05c, Sal05e]. Aid [BS02]. A'Changin [Hum00b]. Achievement Air [RMS02]. Airline [OSE+00]. Alain [Coc01]. Achieving [McC08]. ACM [Kol04a]. Alden [Far00i]. Alert [ABQ02]. [Ano01d, Ano05m, Jac04]. Algorithm [CAGS00, KL01, ZPL01]. ACM/IFIP/USENIX [Jac04]. Algorithms ACM/USENIX [Ano05m]. ACPI [WS02]. [HPS02, Joh06, SLR02, ZABN01]. Aligned Act [App07a, Eck01, NW04]. Action [SGLG02]. Alike [Eck01]. Alistair [Sch02b]. 3 Allocation [CML00, MW05, Sac08]. Fin00a, MV04, NSZ01, PRS06, QD02]. Allocator [BA01]. ALMI [PSVW01]. alone Appropriate [Dar03b]. Approved [Jos02]. [LB00]. Alpine [ESW01]. Already [Sal04b]. Approximate [BC00]. Apps [Ash02]. Alternative [LR04, SSB00]. Alternatives April [USE01g]. Apropos [Cha07c]. Amazon [Gar07, Wal08]. AMD [Dar00a, Dar00b, Dar00c, Dar00d, Dar00e, [vdL02, Zad02]. Among [PF04]. AMPing Dar00f, Dar01a, Dar01b, Dar01c, Dar01d, [Gal09b]. Analysis Dar01e, Dar01f, Dar01g, Dar02a, Dar02b, [AC08, Bal03, BS01, CWVL01, Dij00d, Dar02c, Dar02d, Dar04a, Dar04c]. Gal08d, Gal08e, Gol06, Hun00, KM01, LM00, Aqueduct [LAW02]. Arbitrary [BA01]. Lev00, Mee00, MDH00, MNH00, RI00b, Archipelago [JFWS00]. Architect SWT01, SDHD07, Syv01, ZEJ02]. Analytics [Ano04b]. Architecting [Woo01b]. [Gal09a]. Analyzer [Woo01b]. Analyzing Architectural [JR02]. Architecture [ABQ02, DLD00, Fly03c, PLT00]. Animals [And00, AC08, CW04, EKNG+05, GMAM01, [BE01]. Animated [MZ00]. Anniversaries GC01, Hun00, Pac01b, RI00a, SMF+01, [Sal03a]. Anniversary [Sal01a, Sal05g]. Tra01, YMC02, Yen00, KW00, WT00]. Announcement [Ano00e, Ano00g, Ano00a, Architectures [BLF+00, LR04]. Archival Ano00b, Ano00c, Ano00f, Ano00d]. Annual [MB02a, QD02, SGMV08]. Area [Ano00e, Ano00b, Ano00c, Ano00h, Ano00p, [KCN02, Mee00, PGCR01, SVF01, Sch02c, Ano01i, Ano01k, Ano02c, Ano03b, Ano03k, Tie01, WOSW02]. Arena [Fer09f]. Argos Ano04i, Ano05d, Ano05t, USE00c, USE00a, [BTS08]. Aroma [Sur01]. Array USE01d, USE01f, USE01b, USE02d, USE02e, [McC01b, YGC+00, ZYKW02]. Arrays USE06]. Anonymizing [MS02]. [ASV+02, McC01g]. Arrived [Gra02]. Art Anonymous [BC00]. Answers [Bea01a]. [Rus00b, Slu05]. Article [Kol05d]. Antfarm [JADAD06]. Anti Artifacts [Too09]. Artist [Ham00]. Arts [App04b, Has06a, Sam02]. [Ham00]. Ask [Har02b]. ASR [Cha07a]. Anti-Circumvention [Sam02]. Anti-Spam Assembly [Bro06]. Assessment [Iam01]. [App04b, Has06a]. Anton [Far04a]. Assisted [sLC02]. Association Antonio [USE01e]. Anyway [Bel02]. [Ano03o, Ano05u, Sal05g, The04, You04b, Apache [Pie03]. Appia [WOSW02]. You06b, You07d, You09d]. Assurance Applet [Ros00]. Appliance [SV02b]. Asterisk [Cha05a, Cha05b, [Ban00, Cha07b, Sha00, Van09b]. Cha07b, Cha07a, Cha07c, Cha07d, Sol08]. Application [CV02, Ing00, Kri00b, LGW04, Asynchronous [PMF+02, SGM+00]. Mar01b, OESV04, PSVW01, PN05, PW00, Atlanta [USE00c, Ano00e]. Atoms [Mor02]. Sch02a, Sch00b, SNC00, Tie01, YMC02, atque [You05b]. Attached [MLFR02]. ZS01, APH00, BE09e, BE09f]. Attachments [BE08b]. Attack Application-level [SNC00]. [GP01b, KS00, Loz05b]. Attacks Application-Specific [BST00, BGM00, BU02, Has05d, Kan05a, [YMC02, ZS01, CV02]. Applications Lem02, Oli01, SWT01]. Attributes [AR00, ABD+08, ABC+00, Ano05f, Ano05j, [Sto08a]. AUC [EKNG+05]. AUC-Abyss Ano05n, Bou01, BR00a, Dam03, FM00, [EKNG+05]. Audit [CMP00, CMP00]. Gal09c, Kal09, KD02, LB00, LR04, Mah04, Audit/Logging [CMP00]. Auditing PA04, PMN+04, PS01, RAMC+04, Sto02, [Lan06]. August [USE00b, USE00i, USE00d, VKK+01, WRA00, ZM00]. Applying USE01h, USE02f, USE02b, Jos02]. [Fly00e]. Approach [Apt01, BJP00, CD01a, Auralizer [GC00, Gil01]. Austin [USE00e, 4 Jos00a, Jos00c, Jos01a, Jos02, See01]. Mud00b, Tyl01, Tyl02b, Tyl02c]. Bean Authenticated [BU02]. Authentication [WCD+01]. Beaten [Cha01b]. Becoming [BH00a, DP00, FSSF01, Way02, Coc01]. [HLU+00]. Been [ECF+00, Nic01a]. Authorisation [RJ01]. Authorization Beginning [Mar01a]. Behavior [HK00b, Nik02, Ras06, ZEJ02]. Auto [AR00, Bru00b, Ken02c, Lev00, PLT00, [Ban00]. Auto-Diagnosis [Ban00]. Reg02, VKK+01, YD00]. Behavioral Autoconfiguring [Kno00]. Automated [Ken02b]. Behaviour [HS01]. Behavioural [All02b, MB00, McC05b, RV00, SF00, Tra02]. [WS01]. Being [Cou09, Lea04, Sch06]. Automatic [CBB+01, KYH+01, Kri00b, Belong [Sim03]. Benchmark San01, SMES01, WOSW02]. Automating [BRS01, ZS01]. Benchmarking [AFE00, Fre06, Hem00, She00]. [Wal08, YNN01]. Benchmarks [BP00]. Automation [MD00, Tur04d]. Autonomic Benefits [MD05]. Beowulf [Bec01, Bro00, [Bur06a, FF07]. Autotools [Zad02]. Bro01b, MCB+01, MDH00, Ste01]. Availability [Ash02, BP00, CDGN01, Berkeley [USE01g]. Better Hob02, LR01, LS00, Pat02a, Zwi01]. [Fiu05, Sit02, WRPK02]. Between Available [Dic09, JFWS00, ZSB04]. Ave [CWL+01, MCD+02, MB01, Pri01]. Beyond [You05b]. Average [Cou08b]. Avoid [Lan08, Luc00, SNOK01]. BGP [Jos06a]. [Nic03a]. Avoiding [Ale04a]. Awards Big [Hel09]. Biglook [GS02]. Billing [Ano05t, Ano04a]. Aware [CW04, [HDM00]. Binary [YST02]. Bind [PN05]. FADAD02, HS00b, MV04, ASDZ00, CV02]. BIND8 [Siv01]. Binding [Mas01]. Awareness Biological [GB04]. Biometric [Way02]. [CDRV00, MZ00, RAMC+04, ZM00]. BIOS [MHW00]. Bit Awash [Lea04]. AX [Fly03c]. AX-4000 [ASS02, Cha01b, Min00]. Bit-Rate [ASS02]. [Fly03c]. AxTcl [Fly03c]. Bits [HSW09]. BitTorrent [PIA+07]. BitTyrant [PIA+07]. BL [Lan08]. Babble [Bur06c]. Babel [Bur06c]. Back Blacklisting [ZPU08]. Blaine [Fen00]. [BE06c, BE08c, Gee05, Gra04]. Backbone Blame [JHZK08]. Blanket [Gal09c]. BLAS [Ald05]. Backdoors [ZP00a]. Background [Tho00a]. BLASTH [Tho00a]. Blocking [McK02]. Backup [Hos03, VSV09]. Backus [BGM00, Has06b]. Blog [Cha02d]. Blogs [Aik07]. Bad [Bea09]. Balancing [App07a]. [App07a, App07b]. Blood [Tyl01, Tyl02b]. Balkan [Pie00]. Bandwidth Blotter [Ran00a, Ran00b, Ran00c, Ran00d, [ABC+00, GP01b, LB01, LSG+00, dLWZ00]. Ran00e, Ran00f]. Blunders [Bur01g]. Base [Jos01b]. Based Board [Ano03o, Ano04r, MY04, Mul04b, [Ark02b, BGM00, BBLo04, Bon01, Chu03, Mul05a, Mul05b, MY06, Veg07, YM05, EG01, GHH06, GSAA04, JGKvS04,
Recommended publications
  • Release Notes for X11R7.5 the X.Org Foundation 1
    Release Notes for X11R7.5 The X.Org Foundation 1 October 2009 These release notes contains information about features and their status in the X.Org Foundation X11R7.5 release. Table of Contents Introduction to the X11R7.5 Release.................................................................................3 Summary of new features in X11R7.5...............................................................................3 Overview of X11R7.5............................................................................................................4 Details of X11R7.5 components..........................................................................................5 Build changes and issues..................................................................................................10 Miscellaneous......................................................................................................................11 Deprecated components and removal plans.................................................................12 Attributions/Acknowledgements/Credits......................................................................13 Introduction to the X11R7.5 Release This release is the sixth modular release of the X Window System. The next full release will be X11R7.6 and is expected in 2010. Unlike X11R1 through X11R6.9, X11R7.x releases are not built from one monolithic source tree, but many individual modules. These modules are distributed as individ- ual source code releases, and each one is released when it is ready, instead
    [Show full text]
  • Kshot: Live Kernel Patching with SMM and SGX
    KShot: Live Kernel Patching with SMM and SGX Lei Zhou∗y, Fengwei Zhang∗, Jinghui Liaoz, Zhengyu Ning∗, Jidong Xiaox Kevin Leach{, Westley Weimer{ and Guojun Wangk ∗Department of Computer Science and Engineering, Southern University of Science and Technology, Shenzhen, China, zhoul2019,zhangfw,ningzy2019 @sustech.edu.cn f g ySchool of Computer Science and Engineering, Central South University, Changsha, China zDepartment of Computer Science, Wayne State University, Detroit, USA, [email protected] xDepartment of Computer Science, Boise State University, Boise, USA, [email protected] Department of Computer Science and Engineering, University of Michigan, Ann Arbor, USA, kjleach,weimerw @umich.edu { f g kSchool of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou, China, [email protected] Abstract—Live kernel patching is an increasingly common kernel vulnerabilities also merit patching. Organizations often trend in operating system distributions, enabling dynamic up- use rolling upgrades [3], [6], in which patches are designed dates to include new features or to fix vulnerabilities without to affect small subsystems that minimize unplanned whole- having to reboot the system. Patching the kernel at runtime lowers downtime and reduces the loss of useful state from running system downtime, to update and patch whole server systems. applications. However, existing kernel live patching techniques However, rolling upgrades do not altogether obviate the need (1) rely on specific support from the target operating system, to restart software or reboot systems; instead, dynamic hot and (2) admit patch failures resulting from kernel faults. We patching (live patching) approaches [7]–[9] aim to apply present KSHOT, a kernel live patching mechanism based on patches to running software without having to restart it.
    [Show full text]
  • The 30 Year Horizon
    The 30 Year Horizon Manuel Bronstein W illiam Burge T imothy Daly James Davenport Michael Dewar Martin Dunstan Albrecht F ortenbacher P atrizia Gianni Johannes Grabmeier Jocelyn Guidry Richard Jenks Larry Lambe Michael Monagan Scott Morrison W illiam Sit Jonathan Steinbach Robert Sutor Barry T rager Stephen W att Jim W en Clifton W illiamson Volume 7: Axiom Hyperdoc i Portions Copyright (c) 2005 Timothy Daly The Blue Bayou image Copyright (c) 2004 Jocelyn Guidry Portions Copyright (c) 2004 Martin Dunstan Portions Copyright (c) 2007 Alfredo Portes Portions Copyright (c) 2007 Arthur Ralfs Portions Copyright (c) 2005 Timothy Daly Portions Copyright (c) 1991-2002, The Numerical ALgorithms Group Ltd. All rights reserved. This book and the Axiom software is licensed as follows: Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: - Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. - Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. - Neither the name of The Numerical ALgorithms Group Ltd. nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED
    [Show full text]
  • Latexsample-Thesis
    INTEGRAL ESTIMATION IN QUANTUM PHYSICS by Jane Doe A dissertation submitted to the faculty of The University of Utah in partial fulfillment of the requirements for the degree of Doctor of Philosophy Department of Mathematics The University of Utah May 2016 Copyright c Jane Doe 2016 All Rights Reserved The University of Utah Graduate School STATEMENT OF DISSERTATION APPROVAL The dissertation of Jane Doe has been approved by the following supervisory committee members: Cornelius L´anczos , Chair(s) 17 Feb 2016 Date Approved Hans Bethe , Member 17 Feb 2016 Date Approved Niels Bohr , Member 17 Feb 2016 Date Approved Max Born , Member 17 Feb 2016 Date Approved Paul A. M. Dirac , Member 17 Feb 2016 Date Approved by Petrus Marcus Aurelius Featherstone-Hough , Chair/Dean of the Department/College/School of Mathematics and by Alice B. Toklas , Dean of The Graduate School. ABSTRACT Blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah. Blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah. Blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah. Blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah. Blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah. Blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah. Blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah. Blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah.
    [Show full text]
  • Introducting Innovations in Open Source Projects
    Introducing Innovations into Open Source Projects Dissertation zur Erlangung des Grades eines Doktors der Naturwissenschaften (Dr. rer. nat.) am Fachbereich Mathematik und Informatik der Freien Universität Berlin von Sinan Christopher Özbek Berlin August 2010 2 Gutachter: Professor Dr. Lutz Prechelt, Freie Universität Berlin Professor Kevin Crowston, Syracuse University Datum der Disputation: 17.12.2010 4 Abstract This thesis presents a qualitative study using Grounded Theory Methodology on the question of how to change development processes in Open Source projects. The mailing list communication of thirteen medium-sized Open Source projects over the year 2007 was analyzed to answer this question. It resulted in eight main concepts revolving around the introduction of innovation, i.e. new processes, services, and tools, into the projects including topics such as the migration to new systems, the question on where to host services, how radical Open Source projects can change their ways, and how compliance to processes and conventions is enforced. These are complemented with (1) the result of five case studies in which innovation introductions were conducted with Open Source projects, and with (2) a theoretical comparison of the results of this thesis to four theories and scientific perspectives from the organizational and social sciences such as Path Dependence, the Garbage Can model, Social-Network analysis, and Actor-Network theory. The results show that innovation introduction is a multifaceted phenomenon, of which this thesis discusses the most salient conceptual aspects. The thesis concludes with practical advice for innovators and specialized hints for the most popular innovations. 5 6 Acknowledgements I want to thank the following individuals for contributing to the completion of this thesis: • Lutz Prechelt for advising me over these long five years.
    [Show full text]
  • Identifying Exogenous Drivers and Evolutionary Stages in FLOSS Projects
    University of Groningen Quality Factors and Coding Standards - a Comparison Between Open Source Forges Capiluppi, Andrea; Boldyreff, Cornelia; Beecher, Karl; Adams, Paul J. Published in: Electronic Notes in Theoretical Computer Science DOI: 10.1016/j.entcs.2009.02.063 IMPORTANT NOTE: You are advised to consult the publisher's version (publisher's PDF) if you wish to cite from it. Please check the document version below. Document Version Publisher's PDF, also known as Version of record Publication date: 2009 Link to publication in University of Groningen/UMCG research database Citation for published version (APA): Capiluppi, A., Boldyreff, C., Beecher, K., & Adams, P. J. (2009). Quality Factors and Coding Standards - a Comparison Between Open Source Forges. Electronic Notes in Theoretical Computer Science, 233(C), 89- 103. https://doi.org/10.1016/j.entcs.2009.02.063 Copyright Other than for strictly personal use, it is not permitted to download or to forward/distribute the text or part of it without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license (like Creative Commons). The publication may also be distributed here under the terms of Article 25fa of the Dutch Copyright Act, indicated by the “Taverne” license. More information can be found on the University of Groningen website: https://www.rug.nl/library/open-access/self-archiving-pure/taverne- amendment. Take-down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. Downloaded from the University of Groningen/UMCG research database (Pure): http://www.rug.nl/research/portal.
    [Show full text]
  • April 2006 Volume 31 Number 2
    APRIL 2006 VOLUME 31 NUMBER 2 THE USENIX MAGAZINE OPINION Musings RIK FARROW OpenSolaris:The Model TOM HAYNES PROGRAMMING Code Testing and Its Role in Teaching BRIAN KERNIGHAN Modular System Programming in MINIX 3 JORRIT N. HERDER, HERBERT BOS, BEN GRAS, PHILIP HOMBURG, AND ANDREW S. TANENBAUM Some Types of Memory Are More Equal Than Others DIOMEDIS SPINELLIS Simple Software Flow Analysis Using GNU Cflow CHAOS GOLUBITSKY Why You Should Use Ruby LU KE KANIES SYSADMIN Unwanted HTTP:Who Has the Time? DAVI D MALONE Auditing Superuser Usage RANDOLPH LANGLEY C OLUMNS Practical Perl Tools:Programming, Ho Hum DAVID BLANK-EDELMAN VoIP Watch HEISON CHAK /dev/random ROBERT G. FERRELL STANDARDS USENIX Standards Activities NICHOLAS M. STOUGHTON B O OK REVIEWS Book Reviews ELIZABETH ZWICKY, WITH SAM STOVER AND RI K FARROW USENIX NOTES Letter to the Editor TED DOLOTTA Fund to Establish the John Lions Chair C ONFERENCES LISA ’05:The 19th Large Installation System Administration Conference WORLDS ’05: Second Workshop on Real, Large Distributed Systems FAST ’05: 4th USENIX Conference on File and Storage Technologies The Advanced Computing Systems Association Upcoming Events 3RD SYMPOSIUM ON NETWORKED SYSTEMS 2ND STEPS TO REDUCING UNWANTED TRAFFIC ON DESIGN AND IMPLEMENTATION (NSDI ’06) THE INTERNET WORKSHOP (SRUTI ’06) Sponsored by USENIX, in cooperation with ACM SIGCOMM JULY 6–7, 2006, SAN JOSE, CA, USA and ACM SIGOPS http://www.usenix.org/sruti06 MAY 8–10, 2006, SAN JOSE, CA, USA Paper submissions due: April 20, 2006 http://www.usenix.org/nsdi06 2006
    [Show full text]
  • Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
    pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae
    [Show full text]
  • Integral Estimation in Quantum Physics
    INTEGRAL ESTIMATION IN QUANTUM PHYSICS by Jane Doe A dissertation submitted to the faculty of The University of Utah in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Mathematical Physics Department of Mathematics The University of Utah May 2016 Copyright c Jane Doe 2016 All Rights Reserved The University of Utah Graduate School STATEMENT OF DISSERTATION APPROVAL The dissertation of Jane Doe has been approved by the following supervisory committee members: Cornelius L´anczos , Chair(s) 17 Feb 2016 Date Approved Hans Bethe , Member 17 Feb 2016 Date Approved Niels Bohr , Member 17 Feb 2016 Date Approved Max Born , Member 17 Feb 2016 Date Approved Paul A. M. Dirac , Member 17 Feb 2016 Date Approved by Petrus Marcus Aurelius Featherstone-Hough , Chair/Dean of the Department/College/School of Mathematics and by Alice B. Toklas , Dean of The Graduate School. ABSTRACT Blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah. Blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah. Blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah. Blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah. Blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah. Blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah. Blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah. Blah blah blah blah blah blah blah blah blah blah blah blah blah blah blah.
    [Show full text]
  • Release Notes for X11R7.7 the X.Org Foundation [ April 2012
    Release Notes for X11R7.7 The X.Org Foundation [http://www.x.org/wiki/XorgFoundation] April 2012 Abstract These release notes contain information about features and their status in the X.Org Foun- dation X11R7.7 release. 1 Release Notes for X11R7.7 Table of Contents Introduction to the X11R7.7 Release .................................................................... 3 Summary of new features in X11R7.7 .................................................................. 4 Overview of X11R7.7 ............................................................................................. 5 Details of X11R7.7 components ............................................................................ 5 Video Drivers ................................................................................................. 5 Input Drivers .................................................................................................. 7 Xorg server .................................................................................................... 7 Font support ................................................................................................. 10 Build changes and issues .................................................................................... 11 Strict compilation flags ................................................................................ 11 Silent build rules ......................................................................................... 11 New configure options for font modules ....................................................
    [Show full text]
  • Copyright by Naveena Sankaranarayanan 2018 the Thesis Committee for Naveena Sankaranarayanan Certifies That This Is the Approved Version of the Following Thesis
    Copyright by Naveena Sankaranarayanan 2018 The Thesis Committee for Naveena Sankaranarayanan Certifies that this is the approved version of the following thesis: SELinC: Security Evaluation of Linux Containers APPROVED BY SUPERVISING COMMITTEE: Mohit Tiwari, Supervisor Sarfraz Khurshid SELinC: Security Evaluation of Linux Containers by Naveena Sankaranarayanan Thesis Presented to the Faculty of the Graduate School of The University of Texas at Austin in Partial Fulfillment of the Requirements for the Degree of Master of Science in Engineering The University of Texas at Austin May 2018 Abstract SELinC: Security Evaluation of Linux Containers Naveena Sankaranarayanan, M.S.E. The University of Texas at Austin, 2018 Supervisor: Mohit Tiwari Operating System containers are key to the success of modern datacenters. Containers provide an easy way to encapsulate an application with its operating environment and deliver it seamlessly from development to test to production. Containers ensure consistency in loading the application across a variety of environments including physical servers, virtual machines, private or public clouds. Despite these benefits, containers often invite security concerns. Since containers share the Linux kernel on the host machine, a bug or a vulnerability in the kernel can compromise all the containers on the host machine. This thesis presents a novel model-driven fuzzing technique that can automatically analyze the kernel sources of containers. The proposed technique exposed two unknown bugs in the kernel implementation. iv Table of Contents Abstract iv List of Tables vii List of Figures viii Chapter 1. Introduction1 Chapter 2. Background5 2.1 Containers.............................5 2.1.1 Containers Vs Virtual Machines.............6 2.2 Security concerns in containers..................6 2.3 Kernel features enabling containerization............7 2.3.1 Namespaces.........................8 2.3.2 Cgroups...........................9 2.4 Fuzzing..............................
    [Show full text]
  • Automated Data Dependency Visualization for Embedded Systems Programmed in C
    Automated Data Dependency Visualization for Embedded Systems Programmed in C JOSIP PANTOVIC KTH Information and Communication Technology Degree project in Information Technology Second level, 30.0 HEC Stockholm, Sweden KUNGLIGA TEKNISKA HÖGSKOLAN Royal Institute of Technology Automated Data Dependency Visualization for Embedded Systems Programmed in C Master Thesis Last revised: 2014-01-26 Josip Pantovic Email: [email protected] Examiner: Professor Mark T. Smith (KTH) Supervisor: Mattias Nyberg (SCANIA) Acknowledgements Professor Mark T. Smith, KTH, Thesis Examiner, for the exhaustive help with defining and directing the thesis as well as shaping this report. Mattias Nyberg, Scania REPA Driver Assistance Systems, Thesis Supervisor, for the help with performing the thesis work with his experience with previous related work, design of Scania systems, company needs and organization. Professor Christian Schulte, KTH, for the help with better comprehending the scope of the problem area of program parsing and compilation. ii Table of Contents Abstract ..................................................................................................................................... v 1 Introduction ....................................................................................................................... 1 1.1 Report Description ....................................................................................................... 2 2 Problem .............................................................................................................................
    [Show full text]