01-12-2005
Subject Index to Volume 13
Published in: Journal of Network and Systems Management | Issue 4/2005
Log inActivate our intelligent search to find suitable subject content or patents.
Select sections of text to find matching patents with Artificial Intelligence. powered by
Select sections of text to find additional relevant content using AI-assisted search. powered by
Excerpt
-
Anomaly detection, 269
-
Attack capability modeling, 259
-
Attack management, 253
-
Authorization, 309
-
Autonomic management, 151
-
Backup path, 18
-
Backup routing algorithm, 19
-
Bandwidth management,
-
Bayesian network, 411
-
Branch-and-cut-algorithm, 99, 109
-
Call-stack matching, 219
-
Call-stacks, 223
-
Capacity planning, 151
-
Case database, 219
-
Commom Information Model (CIM),
-
Connection admission, 11
-
Converged networks, 253
-
CORBA (Common Object Request Architecture}) security,
-
CORBA security model, 310
-
CORBAsec, 309, 315
-
Cost minimization, 108
-
Data dependency, 269
-
Database design, 338
-
Demand prediction, 180
-
Demand shared protection, 40
-
Design for test, 373
-
Desktop Management Task Force(DMTF), 453
-
Diagnosis, 219
-
Dijkstra's algorithm, 119
-
Distributed database system, 151
-
Distributed systems management, 411,415
-
Dynamic configuration, 479
-
Edge weight calculation, 119
-
Elastic traffic, 57
-
Element Management Layer (EML),451, 462
-
EML, (see Element Management Layer}) End-to-end connectivity (degree), 479, 481
-
Epidemic/gossiping protocol, 197
-
Error handling, 465
-
eTOM, 345
-
Extensible Markup Language (XML),451
-
Failure, 60
-
Failure recovery, 441
-
Fairness, 57
-
Fingerprinting, 337
-
Flow reconfiguration, 61
-
Flow scheduling, 437
-
Flow switching, 437
-
Generalized Multi-Protocol Label Switching (G- MPLS), 58, 78
-
Group access control, 297
-
Group keys, 293
-
Hardware configuration, 99
-
Help-desk support, 218
-
Heuristic algorithm, 119
-
Host discovery, 329
-
Intrusion detection, 269
-
IP over WDM, 57
-
Key distribution, 299
-
Key management, 293, 297
-
Label Switched Router (LSR), 58,80
-
Link capacity, 103
-
Link restoration, 99
-
Load balancing, 151
-
Logical key hierarchy, 293
-
Lotus Domino, 154
-
Machine learning, 219, 229
-
Malicious transactions, 269
-
Management information, 467
-
Management Information Base (MIB),451
-
Membership management, 197
-
MIB (see Management Information { Base) Mobile ad hoc network (MANET), 479, 486
-
MPLS (see Multi-Protocol Label { Switching) Multi-commodity flow, 57
-
Multicasting, 293
-
Multi-Protocol Label Switching(MPLS), 13, 57, 429 N
-
Network configuration, 119
-
Network management, 373, 387, 429, 451, 479
-
Network management layer (NML), 451, 470
-
Network management system, 453
-
Network model(ing), 59, 79, 253, 259
-
Network scanning, 329
-
NGOSS (Next generation Operations Software and Systems), 345
-
NGOSS assurance framework, 348
-
{OAM }(see Operations, Administration, and Maintenance)
-
OAM&P (see Operations, Administration, Maintenance, and Provisioning) OAM activities, 392
-
OAM architecture, 387
-
OAM communication model, 399
-
Operating system detection, 329
-
Operations, Administration, and Maintenance (OAM), 387
-
Operations, Administration, and Maintenance (OAM), 387
-
Operations, Administration, Maintenance, and Provisioning (OAM&P), 387
-
Operations and maintenance, 387
-
Operations center, 141
-
Optical burst switching, 387, 389
-
Optical cross-connect, 35, 80
-
Optical network (design), 13, 15, 35, 44
-
Optical networking, 387
-
Optical switching, 387
-
Path restoration, 99
-
Pattern mining, 175
-
Peer-to-peer, 197
-
Performance analysis, 286, 357
-
Performance evaluation, 474
-
Periodicity mining, 175, 178, 180
-
Petri-net, 280
-
Prediction, 175
-
Prediction testing, 191
-
Protection path, 15, 47, 125
-
QoS (Quality of Service), 358, 429
-
Random graphs, 197
-
Rebalancing backup paths, 26
-
Reconfiguration of backup paths, 25
-
Re-keying, 293
-
Resilience, 57
-
Resource balancing, 155
-
Resource management, 151, 156, 175
-
Resource Reservation Protocol (RSVP), 14
-
Resource monitor, 161
-
Restoration, 105
-
Routing, 99, 105
-
RSVP (see Resource Reservation Protocol)
-
XMLNET, 474