4 IEEE (PCI 2011) th Panhellenic Conference. Kastoria, Greece. 2 October September. on Informatics. Angelos Michalas.
|
|
- Gervase Gray
- 8 years ago
- Views:
Transcription
1 201115th Panhellenic Conference on Informatics (PCI 2011) Kastoria, Greece 30 September 2 October 2011 Editors: Pantelis Angelidis Angelos Michalas 4 IEEE IEEE Catalog Number: CFP1163EPRT ISBN:
2 2011 Panhellenic Conference on Informatics PCI 2011 Table of Contents Message from General Cochairs Message from Program Cochairs Organizing Committee Program Committee Local Organizing Committee Keynote Speakers xii xiii xiv xv xvii xviii Information Systems Towards an Integrated Teaching Environment for Parallel Programming 3 Constantinos T. Delistavrou and Konstantinos G. Margaritis Teaching Software Project Management through Management Antipatterns 8 loannis Stamelos, Dimitrios Sottas, and Despoina Mallini MentorChat: Introducing a Configurable Conversational Agent as a Tool for Adaptive Online Collaboration Support 13 Stergios Tegos, Stavros Demetriadis, and Anastasios Karakostas Using an Automated Speech Emotion Recognition Technique to Explore the Impact of Bullying on Pupils Social Life 18 Theodoros lliou and Georgios Paschalidis Evaluation of Four, Free and Open Source DICOM Software Tools 23 O. Papadopoulou Academic Research PolicyMaking and Evaluation Using Graph Visualisation 28 Tsolakidis Anastasios, Cleo Sgouropoulou, loannis Xydas, Olivier Terraz, and Georgios Miaoulis ProMaSI A Project Management Simulator 33 Nicholaos Petalidis, Gregory Gregoriadis, Alexandros Theodoridis, and Antonios Chronakis V
3 An Databases and Data Mining The Effects of Dimensionality Curse in High Dimensional knn Search 41 Nikolaos Kouiroukidis and Georgios Evangelidis Data Node Splitting Policies for Improved Range Query Efficiency in kdimensional Point Data Indexes 46 Evangelos Outsios and Georgios Evangelidis Nearest Neighbor Algorithms Using xbrtrees 51 George Roumelis, Michael Vassilakopoulos, and Antonio Corral Incremental Discovery of Topk Correlative Subgraphs 5f5 Georgia S. Latsiou and Apostolos N. Papadopoulos Education Technologies Virtual Learning Environments Katerina Georgouli Overview 63 A Hacker's Perspective on Educating Future Security Experts 68 Alexandros Papanikolaou, Vassilios Karakoidas, Vasileios Vlachos, Andreas Venieris, Christos llioudis, and Georgios Zouganelis Pilot Introduction of IWB and COWs in Greek Schools 73 F. Foskolos, A. Vagelatos, and Th. Komninos Exploiting Web Conferencing to Support Collaborative Learning 78 Apostolos Mavridis, Thrasyvoulos Tsiatsos, and Stergios Tegos Algorithms and Data Structures A Performance Evaluation of the Preprocessing Phase of Multiple Keyword Matching Algorithms 85 Charalampos S. Kouzinopoulos and Konstantinos G. Margaritis Splaying for Compression: An Experimental Study 90 Dlmitris Antoniou, loannis Kampouris, Evangelos Theodoridis, and Athanasios Tsakalidis A Framework for Linked Data Business Models 95 Michalis Vafopoulos Dynamic Dominators in Practice 100 Konstantinos Patakakis, Loukas Georgiadis, and Vasileios A. Tatsis vi
4 Networking Applying Categorical Logic on a Holistic Security Architecture across Distributed Systems 107 Dirnitrios Sisiaridis and Nick Rossiter RealLife Paradigms of Wireless Network Security Attacks 112 I.P. Mavridis, A.l. E. Androulakis, A.B. Halkias, and Ph. Mylonas Collaborative Efforts for Safety and Security in Vehicular Communication Networks 117 George Kadas and Periklis Chatzimisios An Experimental Study of the Efficiency of Explicit Congestion Notification 122 Stefanos Harhalakis, Nikolaos Samaras, and Vasileios Vitsas Supporting Service Differentiation in Wireless Sensor Networks 127 MarieAurelie Nef, Sophia Karagiorgou, George I. and Panayotis K. Kikiras Stamoulis, Handling Multicast Video over Non Multicast Networks 134 Michail Tolkas, Michail Bletsas, and Pantelis Angelidis On Effectively Determining the DownlinktoUplink Subframe Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation 139 Panagiotis Sarigiannidis, Malamati Louta, andangelos Michalas Optimal Tradeoff between Energy Consumption and Response Time in LargeScale MapReduce Clusters 144 Pavlos Paraskevopoulos and Anastasios Gounaris A Novel Probabilistic Flooding Strategy for Unstructured PeertoPeer Networks 149 Spiridoula V. Margariti and Vassilios V. Dimakopoulos An Automated System for Integrated Service Management in Emergency Situations 154 Nikolaos A. Pantazis, Stefanos A. Nikolidakis, Dionisis Kandris, and Dirnitrios D. Vergados Open Source Software SFparser: A Tool for Selectively Parsing SourceForge 161 Apostolos Kritikos and Fragkiskos Chatziasimidis Towards Open Source Software System Architecture Recovery Using Design Metrics 166 Eleni Constantinou, George Kakarontzas, and loannis Stamelos vii
5 eairquality: A Dynamic Web Based Application for Evaluating the Air Quality Index for the City of Kozani, Hellas Skordas loannis, George F. Fragulis, and Athanassios G. Triantafyllou Snmp for Ethernet Networks SETH: A Network Benchmark Toolkit for Managing Routers Statistical Information S. Kontogiannis, A. Karakos, G. Kokkonis, and P. Kitsos Multimedia Services Use of Behavioral Synthesis to Implement a Cellular Neural Network for Image Processing Applications Dimitrios Amanatidis and Michael Dossis Denoising of Binarized Byzantine Textual Images N. Ntogas, D. Ventzas, and M. Ventza Subjective and Objective Video Codec Evaluation Andreas Papadakis and Konstantinos Zachos A Personalized Audio Web Service Using MPEG7 and MPEG21 Standards 199 Emmanouil Skondras, Malamati Louta, and Panagiotis Sarigiannidis eservices: Empirical Studies Teenagers' Use of Social Network Websites and Privacy Concerns: A Survey 207 Evanthia Faliagka, Athanasios Tsakalidis, and Danae Vaikousi An Empirical Study on the Web Password Strength in Greece 212 Artemios G. Voyiatzis, Christos A. Fidas, Dimitrios N. Serpanos, and Nikolaos M. Avouris Social Multimedia Mining: A Social Informatics Perspective 217 Georgios Lappas Log File Analysis of Ecommerce Systems in Rich Internet Web 2.0 Applications 222 Constantine J. Aivalis and Anthony C. Boucouvalas Information Retrieval Search Culture Nikitas N. Karanikolas 229 A Comparable Study Employing WEKA Clustering/Classification Algorithms for Web Page Classification loannis Charalampopoulos and loannis Anagnostopoulos 235 A Framework for Visualizing the Web of Data: Combining DBpedia and Open APIs Agis Papantoniou, Vassilis Loumos, Miltos Poulizos, and Gregory Rigas 240 viii
6 A Comparison over Focused Web Crawling Strategies 245 loannis Avraam and loannis Anagnostopoulos Numerical and Scientific Computations Higher Order Finite Difference Preconditioned Scheme: A Multithreaded Approach 253 C.K. FilelisPapadopoulos, G.A. Grawanis, and E.A. Lipitakis A Note on Parallel Finite Element Approximate Inverses Using OpenMP on Multicore Systems 259 P.I. Matskanidis, G.A. Grawanis, and K.M. Giannoutakis Design and Implementation of OpenMP Tasks in the OMPi Compiler 265 Spiros N. Agathos, Panagiotis E. Hadjidoukas, and Vassilios V. Dimakopoulos Elastic Component Characterization with Respect to Quality Properties: An Intuitionistic FuzzyBased Approach 270 George Kakarontzas, Vassilis C. Gerogiannis, loannis Stamelos, and Panagiotis Katsaros HumanComputer Interaction Building a PlatformAgnostic Wireless Network of Interconnected Smart Objects 277 Orestis Akribopoulos, Vasileios Georgitzikis, Anastasia Protopapa, and loannis Chatzigiannakis etracer: An Innovative NearReal Time TrackandTrace Platform 282 Efi Papatheocharous and Panagiotis Gouvas Evaluation of TipActivated and PushButton Infrared Pens for Interactive Whiteboards 287 Dimitrios Kravvaris, Eleni Thanou, and Konstantinos Chorianopoulos The Concept and Design of an Open, Integrated Print Charging System 292 Michael Kalochristianakis, Kostas Grammatikakis, Manolis Saldaris, Irene Mastorakis, and Grigoris Tzanodaskalakis ecommerce, ebusiness, egovernment, ehealth Interviewing the Amazon Web Salespersons: Trends, Complementarities and Competition 299 Michalis Vafopoulos, Thomas Theodoridis, and Dimitris Kontokostas Promoting egov Services: edocument Interoperability across EU 304 Andreas Papadakis, Konstantinos Rantos, and Antonis Stasis ix
7 The The Military Model in I.T. and Computer Studies: A Violation against Women's Rights in Work and Education 309 Dionisis Georgopoulos Information Systems and Innovation in Investigation Greek Firms An Empirical Spyros Arvanitis, Euripidis Loukis, and Vasiliki Diamantopoulou 315 Seismicity Online Grid Map for Regional Earthquake Activity Studies 321 Athanasios Keskempes, Anthony Roussos, Nikos Tselikas, and Anthony C. Boucouvalas Special Session: Mobile Device Software Development A Mobile Application Supporting Conference Attendees and Organizers 333 Chris D. Kounavis, Efpraxia D. Zamani, and George M. Giaglis Education and Learning in the Semantic Web 338 Anna Kasimati and Efpraxia Zamani Implementing an Open Personal Learning Environment 345 Alexandres Soumplis, Eleni Chatzidaki, Eleni Koulocheri, and Michalis Xenos Special Session: Quality in Educational Technologies Analyzing the Fora: An Algorithms Combination for the Representation of Messages 353 Kiriakos Patriarcheas, Spyridon Papaloukas, and Michalis Xenos A Combined Algorithm for LMS Usage Assessment 358 Stavros Valsamidis, Sotirios Kontogiannis, Alexandros Karakos, and loannis Kazanidis Touch Your Program with Hands: Qualities in Tangible Programming Tools for Novice 363 Theodosios Sapounidis and Stavros Demetriadis Effectiveness of a Framed WikiBased Learning Activity in the Context of HCI Education 368 Nikolaos Tselios, Panagiota Altanopoulou, and Christos Katsanos Developing an Information System for Quality Assurance in Higher Education Using the Balanced Scorecard Technique Case Study of TEIA 373 Manolis Chalaris, Anastasios Tsolakidis, Cleo Sgouropoulou, and loannis Chalaris X
8 Special Session: Real World Internet Unattended Surveillance Network for AfterDisaster Support in Public Transportations Sector 381 C. Alexakos, M. Georgoudakis, A. Kalogeras, F. Andritsos, P. Konstantinopoulos, and I. Chatzigiannakis iprotect: An Open Source Emergency Management Framework 386 MarieAurelie Nef, loannis Filippopoulos, Eleftherios Voumvourakis, Aggelos Aggelis, Leonidas Perlepes, Georgios Stamoulis, and Panayotis Kikiras PatrasSense: Participatory Monitoring of Environmental Conditions in Urban Areas Using Sensor Networks and Smartphones 392 Pantelis Vikatos, Evangelos Theodoridis, Georgios Mylonas, and Athanasios Tsakalidis Wireless Sensor Network for Precision Agriculture 397 A. Tagarakis, V. Liakos, L. Perlepes, S. Fountas, and T. Gemtos Author Index 403 xi
2010 14th Panhellenic Conference on Informatics
2010 14th Panhellenic Conference on Informatics (PCI 2010) Tripoli, Greece 10 12 September 2010 IEEE Catalog Number: ISBN: CFP1063E-PRT 978-1-4244-7838-5 2010 14th Panhellenic Conference on Informatics
More informationSafety and Sustainability
Christos K. Georgiadis Hamid Jahankhani Elias Pimenidis Rabih Bashroush Ameer Al-Nemrat (Eds.) Global Security, Safety and Sustainability & e-democracy 7th International and 4th e-democracy Joint Conferences,
More informationE.T.A.N.E. - ANOIXTO DIASILOGIKO A/G, E/N, P/K
Juniors Male Black -45 (Fin) Active competitors: 4 466 Kottaras, Athanasios A.S. TAEKWONDO VASILIKOU 131 52 Nikolopoulos, Andreas A.C EKRIXI PATRWN 167 242 Koutsogiannis, Nikolaos Georg A.C. TKD AGIA PARASKEVI
More informationNETWORK SECURITY: CURRENT STATUS AND FUTURE DIRECTIONS
NETWORK SECURITY: CURRENT STATUS AND FUTURE DIRECTIONS Preface. Contributors. 1. Computer Network Security: Basic Background and Current Issues (Panayiotis Kotzanikolaou and Christos Douligeris). 1.1 Some
More informationIEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper
IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and
More informationArticles IEEE have removed from their database
Articles IEEE have removed from their database Application of Game-Theoretic and Virtual Algorithms in Information Retrieval System 2008 International Conference on MultiMedia and Information Technology
More informationContents. Dedication List of Figures List of Tables. Acknowledgments
Contents Dedication List of Figures List of Tables Foreword Preface Acknowledgments v xiii xvii xix xxi xxv Part I Concepts and Techniques 1. INTRODUCTION 3 1 The Quest for Knowledge 3 2 Problem Description
More informationlife science data mining
life science data mining - '.)'-. < } ti» (>.:>,u» c ~'editors Stephen Wong Harvard Medical School, USA Chung-Sheng Li /BM Thomas J Watson Research Center World Scientific NEW JERSEY LONDON SINGAPORE.
More informationREGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])
305 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference
More information3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India
3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India Call for Papers Cloud computing has emerged as a de facto computing
More informationUnderstanding Web personalization with Web Usage Mining and its Application: Recommender System
Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,
More informationThe Scientific Data Mining Process
Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In
More informationJAVA IEEE 2015. 6 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites Data Mining
S.NO TITLES Domains 1 Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing 2 Anonymizing Collections of Tree-Structured Data 3 Making Digital Artifacts on the Web Verifiable and
More informationDeliverable 7-1: Minutes of the kick-off meeting of the project ISWM-TINOS
ISWM-TINOS: Development and implementation of a demonstration system on Integrated Solid Waste Management for Tinos in line with the Waste Framework Directive Deliverable 7-1:Minutes of the kick-off meeting
More informationList of Projects in Application
List of Projects in Application S-Logix #9, First Floor, Krishnabai St, Habibullah Road T.Nagar, Chennai-600017 (Opp:HDFC Bank) Ph:28343467 Mobile: 8124001111, 9710999001 E-Mail: slogix.india@gmail.com
More informationPSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software
More informationHow To Get A Computer Engineering Degree
COMPUTER ENGINEERING GRADUTE PROGRAM FOR MASTER S DEGREE (With Thesis) PREPARATORY PROGRAM* COME 27 Advanced Object Oriented Programming 5 COME 21 Data Structures and Algorithms COME 22 COME 1 COME 1 COME
More informationMaster of Science in Computer Science
Master of Science in Computer Science Background/Rationale The MSCS program aims to provide both breadth and depth of knowledge in the concepts and techniques related to the theory, design, implementation,
More informationTOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
More informationDetection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup
Network Anomaly Detection A Machine Learning Perspective Dhruba Kumar Bhattacharyya Jugal Kumar KaKta»C) CRC Press J Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor
More informationKings Regional Occupational Program Course Information
Kings County Board of Education Approval May 4, 2011 California Department of Education Certification August 22, 2007 Kings Regional Occupational Program Course Information Course Title: Cisco Discovery:
More informationREGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])
299 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
More information01219211 Software Development Training Camp 1 (0-3) Prerequisite : 01204214 Program development skill enhancement camp, at least 48 person-hours.
(International Program) 01219141 Object-Oriented Modeling and Programming 3 (3-0) Object concepts, object-oriented design and analysis, object-oriented analysis relating to developing conceptual models
More informationCALL FOR PAPERS. 5th International Conference on. Renewable Energy Sources & Energy. Hilton Hotel Nicosia-Cyprus. - New Challenges
CALL FOR PAPERS & Energy Efficiency - New Challenges Under the Auspices of The Minister of Energy Commerce Industry and Tourism Hilton Hotel Nicosia-Cyprus 5-6M A Y 2016 Organised by: Communication Sponsor:
More informationDr Christos Anagnostopoulos. 1. Education. 2. Present employment. 3. Previous Appointments. Page 1 of 6
Dr Christos Anagnostopoulos 1. Education Ph.D. in Computer Science Department of Informatics & Telecommunications, National and Kapodistrian University of Athens, July 2008 Dissertation: Pervasive and
More informationProbabilistic Model Checking at Runtime for the Provisioning of Cloud Resources
Probabilistic Model Checking at Runtime for the Provisioning of Cloud Resources Athanasios Naskos, Emmanouela Stachtiari, Panagiotis Katsaros, and Anastasios Gounaris Aristotle University of Thessaloniki,
More informationto-end Packet Loss Estimation for Grid Traffic Monitoring
Passive End-to to-end Packet Loss Estimation for Grid Traffic Monitoring Antonis Papadogiannakis, Alexandros Kapravelos, Michalis Polychronakis, Evangelos P. Markatos Institute of Computer Science (ICS)
More informationAugmented Search for IT Data Analytics. New frontier in big log data analysis and application intelligence
Augmented Search for IT Data Analytics New frontier in big log data analysis and application intelligence Business white paper May 2015 IT data is a general name to log data, IT metrics, application data,
More informationData Mining: Concepts and Techniques. Jiawei Han. Micheline Kamber. Simon Fräser University К MORGAN KAUFMANN PUBLISHERS. AN IMPRINT OF Elsevier
Data Mining: Concepts and Techniques Jiawei Han Micheline Kamber Simon Fräser University К MORGAN KAUFMANN PUBLISHERS AN IMPRINT OF Elsevier Contents Foreword Preface xix vii Chapter I Introduction I I.
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering
More informationIMPROVEMENT THE PRACTITIONER'S GUIDE TO DATA QUALITY DAVID LOSHIN
i I I I THE PRACTITIONER'S GUIDE TO DATA QUALITY IMPROVEMENT DAVID LOSHIN ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Morgan Kaufmann
More informationContents. Biography. Acknowledgments. List of Abbreviations. List of Symbols
Contents Biography Preface Acknowledgments List of Abbreviations List of Symbols xi xiii xvii xix xxvii 1 Introduction 1 1.1 Cellular Mobile Communication Systems 1 1.1.1 The Cellular Concept 2 1.1.2 Propagation
More informationWhy big data? Lessons from a Decade+ Experiment in Big Data
Why big data? Lessons from a Decade+ Experiment in Big Data David Belanger PhD Senior Research Fellow Stevens Institute of Technology dbelange@stevens.edu 1 What Does Big Look Like? 7 Image Source Page:
More informationMINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT
MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT 1 SARIKA K B, 2 S SUBASREE 1 Department of Computer Science, Nehru College of Engineering and Research Centre, Thrissur, Kerala 2 Professor and Head,
More informationNetwork Security. Current Status and Future Directions
Brochure More information from http://www.researchandmarkets.com/reports/2175769/ Network Security. Current Status and Future Directions Description: A unique overview of network security issues, solutions,
More informationManaging Incompleteness, Complexity and Scale in Big Data
Managing Incompleteness, Complexity and Scale in Big Data Nick Duffield Electrical and Computer Engineering Texas A&M University http://nickduffield.net/work Three Challenges for Big Data Complexity Problem:
More informationCourse Syllabus For Operations Management. Management Information Systems
For Operations Management and Management Information Systems Department School Year First Year First Year First Year Second year Second year Second year Third year Third year Third year Third year Third
More informationA Network Management Framework for Emerging Telecommunications Network. asamba@kent.edu
Symposium on Modeling and Simulation Tools for Emerging Telecommunication Networks: Needs, Trends, Challenges, Solutions Munich, Germany, Sept. 8 9, 2005 A Network Management Framework for Emerging Telecommunications
More informationABSTRACT The World MINING 1.2.1 1.2.2. R. Vasudevan. Trichy. Page 9. usage mining. basic. processing. Web usage mining. Web. useful information
SSRG International Journal of Electronics and Communication Engineering (SSRG IJECE) volume 1 Issue 1 Feb Neural Networks and Web Mining R. Vasudevan Dept of ECE, M. A.M Engineering College Trichy. ABSTRACT
More informationGraduate Co-op Students Information Manual. Department of Computer Science. Faculty of Science. University of Regina
Graduate Co-op Students Information Manual Department of Computer Science Faculty of Science University of Regina 2014 1 Table of Contents 1. Department Description..3 2. Program Requirements and Procedures
More informationPro Apache Hadoop. Second Edition. Sameer Wadkar. Madhu Siddalingaiah
Pro Apache Hadoop Second Edition Sameer Wadkar Madhu Siddalingaiah Contents J About the Authors About the Technical Reviewer Acknowledgments Introduction xix xxi xxiii xxv Chapter 1: Motivation for Big
More informationAdvances in Network Management
Advances in Network Management Jianguo Ding UC) CRC Press >5^ J Taylor & Francis Croup ^""""^ Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an informa business AN AUERBACH
More informationKnowledge Discovery from patents using KMX Text Analytics
Knowledge Discovery from patents using KMX Text Analytics Dr. Anton Heijs anton.heijs@treparel.com Treparel Abstract In this white paper we discuss how the KMX technology of Treparel can help searchers
More informationREGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])
244 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference
More informationNetwork Infrastructure Services CS848 Project
Quality of Service Guarantees for Cloud Services CS848 Project presentation by Alexey Karyakin David R. Cheriton School of Computer Science University of Waterloo March 2010 Outline 1. Performance of cloud
More informationOpen Source Software: How Can Design Metrics Facilitate Architecture Recovery?
Open Source Software: How Can Design Metrics Facilitate Architecture Recovery? Eleni Constantinou 1, George Kakarontzas 2, and Ioannis Stamelos 1 1 Computer Science Department Aristotle University of Thessaloniki
More informationBIG DATA Alignment of Supply & Demand Nuria de Lama Representative of Atos Research &
BIG DATA Alignment of Supply & Demand Nuria de Lama Representative of Atos Research & Innovation 04-08-2011 to the EC 8 th February, Luxembourg Your Atos business Research technologists. and Innovation
More informationContents. Foreword. Acknowledgments
Foreword Preface Acknowledgments xv xvii xviii CHAPTER 1 Introduction 1 1.1 What Is Mission Critical? 1 1.2 Purpose of the Book 2 1.3 Network Continuity Versus Disaster Recovery 2 1.4 The Case for Mission-Critical
More informationIEEE Computer Society Certified Software Development Associate Beta Exam Application
IEEE Computer Society Certified Software Development Associate Beta Exam Application Candidate Information (please print or type) Name Address ( Home Business) City, State, Postal Code Country Telephone
More informationConcept and Project Objectives
3.1 Publishable summary Concept and Project Objectives Proactive and dynamic QoS management, network intrusion detection and early detection of network congestion problems among other applications in the
More informationNetwork Security A Decision and Game-Theoretic Approach
Network Security A Decision and Game-Theoretic Approach Tansu Alpcan Deutsche Telekom Laboratories, Technical University of Berlin, Germany and Tamer Ba ar University of Illinois at Urbana-Champaign, USA
More information1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India
1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India Call for Papers Colossal Data Analysis and Networking has emerged as a de facto
More informationParallelization of video compressing with FFmpeg and OpenMP in supercomputing environment
Proceedings of the 9 th International Conference on Applied Informatics Eger, Hungary, January 29 February 1, 2014. Vol. 1. pp. 231 237 doi: 10.14794/ICAI.9.2014.1.231 Parallelization of video compressing
More informationSchneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, 2013. p i.
New York, NY, USA: Basic Books, 2013. p i. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=2 New York, NY, USA: Basic Books, 2013. p ii. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=3 New
More informationSchool of Computer Science
School of Computer Science Computer Science - Honours Level - 2014/15 October 2014 General degree students wishing to enter 3000- level modules and non- graduating students wishing to enter 3000- level
More informationCOPYRIGHTED MATERIAL. Contents. List of Figures. Acknowledgments
Contents List of Figures Foreword Preface xxv xxiii xv Acknowledgments xxix Chapter 1 Fraud: Detection, Prevention, and Analytics! 1 Introduction 2 Fraud! 2 Fraud Detection and Prevention 10 Big Data for
More informationGraph Analytics in Big Data. John Feo Pacific Northwest National Laboratory
Graph Analytics in Big Data John Feo Pacific Northwest National Laboratory 1 A changing World The breadth of problems requiring graph analytics is growing rapidly Large Network Systems Social Networks
More information131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
More informationMasters in Human Computer Interaction
Masters in Human Computer Interaction Programme Requirements Taught Element, and PG Diploma in Human Computer Interaction: 120 credits: IS5101 CS5001 CS5040 CS5041 CS5042 or CS5044 up to 30 credits from
More informationPrinciples of Distributed Database Systems
M. Tamer Özsu Patrick Valduriez Principles of Distributed Database Systems Third Edition
More informationMasters in Advanced Computer Science
Masters in Advanced Computer Science Programme Requirements Taught Element, and PG Diploma in Advanced Computer Science: 120 credits: IS5101 CS5001 up to 30 credits from CS4100 - CS4450, subject to appropriate
More informationCITY UNIVERSITY OF HONG KONG 香 港 城 市 大 學. Self-Organizing Map: Visualization and Data Handling 自 組 織 神 經 網 絡 : 可 視 化 和 數 據 處 理
CITY UNIVERSITY OF HONG KONG 香 港 城 市 大 學 Self-Organizing Map: Visualization and Data Handling 自 組 織 神 經 網 絡 : 可 視 化 和 數 據 處 理 Submitted to Department of Electronic Engineering 電 子 工 程 學 系 in Partial Fulfillment
More informationBusiness Model Innovation in Wealth Management
Business Model Innovation in Wealth Management DISSERTATION of the University of St. Gallen, Graduate School of Business Administration, Economics, Law and Social Sciences (HSG) to obtain the title of
More informationMasters in Artificial Intelligence
Masters in Artificial Intelligence Programme Requirements Taught Element, and PG Diploma in Artificial Intelligence: 120 credits: IS5101 CS5001 CS5010 CS5011 CS4402 or CS5012 in total, up to 30 credits
More informationDoctor of Philosophy in Computer Science
Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects
More informationBig Data and Analytics: Challenges and Opportunities
Big Data and Analytics: Challenges and Opportunities Dr. Amin Beheshti Lecturer and Senior Research Associate University of New South Wales, Australia (Service Oriented Computing Group, CSE) Talk: Sharif
More informationOrganisers. Israel Honorary Country 2015
Israel Honorary Country 2015 #e ifo ru m AG EN DA Organisers December 7th-8th 2015 Athens Hilton Equity Investment Forum Monday 7th December 8:30-9:00 Registration 9:00-9:05 Presentation of Conferience
More informationBig Data a threat or a chance?
Big Data a threat or a chance? Helwig Hauser University of Bergen, Dept. of Informatics Big Data What is Big Data? well, lots of data, right? we come back to this in a moment. certainly, a buzz-word but
More informationAbout the Authors Preface Acknowledgements List of Acronyms
Contents About the Authors Preface Acknowledgements List of Acronyms xiii xv xvii xix Part One Wireless Ad Hoc, Sensor and Mesh Networking 1 1 Introduction 3 1.1 Information Security 4 1.1.1 Computer Security
More informationFundamentals of Mobile and Pervasive Computing
Fundamentals of Mobile and Pervasive Computing Frank Adelstein Sandeep K. S. Gupta Golden G. Richard III Loren Schwiebert Technische Universitat Darmstadt FACHBEREICH INFORMATIK B1BLIOTHEK Inventar-Nr.:
More informationBusiness Intelligence and Decision Support Systems
Chapter 12 Business Intelligence and Decision Support Systems Information Technology For Management 7 th Edition Turban & Volonino Based on lecture slides by L. Beaubien, Providence College John Wiley
More informationVennfer v.1.0. A software based video conferencing system
INTELLISYS Vennfer v.1.0 A software based video conferencing system Vennfer is an advanced software based video conferencing solution based on a highly sophisticated software engine developed by a core
More information1 o Semestre 2007/2008
Departamento de Engenharia Informática Instituto Superior Técnico 1 o Semestre 2007/2008 Outline 1 2 3 4 5 Outline 1 2 3 4 5 Exploiting Text How is text exploited? Two main directions Extraction Extraction
More informationHorizontal IoT Application Development using Semantic Web Technologies
Horizontal IoT Application Development using Semantic Web Technologies Soumya Kanti Datta Research Engineer Communication Systems Department Email: Soumya-Kanti.Datta@eurecom.fr Roadmap Introduction Challenges
More informationLIST OF FIGURES. Figure No. Caption Page No.
LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS
More informationHow To Get A Financial Aid Award In Athena
Athena Self-Service Walkthrough By the UGA Office of Student Financial Aid 220 Holmes/Hunter Academic Building Athens, GA 30602-6114 Phone: (706) 542-6147 Section 1 How to Find Out What is Needed by the
More informationIntroduction. A. Bellaachia Page: 1
Introduction 1. Objectives... 3 2. What is Data Mining?... 4 3. Knowledge Discovery Process... 5 4. KD Process Example... 7 5. Typical Data Mining Architecture... 8 6. Database vs. Data Mining... 9 7.
More informationTABLE OF CONTENTS ABSTRACT ACKNOWLEDGEMENT LIST OF FIGURES LIST OF TABLES
TABLE OF CONTENTS ABSTRACT ACKNOWLEDGEMENT LIST OF FIGURES LIST OF TABLES ii iii x xiv CHAPTER 1: INTRODUCTION 1 1.0 Background 1 1.1 Research Motivation 4 1.2 Research Objectives 5 1.3 Project Scope 6
More informationIC05 Introduction on Networks &Visualization Nov. 2009. <mathieu.bastian@gmail.com>
IC05 Introduction on Networks &Visualization Nov. 2009 Overview 1. Networks Introduction Networks across disciplines Properties Models 2. Visualization InfoVis Data exploration
More informationData Warehousing in the Age of Big Data
Data Warehousing in the Age of Big Data Krish Krishnan AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD * PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Morgan Kaufmann is an imprint of Elsevier
More informationHadoop Technology for Flow Analysis of the Internet Traffic
Hadoop Technology for Flow Analysis of the Internet Traffic Rakshitha Kiran P PG Scholar, Dept. of C.S, Shree Devi Institute of Technology, Mangalore, Karnataka, India ABSTRACT: Flow analysis of the internet
More informationREGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])
REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference to
More informationCSC4290: Introduction to Computer Networking. Hongwei Zhang http://www.cs.wayne.edu/~hzhang
CSC4290: Introduction to Computer Networking Hongwei Zhang http://www.cs.wayne.edu/~hzhang Objectives of the course Ultimate goal: you can build any network (including the Internet) from scratch up! Humble
More informationDeveloping. and Securing. the Cloud. Bhavani Thuraisingham CRC. Press. Taylor & Francis Group. Taylor & Francis Croup, an Informs business
Developing and Securing the Cloud Bhavani Thuraisingham @ CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an Informs business AN AUERBACH
More informationehealth FORUM 2015 FINAL PROGRAMME THURSDAY 3/12/2015 OLYMPIA 1 HALL
ehealth FORUM 2015 FINAL PROGRAMME 8.00-9.00 Welcome & Registration THURSDAY 3/12/2015 OLYMPIA 1 HALL 9.00-9.30 Official Opening Alexander Berler, Chair HL7 Hellas, Chair of the ehealth Forum Organising
More informationAuditing EMR System Usage. You Chen Jan, 17, 2013 You.chen@vanderbilt.edu
Auditing EMR System Usage You Chen Jan, 17, 2013 You.chen@vanderbilt.edu Health data being accessed by hackers, lost with laptop computers, or simply read by curious employees Anomalous Usage You Chen,
More informationAn Enhanced Automated, Distributed, SLA for. Dynamic Infrastructure Management in Real. Cloud Environment Using SEQ-BP(R)M.
Contemporary Engineering Sciences, Vol. 8, 2015, no. 13, 557-566 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2015.5388 An Enhanced Automated, Distributed, SLA for Dynamic Infrastructure
More informationPractical Applications of DATA MINING. Sang C Suh Texas A&M University Commerce JONES & BARTLETT LEARNING
Practical Applications of DATA MINING Sang C Suh Texas A&M University Commerce r 3 JONES & BARTLETT LEARNING Contents Preface xi Foreword by Murat M.Tanik xvii Foreword by John Kocur xix Chapter 1 Introduction
More informationTable of Contents. Chapter No. 1 Introduction 1. iii. xiv. xviii. xix. Page No.
Table of Contents Title Declaration by the Candidate Certificate of Supervisor Acknowledgement Abstract List of Figures List of Tables List of Abbreviations Chapter Chapter No. 1 Introduction 1 ii iii
More informationAn Introduction to Data Mining. Big Data World. Related Fields and Disciplines. What is Data Mining? 2/12/2015
An Introduction to Data Mining for Wind Power Management Spring 2015 Big Data World Every minute: Google receives over 4 million search queries Facebook users share almost 2.5 million pieces of content
More informationUSTC Course for students entering Clemson F2013 Equivalent Clemson Course Counts for Clemson MS Core Area. CPSC 822 Case Study in Operating Systems
USTC Course for students entering Clemson F2013 Equivalent Clemson Course Counts for Clemson MS Core Area 398 / SE05117 Advanced Cover software lifecycle: waterfall model, V model, spiral model, RUP and
More informationINFORMATION SYSTEMS AND TECHNOLOGY MANAGEMENT
INFORMATION SYSTEMS AND TECHNOLOGY MANAGEMENT UNDERGRADUATE Bachelor's programs Bachelor of Business Administration with a concentration in information systems and technology management (http:// bulletin.gwu.edu/business/undergraduate-programs/
More informationREGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])
315 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference
More informationWeb Mining. Margherita Berardi LACAM. Dipartimento di Informatica Università degli Studi di Bari berardi@di.uniba.it
Web Mining Margherita Berardi LACAM Dipartimento di Informatica Università degli Studi di Bari berardi@di.uniba.it Bari, 24 Aprile 2003 Overview Introduction Knowledge discovery from text (Web Content
More informationBusiness Administration of Windchill PDMLink 10.0
Business Administration of Windchill PDMLink 10.0 Overview Course Code Course Length TRN-3160-T 3 Days After completing this course, you will be well prepared to set up and manage a basic Windchill PDMLink
More informationEXPRESSION OF INTEREST FOR CELL (MOBILE) PHONES, CELL PHONE SERVICE AND DATA SERVICE [EOI # 06/2015]
EXPRESSION OF INTEREST FOR CELL (MOBILE) PHONES, CELL PHONE SERVICE AND DATA SERVICE [EOI # 06/2015] 1.0 PURPOSE OF EXPRESSION OF INTEREST The purpose of this Expression of Interest (EOI) is to enter into
More informationQUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
More informationA Novel Cloud Based Elastic Framework for Big Data Preprocessing
School of Systems Engineering A Novel Cloud Based Elastic Framework for Big Data Preprocessing Omer Dawelbeit and Rachel McCrindle October 21, 2014 University of Reading 2008 www.reading.ac.uk Overview
More information