Search Results - "Longe, H.O.D."
-
1
Visualizing Concurrency Control Algorithms for Real-Time Database Systems
Published in Data science journal (01-01-2008)“…This paper describes an approach to visualizing concurrency control (CC) algorithms for real-time database systems (RTDBs). This approach is based on the…”
Get full text
Journal Article -
2
An improved two-tiered strategy to intrusion detection
Published in Information management & computer security (01-07-2005)“…Purpose - A work that combined strategies in designing anomaly-based instruction detection system (IDS) was described in CSIDS. This new work seeks to improve…”
Get full text
Journal Article -
3
A new two-tiered strategy to intrusion detection
Published in Information management & computer security (2004)“…Researchers have used many techniques in designing intrusion detection systems (IDS) and yet we still do not have an effective IDS. The interest in this work…”
Get full text
Journal Article -
4
Maintaining privacy in anomaly-based intrusion detection systems
Published in Information management & computer security (2005)“…Purpose - The goal of our work is to discuss the fundamental issues of privacy and anomaly-based intrusion detection systems (IDS) and to design an efficient…”
Get full text
Journal Article -
5
A Framework for Encrypting the Huffman Algorithm
Published in Journal of applied sciences (Asian Network for Scientific Information) (01-05-2006)Get full text
Journal Article -
6
Supply chain optimization towards personalizing web services
Published in 2008 4th International IEEE Conference Intelligent Systems (01-09-2008)“…Personalization, which has the ultimate goal of satisfying userpsilas requests, can be perceived in terms of QoS measurement. As one of the means for the…”
Get full text
Conference Proceeding -
7
An improved twotiered strategy to intrusion detection
Published in Information management & computer security (01-07-2005)“…Purpose A work that combined strategies in designing anomalybased instruction detection system IDS was described in CSIDS. This new work seeks to improve on…”
Get full text
Journal Article -
8
Maintaining privacy in anomalybased intrusion detection systems
Published in Information management & computer security (01-02-2005)“…Purpose The goal of our work is to discuss the fundamental issues of privacy and anomalybased intrusion detection systems IDS and to design an efficient…”
Get full text
Journal Article -
9
A new twotiered strategy to intrusion detection
Published in Information management & computer security (01-02-2004)“…Researchers have used many techniques in designing intrusion detection systems IDS and yet we still do not have an effective IDS. The interest in this work is…”
Get full text
Journal Article -
10
Supply Chain Model for Personalized Car Web Services Discovery
Published in 2009 Third Asia International Conference on Modelling & Simulation (01-05-2009)“…The XML standard adopted for the interoperability among Web services had played prominent role in enhancing systems/application integration and also…”
Get full text
Conference Proceeding