Works matching DE "COMPUTER network monitoring"


Results: 234
    1
    2

    An overview of the MOP runtime verification framework.

    Published in:
    International Journal on Software Tools for Technology Transfer, 2012, v. 14, n. 3, p. 249, doi. 10.1007/s10009-011-0198-6
    By:
    • Meredith, Patrick;
    • Jin, Dongyun;
    • Griffith, Dennis;
    • Chen, Feng;
    • Roşu, Grigore
    Publication type:
    Article
    3

    What can you verify and enforce at runtime?

    Published in:
    International Journal on Software Tools for Technology Transfer, 2012, v. 14, n. 3, p. 349, doi. 10.1007/s10009-011-0196-8
    By:
    • Falcone, Yliès;
    • Fernandez, Jean-Claude;
    • Mounier, Laurent
    Publication type:
    Article
    4

    Software monitoring with controllable overhead.

    Published in:
    International Journal on Software Tools for Technology Transfer, 2012, v. 14, n. 3, p. 327, doi. 10.1007/s10009-010-0184-4
    By:
    • Huang, Xiaowan;
    • Seyster, Justin;
    • Callanan, Sean;
    • Dixit, Ketan;
    • Grosu, Radu;
    • Smolka, Scott;
    • Stoller, Scott;
    • Zadok, Erez
    Publication type:
    Article
    5

    CHATTER MATTERS.

    Published in:
    Marketing Research, 2011, v. 23, n. 3, p. 22
    By:
    • Poynter, Ray
    Publication type:
    Article
    6
    7

    Probe generation for active probing.

    Published in:
    International Journal of Network Management, 2018, v. 28, n. 4, p. 1, doi. 10.1002/nem.2021
    By:
    • Dusia, A.;
    • Sethi, A. S.
    Publication type:
    Article
    8

    Online traffic prediction in the cloud.

    Published in:
    International Journal of Network Management, 2016, v. 26, n. 4, p. 269, doi. 10.1002/nem.1934
    By:
    • Dalmazo, Bruno L.;
    • Vilela, João P.;
    • Curado, Marilia
    Publication type:
    Article
    9
    10
    11
    12

    Video Visualization for Snooker Skill Training.

    Published in:
    Computer Graphics Forum, 2010, v. 29, n. 3, p. 1053, doi. 10.1111/j.1467-8659.2009.01670.x
    By:
    • Höferlin, M.;
    • Grundy, E.;
    • Borgo, R.;
    • Weiskopf, D.;
    • Chen, M.;
    • Griffiths, I. W.;
    • Griffiths, W.
    Publication type:
    Article
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22

    BEHAVIORAL SAFETY 4.0.

    Published in:
    Professional Safety, 2019, v. 64, n. 1, p. 19
    By:
    • Agnew, Judy
    Publication type:
    Article
    23
    24
    25
    26
    27
    28

    From the Chairman and Executive Editor.

    Published in:
    Defense Acquisition Research Journal: A Publication of the Defense Acquisition University, 2014, v. 21, n. 4, p. 788
    By:
    • Ferreiro, Larrie D.
    Publication type:
    Article
    29
    30
    31
    32
    33
    34
    35
    36
    37

    MONITORING THE TOPOLOGY OF GROWING DYNAMICAL NETWORKS.

    Published in:
    International Journal of Modern Physics C: Computational Physics & Physical Computation, 2010, v. 21, n. 8, p. 1051, doi. 10.1142/S012918311001566X
    By:
    • WU, ZHAOYAN;
    • FU, XINCHU;
    • CHEN, GUANRONG
    Publication type:
    Article
    38
    39
    40
    41
    42
    43
    44
    45
    46
    47
    48
    49
    50