The Usability of Information Visualisation Techniques for Network Monitoring

نویسندگان

  • Daniel A. Keim
  • Pak Chung Wong
  • Aiko Pras
  • Jürgen Schönwälder
  • Aiko Schönwälder
  • Jürgen Wong
  • Keith Andrews
چکیده

From 17.05. to 20.05.2009, the Dagstuhl Seminar 09211 Visualization and Monitoring of Network Tra c was held in Schloss Dagstuhl Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put together in this paper. The rst section describes the seminar topics and goals in general. Links to extended abstracts or full papers are provided, if available.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

طراحی بهینه چاه های مشاهده ای در یک شبکه پایش سطح آب زیرزمینی با استفاده از الگوریتم فوق ابتکاری ژنتیک

Well designed monitoring networks are essential for the effective management of groundwater resources but the costs of monitoring well installations and sampling can prove prohibitive. The challenge is to obtain adequate water quality and quantity information with a minimum number of wells and sampling points, a task that can be approached objectively and effectively using numerical optimizatio...

متن کامل

Evaluation of monitoring network density using discrete entropy theory

The regional evaluation of monitoring stations for water resources can be of great importance due to its role in finding appropriate locations for stations, the maximum gathering of useful information and preventing the accumulation of unnecessary information and ultimately reducing the cost of data collection. Based on the theory of discrete entropy, this study analyzes the density of rain gag...

متن کامل

An Advanced Hybrid Honeypot for Providing Effective Resistance in Automatic Network Generation

Increasing usage of Internet and computer networks by individuals and organizations and also attackers’ usage of new methods and tools in an attempt to endanger network security, have led to the emergence of a wide range of threats to networks. A honeypot is one of the basic techniques employed for network security improvement. It is basically designed to be attacked so as to get the attackers’...

متن کامل

Electronic Services (IT) in the Banking and Financial Institutions

This research investigates the methods for improving the quality of IT services (electronic services) in the Melli Banks branches in Mashhad province, where QFD and ANP models were operated. To this concern, three-dimensional, usability, service interaction and information quality to improve IT service quality were examined. The results of the analysis of the opinion of Melli Bank Customers ind...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009