ID | Interpret | Skladba | Album | |
181. | Zengineers | 30 minutes | Mental maps for large territories | |
182. | Lyle Lovett | Stand By Your Man | Lyle Lovett & His Large Band | |
183. | Storm Large & Rick Emerson | Radio Interview | Storm Large & Rick Emerson | |
184. | Storm Large on ntgradio.com w/Charmaine Brooks | Storm Large on ntgradio.com w/Charmaine Brooks | Storm Large on ntgradio.com w/Charmaine Brooks | |
185. | House of Large Sizes | Bankrupt in Hoven | House of Large Sizes & Treepeople Split 7'' | |
186. | Storm Large on ntgradio.com w/Charmaine Brooks | Storm Large on ntgradio.com w/Charmaine Brooks | Storm Large on ntgradio.com w/Charmaine Brooks | |
187. | David Wagner | The State of Electronic Voting, 2008 | 22nd Large Installation System Administration Conference | |
188. | James Hughes | OpenSolaris and the Direction of Future Operating Systems | 22nd Large Installation System Administration Conference | |
189. | James Hughes | OpenSolaris and the Direction of Future Operating Systems | 22nd Large Installation System Administration Conference | |
190. | Dan Langille | Fighting Spam with pf | 22nd Large Installation System Administration Conference | |
191. | Sean Kamath | Inside DreamWorks Animation Studios: A Look at Past, Present, and Future Challenges | 22nd Large Installation System Administration Conference | |
192. | Monica Lam | Beyond VDI: Why Thin Client Computing and Virtual Desktop Infrastructures Aren't Cutting It | 22nd Large Installation System Administration Conference | |
193. | Sean Kamath | Inside DreamWorks Animation Studios: A Look at Past, Present, and Future Challenges | 22nd Large Installation System Administration Conference | |
194. | Guanhua Yan, Los Alamos National Laboratory; Zhen Xiao, Peking University; Stephan Eidenbenz, Los Alamos National Laboratory | Catching Instant Messaging Worms with Change-Point Detection Techniques | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
195. | Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, and Stefan Savage, University of California, San Diego | The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
196. | D. Kevin McGrath and Minaxi Gupta, Indiana University, Bloomington | Behind Phishing: An Examination of Phisher Modi Operandi | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
197. | Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, and Stefan Savage, University of California, San Diego | The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
198. | Michalis Polychronakis, FORTH-ICS; Panayiotis Mavrommatis and Niels Provos, Google Inc. | Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
199. | Guanhua Yan, Los Alamos National Laboratory; Zhen Xiao, Peking University; Stephan Eidenbenz, Los Alamos National Laboratory | Catching Instant Messaging Worms with Change-Point Detection Techniques | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
200. | D. Kevin McGrath and Minaxi Gupta, Indiana University, Bloomington | Behind Phishing: An Examination of Phisher Modi Operandi | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |