• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 14,732
Next 10 →

Network Configuration

by J. Schonwalder, H. Langendorfer, Tu Braunschweig, J. Schönwälder, H. Langendörfer, Tu Braunschweig
"... In this paper we present extensions for the Ined network editor allowing us to discover the structure of an IP network automatically. The discovering algorithm is based on an active probing technique that fits well with our interactive editor. We have chosen a multithreaded approach to minimize resp ..."
Abstract - Add to MetaCart
In this paper we present extensions for the Ined network editor allowing us to discover the structure of an IP network automatically. The discovering algorithm is based on an active probing technique that fits well with our interactive editor. We have chosen a multithreaded approach to minimize

Feasible Network Configurations for UMTS

by Andreas Eisenblätter, Armin Fügenschuh, Thorsten Koch, Arie Koster, Alexander Martin, Tobias Pfender, Oliver Wegel, Thorsten Koch, Arie Koster, Alexander Martin, Tobias Pfender, Oliver Wegel , Roland Wessäly , 2002
"... A model for the optimisation of the location and configuration of base stations in a UMTS network is described. The focus is primarily on modelling the configuration problem sufficiently accurate using mixed-integer variables and (essentially) linear constraints. These constraints reflect the limite ..."
Abstract - Cited by 23 (7 self) - Add to MetaCart
A model for the optimisation of the location and configuration of base stations in a UMTS network is described. The focus is primarily on modelling the configuration problem sufficiently accurate using mixed-integer variables and (essentially) linear constraints. These constraints reflect

Network Configuration Protocol (NETCONF)

by M. Bjorklund, J. Schoenwaelder, A. Bierman , 2011
"... The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF

Network Configuration Protocol (NETCONF)

by R. Enns, M. Bjorklund, J. Schoenwaelder, A. Bierman , 2011
"... The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF

ASCENT: Adaptive self-configuring sensor networks topologies

by Alberto Cerpa, Deborah Estrin , 2004
"... Advances in microsensor and radio technology will enable small but smart sensors to be deployed for a wide range of environmental monitoring applications. The low per-node cost will allow these wireless networks of sensors and actuators to be densely distributed. The nodes in these dense networks w ..."
Abstract - Cited by 449 (15 self) - Add to MetaCart
Advances in microsensor and radio technology will enable small but smart sensors to be deployed for a wide range of environmental monitoring applications. The low per-node cost will allow these wireless networks of sensors and actuators to be densely distributed. The nodes in these dense networks

NETWORK ROUTINES AND CHANGE OF NETWORK CONFIGURATION

by Angelika Lindstrand , 2003
"... The business opportunities that arise for a firm induce it to consider how useful its existing capabilities and knowledge are when seeking opportunities. Firm knowledge and capabilities have been shown to be dependent on the firm’s business network. In this paper we discuss that firms, by learning h ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
how to do business and how to acquire needed knowledge through interaction with its network, develop routines that are specific for handling the network. Firms also learn which network configuration provides the most benefit. The routinization of this knowledge leads to specific network configurations

Application of Particle Swarm Techniques in Sensor Network Configuration

by Jason Tillett, Shanchieh Yang, Raghuveer Rao, Ferat Sahin, Jason Tillett, Shanchieh Jay Yang, Raghuveer Rao, Ferat Sahin , 2005
"... Application of particle swarm techniques in sensor network configuration ..."
Abstract - Add to MetaCart
Application of particle swarm techniques in sensor network configuration

An Analysis of Network Configuration Artifacts

by David Plonka, Andres Jaan Tack
"... Computer networks and the Internet have become necessary tools in many daily activities; as such, they share the expectation to be “always on ” and highly available. Throughout a decades-long evolution of increasing reliance, campus/enterprise networks and Wide-Area Networks (WANs) have been enginee ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
operations as there has to that of software engineering. In this work, we analyze the deployment and operation of two large networks over a period of five to ten years. Our analogy-based approach is to apply software source code artifact analysis techniques to network device configurations. Specifically, we

Network Configuration Validation 1

by Sanjai Narain, Rajesh Talpade, Gary Levin
"... To set up network infrastructure satisfying end-to-end requirements, it is not only necessary to run appropriate protocols on components but also to correctly configure these components. Configuration is the “glue ” for logically integrating components at and across multiple protocol layers. Each co ..."
Abstract - Add to MetaCart
To set up network infrastructure satisfying end-to-end requirements, it is not only necessary to run appropriate protocols on components but also to correctly configure these components. Configuration is the “glue ” for logically integrating components at and across multiple protocol layers. Each

Network Configuration Procedure

by unknown authors
"... The Texas A&M University-Kingsville (TAMUK) network infrastructure is provided as a central utility for all users of TAMUK Information Resources. It is important that the infrastructure, which includes cabling and the associated equipment such as routers and switches, continues to develop with s ..."
Abstract - Add to MetaCart
The Texas A&M University-Kingsville (TAMUK) network infrastructure is provided as a central utility for all users of TAMUK Information Resources. It is important that the infrastructure, which includes cabling and the associated equipment such as routers and switches, continues to develop
Next 10 →
Results 1 - 10 of 14,732
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University