2012
DOI: 10.4304/jnw.7.10.1493-1504
|View full text |Cite
|
Sign up to set email alerts
|

Rule-Based Network Service Provisioning

Abstract:

Due to the unprecedented development of networks, manual network service provisioning is becoming increasingly risky, error-prone, expensive, and time-consuming. To solve this problem,rule-based methods can provide adequate leverage for automating various network management tasks. This paper presents a rule-based solution for automated network service provisioning. The proposed approach captures configuration data interdependencies using high-level, service-specific, user-configurable rules. We focus o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2014
2014

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 27 publications
0
2
0
Order By: Relevance
“…We select the prior value of classification attribute of c E as 0.35 and other prior value of classification attribute as 0. Due to formula 14 we can obtain the information entropy of each attribute in No P(4) P (3,12) Lc (4,14) Ec (5,6,7,9,10,11,13) Lc(4,14)…”
Section: B Improvement On Value Deviationmentioning
confidence: 99%
See 1 more Smart Citation
“…We select the prior value of classification attribute of c E as 0.35 and other prior value of classification attribute as 0. Due to formula 14 we can obtain the information entropy of each attribute in No P(4) P (3,12) Lc (4,14) Ec (5,6,7,9,10,11,13) Lc(4,14)…”
Section: B Improvement On Value Deviationmentioning
confidence: 99%
“…Data mining is the most suitable tool and it can find out valuable knowledge and information from amounts of data, which has various types of patterns. At present, there are mainly two aspects in the field of computer crime forensics analysis [4,5]: The first is using data mining technology to perform correlation analysis on computer logs, firewall logs, intrusion detection logs and route access records. Then, the crime trace can be excavated and the crime process can also be restored.…”
Section: Introductionmentioning
confidence: 99%