Claim Your Author Page
Ensure your research is discoverable on Semantic Scholar. Claiming your author page allows you to personalize the information displayed and manage your publications. Semantic Scholar automatically creates author pages based on data aggregated from public sources and our publisher partners.
Logs generated by operating systems and application programs provide important information to a network administrator. Logs are used for various purposes including security management, audit, and… Expand
In this paper, the Stochastic Schemata Exploiter (SSE) is evaluated by seven test problems. The results indicate that the convergence property of the SSE is better than that of the simple genetic… Expand
In the traditional network management architecture, there is an implicit assumption that a managed device will not change its location. Location related information where available is static, and it… Expand
For conventional network management it is implicitly assumed that the managed object will not change its location. So only the static information is available, which is used for simple reporting. The… Expand
This paper describes the extended Stochastic Schemata Exploiter (ESSE), which has the improved algorithm of the Stochastic Schemata Exploiter (SSE). The algorithm of the ESSE is composed of the… Expand