The Internet AS-level topology: three data sources and one definitive metric

P Mahadevan, D Krioukov, M Fomenkov… - ACM SIGCOMM …, 2006 - dl.acm.org
We calculate an extensive set of characteristics for Internet AS topologies extracted from the
three data sources most frequently used by the research community: traceroutes, BGP, and …

Robust monitoring of link delays and faults in IP networks

Y Bejerano, R Rastogi - … -second Annual Joint Conference of the …, 2003 - ieeexplore.ieee.org
In this paper, we develop failure-resilient techniques for monitoring link delays and faults in
a service provider or enterprise IP network. Our two-phased approach attempts to minimize …

[КНИГА][B] A graph-theoretic approach to enterprise network dynamics

H Bunke, PJ Dickinson, M Kraetzl, WD Wallis - 2007 - books.google.com
Networks have become nearly ubiquitous and increasingly complex, and their support of
modern enterprise environments has become fundamental. Accordingly, robust network …

Locating network monitors: complexity, heuristics, and coverage

K Suh, Y Guo, J Kurose, D Towsley - Computer Communications, 2006 - Elsevier
There is an increasing interest in passive monitoring of IP flows at multiple locations within
an IP network. The objective of such a distributed monitoring system is to sample packets …

[КНИГА][B] Grid computing security

A Chakrabarti - 2007 - books.google.com
Grid computing is widely regarded as a technology of immense potential in both industry
and academia. Yet many enterprises are still hesitant about the implementation of an …

SCMon: Leveraging segment routing to improve network monitoring

F Aubry, D Lebrun, S Vissicchio… - … INFOCOM 2016-The …, 2016 - ieeexplore.ieee.org
To guarantee correct operation of their networks, operators have to promptly detect and
diagnose data-plane issues, like broken interface cards or link failures. Networks are …

[PDF][PDF] Deploying fog applications: How much does it cost, by the way?

A Brogi, S Forti, A Ibrahim - CLOSER, 2018 - scitepress.org
Deploying IoT applications through the Fog in a QoS-, context-, and cost-aware manner is
challenging due to the heterogeneity, scale and dynamicity of Fog infrastructures. To decide …

Object identification for inventory management using convolutional neural network

NK Verma, T Sharma, SD Rajurkar… - 2016 IEEE Applied …, 2016 - ieeexplore.ieee.org
In this paper, a real time inventory monitoring system using Convolutional Neural Network
(CNN) has been proposed. The objective is to develop a reliable and efficient method for …

Predictive analysis to support fog application deployment

R Buyya, SN Srirama - 2019 - ieeexplore.ieee.org
The iFogSim is a simulation tool for fog computing scenarios. This chapter presents an
extended version of FogTorchΠ, a prototype based on a model of the Internet‐of‐Things …

Optimising QoS-assurance, resource usage and cost of fog application deployments

A Brogi, S Forti, A Ibrahim - Cloud Computing and Services Science: 8th …, 2019 - Springer
Identifying the best application deployment to distribute application components in Fog
infrastructures–spanning the IoT-to-Cloud continuum–is a challenging task for application …