4 IEEE (PCI 2011) th Panhellenic Conference. Kastoria, Greece. 2 October September. on Informatics. Angelos Michalas.

Size: px
Start display at page:

Download "4 IEEE (PCI 2011) 201115th Panhellenic Conference. Kastoria, Greece. 2 October 2011. 30 September. on Informatics. Angelos Michalas."

Transcription

1 201115th Panhellenic Conference on Informatics (PCI 2011) Kastoria, Greece 30 September 2 October 2011 Editors: Pantelis Angelidis Angelos Michalas 4 IEEE IEEE Catalog Number: CFP1163EPRT ISBN:

2 2011 Panhellenic Conference on Informatics PCI 2011 Table of Contents Message from General Cochairs Message from Program Cochairs Organizing Committee Program Committee Local Organizing Committee Keynote Speakers xii xiii xiv xv xvii xviii Information Systems Towards an Integrated Teaching Environment for Parallel Programming 3 Constantinos T. Delistavrou and Konstantinos G. Margaritis Teaching Software Project Management through Management Antipatterns 8 loannis Stamelos, Dimitrios Sottas, and Despoina Mallini MentorChat: Introducing a Configurable Conversational Agent as a Tool for Adaptive Online Collaboration Support 13 Stergios Tegos, Stavros Demetriadis, and Anastasios Karakostas Using an Automated Speech Emotion Recognition Technique to Explore the Impact of Bullying on Pupils Social Life 18 Theodoros lliou and Georgios Paschalidis Evaluation of Four, Free and Open Source DICOM Software Tools 23 O. Papadopoulou Academic Research PolicyMaking and Evaluation Using Graph Visualisation 28 Tsolakidis Anastasios, Cleo Sgouropoulou, loannis Xydas, Olivier Terraz, and Georgios Miaoulis ProMaSI A Project Management Simulator 33 Nicholaos Petalidis, Gregory Gregoriadis, Alexandros Theodoridis, and Antonios Chronakis V

3 An Databases and Data Mining The Effects of Dimensionality Curse in High Dimensional knn Search 41 Nikolaos Kouiroukidis and Georgios Evangelidis Data Node Splitting Policies for Improved Range Query Efficiency in kdimensional Point Data Indexes 46 Evangelos Outsios and Georgios Evangelidis Nearest Neighbor Algorithms Using xbrtrees 51 George Roumelis, Michael Vassilakopoulos, and Antonio Corral Incremental Discovery of Topk Correlative Subgraphs 5f5 Georgia S. Latsiou and Apostolos N. Papadopoulos Education Technologies Virtual Learning Environments Katerina Georgouli Overview 63 A Hacker's Perspective on Educating Future Security Experts 68 Alexandros Papanikolaou, Vassilios Karakoidas, Vasileios Vlachos, Andreas Venieris, Christos llioudis, and Georgios Zouganelis Pilot Introduction of IWB and COWs in Greek Schools 73 F. Foskolos, A. Vagelatos, and Th. Komninos Exploiting Web Conferencing to Support Collaborative Learning 78 Apostolos Mavridis, Thrasyvoulos Tsiatsos, and Stergios Tegos Algorithms and Data Structures A Performance Evaluation of the Preprocessing Phase of Multiple Keyword Matching Algorithms 85 Charalampos S. Kouzinopoulos and Konstantinos G. Margaritis Splaying for Compression: An Experimental Study 90 Dlmitris Antoniou, loannis Kampouris, Evangelos Theodoridis, and Athanasios Tsakalidis A Framework for Linked Data Business Models 95 Michalis Vafopoulos Dynamic Dominators in Practice 100 Konstantinos Patakakis, Loukas Georgiadis, and Vasileios A. Tatsis vi

4 Networking Applying Categorical Logic on a Holistic Security Architecture across Distributed Systems 107 Dirnitrios Sisiaridis and Nick Rossiter RealLife Paradigms of Wireless Network Security Attacks 112 I.P. Mavridis, A.l. E. Androulakis, A.B. Halkias, and Ph. Mylonas Collaborative Efforts for Safety and Security in Vehicular Communication Networks 117 George Kadas and Periklis Chatzimisios An Experimental Study of the Efficiency of Explicit Congestion Notification 122 Stefanos Harhalakis, Nikolaos Samaras, and Vasileios Vitsas Supporting Service Differentiation in Wireless Sensor Networks 127 MarieAurelie Nef, Sophia Karagiorgou, George I. and Panayotis K. Kikiras Stamoulis, Handling Multicast Video over Non Multicast Networks 134 Michail Tolkas, Michail Bletsas, and Pantelis Angelidis On Effectively Determining the DownlinktoUplink Subframe Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation 139 Panagiotis Sarigiannidis, Malamati Louta, andangelos Michalas Optimal Tradeoff between Energy Consumption and Response Time in LargeScale MapReduce Clusters 144 Pavlos Paraskevopoulos and Anastasios Gounaris A Novel Probabilistic Flooding Strategy for Unstructured PeertoPeer Networks 149 Spiridoula V. Margariti and Vassilios V. Dimakopoulos An Automated System for Integrated Service Management in Emergency Situations 154 Nikolaos A. Pantazis, Stefanos A. Nikolidakis, Dionisis Kandris, and Dirnitrios D. Vergados Open Source Software SFparser: A Tool for Selectively Parsing SourceForge 161 Apostolos Kritikos and Fragkiskos Chatziasimidis Towards Open Source Software System Architecture Recovery Using Design Metrics 166 Eleni Constantinou, George Kakarontzas, and loannis Stamelos vii

5 eairquality: A Dynamic Web Based Application for Evaluating the Air Quality Index for the City of Kozani, Hellas Skordas loannis, George F. Fragulis, and Athanassios G. Triantafyllou Snmp for Ethernet Networks SETH: A Network Benchmark Toolkit for Managing Routers Statistical Information S. Kontogiannis, A. Karakos, G. Kokkonis, and P. Kitsos Multimedia Services Use of Behavioral Synthesis to Implement a Cellular Neural Network for Image Processing Applications Dimitrios Amanatidis and Michael Dossis Denoising of Binarized Byzantine Textual Images N. Ntogas, D. Ventzas, and M. Ventza Subjective and Objective Video Codec Evaluation Andreas Papadakis and Konstantinos Zachos A Personalized Audio Web Service Using MPEG7 and MPEG21 Standards 199 Emmanouil Skondras, Malamati Louta, and Panagiotis Sarigiannidis eservices: Empirical Studies Teenagers' Use of Social Network Websites and Privacy Concerns: A Survey 207 Evanthia Faliagka, Athanasios Tsakalidis, and Danae Vaikousi An Empirical Study on the Web Password Strength in Greece 212 Artemios G. Voyiatzis, Christos A. Fidas, Dimitrios N. Serpanos, and Nikolaos M. Avouris Social Multimedia Mining: A Social Informatics Perspective 217 Georgios Lappas Log File Analysis of Ecommerce Systems in Rich Internet Web 2.0 Applications 222 Constantine J. Aivalis and Anthony C. Boucouvalas Information Retrieval Search Culture Nikitas N. Karanikolas 229 A Comparable Study Employing WEKA Clustering/Classification Algorithms for Web Page Classification loannis Charalampopoulos and loannis Anagnostopoulos 235 A Framework for Visualizing the Web of Data: Combining DBpedia and Open APIs Agis Papantoniou, Vassilis Loumos, Miltos Poulizos, and Gregory Rigas 240 viii

6 A Comparison over Focused Web Crawling Strategies 245 loannis Avraam and loannis Anagnostopoulos Numerical and Scientific Computations Higher Order Finite Difference Preconditioned Scheme: A Multithreaded Approach 253 C.K. FilelisPapadopoulos, G.A. Grawanis, and E.A. Lipitakis A Note on Parallel Finite Element Approximate Inverses Using OpenMP on Multicore Systems 259 P.I. Matskanidis, G.A. Grawanis, and K.M. Giannoutakis Design and Implementation of OpenMP Tasks in the OMPi Compiler 265 Spiros N. Agathos, Panagiotis E. Hadjidoukas, and Vassilios V. Dimakopoulos Elastic Component Characterization with Respect to Quality Properties: An Intuitionistic FuzzyBased Approach 270 George Kakarontzas, Vassilis C. Gerogiannis, loannis Stamelos, and Panagiotis Katsaros HumanComputer Interaction Building a PlatformAgnostic Wireless Network of Interconnected Smart Objects 277 Orestis Akribopoulos, Vasileios Georgitzikis, Anastasia Protopapa, and loannis Chatzigiannakis etracer: An Innovative NearReal Time TrackandTrace Platform 282 Efi Papatheocharous and Panagiotis Gouvas Evaluation of TipActivated and PushButton Infrared Pens for Interactive Whiteboards 287 Dimitrios Kravvaris, Eleni Thanou, and Konstantinos Chorianopoulos The Concept and Design of an Open, Integrated Print Charging System 292 Michael Kalochristianakis, Kostas Grammatikakis, Manolis Saldaris, Irene Mastorakis, and Grigoris Tzanodaskalakis ecommerce, ebusiness, egovernment, ehealth Interviewing the Amazon Web Salespersons: Trends, Complementarities and Competition 299 Michalis Vafopoulos, Thomas Theodoridis, and Dimitris Kontokostas Promoting egov Services: edocument Interoperability across EU 304 Andreas Papadakis, Konstantinos Rantos, and Antonis Stasis ix

7 The The Military Model in I.T. and Computer Studies: A Violation against Women's Rights in Work and Education 309 Dionisis Georgopoulos Information Systems and Innovation in Investigation Greek Firms An Empirical Spyros Arvanitis, Euripidis Loukis, and Vasiliki Diamantopoulou 315 Seismicity Online Grid Map for Regional Earthquake Activity Studies 321 Athanasios Keskempes, Anthony Roussos, Nikos Tselikas, and Anthony C. Boucouvalas Special Session: Mobile Device Software Development A Mobile Application Supporting Conference Attendees and Organizers 333 Chris D. Kounavis, Efpraxia D. Zamani, and George M. Giaglis Education and Learning in the Semantic Web 338 Anna Kasimati and Efpraxia Zamani Implementing an Open Personal Learning Environment 345 Alexandres Soumplis, Eleni Chatzidaki, Eleni Koulocheri, and Michalis Xenos Special Session: Quality in Educational Technologies Analyzing the Fora: An Algorithms Combination for the Representation of Messages 353 Kiriakos Patriarcheas, Spyridon Papaloukas, and Michalis Xenos A Combined Algorithm for LMS Usage Assessment 358 Stavros Valsamidis, Sotirios Kontogiannis, Alexandros Karakos, and loannis Kazanidis Touch Your Program with Hands: Qualities in Tangible Programming Tools for Novice 363 Theodosios Sapounidis and Stavros Demetriadis Effectiveness of a Framed WikiBased Learning Activity in the Context of HCI Education 368 Nikolaos Tselios, Panagiota Altanopoulou, and Christos Katsanos Developing an Information System for Quality Assurance in Higher Education Using the Balanced Scorecard Technique Case Study of TEIA 373 Manolis Chalaris, Anastasios Tsolakidis, Cleo Sgouropoulou, and loannis Chalaris X

8 Special Session: Real World Internet Unattended Surveillance Network for AfterDisaster Support in Public Transportations Sector 381 C. Alexakos, M. Georgoudakis, A. Kalogeras, F. Andritsos, P. Konstantinopoulos, and I. Chatzigiannakis iprotect: An Open Source Emergency Management Framework 386 MarieAurelie Nef, loannis Filippopoulos, Eleftherios Voumvourakis, Aggelos Aggelis, Leonidas Perlepes, Georgios Stamoulis, and Panayotis Kikiras PatrasSense: Participatory Monitoring of Environmental Conditions in Urban Areas Using Sensor Networks and Smartphones 392 Pantelis Vikatos, Evangelos Theodoridis, Georgios Mylonas, and Athanasios Tsakalidis Wireless Sensor Network for Precision Agriculture 397 A. Tagarakis, V. Liakos, L. Perlepes, S. Fountas, and T. Gemtos Author Index 403 xi

2010 14th Panhellenic Conference on Informatics

2010 14th Panhellenic Conference on Informatics 2010 14th Panhellenic Conference on Informatics (PCI 2010) Tripoli, Greece 10 12 September 2010 IEEE Catalog Number: ISBN: CFP1063E-PRT 978-1-4244-7838-5 2010 14th Panhellenic Conference on Informatics

More information

Safety and Sustainability

Safety and Sustainability Christos K. Georgiadis Hamid Jahankhani Elias Pimenidis Rabih Bashroush Ameer Al-Nemrat (Eds.) Global Security, Safety and Sustainability & e-democracy 7th International and 4th e-democracy Joint Conferences,

More information

E.T.A.N.E. - ANOIXTO DIASILOGIKO A/G, E/N, P/K

E.T.A.N.E. - ANOIXTO DIASILOGIKO A/G, E/N, P/K Juniors Male Black -45 (Fin) Active competitors: 4 466 Kottaras, Athanasios A.S. TAEKWONDO VASILIKOU 131 52 Nikolopoulos, Andreas A.C EKRIXI PATRWN 167 242 Koutsogiannis, Nikolaos Georg A.C. TKD AGIA PARASKEVI

More information

NETWORK SECURITY: CURRENT STATUS AND FUTURE DIRECTIONS

NETWORK SECURITY: CURRENT STATUS AND FUTURE DIRECTIONS NETWORK SECURITY: CURRENT STATUS AND FUTURE DIRECTIONS Preface. Contributors. 1. Computer Network Security: Basic Background and Current Issues (Panayiotis Kotzanikolaou and Christos Douligeris). 1.1 Some

More information

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and

More information

Articles IEEE have removed from their database

Articles IEEE have removed from their database Articles IEEE have removed from their database Application of Game-Theoretic and Virtual Algorithms in Information Retrieval System 2008 International Conference on MultiMedia and Information Technology

More information

Contents. Dedication List of Figures List of Tables. Acknowledgments

Contents. Dedication List of Figures List of Tables. Acknowledgments Contents Dedication List of Figures List of Tables Foreword Preface Acknowledgments v xiii xvii xix xxi xxv Part I Concepts and Techniques 1. INTRODUCTION 3 1 The Quest for Knowledge 3 2 Problem Description

More information

life science data mining

life science data mining life science data mining - '.)'-. < } ti» (>.:>,u» c ~'editors Stephen Wong Harvard Medical School, USA Chung-Sheng Li /BM Thomas J Watson Research Center World Scientific NEW JERSEY LONDON SINGAPORE.

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) 305 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference

More information

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India Call for Papers Cloud computing has emerged as a de facto computing

More information

Understanding Web personalization with Web Usage Mining and its Application: Recommender System

Understanding Web personalization with Web Usage Mining and its Application: Recommender System Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,

More information

The Scientific Data Mining Process

The Scientific Data Mining Process Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In

More information

JAVA IEEE 2015. 6 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites Data Mining

JAVA IEEE 2015. 6 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites Data Mining S.NO TITLES Domains 1 Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing 2 Anonymizing Collections of Tree-Structured Data 3 Making Digital Artifacts on the Web Verifiable and

More information

Deliverable 7-1: Minutes of the kick-off meeting of the project ISWM-TINOS

Deliverable 7-1: Minutes of the kick-off meeting of the project ISWM-TINOS ISWM-TINOS: Development and implementation of a demonstration system on Integrated Solid Waste Management for Tinos in line with the Waste Framework Directive Deliverable 7-1:Minutes of the kick-off meeting

More information

List of Projects in Application

List of Projects in Application List of Projects in Application S-Logix #9, First Floor, Krishnabai St, Habibullah Road T.Nagar, Chennai-600017 (Opp:HDFC Bank) Ph:28343467 Mobile: 8124001111, 9710999001 E-Mail: slogix.india@gmail.com

More information

PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.

PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS. PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software

More information

How To Get A Computer Engineering Degree

How To Get A Computer Engineering Degree COMPUTER ENGINEERING GRADUTE PROGRAM FOR MASTER S DEGREE (With Thesis) PREPARATORY PROGRAM* COME 27 Advanced Object Oriented Programming 5 COME 21 Data Structures and Algorithms COME 22 COME 1 COME 1 COME

More information

Master of Science in Computer Science

Master of Science in Computer Science Master of Science in Computer Science Background/Rationale The MSCS program aims to provide both breadth and depth of knowledge in the concepts and techniques related to the theory, design, implementation,

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup

Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup Network Anomaly Detection A Machine Learning Perspective Dhruba Kumar Bhattacharyya Jugal Kumar KaKta»C) CRC Press J Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor

More information

Kings Regional Occupational Program Course Information

Kings Regional Occupational Program Course Information Kings County Board of Education Approval May 4, 2011 California Department of Education Certification August 22, 2007 Kings Regional Occupational Program Course Information Course Title: Cisco Discovery:

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) 299 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014 RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer

More information

01219211 Software Development Training Camp 1 (0-3) Prerequisite : 01204214 Program development skill enhancement camp, at least 48 person-hours.

01219211 Software Development Training Camp 1 (0-3) Prerequisite : 01204214 Program development skill enhancement camp, at least 48 person-hours. (International Program) 01219141 Object-Oriented Modeling and Programming 3 (3-0) Object concepts, object-oriented design and analysis, object-oriented analysis relating to developing conceptual models

More information

CALL FOR PAPERS. 5th International Conference on. Renewable Energy Sources & Energy. Hilton Hotel Nicosia-Cyprus. - New Challenges

CALL FOR PAPERS. 5th International Conference on. Renewable Energy Sources & Energy. Hilton Hotel Nicosia-Cyprus. - New Challenges CALL FOR PAPERS & Energy Efficiency - New Challenges Under the Auspices of The Minister of Energy Commerce Industry and Tourism Hilton Hotel Nicosia-Cyprus 5-6M A Y 2016 Organised by: Communication Sponsor:

More information

Dr Christos Anagnostopoulos. 1. Education. 2. Present employment. 3. Previous Appointments. Page 1 of 6

Dr Christos Anagnostopoulos. 1. Education. 2. Present employment. 3. Previous Appointments. Page 1 of 6 Dr Christos Anagnostopoulos 1. Education Ph.D. in Computer Science Department of Informatics & Telecommunications, National and Kapodistrian University of Athens, July 2008 Dissertation: Pervasive and

More information

Probabilistic Model Checking at Runtime for the Provisioning of Cloud Resources

Probabilistic Model Checking at Runtime for the Provisioning of Cloud Resources Probabilistic Model Checking at Runtime for the Provisioning of Cloud Resources Athanasios Naskos, Emmanouela Stachtiari, Panagiotis Katsaros, and Anastasios Gounaris Aristotle University of Thessaloniki,

More information

to-end Packet Loss Estimation for Grid Traffic Monitoring

to-end Packet Loss Estimation for Grid Traffic Monitoring Passive End-to to-end Packet Loss Estimation for Grid Traffic Monitoring Antonis Papadogiannakis, Alexandros Kapravelos, Michalis Polychronakis, Evangelos P. Markatos Institute of Computer Science (ICS)

More information

Augmented Search for IT Data Analytics. New frontier in big log data analysis and application intelligence

Augmented Search for IT Data Analytics. New frontier in big log data analysis and application intelligence Augmented Search for IT Data Analytics New frontier in big log data analysis and application intelligence Business white paper May 2015 IT data is a general name to log data, IT metrics, application data,

More information

Data Mining: Concepts and Techniques. Jiawei Han. Micheline Kamber. Simon Fräser University К MORGAN KAUFMANN PUBLISHERS. AN IMPRINT OF Elsevier

Data Mining: Concepts and Techniques. Jiawei Han. Micheline Kamber. Simon Fräser University К MORGAN KAUFMANN PUBLISHERS. AN IMPRINT OF Elsevier Data Mining: Concepts and Techniques Jiawei Han Micheline Kamber Simon Fräser University К MORGAN KAUFMANN PUBLISHERS AN IMPRINT OF Elsevier Contents Foreword Preface xix vii Chapter I Introduction I I.

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015 RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering

More information

IMPROVEMENT THE PRACTITIONER'S GUIDE TO DATA QUALITY DAVID LOSHIN

IMPROVEMENT THE PRACTITIONER'S GUIDE TO DATA QUALITY DAVID LOSHIN i I I I THE PRACTITIONER'S GUIDE TO DATA QUALITY IMPROVEMENT DAVID LOSHIN ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Morgan Kaufmann

More information

Contents. Biography. Acknowledgments. List of Abbreviations. List of Symbols

Contents. Biography. Acknowledgments. List of Abbreviations. List of Symbols Contents Biography Preface Acknowledgments List of Abbreviations List of Symbols xi xiii xvii xix xxvii 1 Introduction 1 1.1 Cellular Mobile Communication Systems 1 1.1.1 The Cellular Concept 2 1.1.2 Propagation

More information

Why big data? Lessons from a Decade+ Experiment in Big Data

Why big data? Lessons from a Decade+ Experiment in Big Data Why big data? Lessons from a Decade+ Experiment in Big Data David Belanger PhD Senior Research Fellow Stevens Institute of Technology dbelange@stevens.edu 1 What Does Big Look Like? 7 Image Source Page:

More information

MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT

MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT 1 SARIKA K B, 2 S SUBASREE 1 Department of Computer Science, Nehru College of Engineering and Research Centre, Thrissur, Kerala 2 Professor and Head,

More information

Network Security. Current Status and Future Directions

Network Security. Current Status and Future Directions Brochure More information from http://www.researchandmarkets.com/reports/2175769/ Network Security. Current Status and Future Directions Description: A unique overview of network security issues, solutions,

More information

Managing Incompleteness, Complexity and Scale in Big Data

Managing Incompleteness, Complexity and Scale in Big Data Managing Incompleteness, Complexity and Scale in Big Data Nick Duffield Electrical and Computer Engineering Texas A&M University http://nickduffield.net/work Three Challenges for Big Data Complexity Problem:

More information

Course Syllabus For Operations Management. Management Information Systems

Course Syllabus For Operations Management. Management Information Systems For Operations Management and Management Information Systems Department School Year First Year First Year First Year Second year Second year Second year Third year Third year Third year Third year Third

More information

A Network Management Framework for Emerging Telecommunications Network. asamba@kent.edu

A Network Management Framework for Emerging Telecommunications Network. asamba@kent.edu Symposium on Modeling and Simulation Tools for Emerging Telecommunication Networks: Needs, Trends, Challenges, Solutions Munich, Germany, Sept. 8 9, 2005 A Network Management Framework for Emerging Telecommunications

More information

ABSTRACT The World MINING 1.2.1 1.2.2. R. Vasudevan. Trichy. Page 9. usage mining. basic. processing. Web usage mining. Web. useful information

ABSTRACT The World MINING 1.2.1 1.2.2. R. Vasudevan. Trichy. Page 9. usage mining. basic. processing. Web usage mining. Web. useful information SSRG International Journal of Electronics and Communication Engineering (SSRG IJECE) volume 1 Issue 1 Feb Neural Networks and Web Mining R. Vasudevan Dept of ECE, M. A.M Engineering College Trichy. ABSTRACT

More information

Graduate Co-op Students Information Manual. Department of Computer Science. Faculty of Science. University of Regina

Graduate Co-op Students Information Manual. Department of Computer Science. Faculty of Science. University of Regina Graduate Co-op Students Information Manual Department of Computer Science Faculty of Science University of Regina 2014 1 Table of Contents 1. Department Description..3 2. Program Requirements and Procedures

More information

Pro Apache Hadoop. Second Edition. Sameer Wadkar. Madhu Siddalingaiah

Pro Apache Hadoop. Second Edition. Sameer Wadkar. Madhu Siddalingaiah Pro Apache Hadoop Second Edition Sameer Wadkar Madhu Siddalingaiah Contents J About the Authors About the Technical Reviewer Acknowledgments Introduction xix xxi xxiii xxv Chapter 1: Motivation for Big

More information

Advances in Network Management

Advances in Network Management Advances in Network Management Jianguo Ding UC) CRC Press >5^ J Taylor & Francis Croup ^""""^ Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an informa business AN AUERBACH

More information

Knowledge Discovery from patents using KMX Text Analytics

Knowledge Discovery from patents using KMX Text Analytics Knowledge Discovery from patents using KMX Text Analytics Dr. Anton Heijs anton.heijs@treparel.com Treparel Abstract In this white paper we discuss how the KMX technology of Treparel can help searchers

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) 244 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference

More information

Network Infrastructure Services CS848 Project

Network Infrastructure Services CS848 Project Quality of Service Guarantees for Cloud Services CS848 Project presentation by Alexey Karyakin David R. Cheriton School of Computer Science University of Waterloo March 2010 Outline 1. Performance of cloud

More information

Open Source Software: How Can Design Metrics Facilitate Architecture Recovery?

Open Source Software: How Can Design Metrics Facilitate Architecture Recovery? Open Source Software: How Can Design Metrics Facilitate Architecture Recovery? Eleni Constantinou 1, George Kakarontzas 2, and Ioannis Stamelos 1 1 Computer Science Department Aristotle University of Thessaloniki

More information

BIG DATA Alignment of Supply & Demand Nuria de Lama Representative of Atos Research &

BIG DATA Alignment of Supply & Demand Nuria de Lama Representative of Atos Research & BIG DATA Alignment of Supply & Demand Nuria de Lama Representative of Atos Research & Innovation 04-08-2011 to the EC 8 th February, Luxembourg Your Atos business Research technologists. and Innovation

More information

Contents. Foreword. Acknowledgments

Contents. Foreword. Acknowledgments Foreword Preface Acknowledgments xv xvii xviii CHAPTER 1 Introduction 1 1.1 What Is Mission Critical? 1 1.2 Purpose of the Book 2 1.3 Network Continuity Versus Disaster Recovery 2 1.4 The Case for Mission-Critical

More information

IEEE Computer Society Certified Software Development Associate Beta Exam Application

IEEE Computer Society Certified Software Development Associate Beta Exam Application IEEE Computer Society Certified Software Development Associate Beta Exam Application Candidate Information (please print or type) Name Address ( Home Business) City, State, Postal Code Country Telephone

More information

Concept and Project Objectives

Concept and Project Objectives 3.1 Publishable summary Concept and Project Objectives Proactive and dynamic QoS management, network intrusion detection and early detection of network congestion problems among other applications in the

More information

Network Security A Decision and Game-Theoretic Approach

Network Security A Decision and Game-Theoretic Approach Network Security A Decision and Game-Theoretic Approach Tansu Alpcan Deutsche Telekom Laboratories, Technical University of Berlin, Germany and Tamer Ba ar University of Illinois at Urbana-Champaign, USA

More information

1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India

1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India 1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India Call for Papers Colossal Data Analysis and Networking has emerged as a de facto

More information

Parallelization of video compressing with FFmpeg and OpenMP in supercomputing environment

Parallelization of video compressing with FFmpeg and OpenMP in supercomputing environment Proceedings of the 9 th International Conference on Applied Informatics Eger, Hungary, January 29 February 1, 2014. Vol. 1. pp. 231 237 doi: 10.14794/ICAI.9.2014.1.231 Parallelization of video compressing

More information

Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, 2013. p i.

Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, 2013. p i. New York, NY, USA: Basic Books, 2013. p i. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=2 New York, NY, USA: Basic Books, 2013. p ii. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=3 New

More information

School of Computer Science

School of Computer Science School of Computer Science Computer Science - Honours Level - 2014/15 October 2014 General degree students wishing to enter 3000- level modules and non- graduating students wishing to enter 3000- level

More information

COPYRIGHTED MATERIAL. Contents. List of Figures. Acknowledgments

COPYRIGHTED MATERIAL. Contents. List of Figures. Acknowledgments Contents List of Figures Foreword Preface xxv xxiii xv Acknowledgments xxix Chapter 1 Fraud: Detection, Prevention, and Analytics! 1 Introduction 2 Fraud! 2 Fraud Detection and Prevention 10 Big Data for

More information

Graph Analytics in Big Data. John Feo Pacific Northwest National Laboratory

Graph Analytics in Big Data. John Feo Pacific Northwest National Laboratory Graph Analytics in Big Data John Feo Pacific Northwest National Laboratory 1 A changing World The breadth of problems requiring graph analytics is growing rapidly Large Network Systems Social Networks

More information

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10 1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom

More information

Masters in Human Computer Interaction

Masters in Human Computer Interaction Masters in Human Computer Interaction Programme Requirements Taught Element, and PG Diploma in Human Computer Interaction: 120 credits: IS5101 CS5001 CS5040 CS5041 CS5042 or CS5044 up to 30 credits from

More information

Principles of Distributed Database Systems

Principles of Distributed Database Systems M. Tamer Özsu Patrick Valduriez Principles of Distributed Database Systems Third Edition

More information

Masters in Advanced Computer Science

Masters in Advanced Computer Science Masters in Advanced Computer Science Programme Requirements Taught Element, and PG Diploma in Advanced Computer Science: 120 credits: IS5101 CS5001 up to 30 credits from CS4100 - CS4450, subject to appropriate

More information

CITY UNIVERSITY OF HONG KONG 香 港 城 市 大 學. Self-Organizing Map: Visualization and Data Handling 自 組 織 神 經 網 絡 : 可 視 化 和 數 據 處 理

CITY UNIVERSITY OF HONG KONG 香 港 城 市 大 學. Self-Organizing Map: Visualization and Data Handling 自 組 織 神 經 網 絡 : 可 視 化 和 數 據 處 理 CITY UNIVERSITY OF HONG KONG 香 港 城 市 大 學 Self-Organizing Map: Visualization and Data Handling 自 組 織 神 經 網 絡 : 可 視 化 和 數 據 處 理 Submitted to Department of Electronic Engineering 電 子 工 程 學 系 in Partial Fulfillment

More information

Business Model Innovation in Wealth Management

Business Model Innovation in Wealth Management Business Model Innovation in Wealth Management DISSERTATION of the University of St. Gallen, Graduate School of Business Administration, Economics, Law and Social Sciences (HSG) to obtain the title of

More information

Masters in Artificial Intelligence

Masters in Artificial Intelligence Masters in Artificial Intelligence Programme Requirements Taught Element, and PG Diploma in Artificial Intelligence: 120 credits: IS5101 CS5001 CS5010 CS5011 CS4402 or CS5012 in total, up to 30 credits

More information

Doctor of Philosophy in Computer Science

Doctor of Philosophy in Computer Science Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects

More information

Big Data and Analytics: Challenges and Opportunities

Big Data and Analytics: Challenges and Opportunities Big Data and Analytics: Challenges and Opportunities Dr. Amin Beheshti Lecturer and Senior Research Associate University of New South Wales, Australia (Service Oriented Computing Group, CSE) Talk: Sharif

More information

Organisers. Israel Honorary Country 2015

Organisers. Israel Honorary Country 2015 Israel Honorary Country 2015 #e ifo ru m AG EN DA Organisers December 7th-8th 2015 Athens Hilton Equity Investment Forum Monday 7th December 8:30-9:00 Registration 9:00-9:05 Presentation of Conferience

More information

Big Data a threat or a chance?

Big Data a threat or a chance? Big Data a threat or a chance? Helwig Hauser University of Bergen, Dept. of Informatics Big Data What is Big Data? well, lots of data, right? we come back to this in a moment. certainly, a buzz-word but

More information

About the Authors Preface Acknowledgements List of Acronyms

About the Authors Preface Acknowledgements List of Acronyms Contents About the Authors Preface Acknowledgements List of Acronyms xiii xv xvii xix Part One Wireless Ad Hoc, Sensor and Mesh Networking 1 1 Introduction 3 1.1 Information Security 4 1.1.1 Computer Security

More information

Fundamentals of Mobile and Pervasive Computing

Fundamentals of Mobile and Pervasive Computing Fundamentals of Mobile and Pervasive Computing Frank Adelstein Sandeep K. S. Gupta Golden G. Richard III Loren Schwiebert Technische Universitat Darmstadt FACHBEREICH INFORMATIK B1BLIOTHEK Inventar-Nr.:

More information

Business Intelligence and Decision Support Systems

Business Intelligence and Decision Support Systems Chapter 12 Business Intelligence and Decision Support Systems Information Technology For Management 7 th Edition Turban & Volonino Based on lecture slides by L. Beaubien, Providence College John Wiley

More information

Vennfer v.1.0. A software based video conferencing system

Vennfer v.1.0. A software based video conferencing system INTELLISYS Vennfer v.1.0 A software based video conferencing system Vennfer is an advanced software based video conferencing solution based on a highly sophisticated software engine developed by a core

More information

1 o Semestre 2007/2008

1 o Semestre 2007/2008 Departamento de Engenharia Informática Instituto Superior Técnico 1 o Semestre 2007/2008 Outline 1 2 3 4 5 Outline 1 2 3 4 5 Exploiting Text How is text exploited? Two main directions Extraction Extraction

More information

Horizontal IoT Application Development using Semantic Web Technologies

Horizontal IoT Application Development using Semantic Web Technologies Horizontal IoT Application Development using Semantic Web Technologies Soumya Kanti Datta Research Engineer Communication Systems Department Email: Soumya-Kanti.Datta@eurecom.fr Roadmap Introduction Challenges

More information

LIST OF FIGURES. Figure No. Caption Page No.

LIST OF FIGURES. Figure No. Caption Page No. LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS

More information

How To Get A Financial Aid Award In Athena

How To Get A Financial Aid Award In Athena Athena Self-Service Walkthrough By the UGA Office of Student Financial Aid 220 Holmes/Hunter Academic Building Athens, GA 30602-6114 Phone: (706) 542-6147 Section 1 How to Find Out What is Needed by the

More information

Introduction. A. Bellaachia Page: 1

Introduction. A. Bellaachia Page: 1 Introduction 1. Objectives... 3 2. What is Data Mining?... 4 3. Knowledge Discovery Process... 5 4. KD Process Example... 7 5. Typical Data Mining Architecture... 8 6. Database vs. Data Mining... 9 7.

More information

TABLE OF CONTENTS ABSTRACT ACKNOWLEDGEMENT LIST OF FIGURES LIST OF TABLES

TABLE OF CONTENTS ABSTRACT ACKNOWLEDGEMENT LIST OF FIGURES LIST OF TABLES TABLE OF CONTENTS ABSTRACT ACKNOWLEDGEMENT LIST OF FIGURES LIST OF TABLES ii iii x xiv CHAPTER 1: INTRODUCTION 1 1.0 Background 1 1.1 Research Motivation 4 1.2 Research Objectives 5 1.3 Project Scope 6

More information

IC05 Introduction on Networks &Visualization Nov. 2009. <mathieu.bastian@gmail.com>

IC05 Introduction on Networks &Visualization Nov. 2009. <mathieu.bastian@gmail.com> IC05 Introduction on Networks &Visualization Nov. 2009 Overview 1. Networks Introduction Networks across disciplines Properties Models 2. Visualization InfoVis Data exploration

More information

Data Warehousing in the Age of Big Data

Data Warehousing in the Age of Big Data Data Warehousing in the Age of Big Data Krish Krishnan AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD * PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Morgan Kaufmann is an imprint of Elsevier

More information

Hadoop Technology for Flow Analysis of the Internet Traffic

Hadoop Technology for Flow Analysis of the Internet Traffic Hadoop Technology for Flow Analysis of the Internet Traffic Rakshitha Kiran P PG Scholar, Dept. of C.S, Shree Devi Institute of Technology, Mangalore, Karnataka, India ABSTRACT: Flow analysis of the internet

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference to

More information

CSC4290: Introduction to Computer Networking. Hongwei Zhang http://www.cs.wayne.edu/~hzhang

CSC4290: Introduction to Computer Networking. Hongwei Zhang http://www.cs.wayne.edu/~hzhang CSC4290: Introduction to Computer Networking Hongwei Zhang http://www.cs.wayne.edu/~hzhang Objectives of the course Ultimate goal: you can build any network (including the Internet) from scratch up! Humble

More information

Developing. and Securing. the Cloud. Bhavani Thuraisingham CRC. Press. Taylor & Francis Group. Taylor & Francis Croup, an Informs business

Developing. and Securing. the Cloud. Bhavani Thuraisingham CRC. Press. Taylor & Francis Group. Taylor & Francis Croup, an Informs business Developing and Securing the Cloud Bhavani Thuraisingham @ CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an Informs business AN AUERBACH

More information

ehealth FORUM 2015 FINAL PROGRAMME THURSDAY 3/12/2015 OLYMPIA 1 HALL

ehealth FORUM 2015 FINAL PROGRAMME THURSDAY 3/12/2015 OLYMPIA 1 HALL ehealth FORUM 2015 FINAL PROGRAMME 8.00-9.00 Welcome & Registration THURSDAY 3/12/2015 OLYMPIA 1 HALL 9.00-9.30 Official Opening Alexander Berler, Chair HL7 Hellas, Chair of the ehealth Forum Organising

More information

Auditing EMR System Usage. You Chen Jan, 17, 2013 You.chen@vanderbilt.edu

Auditing EMR System Usage. You Chen Jan, 17, 2013 You.chen@vanderbilt.edu Auditing EMR System Usage You Chen Jan, 17, 2013 You.chen@vanderbilt.edu Health data being accessed by hackers, lost with laptop computers, or simply read by curious employees Anomalous Usage You Chen,

More information

An Enhanced Automated, Distributed, SLA for. Dynamic Infrastructure Management in Real. Cloud Environment Using SEQ-BP(R)M.

An Enhanced Automated, Distributed, SLA for. Dynamic Infrastructure Management in Real. Cloud Environment Using SEQ-BP(R)M. Contemporary Engineering Sciences, Vol. 8, 2015, no. 13, 557-566 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2015.5388 An Enhanced Automated, Distributed, SLA for Dynamic Infrastructure

More information

Practical Applications of DATA MINING. Sang C Suh Texas A&M University Commerce JONES & BARTLETT LEARNING

Practical Applications of DATA MINING. Sang C Suh Texas A&M University Commerce JONES & BARTLETT LEARNING Practical Applications of DATA MINING Sang C Suh Texas A&M University Commerce r 3 JONES & BARTLETT LEARNING Contents Preface xi Foreword by Murat M.Tanik xvii Foreword by John Kocur xix Chapter 1 Introduction

More information

Table of Contents. Chapter No. 1 Introduction 1. iii. xiv. xviii. xix. Page No.

Table of Contents. Chapter No. 1 Introduction 1. iii. xiv. xviii. xix. Page No. Table of Contents Title Declaration by the Candidate Certificate of Supervisor Acknowledgement Abstract List of Figures List of Tables List of Abbreviations Chapter Chapter No. 1 Introduction 1 ii iii

More information

An Introduction to Data Mining. Big Data World. Related Fields and Disciplines. What is Data Mining? 2/12/2015

An Introduction to Data Mining. Big Data World. Related Fields and Disciplines. What is Data Mining? 2/12/2015 An Introduction to Data Mining for Wind Power Management Spring 2015 Big Data World Every minute: Google receives over 4 million search queries Facebook users share almost 2.5 million pieces of content

More information

USTC Course for students entering Clemson F2013 Equivalent Clemson Course Counts for Clemson MS Core Area. CPSC 822 Case Study in Operating Systems

USTC Course for students entering Clemson F2013 Equivalent Clemson Course Counts for Clemson MS Core Area. CPSC 822 Case Study in Operating Systems USTC Course for students entering Clemson F2013 Equivalent Clemson Course Counts for Clemson MS Core Area 398 / SE05117 Advanced Cover software lifecycle: waterfall model, V model, spiral model, RUP and

More information

INFORMATION SYSTEMS AND TECHNOLOGY MANAGEMENT

INFORMATION SYSTEMS AND TECHNOLOGY MANAGEMENT INFORMATION SYSTEMS AND TECHNOLOGY MANAGEMENT UNDERGRADUATE Bachelor's programs Bachelor of Business Administration with a concentration in information systems and technology management (http:// bulletin.gwu.edu/business/undergraduate-programs/

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) 315 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference

More information

Web Mining. Margherita Berardi LACAM. Dipartimento di Informatica Università degli Studi di Bari berardi@di.uniba.it

Web Mining. Margherita Berardi LACAM. Dipartimento di Informatica Università degli Studi di Bari berardi@di.uniba.it Web Mining Margherita Berardi LACAM Dipartimento di Informatica Università degli Studi di Bari berardi@di.uniba.it Bari, 24 Aprile 2003 Overview Introduction Knowledge discovery from text (Web Content

More information

Business Administration of Windchill PDMLink 10.0

Business Administration of Windchill PDMLink 10.0 Business Administration of Windchill PDMLink 10.0 Overview Course Code Course Length TRN-3160-T 3 Days After completing this course, you will be well prepared to set up and manage a basic Windchill PDMLink

More information

EXPRESSION OF INTEREST FOR CELL (MOBILE) PHONES, CELL PHONE SERVICE AND DATA SERVICE [EOI # 06/2015]

EXPRESSION OF INTEREST FOR CELL (MOBILE) PHONES, CELL PHONE SERVICE AND DATA SERVICE [EOI # 06/2015] EXPRESSION OF INTEREST FOR CELL (MOBILE) PHONES, CELL PHONE SERVICE AND DATA SERVICE [EOI # 06/2015] 1.0 PURPOSE OF EXPRESSION OF INTEREST The purpose of this Expression of Interest (EOI) is to enter into

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

A Novel Cloud Based Elastic Framework for Big Data Preprocessing

A Novel Cloud Based Elastic Framework for Big Data Preprocessing School of Systems Engineering A Novel Cloud Based Elastic Framework for Big Data Preprocessing Omer Dawelbeit and Rachel McCrindle October 21, 2014 University of Reading 2008 www.reading.ac.uk Overview

More information