2,370 resources related to Network Monitoring
- Topics related to Network Monitoring
- IEEE Organizations related to Network Monitoring
- Conferences related to Network Monitoring
- Periodicals related to Network Monitoring
- Most published Xplore authors for Network Monitoring
ICC 2021 - IEEE International Conference on Communications
IEEE ICC is one of the two flagship IEEE conferences in the field of communications; Montreal is to host this conference in 2021. Each annual IEEE ICC conference typically attracts approximately 1,500-2,000 attendees, and will present over 1,000 research works over its duration. As well as being an opportunity to share pioneering research ideas and developments, the conference is also an excellent networking and publicity event, giving the opportunity for businesses and clients to link together, and presenting the scope for companies to publicize themselves and their products among the leaders of communications industries from all over the world.
The conference program will consist of plenary lectures, symposia, workshops and invitedsessions of the latest significant findings and developments in all the major fields of biomedical engineering.Submitted papers will be peer reviewed. Accepted high quality papers will be presented in oral and postersessions, will appear in the Conference Proceedings and will be indexed in PubMed/MEDLINE
The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.
The International Conference on Image Processing (ICIP), sponsored by the IEEE SignalProcessing Society, is the premier forum for the presentation of technological advances andresearch results in the fields of theoretical, experimental, and applied image and videoprocessing. ICIP 2020, the 27th in the series that has been held annually since 1994, bringstogether leading engineers and scientists in image and video processing from around the world.
IEEE INFOCOM solicits research papers describing significant and innovative researchcontributions to the field of computer and data communication networks. We invite submissionson a wide range of research topics, spanning both theoretical and systems research.
The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...
The IEEE Transactions on Automation Sciences and Engineering (T-ASE) publishes fundamental papers on Automation, emphasizing scientific results that advance efficiency, quality, productivity, and reliability. T-ASE encourages interdisciplinary approaches from computer science, control systems, electrical engineering, mathematics, mechanical engineering, operations research, and other fields. We welcome results relevant to industries such as agriculture, biotechnology, healthcare, home automation, maintenance, manufacturing, pharmaceuticals, retail, ...
Broad coverage of concepts and methods of the physical and engineering sciences applied in biology and medicine, ranging from formalized mathematical theory through experimental science and technological development to practical clinical applications.
IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...
Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...
2014 IEEE Workshop on Electronics, Computer and Applications, 2014
With the development of computer and information technology, computer and network have been popular. At the same time, security problem has greatly aroused people's attention, especially in campus environment. Campus network as an important part of the campus life, people also arouse enough attention to the problems of personal computer safety management. Running a set of effective campus network monitoring ...
IEEE Transactions on Knowledge and Data Engineering, 2009
We develop a framework for minimizing the communication overhead of monitoring global system parameters in IP networks and sensor networks. A global system predicate is defined as a conjunction of the local properties of different network elements. A typical example is to identify the time windows when the outbound traffic from each network element exceeds a predefined threshold. Our main ...
IEEE PES ISGT Europe 2013, 2013
Remotely readable smart meters installed for customers and smart measurement devices developed for secondary distribution substation can be utilized to improve LV network monitoring and management. Today the real-time information about the distribution network state is mainly gathered from the MV network. The paper discusses the extension of the network monitoring and management to the LV level by utilizing the ...
2011 International Conference on Internet Computing and Information Services, 2011
Network monitoring technique is an important and sensitive technique in the field of network safety. hackers usually make use of TCP/IP protocol's flows to spoof their target . With the combination of Network Monitoring, hacker can intercept and tamper his target's communication data, which is a significant threat to today's network security. This paper gives an analysis on the Network ...
2008 International Symposium on Computer Science and Computational Technology, 2008
Owning to the expansion of network scale and complication of network construction, it has a big challenge to previous network monitoring technology. After analyzing the network monitoring technology and IA (intelligent agent) technology, in this paper, a method based on IA is proposed to complete dynamic network monitoring, developed by a cross-platform language Python, including two monitoring modes: 1) automatic; ...
Marin Litoiu: Beyond Network Control - End to End Performance of CPS: WF IoT 2016
Radiated Performance Assessment of Wireless Communications Devices - An Operator's Perspective
Fog Computing in Energy and Environment Panel - Fog World Congress 2017
Geoffrey Hinton receives the IEEE/RSE James Clerk Maxwell Medal - Honors Ceremony 2016
IMS 2011 Microapps - Low-PIM Filter Solutions for Broadband Emission Monitoring
IEEE Themes - Social dynamics in peer-to-peer sharing networks
EMBC 2011 -Keynote- Applications and Opportunities for Wearable Technology in Physiological Monitoring -Dale Wiggins
Q&A with Chris Berka: IEEE Brain Podcast, Episode 9
Implantable Wireless Medical Devices and Systems
GHTC 2015 - Creating a Global Network to Impact Global Health
Engineering in Medicine and Biology: Segment 3
Network Analysis: RF Boot Camp
Tech Super Stars Panelist - Marc Bracken: 2016 Technology Time Machine
IMS 2011 Microapps - Techniques for Validating a Vector Network Analyzer Calibration When Using Microwave Probes
Remote Sensing in Community Forestry - GHTC 2012 Sessions - Eric Kaiser & Kimberly Roberts
NeXOS: Observations Supporting Ocean Sustainability
Network Orchestration for 5G - Raquel Morera - IEEE Sarnoff Symposium, 2019
Ignite! Session: Blake Lloyd
IMS 2012 Microapps - Basic Amplifier Measurements with the RF Vector Network Analyzer (VNA) Taku Hirato, Agilent
With the development of computer and information technology, computer and network have been popular. At the same time, security problem has greatly aroused people's attention, especially in campus environment. Campus network as an important part of the campus life, people also arouse enough attention to the problems of personal computer safety management. Running a set of effective campus network monitoring software is real needed for the campus network management and maintenance personal safety. In order to ensure the safety, reliability and steady running of the campus network, according to the present situation and development of the campus network, people plan and design to use network monitoring system on the campus network security management. The system can effectively control and manage the reliable operation of the campus network.
We develop a framework for minimizing the communication overhead of monitoring global system parameters in IP networks and sensor networks. A global system predicate is defined as a conjunction of the local properties of different network elements. A typical example is to identify the time windows when the outbound traffic from each network element exceeds a predefined threshold. Our main idea is to optimize the scheduling of local event reporting across network elements for a given network traffic load and local event frequencies. The system architecture consists of N distributed network elements coordinated by a central monitoring station. Each network element monitors a set of local properties and the central station is responsible for identifying the status of global parameters registered in the system. We design an optimal algorithm, the partition and rank (PAR) scheme, when the local events are independent; whereas, when they are dependent, we show that the problem is NP-complete and develop two efficient heuristics: the PAR for dependent events (PAR-D) and adaptive (Ada) algorithms, which adapt well to changing network conditions, and outperform the current state of the art techniques in terms of communication cost.
Remotely readable smart meters installed for customers and smart measurement devices developed for secondary distribution substation can be utilized to improve LV network monitoring and management. Today the real-time information about the distribution network state is mainly gathered from the MV network. The paper discusses the extension of the network monitoring and management to the LV level by utilizing the concept proposed by the FP7 European project INTEGRIS. In INTEGRIS concept the smart meters and secondary substation measurement device were connected as part of the LV network. This paper presents the testing of the INTEGRIS concept in RTDS (Real Time Digital Simulator) environment, as well as the testing results to demonstrate how well the LV network monitoring and management could be done by utilizing measurement devices in the secondary substation and in the customer's end.
Network monitoring technique is an important and sensitive technique in the field of network safety. hackers usually make use of TCP/IP protocol's flows to spoof their target . With the combination of Network Monitoring, hacker can intercept and tamper his target's communication data, which is a significant threat to today's network security. This paper gives an analysis on the Network Monitoring Theory in Switched Ethernet and puts forward several Countermeasures.
Owning to the expansion of network scale and complication of network construction, it has a big challenge to previous network monitoring technology. After analyzing the network monitoring technology and IA (intelligent agent) technology, in this paper, a method based on IA is proposed to complete dynamic network monitoring, developed by a cross-platform language Python, including two monitoring modes: 1) automatic; 2) manual, and a monitored wait mode. They cooperate with each other to realize the performance of dynamic network monitoring more reliably. The experimental result is shown that the method can be used in various network environments and topologies. And it is reliable to collect node¿s information in network. So this method is trusted and can greatly improve the reliability of network monitoring.
Traditionally, distribution network monitoring has been focused on primary substations (i.e., high voltage/medium voltage level), whereas low voltage (LV) network has not been monitored at all. With rapid growth and penetration of distributed energy resources in LV grids, there is growing interest in extending the real-time monitoring to LV level. The framework program FP7 European Project INTEGRIS proposes an integrated real-time LV network monitoring solution and implements it in a cost-efficient way. This solution integrates smart metering data with secondary substation measurements to get a more accurate and real-time view about LV grid, uses “decentralized” distribution management architecture to optimize data flow, and uses International Electrotechnical Commission 61850 Standard-based interfaces to improve interoperability. This paper focuses on information and communications technology perspective, explains the implementation details of this monitoring solution, and presents its functionality/performance testing results from two distribution system operator field trials and from real-time digital simulator laboratory.
Due to the rapid growth of network traffic and available bandwidth, scalable network monitoring has become a major issue in the last years. Additionally, the importance of correct and complete monitoring data increased, e.g. for attack detection or accounting issues. Based on bio-inspired methodologies, we propose an adaptive mechanism for preventing single systems of being overloaded while providing as much monitoring information as possible for post-processing. Using a simulation model, we verified the applicability of our approach
Many reasons make NFV an attractive paradigm for IT security: lowers costs, agile operations and better isolation as well as fast security updates, improved incident responses and better level of automation. On the other side, the network threats tend to be increasingly complex and distributed, implying huge traffic scale to be monitored and increasingly strict mitigation delay requirements. Considering the current trend of the networking and the requirements to counteract to the evolution of cyber-threats, it is expected that also network monitoring will move towards NFV based solutions. In this paper, we present D-StreaMon an NFV-capable distributed framework for network monitoring realized to face the above described challenges. It relies on the StreaMon platform, a solution for network monitoring originally designed for traditional middleboxes. An evolution path which migrates StreaMon from middleboxes to Virtual Network Functions (VNFs) has been realized.
To elucidate the mechanism of the city conflagration automatic alarm network monitoring system, with reference to national standards and successful experience in the developed countries, and with the actual needs fire fighting management of the city conflagration. Based on the WEB search function, this system utilize the public or private networks to realize the comprehensive network monitoring for enterprises automatic fire alarm installations, and the for users anytime, anywhere supervision and management of firefighting. The result of the present work carried out the essentials of city conflagration automatic alarm network monitoring system.
Live streaming of high quality media requires high quality network in terms of packet loss rate and jitter. However, the current IP or Ethernet network does not assure the bandwidth or jitter for streaming in general. In addition, the existing network monitoring system does not have the functionality to measure these network quality. My precise network monitoring is a packet-by-packet network monitoring to observe switching or routing latency inside of a switch, router, or network, and provide the statistics of a flow that is specified by user on-demand. We implemented this system, installed it in the existing network, and evaluated its functionality. It shows the impact of cross-traffic on a measured flow.