Jide Odubiyi

Jide Odubiyi
SEGMA, LLC · Technology

MSME, PhD.

About

17
Publications
1,546
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
75
Citations

Publications

Publications (17)
Article
In this article, we discuss LUCID, a visualization and broadcast system targeted to improving a spectator's ability to understand and make sense of cyber defense competitions. The system aims to engage the spectator by presenting information pertinent to understanding the real-time events of the competition as they unfold. It accomplishes this thro...
Conference Paper
Full-text available
Software security engineering is generally an after thought and software engineering approaches often do not provide convenient methods for securing the software without considerable reengineering. In this paper we analyze an IEEE FIPA compliant multi agent system. We examine the security vulnerabilities of such a system and describe how the featur...
Conference Paper
Collaborative communities of grid-aware intelligent agents (COGENCY) is an environment under development for disseminating information from sensor webs. COGENCY is an environment with semi-autonomous, proactive, and collaborative software entities that can represent human actions, and adapt to changing environments. It will provide domain specialis...
Conference Paper
Consider a model developed by a multi-disciplinary team of scientists. This model will be used by researchers to support some scientific investigation. However, this investigation might be hampered if the researcher needs to interface (on the fly) with the members of the inter-disciplinary team responsible for the development of the model. The situ...
Article
Geodynamo simulation is very expensive computationally, a single numerical test could require several days of computing time on a mid-level PC clusters. More computing resource is required if higher resolutions are used in numerical modeling. In geomagnetic data assimilation, an ensemble of such tests is needed for our studies, thus is difficult to...
Conference Paper
Full-text available
In this paper we introduce the concept of a context as a tool for adaptive control in autonomous systems. We provide a mechanism to represent the context information, and apply it to devise a practical methodology to prioritize the operations in an autonomous system. We illustrate the methodology using an intrusion management system and an autonomo...
Article
Large-scale numerical simulation has been one of the most important approaches for understanding global geodynamical processes. In this approach, peta-scale floating point operations (pflops) are often required to carry out a single physically-meaningful numerical experiment. For example, to model convective flow in the Earth's core and generation...
Chapter
Chapter twenty presents a prototype multi-agent system called Victor which is aimed at assessing and predicting faults in network elements that affect global virtual connections (VCs) with ATM, frame relay and IP service configurations. Victor relies on distributed and collaborative intelligent processing agents to associate, correlate and combine...
Conference Paper
Full-text available
The information access and retrieval capabilities provided by several conventional search engines, while improving upon traditional techniques, are lacking in supporting conceptual information retrieval capabilities, natural language input, and individual user preferences. This paper presents SAIRE - a Scalable Agent-based Information Retrieval Eng...
Article
This report presents the results of our research on Earth-Mars Telecommunications and Information Management System (TIMS) network modeling and unattended network operations. The primary focus of our research is to investigate the feasibility of the TIMS architecture, which links the Earth-based Mars Operations Control Center, Science Data Processi...
Article
The necessary network management functions for a telecommunications, navigation and information management (TNIM) system in the framework of an extension of the ISO model for communications network management are described. Various technologies that could substantially reduce the need for TNIM network management, automate manpower intensive functio...
Article
The results are summarized of an unattended network operations technology assessment study for the Space Exploration Initiative (SEI). The scope of the work included: (1) identified possible enhancements due to the proposed Mars communications network; (2) identified network operations on Mars; (3) performed a technology assessment of possible supp...
Article
Full-text available
This paper describes a heuristic approach to incremental and reactive scheduling. Incremental scheduling is the process of modifying an existing schedule if the initial schedule does not meet its stated initial goals. Modifications made to a schedule during incremental scheduling typically consist of adding one or more activities by rescheduling ex...
Article
Full-text available
This paper presents a framework for enhancing student learning about the vulnerabilities of information assets of a business enterprise using attack tree modeling. Using this framework, students get an overview of the methodology as well as learn how to implement it with a well-known list of information security vulnerabilities. As a result, studen...

Network

Cited By

Projects

Project (1)
Archived project