Sciweavers

208 search results - page 13 / 42
» A Visual Approach for Monitoring Logs
Sort
View
156
Voted
HICSS
2012
IEEE
324views Biometrics» more  HICSS 2012»
13 years 11 months ago
Extending BPMN for Business Activity Monitoring
—Real-time access to key performance indicators is necessary to ensure timeliness and effectiveness of operational business processes. The concept of Business Activity Monitoring...
Jan-Philipp Friedenstab, Christian Janiesch, Marti...
124
Voted
EUROSYS
2006
ACM
16 years 16 days ago
Using queries for distributed monitoring and forensics
Distributed systems are hard to build, profile, debug, and test. Monitoring a distributed system – to detect and analyze bugs, test for regressions, identify fault-tolerance pr...
Atul Singh, Petros Maniatis, Timothy Roscoe, Peter...
122
Voted
AINTEC
2007
Springer
15 years 9 months ago
A Real-Time Performance-Monitoring Tool for Emergency Networks
Abstract. Emergency networks normally operate under highly unpredictable wireless environment and hence real time performance information holds a great significance that cannot be...
Shuprabha Shakya, Mohammad Abdul Awal, Dwijendra K...
124
Voted
HICSS
2008
IEEE
132views Biometrics» more  HICSS 2008»
15 years 10 months ago
Monitoring of Power System Dynamic Behavior Using Characteristic Ellipsoid Method
The potential uses of the sub-second GPSsynchronized phasor data collected from various locations within an electric power system promise endless benefits for the applications tar...
Yuri V. Makarov, Carl H. Miller, Tony B. Nguyen
140
Voted
VIZSEC
2005
Springer
15 years 9 months ago
A User-centered Look at Glyph-based Security Visualization
This paper presents the Intrusion Detection toolkit (IDtk), an information Visualization tool for intrusion detection (ID). IDtk was developed through a user-centered design proce...
Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, ...