Sciweavers

PDPTA
2003
13 years 6 months ago
Distributed Network Monitoring Using Mobile Agents Paradigm
Traditionally network monitoring and management has been done using predominantly centralized techniques. Mobile agents have been proposed as an alternative to this centralized app...
Farhad Kamangar, David Levine, Gergely V. Zá...
AUSFORENSICS
2003
13 years 6 months ago
Design of a Network-Access Audit Log for Security Monitoring and Forensic Investigation
An attempt at determining the source of anomalous network traffic may result in the identification of the networked system where it originated. From a forensic point of view it is...
Atif Ahmad, Tobias Ruighaver
NETWORKING
2007
13 years 6 months ago
On-Line Predictive Load Shedding for Network Monitoring
Building robust network monitoring applications is hard given the unpredictable nature of network traffic. Complex analysis on streaming network data usually leads to overload situ...
Pere Barlet-Ros, Diego Amores-López, Gianlu...
IMC
2007
ACM
13 years 6 months ago
Legal issues surrounding monitoring during network research
This work was motivated by a discussion that two of the coauthors (computer science professors) had with the other coauthor (a law professor and a former computer crime Trial Atto...
Douglas C. Sicker, Paul Ohm, Dirk Grunwald
IFIP
2010
Springer
13 years 6 months ago
The Network Data Handling War: MySQL vs. NfDump
Abstract. Network monitoring plays a crucial role in any network management environment. Especially nowadays, with network speed and load constantly increasing, more and more data ...
Rick Hofstede, Anna Sperotto, Tiago Fioreze, Aiko ...
DSOM
1999
Springer
13 years 8 months ago
JAMAP: A Web-based Management Platform for IP Networks
In this paper, we describe JAMAP, a prototype of a Web-based management platform for IP networks. It is written entirely in Java. It implements the push model to perform regular ma...
Jean-Philippe Martin-Flatin, Laurent Bovet, Jean-P...
IV
2000
IEEE
123views Visualization» more  IV 2000»
13 years 9 months ago
Mapping Information onto 3D Virtual Worlds
This paper presents a strategy for automatically mapping information onto visual parameters in the field of three-dimensional (3D) information visualization. The work presented h...
Cristina Russo Dos Santos, Pascal Gros, Pierre Abe...
SIGMETRICS
2010
ACM
206views Hardware» more  SIGMETRICS 2010»
13 years 9 months ago
Successive c-optimal designs: a scalable technique to optimize the measurements on large networks
We propose a new approach to optimize the deployment and the sampling rates of network monitoring tools, such as Netflow, on a large IP network. It reduces to solving a stochasti...
Guillaume Sagnol, Mustapha Bouhtou, Stephane Gaube...
SIGUCCS
2003
ACM
13 years 9 months ago
Enforcing model network citizenship by remote administration
Higher education institutions have been striving to improve services and keep pace with new technologies. In a Higher education environment, the users utilize the available comput...
Prasun Gupta, Mahmoud Pegah
IMC
2003
ACM
13 years 9 months ago
Tomography-based overlay network monitoring
Overlay network monitoring enables distributed Internet applications to detect and recover from path outages and periods of degraded performance within seconds. For an overlay net...
Yan Chen, David Bindel, Randy H. Katz