Computer network management

作者: Michael Mead

DOI:

关键词:

摘要: According to one embodiment of the present invention, there is provided a method identifying components computer infrastructure, comprising building graph-based model at least part determining presence within built graph predetermined sub-graph, and where it so determined sub-graph graph.

参考文章(26)
Rudy Deca, Omar Cherkaoui, Daniel Puche, Configuration Model for Network Management International Conference on Network Control and Engineering for QoS, Security and Mobility. pp. 3- 14 ,(2004) , 10.1007/0-387-23198-6_1
Karl Levitt, Steven Cheung, Jeremy Frank, Raymond Yip, Rick Crawford, Mark Dilger, Stuart Staniford-Chen, Jim Hoagland, Je Rowe, Dan Zerkle, The Design of GrIDS: A Graph-Based Intrusion Detection System ,(2007)
Stefan Daume, Michael Norman, Method for performing software stress test ,(2004)
Eric Duchene, Nicolas Draca, Network service configuration management ,(2006)
Hung M. Dang, Yuhang Zhu, Neil L. Coles, Scott R. Shell, Miller T. Abel, On-the-fly device configuration and management ,(2005)
Darren D. Smith, Lawrence M. Besaw, Mark J. Kean, Cho Y. Chang, Jeff C. Wu, Graphic display of network topology ,(1990)
Sylvain Hallé, Éric Wenaas, Roger Villemaire, Omar Cherkaoui, Self-configuration of Network Devices with Configuration Logic Autonomic Networking. pp. 36- 49 ,(2006) , 10.1007/11880905_4
Nabor C. Mendonça, Jeff Kramer, An Approach for Recovering Distributed System Architectures automated software engineering. ,vol. 8, pp. 311- 354 ,(2001) , 10.1023/A:1011217720860
Marc E. Seinfeld, Sterling M. Reasor, Angela K. Butcher, Alvin Loh, Paul J. Bryan, Kalid M. Azad, Jason Garms, System and method for identifying and removing potentially unwanted software ,(2006)