$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and apparatus for system state monitoring using pattern recognition and neural networks 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-011/30
  • G06F-015/00
출원번호 US-0799142 (2001-03-05)
발명자 / 주소
  • Vinberg Anders
  • Cass Ronald J.
  • Huddleston David E.
  • Pao John D.
  • Barthram Phil K.,GBX
  • Bayer Christopher W.,GBX
출원인 / 주소
  • Computer Associates Think, Inc.
대리인 / 주소
    O'Connor, Jr.
인용정보 피인용 횟수 : 53  인용 특허 : 13

초록

Pattern recognition of common modes by neural networks and other techniques are used to monitor and determine or predict the state of networks, computers, software systems, logical networks or other components of an information system, to report actual or predicted states, and to report other state

대표청구항

[ We claim:] [1.]1. A system to determine and predict the state of at least one component in a networked computer system, comprising:a learning subsystem comprising components for a first step of collecting of data from an agent during typical operation of such information system and storing such da

이 특허에 인용된 특허 (13)

  1. Buescher Kevin L. (Los Alamos NM) Baum Christopher C. (Mazomanie WI) Jones Roger D. (Espanola NM), Adaptive model predictive process control using neural networks.
  2. Leech William J. (Monroeville PA) Dean Thomas N. (Chapin SC), Automated rule based process control method with feedback and apparatus therefor.
  3. Arnold William C. (Mahopac NY) Chess David M. (Mohegan Lake NY) Kephart Jeffrey O. (Yorktown Heights NY) White Steven R. (New York NY), Automatic immune system for computers and computer networks.
  4. Skeirik Richard D. (Newark DE), Computer neural network regulatory process control system and method.
  5. Skeirik Richard D. (Newark DE), Computer neural network supervisory process control system and method.
  6. Komori Naoki (Tokyo JPX) Morita Akio (Saitama JPX) Suzuki Katsuaki (Asaka JPX), Method and apparatus for detecting faults in a computer network.
  7. Niida Kazuo (Yokohama JPX) Koshijima Ichirou (Zushi JPX) Tani Jun (Kawasaki JPX) Hirobe Toshikazu (Tokyo JPX), Method for recognition of abnormal conditions using neural networks.
  8. Yoshida Kenichi (Hitachi JPX) Watanabe Takao (Hitachi JPX) Kiguchi Takashi (Mito JPX), Method of operating power plants.
  9. Seiffert Roland ; Wong Stan, Monitoring architecture.
  10. Phaal Peter (Bradley Stoke GBX), Monitoring system status.
  11. Gaborski Roger S. (Pittsford NY), Neural network with back propagation controlled through an output confidence measure.
  12. Nomura Masahide (Hitachi JPX) Saito Tadayoshi (Hitachi JPX) Matsumoto Hiroshi (Ibaraka JPX) Shimoda Makoto (Katsuta JPX) Kondoh Masakazu (Hitachi JPX) Miyagaki Hisanori (Ohta JPX) Sugano Akira (Katsu, Process control method and system for performing control of a controlled system by use of a neural network.
  13. Kemper Christian T. (Winter Park FL) Lowenfeld Simon (Monroeville PA) Fox Mark S. (Pittsburgh PA), Rule based diagnostic system with dynamic alteration capability.

이 특허를 인용한 특허 (53)

  1. Meng,Zhuo; Duan,Baofu; Pao,Yoh Han, Adaptive learning enhancement to automated model maintenance.
  2. Meng,Zhuo; Pao,Yoh Han; Duan,Baofu, Automatic model maintenance through local nets.
  3. Meng,Zhuo; Pao,Yoh Han, Automatic neural-net model generation and maintenance.
  4. Jiang, Qin; Rockwood, Troy D, Compressing n-dimensional data.
  5. Leung, David Yum Kei; Ravandi, Mehdi, Contextual data mapping, searching and retrieval.
  6. Chandwani, Santosh, Controlling network access.
  7. Nauck,Detlef D; Azvine,Behnam; Spott,Martin, Data analysis system and method.
  8. Nagpal, Abhinay R.; Patil, Sandeep R.; Sivakumar, Gandhi; Whitehead, Carolyn A., Deduplication in network storage with data residence compliance.
  9. Crilly, Jr., William J., Detecting wireless interlopers.
  10. Choe, Calvin Choon-Hwan; Pickford, Misty Louise, Dynamic remediation of a client computer seeking access to a network with a quarantine enforcement policy.
  11. Olsson, Stig Arne; Smetanka, Terence Dale; Vijayan, Geetha, E-business competitive measurements.
  12. Olsson,Stig Arne; Urgo,David Michael; Vijayan,Geetha, E-business operations measurements.
  13. Olsson, Stig A.; Smetanka, Terrence D.; Vijayan, Geetha, Evaluation of performance of software applications.
  14. Olsson, Stig A.; Smetanka, Terrence D.; Vijayan, Geetha, Evaluation of performance of software applications.
  15. Choe, Calvin Choon Hwan; Parupudi, Gopal; Murthy, Mukunda S., Fragility handling.
  16. Fearn, Paul; Olsson, Stig Arne; Vijayan, Geetha, Graphics for end to end component mapping and problem-solving in a network environment.
  17. Fearn,Paul; Olsson,Stig Arne; Vijayan,Geetha, Graphics for end to end component mapping and problem-solving in a network environment.
  18. Duan,Baofu; Meng,Zhuo; Pao,Yoh Han, Hierarchical determination of feature relevancy.
  19. Day,Christopher W., Intrusion detection system.
  20. Day,Christopher W., Intrusion detection system using self-organizing clusters.
  21. Vasseur, Jean-Philippe; Mermoud, Grégory; Dasgupta, Sukrit, Learning machine based computation of network join times.
  22. Sweet, Bruce; Kelley, Jr., Bruce A.; Huang, Yuming; Levin, Andrew M.; Mayo, Gregory, Managing computer resources.
  23. Huddleston, David Eugene; Pao, Yoh Han; Cass, Ronald; Yang, Qian; Polyak, Ella; Cryer, Peter; Garofalo, Charles Edward, Method and apparatus for discovering evolutionary changes within a system.
  24. Callan, Robert Edward, Method and apparatus for monitoring performance characteristics of a system and identifying faults.
  25. Harvey, Elaine; Walnock, Matthew, Method and system for detecting characteristics of a wireless network.
  26. Harvey, Elaine; Walnock, Matthew, Method and system for detecting characteristics of a wireless network.
  27. Harvey, Elaine; Walnock, Matthew, Method and system for detecting characteristics of a wireless network.
  28. Harvey, Elaine; Walnock, Matthew, Method and system for detecting characteristics of a wireless network.
  29. Breese,Stephen S.; Olsson,Stig Arne; Vijayan,Geetha, Method and system for probing in a network environment.
  30. Buxton, Paul M.; Tabor, Eric Paul; Martin, Emilio Miguelanez; Zalzala, Ali M. S., Methods and apparatus for data analysis.
  31. Wilson,Andrew W., Methods for congestion mitigation in infiniband.
  32. Thompson, Erskine, Methods for monitoring computer resources using a first and second matrix, and a feature relationship tree.
  33. Washburn, Brian John; Farrell, Brian Paul, Metric transport and database load.
  34. O'Brien, Eric David; Tryon, Jr., James Robert, Modular framework for dynamically processing network events using action sets in a distributed computing environment.
  35. Hurst, Ryan M.; Manaktala, Ekta H.; Mayfield, Paul G.; Kamath, Vivek P., Network access protection.
  36. Meng, Zhuo; Duan, Baofu; Pao, Yoh-Han; Cass, Ronald J, Processing mixed numeric and symbolic data encodings using scaling at one distance of at least one dimension, clustering, and a signpost transformation.
  37. Beck, Ralph L.; Romanchuk, Michael Walter, Software instrumentation method and apparatus.
  38. Mermoud, Grégory; Savalle, Pierre-André; Vasseur, Jean-Philippe; Mota, Javier Cruz, Sparse coding of hidden states for explanatory purposes.
  39. Renner, Peter, State monitoring of machines and technical installations.
  40. Rockwood, Troy Dean, System and method for active data collection in a network security system.
  41. Young, Alan, System and method for analyzing business events.
  42. Brown, Mike, System and method for analyzing network software application changes.
  43. Rockwood, Troy Dean, System and method for attacker attribution in a network security system.
  44. Young,Alan, System and method for identifying and generating business events.
  45. Rockwood, Troy Dean, System and method for interactive correlation rule design in a network security system.
  46. Naedele, Martin; Frei, Christian; Sager, Patrick; Fay, Alexander, System and method for suppressing redundant alarms.
  47. McGee,John; Earley,John Michael; Matthews,James W., System and methods for adaptive threshold determination for performance metrics.
  48. McGee,John J.; Courtemanche,Michael B.; Beck,Ralph L., System and methods for display of time-series data distribution.
  49. Lewis, Elliot D.; Berk, Hakan; Gidwani, Narendra C.; Johansson, Jesper M.; Moore, Timothy M.; Palekar, Ashwin; Choe, Calvin C., System and methods for providing network quarantine.
  50. Breese,Stephen S.; Olsson,Stig Arne; Vijayan,Geetha, System for correlating events generated by application and component probes when performance problems are identified.
  51. Thompson, Erskine, Systems for monitoring computer resources.
  52. Yang,Qian; Garofalo,Charles; Gupta,Yogesh; Cass,Ronald; Wilson,Kirk; Sedukhin,Igor, Using neural networks for data mining.
  53. Pao, Yoh-Han; Meng, Zhuo; Duan, Baofu, Viewing multi-dimensional data through hierarchical visualization.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로