scispace - formally typeset
A

Arif Ghafoor

Researcher at Purdue University

Publications -  264
Citations -  8222

Arif Ghafoor is an academic researcher from Purdue University. The author has contributed to research in topics: Access control & Role-based access control. The author has an hindex of 44, co-authored 263 publications receiving 8067 citations. Previous affiliations of Arif Ghafoor include United States Department of the Army & University College West.

Papers
More filters
Proceedings ArticleDOI

Design of multimedia Web server using a neuro-fuzzy framework

TL;DR: The proposed neuro-fuzzy scheduler (NFS) makes an intelligent compromise among multicriteria by properly combining some scheduling heuristics and can dynamically adjust to the varying work-load quite well.
Proceedings ArticleDOI

Real time resource allocation for multimedia object communication

TL;DR: A dynamic bandwidth management scheme for asynchronous LANs that uses the concept of time division multiple access (TDMA) to ensure quality of service (QoS) for multimedia applications and a framework for graceful degradation of play-out quality of multimedia objects is proposed.

Knowledge for Biological

TL;DR: A multilayered architecture and spatiotemporal models for searching, retrieving, and analyzing highthroughput biological imaging data are presented.
Proceedings ArticleDOI

Ensuring quality of service for multimedia applications in a LAN environment

TL;DR: Experimental results reveal that the performance of the proposed scheme is substantially better than that of the random access mechanism, and transmission rates for multimedia hosts are improved significantly with low jitter variations in media streams.
Posted Content

PRISM: A Hierarchical Intrusion Detection Architecture for Large-Scale Cyber Networks

TL;DR: In this article, the authors present a hierarchical intrusion detection architecture that uses a novel attacker behavior model-based sampling technique to minimize the real-time traffic processing overhead, which can detect complex multi-stage attacks in realtime by processing the immense amount of traffic produced by present-day networks.