2004
DOI: 10.1002/cpe.820
|View full text |Cite
|
Sign up to set email alerts
|

Grids of agents for computer and telecommunication network management

Abstract: SUMMARYThe centralized system approach for computer and telecommunication network management has been presenting scalability problems along with the growth in the amount and diversity of managed equipment. Moreover, the increase in complexity of the services being offered through the networks also contributes to adding extra workload to the management station. The amount of data that must be handled and processed by only one administration point could lead to a situation where there is not enough processing an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2006
2006
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…We will also look into security issues and intend to investigate the use of Intrusion Detection [20,21,22] and others to safeguard the IoT control environment. Finally, we seek to include methods of Computational Intelligence, Machine Learning, and Distributed AI [23,24] to estimate calculations, considering parameters RFIDbased presence identification, exit and entry times, environment conditions, the average waiting queue time variation, and others.…”
Section: Discussionmentioning
confidence: 99%
“…We will also look into security issues and intend to investigate the use of Intrusion Detection [20,21,22] and others to safeguard the IoT control environment. Finally, we seek to include methods of Computational Intelligence, Machine Learning, and Distributed AI [23,24] to estimate calculations, considering parameters RFIDbased presence identification, exit and entry times, environment conditions, the average waiting queue time variation, and others.…”
Section: Discussionmentioning
confidence: 99%
“…There is a cohort of research looking into how to improve IDS towards quick detection of malicious or unauthorised actions [19], [20], and intelligent management methods of Distribute Computing [6], [21]. In general, an IDS encompasses:…”
Section: Background and Related Workmentioning
confidence: 99%