Network Monitoring with Constraint Programming: Preliminary Specification and Analysis
暂无分享,去创建一个
[1] Philippe Codognet,et al. Parallel local search for solving Constraint Problems on the Cell Broadband Engine (Preliminary Results) , 2009, LSCS.
[2] Wolfgang Barth,et al. Nagios: System and Network Monitoring , 2006 .
[3] James C. Foster,et al. Intrusion Detection Systems , 2004 .
[4] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[5] Krzysztof R. Apt,et al. Principles of constraint programming , 2003 .
[6] Mark Wallace,et al. Principles and Practice of Constraint Programming – CP 2004 , 2004, Lecture Notes in Computer Science.
[7] Peter J. Stuckey,et al. Speeding Up Constraint Propagation , 2004, CP.
[8] H. Peter Hofstee,et al. Introduction to the Cell multiprocessor , 2005, IBM J. Res. Dev..
[9] Christian Schulte,et al. Programming Constraint Services , 2002, Lecture Notes in Computer Science.
[10] Arie van Deursen,et al. Domain-specific languages: an annotated bibliography , 2000, SIGP.
[11] Philippe Codognet,et al. Yet Another Local Search Method for Constraint Solving , 2001, SAGA.
[12] Toby Walsh,et al. Handbook of Constraint Programming , 2006, Handbook of Constraint Programming.
[13] Philippe Codognet,et al. Design and Implementation of the GNU Prolog System , 2001, J. Funct. Log. Program..
[14] Jay Beale,et al. Snort 2.1 Intrusion Detection, Second Edition , 2004 .
[15] Bart Demoen,et al. Heap Memory Management in Prolog with Tabling: Principles and Practice , 2001, J. Funct. Log. Program..
[16] Mats Carlsson,et al. An Open-Ended Finite Domain Constraint Solver , 1997, PLILP.
[17] Kathleen Steinhöfel,et al. Stochastic Algorithms: Foundations and Applications , 2001, Lecture Notes in Computer Science.
[18] Richard C. Harlan. Network management with Nagios , 2003 .
[19] Christian Schulte. Programming Constraint Services: High-Level Programming of Standard and New Constraint Services , 2002 .