[1] |
YANG Yang, SHI Xiao-dan, SONG Shuang, HUO Yong-hua, CHEN Lian-dong.
Alarm Correlation Analysis Based on Rete Rule Reasoning
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2020, 43(2): 23-28.
|
[2] |
CHEN Mo, JIN Lei, GONG Xiang-yang, MAN Yi.
Research on Fault Tracing Technology for 5G Mass Network Management Data
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(5): 131-136,142.
|
[3] |
LI Wen-jing, CHEN Chen, YU Peng, XIONG Ao.
Traffic Prediction for Wireless Communication Networks Using S-ARIMA Model
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(s1): 10-14.
|
[4] |
YANG Yu-nong, WU Zhen-yu, ZHU Xin-ning.
A Knowledge Annotation and Reasoning Semantic Web of Things Framework for Intelligent Diagnosis
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(4): 104-110.
|
[5] |
LIU Tao, WANG Wen-dong, GONG Xiang-yang, QUE Xi-rong, CHENG Shi-duan.
Updated Mechanism for in-Band Controlling Traffic of Software Defined Networking
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(1): 24-28.
|
[6] |
ZHU Kai, ZHANG Chao, ZHANG Kai, LI Wen-jing, MENG Luo-ming.
Assessment of Users’ QoE for Mobile Internet Based on TCP Packet Layer Analysis
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(s1): 40-45.
|
[7] |
WANG Kai-xuan, YANG Zheng, QIU Xue-song.
Algorithm of Fault Locating on Impact Analysis in Power Communications Network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(s1): 55-59.
|
[8] |
.
An Optimized UserBehavior Clustering Analysis Based Service Fault Detection Mechanism for Mobile Device
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2011, 34(s1): 46-50.
|
[9] |
.
A Dynamic Compuation Approach to Determining the Threshold in Network Anomaly Detection
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2011, 34(2): 45-49.
|
[10] |
.
CADE Method for Autonomic NetworkManagement and Application Framework
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2009, 32(s1): 30-34.
|
[11] |
.
Interface of Configuring the Data Network Equipments and Application Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2009, 32(s1): 140-143.
|
[12] |
.
The Design and Implementation of Alarm RealTimeDisplay System Based on Web
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2009, 32(s1): 115-119.
|
[13] |
.
Comparasion of the System Management Based on WSDM, WBEM and SNMP
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2009, 32(s1): 134-139.
|
[14] |
.
New Generation Network Management Based on the NETCONF Protocol
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2009, 32(s1): 10-14.
|
[15] |
QIU Xue-song;CHEN Jian;GUO Hai-sheng;GAO Zhi-peng.
Anomaly Traffic Integrated Detection Model for Enterprise IT Network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2009, 32(6): 28-31.
|