{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T11:41:15Z","timestamp":1774525275940,"version":"3.50.1"},"reference-count":161,"publisher":"Elsevier BV","issue":"15","license":[{"start":{"date-parts":[[1997,12,1]],"date-time":"1997-12-01T00:00:00Z","timestamp":880934400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[1997,12]]},"DOI":"10.1016\/s0140-3664(97)00094-7","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T14:53:54Z","timestamp":1027608834000},"page":"1313-1322","source":"Crossref","is-referenced-by-count":28,"title":["Artificial intelligence approaches to network management: recent advances and a survey"],"prefix":"10.1016","volume":"20","author":[{"given":"G.Prem","family":"Kumar","sequence":"first","affiliation":[]},{"given":"P.","family":"Venkataram","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0140-3664(97)00094-7_BIB1","year":"1988","journal-title":"IEEE Network"},{"issue":"9","key":"10.1016\/S0140-3664(97)00094-7_BIB2","volume":"11","year":"1993","journal-title":"IEEE J. Selected Areas Commun."},{"issue":"6","key":"10.1016\/S0140-3664(97)00094-7_BIB3","volume":"26","year":"1994","journal-title":"IEEE J. Selected Areas Commun."},{"issue":"5","key":"10.1016\/S0140-3664(97)00094-7_BIB4","volume":"31","year":"1993","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB5","first-page":"58","article-title":"Bibliography on network management","author":"Sethi","year":"1988","journal-title":"Comput. Commun. Rev."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB6","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1145\/196997.197006","article-title":"Annotated bibliography on network management","author":"Znaty","year":"1994","journal-title":"Comput. Commun. Rev."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB7","series-title":"Telecommunications Network Management into the 21st Century, Techniques, Standards and Applications","year":"1994"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB8","series-title":"Network and Distributed Systems Management","author":"Sloman","year":"1994"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB9","series-title":"Artificial Intelligence","author":"Rich","year":"1983"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB10","series-title":"Principles of Expert Systems","year":"1988"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB11","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1109\/65.17975","article-title":"Rule-based expert systems for network management and operations: an introduction","author":"Cronk","year":"1988","journal-title":"IEEE Network"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB12","series-title":"Proc. GLOBECOM","first-page":"487","article-title":"AI-assisted telecommunication network management","author":"Covo","year":"1989"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB13","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1016\/0169-7552(89)90038-X","article-title":"A tutorial on OSI management","volume":"17","author":"Sluman","year":"1989","journal-title":"Comput. Networks ISDN Systems"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB14","first-page":"1334","article-title":"The OSI reference model","volume":"71","author":"Day","year":"1983"},{"issue":"7","key":"10.1016\/S0140-3664(97)00094-7_BIB15","doi-asserted-by":"crossref","first-page":"1104","DOI":"10.1109\/49.44558","article-title":"Network management architectures and protocols: problems and approaches","volume":"7","author":"Cassel","year":"1989","journal-title":"IEEE J. Select. Areas Commun."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB16","article-title":"Simple network management protocol (SNMP)","author":"Case","year":"1990","journal-title":"Network Working Group\u2014RFC 1157"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB17","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/35.212421","article-title":"CMISE functions and services","author":"Raman","year":"1993","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB18","author":"Rose","year":"1991"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB19","series-title":"Proc. Ninth International Conference on Computer Communications","first-page":"512","article-title":"Network management is the presence of faults","author":"Herzberg","year":"1988"},{"issue":"2","key":"10.1016\/S0140-3664(97)00094-7_BIB20","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1111\/j.1468-0394.1986.tb00199.x","article-title":"Survey of expert systems for fault detection, test generation and maintenance","volume":"3","author":"Pau","year":"1986","journal-title":"Expert Systems"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB21","first-page":"63","article-title":"Performance standards for packet switched services","author":"Seitz","year":"1989","journal-title":"IEEE GLOBECOM"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB22","article-title":"Management Information Base for TCP\/IP-based Internets","author":"McClougherie","year":"1990","journal-title":"Network Working Group\u2014RFC 1156"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB23","article-title":"Structure and Identification of Management Information for TCP\/IP-based Internets","author":"Rose","year":"1990","journal-title":"Network Working Group\u2014RFC 1155"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB24","article-title":"The Common Management Information Serviaes and Protmaol over TCP\/IP (CMOT)","author":"Warrier","year":"1989","journal-title":"Network Working Group\u2014RFC 1095"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB25","series-title":"International Teletraffic Congress Seminar on Teletraffic Analysis Methods for Current and Future Telecom Networks","article-title":"A management information knowledge base fmr network management","author":"Jayanthi","year":"1993"},{"issue":"9","key":"10.1016\/S0140-3664(97)00094-7_BIB26","doi-asserted-by":"crossref","DOI":"10.1109\/49.257929","article-title":"MANDATE: managing networks using database technology","volume":"11","author":"Haritsa","year":"1993","journal-title":"IEEE J. Select. Areas Commun."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB27","series-title":"TCP\/IP Architecture, Protocols and Implementations","author":"Fiel","year":"1992"},{"issue":"9","key":"10.1016\/S0140-3664(97)00094-7_BIB28","doi-asserted-by":"crossref","DOI":"10.1016\/0140-3664(90)90005-2","article-title":"IKBS in network management","volume":"13","author":"Malcolm","year":"1990","journal-title":"Comput. Commun."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB29","article-title":"Structure of management information for version 2 of the simple network management protocol (SNMPv2)","author":"Case","year":"1993","journal-title":"Network Working Group\u2014RFC 1442"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB30","article-title":"X.500 Directory Monitoring MIB","author":"Mansfield","year":"1994","journal-title":"Network Working Group\u2014RFC 1567"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB31","series-title":"IEEE Network Operations and Management Symposium","article-title":"OMNIPoint\u2014the implementation of version of telecommunication management networks","author":"Milham","year":"1994"},{"issue":"1","key":"10.1016\/S0140-3664(97)00094-7_BIB32","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1147\/sj.271.0003","article-title":"SNA network management directions","volume":"27","author":"Rose","year":"1988","journal-title":"IBM Systems J."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB33","first-page":"78","article-title":"Network size confounds most net managers","author":"Darling","year":"1995","journal-title":"Datamation"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB34","year":"1988","journal-title":"IEEE Network"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB35","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1016\/0169-7552(95)00075-5","article-title":"Hierarchical network management: a concept and its prototype in SNMPv2","volume":"28","author":"Siegl","year":"1996","journal-title":"Comput. Networks ISDN Systems"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB36","series-title":"Proc. 10th Annual Joint Conference of the IEEE Computer and Communication Societies","first-page":"111","article-title":"Clustering schemes for network management","author":"Bouloutas","year":"1991"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB37","series-title":"Proc. 5th Annual Joint Conference of the IEE Computer and Communication Societies","first-page":"395","article-title":"Clustering techniques for large distributed systems","author":"Ramamoorthy","year":"1986"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB38","article-title":"Evolving artificial intelligence","author":"Fogel","year":"1992"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB39","series-title":"Proc. 1st International Conference on Evolutionary Programming, Evolutionary Programming Society","first-page":"175","article-title":"Hierarchic methods of evolutionary programming","author":"Fogel","year":"1992"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB40","series-title":"Artificial Intelligence through Simulated Evolution","author":"Fogel","year":"1966"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB41","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1016\/0020-0190(94)00024-7","article-title":"Optimal network partitioning for faulttolerant network management using evolutionary programming","volume":"50","author":"Kumar","year":"1994","journal-title":"Information Process. Lett."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB42","series-title":"Eighth International Conference on Artificial Intelligence in Engineering","first-page":"697","article-title":"Relational approach to fault diagnosis based on a functional model","author":"Cayrac","year":"1993"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB43","series-title":"Symposium on Intelligent Systems","first-page":"20","article-title":"Knowledge based trouble shooting in communication networks","author":"Arun","year":"1992"},{"issue":"5","key":"10.1016\/S0140-3664(97)00094-7_BIB44","doi-asserted-by":"crossref","first-page":"784","DOI":"10.1109\/49.627","article-title":"Expert systems in network management\u2014the second revolution","volume":"6","author":"Bernstein","year":"1988","journal-title":"IEEE J. Select. Areas Commun."},{"issue":"3","key":"10.1016\/S0140-3664(97)00094-7_BIB45","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/35.434","article-title":"A symptom driven expert system for isolating and correcting network faults","volume":"26","author":"Marques","year":"1988","journal-title":"IEEE Commun. Mag."},{"issue":"5","key":"10.1016\/S0140-3664(97)00094-7_BIB46","doi-asserted-by":"crossref","DOI":"10.1109\/65.17977","article-title":"DAD: a real-time expert system for monitoring of data packet networks","volume":"2","author":"Rabie","year":"1988","journal-title":"IEEE Network"},{"issue":"10","key":"10.1016\/S0140-3664(97)00094-7_BIB47","doi-asserted-by":"crossref","DOI":"10.1002\/ecja.4410741006","article-title":"Study of fault location expert systems for paired cables","volume":"74","author":"Koga","year":"1991","journal-title":"Electron. Commun. Jpn."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB48","series-title":"Proc. Eighth International Joint Conference on Artificial Intelligence","article-title":"ACE: an expert system for telephone cable maintenance","author":"Vesonder","year":"1983"},{"issue":"8","key":"10.1016\/S0140-3664(97)00094-7_BIB49","article-title":"An SNMP-based expert network management system","volume":"75B","author":"Mansfield","year":"1992","journal-title":"IEICE Trans. Commun."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB50","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1145\/190809.190329","article-title":"Experience of building an ATM switch for the local area","author":"Blact","year":"1994","journal-title":"Comput. Commun. Rev."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB51","series-title":"International Conference on Communication","first-page":"1308","article-title":"Performance and fault management functions for the maintenance of SONET\/SDH and ATM transport networks","author":"Gruber","year":"1993"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB52","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/0004-3702(91)90005-5","article-title":"The computational complexity of abduction","volume":"49","author":"Bylander","year":"1991","journal-title":"Artificial Intelligence"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB53","series-title":"Fourth International Conference on Information Proc. and Management of Uncertainty in Knowledge-Based Systems","article-title":"Possibilistic abduction","author":"Dubois","year":"1992"},{"issue":"1","key":"10.1016\/S0140-3664(97)00094-7_BIB54","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/200836.200838","article-title":"The complexity of logic based abduction","volume":"42","author":"Eiter","year":"1995","journal-title":"J. ACM"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB55","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1002\/int.4550020303","article-title":"Diagnostic problem-solving with causal chaining","volume":"2","author":"Peng","year":"1987","journal-title":"Int. J. Intelligent Systems"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB56","series-title":"Proc. of International Joint Conference on Artificial Intelligence","first-page":"147","article-title":"On the mechanization of abductive logic","author":"Pople","year":"1973"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB57","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1016\/0020-0255(85)90015-5","article-title":"A formal model of diagnostic inference","volume":"37","author":"Reggia","year":"1985","journal-title":"Information Sci."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB58","series-title":"Abductive Inference","author":"Josephson","year":"1994"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB59","series-title":"Abductive Inference Models for Diagnostic Problem Solving","author":"Peng","year":"1990"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB60","series-title":"National Conference on Communication","first-page":"81","article-title":"Fault diagnosis of telecommunication networks: realistic abductive reasoning apporach","author":"Kumar","year":"1995"},{"issue":"6","key":"10.1016\/S0140-3664(97)00094-7_BIB61","doi-asserted-by":"crossref","first-page":"703","DOI":"10.1016\/0952-1976(95)00054-2","article-title":"Network fault diagnosis using realistic abductive reasoning","volume":"28","author":"Kumar","year":"1995","journal-title":"Int. J. Eng. Appl. Artificial Intelligence"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB62","series-title":"Turkish Conference on Artificial Intelligence and Neural Networks","first-page":"1","article-title":"A realistic model for diagnostic problem solving using abductive reasoning based on parsimonious covering principle","author":"Kumar","year":"1994"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB63","first-page":"827","article-title":"Network fault and performance management using realistic abductive reasoning model","volume":"76","author":"Kumar","year":"1996","journal-title":"J. Indian Inst. Sci."},{"issue":"3","key":"10.1016\/S0140-3664(97)00094-7_BIB64","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1080\/03772063.1996.11415919","article-title":"Probabilistic extension to realistic abductive reasoning model","volume":"42","author":"Kumar","year":"1996","journal-title":"J.IETE"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB65","doi-asserted-by":"crossref","first-page":"1576","DOI":"10.1016\/0169-7552(94)00081-4","article-title":"Survey of ATM switch architectures","volume":"27","author":"Awdeh","year":"1995","journal-title":"Comput. Networks ISDN Systems"},{"issue":"1","key":"10.1016\/S0140-3664(97)00094-7_BIB66","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1016\/0140-3664(91)90080-K","article-title":"Highspeed networks: the emergence of technologies for multi-service support","volume":"14","author":"Cooper","year":"1991","journal-title":"Comput. Commun."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB67","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/65.20535","article-title":"Conceptual issues of ATM","author":"Gechter","year":"1989","journal-title":"IEEE Network"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB68","unstructured":"I.610: OAM Principles of BISDN Access, ITU Document."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB69","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1016\/0169-7552(92)90114-6","article-title":"The asynchronous transfer mode: a tutorial","volume":"24","author":"Le Boudee","year":"1994","journal-title":"Comput. Networks ISDN Systems"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB70","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1109\/35.35508","article-title":"Broadband ISDN and asynchronous transfer mode","author":"Minzer","year":"1989","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB71","series-title":"Asynchronous Transfer Mode: Solution for BISDN","author":"Prycker","year":"1993"},{"issue":"3","key":"10.1016\/S0140-3664(97)00094-7_BIB72","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1016\/0140-3664(89)90110-2","article-title":"Evolution of ISDN towards broadband ISDN: a logical step towards ATM","volume":"12","author":"Prycker","year":"1989","journal-title":"Comput. Commun."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB73","unstructured":"G.P. Kumar, P. Venkataram, ATM network fault management using realistic abductive reasoning model, submitted for publication."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB74","article-title":"Fault detection in an ethernet network via anomaly detectors","author":"Feather","year":"1992"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB75","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1145\/167954.166264","article-title":"Fault detection in an ethernet network using anomaly signature matching","author":"Feather","year":"1993","journal-title":"Comput. Commun. Rev."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB76","article-title":"The use of multi-dimensional parametric behavior of a CSMA\/CD network for network diagnosis","author":"Hansen","year":"1992"},{"issue":"5","key":"10.1016\/S0140-3664(97)00094-7_BIB77","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/35.212422","article-title":"Analyzing network performance management","volume":"31","author":"Hayes","year":"1993","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB78","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/65.372652","article-title":"The use of artificial neural networks for optimal message routing","author":"Wang","year":"1995","journal-title":"IEEE Network"},{"issue":"9","key":"10.1016\/S0140-3664(97)00094-7_BIB79","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1016\/0140-3664(90)90004-Z","article-title":"Protocol analyser for the monitoring and analysis of OSI networks","volume":"13","author":"Halsall","year":"1990","journal-title":"Computer Communications"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB80","article-title":"Information Processing Systems\u2014 OSI\u2014Performance Management Working Document","year":"1989","journal-title":"ISO\/IEC JTC 1\/SC 21 N3313"},{"issue":"9","key":"10.1016\/S0140-3664(97)00094-7_BIB81","doi-asserted-by":"crossref","first-page":"1385","DOI":"10.1109\/49.257931","article-title":"Real-time management of telephone operating company networks: issues and approaches","volume":"11","author":"Kheradpir","year":"1993","journal-title":"IEEE J. Select. Areas Commun."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB82","series-title":"Proc. IEEE GLOBECOM","first-page":"397","article-title":"Real-time packet network analysis for ISO\/OSI performance management","author":"Kim","year":"1990"},{"issue":"9","key":"10.1016\/S0140-3664(97)00094-7_BIB83","doi-asserted-by":"crossref","first-page":"558","DOI":"10.1016\/0140-3664(90)90007-4","article-title":"Integrated methodology for supporting packet network performance management and planning","volume":"13","author":"Wang","year":"1990","journal-title":"Computer Commun."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB84","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/MASSP.1987.1165576","article-title":"An introduction to computing with neural nets","author":"Lippman","year":"1987","journal-title":"IEEE ASSP Mag."},{"issue":"1","key":"10.1016\/S0140-3664(97)00094-7_BIB85","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/TSMC.1973.5408575","article-title":"Outline of a new approach to the analysis of complex systems and decision processes","volume":"3","author":"Zadeh","year":"1973","journal-title":"IEEE Trans. System, Man Cybernet."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB86","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1109\/72.80211","article-title":"ATM communication network control by neural networks","volume":"1","author":"Hiramatsu","year":"1990","journal-title":"IEEE Trans. Neural Networks"},{"issue":"10","key":"10.1016\/S0140-3664(97)00094-7_BIB87","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1109\/35.466221","article-title":"Training techniques for neural network applications in ATM","volume":"33","author":"Hiramatsu","year":"1995","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB88","series-title":"Neural Networks in Telecommunications","article-title":"A neural network model for adaptive congestion control in ATM networks","author":"Chen","year":"1994"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB89","series-title":"Neural Networks in Telecommunications","article-title":"ATM traffic control using neural networks","author":"Hiramatsu","year":"1994"},{"issue":"10","key":"10.1016\/S0140-3664(97)00094-7_BIB90","volume":"33","year":"1995","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB91","first-page":"339","article-title":"Application of fuzzy control to adaptive traffic routing in telephone networks","volume":"19","author":"Khalfet","year":"1994","journal-title":"Information Decision Technol."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB92","series-title":"IEEE\/IFIP International Symposium on Integrated Network Management","first-page":"187","article-title":"Network performance management using realistic abductive reasoning model","author":"Kumar","year":"1995"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB93","first-page":"222","article-title":"Measured capacity of an ethernet: myths and reality","author":"Boggs","year":"1992","journal-title":"Comput. Commun. Rev."},{"issue":"7","key":"10.1016\/S0140-3664(97)00094-7_BIB94","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1145\/360248.360253","article-title":"Ethernet: distributed packet switching for local computer networks","volume":"19","author":"Metcafe","year":"1976","journal-title":"Commun. ACM"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB95","unstructured":"S.S. Keerthi, B. Ravindran, A tutorial survey of reinforcement learning, to appear in Sadhana."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB96","first-page":"13","article-title":"Acquiring robot skills via reinforcement learning","author":"Vijaykumar","year":"1994","journal-title":"IEEE Control Systems"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB97","unstructured":"G.P. Kumar, P. Venkataram, Network performance control using reinforcement learning, submitted for publication."},{"issue":"5","key":"10.1016\/S0140-3664(97)00094-7_BIB98","doi-asserted-by":"crossref","first-page":"869","DOI":"10.1109\/49.638","article-title":"MAPCON: an expert system for configuration of MAP networks","volume":"6","author":"Muralidhar","year":"1988","journal-title":"IEEE J. Select. Areas Commun."},{"issue":"1","key":"10.1016\/S0140-3664(97)00094-7_BIB99","volume":"12","year":"1994","journal-title":"IEEE J. Selected Areas in Commun."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB100","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/35.212424","article-title":"Modelling the user interface","author":"Marchisio","year":"1993","journal-title":"IEEE Commun. Mag."},{"issue":"1","key":"10.1016\/S0140-3664(97)00094-7_BIB101","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1109\/49.265712","article-title":"Fast restoration of ATM networks","volume":"12","author":"Anderson","year":"1994","journal-title":"IEEE J. Selected Areas Commun."},{"issue":"3","key":"10.1016\/S0140-3664(97)00094-7_BIB102","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1002\/ecja.4410780302","article-title":"Virtual path restoration techniques based on centralized control functions","volume":"78","author":"Hadama","year":"1995","journal-title":"Electron. Commun. Jpn."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB103","series-title":"Proc. IEEE GLOBECOM","first-page":"1090","article-title":"The selfhealing network: a fast distributed restoration technique for networks using digital cross-connect machines","author":"Grover","year":"1987"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB104","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/35.408428","article-title":"Self-healing virtual path architecture in ATM networks","author":"Kawamura","year":"1995","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB105","series-title":"Twelfth International Conference on Computer Communications","first-page":"525","article-title":"Reconfiguration for service and selfhealing in ATM networks based on virtual paths","author":"Noh","year":"1995"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB106","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1007\/BF01386390","article-title":"A note on two problems in connection with graphs","volume":"1","author":"Dijkstra","year":"1959","journal-title":"Numerich. Math"},{"issue":"4598","key":"10.1016\/S0140-3664(97)00094-7_BIB107","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1126\/science.220.4598.671","article-title":"Optimization by simulated annealing","volume":"13","author":"Kirkpatrick","year":"1983","journal-title":"Science"},{"issue":"6","key":"10.1016\/S0140-3664(97)00094-7_BIB108","doi-asserted-by":"crossref","first-page":"941","DOI":"10.1109\/72.286889","article-title":"Neural networks for shortest path computation and routing in computer networks","volume":"4","author":"Ali","year":"1993","journal-title":"IEEE Trans. Neural Networks"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB109","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/BF00339943","article-title":"Neural composition of decisions optimization problems","volume":"52","author":"Hopfield","year":"1985","journal-title":"Biol. Cybernet."},{"issue":"12","key":"10.1016\/S0140-3664(97)00094-7_BIB110","doi-asserted-by":"crossref","first-page":"1347","DOI":"10.1109\/12.106220","article-title":"Optimization using neural networks","volume":"40","author":"Tagliarini","year":"1991","journal-title":"IEEE Trans. Comput."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB111","year":"1991"},{"issue":"2","key":"10.1016\/S0140-3664(97)00094-7_BIB112","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1007\/BF00202901","article-title":"An evolutionary approach to the traveling salesman problem","volume":"60","author":"Fogel","year":"1988","journal-title":"Biol. Cybernet."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB113","doi-asserted-by":"crossref","first-page":"563","DOI":"10.1137\/0206041","article-title":"An analysis of several heuristics for the travelling salesman problem","volume":"6","author":"Rosenkrantz","year":"1977","journal-title":"SIAM J. of Comput."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB114","series-title":"Introduction to Operations Research, A Computer Oriented Algorithmic Approach","author":"Gillett","year":"1979"},{"issue":"5","key":"10.1016\/S0140-3664(97)00094-7_BIB115","doi-asserted-by":"crossref","first-page":"1086","DOI":"10.1287\/opre.28.5.1086","article-title":"Linear search for the asymmetric travelling salesman problem","volume":"28","author":"Kanellakis","year":"1980","journal-title":"Operations Res."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB116","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/37.1870","article-title":"Neural networks for routing communication traffic","author":"Rauch","year":"1988","journal-title":"IEEE Control Systems Mag."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB117","series-title":"Graph Theory with Applications to Engineering and Computer Science","author":"Deo","year":"1994"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB118","series-title":"Proc. International Joint Conference on Neural Networks","first-page":"II.591","article-title":"Neural networks implementation of the shortest path algorithm for traffic routing in communication networks","author":"Zhang","year":"1989"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB119","unstructured":"G.P. Kumar, P. Venkataram, Network restoration using recurrent neural networks, submitted for publication."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB120","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/65.283929","article-title":"Security considerations in a network management environment","author":"O'Mohony","year":"1994","journal-title":"IEEE Network"},{"issue":"1","key":"10.1016\/S0140-3664(97)00094-7_BIB121","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/77648.77649","article-title":"A logic of authentication","volume":"8","author":"Burrows","year":"1990","journal-title":"ACM Trans. Comput. Systems"},{"issue":"6","key":"10.1016\/S0140-3664(97)00094-7_BIB122","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New directions in cryptography","volume":"22","author":"Diffie","year":"1976","journal-title":"IEEE Trans. Information Theory"},{"issue":"2","key":"10.1016\/S0140-3664(97)00094-7_BIB123","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosysteins","volume":"21","author":"Rivcst","year":"1978","journal-title":"Commun. ACM"},{"issue":"5","key":"10.1016\/S0140-3664(97)00094-7_BIB124","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1002\/j.1538-7305.1994.tb00611.x","article-title":"Secure network access using multiple applications of AT&T's smart card","volume":"73","author":"Sherman","year":"1994","journal-title":"AT&T Tech. J."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB125","series-title":"Proc. Winter USENIX Conference","first-page":"191","article-title":"Kerberos: an authentication service for open network systems","author":"Steiner","year":"1988"},{"issue":"1","key":"10.1016\/S0140-3664(97)00094-7_BIB126","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1109\/2.108052","article-title":"Authentication for distributed systems","volume":"25","author":"Wood","year":"1992","journal-title":"IEEE Comput."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB127","article-title":"Access control: principles and practice","author":"Sandhu","year":"1993","journal-title":"EEE Network"},{"issue":"7","key":"10.1016\/S0140-3664(97)00094-7_BIB128","doi-asserted-by":"crossref","first-page":"544","DOI":"10.1016\/0140-3664(94)90109-0","article-title":"Security management for OSI networks","volume":"17","author":"Patel","year":"1994","journal-title":"Comput. Commun."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB129","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1109\/TSE.1987.232892","article-title":"On access checking in capability-based systems","volume":"13","author":"Kain","year":"1987","journal-title":"IEEE Trans. Software Eng."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB130","series-title":"Security Architecture for Open Distributed Systems","author":"Muftic","year":"1993"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB131","unstructured":"G.P. Kumar, P. Venkataram, A security management architecture for access control to network resources, IEE Proc. on Computers and Digital Techniques, to appear."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB132","article-title":"Electronic access control system: a new approach","author":"Swamy","year":"1994"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB133","series-title":"IEEE Computer Society Symposium on Security and Privacy","first-page":"283","article-title":"Proxy-based authorization and accounting for distributed systems","author":"Neuman","year":"1993"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB134","series-title":"IEEE Computer Society Symposium on Security and Privacy","first-page":"255","article-title":"An analysis of the proxy problem in distributed system","author":"Varadhrajan","year":"1991"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB135","series-title":"Proc. Twelfth International Conference on Computer Communications","first-page":"409","article-title":"Intrusion detection: a survey","author":"Esmaili","year":"1995"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB136","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/65.283931","article-title":"Network intrusion detection","author":"Mukherjee","year":"1994","journal-title":"IEEE Network"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB137","unstructured":"J. Frank, Artificial intelligence and intrusion detection: current and future directions, submitted for publication."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB138","series-title":"Proc. IEEE Computer Network Security Symp.","first-page":"98","article-title":"NIDX-an expert system for real-time network intrusion detection","author":"Bauer","year":"1988"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB139","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/TSE.1987.232894","article-title":"An intrusion-detection model","volume":"13","author":"Denning","year":"1987","journal-title":"IEEE Trans. Software Eng."},{"issue":"3","key":"10.1016\/S0140-3664(97)00094-7_BIB140","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1109\/32.372146","article-title":"State transition analysis: a rule-based intrusion detection approach","volume":"21","author":"Ilgan","year":"1995","journal-title":"IEEE Trans. Software Eng."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB141","unstructured":"S. Kumar, E.H. Spafford, A pattern matching model for misuse intrusion detection, submitted for publication."},{"issue":"5","key":"10.1016\/S0140-3664(97)00094-7_BIB142","doi-asserted-by":"crossref","DOI":"10.1109\/21.293498","article-title":"A multilayer neural network system for computer access security","volume":"24","author":"Obaidat","year":"1994","journal-title":"IEEE Trans. Systems, Man Cybernet."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB143","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/0167-8655(89)90026-3","article-title":"An application of fuzzy algorithms in a computer access security system","volume":"9","author":"Hussien","year":"1989","journal-title":"Pattern Recognition Lett."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB144","series-title":"Proc. IEEE Symposium on Research in Computer Security and Privacy","first-page":"240","article-title":"A neural network component for an intrusion detection system","author":"Debar","year":"1992"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB145","article-title":"Learning internal representations by error propagation","volume":"Vol. 1","author":"Rumelhart","year":"1986"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB146","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1016\/0169-7552(95)00096-1","article-title":"Some FAQs about usage-based pricing","volume":"28","author":"Mackie-Mason","year":"1995","journal-title":"Comput. Networks ISDN Systems"},{"issue":"6","key":"10.1016\/S0140-3664(97)00094-7_BIB147","doi-asserted-by":"crossref","first-page":"614","DOI":"10.1109\/90.266050","article-title":"Pricing in computer networks: motivation formulation and example","volume":"1","author":"Cocchi","year":"1993","journal-title":"IEEE\/ACM Trans. Networking"},{"issue":"7","key":"10.1016\/S0140-3664(97)00094-7_BIB148","doi-asserted-by":"crossref","first-page":"1141","DOI":"10.1109\/49.414634","article-title":"Pricing congestible network resources","volume":"13","author":"Mackie-Mason","year":"1995","journal-title":"IEEE J. Select. Areas Commun."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB149","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/98.403456","article-title":"Netbill: an internet commerce system optimized for network-delivered services","author":"Sirbu","year":"1995","journal-title":"IEEE Personal Commun."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB150","series-title":"Proc. IEEE GLOBECOM","first-page":"319","article-title":"Charging in cordless telecommunication systems","author":"Isberg","year":"1991"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB151","year":"1990","journal-title":"IEEE Network Mag."},{"issue":"2","key":"10.1016\/S0140-3664(97)00094-7_BIB152","volume":"7","year":"1995","journal-title":"NTT Rev."},{"issue":"10","key":"10.1016\/S0140-3664(97)00094-7_BIB153","doi-asserted-by":"crossref","first-page":"588","DOI":"10.1016\/0140-3664(91)90048-6","article-title":"Network management: interoperability and information model","volume":"41","author":"Liao","year":"1991","journal-title":"Comput. Commun."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB154","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/35.299841","article-title":"A global network management framework for the '90s","author":"Voruganti","year":"1994","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB155","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1145\/52325.52346","article-title":"Knowledge-based monitoring and control: an approach to understanding the behavior of TCP\/IP network protocols","author":"Hitson","year":"1988","journal-title":"Comput. Commun. Rev."},{"issue":"9","key":"10.1016\/S0140-3664(97)00094-7_BIB156","doi-asserted-by":"crossref","first-page":"547","DOI":"10.1016\/0140-3664(90)90006-3","article-title":"Cooperative distributed problem solving for communication network management","volume":"13","author":"Weihmayer","year":"1990","journal-title":"Computer Commun."},{"key":"10.1016\/S0140-3664(97)00094-7_BIB157","article-title":"Integrated Network Management Using Extended Blackboard Architecture","author":"Kumar","year":"1996"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB158","series-title":"Blackboard Systems","author":"Engelmore","year":"1988"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB159","article-title":"The blackboard architecture: a general framework for problem solving?","author":"Hayes-Roth","year":"1983","journal-title":"Heuristic Programming Project, Computer Science Department, Stanford University, Report No. HPP-83-30"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB160","series-title":"Blackboard Architectures and Applications","year":"1989"},{"key":"10.1016\/S0140-3664(97)00094-7_BIB161","series-title":"Symposium of Intelligent Systems","first-page":"35","article-title":"Extended blackboard architecture for network management","author":"Kumar","year":"1993"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366497000947?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366497000947?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,4,9]],"date-time":"2023-04-09T12:10:29Z","timestamp":1681042229000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366497000947"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997,12]]},"references-count":161,"journal-issue":{"issue":"15","published-print":{"date-parts":[[1997,12]]}},"alternative-id":["S0140366497000947"],"URL":"https:\/\/doi.org\/10.1016\/s0140-3664(97)00094-7","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[1997,12]]}}}