Skip to main content
Top
Published in: Journal of Network and Systems Management 4/2005

01-12-2005

Subject Index to Volume 13

Published in: Journal of Network and Systems Management | Issue 4/2005

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Excerpt

  • Anomaly detection, 269
  • Attack capability modeling, 259
  • Attack management, 253
  • Authorization, 309
  • Autonomic management, 151
  • Backup path, 18
  • Backup routing algorithm, 19
  • Bandwidth management,
  • Bayesian network, 411
  • Branch-and-cut-algorithm, 99, 109
  • Call-stack matching, 219
  • Call-stacks, 223
  • Capacity planning, 151
  • Case database, 219
  • Commom Information Model (CIM),
  • Connection admission, 11
  • Converged networks, 253
  • CORBA (Common Object Request Architecture}) security,
  • CORBA security model, 310
  • CORBAsec, 309, 315
  • Cost minimization, 108
  • Data dependency, 269
  • Database design, 338
  • Demand prediction, 180
  • Demand shared protection, 40
  • Design for test, 373
  • Desktop Management Task Force(DMTF), 453
  • Diagnosis, 219
  • Dijkstra's algorithm, 119
  • Distributed database system, 151
  • Distributed systems management, 411,415
  • Dynamic configuration, 479
  • Edge weight calculation, 119
  • Elastic traffic, 57
  • Element Management Layer (EML),451, 462
  • EML, (see Element Management Layer}) End-to-end connectivity (degree), 479, 481
  • Epidemic/gossiping protocol, 197
  • Error handling, 465
  • eTOM, 345
  • Extensible Markup Language (XML),451
  • Failure, 60
  • Failure recovery, 441
  • Fairness, 57
  • Fingerprinting, 337
  • Flow reconfiguration, 61
  • Flow scheduling, 437
  • Flow switching, 437
  • Generalized Multi-Protocol Label Switching (G- MPLS), 58, 78
  • Group access control, 297
  • Group keys, 293
  • Hardware configuration, 99
  • Help-desk support, 218
  • Heuristic algorithm, 119
  • Host discovery, 329
  • Intrusion detection, 269
  • IP over WDM, 57
  • Key distribution, 299
  • Key management, 293, 297
  • Label Switched Router (LSR), 58,80
  • Link capacity, 103
  • Link restoration, 99
  • Load balancing, 151
  • Logical key hierarchy, 293
  • Lotus Domino, 154
  • Machine learning, 219, 229
  • Malicious transactions, 269
  • Management information, 467
  • Management Information Base (MIB),451
  • Membership management, 197
  • MIB (see Management Information { Base) Mobile ad hoc network (MANET), 479, 486
  • MPLS (see Multi-Protocol Label { Switching) Multi-commodity flow, 57
  • Multicasting, 293
  • Multi-Protocol Label Switching(MPLS), 13, 57, 429 N
  • Network configuration, 119
  • Network management, 373, 387, 429, 451, 479
  • Network management layer (NML), 451, 470
  • Network management system, 453
  • Network model(ing), 59, 79, 253, 259
  • Network scanning, 329
  • NGOSS (Next generation Operations Software and Systems), 345
  • NGOSS assurance framework, 348
  • {OAM }(see Operations, Administration, and Maintenance)
  • OAM&P (see Operations, Administration, Maintenance, and Provisioning) OAM activities, 392
  • OAM architecture, 387
  • OAM communication model, 399
  • Operating system detection, 329
  • Operations, Administration, and Maintenance (OAM), 387
  • Operations, Administration, and Maintenance (OAM), 387
  • Operations, Administration, Maintenance, and Provisioning (OAM&P), 387
  • Operations and maintenance, 387
  • Operations center, 141
  • Optical burst switching, 387, 389
  • Optical cross-connect, 35, 80
  • Optical network (design), 13, 15, 35, 44
  • Optical networking, 387
  • Optical switching, 387
  • Path restoration, 99
  • Pattern mining, 175
  • Peer-to-peer, 197
  • Performance analysis, 286, 357
  • Performance evaluation, 474
  • Periodicity mining, 175, 178, 180
  • Petri-net, 280
  • Prediction, 175
  • Prediction testing, 191
  • Protection path, 15, 47, 125
  • QoS (Quality of Service), 358, 429
  • Random graphs, 197
  • Rebalancing backup paths, 26
  • Reconfiguration of backup paths, 25
  • Re-keying, 293
  • Resilience, 57
  • Resource balancing, 155
  • Resource management, 151, 156, 175
  • Resource Reservation Protocol (RSVP), 14
  • Resource monitor, 161
  • Restoration, 105
  • Routing, 99, 105
  • RSVP (see Resource Reservation Protocol)
  • XMLNET, 474

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Metadata
Title
Subject Index to Volume 13
Publication date
01-12-2005
Publisher
Springer US
Published in
Journal of Network and Systems Management / Issue 4/2005
Print ISSN: 1064-7570
Electronic ISSN: 1573-7705
DOI
https://doi.org/10.1007/s10922-005-9022-5

Other articles of this Issue 4/2005

Journal of Network and Systems Management 4/2005 Go to the issue

Premium Partner