Search Results - "Longe, H.O.D."

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    Visualizing Concurrency Control Algorithms for Real-Time Database Systems by Folorunso, Olusegun, Longe, H.O.D., Akinwale, Adio T.

    Published in Data science journal (01-01-2008)
    “…This paper describes an approach to visualizing concurrency control (CC) algorithms for real-time database systems (RTDBs). This approach is based on the…”
    Get full text
    Journal Article
  2. 2

    An improved two-tiered strategy to intrusion detection by Sodiya, A.S, Longe, H.O.D

    Published in Information management & computer security (01-07-2005)
    “…Purpose - A work that combined strategies in designing anomaly-based instruction detection system (IDS) was described in CSIDS. This new work seeks to improve…”
    Get full text
    Journal Article
  3. 3

    A new two-tiered strategy to intrusion detection by Sodiya, A.S, Longe, H.O.D, Akinwale, A.T

    “…Researchers have used many techniques in designing intrusion detection systems (IDS) and yet we still do not have an effective IDS. The interest in this work…”
    Get full text
    Journal Article
  4. 4

    Maintaining privacy in anomaly-based intrusion detection systems by Sodiya, A.S, Longe, H.O.D, Akinwale, A.T

    “…Purpose - The goal of our work is to discuss the fundamental issues of privacy and anomaly-based intrusion detection systems (IDS) and to design an efficient…”
    Get full text
    Journal Article
  5. 5
  6. 6

    Supply chain optimization towards personalizing web services by Alade Rahman, M., Ahmad, H.F., Suguri, H., Sadik, S., Longe, H.O.D., Ojo, A.K.

    “…Personalization, which has the ultimate goal of satisfying userpsilas requests, can be perceived in terms of QoS measurement. As one of the means for the…”
    Get full text
    Conference Proceeding
  7. 7

    An improved twotiered strategy to intrusion detection by Sodiya, A.S., Longe, H.O.D.

    Published in Information management & computer security (01-07-2005)
    “…Purpose A work that combined strategies in designing anomalybased instruction detection system IDS was described in CSIDS. This new work seeks to improve on…”
    Get full text
    Journal Article
  8. 8

    Maintaining privacy in anomalybased intrusion detection systems by Sodiya, A.S., Longe, H.O.D., Akinwale, A.T.

    Published in Information management & computer security (01-02-2005)
    “…Purpose The goal of our work is to discuss the fundamental issues of privacy and anomalybased intrusion detection systems IDS and to design an efficient…”
    Get full text
    Journal Article
  9. 9

    A new twotiered strategy to intrusion detection by Sodiya, A.S., Longe, H.O.D., Akinwale, A.T.

    Published in Information management & computer security (01-02-2004)
    “…Researchers have used many techniques in designing intrusion detection systems IDS and yet we still do not have an effective IDS. The interest in this work is…”
    Get full text
    Journal Article
  10. 10

    Supply Chain Model for Personalized Car Web Services Discovery by Rahman, M.A., Longe, H.O.D., Nawaz, F., Ahmad, H.F.

    “…The XML standard adopted for the interoperability among Web services had played prominent role in enhancing systems/application integration and also…”
    Get full text
    Conference Proceeding