Results 41 to 50 of about 2,296,766 (196)

Increasing resilience of ATM networks using traffic monitoring and automated anomaly analysis [PDF]

open access: yes, 2012
Systematic network monitoring can be the cornerstone for the dependable operation of safety-critical distributed systems. In this paper, we present our vision for informed anomaly detection through network monitoring and resilience measurements to ...
Johnson, Christopher W.   +2 more
core  

Linking behavioral ecology and population monitoring: The importance of group size for spatial population models

open access: yesEcosphere
Modeling the spatial distribution of wildlife abundance is paramount for management. In group‐forming species, group size and occurrence may be governed by different ecological processes.
Zackary J. Delisle   +9 more
doaj   +1 more source

Benefits of Using Network Modeling Platforms When Studying IP Networks and Traffic Characterization

open access: yesComputers, 2023
This article addresses the benefits of using IP network modeling platforms to study IP networks. For the purposes of this study, several models of IP networks were created, through which various hypotheses were studied.
Ivan Nedyalkov
doaj   +1 more source

SDL based validation of a node monitoring protocol

open access: yes, 2015
Mobile ad hoc network is a wireless, self-configured, infrastructureless network of mobile nodes. The nodes are highly mobile, which makes the application running on them face network related problems like node failure, link failure, network level ...
Giridharan, Anandi, Venkataram, Pallapa
core   +1 more source

Progressive damage assessment and network recovery after massive failures [PDF]

open access: yes, 2017
After a massive scale failure, the assessment of damages to communication networks requires local interventions and remote monitoring. While previous works on network recovery require complete knowledge of damage extent, we address the problem of damage ...
Bartolini, Novella   +3 more
core   +1 more source

Optimality of a Network Monitoring Agent and Validation in a Real Probe

open access: yesMathematics, 2023
The evolution of commodity hardware makes it possible to use this type of equipment to implement traffic monitoring systems. A preliminary empirical evaluation of a network traffic probe based on Linux indicates that the system performance has ...
Luis Zabala, Josu Doncel, Armando Ferro
doaj   +1 more source

Resource Aware Sensor Nodes in Wireless Sensor Networks [PDF]

open access: yes, 2005
Wireless sensor networks are continuing to receive considerable research interest due, in part, to the range of possible applications. One of the greatest challenges facing researchers is in overcoming the limited network lifetime inherent in the small ...
Al-Hashimi, Bashir M.   +3 more
core   +1 more source

SECURE NETWORK MONITORING

open access: yesSWorldJournal, 2023
n the paper, the tasks of SIEM, EDR and NDR in the SIEM-EDR-NDR triad are formed, the role, idea and processes of each component of the triad are considered separately, appropriate improvements to already existing known processes are proposed, the role ...
openaire   +1 more source

Thermokarst and precipitation drive changes in the area of lakes and ponds in the National Parks of northwestern Alaska, 1984–2018

open access: yesArctic, Antarctic, and Alpine Research, 2019
Lakes and ponds are important ecosystem components in arctic lowlands, and they are prone to rapid changes in surface area by thermokarst expansion and by sudden lake drainage. The 30 m resolution Landsat record (1984–2018) was used to derive a record of
David K. Swanson
doaj   +1 more source

Variable Length Motif Discovery in Time Series Data

open access: yesIEEE Access, 2023
The detection of recurring behavioral patterns in time series data, also called motif discovery, is a crucial step for mining insights in complex time series data, especially in complex environments where manual monitoring is not feasible.
M. Van Onsem   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy