60,698 Hits in 5.7 sec

A Self-Configuring Sensing System for Data Centers [chapter]

Malena Mesarina, Cyril Brignone, Tim Connors, Mehrban Jam, Geoff Lyon, Salil Pradhan, Bill Serra
2003 Lecture Notes in Computer Science  
We propose using a wireless self-configuring network of smart sensing nodes to alleviate these problems.  ...  Wiring sensors in a data center is extremely expensive in comparison to the wiring of computing equipment.  ...  A node computes a new path with the new node as an intermediate node based on the new node's location and existing knowledge of paths.  ... 
doi:10.1007/978-3-540-39671-0_19 fatcat:mjjjo7447janplnac4s5gw7lte


Timothy Roscoe, Richard Mortier, Paul Jardetzky, Steven Hand
2002 Proceedings of the 10th workshop on ACM SIGOPS European workshop: beyond the PC - EW10  
In this paper we propose using a wide variety of information gathering tools coupled with custom scripts and a Prolog language engine to aggregate information from multiple sources.  ...  . inconsistent configurations).  ...  Acknowledgments We would like to thank John Larson and the Sprint Labs Infrastructure Group for letting us loose on the Lab network in the early stages of this work.  ... 
doi:10.1145/1133373.1133379 dblp:conf/sigopsE/RoscoeMJH02 fatcat:ci3qu3xarfhpfh57cu2o5w4ip4

Context-Enriched and Location-Aware Services

MoonBae Song, Goreti Marreiros, Hoon Ko, Jae-Ho Choi
2012 Journal of Computer Networks and Communications  
The paper titled "Route anomaly detection using a linear route representation" discusses a technique for detecting route anomaly which is a common problem in our daily lives.  ...  Considering the repository with a wide knowledge of available components, more suitable configuration for the current running system can be achievable. Dr.  ...  The paper titled "Route anomaly detection using a linear route representation" discusses a technique for detecting route anomaly which is a common problem in our daily lives.  ... 
doi:10.1155/2012/649584 fatcat:lnacwa3advgpdels3s44bxbmtq

IT Autopilot: A flexible IT service management and delivery platform for small and medium business

S. Mastrianni, D. F. Bantz, K. A. Beaty, T. Chefalas, S. Jalan, G. Kar, A. Kochut, D. J. Lan, L. O'Connell, A. Sailer, G. Wang, Q. B. Wang (+1 others)
2007 IBM Systems Journal  
The network problem event is detected and routed to the proper network problem resolution module, or optionally, logged on the IT Autopilot console as a problem that requires human intervention to resolve  ...  This architecture includes a knowledge repository that provides expert help to detect and fix problems.  ... 
doi:10.1147/sj.463.0609 fatcat:6c6eis47bfgszbig4xpv2mjxwi

Machine Intelligence Techniques for Next-Generation Context-Aware Wireless Networks [article]

Tadilo Endeshaw Bogale, Xianbin Wang, Long Bao Le
2018 arXiv   pre-print
In particular, we provide comprehensive discussion on the utilization of these techniques for efficient data acquisition, knowledge discovery, network planning, operation and management of the next generation  ...  In this regard, the emerging fog (edge) computing architecture aiming to distribute computing, storage, control, communication, and networking functions closer to end users, have a great potential for  ...  Knowledge Discovery Efficient knowledge discovery is critical for optimized operation and management of the network.  ... 
arXiv:1801.04223v1 fatcat:5hrwouh6mrenvjnbqqwcbr5b3i

Brief announcement

Seda Davtyan, Kishori M. Konwar, Alexander A. Shvartsman
2013 Proceedings of the 2013 ACM symposium on Principles of distributed computing - PODC '13  
Distributed cooperative computing in networks involves marshaling collections of network nodes possessing the necessary computational resources.  ...  Before the willing nodes can act in a concerted way they must first discover one another. This is the general setting of the Resource Discovery Problem (RDP).  ...  INTRODUCTION A large collection of networked computers may need to cooperate in implementing a distributed system, for example, to provide a shared data service, or to perform a set of tasks.  ... 
doi:10.1145/2484239.2484278 dblp:conf/podc/DavtyanKS13 fatcat:ywlhs5sbt5cjrapgqje6hv5xy4

Vulnerability Assessment in Autonomic Networks and Services: A Survey

Martin Barrere, Remi Badonnel, Olivier Festor
2014 IEEE Communications Surveys and Tutorials  
Autonomic networks and services are exposed to a large variety of security risks.  ...  In particular, we analyze current methods and techniques contributing to the discovery, the description and the detection of these vulnerabilities.  ...  Such security knowledge increases the capability of autonomic networks and systems for detecting vulnerabilities in the surrounding environment (axis 3) and provides a strong support for taking decisions  ... 
doi:10.1109/surv.2013.082713.00154 fatcat:r6zfjuo4vreujkhd7ao2pjmicy

Facing Fault Management as It Is, Aiming for What You Would Like It to Be [chapter]

Roy Sterritt
2002 Lecture Notes in Computer Science  
and (ii) the induction of Bayesian Belief Networks (BBNs) for a complete 'intelligent' approach.  ...  Fault management is a complex task, subject to uncertainty in the symptoms presented.  ...  The paper has benefited from discussions with other members of the Jigsaw team and with collaborators at Nortel.  ... 
doi:10.1007/3-540-46019-5_3 fatcat:3nizbbjohvh3ranie5ydswv4hy

Intrusion Detection System Using Data Mining Techniques– A Review

Ranju Marwaha
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
Security is one of the most challenging areas for computers and networks.  ...  Intrusion Detection System tools aim to detect computer attacks, computer misuse and to alert the proper individuals upon detection. But still they face challenges in robust and changing environment.  ...  Network-based intrusion detection A network-based IDS monitors data from network traffic as well as data from one or more host computers to detect intrusions.  ... 
doi:10.23956/ijarcsse/v7i5/0161 fatcat:5vc2xvzmhrcjfpi52skakaq32u

Using zero configuration technology for IP addressing in optical networks

Freek Dijkstra, Jeroen J. van der Ham, Cees T.A.M. de Laat
2006 Future generations computer systems  
Host configuration in optical networks is usually done by hand.  ...  The proposed technology is designed for small networks without central control, and can be applied to optical private networks as long as there is no router in between the end-hosts.  ...  A very special thanks goes to Stuart Cheshire for taking the time to visit our lab in Amsterdam, fighting a cold due to the Dutch weather.  ... 
doi:10.1016/j.future.2006.03.021 fatcat:hgbtxrpisnbndi4fm5lt5igeoa

IP multicast operational network management: design, challenges, and experiences

P. Sharma, E. Perry, R. Malpani
2003 IEEE Network  
The lack of appropriate network management tools for IP multicast has proven to be a major barrier to its deployment.  ...  We describe the requirements of an operational multicast management platform and present mmon, a multicast network management system we have built, aimed primarily for use by engineering and operations  ...  The topology map is updated and events are generated upon detection of changes such as link failure or discovery of a new router.  ... 
doi:10.1109/mnet.2003.1188287 fatcat:l4s3qznyf5gaxb4kc7u46zoso4

Identifying the Absorption Bump with Deep Learning [article]

Min Li, Sudeep Gaddam, Xiaolin Li, Yinan Zhao, Jingzhe Ma, Jian Ge
2015 arXiv   pre-print
The success of Deep Learning based method inspires us to generalize a common methodology for broader science discovery problems.  ...  The broad absorption bump at 2175 Angstrom is the most prominent feature in the extinction curves. Traditionally, statistical methods are applied to detect the existence of the absorption bump.  ...  GENERALIZATION: BOOSTING SCIENCE DISCOVERY WITH DEEP LEARNING SCIENCE DISCOVERY PROBLEM Similar as the absorption bump detection, a category of problems in other science field involves the detection  ... 
arXiv:1511.05607v2 fatcat:os4nqkrgzbdmzh32tvh7jgwk4a

Optimized Asynchronous Passive Multi-Channel Discovery of Beacon-Enabled Networks [article]

Niels Karowski, Konstantin Miller
2015 arXiv   pre-print
Neighbor discovery is a fundamental task for wireless networks deployment. It is essential for setup and maintenance of networks and is typically a precondition for further communication.  ...  In this work we focus on passive discovery of networks operating in multi-channel environments, performed by listening for periodically transmitted beaconing messages.  ...  Equipped with this knowledge, in order to detect neighbor networks, a device performs neighbor discovery by selecting time slots during which it listens on particular channels in order to overhear beacons  ... 
arXiv:1506.05255v1 fatcat:xwrx3u7a55flxlnqews4qc35jm

Smart resource-aware multimedia sensor network for automatic detection of complex events

Fadi Al Machot, Carlo Tasso, Bernhard Dieber, Kyandoghere Kyamakya, Claudio Piciarelli, Christian Micheloni, Sabrina Londero, Massimiliano Valotto, Paolo Omero, Bernhard Rinner
2011 2011 8th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)  
Four subsystems have been implemented, the tracking and detection system, the network configuration system, the reasoning system and an advanced archiving system in an annotated multimedia database.  ...  This paper presents a smart resource-aware multimedia sensor network.  ...  Information on detected events as well as PTZ configuration are the input for the network reconfiguration subsystem which adapts the sensor configuration and node's power states according to the network's  ... 
doi:10.1109/avss.2011.6027362 dblp:conf/avss/MachotTDKPMLVOR11 fatcat:mtkk7xubb5gjhgnkjet7fmnxr4

A Case for Personal Virtual Networks

David Choffnes
2016 Proceedings of the 15th ACM Workshop on Hot Topics in Networks - HotNets '16  
While this enables a variety of services we increasingly rely on, these ubiquitous network connections raise a number of important concerns.  ...  The key idea is to allow a device connecting to a foreign network to establish a virtual network under the device's full control, thus providing the illusion of a personal home network wherever the device  ...  PVN Discovery and Deployment Protocol. When a user's PVN-enabled device connects to a network, it first conducts a network discovery operation to detect whether PVNs are supported.  ... 
doi:10.1145/3005745.3005753 dblp:conf/hotnets/Choffnes16 fatcat:maezlhtnpjhntbl2idwdq3br7u
« Previous Showing results 1 — 15 out of 60,698 results