$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Apparatus and method for event correlation and problem reporting 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-017/00
출원번호 US-0893263 (1997-07-15)
발명자 / 주소
  • Yemini Yechiam
  • Yemini Shaula
  • Kliger Shmuel
출원인 / 주소
  • System Management Arts, Inc.
대리인 / 주소
    Gottlieb, Rackman & Reisman, P.C.
인용정보 피인용 횟수 : 206  인용 특허 : 44

초록

A computer implemented method is provided for determining the source of a problem in a complex system of managed components based upon symptoms. The problem source identification process is split into different activities. Explicit configuration non-specific representations of types of managed compo

대표청구항

[ What is claimed is:] [1.]1. A computer implemented method to diagnose a problem from one or more symptoms in a system of managed components generating symptoms of problems, the method comprising the steps of:creating one or more configuration non-specific representations of types of managed compon

이 특허에 인용된 특허 (44)

  1. Dow Howard E. (Lexington MA) Li Ruby (Chelmsford MA) Potter Terry W. (Acton MA), Adaptive fault identification system.
  2. Yemini Yechiam (Briarcliff Manor NY) Yemini Shaula (Briarcliff Manor NY) Kliger Shmuel (Ossining NY), Apparatus and method for analyzing and correlating events in a system using a causality matrix.
  3. Yemini Yechiam (Briarcliff Manor NY) Yemini Shaula (Briarcliff Manor NY) Kliger Shmuel (Ossining NY), Apparatus and method for event correlation and problem reporting.
  4. Reifman Jaques (Westchester IL) Wei Thomas Y. C. (Downers Grove IL), Combined expert system/neural networks method for process fault diagnosis.
  5. Smith Derek J. (Dallas TX), Computation system and method using hamming distance.
  6. Sorensen Mark C. (11 N. Second St. ; Apt. 502 Philadelphia PA 19106), Computer aided medical diagnostic method and apparatus.
  7. Abel Mark J. (Middleburg Heights OH) Kwan Chi L. (Naperville IL) Polli Philip V. (Elk Grove Village IL) Veach Michael T. (Naperville IL), Computer system fault recovery based on historical analysis.
  8. Malin Jane T. (Houston TX) Basham Bryan D. (Seabrook TX) Harris Richard A. (Houston TX), Discrete event simulation tool for analysis of qualitative models of continuous processing system.
  9. Kahn Gary S. (Pittsburgh PA) Pepper Jeffrey A. (Verona PA) Kepner Al N. (Pittsburgh PA) Richer William (Pittsburgh PA) Enand Rajiv (Deerborn MI), Domain independent shell for building a diagnostic expert system.
  10. Grace Andrew,GBX, Event correlation.
  11. Clark Mark E. (San Jose CA) Greever Richard G. (Sunnyvale CA) Schmier Larry J. (Santa Rosa CA) Wong Jerome D. (Sunnyvale CA), Expert system for processing errors in a multiplex communications system.
  12. Chakravarty Abhijit J. (Renton WA) Nakamura Yoshiki (Yokohama JPX), Failure analysis system.
  13. Oda Toshihiko (Sagamihara JPX) Katoh Eiichi (Yokohama JPX), Fault diagnosis expert system.
  14. Mori Kinji (Yokohama JPX) Miyamoto Shoji (Kawasaki JPX) Shiraha Takeshi (Nishinomiya JPX), Fault diagnostic distributed processing method and system.
  15. Nomoto Kohei (Kanagawa JPX) Kirimoto Tetsuo (Kanagawa JPX) Ohhashi Yoshimasa (Kanagawa JPX), Fuzzy backward reasoning device.
  16. Hayashi Yoichi (Hitachi JPX), Fuzzy backward reasoning system and expert system utilizing the same.
  17. Hayashi Yoichi (Hitachi JPX), Fuzzy backward reasoning system and expert system utilizing the same.
  18. Beal David Grant (Longmont CO) Hill Jo Etta (La Veta CO) Hill Fletcher Lawrence (La Veta CO) Jurestovsky Nancy Rosann (Golden CO) Stephens Michael Robert (Westminster CO), Knowledge based resource management.
  19. Kim Sachol E. (Yorba Linda CA), Method and apparatus for diagnosing faults.
  20. Sheppard John W. (Glen Burnie MD) Simpson William R. (Edgewater MD) Graham Jerry L. (Baldwin MD), Method and apparatus for diagnostic testing including a neural network for determining testing sufficiency.
  21. Tong David W. (Scotia NY) Jolly Christopher H. (Schnectady NY) Zalondek Kevin C. (Schnectady NY), Method and apparatus for generation of multi-branched diagnostic trees.
  22. Tsuyama Tsutomu (Yokohama JPX) Sato Shigeru (Yokohama JPX) Tsunekawa Kayo (Yokohama JPX) Shimoyashiro Sadao (Fujisawa JPX) Harada Toshimasa (Shizuoka-ken JPX) Higano Koichi (Tochigi JPX) Namiki Toshi, Method and system for diagnosis and analysis of products troubles.
  23. McCown Patricia M. (Cresskill NJ) Conway Timothy J. (Highland Park NJ) Jessen Karl M. (Bayonne NJ), Methods and apparatus for monitoring system performance.
  24. Carusone ; Jr. Anthony (Tucson AZ) Garrigan Albert W. (Wapppingers Falls NY) Hunsinger Wayne (Endwell NY) Moffitt Gerald T. (San Jose CA) Spencer David E. (Lagrangeville NY) Taylor Jordan M. (Poughke, Methods and apparatus for performing fault isolation and failure analysis in link-connected systems.
  25. McCown Patricia M. (Creskill NJ) Conway Timothy J. (Highland Park NJ), Methods and apparatus for performing system fault diagnosis.
  26. Thompson Timothy F. (Pittsburgh PA) Wojcik Robert M. (Greensburg PA), Methods and apparatus for system fault diagnosis and control.
  27. Bouloutas Anastasios T. (Athens NY GRX) Calo Seraphin B. (Peekskill NY) Finkel Allan J. (New City NY), Methods and systems for alarm correlation and fault localization in communication networks.
  28. Schwartz Steven H. (Brookline MA) Adler Mark R. (Lexington MA) Billmers Meyer A. (Lexington MA) Carifo Michael G. (Shrewsbury MA), Model based reasoning system for network fault diagnosis.
  29. Dev Roger H. (Durham NH) Emery Dale H. (Berwick ME) Rustici Eric S. (Londonderry NH) Brown Howard M. (Rochester NH) Wiggin Dwayne S. (Rochester NH) Gray Eric W. (Manchester NH) Scott Walter P. (Salem, Network management system using model-based intelligence.
  30. Park Chin S. (Sunnyvale CA), Neural network employing leveled summing scheme with blocked array.
  31. Herbst John J. (West Hartford CT) Sider Richard G. (Granby CT) Jaquith Robert E. (Somers CT) Meijer Christoffel H. (Windsor CT), Nuclear plant safety evaluation system.
  32. Pennebaker William B. (Carmel NY) Mitchell Joan L. (Ossining NY), Probability adaptation for arithmetic coders.
  33. Saylor Charles H. M. (Manlius NY) Jabbour Kamal (Syracuse NY), Real time method for processing alaarms generated within a predetermined system.
  34. Kemper Christian T. (Winter Park FL) Lowenfeld Simon (Monroeville PA) Fox Mark S. (Pittsburgh PA), Rule based diagnostic system with dynamic alteration capability.
  35. Furuichi Tetsuo (Sanda JPX), Simulation using compiled function description language.
  36. Akamine Masami (Yokosuka JPX) Okuda Yuji (Tokyo JPX) Miseki Kimio (Kawasaki JPX), Speech coding system utilizing a recursive computation technique for improvement in processing speed.
  37. Farhat Nabil (Philadelphia PA), Super resolution.
  38. Simoudis Evangelos (West Newton MA), System and method for retrieving justifiably relevant cases from a case library.
  39. Ito Tatsuo (Yokohama JPX), System for generating knowledge base in which sets of common causal relation knowledge are generated.
  40. Beck Kent L. (Aloha OR) Cunningham ; Jr. Howard G. (Beaverton OR), System for graphically representing operation of object-oriented programs.
  41. Bilski Maryann J. (Waltham MA) Vermilion Edson O. (Windham NH) Chang Jang-Li (Dracut MA), System for producing memory maps by interpreting a descriptor file which identifies and describes the data structures pr.
  42. Denny Luan J. (Sunnyvale CA), Threshold alarms for processing errors in a multiplex communications system.
  43. Moulsley Timothy J. (Caterham GB2), Transmission and decoding of tree-encoded parameters of analogue signals.
  44. Nakano Keiichi (Hachioji JPX), Vector quantization method and apparatus.

이 특허를 인용한 특허 (206)

  1. Noorhosseini, Majid; Zary, Lyle F., Alarm correlation method and system.
  2. Gilbert, Harry M., Alerts issued upon component detection failure.
  3. Fligler, Ariel; Dayagi, Yoram; Haleva, Avraham; Mashal, Sharon, Analyzing and detecting anomalies in data records using artificial intelligence.
  4. Goel, Parveen Kumar, Authorization system and a method of authorization.
  5. Reichert, Michael; Wiese, David; Heck, Norbert, Automatic problem-oriented transformation of database performance data.
  6. Shulman, Amichai; Boodaei, Michael; Kramer, Shlomo, Automatic stability determination and deployment of discrete parts of a profile representing normal behavior to provide fast protection of web applications.
  7. Shulman, Amichai; Boodaei, Michael; Kramer, Shlomo, Automatic stability determination and deployment of discrete parts of a profile representing normal behavior to provide fast protection of web applications.
  8. Lee, Daniel Voon Leng, Cause and effect mapping for failure mode effect analysis creation and risk management.
  9. Lavie, Gavriela D.; Kerman Hendell, Shiri, Cause to effect methodology for monitoring database performance.
  10. Jain, Navendu; Potharaju, Rahul, Characterizing service levels on an electronic network.
  11. Nagura, Masataka; Nagai, Takayuki; Sugauchi, Kiminori; Kudo, Yutaka, Computer system management method and management apparatus.
  12. Schultz,Paul C., Condition assessment system and method.
  13. Maki, Yoshiyuki; Oi, Masaya, Control apparatus having object-oriented self-diagnosis program.
  14. Schimmelpfeng, Joern; Vosseler, Frank; Bosler, Martin, Creating a correlation rule defining a relationship between event types.
  15. Cowan, John Lawton; Nemecek, Rachel, Customer impact predictive model and combinatorial analysis.
  16. Hammet, Claudia P.; Ulmer, David H.; Cowan, John; Nemecek, Rachel; Dunlap, Jr., Edward M.; Williams, Thomas R., Customer impact predictive model and combinatorial analysis.
  17. Garg, Neeraj, Data driven component reputation.
  18. Sanghvi, Ashvinkumar J.; Wilson, Stephen O., Declaration and consumption of a causality model for probable cause analysis.
  19. Manley,Douglas R.; Barford,Lee A., Diagnosis of data packet transfer faults using constraints.
  20. Manley,Douglas R.; Barford,Lee A., Diagnosis of data transfer faults using constraints.
  21. Anderson, Glen J., Diagnostic authentication codes.
  22. Underdal, Olav M.; Gilbert, Harry M.; Portyanko, Oleksiy; Mayes, Randy L.; Fountain, Gregory J.; Wittliff, III, William W., Diagnostic test sequence optimization method and apparatus.
  23. Kaminsky, David L.; Ogle, David M., Distributed notification and action mechanism for mirroring-related events.
  24. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  25. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  26. Volodarsky, Michael D.; Ng, Patrick Yu-Kwan, Dynamic adjusting send rate of buffered data.
  27. Gilbert, Harry M., Dynamic decision sequencing method and apparatus for optimizing a diagnostic test plan.
  28. Underdal, Olav M.; Gilbert, Harry M.; Portyanko, Oleksiy; Mayes, Randy L.; Fountain, Gregory J.; Wittliff, III, William W., Dynamic decision sequencing method and apparatus for optimizing a diagnostic test plan.
  29. Underdal, Olav M.; Gilbert, Harry M.; Portyanko, Oleksiy; Mayes, Randy L.; Fountain, Gregory J.; Wittliff, III, William W., Dynamic decision sequencing method and apparatus for optimizing a diagnostic test plan.
  30. Wittliff, III, William W.; Underdal, Olav M.; Gilbert, Harry M.; Portyanko, Alex, Dynamic decision sequencing method and apparatus for optimizing a diagnostic test plan.
  31. Ouye, Michael Michio; Crocker, Steven Toye, Dynamic evaluation of access rights.
  32. Katz, Yoav A.; Maharik, Ron, Dynamic generation of tests.
  33. Shulman, Amichai; Boodaei, Michael; Kramer, Shlomo, Dynamic learning method and adaptive normal behavior profile (NBP) architecture for providing fast protection of enterprise applications.
  34. Shulman, Amichai; Boodaei, Michael; Kremer, Shlomo, Dynamic learning method and adaptive normal behavior profile (NBP) architecture for providing fast protection of enterprise applications.
  35. Bhinge, Amol V., Efficient replaying of autograded coverage regressions and performance verification with directed testcases.
  36. Salem,Hany A., Error analysis fed from a knowledge base.
  37. Jain, Navendu, Evaluating electronic network devices in view of cost and service level considerations.
  38. James,Mark L.; Mackey,Ryan M. E.; Park,Han G.; Zak,Michail, Exception analysis for multimissions.
  39. Matsumoto, Yasuhide; Watanabe, Yukihiro; Shimada, Kuniaki; Oguro, Keiichi, Failure response support apparatus and failure response support method.
  40. Lapiotis, George; Shallcross, David, Fault diagnosis employing probabilistic models and statistical learning.
  41. Moorhouse,Timothy James, Fault diagnosis system.
  42. Artzi, Shay; Dolby, Julian; Pistoia, Marco; Tip, Frank, Fault localization using condition modeling and return value modeling.
  43. Salem,Hany A., First failure data capture.
  44. Meyers, Brian R.; Smith, Gregory R., Framework for user interaction with multiple network devices.
  45. Whitlow,Stephen D.; Mathan,Santosh; Dorneich,Michael C.; Ververs,Patricia M., Hierarchical workload monitoring for optimal subordinate tasking.
  46. Hebbagodi, Praveen; Arvindam, Sunil; Pokarna, Sameer Shantilal, High performance computing system for distributed applications over a computer.
  47. Artzi, Amanuel Ronen; Adiwijaya, Igg; Avital, Avshalom, IT discovery of virtualized environments by scanning VM files and images.
  48. De Peuter, Geert; Bonnell, David, Impact propagation in a directed acyclic graph.
  49. De Peuter, Geert; Bonnell, David, Impact propagation in a directed acyclic graph having restricted views.
  50. Bhinge, Amol V.; Wood, George W.; Miller, Hillel, Improving test pattern coverage through parallel discard, flow control, and quality metrics.
  51. Aranguren, Herman; LeGendre, David Bruce; Reed, David Charles; Smith, Max Douglas, Intelligent dump suppression.
  52. Hamilton, Kelvin; Brown, Keith; Taylor, Nick; Lane, David, Intelligent integrated diagnostics.
  53. Schlicker,Darrell E.; Goldfine,Neil J.; Washabaugh,Andrew P.; Sheiretov,Yanko K.; Windoloski,Mark D., Local feature characterization using quasistatic electromagnetic sensors.
  54. Baughman, Aaron K.; Malkin, Peter K.; O'Connell, Brian M.; Pan, Hubert E., Machine learning of predictive models using partial regression trends.
  55. Morimura, Tomohiro; Kunii, Masashi; Kudo, Yutaka, Management apparatus and management method.
  56. Morimura, Tomohiro; Kunii, Masashi; Kudo, Yutaka, Management apparatus and management method.
  57. Morimura, Tomohiro; Sugauchi, Kiminori; Kuroda, Takaki, Management system and information processing system.
  58. Mazzone,Thomas, Medical information system, method and article of manufacture.
  59. Yardeni, Eyal; Upadhya, Vasudeva, Method and apparatus for adaptive monitoring and management of distributed systems.
  60. Grainger, Steven Phillip, Method and apparatus for an intruder detection reporting and response system.
  61. Christopher G. Kaler ; Martyn S. Lovell ; Robert S. Wahbe ; William J. Ferguson ; Oliver J. Sharp, Method and apparatus for analyzing performance of data processing system.
  62. Kaler, Christopher G.; Lovell, Martyn S.; Wabbe, Robert S.; Ferguson, William J.; Sharp, Oliver J., Method and apparatus for analyzing performance of data processing system.
  63. Kaler, Christopher G.; Lovell, Martyn S.; Wahbe, Robert S.; Ferguson, William J.; Sharp, Oliver J., Method and apparatus for analyzing performance of data processing system.
  64. Kaler, Christopher G.; Lovell, Martyn S.; Wahbe, Robert S.; Ferguson, William J.; Sharp, Oliver J., Method and apparatus for analyzing performance of data processing system.
  65. Kaler, Christopher G.; Lovell, Martyn S.; Wahbe, Robert S.; Ferguson, William J.; Sharp, Oliver J., Method and apparatus for analyzing performance of data processing system.
  66. Kaler, Christopher G.; Lowell, Martyn S.; Wahbe, Robert S.; Ferguson, William J.; Sharp, Oliver J., Method and apparatus for analyzing performance of data processing system.
  67. Boysworth, Marc Kenneth, Method and apparatus for categorizing unexplained residuals.
  68. Cohen, Paul M.; Kluck, Joseph R.; Nerenberg, William J.; Dent, David E.; Vora, Sanjay V., Method and apparatus for cheating an information report resulting from a diagnostic session.
  69. Lewis, Lundy, Method and apparatus for component to service mapping in service level management (SLM).
  70. Vijendra, Sudhir, Method and apparatus for configuration and analysis of internal network routing protocols.
  71. Jakobson, Gabriel; Lewis, Lundy M.; Buford, John F., Method and apparatus for context-sensitive event correlation with external control in situation-based management.
  72. Hu, Guoqiang; Mei, Li Jun; Tan, HuaFang; Yang, Bo; Yuan, Yu, Method and apparatus for correlating input and output messages of system under test.
  73. Hu, Guoqiang; Mei, Li Jun; Tan, HuaFang; Yang, Bo; Yuan, Yu, Method and apparatus for correlating input and output messages of system under test.
  74. Lam, Cheuk; Yu, Tong; Moran, David; Banda, Pavan; He, Lida, Method and apparatus for cross domain and cross-layer event correlation.
  75. Florissi, Danilo; Florissi, Patricia Gomes Soares; Kleers, Udi; Kliger, Shmuel; Yardeni, Eyal; Yemini, Yechiam, Method and apparatus for determining monitoring locations in distributed systems.
  76. Gao, Jian; Liang, Jianbo; Li, Li, Method and apparatus for displaying resource information.
  77. Lam, Cheuk; Singh, Sathyanarayana; Patil, Prasanna S.; Ou, Chao-Wei; Moran, David W.; Song, Steve J., Method and apparatus for event correlation based on causality equivalence.
  78. He, Lida; Oztekin, Erkan; Kandasamy, Thulasinathan; Lam, Cheuk, Method and apparatus for event/alert enrichment.
  79. Tekle, Solomon; Sinclair, Keith; Nandy, Sumit, Method and apparatus for generating a network profile and device profile.
  80. Ramsey, Clinton M., Method and apparatus for generating transaction-based stimulus for simulation of VLSI circuits using event coverage analysis.
  81. Wood,George W.; Bhinge,Amol V., Method and apparatus for measuring test coverage.
  82. Benjamin,Shai; Florissi,Patricia; Kuhhirte,William; He,Lida, Method and apparatus for modeling and analyzing MPLS and virtual private networks.
  83. Zhang, Lianlai; He, Lida; Hammouda, Jamel; Yu, Tong; Lam, Cheuk, Method and apparatus for performance data transformation in a cloud computing system.
  84. Wood,George W.; Bhinge,Amol V., Method and apparatus for performing test pattern autograding.
  85. Vijendra, Sudhir; Florissi, Patricia, Method and apparatus for providing environmental management in distributed system data centers.
  86. Lewis, Lundy, Method and apparatus for reactive and deliberative service level management (SLM).
  87. Florissi,Danilo; DeSimone,Salvatore; Kliger,Schmuel; Ou,Chao Wei; Green,Howard H.; Wexler,Martin H., Method and apparatus for reference model change generation in managed systems.
  88. Govindan,Rajeev; Giglia,Thomas; Kuhhirte,William; Kleers,Ehud, Method and apparatus for representing, managing, analyzing and problem reporting in home networks.
  89. Garcia, Denis Jacques Paul, Method and apparatus for securing digital assets.
  90. Lewis, Lundy, Method and apparatus for service analysis in service level management (SLM).
  91. Lewis, Lundy M.; Jakobson, Gabriel; Buford, John F, Method and apparatus for situation-based management.
  92. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  93. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  94. Kunii, Masashi; Morimura, Tomohiro; Kuroda, Takaki, Method and computer for designing fault cause analysis rules in accordance with acquirable machine information.
  95. Zorc,Samo, Method and system for automatically generating source code based on a mark-up language message definition.
  96. Gotwals,Jacob K.; Garg,Neeraj, Method and system for automatically interpreting computer system performance measurements.
  97. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  98. Wiley,Kevin L.; Lathem,Gerald S.; Hall, Jr.,Michael L., Method and system for maintaining network activity data for intrusion detection.
  99. Wechter,Gabriel; Pulsipher,Eric; Knees,Max C., Method and system for managing a network of nodes.
  100. Das, Saumitra; Sokolov, Stepan; Chiu, Bill “Yuan-Chi”, Method and system for managing computer systems.
  101. Das, Saumitra; Sokolov, Stepan; Chiu, Bill “Yuan-Chi”, Method and system for managing computer systems.
  102. Fischman,Reuben S.; Payne,Adam, Method and system for modeling, analysis and display of network security events.
  103. Kinghorn, Gary Mark; Garcia, Denis Jacques Paul, Method and system for protecting electronic data in enterprise environment.
  104. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  105. Ryan, Nicholas M., Method and system for using remote headers to secure electronic files.
  106. Vainstein, Klimenty, Method and system for validating timestamps.
  107. Kaplan, Ari David, Method and system for wireless database management.
  108. Kaplan,Ari D., Method and system for wireless database management.
  109. Butler, Jeffry A.; Moring, Rodger L.; Schwartz, David N.; Stokowski, Jeffrey A., Method and system of identifying a problem prone part.
  110. Staub, David B.; Schwab, D. Michael; Hager, Jay Alan, Method and system of providing cataloging and detecting network faults.
  111. Bagne, Curtis A., Method and system to construct action coordination profiles.
  112. van der Linde, Leon, Method for data processing and display for detecting and/or predicting possible trends.
  113. He, Qingfeng; Moslehi, Khosrow; Feng, Xiaoming; Peng, Peng, Method of constructing causality network graphs and visual inference presentations for business rule applications.
  114. Morimura, Tomohiro; Sugauchi, Kiminori, Method, apparatus and system for displaying result of failure root cause analysis.
  115. Johnson,Timothy Lee; Azzaro,Steven Hector; Cleary,Daniel Joseph, Method, system and computer product for integrating case based reasoning data and failure modes, effects and corrective action data.
  116. Shah,Rasik P.; Kelly,Michael E., Method, system and program product for establishing a self-diagnosing and self-repairing automated system.
  117. Ohsie, David; Lam, Cheuk, Methods and apparatus for generating causality matrix and impacts using graph processing.
  118. Keller,Alexander; Kar,Gautam, Methods and apparatus for root cause identification and problem determination in distributed systems.
  119. Ohsie, David; Lam, Cheuk, Methods and apparatus for systems determining a probable set of problems to explain symptoms.
  120. Ohsie, David; Lam, Cheuk, Methods and apparatus for systems providing distributed expression evaluation over streams.
  121. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  122. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  123. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  124. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  125. Brown, Darren; Kushmerick, Nicholas; McLaughlin, Matt Roy; Gada, Dhaval; Lin, Junyuan, Methods and systems to identify log write instructions of a source code as sources of event messages.
  126. Thompson, Erskine, Methods for monitoring computer resources using a first and second matrix, and a feature relationship tree.
  127. Spire, Edward; Guan, Jiebo; Sharpe, Michael; Reiner, Roberto; Jones, Mark; Park, Stephen, Methods, systems and computer program products for managing execution of information technology (IT) processes.
  128. Kaminsky,David L.; Ogle,David M.; Rajaraman,Balachandar; Sweitzer,John W., Methods, systems and computer program products for resolving problems in an application program utilizing a situational representation of component status.
  129. Jain, Navendu; Potharaju, Rahul, Middlebox reliability.
  130. Sanghvi, Ashvinkumar J.; Rizzi, Lorenzo, Model-based event processing.
  131. Botzer, David; Oren, David; Yatzkar-Haham, Tali, Multi-level transaction flow monitoring.
  132. Botzer, David; Oren, David; Yatzkar-Haham, Tali, Multi-level transaction flow monitoring.
  133. Jain, Navendu, Network configuration in view of service level considerations.
  134. Jain, Navendu, Network event processing and prioritization.
  135. Kaffine,David M.; Schmidt,Peter H.; Rosen,Joseph S.; Wolf,Jonathan; Mellor,Arthur, Network fault isolation.
  136. Wood, George W.; Bhinge, Amol V., Network file update mechanism with integrity assurance.
  137. Chisholm, Alastair Hugh; Stevenson, David James; Duncan, Robert James; Grandin, Ronan Fran?ois Daniel; Gray, Neil William, Network management apparatus and method for identifying causal events on a network.
  138. Apte, Ajay A.; Salem, Hany A., Object introspection for first failure data capture.
  139. Gilbert, Harry M.; Portyanko, Alex; Mayes, Randy L.; Fountain, Gregory J.; Wittliff, III, William, Optimizing test procedures for a subject under test.
  140. Sm.o slashed.rgrav, Axel-Stephane, Performance analysis of data networks using a normalized sampling method.
  141. Markham, Thomas R.; Heimerdinger, Walter, Physical security management system.
  142. Cowart,Robert; Jenkins,Ray, Preliminary classification of events to facilitate cause-based analysis.
  143. Gamage, Nimal K K; Whitner, Richard Bennett, Preventing and servicing system errors with event pattern correlation.
  144. Jain, Navendu; Potharaju, Rahul, Problem inference from support tickets.
  145. Sieron, Russell J.; Morey, Bruce; Elster, John, Process automation system.
  146. Goel, Parveen Kumar, RFID reader for facility access control and authorization.
  147. James, Mark L.; Mackey, Ryan M. E.; Park, Han G.; Zak, Michail, Real-time spatio-temporal coherence estimation for autonomous mode identification and invariance tracking.
  148. Whittaker, Bruce Ernest; Watson, Leland Elvis, Recording relevant information in a GUI window of a panel dump browser tool.
  149. Kawai, Hideki, Relationship detector, relationship detection method, and recording medium.
  150. Chessell,Amanda Elizabeth; Cornpropst,Jason; Gerken, III,John Kenyon; Horn,William Pettit; Kreger,Heather Marie; Labadie,Eric; Ogle,David M.; Salahshour,Abdolreza; Sluiman,Harm; Sweitzer,John William, Resolving problems in a business process utilizing a situational representation of component status.
  151. Morimura, Tomohiro; Nagai, Takayuki; Sugauchi, Kiminori; Kuroda, Takaki; Arato, Yoshihiro, Root cause analysis method, apparatus, and program for IT apparatuses from which event information is not obtained.
  152. Morimura, Tomohiro; Nagai, Takayuki; Sugauchi, Kiminori; Kuroda, Takaki; Arato, Yoshihiro, Root cause analysis method, apparatus, and program for IT apparatuses from which event information is not obtained.
  153. Sinclair, Keith; Pithawala, Burjiz; Thirukazhukundram, Suresh, Rule-based network management approaches.
  154. Pisarsky,Vladimir R., Security monitor of system runs software simulator in parallel.
  155. Hildebrand, Hal S.; Garcia, Denis Jacques Paul, Security system for generating keys from access rules in a decentralized manner and methods therefor.
  156. Beck, Ralph L.; Romanchuk, Michael Walter, Software instrumentation method and apparatus.
  157. Fellenstein,Craig William; Gusler,Carl Phillip; Hamilton, II,Rick Allen; Ibrahim,Mamdouh, System and method for achieving autonomic computing self-healing, utilizing meta level reflection and reasoning.
  158. Williams,Emrys; Rudoff,Andrew, System and method for automated problem diagnosis.
  159. Andrew, Felix GTi, System and method for automatically diagnosing a computer problem.
  160. Marvasti, Mazda A., System and method for correlating fingerprints for automated intelligence.
  161. Angamuthu, Karthikeyan; Cox, Robert V.; Heracleous, Stephanos S., System and method for determining fault isolation in an enterprise computing system.
  162. Angamuthu,Karthikeyan; Cox,Robert V.; Heracleous,Stephanos S., System and method for determining fault isolation in an enterprise computing system.
  163. Lacey, III, Herbert Lyvirn, System and method for determining fault path behavior.
  164. Sudhindra, Veena; Sridhar, Gangadharapali; Sridhar, Varadarajan; Rao, K. Kalyana, System and method for fault identification in an electronic system based on context-based alarm analysis.
  165. Sailer, Anca; Shaikh, Hidayatullah Habeebullah; Song, Yang, System and method for incident management enhanced with problem classification for technical support services.
  166. Flynn,Peter; Stoos,Michael; Dentinger,Bill; McBeath,Tom; Rennyson,Dave; Gellerman, legal representative,Robert; Collison,Jason; Ramachandron,Jo; Rowland,Dan; Gellerman,David, System and method for integrating multiple data sources into service-centric computer networking services diagnostic conclusions.
  167. Coldicott,Peter Alan; Galambos,George M.; Harishankar,Raman; Holley,Kerrie Lamont; Kelley,Edward Emile, System and method for maintaining functionality during component failures.
  168. Williams, Emrys; Rudoff, Andrew, System and method for providing a data structure representative of a fault tree.
  169. Hildebrand, Hal S., System and method for providing different levels of key security for controlling access to secured items.
  170. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  171. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  172. Lewis, Lundy M., System and method for reactive and deliberative service level management (SLM).
  173. Ramadei, Michael J.; Rich, David L.; Jacobson, Gary S., System and method for recognizing faults in machines.
  174. Lewis, Lundy, System and method for service level management.
  175. Musman,Scott Abram, System and method for using agent-based distributed case-based reasoning to manage a computer network.
  176. Musman,Scott A., System and method for using agent-based distributed reasoning to manage a computer network.
  177. Uthe, Robert Thomas, System and method for using root cause analysis to generate a representation of resource dependencies.
  178. McGee,John; Earley,John Michael; Matthews,James W., System and methods for adaptive threshold determination for performance metrics.
  179. McGee,John J.; Courtemanche,Michael B.; Beck,Ralph L., System and methods for display of time-series data distribution.
  180. Pang, Yan, System component failure diagnosis.
  181. Zaifman,Arthur L.; Ciavaglia,Stephen J., System resource availability manager.
  182. Kaplan, Ari David, System, method and apparatus for wireless monitoring and management of computer systems.
  183. Worrill, Joshua; Laycock, Graeme, Systems and methods configured to enable content sharing between client terminals of a digital video management system.
  184. Bhandari, Neelendra; Joshi, Priteshkumar D; Reddy, Chandrakanth C; Goel, Parveen Kumar, Systems and methods for commissioning access control devices.
  185. Bhandari, Neelendra; Joshi, Priteshkumar D; Reddy, Chandrakanth C; Goel, Parveen Kumar, Systems and methods for configuring access control devices.
  186. Bhandari, Neelendra; Reddy, Chandrakantha C; Morrison, John David; Hussain, Mushabbar; McDonnell, Neil, Systems and methods for interacting with access control devices.
  187. Roy, Sanjay; Gali, Muneswar Rao; Bhandari, Neelendra; Chappidi, Gopi; Reddy, Chandrakantha, Systems and methods for location aware access control management.
  188. Bhandari, Neelendra; Roy, Sanjay; Reddy, Chandrakantha, Systems and methods for managing access control devices.
  189. Jones, Bryan; Palme, Matt; Quaill, Stephen; Cheung, Edward, Systems and methods for managing configuration data at disconnected remote devices.
  190. Lee, Martin, Systems and methods for managing video data.
  191. Masters, Amy; Bhandari, Ajit; Kwon, Dae-Soon; Palmer, Sally-Anne, Systems and methods for managing video data.
  192. Worrill, Joshua; Laycock, Graeme; Masters, Amelia; Flannery, Mark, Systems and methods for managing video data.
  193. Flannery, Mark, Systems and methods for presenting digital video management system information via a user-customizable hierarchical tree interface.
  194. Taylor, William Scott, Systems and methods for proactive management of a communication network through monitoring a user network interface.
  195. Taylor, William Scott, Systems and methods for proactive management of a communication network through monitoring a user network interface.
  196. Grabarnik, Genady; Hellerstein, Joseph L.; Ma, Sheng; Perng, Chang Shing; Thoenen, David Hutchinson, Systems and methods for validation, completion and construction of event relationship networks.
  197. Thompson, Erskine, Systems for monitoring computer resources.
  198. Marshak, Marik; Naamad, Amnon; Aharoni, Dan; Dolan, Sean; Kirac, Ahmet, Techniques for automated discovery and performing storage optimizations on a component external to a data storage system.
  199. Kirac, Ahmet; Sahin, Adnan; Naamad, Amnon, Techniques for automated discovery of storage devices and their performance characteristics.
  200. Underdal, Olav M.; Gilbert, Harry M.; Portyanko, Oleksiy; Mayes, Randy L.; Fountain, Gregory J.; Wittliff, III, William W., Test requirement list for diagnostic tests.
  201. Valadarsky,Doron; Pridor,Adir; Kaftan,Nir; Mallal,Shlomo; Pavlenko,Alexander; Lifshitz,Yuval; Bregman,Lev; Virtser,Alexander; Kouperchimdt,Igor, Topology-based reasoning apparatus for root-cause analysis of network faults.
  202. Wada,Atsushi, Trouble countermeasure support system and terminal device connected to the same.
  203. Gomes, Clemilton; Lisboa, Robson; Mazon, Jeffrey, Troubleshooting engine and method for using same.
  204. Warpenburg,Michael R.; Scholtes,Michael J., Two-phase root cause analysis.
  205. Underdal, Olav M.; Gilbert, Harry M.; Portyanko, Oleksiy; Mayes, Randy L.; Fountain, Gregory J.; Wittliff, III, William W., Vehicle state tracking method and apparatus for diagnostic testing.
  206. Landwehr,Michael; Kerman Hendel,Shiri; Dascalu,Ofer; Leibowitz,Ayal, Workflows for performance management methodology.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로