Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Discovering and grou** application endpoints in a network environment
SW Danait, K Ponnuswamy, PJ Lesiak - US Patent 10,797,951, 2020 - Google Patents
An example method for discovering and grou** applica tion endpoints in a network
environment is provided and includes discovering endpoints communicating in a network …
environment is provided and includes discovering endpoints communicating in a network …
Efficient policy conflict detection
GW Cox, DL Raymer, JC Strassner - US Patent 8,484,693, 2013 - Google Patents
(57) ABSTRACT A method and computer program product for detecting a policy conflict in a
managed system includes examining a plurality of policy rules for overlap** policy targets …
managed system includes examining a plurality of policy rules for overlap** policy targets …
Method for management of policy conflict in a policy continuum
GW Cox, JC Strassner - US Patent App. 11/556,276, 2008 - Google Patents
the present invention relates generally to policy-based information technology network and
element management systems. More particularly, the present invention relates to …
element management systems. More particularly, the present invention relates to …
Policy conflict classifier
Y Liu, Z Fu, K Vanderbaan - US Patent App. 12/869,958, 2012 - Google Patents
BACKGROUND 0001 A “policy” is a set of rules that is used to manage and control the
changing and/or maintaining of the state of one or more managed objects or entities. The …
changing and/or maintaining of the state of one or more managed objects or entities. The …
Topology explorer
Systems, methods, and computer-readable media for discov ering a network's topology and
health. In some examples, a system can obtain, from at least one of a plurality of controllers …
health. In some examples, a system can obtain, from at least one of a plurality of controllers …
Policy assurance for service chaining
In some examples, a system obtains a network logical model and, for each node in a
network, a node-level logical, concrete, and hardware model. The system identifies a service …
network, a node-level logical, concrete, and hardware model. The system identifies a service …
Anomaly detection and reporting in a network assurance appliance
S Nazar, P Mamillapalli, A Suleman… - US Patent …, 2020 - Google Patents
8010952 B2 8/2011 Datla et al. 2 ()()()/() 24 () 758 A| 9/2009 Pasko et al. 8,073,935 B2
12/2011 Viswanath 2009/0249284 A 1 1 ()/2009 Antosz et al. 8, 103480 B2 1/2012 Korn et …
12/2011 Viswanath 2009/0249284 A 1 1 ()/2009 Antosz et al. 8, 103480 B2 1/2012 Korn et …
Method for email service in a visual voicemail system
L Pearson - US Patent App. 11/342,210, 2007 - Google Patents
US20070180032A1 - Method for email service in a visual voicemail system - Google
Patents US20070180032A1 - Method for email service in a visual voicemail system …
Patents US20070180032A1 - Method for email service in a visual voicemail system …
Handling controller and node failure scenarios during data collection
Systems, methods, and computer-readable media for han dling failure scenarios during data
collection and analysis for assurance. In some examples, a system can obtain a logical …
collection and analysis for assurance. In some examples, a system can obtain a logical …
Cross-domain assurance
K Ponnuswamy, AL Wadhwa, FM Gisiger… - US Patent …, 2021 - Google Patents
Systems, methods, and computer-readable media for pro viding network assurance across a
network. In some embodiments, network traffic data of a cluster of nodes in a network …
network. In some embodiments, network traffic data of a cluster of nodes in a network …