Author Index. Domańska, Adam, 137 Domańska, Joanna, 137 Draief, Moez, 357 Drosou, Anastasios, 193 Düzağaç, Remzi, 277

Size: px
Start display at page:

Download "Author Index. Domańska, Adam, 137 Domańska, Joanna, 137 Draief, Moez, 357 Drosou, Anastasios, 193 Düzağaç, Remzi, 277"

Transcription

1 Author Index A Abul, Osman, 305 Akgul, Yusuf Sinan, 61 Aleçakır, Kemal, 259 Amar, Patrick, 387 Arifoğlu, Damla, 259 Domańska, Adam, 137 Domańska, Joanna, 137 Draief, Moez, 357 Drosou, Anastasios, 193 Düzağaç, Remzi, 277 B Babaee, Arta, 357 Baillieul, Muriel, 387 Barth, Dominique, 387 Bayır, Murat Ali, 51 Bi, Huibo, 41 C Cetiner, Meltem, 61 Cetin, Yigit, 305 Cicekli, Nihan Kesim, 285 Comunello, Eros, 105 Coplu, Tolga, 3 Cosar, Ahmet, 51 Czachórski, Tadeusz, 137, 249 D Dao Thi, Thu Ha, 337 Delosières, Laurent, 175 Demircioğlu, Deniz, 367 Demir, Onur, 185 Deniz, Onur, 259 Desmet, Antoine, 13 Dias, Bruno, 145 Dimitriou, Ioannis, 217 Dogan, Abdullah, 269 Dokeroglu, Tansel, 51 F Foremski, Paweł, 125 Fourneau, Jean-Michel, 337 Franco, Cristiano Roberto, 105 G Garcia Perez, David, 117 Gawron, Piotr, 207 Gelenbe, Erol, 13, 33, 41, 159 Gorawska, Anna, 295 Gorawski, Marcin, 295 Gorawski, Michał, 125 Gorbil, Gokce, 117 Gören, Sezer, 185 Grochla, Krzysztof, 125, 407 Güniçen, Canan, 325 Gursoy, Attila, 367 H Hareżlak, Katarzyna, 97 Huang, Fan, 21 Huedo Cuesta, Eduardo, 117 I İnan, Kemal, 325 Springer International Publishing Switzerland 2014 T. Czachórski et al. (eds.), Information Sciences and Systems 2014, DOI /

2 420 Author Index J Jean-Marie, Alain, 317 K Karagoz, Pinar, 269 Kasprowski, Paweł, 97 Keskin, Özlem, 367 Kırcalı, Doğan, 69 Krichen, Saoussen, 79 Kuehlkamp, Andrey, 105 Küçük, Dilek, 87 Küçük, Doğan, 87 Kurzyk, Dariusz, 207 L LeCun, Bertrand, 387 Lee, Seongjin, 395 M Mavroudis, Vasilios, 193 Morad, Olivia, 317 Morozov, Evsey, 229 Mutlu, Alev, 269 N Nicolau, Maria João, 145 Nycz, Monika, 249 Nycz, Tomasz, 249 O Oktug, Sema F., 3 Oommen, John, 167 P Papadopoulos, Stavros, 193 Park, Chanhyun, 395 Pasterak, Krzysztof, 295 Pavlakou, Theo, 357 Pavloski, Mihajlo, 159 Pekergin, Ferhan, 249 Pekergin, Nihal, 337 Q Qin, Ke, 167 Queiros, Pedro, 145 Quessette, Franck, 337, 387 R Rak, Tomasz, 239 Rogowski, Jan, 345 Rostanski, Maciej, 407 S Sánchez, Antonio, 175 Santos, Alexandre, 145 Seman, Aleksander, 407 Szczęsna, Agnieszka, 377 T Tarakci, Hilal, 285 Tarasiuk, Halina, 345 Tek, Boray, 69 Tlili, Takwa, 79 Tomasik, Joanna, 21 Turhan Yöndem, Meltem, 259 Turk, Yusuf, 185 Türker, Uraz Cengiz, 325 Tzovaras, Dimitrios, 193 V Veque, Véronique, 21 Vial, Sandrine, 387 W Wang, Lan, 33 Wałach, Anna, 377 Won, Youjip, 395 Y Yazıcı, Adnan, 87 Yenigün, Hüsnü, 325 Yıldız, Olcay Taner, 277

3 Subject Index A Ad hoc cognitive packet networks, 41 Android, 177, 178, 180 Anomaly detection, 195, 198 Application, 126, 130, 410 A-star heuristics, 59 Autonomic communications, 88 Autonomous robot navigation, 69 B Bag-of-words, 262, 264, 267 Basic fairness, 346 Beamforming, 22 Betweenness analysis, 373, 374 Binary relevance, 62, 64 Bioinformatic, 87 Biological in silico simulation, 393 BOBpp, 389 Borda count, 262, 265 Coordinated emergency navigation, 47 Coverage lists, 272 CPN, 13, 15, 18 Cryptanalysis, 168 Cryptographic systems, 168 D Data analysis, 310 Data mining, 110, 295 Data stream processing, 295, 296, 301 Decision support system, 80, 85 Depth-map, 75 Diffusion approximation, 251, 252 Disk array, 395 Disk I/O performance, 395, 396 Distributed computing, 307 Distributed systems, 408 Domain ontology, 87, 88 Dynamic fault trees, 337 C Channel access, 4, 8 10 Chaotic neural networks, 168 Class-dependent service time, 230 Clock synchronization, 146 Cloud computing, 306 Cloud monitoring, 118, 119 Cloud monitoring tools, 121, 123 Co-existence, 3, 4 Cognitive packet network, 42, 119 Cognitive radio, 4, 5 Collector, 175 Computer vision, 106, 109 Concept discovery, 269, 270 Context extraction, 279, 281 E Encryption using chaos, 168 Engset model, 255 Erlang model, 255 Eye movement, 98 F Face recognition, 106 Finite-state machines, 326 Flash memory, 399 Fuzzy ontology extensions, 88, 90 G GIS, 80 Springer International Publishing Switzerland 2014 T. Czachórski et al. (eds.), Information Sciences and Systems 2014, DOI /

4 422 Subject Index Graphical model, 62, 64 Ground plane detection, 69, 70 H Haptic manipulator, 378 High availability, 408, 409 Honeyclient, 177, 182 Hsim, 389, 394 Hurst parameter, 138, 143 Hypergraph user model, 286, 292 I ICD-10-CM, 264 IEEE , 3 5 IEEE , 3 5, 7 Information retrieval, 278 Infrastructure-less, 47 Integer linear programming, 53 Internet traffic, 125, 140 Iris detection, 106, 108, 111 K Kinect, 69, 70 L Label dependency, 65, 67 Long-range dependence, 137, 138 Low cost, 186, 188 LTE, 126, 127, 134 Lucene Search Engine, 261, 265, 267 M MapReduce with Hadoop, 312 Markov model, 249, 255 Measurements, 5, 7, 8, 18, 118 Medical information extraction, 261 Middleware, 407, 409, 416 Mitigation, 4, 160, 201 Mobile network security, 160, 195 Model-based testing, 325 Multiclass multiserver system, 230 Multi-label classification, 61 Multiple query optimization, 51 N Natural language processing, 260 Network monitoring, 146, 147, 186 Network routing, 13 O Obstacle detection, 69 Optimal control, 318, 319 Optimisation, 216 Overload control mechanisms, 345, 346, 348 P Packet capture, 187, 191 Packet routing algorithm, 119 Parallel algorithm, 390 Parallelization, 270, 390, 393 Performance analysis, 217, 241 Performance evaluation, 28, 88, 125 Pervasive monitoring, 118, 119, 123 Power saving, 225 Prefetching, 317, 318, 320 Preset distinguishing sequence, 326 Protein protein interaction, 368, 371 Protein protein interaction networks, 368 Pruning, 270, 271, Q QoS probes, 43, 119, 120, 147, 154, 200 Quality of service, 230, 237 Quantum walks, 207, 209, 216 Queueing petri nets, 240, 241 Queueing systems, 216, 229, 230 Queueing theory, 249 R Radio resource control, 159, 160 RAID, 395, 396 RAID configuration, 398, 400, 401, 404 Random neural networks, 13, 43, 119 Raspberry pi, 186, 187 RB allocation, RDFS reasoning, 306, 307, 310 Real time, 106, 111, 389 Real time packet monitoring, 188 Real-time processing, 295, 296 Regeneration, 230, 231, 236, 237 Rehabilitation, , 384 Reliability, 117, 337, 373 Renewal theory, 232 RGB-D, 69, 76 RNN, S Scalability, 62, 119 Scheduling, 244

5 Subject Index 423 Search engine, , 282, 283 Self-similarity, 137, 138, 142 Semantic web, 87, 305 Serious game, 378, 381 Server-dependent service time, 230 Signaling attack, , 164, 194 Signaling system, , 353 Simulation, 42, 46, 47, 218, 227, 239, 241, 353 SIP protocol, , 350 Sniffing, 186, 188 Sparse PCA, 357, 358, 364 SSD, Stability criterion, 230 Support, 198, T TCP, 127, 130, 131, 134, 189 Text processing applications, 88, 92, 95 Tool comparison, 301, 378 Traffic source, 125, 126 Twitter, 358, 361, 364 U UMTS, User modeling, 286, 287 User profile, 286 V Vacation models, 220 V-disparity, 70 Vehicle routing problem, 79 Visualization, 121, 122, 194, 197 Voice over IP, 345, 346 W Wireless networks, 10, 125, 160, 188, 217 Wireless systems, 217, 227

A Novel Unsupervised Method for Securing BGP Against Routing Hijacks... 21 Georgios Theodoridis, Orestis Tsigkas and Dimitrios Tzovaras

A Novel Unsupervised Method for Securing BGP Against Routing Hijacks... 21 Georgios Theodoridis, Orestis Tsigkas and Dimitrios Tzovaras Contents Part I Smart Systems and Networks Finite-State Robots in the Land of Rationalia.... 3 Arnold L. Rosenberg Cognitive Packets in Large Virtual Networks... 13 Ricardo Lent and Erol Gelenbe A Novel

More information

Wednesday, September 23

Wednesday, September 23 Wednesday, September 23 08.30 09.00 Registration 09.00 09.15 Welcome and Opening Remarks Prof Ali Doğramacı (Bilkent University) 09.15 09.30 ISCIS History and Erol Gelenbe s contributions Prof M. Ufuk

More information

Doctor of Philosophy in Computer Science

Doctor of Philosophy in Computer Science Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects

More information

HET-NETs 2010. Zakopane, Poland, January 14-16 th, 2010 CONFERENCE PROGRAMME

HET-NETs 2010. Zakopane, Poland, January 14-16 th, 2010 CONFERENCE PROGRAMME HET-NETs 2010 6 TH WORKING INTERNATIONAL CONFERENCE ON Performance Modelling and Evaluation of Heterogeneous Networks Zakopane, Poland, January 14-16 th, 2010 CONFERENCE PROGRAMME Thursday 14.01.2010 9.00

More information

Master of Science in Computer Science

Master of Science in Computer Science Master of Science in Computer Science Background/Rationale The MSCS program aims to provide both breadth and depth of knowledge in the concepts and techniques related to the theory, design, implementation,

More information

IEEE 2015-2016 JAVA TITLES

IEEE 2015-2016 JAVA TITLES ECWAY ECHNOLGIES IEEE 2015-2016 JAVA TITLES BE, B.TECH, ME, M.TECH, MSC, MCA PROJECTS Abstract: Introduction: Literature Survey: System Analysis: Existing System: Disadvantages: Proposed System: Advantages:

More information

Massive Cloud Auditing using Data Mining on Hadoop

Massive Cloud Auditing using Data Mining on Hadoop Massive Cloud Auditing using Data Mining on Hadoop Prof. Sachin Shetty CyberBAT Team, AFRL/RIGD AFRL VFRP Tennessee State University Outline Massive Cloud Auditing Traffic Characterization Distributed

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) 305 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference

More information

A Cooperative Emergency Navigation Framework using Mobile Cloud Computing

A Cooperative Emergency Navigation Framework using Mobile Cloud Computing A Cooperative Emergency Navigation Framework using Mobile Cloud Computing Huibo Bi and Erol Gelenbe Abstract The use of wireless sensor networks (WSNs) for emergency navigation systems suffer disadvantages

More information

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference to

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) 244 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference

More information

Cloud Enabled Emergency Navigation Using Faster-than-real-time Simulation

Cloud Enabled Emergency Navigation Using Faster-than-real-time Simulation Cloud Enabled Emergency Navigation Using Faster-than-real-time Simulation Huibo Bi and Erol Gelenbe Intelligent Systems and Networks Group Department of Electrical and Electronic Engineering Imperial College

More information

The Polish Teletraffic Symposium - A Review

The Polish Teletraffic Symposium - A Review Proceedings of the 14 th Polish Teletraffic Symposium Zakopane, 20-21 September 2007. EDITOR Tadeusz Czachórski Gliwice 2007 ORGANISER Institute of Theoretical and Applied Informatics of the Polish Academy

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) 299 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference

More information

Assessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce

Assessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce Assessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce Program Objective #1 (PO1):Students will be able to demonstrate a broad knowledge of Computer Science

More information

SYLLABUSES FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (applicable to students admitted in the academic year 2015-2016 and thereafter)

SYLLABUSES FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (applicable to students admitted in the academic year 2015-2016 and thereafter) MSc(CompSc)-1 (SUBJECT TO UNIVERSITY S APPROVAL) SYLLABUSES FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (applicable to students admitted in the academic year 2015-2016 and thereafter) The curriculum

More information

SURVEY REPORT DATA SCIENCE SOCIETY 2014

SURVEY REPORT DATA SCIENCE SOCIETY 2014 SURVEY REPORT DATA SCIENCE SOCIETY 2014 TABLE OF CONTENTS Contents About the Initiative 1 Report Summary 2 Participants Info 3 Participants Expertise 6 Suggested Discussion Topics 7 Selected Responses

More information

Big Data Systems CS 5965/6965 FALL 2014

Big Data Systems CS 5965/6965 FALL 2014 Big Data Systems CS 5965/6965 FALL 2014 Today General course overview Q&A Introduction to Big Data Data Collection Assignment #1 General Course Information Course Web Page http://www.cs.utah.edu/~hari/teaching/fall2014.html

More information

Is a Data Scientist the New Quant? Stuart Kozola MathWorks

Is a Data Scientist the New Quant? Stuart Kozola MathWorks Is a Data Scientist the New Quant? Stuart Kozola MathWorks 2015 The MathWorks, Inc. 1 Facts or information used usually to calculate, analyze, or plan something Information that is produced or stored by

More information

Study Plan Masters of Science in Computer Engineering and Networks (Thesis Track)

Study Plan Masters of Science in Computer Engineering and Networks (Thesis Track) Plan Number 2009 Study Plan Masters of Science in Computer Engineering and Networks (Thesis Track) I. General Rules and Conditions 1. This plan conforms to the regulations of the general frame of programs

More information

All modules are assessed through examination (0%-100%) and/or coursework assessment (0%- 100%).

All modules are assessed through examination (0%-100%) and/or coursework assessment (0%- 100%). MSc(CompSc)-1 SYLLABUS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE The curriculum extends over two to three academic years for the part-time mode of study or one to two academic years for the

More information

Revistas IEEE ANII 2009

Revistas IEEE ANII 2009 Revistas IEEE ANII 2009 Advanced Packaging, IEEE Transactions on Aerospace and Electronic Systems Magazine, IEEE Aerospace and Electronic Systems, IEEE Transactions on American Institute of Electrical

More information

Master s Program in Information Systems

Master s Program in Information Systems The University of Jordan King Abdullah II School for Information Technology Department of Information Systems Master s Program in Information Systems 2006/2007 Study Plan Master Degree in Information Systems

More information

ANALYTICS IN BIG DATA ERA

ANALYTICS IN BIG DATA ERA ANALYTICS IN BIG DATA ERA ANALYTICS TECHNOLOGY AND ARCHITECTURE TO MANAGE VELOCITY AND VARIETY, DISCOVER RELATIONSHIPS AND CLASSIFY HUGE AMOUNT OF DATA MAURIZIO SALUSTI SAS Copyr i g ht 2012, SAS Ins titut

More information

01219211 Software Development Training Camp 1 (0-3) Prerequisite : 01204214 Program development skill enhancement camp, at least 48 person-hours.

01219211 Software Development Training Camp 1 (0-3) Prerequisite : 01204214 Program development skill enhancement camp, at least 48 person-hours. (International Program) 01219141 Object-Oriented Modeling and Programming 3 (3-0) Object concepts, object-oriented design and analysis, object-oriented analysis relating to developing conceptual models

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) 315 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference

More information

Sanjeev Kumar. contribute

Sanjeev Kumar. contribute RESEARCH ISSUES IN DATAA MINING Sanjeev Kumar I.A.S.R.I., Library Avenue, Pusa, New Delhi-110012 sanjeevk@iasri.res.in 1. Introduction The field of data mining and knowledgee discovery is emerging as a

More information

A Model-based Methodology for Developing Secure VoIP Systems

A Model-based Methodology for Developing Secure VoIP Systems A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN

More information

Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008

Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008 Professional Organization Checklist for the Computer Science Curriculum Updates Association of Computing Machinery Computing Curricula 2008 The curriculum guidelines can be found in Appendix C of the report

More information

Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup

Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup Network Anomaly Detection A Machine Learning Perspective Dhruba Kumar Bhattacharyya Jugal Kumar KaKta»C) CRC Press J Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor

More information

How To Get A Computer Engineering Degree

How To Get A Computer Engineering Degree COMPUTER ENGINEERING GRADUTE PROGRAM FOR MASTER S DEGREE (With Thesis) PREPARATORY PROGRAM* COME 27 Advanced Object Oriented Programming 5 COME 21 Data Structures and Algorithms COME 22 COME 1 COME 1 COME

More information

Should and Can a Communication System. Adapt Pervasively An Unofficial View http://san.ee.ic.ac.uk

Should and Can a Communication System. Adapt Pervasively An Unofficial View http://san.ee.ic.ac.uk Should and Can a Communication System MSOffice1 Adapt Pervasively An Unofficial View http://san.ee.ic.ac.uk Erol Gelenbe www.ee.ic.ac.uk/gelenbe Imperial College London SW7 2BT e.gelenbe@imperial.ac.uk

More information

IEEE JAVA Project 2012

IEEE JAVA Project 2012 IEEE JAVA Project 2012 Powered by Cloud Computing Cloud Computing Security from Single to Multi-Clouds. Reliable Re-encryption in Unreliable Clouds. Cloud Data Production for Masses. Costing of Cloud Computing

More information

Data Mining and Pattern Recognition for Large-Scale Scientific Data

Data Mining and Pattern Recognition for Large-Scale Scientific Data Data Mining and Pattern Recognition for Large-Scale Scientific Data Chandrika Kamath Center for Applied Scientific Computing Lawrence Livermore National Laboratory October 15, 1998 We need an effective

More information

How To Protect Your Mobile From Attack From A Signalling Storm

How To Protect Your Mobile From Attack From A Signalling Storm ICL, TUB, CERTH, Telecom Italia IT, COSMOTE, HISPASEC Erol Gelenbe Fellow of the French National Academy of Engineering Dynamic Real-Time Security for Seamless Service Provisioning in the Mobile Ecosystem

More information

Graduate Co-op Students Information Manual. Department of Computer Science. Faculty of Science. University of Regina

Graduate Co-op Students Information Manual. Department of Computer Science. Faculty of Science. University of Regina Graduate Co-op Students Information Manual Department of Computer Science Faculty of Science University of Regina 2014 1 Table of Contents 1. Department Description..3 2. Program Requirements and Procedures

More information

Development of Integrated Management System based on Mobile and Cloud service for preventing various dangerous situations

Development of Integrated Management System based on Mobile and Cloud service for preventing various dangerous situations Development of Integrated Management System based on Mobile and Cloud service for preventing various dangerous situations Ryu HyunKi, Moon ChangSoo, Yeo ChangSub, and Lee HaengSuk Abstract In this paper,

More information

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India Call for Papers Cloud computing has emerged as a de facto computing

More information

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006 Core Syllabus C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS Version 2.6 June 2006 EUCIP CORE Version 2.6 Syllabus. The following is the Syllabus for EUCIP CORE Version 2.6, which

More information

2010-2011 Assessment for Master s Degree Program Fall 2010 - Spring 2011 Computer Science Dept. Texas A&M University - Commerce

2010-2011 Assessment for Master s Degree Program Fall 2010 - Spring 2011 Computer Science Dept. Texas A&M University - Commerce 2010-2011 Assessment for Master s Degree Program Fall 2010 - Spring 2011 Computer Science Dept. Texas A&M University - Commerce Program Objective #1 (PO1):Students will be able to demonstrate a broad knowledge

More information

Challenges for Data Driven Systems

Challenges for Data Driven Systems Challenges for Data Driven Systems Eiko Yoneki University of Cambridge Computer Laboratory Quick History of Data Management 4000 B C Manual recording From tablets to papyrus to paper A. Payberah 2014 2

More information

Cisco Network Foundation Protection Overview

Cisco Network Foundation Protection Overview Cisco Network Foundation Protection Overview June 2005 1 Security is about the ability to control the risk incurred from an interconnected global network. Cisco NFP provides the tools, technologies, and

More information

Course Descriptions - Computer Science and Software Engineering

Course Descriptions - Computer Science and Software Engineering One of the nation's top undergraduate engineering, science, and mathematics colleges Course Descriptions - Computer Science and Software Engineering Professors Anderson, Boutell, Chenoweth, Chidanandan,

More information

Data Mining for Network Intrusion Detection

Data Mining for Network Intrusion Detection Data Mining for Network Intrusion Detection S Terry Brugger UC Davis Department of Computer Science Data Mining for Network Intrusion Detection p.1/55 Overview This is important for defense in depth Much

More information

ANALYTICS IN BIG DATA ERA

ANALYTICS IN BIG DATA ERA ANALYTICS IN BIG DATA ERA ANALYTICS TECHNOLOGY AND ARCHITECTURE TO MANAGE VELOCITY AND VARIETY, DISCOVER RELATIONSHIPS AND CLASSIFY HUGE AMOUNT OF DATA MAURIZIO SALUSTI SAS Copyr i g ht 2012, SAS Ins titut

More information

IMAV: An Intelligent Multi-Agent Model Based on Cloud Computing for Resource Virtualization

IMAV: An Intelligent Multi-Agent Model Based on Cloud Computing for Resource Virtualization 2011 International Conference on Information and Electronics Engineering IPCSIT vol.6 (2011) (2011) IACSIT Press, Singapore IMAV: An Intelligent Multi-Agent Model Based on Cloud Computing for Resource

More information

Big Data, Fast Data, Complex Data. Jans Aasman Franz Inc

Big Data, Fast Data, Complex Data. Jans Aasman Franz Inc Big Data, Fast Data, Complex Data Jans Aasman Franz Inc Private, founded 1984 AI, Semantic Technology, professional services Now in Oakland Franz Inc Who We Are (1 (2 3) (4 5) (6 7) (8 9) (10 11) (12

More information

2014 Voluntary Page and Overlength Article Charges

2014 Voluntary Page and Overlength Article Charges 2014 and NOTE: page charges do not apply to open access articles. Title Aerospace & Electronic $200 10 4 Aerospace & Electronic Affective Computing Annals of the History of Computing Antennas & Propagation

More information

INFORMATION TECHNOLOGY PROGRAM

INFORMATION TECHNOLOGY PROGRAM INFORMATION TECHNOLOGY PROGRAM The School of Information Technology offers a two-year bachelor degree program in Information Technology for students having acquired an advanced vocational certificate.

More information

The regulations below are subject to University s approval and are applicable to students admitted to the curriculum in 2014-2015 and thereafter.

The regulations below are subject to University s approval and are applicable to students admitted to the curriculum in 2014-2015 and thereafter. MSc(CompSc)-1 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) The regulations below are subject to University s approval and are applicable to students admitted to the

More information

United States Trustee Program s Wireless LAN Security Checklist

United States Trustee Program s Wireless LAN Security Checklist United States Trustee Program s Wireless LAN Security Checklist In support of a standing trustee s proposed implementation of Wireless Access Points (WAP) in ' 341 meeting rooms and courtrooms, the following

More information

Azure Machine Learning, SQL Data Mining and R

Azure Machine Learning, SQL Data Mining and R Azure Machine Learning, SQL Data Mining and R Day-by-day Agenda Prerequisites No formal prerequisites. Basic knowledge of SQL Server Data Tools, Excel and any analytical experience helps. Best of all:

More information

Enabling Multi-pipeline Data Transfer in HDFS for Big Data Applications

Enabling Multi-pipeline Data Transfer in HDFS for Big Data Applications Enabling Multi-pipeline Data Transfer in HDFS for Big Data Applications Liqiang (Eric) Wang, Hong Zhang University of Wyoming Hai Huang IBM T.J. Watson Research Center Background Hadoop: Apache Hadoop

More information

OPNET Network Simulator

OPNET Network Simulator Simulations and Tools for Telecommunications 521365S: OPNET Network Simulator Jarmo Prokkola Research team leader, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,

More information

Computer Science MS Course Descriptions

Computer Science MS Course Descriptions Computer Science MS Course Descriptions CSc I0400: Operating Systems Underlying theoretical structure of operating systems; input-output and storage systems, data management and processing; assembly and

More information

EPL 657 Wireless Networks

EPL 657 Wireless Networks EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing

More information

Chapter 1. Introduction

Chapter 1. Introduction Chapter 1 Introduction 1.1. Motivation Network performance analysis, and the underlying queueing theory, was born at the beginning of the 20th Century when two Scandinavian engineers, Erlang 1 and Engset

More information

YILDIRIM BEYAZIT UNIVERSITY INSTITUTE OF SCIENCES DATES AND LOCATIONS OF FINAL EXAMS JUNE 01-14 2015

YILDIRIM BEYAZIT UNIVERSITY INSTITUTE OF SCIENCES DATES AND LOCATIONS OF FINAL EXAMS JUNE 01-14 2015 COMPUTER ENGINEERING CODE Course Title and Responsible Location CENG 503 CENG 506 CENG 512 CENG 514 CENG 519 Computer Aided 3D Facial Reconstruction Dr. Özgür Bulut Advanced Data Mining Dr. Baha ŞEN Optimisation

More information

Principles of Data Mining by Hand&Mannila&Smyth

Principles of Data Mining by Hand&Mannila&Smyth Principles of Data Mining by Hand&Mannila&Smyth Slides for Textbook Ari Visa,, Institute of Signal Processing Tampere University of Technology October 4, 2010 Data Mining: Concepts and Techniques 1 Differences

More information

Assignment # 1 (Cloud Computing Security)

Assignment # 1 (Cloud Computing Security) Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

Big Data Mining Services and Knowledge Discovery Applications on Clouds

Big Data Mining Services and Knowledge Discovery Applications on Clouds Big Data Mining Services and Knowledge Discovery Applications on Clouds Domenico Talia DIMES, Università della Calabria & DtoK Lab Italy talia@dimes.unical.it Data Availability or Data Deluge? Some decades

More information

Artificial Intelligence and Robotics @ Politecnico di Milano. Presented by Matteo Matteucci

Artificial Intelligence and Robotics @ Politecnico di Milano. Presented by Matteo Matteucci 1 Artificial Intelligence and Robotics @ Politecnico di Milano Presented by Matteo Matteucci What is Artificial Intelligence «The field of theory & development of computer systems able to perform tasks

More information

MEng, BSc Applied Computer Science

MEng, BSc Applied Computer Science School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions

More information

Big Data Systems CS 5965/6965 FALL 2015

Big Data Systems CS 5965/6965 FALL 2015 Big Data Systems CS 5965/6965 FALL 2015 Today General course overview Expectations from this course Q&A Introduction to Big Data Assignment #1 General Course Information Course Web Page http://www.cs.utah.edu/~hari/teaching/fall2015.html

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015 RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering

More information

Towards Visualizing mobile network data

Towards Visualizing mobile network data Towards Visualizing mobile network data Stavros Papadopoulos and Dimitrios Tzovaras Abstract This paper presents the research directions that the visualization in the NEMESYS project will follow, so as

More information

School of Computer Science

School of Computer Science School of Computer Science Computer Science - Honours Level - 2014/15 October 2014 General degree students wishing to enter 3000- level modules and non- graduating students wishing to enter 3000- level

More information

Articles IEEE have removed from their database

Articles IEEE have removed from their database Articles IEEE have removed from their database Application of Game-Theoretic and Virtual Algorithms in Information Retrieval System 2008 International Conference on MultiMedia and Information Technology

More information

Draft dpt for MEng Electronics and Computer Science

Draft dpt for MEng Electronics and Computer Science Draft dpt for MEng Electronics and Computer Science Year 1 INFR08012 Informatics 1 - Computation and Logic INFR08013 Informatics 1 - Functional Programming INFR08014 Informatics 1 - Object- Oriented Programming

More information

Communication and Embedded Systems: Towards a Smart Grid. Radu Stoleru, Alex Sprintson, Narasimha Reddy, and P. R. Kumar

Communication and Embedded Systems: Towards a Smart Grid. Radu Stoleru, Alex Sprintson, Narasimha Reddy, and P. R. Kumar Communication and Embedded Systems: Towards a Smart Grid Radu Stoleru, Alex Sprintson, Narasimha Reddy, and P. R. Kumar Alex Sprintson Smart grid communication Key enabling technology Collecting data Control

More information

PANDORA FMS NETWORK DEVICE MONITORING

PANDORA FMS NETWORK DEVICE MONITORING NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,

More information

TABLE OF CONTENTS. Dedication. Table of Contents. Preface. Overview of Wireless Networks. vii 1.1 1.2 1.3 1.4 1.5 1.6 1.7. xvii

TABLE OF CONTENTS. Dedication. Table of Contents. Preface. Overview of Wireless Networks. vii 1.1 1.2 1.3 1.4 1.5 1.6 1.7. xvii TABLE OF CONTENTS Dedication Table of Contents Preface v vii xvii Chapter 1 Overview of Wireless Networks 1.1 1.2 1.3 1.4 1.5 1.6 1.7 Signal Coverage Propagation Mechanisms 1.2.1 Multipath 1.2.2 Delay

More information

MSc(CompSc)-1. REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations)

MSc(CompSc)-1. REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) MSc(CompSc)-1 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain

More information

Embedded systems, networks and protocols research group. Ondřej Ryšavý 3rd Annual Conference of IT4Innovation 21.10.2014

Embedded systems, networks and protocols research group. Ondřej Ryšavý 3rd Annual Conference of IT4Innovation 21.10.2014 Embedded systems, networks and protocols research group Ondřej Ryšavý 3rd Annual Conference of IT4Innovation 21.10.2014 Embedded systems, networks and protocols research group Task: Design of embedded

More information

Internet of Things for Smart Crime Detection

Internet of Things for Smart Crime Detection Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 749-754 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4685 Internet of Things for Smart Crime Detection Jeong-Yong Byun, Aziz

More information

The University of Jordan

The University of Jordan The University of Jordan Master in Web Intelligence Non Thesis Department of Business Information Technology King Abdullah II School for Information Technology The University of Jordan 1 STUDY PLAN MASTER'S

More information

Development of Integrated Management System based on Mobile and Cloud Service for Preventing Various Hazards

Development of Integrated Management System based on Mobile and Cloud Service for Preventing Various Hazards , pp. 143-150 http://dx.doi.org/10.14257/ijseia.2015.9.7.15 Development of Integrated Management System based on Mobile and Cloud Service for Preventing Various Hazards Ryu HyunKi 1, Yeo ChangSub 1, Jeonghyun

More information

List of courses MEngg (Computer Systems)

List of courses MEngg (Computer Systems) List of courses MEngg (Computer Systems) Course No. Course Title Non-Credit Courses CS-401 CS-402 CS-403 CS-404 CS-405 CS-406 Introduction to Programming Systems Design System Design using Microprocessors

More information

MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL

MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL G. Maria Priscilla 1 and C. P. Sumathi 2 1 S.N.R. Sons College (Autonomous), Coimbatore, India 2 SDNB Vaishnav College

More information

Scalable NetFlow Analysis with Hadoop Yeonhee Lee and Youngseok Lee

Scalable NetFlow Analysis with Hadoop Yeonhee Lee and Youngseok Lee Scalable NetFlow Analysis with Hadoop Yeonhee Lee and Youngseok Lee {yhlee06, lee}@cnu.ac.kr http://networks.cnu.ac.kr/~yhlee Chungnam National University, Korea January 8, 2013 FloCon 2013 Contents Introduction

More information

Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies

Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com Image

More information

Test Coverage Criteria for Autonomous Mobile Systems based on Coloured Petri Nets

Test Coverage Criteria for Autonomous Mobile Systems based on Coloured Petri Nets 9th Symposium on Formal Methods for Automation and Safety in Railway and Automotive Systems Institut für Verkehrssicherheit und Automatisierungstechnik, TU Braunschweig, 2012 FORMS/FORMAT 2012 (http://www.forms-format.de)

More information

MEng, BSc Computer Science with Artificial Intelligence

MEng, BSc Computer Science with Artificial Intelligence School of Computing FACULTY OF ENGINEERING MEng, BSc Computer Science with Artificial Intelligence Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give

More information

Appendices master s degree programme Artificial Intelligence 2014-2015

Appendices master s degree programme Artificial Intelligence 2014-2015 Appendices master s degree programme Artificial Intelligence 2014-2015 Appendix I Teaching outcomes of the degree programme (art. 1.3) 1. The master demonstrates knowledge, understanding and the ability

More information

How To Get A Computer Science Degree

How To Get A Computer Science Degree MAJOR: DEGREE: COMPUTER SCIENCE MASTER OF SCIENCE (M.S.) CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING The Department of Computer Science offers a Master of Science

More information

PERFORMANCE ANALYSIS OF VIDEO CONFERENCING SOFTWARE IN TECHNOLOGY 802.11N NABILA BINTI RUSLAN

PERFORMANCE ANALYSIS OF VIDEO CONFERENCING SOFTWARE IN TECHNOLOGY 802.11N NABILA BINTI RUSLAN PERFORMANCE ANALYSIS OF VIDEO CONFERENCING SOFTWARE IN TECHNOLOGY 802.11N NABILA BINTI RUSLAN This report is submitted in partial fulfilment of the requirements for the Bachelor of Computer Science (Software

More information

PANDORA FMS NETWORK DEVICES MONITORING

PANDORA FMS NETWORK DEVICES MONITORING NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,

More information

Testing IVR Systems White Paper

Testing IVR Systems White Paper Testing IVR Systems Document: Nexus8610 IVR 05-2005 Issue date: Author: Issued by: 26MAY2005 Franz Neeser Senior Product Manager Nexus Telecom AG, Switzerland We work to improve your network Abstract Interactive

More information

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016 On the features and challenges of security and privacy in distributed internet of things C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016 Outline Introduction IoT (Internet of Things) A distributed IoT

More information

A distributed data processing architecture for real time intelligent transport systems

A distributed data processing architecture for real time intelligent transport systems A distributed data processing architecture for real time intelligent transport systems K. Nesenbergs (krisjanis.nesenbergs@edi.lv) L. Selavo (leo.selavo@edi.lv) Institute of Electronics and Computer Science

More information

LIST OF FIGURES. Figure No. Caption Page No.

LIST OF FIGURES. Figure No. Caption Page No. LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS

More information

Subject knowledge requirements for entry into computer science teacher training. Expert group s recommendations

Subject knowledge requirements for entry into computer science teacher training. Expert group s recommendations Subject knowledge requirements for entry into computer science teacher training Expert group s recommendations Introduction To start a postgraduate primary specialist or secondary ITE course specialising

More information

Cloud Computing Trends

Cloud Computing Trends UT DALLAS Erik Jonsson School of Engineering & Computer Science Cloud Computing Trends What is cloud computing? Cloud computing refers to the apps and services delivered over the internet. Software delivered

More information

Cisco IOS Flexible NetFlow Technology

Cisco IOS Flexible NetFlow Technology Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application

More information

CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA

CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA Professor Yang Xiang Network Security and Computing Laboratory (NSCLab) School of Information Technology Deakin University, Melbourne, Australia http://anss.org.au/nsclab

More information

INFORMATION SCIENCE. INFSCI 0010 INTRODUCTION TO INFORMATION SCIENCE 3 cr. INFSCI 0015 DATA STRUCTURES AND PROGRAMMING TECHNIQUES 3 cr.

INFORMATION SCIENCE. INFSCI 0010 INTRODUCTION TO INFORMATION SCIENCE 3 cr. INFSCI 0015 DATA STRUCTURES AND PROGRAMMING TECHNIQUES 3 cr. INFORMATION SCIENCE INFSCI 0010 INTRODUCTION TO INFORMATION SCIENCE 3 cr. Introduction to the concepts, principles, and skills of information science for students with no programming experience. Topics

More information

Core Courses Seminar (0-2) Non-credit Ph.D. Thesis (0-1) Non-credit Special Studies (8-0) Non-credit. Elective Courses

Core Courses Seminar (0-2) Non-credit Ph.D. Thesis (0-1) Non-credit Special Studies (8-0) Non-credit. Elective Courses İZMİR INSTITUTE OF TECHNOLOGY GRADUATE SCHOOL OF ENGINEERING AND SCIENCES DEPARTMENT OF COMPUTER ENGINEERING JOINT DOCTORAL PROGRAM IN COMPUTER SCIENCE AND ENGINEERING Core Courses CENG 590 CENG 600 CENG

More information