-
1
-
-
0028377540
-
On the self-similar nature of ethernet traffic (extended version)
-
Feb.
-
W. E. Leland, M. S. Taqqu, W. Willinger, and D. V. Wilson, "On the self-similar nature of ethernet traffic (extended version)," IEEE/ACM Trans. Networking, vol. 2, pp. 1-15, Feb. 1994.
-
(1994)
IEEE/ACM Trans. Networking
, vol.2
, pp. 1-15
-
-
Leland, W.E.1
Taqqu, M.S.2
Willinger, W.3
Wilson, D.V.4
-
3
-
-
0035012692
-
Inferring link loss using striped unicast probes
-
N. G. Duffield, F. L. Presti, V. Paxson, and D. Towsley, "Inferring link loss using striped unicast probes," in Proc. IEEE INFOCOM, 2001.
-
(2001)
Proc. IEEE INFOCOM
-
-
Duffield, N.G.1
Presti, F.L.2
Paxson, V.3
Towsley, D.4
-
4
-
-
85032752298
-
Internet tomography
-
May
-
M. Coates, A. Hero, R. Nowak, and B. Yu, "Internet tomography," IEEE Signal Processing Mag., vol. 19, pp. 47-65, May 2002.
-
(2002)
IEEE Signal Processing Mag.
, vol.19
, pp. 47-65
-
-
Coates, M.1
Hero, A.2
Nowak, R.3
Yu, B.4
-
5
-
-
0042109344
-
-
Ph.D. dissertation, Rensselaer Polytech. Inst., Troy, NY. Under patent with RPI
-
M. Thottan, "Fault detection in ip networks," Ph.D. dissertation, Rensselaer Polytech. Inst., Troy, NY, 2000. Under patent with RPI.
-
(2000)
Fault Detection in IP Networks
-
-
Thottan, M.1
-
7
-
-
0042109345
-
Multiagent-based cooperative inter-as diagnosis in encore
-
O. Akashi, T. Sugawara, K. Murakami, M. Maruyama, and N. Takahashi, "Multiagent-based cooperative inter-as diagnosis in encore," in Proc. NOMS, 2000.
-
(2000)
Proc. NOMS
-
-
Akashi, O.1
Sugawara, T.2
Murakami, K.3
Maruyama, M.4
Takahashi, N.5
-
9
-
-
0043111232
-
Network management and control using collaborative on-line simulation
-
T. Ye, S. Kalyanaraman, D. Harrison, B. Sikdar, B. Mo, H. T. Kaur, K. Vastola, and B. Szymanski, "Network management and control using collaborative on-line simulation," in Proc. CNDSMS, 2000.
-
(2000)
Proc. CNDSMS
-
-
Ye, T.1
Kalyanaraman, S.2
Harrison, D.3
Sikdar, B.4
Mo, B.5
Kaur, H.T.6
Vastola, K.7
Szymanski, B.8
-
10
-
-
21344482808
-
A storage model with self-similar input
-
I. Norros, "A storage model with self-similar input," Queueing Syst., vol. 16, pp. 387-396, 1994.
-
(1994)
Queueing Syst.
, vol.16
, pp. 387-396
-
-
Norros, I.1
-
11
-
-
0032686283
-
A multifractal wavelet model with application to network traffic
-
Mar.
-
R. H. Reidi, M. S. Crouse, V. J. Ribeiro, and R. G. Baraniuk, "A multifractal wavelet model with application to network traffic," IEEE Trans. Inform. Theory, vol. 45, pp. 992-1018, Mar. 1999.
-
(1999)
IEEE Trans. Inform. Theory
, vol.45
, pp. 992-1018
-
-
Reidi, R.H.1
Crouse, M.S.2
Ribeiro, V.J.3
Baraniuk, R.G.4
-
12
-
-
0032625224
-
Scaling analysis of conservative cascades with applications to network traffic
-
Mar.
-
A. C. Gilbert, W. Willinger, and A. Feldmann, "Scaling analysis of conservative cascades with applications to network traffic," IEEE Trans. Inform. Theory, vol. 45, pp. 971-991, Mar. 1999.
-
(1999)
IEEE Trans. Inform. Theory
, vol.45
, pp. 971-991
-
-
Gilbert, A.C.1
Willinger, W.2
Feldmann, A.3
-
13
-
-
0043111231
-
Using network fault predictions to enable ip traffic management
-
M. Thottan and C. Ji, "Using network fault predictions to enable ip traffic management," J. Network Syst. Manage., 2000.
-
(2000)
J. Network Syst. Manage.
-
-
Thottan, M.1
Ji, C.2
-
14
-
-
0025505472
-
A case study of ethernet anomalies in a distributed computing environment
-
Oct.
-
R. Maxion and F. E. Feather, "A case study of ethernet anomalies in a distributed computing environment," IEEE Trans. Reliability, vol. 39, pp. 433-443, Oct. 1990.
-
(1990)
IEEE Trans. Reliability
, vol.39
, pp. 433-443
-
-
Maxion, R.1
Feather, F.E.2
-
15
-
-
85019504940
-
Netstat: A network based intrusuion detection approach
-
G. Vigna and R. A. Kemmerer, "Netstat: A network based intrusuion detection approach," in Proc. ACSAC, 1998.
-
(1998)
Proc. ACSAC
-
-
Vigna, G.1
Kemmerer, R.A.2
-
16
-
-
0041608419
-
Cards: A distributed system for detecting coordinated attacks
-
J. Yang, P. Ning, X. S. Wang, and S. Jajodia, "Cards: A distributed system for detecting coordinated attacks," in Proc. SEC, 2000, pp. 171-180.
-
(2000)
Proc. SEC
, pp. 171-180
-
-
Yang, J.1
Ning, P.2
Wang, X.S.3
Jajodia, S.4
-
17
-
-
0033650584
-
Practical network support for ip traceback
-
S. Savage, D. Wetherall, A. R. Karlin, and T. Anderson, "Practical network support for ip traceback," in Proc. ACM SIGCOMM, 2000, pp. 295-306.
-
(2000)
Proc. ACM SIGCOMM
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.R.3
Anderson, T.4
-
18
-
-
0041608421
-
-
[Online]
-
CAIDA. Cooperative association for internet data analysis. [Online]. Available: http://www/caida.org/Tools.
-
-
-
-
19
-
-
0034442563
-
Ip packet generation: Statistical models for tcp start times based on connection rate super position
-
W. S. Cleveland, D. Lin, and D. X. Sun, "Ip packet generation: Statistical models for tcp start times based on connection rate super position," in Proc. ACM SIGMETRICS, 2000, pp. 166-177.
-
(2000)
Proc. ACM SIGMETRICS
, pp. 166-177
-
-
Cleveland, W.S.1
Lin, D.2
Sun, D.X.3
-
20
-
-
0002869540
-
Measurement and analysis of ip network usage and behavior
-
May
-
R. Caceres, N. G. Duffield, A. Feldmann, J. Friedmann, A. Greenberg, R. Greer, T. Johnson, C. Kalmanek, B. Krishnamurthy, D. Lavelle, P. P. Mishra, K. K. Ramakrishnan, J. Rexford, F. True, and J. E. van der Merwe, "Measurement and analysis of ip network usage and behavior," IEEE Commun. Mag., pp. 144-151, May 2000.
-
(2000)
IEEE Commun. Mag.
, pp. 144-151
-
-
Caceres, R.1
Duffield, N.G.2
Feldmann, A.3
Friedmann, J.4
Greenberg, A.5
Greer, R.6
Johnson, T.7
Kalmanek, C.8
Krishnamurthy, B.9
Lavelle, D.10
Mishra, P.P.11
Ramakrishnan, K.K.12
Rexford, J.13
True, F.14
Van der Merwe, J.E.15
-
21
-
-
0033886694
-
Rates: A server for mpls traffic engineering
-
Mar./Apr.
-
P. Aukia, M. Kodialam, P. Koppol, T. Lakshman, H. Sarin, and B. Suter, "Rates: A server for mpls traffic engineering," IEEE Network Magazine, pp. 34-41, Mar./Apr. 2000.
-
(2000)
IEEE Network Magazine
, pp. 34-41
-
-
Aukia, P.1
Kodialam, M.2
Koppol, P.3
Lakshman, T.4
Sarin, H.5
Suter, B.6
-
22
-
-
0003945983
-
-
Wellesley, MA: Addison-Wesley
-
W. Stallings, SNMP, SNMPv2, and CMIP The Practical Guide to Network Management Standards, 5th ed. Wellesley, MA: Addison-Wesley, 1994.
-
(1994)
SNMP, SNMPv2, and CMIP The Practical Guide to Network Management Standards, 5th Ed.
-
-
Stallings, W.1
-
25
-
-
0029712402
-
Computational intelligence for distributed fault management in networks using fuzzy cognitive maps
-
Dallas, TX, Jun.
-
T. D. Ndousse and T. Okuda, "Computational intelligence for distributed fault management in networks using fuzzy cognitive maps," in Proc. IEEE ICC, Dallas, TX, Jun. 1996, pp. 1558-1562.
-
(1996)
Proc. IEEE ICC
, pp. 1558-1562
-
-
Ndousse, T.D.1
Okuda, T.2
-
26
-
-
0027188570
-
A case based reasoning approach to the management of faults in communication networks
-
San Francisco, CA, Mar.
-
L. Lewis, "A case based reasoning approach to the management of faults in communication networks," in Proc. IEEE INFOCOM, vol. 3, San Francisco, CA, Mar. 1993, pp. 1422-1429.
-
(1993)
Proc. IEEE INFOCOM
, vol.3
, pp. 1422-1429
-
-
Lewis, L.1
-
27
-
-
0029696515
-
Performance evaluation for proactive network management
-
Dallas, TX, June
-
A. S. Franceschi, L. F. Kormann, and C. B. Westphall, "Performance evaluation for proactive network management," in Proc. IEEE ICC, Dallas, TX, June 1996, pp. 22-26.
-
(1996)
Proc. IEEE ICC
, pp. 22-26
-
-
Franceschi, A.S.1
Kormann, L.F.2
Westphall, C.B.3
-
28
-
-
84942211816
-
Extending trouble ticket systems to fault diagnosis
-
Nov.
-
L. Lewis and G. Dreo, "Extending trouble ticket systems to fault diagnosis," IEEE Network, vol. 7, pp. 44-51, Nov. 1993.
-
(1993)
IEEE Network
, vol.7
, pp. 44-51
-
-
Lewis, L.1
Dreo, G.2
-
29
-
-
0029516767
-
Schemes for fault identification in communication networks
-
Dec.
-
I. Katzela and M. Schwarz, "Schemes for fault identification in communication networks," IEEE/ACM Trans. Networking, vol. 3, pp. 753-764, Dec. 1995.
-
(1995)
IEEE/ACM Trans. Networking
, vol.3
, pp. 753-764
-
-
Katzela, I.1
Schwarz, M.2
-
30
-
-
0003529235
-
Automatic alarm correlation for fault identification
-
Boston, MA, Apr.
-
I. Rouvellou and G. Hart, "Automatic alarm correlation for fault identification," in Proc. IEEE INFOCOM, Boston, MA, Apr. 1995, pp. 553-561.
-
(1995)
Proc. IEEE INFOCOM
, pp. 553-561
-
-
Rouvellou, I.1
Hart, G.2
-
31
-
-
0042910774
-
On the design of observers for failure detection of discrete event systems
-
New York: Plenum
-
A. Bouloutas, G. Hart, and M. Schwartz, "On the design of observers for failure detection of discrete event systems," in Network Management and Control. New York: Plenum, 1990.
-
(1990)
Network Management and Control
-
-
Bouloutas, A.1
Hart, G.2
Schwartz, M.3
-
32
-
-
85038595599
-
Models and algorithms for network fault detection and identification: A review
-
A. Lazar, W. Wang, and R. Deng, "Models and algorithms for network fault detection and identification: A review," in Proc. IEEE Int. Contr. Conf., 1992.
-
(1992)
Proc. IEEE Int. Contr. Conf.
-
-
Lazar, A.1
Wang, W.2
Deng, R.3
-
33
-
-
84942210245
-
Alarm correlation
-
Nov.
-
G. Jakobson and M. D. Weissman, "Alarm correlation," IEEE Network, vol. 7, pp. 52-59, Nov. 1993.
-
(1993)
IEEE Network
, vol.7
, pp. 52-59
-
-
Jakobson, G.1
Weissman, M.D.2
-
34
-
-
84883986894
-
Fault detection in an ethernet network using anomaly signature matching
-
San Francisco, CA, Sept.
-
F. Feather and R. Maxion, "Fault detection in an ethernet network using anomaly signature matching," in Proc. ACM SIGCOMM, vol. 23, San Francisco, CA, Sept. 1993, pp. 279-288.
-
(1993)
Proc. ACM SIGCOMM
, vol.23
, pp. 279-288
-
-
Feather, F.1
Maxion, R.2
-
35
-
-
0033713861
-
Implementing enhanced network maintenance for transaction access services: Tools and applications
-
S. Papavassiliou, M. Pace, A. Zawadzki, and L. Ho, "Implementing enhanced network maintenance for transaction access services: Tools and applications," Proc. IEEE Int. Contr. Conf., vol. 1, pp. 211-215, 2000.
-
(2000)
Proc. IEEE Int. Contr. Conf.
, vol.1
, pp. 211-215
-
-
Papavassiliou, S.1
Pace, M.2
Zawadzki, A.3
Ho, L.4
-
37
-
-
0004060193
-
-
New York: Wiley
-
C. Cohen-Tannoudji, B. Diu, and F. Laloe, Quantum Mechanics, 2nd ed. New York: Wiley, 1977, vol. 1.
-
(1977)
Quantum Mechanics, 2nd Ed.
, vol.1
-
-
Cohen-Tannoudji, C.1
Diu, B.2
Laloe, F.3
-
38
-
-
0025236073
-
Application of the Karhunen-Loeve procedure for the characterization of human faces
-
Jan.
-
M. Kirby and L. Sirovich, "Application of the Karhunen-Loeve procedure for the characterization of human faces," IEEE Trans. Pattern Anal. Machine Intell., vol. 12, pp. 103-108, Jan. 1990.
-
(1990)
IEEE Trans. Pattern Anal. Machine Intell.
, vol.12
, pp. 103-108
-
-
Kirby, M.1
Sirovich, L.2
-
40
-
-
0032154135
-
Proactive anomaly detection using distributed intelligent agents
-
Sept./Oct.
-
M. Thottan and C. Ji, "Proactive anomaly detection using distributed intelligent agents," IEEE Network, vol. 12, pp. 21-27, Sept./Oct. 1998.
-
(1998)
IEEE Network
, vol.12
, pp. 21-27
-
-
Thottan, M.1
Ji, C.2
-
41
-
-
0031351694
-
Proactive network fault detection
-
Kobe, Japan, Apr. [Online]
-
C. Hood and C. Ji, "Proactive network fault detection," in Proc. IEEE INFOCOM, vol. 3, Kobe, Japan, Apr. 1997, pp. 1147-1155. [Online]. Available: http://neuron.ecse.rpi.edu/.
-
(1997)
Proc. IEEE INFOCOM
, vol.3
, pp. 1147-1155
-
-
Hood, C.1
Ji, C.2
-
42
-
-
11644274311
-
-
Ph.D. dissertation, Rensselaer Polytech. Inst., Troy, NY
-
C. Hood, "Intelligent detection for fault management for communication networks," Ph.D. dissertation, Rensselaer Polytech. Inst., Troy, NY, 1996.
-
(1996)
Intelligent Detection for Fault Management for Communication Networks
-
-
Hood, C.1
-
43
-
-
0043111226
-
Load characterization, overload prediction and load anomaly detection for voice over ip traffic
-
Nov.
-
M. Mandjes, I. Saniee, S. Stolyar, and R. Schmidt, "Load characterization, overload prediction and load anomaly detection for voice over ip traffic," in Proc. 38th Annu. Allerton Conf. Commun., Contr. Comput., Nov. 2000.
-
(2000)
Proc. 38th Annu. Allerton Conf. Commun., Contr. Comput.
-
-
Mandjes, M.1
Saniee, I.2
Stolyar, S.3
Schmidt, R.4
-
44
-
-
0043016367
-
Distributed network monitoring with bounded link utilizationin ip networks
-
to be published
-
L. Li, M. Thottan, B. Yao, and S. Paul, "Distributed network monitoring with bounded link utilizationin ip networks," in Proc. IEEE Infocom., 2003, to be published.
-
(2003)
Proc. IEEE Infocom.
-
-
Li, L.1
Thottan, M.2
Yao, B.3
Paul, S.4
-
45
-
-
0036349134
-
Clock synchronization algorithms for network measurements
-
L. Zhang, Z. Liu, and C. Xia, "Clock synchronization algorithms for network measurements," in Proc. IEEE INFOCOM, 2002.
-
(2002)
Proc. IEEE INFOCOM
-
-
Zhang, L.1
Liu, Z.2
Xia, C.3
-
46
-
-
0041608416
-
-
M.S. Thesis, Rensselaer Polytechnic Inst., Troy, NY
-
M. Wei, "Computer communication network traffic: Modeling, analysis and tests," M.S. Thesis, Rensselaer Polytechnic Inst., Troy, NY, 1996.
-
(1996)
Computer Communication Network Traffic: Modeling, Analysis and Tests
-
-
Wei, M.1
|