Search
Now showing items 1-10 of 11
A framework for the dynamic generation of workflows for network management
(IEEE, 2021-06-30)
A demonstration of the application of dynamically generated workflows to the management of a network environment is presented. A proposed workflow management framework (WMF) uses dynamically generated workflows to control ...
A review of unstructured data analysis and parsing methods
(IEEE, 2020-03)
Computer applications generate an enormous amount of data every day through their logs, system-generated files or other reports. This generated data depicts the state of the running system and contains abundant information ...
A hybrid machine learning/policy approach to optimise video path selection.
(IEEE, 2020-02-27)
Services such as interactive video and real time gaming are ubiquitous on modern networks. The approaching realisation of 5G as well as the virtualisation and scalability of network functions made possible by technologies ...
An extensible parsing pipeline for unstructured data processing
(IEEE, 2021-03-10)
Network monitoring and diagnostics systems depict the running system's state and generate enormous amounts of unstructured data through log files, print statements, and other reports. It is not feasible to manually analyze ...
PRISENIT - a probabilistic search recommendation algorithm to improe search efficiency for network intelligence and troubleshooting
(UKSIM, 2015-03)
When searching for data in a telecommunications network management application, large search result sets are common. In order to refine the results to retrieve useful information existing systems normally require additional ...
Low-cost gaze detection with real-time ocular movements using coordinate-convolutional neural networks
(United Kingdom Simulation Society, 2019-10)
Detection of ocular-movements unfolds various possibilities in computer vision but requires large datasets, expensive hardware and computational power. Prior research substantiates the belief that Convolutional Neural ...
NetFlow anomaly detection through parallel cluster density analysis in continuous time-series.
(Springer, 2017-06)
The increase in malicious network based attacks has resulted in a growing interest in network anomaly detection. The ability to detect unauthorized or malicious activity on a network is of importance to any organization. ...
An adaptive policy approach to video quality assurance.
(IEEE, 2018-12)
Video in all its forms is probably the most important service carried on networks today and few would argue that video quality assurance is one of the most daunting network management challenges. Quite often, video ...
A workflow management framework for the dynamic generation of workflows that is independent of the application environment
(IEEE, 2021-06-30)
Workflow is a well-known and widely used technology in business management. Traditional workflow solutions are designed for humans and generally use a graphical representation of workflow elements that reflect the involvement ...
An analysis of alterations to the SCTP RTO calculation mechanism for WLAN environments
(Springer, 2008-01)
As a connection oriented transport layer protocol the Stream Control
Transmission Protocol (SCTP) inherits many of the features of the Transmission
Control Protocol (TCP) including the mechanism by which Retransmission ...