![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/journals/usenix-login/usenix-login33.bht:"
@article{DBLP:journals/usenix-login/0004PU08, author = {Jian Zhang and Phillip A. Porras and Johannes Ullrich}, title = {Highly Predictive Blacklisting}, journal = {login Usenix Mag.}, volume = {33}, number = {6}, year = {2008}, url = {https://www.usenix.org/publications/login/december-2008-volume-33-number-6/highly-predictive-blacklisting}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/0004PU08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Abley08, author = {Joe Abley}, title = {Fear and Loathingin the RoutingSystem}, journal = {login Usenix Mag.}, volume = {33}, number = {1}, year = {2008}, url = {https://www.usenix.org/publications/login/february-2008-volume-33-number-1/fear-and-loathing-routing-system}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Abley08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/AlbrechtBDTTSV08, author = {Jeannie R. Albrecht and Ryan Braud and Ren Dao and Nikolay Topilski and Christopher Tuttle and Alex C. Snoeren and Amin Vahdat}, title = {Managing Distributed Applications with Plush}, journal = {login Usenix Mag.}, volume = {33}, number = {1}, year = {2008}, url = {https://www.usenix.org/publications/login/february-2008-volume-33-number-1/managing-distributed-applications-plush}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/AlbrechtBDTTSV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/ArdiC08, author = {Calvin Ardi and Daniel Chen}, title = {Architecture and Threat Analysis of aCampus Wireless Network}, journal = {login Usenix Mag.}, volume = {33}, number = {6}, year = {2008}, url = {https://www.usenix.org/publications/login/december-2008-volume-33-number-6/architecture-and-threat-analysis-campus-wireless}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/ArdiC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Bairavasundaram08, author = {Lakshmi N. Bairavasundaram and Garth R. Goodson and Bianca Schroeder and Andrea C. Arpaci{-}Dusseau and Remzi H. Arpaci{-}Dusseau}, title = {Data Corruption in the Storage Stack: {A} Closer Look}, journal = {login Usenix Mag.}, volume = {33}, number = {3}, year = {2008}, url = {https://www.usenix.org/publications/login/june-2008-volume-33-number-3/data-corruption-storage-stack-closer-look}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Bairavasundaram08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/BergTS08, author = {Jeff Berg and Evan Teran and Sam Stover}, title = {Investigating Argos}, journal = {login Usenix Mag.}, volume = {33}, number = {6}, year = {2008}, url = {https://www.usenix.org/publications/login/december-2008-volume-33-number-6/investigating-argos}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/BergTS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Blank-Edelman08, author = {David N. Blank{-}Edelman}, title = {Practical Perl Tools: Why {I} Live at the {P.O}}, journal = {login Usenix Mag.}, volume = {33}, number = {1}, year = {2008}, url = {https://www.usenix.org/publications/login/february-2008-volume-33-number-1/practical-perl-tools-why-i-live-po}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Blank-Edelman08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Blank-Edelman08a, author = {David N. Blank{-}Edelman}, title = {Practical Perl Tools: Back in Timeline}, journal = {login Usenix Mag.}, volume = {33}, number = {2}, year = {2008}, url = {https://www.usenix.org/publications/login/april-2008-volume-33-number-2/practical-perl-tools-back-timeline}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Blank-Edelman08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Blank-Edelman08b, author = {David N. Blank{-}Edelman}, title = {Practical Perl Tools: {A} Little Place for Your Stuff}, journal = {login Usenix Mag.}, volume = {33}, number = {3}, year = {2008}, url = {https://www.usenix.org/publications/login/june-2008-volume-33-number-3/practical-perl-tools-little-place-your-stuff}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Blank-Edelman08b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Blank-Edelman08c, author = {David N. Blank{-}Edelman}, title = {Practical Perl Tools: Hi-ho the Merry-o, Debugging We Will Go}, journal = {login Usenix Mag.}, volume = {33}, number = {4}, year = {2008}, url = {https://www.usenix.org/publications/login/august-2008-volume-33-number-4/practical-perl-tools-hi-ho-merry-o-debugging-we}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Blank-Edelman08c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Blank-Edelman08d, author = {David N. Blank{-}Edelman}, title = {Practical Perl Tools: Attachments}, journal = {login Usenix Mag.}, volume = {33}, number = {5}, year = {2008}, url = {https://www.usenix.org/publications/login/october-2008-volume-33-number-5/practical-perl-tools-attachments}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Blank-Edelman08d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Blank-Edelman08e, author = {David N. Blank{-}Edelman}, title = {Practical Perl Tools: This Column IsPassword-Protected}, journal = {login Usenix Mag.}, volume = {33}, number = {6}, year = {2008}, url = {https://www.usenix.org/publications/login/december-2008-volume-33-number-6/practical-perl-tools-column-password-protected}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Blank-Edelman08e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Brownsword08, author = {Andrew Brownsword}, title = {Driving the Evolution of Software Languages to a Concurrent Future}, journal = {login Usenix Mag.}, volume = {33}, number = {3}, year = {2008}, url = {https://www.usenix.org/publications/login/june-2008-volume-33-number-3/driving-evolution-software-languages-concurrent}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Brownsword08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Chak08, author = {Heison Chak}, title = {VoIP and IPv6}, journal = {login Usenix Mag.}, volume = {33}, number = {2}, year = {2008}, url = {https://www.usenix.org/publications/login/april-2008-volume-33-number-2/voip-and-ipv6}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Chak08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Chak08a, author = {Heison Chak}, title = {Media Resource Control Protocol}, journal = {login Usenix Mag.}, volume = {33}, number = {4}, year = {2008}, url = {https://www.usenix.org/publications/login/august-2008-volume-33-number-4/media-resource-control-protocol}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Chak08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Couch08, author = {Alva L. Couch}, title = {From x=1 to (setf x 1): What Does ConfigurationManagement Mean?}, journal = {login Usenix Mag.}, volume = {33}, number = {1}, year = {2008}, url = {https://www.usenix.org/publications/login/february-2008-volume-33-number-1/x1-setf-x-1-what-does-configuration-management}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Couch08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Couch08a, author = {Alva L. Couch}, title = {"Standard Deviations" of the Average SystemAdministrator}, journal = {login Usenix Mag.}, volume = {33}, number = {4}, year = {2008}, url = {https://www.usenix.org/publications/login/august-2008-volume-33-number-4/standard-deviations-average-system-administrator}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Couch08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Couch08b, author = {Alva L. Couch}, title = {System Administration Thermodynamics}, journal = {login Usenix Mag.}, volume = {33}, number = {5}, year = {2008}, url = {https://www.usenix.org/publications/login/october-2008-volume-33-number-5/system-administration-thermodynamics}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Couch08b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/DemmerDB08, author = {Michael J. Demmer and Bowei Du and Eric A. Brewer}, title = {TierStore: {A} Distributed File System for Challenged Networks in Developing Regions}, journal = {login Usenix Mag.}, volume = {33}, number = {3}, year = {2008}, url = {https://www.usenix.org/publications/login/june-2008-volume-33-number-3/tierstore-distributed-file-system-challenged}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/DemmerDB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Dickison08, author = {Anne Dickison}, title = {New on the {USENIX} Web Site: The Multimedia Page}, journal = {login Usenix Mag.}, volume = {33}, number = {1}, year = {2008}, url = {https://www.usenix.org/publications/login/february-2008-volume-33-number-1/new-usenix-web-site-multimedia-page}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Dickison08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/DixonAK08, author = {Colin Dixon and Thomas E. Anderson and Arvind Krishnamurthy}, title = {Withstanding Multimillion-node Botnets}, journal = {login Usenix Mag.}, volume = {33}, number = {4}, year = {2008}, url = {https://www.usenix.org/publications/login/august-2008-volume-33-number-4/withstanding-multimillion-node-botnets}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/DixonAK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Dusek08, author = {Jason Dusek}, title = {Concurrent Patterns: Parallels in System and Language Design}, journal = {login Usenix Mag.}, volume = {33}, number = {5}, year = {2008}, url = {https://www.usenix.org/publications/login/october-2008-volume-33-number-5/concurrent-patterns-parallels-system-and-language}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Dusek08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/EnrightVSKL08, author = {Brandon Enright and Geoff Voelker and Stefan Savage and Chris Kanich and Kirill Levchenko}, title = {Storm: When Researchers Collide}, journal = {login Usenix Mag.}, volume = {33}, number = {4}, year = {2008}, url = {https://www.usenix.org/publications/login/august-2008-volume-33-number-4/storm-when-researchers-collide}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/EnrightVSKL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Farrow08, author = {Rik Farrow}, title = {Musings}, journal = {login Usenix Mag.}, volume = {33}, number = {1}, year = {2008}, url = {https://www.usenix.org/publications/login/february-2008-volume-33-number-1/musings}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Farrow08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Farrow08a, author = {Rik Farrow}, title = {Musings}, journal = {login Usenix Mag.}, volume = {33}, number = {2}, year = {2008}, url = {https://www.usenix.org/publications/login/april-2008-volume-33-number-2/musings}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Farrow08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Farrow08b, author = {Rik Farrow}, title = {Musings}, journal = {login Usenix Mag.}, volume = {33}, number = {3}, year = {2008}, url = {https://www.usenix.org/publications/login/june-2008-volume-33-number-3/musings}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Farrow08b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Farrow08c, author = {Rik Farrow}, title = {Musings}, journal = {login Usenix Mag.}, volume = {33}, number = {4}, year = {2008}, url = {https://www.usenix.org/publications/login/august-2008-volume-33-number-4/musings}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Farrow08c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Farrow08d, author = {Rik Farrow}, title = {Musings}, journal = {login Usenix Mag.}, volume = {33}, number = {5}, year = {2008}, url = {https://www.usenix.org/publications/login/october-2008-volume-33-number-5/musings}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Farrow08d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Farrow08e, author = {Rik Farrow}, title = {Musings}, journal = {login Usenix Mag.}, volume = {33}, number = {6}, year = {2008}, url = {https://www.usenix.org/publications/login/december-2008-volume-33-number-6/musings}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Farrow08e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Ferrell08, author = {Robert G. Ferrell}, title = {/dev/random}, journal = {login Usenix Mag.}, volume = {33}, number = {1}, year = {2008}, url = {https://www.usenix.org/publications/login/february-2008-volume-33-number-1/devrandom}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Ferrell08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Ferrell08a, author = {Robert G. Ferrell}, title = {/dev/random}, journal = {login Usenix Mag.}, volume = {33}, number = {2}, year = {2008}, url = {https://www.usenix.org/publications/login/april-2008-volume-33-number-2/devrandom}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Ferrell08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Ferrell08b, author = {Robert G. Ferrell}, title = {/dev/random}, journal = {login Usenix Mag.}, volume = {33}, number = {3}, year = {2008}, url = {https://www.usenix.org/publications/login/june-2008-volume-33-number-3/devrandom}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Ferrell08b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Ferrell08c, author = {Robert G. Ferrell}, title = {/dev/random}, journal = {login Usenix Mag.}, volume = {33}, number = {4}, year = {2008}, url = {https://www.usenix.org/publications/login/august-2008-volume-33-number-4/devrandom}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Ferrell08c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Ferrell08d, author = {Robert G. Ferrell}, title = {/dev/random}, journal = {login Usenix Mag.}, volume = {33}, number = {5}, year = {2008}, url = {https://www.usenix.org/publications/login/october-2008-volume-33-number-5/devrandom}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Ferrell08d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Ferrell08e, author = {Robert G. Ferrell}, title = {/dev/random}, journal = {login Usenix Mag.}, volume = {33}, number = {6}, year = {2008}, url = {https://www.usenix.org/publications/login/december-2008-volume-33-number-6/devrandom}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Ferrell08e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/FrischKS08, author = {{\AE}leen Frisch and Brad Knowles and Sam Stover}, title = {Book Reviews}, journal = {login Usenix Mag.}, volume = {33}, number = {1}, year = {2008}, url = {https://www.usenix.org/publications/login/february-2008-volume-33-number-1/book-reviews}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/FrischKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Galvin08, author = {Peter Baer Galvin}, title = {Pete's All Things Sun {(PATS):} The Future of Sun}, journal = {login Usenix Mag.}, volume = {33}, number = {1}, year = {2008}, url = {https://www.usenix.org/publications/login/february-2008-volume-33-number-1/petes-all-things-sun-pats-future-sun}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Galvin08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Galvin08a, author = {Peter Baer Galvin}, title = {Pete's All Things Sun {(PATS):} The Security Sheriff}, journal = {login Usenix Mag.}, volume = {33}, number = {2}, year = {2008}, url = {https://www.usenix.org/publications/login/april-2008-volume-33-number-2/petes-all-things-sun-pats-security-sheriff}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Galvin08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Galvin08b, author = {Peter Baer Galvin}, title = {Pete's All Things Sun {(PATS):} The State of {ZFS}}, journal = {login Usenix Mag.}, volume = {33}, number = {3}, year = {2008}, url = {https://www.usenix.org/publications/login/june-2008-volume-33-number-3/petes-all-things-sun-pats-state-zfs}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Galvin08b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Galvin08c, author = {Peter Baer Galvin}, title = {Pete's All Things Sun: Solaris SystemAnalysis 101}, journal = {login Usenix Mag.}, volume = {33}, number = {4}, year = {2008}, url = {https://www.usenix.org/publications/login/august-2008-volume-33-number-4/petes-all-things-sun-solaris-system-analysis-101}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Galvin08c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Galvin08d, author = {Peter Baer Galvin}, title = {Pete's All Things Sun: Solaris SystemAnalysis 102}, journal = {login Usenix Mag.}, volume = {33}, number = {5}, year = {2008}, url = {https://www.usenix.org/publications/login/october-2008-volume-33-number-5/petes-all-things-sun-solaris-system-analysis-102}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Galvin08d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Galvin08e, author = {Peter Baer Galvin}, title = {Pete's All Things Sun: The Death of Solaris}, journal = {login Usenix Mag.}, volume = {33}, number = {6}, year = {2008}, url = {https://www.usenix.org/publications/login/december-2008-volume-33-number-6/petes-all-things-sun-death-solaris}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Galvin08e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/GrierTK08, author = {Chris Grier and Shuo Tang and Samuel T. King}, title = {Building a More Secure Web Browser}, journal = {login Usenix Mag.}, volume = {33}, number = {4}, year = {2008}, url = {https://www.usenix.org/publications/login/august-2008-volume-33-number-4/building-more-secure-web-browser}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/GrierTK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/HuDM08, author = {Wenjin Hu and Todd Deshane and Jeanna N. Matthews}, title = {Solaris Virtualization Options}, journal = {login Usenix Mag.}, volume = {33}, number = {5}, year = {2008}, url = {https://www.usenix.org/publications/login/october-2008-volume-33-number-5/solaris-virtualization-options}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/HuDM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/JiangH0K08, author = {Weihang Jiang and Chongfeng Hu and Yuanyuan Zhou and Arkady Kanevsky}, title = {Don't Blame Disks for Every Storage Subsystem Failure}, journal = {login Usenix Mag.}, volume = {33}, number = {3}, year = {2008}, url = {https://www.usenix.org/publications/login/june-2008-volume-33-number-3/dont-blame-disks-every-storage-subsystem-failure}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/JiangH0K08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/JonesG08, author = {Michael B. Jones and Dan Geer}, title = {2008 {USENIX} Nominating Committee Report}, journal = {login Usenix Mag.}, volume = {33}, number = {1}, year = {2008}, url = {https://www.usenix.org/publications/login/february-2008-volume-33-number-1/2008-usenix-nominating-committee-report}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/JonesG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Josephsen08, author = {David Josephsen}, title = {iVoyeur: Permission to Parse}, journal = {login Usenix Mag.}, volume = {33}, number = {1}, year = {2008}, url = {https://www.usenix.org/publications/login/february-2008-volume-33-number-1/ivoyeur-permission-parse}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Josephsen08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Josephsen08a, author = {David Josephsen}, title = {iVoyeur: Comply}, journal = {login Usenix Mag.}, volume = {33}, number = {2}, year = {2008}, url = {https://www.usenix.org/publications/login/april-2008-volume-33-number-2/ivoyeur-comply}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Josephsen08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Josephsen08b, author = {David Josephsen}, title = {iVoyeur: Admin, Root Thyself}, journal = {login Usenix Mag.}, volume = {33}, number = {3}, year = {2008}, url = {https://www.usenix.org/publications/login/june-2008-volume-33-number-3/ivoyeur-admin-root-thyself}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Josephsen08b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Josephsen08c, author = {David Josephsen}, title = {iVoyeur: Hold the Pixels}, journal = {login Usenix Mag.}, volume = {33}, number = {4}, year = {2008}, url = {https://www.usenix.org/publications/login/august-2008-volume-33-number-4/ivoyeur-hold-pixels}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Josephsen08c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Josephsen08d, author = {David Josephsen}, title = {iVoyeur: You Should Write an {NEB} Module}, journal = {login Usenix Mag.}, volume = {33}, number = {5}, year = {2008}, url = {https://www.usenix.org/publications/login/october-2008-volume-33-number-5/ivoyeur-you-should-write-neb-module}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Josephsen08d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Josephsen08e, author = {David Josephsen}, title = {iVoyeur: You Should Write an {NEB} Module, Revisited}, journal = {login Usenix Mag.}, volume = {33}, number = {6}, year = {2008}, url = {https://www.usenix.org/publications/login/december-2008-volume-33-number-6/ivoyeur-you-should-write-neb-module-revisited}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Josephsen08e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Knowles08, author = {Brad Knowles}, title = {Building Scalable {NTP} Server Infrastructures}, journal = {login Usenix Mag.}, volume = {33}, number = {5}, year = {2008}, url = {https://www.usenix.org/publications/login/october-2008-volume-33-number-5/building-scalable-ntp-server-infrastructures}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Knowles08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Kolstad08, author = {Rob Kolstad}, title = {Report on {USACO}}, journal = {login Usenix Mag.}, volume = {33}, number = {5}, year = {2008}, url = {https://www.usenix.org/publications/login/october-2008-volume-33-number-5/report-usaco}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Kolstad08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/KostersK08, author = {Mark Kosters and Megan Kruse}, title = {IPv6: It's Time to Make the Move}, journal = {login Usenix Mag.}, volume = {33}, number = {2}, year = {2008}, url = {https://www.usenix.org/publications/login/april-2008-volume-33-number-2/ipv6-its-time-make-move}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/KostersK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Langheinrich08, author = {Eric Langheinrich}, title = {http: {BL:} Taking {DNSBL} Beyond {SMTP}}, journal = {login Usenix Mag.}, volume = {33}, number = {1}, year = {2008}, url = {https://www.usenix.org/publications/login/february-2008-volume-33-number-1/httpbl-taking-dnsbl-beyond-smtp}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Langheinrich08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Long08, author = {Jane{-}Ellen Long}, title = {Update on {SAGE}}, journal = {login Usenix Mag.}, volume = {33}, number = {5}, year = {2008}, url = {https://www.usenix.org/publications/login/october-2008-volume-33-number-5/update-sage}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Long08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/McCool08, author = {Michael D. McCool}, title = {Achieving High Performance by Targeting Multiple Parallelism Mechanisms}, journal = {login Usenix Mag.}, volume = {33}, number = {2}, year = {2008}, url = {https://www.usenix.org/publications/login/april-2008-volume-33-number-2/achieving-high-performance-targeting-multiple}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/McCool08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/MurtyPCWZ08, author = {Rohan Murty and Jitendra Padhye and Ranveer Chandra and Alec Wolman and Brian Zill}, title = {Designing High-Performance Enterprise Wi-FiNetworks}, journal = {login Usenix Mag.}, volume = {33}, number = {4}, year = {2008}, url = {https://www.usenix.org/publications/login/august-2008-volume-33-number-4/designing-high-performance-enterprise-wi-fi}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/MurtyPCWZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Orgeron08, author = {Octave Orgeron}, title = {An Introduction to Logical Domains}, journal = {login Usenix Mag.}, volume = {33}, number = {1}, year = {2008}, url = {https://www.usenix.org/publications/login/february-2008-volume-33-number-1/introduction-logical-domains}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Orgeron08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Orgeron08a, author = {Octave Orgeron}, title = {An Introduction to Logical Domains, Part 4}, journal = {login Usenix Mag.}, volume = {33}, number = {2}, year = {2008}, url = {https://www.usenix.org/publications/login/april-2008-volume-33-number-2/introduction-logical-domains-part-4}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Orgeron08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Piscitello08, author = {Dave Piscitello}, title = {Are Commercial Firewalls Ready for {IP} Version 6?}, journal = {login Usenix Mag.}, volume = {33}, number = {2}, year = {2008}, url = {https://www.usenix.org/publications/login/april-2008-volume-33-number-2/are-commercial-firewalls-ready-ip-version-6}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Piscitello08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Sacks08, author = {Matthew Sacks}, title = {Linux Kernel Resource Allocation in Virtualized Environments}, journal = {login Usenix Mag.}, volume = {33}, number = {2}, year = {2008}, url = {https://www.usenix.org/publications/login/april-2008-volume-33-number-2/linux-kernel-resource-allocation-virtualized}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Sacks08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Sahore08, author = {Sandeep Sahore}, title = {Reclaim Disk Space by Shrinking Files}, journal = {login Usenix Mag.}, volume = {33}, number = {5}, year = {2008}, url = {https://www.usenix.org/publications/login/october-2008-volume-33-number-5/reclaim-disk-space-shrinking-files}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Sahore08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/SamuelPC08, author = {Justin Samuel and Jeremy Plichta and Justin Cappos}, title = {Centralized Package Management Using Stork}, journal = {login Usenix Mag.}, volume = {33}, number = {1}, year = {2008}, url = {https://www.usenix.org/publications/login/february-2008-volume-33-number-1/centralized-package-management-using-stork}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/SamuelPC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Seltzer08, author = {Margo I. Seltzer}, title = {The Present and Future of {SAN/NAS:} Interview with Dave Hitz and Brian Pawlowsky of NetApp}, journal = {login Usenix Mag.}, volume = {33}, number = {3}, year = {2008}, url = {https://www.usenix.org/publications/login/june-2008-volume-33-number-3/present-and-future-sannas-interview-dave-hitz-and}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Seltzer08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/SmallMMM08, author = {Sam Small and Joshua Mason and Ryan MacArthur and Fabian Monrose}, title = {Masquerade: Simulating a Thousand Victims}, journal = {login Usenix Mag.}, volume = {33}, number = {6}, year = {2008}, url = {https://www.usenix.org/publications/login/december-2008-volume-33-number-6/masquerade-simulating-thousand-victims}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/SmallMMM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/SmettersDNGE08, author = {Diana K. Smetters and Brinda Dalal and Les Nelson and Nathaniel Good and Ame Elliot}, title = {Ad Hoc Guesting: When Exceptions Arethe Rule}, journal = {login Usenix Mag.}, volume = {33}, number = {4}, year = {2008}, url = {https://www.usenix.org/publications/login/august-2008-volume-33-number-4/ad-hoc-guesting-when-exceptions-are-rule}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/SmettersDNGE08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Solomon08, author = {Bob Solomon}, title = {A 36-User Asterisk Installation}, journal = {login Usenix Mag.}, volume = {33}, number = {5}, year = {2008}, url = {https://www.usenix.org/publications/login/october-2008-volume-33-number-5/36-user-asterisk-installation}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Solomon08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Sood08, author = {Aditya K. Sood}, title = {Insecurities in Designing {XML} Signatures}, journal = {login Usenix Mag.}, volume = {33}, number = {1}, year = {2008}, url = {https://www.usenix.org/publications/login/february-2008-volume-33-number-1/insecurities-designing-xml-signatures}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Sood08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Sood08a, author = {Aditya K. Sood}, title = {Hacking 802.11 Protocol Insecurities}, journal = {login Usenix Mag.}, volume = {33}, number = {2}, year = {2008}, url = {https://www.usenix.org/publications/login/april-2008-volume-33-number-2/hacking-80211-protocol-insecurities}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Sood08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/StorerGMV08, author = {Mark W. Storer and Kevin M. Greenan and Ethan L. Miller and Kaladhar Voruganti}, title = {Pergamum: Energy-efficient Archival Storage with Disk Instead of Tape}, journal = {login Usenix Mag.}, volume = {33}, number = {3}, year = {2008}, url = {https://www.usenix.org/publications/login/june-2008-volume-33-number-3/pergamum-energy-efficient-archival-storage-disk}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/StorerGMV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Stoughton08, author = {Nick Stoughton}, title = {Toward Attributes}, journal = {login Usenix Mag.}, volume = {33}, number = {1}, year = {2008}, url = {https://www.usenix.org/publications/login/february-2008-volume-33-number-1/toward-attributes}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Stoughton08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Stoughton08a, author = {Nick Stoughton}, title = {Update on Standards: Undue Influence?}, journal = {login Usenix Mag.}, volume = {33}, number = {3}, year = {2008}, url = {https://www.usenix.org/publications/login/june-2008-volume-33-number-3/update-standards-undue-influence}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Stoughton08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Stoughton08b, author = {Nick Stoughton}, title = {Update on Standards: The {USENIX} Standards Project}, journal = {login Usenix Mag.}, volume = {33}, number = {5}, year = {2008}, url = {https://www.usenix.org/publications/login/october-2008-volume-33-number-5/update-standards-usenix-standards-project}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Stoughton08b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Stoughton08c, author = {Nick Stoughton}, title = {Update on Standards: Diary of a StandardsGeek, Part 2}, journal = {login Usenix Mag.}, volume = {33}, number = {6}, year = {2008}, url = {https://www.usenix.org/publications/login/december-2008-volume-33-number-6/update-standards-diary-standards-geek-part-2}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Stoughton08c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/TsafrirS008, author = {Dan Tsafrir and Dilma Da Silva and David A. Wagner}, title = {The Murky Issue of Changing Process Identity: Revising "Setuid Demystified"}, journal = {login Usenix Mag.}, volume = {33}, number = {3}, year = {2008}, url = {https://www.usenix.org/publications/login/june-2008-volume-33-number-3/murky-issue-changing-process-identity-revising}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/TsafrirS008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Walker08, author = {Edward Walker}, title = {Benchmarking Amazon {EC2} for High-Performance Scientific Computing}, journal = {login Usenix Mag.}, volume = {33}, number = {5}, year = {2008}, url = {https://www.usenix.org/publications/login/october-2008-volume-33-number-5/benchmarking-amazon-ec2-high-performance}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Walker08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Yardley08, author = {Tim Yardley}, title = {{SCADA:} Issues, Vulnerabilities, and FutureDirections}, journal = {login Usenix Mag.}, volume = {33}, number = {6}, year = {2008}, url = {https://www.usenix.org/publications/login/december-2008-volume-33-number-6/scada-issues-vulnerabilities-and-future}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Yardley08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Young08, author = {Ellie Young}, title = {Summary of {USENIX} Board of Directors Meetings and Actions}, journal = {login Usenix Mag.}, volume = {33}, number = {1}, year = {2008}, url = {https://www.usenix.org/publications/login/february-2008-volume-33-number-1/summary-usenix-board-directors-meetings-and}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Young08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Young08a, author = {Ellie Young}, title = {Thanks to Our Volunteers}, journal = {login Usenix Mag.}, volume = {33}, number = {6}, year = {2008}, url = {https://www.usenix.org/publications/login/december-2008-volume-33-number-6/thanks-our-volunteers}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Young08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Zwickya08, author = {Elizabeth Zwicky and et al.}, title = {Book Reviews}, journal = {login Usenix Mag.}, volume = {33}, number = {2}, year = {2008}, url = {https://www.usenix.org/publications/login/april-2008-volume-33-number-2/book-reviews}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Zwickya08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Zwickya08a, author = {Elizabeth Zwicky and et al.}, title = {Book Reviews}, journal = {login Usenix Mag.}, volume = {33}, number = {3}, year = {2008}, url = {https://www.usenix.org/publications/login/june-2008-volume-33-number-3/book-reviews}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Zwickya08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Zwickya08b, author = {Elizabeth Zwicky and et al.}, title = {Book Reviews}, journal = {login Usenix Mag.}, volume = {33}, number = {4}, year = {2008}, url = {https://www.usenix.org/publications/login/august-2008-volume-33-number-4/book-reviews}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Zwickya08b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Zwickya08c, author = {Elizabeth Zwicky and et al.}, title = {Book Reviews}, journal = {login Usenix Mag.}, volume = {33}, number = {5}, year = {2008}, url = {https://www.usenix.org/publications/login/october-2008-volume-33-number-5/book-reviews}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Zwickya08c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Zwickya08d, author = {Elizabeth Zwicky and et al.}, title = {Book Reviews}, journal = {login Usenix Mag.}, volume = {33}, number = {6}, year = {2008}, url = {https://www.usenix.org/publications/login/december-2008-volume-33-number-6/book-reviews}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Zwickya08d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.