<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1870-9044</journal-id>
<journal-title><![CDATA[Polibits]]></journal-title>
<abbrev-journal-title><![CDATA[Polibits]]></abbrev-journal-title>
<issn>1870-9044</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Innovación y Desarrollo Tecnológico en Cómputo]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1870-90442010000100010</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Predicción de Fallos en Redes IP empleando Redes Neuronales Artificiales]]></article-title>
<article-title xml:lang="en"><![CDATA[Prediction of Failures in IP Networks using Artificial Neural Networks]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[García]]></surname>
<given-names><![CDATA[Gustavo A.]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Salcedo]]></surname>
<given-names><![CDATA[Octavio]]></given-names>
</name>
<xref ref-type="aff" rid="A02"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,Universidad Central  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Colombia</country>
</aff>
<aff id="A02">
<institution><![CDATA[,Universidad Distrital Francisco José de Caldas  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Colombia</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>06</month>
<year>2010</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>06</month>
<year>2010</year>
</pub-date>
<numero>41</numero>
<fpage>67</fpage>
<lpage>73</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1870-90442010000100010&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1870-90442010000100010&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1870-90442010000100010&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[El presente artículo describe la implementación de un sistema de predicción de fallos en redes LAN (fallos de timeout y rechazo en las conexiones), utilizando redes neuronales artificiales Perceptrón Multicapa. Se describe como se implementó el sistema, las pruebas realizadas para la selección de los parámetros propios de la red neuronal, como del algoritmo de entrenamiento y los resultados de evaluación obtenidos.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[The paper presents the implementation of a system for predicting failures in LAN (timeout failure and rejection of connections), using neural networks (multilayer perceptron). It describes the implementation of the system, experiments conducted for the selection of specific parameters of the neural network, training algorithm and evaluation results.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[Predicción de fallos]]></kwd>
<kwd lng="es"><![CDATA[MIB]]></kwd>
<kwd lng="es"><![CDATA[red neuronal artificial]]></kwd>
<kwd lng="es"><![CDATA[perceptrón multicapa]]></kwd>
<kwd lng="es"><![CDATA[backpropagation]]></kwd>
<kwd lng="en"><![CDATA[Prediction of failures]]></kwd>
<kwd lng="en"><![CDATA[MIB]]></kwd>
<kwd lng="en"><![CDATA[Artificial Neural Networks]]></kwd>
<kwd lng="en"><![CDATA[multilayer perceptron]]></kwd>
<kwd lng="en"><![CDATA[backpropagation]]></kwd>
</kwd-group>
</article-meta>
</front><body><![CDATA[ <p align="justify"><font face="verdana" size="4">Regular papers </font></p>     <p align="justify"><font face="verdana" size="4">&nbsp;</font></p>     <p align="center"><font face="verdana" size="4"><b>Predicci&oacute;n de Fallos en Redes IP empleando Redes Neuronales Artificiales</b></font></p>     <p align="center"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="3"><b>Prediction of Failures in IP Networks using Artificial Neural Networks</b></font></p>     <p align="center"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="2"><b>Gustavo A. Garc&iacute;a<sup>1</sup> y Octavio Salcedo<sup>2</sup></b></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><i><sup>1</sup> Universidad Central, Bogot&aacute; D.C., Colombia y candidato a Mag&iacute;ster en Ciencias de la informaci&oacute;n y las comunicaciones de la Universidad Distrital Francisco Jos&eacute; de Caldas, Colombia (e&#150;mail:</i> <a href="mailto:gustavoandresg@gmail.com">gustavoandresg@gmail.com</a><i>).</i></font></p>     <p align="justify"><font face="verdana" size="2"><i><sup>2</sup> Universidad Distrital Francisco Jos&eacute; de Caldas, Bogot&aacute; D.C, Colombia y candidato a PhD en ingenier&iacute;a Inform&aacute;tica Universidad&nbsp;de&nbsp;Salamanca,&nbsp;Colombia (e&#150;mail: </i><a href="mailto:octavionetworking@gmail.com">octavionetworking@gmail.com</a><i>).</i></font></p>     ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2">Manuscripto recibido el 23 de enero de 2010.     <br> Manuscrito aceptado para su publciaci&oacute;n el 31 de mayo de 2010.</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Resumen</b></font></p>     <p align="justify"><font face="verdana" size="2">El presente art&iacute;culo describe la implementaci&oacute;n de un sistema de predicci&oacute;n de fallos en redes LAN (fallos de timeout y rechazo en las conexiones), utilizando redes neuronales artificiales Perceptr&oacute;n Multicapa. Se describe como se implement&oacute; el sistema, las pruebas realizadas para la selecci&oacute;n de los par&aacute;metros propios de la red neuronal, como del algoritmo de entrenamiento y los resultados de evaluaci&oacute;n obtenidos.</font></p>     <p align="justify"><font face="verdana" size="2"><b>Palabras clave:</b> Predicci&oacute;n de fallos, MIB, red neuronal artificial, perceptr&oacute;n multicapa, backpropagation.</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Abstract</b></font></p>     <p align="justify"><font face="verdana" size="2">The paper presents the implementation of a system for predicting failures in LAN (timeout failure and rejection of connections), using neural networks (multilayer perceptron). It describes the implementation of the system, experiments conducted for the selection of specific parameters of the neural network, training algorithm and evaluation results.</font></p>     ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2"><b>Key words: </b> Prediction of failures, MIB, Artificial Neural Networks, multilayer perceptron, backpropagation.</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><a href="/pdf/poli/n41/n41a10.pdf" target="_blank">DESCARGAR ART&Iacute;CULO EN FORMATO PDF</a></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>REFERENCIAS</b></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;1&#93; J. R. Hilera y V. J. Mart&iacute;nez, <i>Redes Neuronales Artificiales, </i>Alfaomega, 2000.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6043209&pid=S1870-9044201000010001000001&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;2&#93; G. Box, G. M. Jenkins, and G. Reinsel, <i>Time Series Analysis, </i><i>Forecasting and Control, </i>Holden Day Series, 1976.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6043211&pid=S1870-9044201000010001000002&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;3&#93; J. G. Proakis y D. G. Manolakis, <i>Tratamiento Digital de Se&ntilde;ales, </i>Pretince&#150;Hall, 1998.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6043213&pid=S1870-9044201000010001000003&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;4&#93; Yen&#150;Chieh Ouyang and Li&#150;Bin Yeh, "Predictive bandwidth control for mpeg video: A wavelet approach for self&#150;similar parameters estimation," in <i>IEEE International Conference on Communications ICC 2001, </i>vol. 5, 2001, pp. 1551&#150;1555.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6043215&pid=S1870-9044201000010001000004&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;5&#93; M. Thottan and C. Ji, "Fault prediction at the network layer using intelligent agents," in <i>IFIP/IEEE Eighth International Symposium on Integrated Network Management, </i>2003, pp. 745&#150;759.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6043217&pid=S1870-9044201000010001000005&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;6&#93; R. W. Lucky, "Automatic equalization for digital communication," <i>Bell Syst. Tech. </i>J., vol. 44, no. 4, pp. 547&#150;588, Apr. 1965.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6043219&pid=S1870-9044201000010001000006&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;7&#93; N. Frangiadakis, M. Kyriakakos and L. Merakos, "Enhanced path prediction for network resources management in wireless LANs," <i>IEEE wireless communications, </i>pp.62&#150;69, 2003.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6043221&pid=S1870-9044201000010001000007&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;8&#93; San Qi Li and Chia Lin Hwang, "On the convergence of traffic measurement and queuing analysis: a statistical&#150;matching and queuing (SMAQ) tool," <i>IEEE/ACM Transactions on Networking, </i>vol. 5, no. 1, 1997, pp. 95&#150;110.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6043223&pid=S1870-9044201000010001000008&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;9&#93; G. R. Faulhaber, "Design of service systems with priority reservation," in <i>Conf. Rec. IEEE Int. Conf. Communications, </i>1995, pp. 3&#150;8.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6043225&pid=S1870-9044201000010001000009&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;10&#93; Aimin Sang and San&#150;Qi Li, "A predictability analysis of network traffic," in <i>IEEE INFOCOM, </i>2000.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6043227&pid=S1870-9044201000010001000010&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;11&#93; W. D. Doyle, "Magnetization reversal in films with biaxial anisotropy," in <i>Proc. INTERMAG Conf., </i>1987, pp. 2.2&#150;1&#150;2.2&#150;6.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6043229&pid=S1870-9044201000010001000011&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;12&#93; Ziming Zhang and Song Fu, "Failure prediction for automatic Management of networked computer systems with availability assurance," in <i>15th IEEE Workshop on Dependable Parallel, Distributed and Network&#150;Centric Systems, </i>2010.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6043231&pid=S1870-9044201000010001000012&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;13&#93; Y. Liang, Y. Zhang, A. Sivasubramaniam. M. Jette, and R. K. Shahoo, "BlueGene/L failure analisys and prediction models," in <i>Proceedings of </i>international conference on dependable Systems and networks (DSN), 2006.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6043233&pid=S1870-9044201000010001000013&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;14&#93; R. K. Sahoo, A. J. Oliner, and I. Rish, "Critical event prediction for proactive management in large&#150;scale computer clusters," in <i>Proceedings of ACM International Conference on Knowledge Discovery and Data </i><i>Dining (SIGKDD), </i>August 2003.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6043235&pid=S1870-9044201000010001000014&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;15&#93; L. Wu, D. Meng, W. Gao, and J. Zhan, "A proactive fault&#150;detection mechanism in large&#150;scale cluster systems," in <i>Proceedings of IEEE International Parallel and Distributed Processing Symposium (IPDPS), </i>2006.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6043237&pid=S1870-9044201000010001000015&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;16&#93; S. Haykin, <i>Neural Networks for pattern recognition, </i>Oxford University Press Inc.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6043239&pid=S1870-9044201000010001000016&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;17&#93; N. Frangiadakis, M. Kyriakakos, and L. Merakos, "Enhanced path prediction for network resources management in wireless lans," <i>IEEE wireless communications, </i>pp. 62&#150;69. 2003.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6043241&pid=S1870-9044201000010001000017&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>      ]]></body><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hilera]]></surname>
<given-names><![CDATA[J. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Martínez]]></surname>
<given-names><![CDATA[V. J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Redes Neuronales Artificiales]]></source>
<year>2000</year>
<publisher-name><![CDATA[Alfaomega]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Box]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Jenkins]]></surname>
<given-names><![CDATA[G. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Reinsel]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[Time Series Analysis, Forecasting and Control]]></source>
<year>1976</year>
<publisher-name><![CDATA[Holden Day Series]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Proakis]]></surname>
<given-names><![CDATA[J. G.]]></given-names>
</name>
<name>
<surname><![CDATA[Manolakis]]></surname>
<given-names><![CDATA[D. G.]]></given-names>
</name>
</person-group>
<source><![CDATA[Tratamiento Digital de Señales]]></source>
<year>1998</year>
<publisher-name><![CDATA[Pretince-Hall]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ouyang]]></surname>
<given-names><![CDATA[Yen-Chieh]]></given-names>
</name>
<name>
<surname><![CDATA[Yeh]]></surname>
<given-names><![CDATA[Li-Bin]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Predictive bandwidth control for mpeg video: A wavelet approach for self-similar parameters estimation]]></article-title>
<source><![CDATA[IEEE International Conference on Communications ICC 2001]]></source>
<year>2001</year>
<volume>5</volume>
<page-range>1551-1555</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Thottan]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Ji]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Fault prediction at the network layer using intelligent agents]]></article-title>
<source><![CDATA[IFIP/IEEE Eighth International Symposium on Integrated Network Management]]></source>
<year>2003</year>
<page-range>745-759</page-range></nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lucky]]></surname>
<given-names><![CDATA[R. W.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Automatic equalization for digital communication]]></article-title>
<source><![CDATA[Bell Syst. Tech. J.]]></source>
<year>Apr.</year>
<month> 1</month>
<day>96</day>
<volume>44</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>547-588</page-range></nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Frangiadakis]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Kyriakakos]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Merakos]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Enhanced path prediction for network resources management in wireless LANs]]></article-title>
<source><![CDATA[IEEE wireless communications]]></source>
<year>2003</year>
<page-range>62-69</page-range></nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[San Qi]]></given-names>
</name>
<name>
<surname><![CDATA[Hwang]]></surname>
<given-names><![CDATA[Chia Lin]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[On the convergence of traffic measurement and queuing analysis: a statistical-matching and queuing (SMAQ) tool]]></article-title>
<source><![CDATA[IEEE/ACM Transactions on Networking]]></source>
<year>1997</year>
<volume>5</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>95-110</page-range></nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Faulhaber]]></surname>
<given-names><![CDATA[G. R.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Design of service systems with priority reservation]]></article-title>
<source><![CDATA[Conf. Rec. IEEE Int. Conf. Communications]]></source>
<year>1995</year>
<page-range>3-8</page-range></nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sang]]></surname>
<given-names><![CDATA[Aimin]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[San-Qi]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A predictability analysis of network traffic]]></article-title>
<source><![CDATA[IEEE INFOCOM]]></source>
<year>2000</year>
</nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Doyle]]></surname>
<given-names><![CDATA[W. D.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Magnetization reversal in films with biaxial anisotropy]]></article-title>
<source><![CDATA[Proc. INTERMAG Conf.]]></source>
<year>1987</year>
<page-range>2.2-1-2.2-6</page-range></nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[Ziming]]></given-names>
</name>
<name>
<surname><![CDATA[Fu]]></surname>
<given-names><![CDATA[Song]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Failure prediction for automatic Management of networked computer systems with availability assurance]]></article-title>
<source><![CDATA[15th IEEE Workshop on Dependable Parallel, Distributed and Network-Centric Systems]]></source>
<year>2010</year>
</nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Liang]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Sivasubramaniam]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Jette]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Shahoo]]></surname>
<given-names><![CDATA[R. K.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[BlueGene/L failure analisys and prediction models]]></article-title>
<source><![CDATA[Proceedings of international conference on dependable Systems and networks (DSN)]]></source>
<year>2006</year>
</nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sahoo]]></surname>
<given-names><![CDATA[R. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Oliner]]></surname>
<given-names><![CDATA[A. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Rish]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Critical event prediction for proactive management in large-scale computer clusters]]></article-title>
<source><![CDATA[Proceedings of ACM International Conference on Knowledge Discovery and Data Dining (SIGKDD)]]></source>
<year>Augu</year>
<month>st</month>
<day> 2</day>
</nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Meng]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Gao]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhan]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A proactive fault-detection mechanism in large-scale cluster systems]]></article-title>
<source><![CDATA[Proceedings of IEEE International Parallel and Distributed Processing Symposium (IPDPS)]]></source>
<year>2006</year>
</nlm-citation>
</ref>
<ref id="B16">
<label>16</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Haykin]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Neural Networks for pattern recognition]]></source>
<year></year>
<publisher-name><![CDATA[Oxford University Press Inc]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<label>17</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Frangiadakis]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Kyriakakos]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Merakos]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Enhanced path prediction for network resources management in wireless lans]]></article-title>
<source><![CDATA[IEEE wireless communications]]></source>
<year></year>
<page-range>62-69</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
