Management (MDM 2012) IEEE IEEE 13th International. Bengaluru, India. July Conference on Mobile Data CFP12299-PRT

Size: px
Start display at page:

Download "Management (MDM 2012) IEEE. 2012 IEEE 13th International. Bengaluru, India. July 2012. Conference on Mobile Data CFP12299-PRT 978-1-4673-1796-2"

Transcription

1 IEEE 13th International Conference on Mobile Data Management (MDM 2012) Bengaluru, India 23 - July 2012 IEEE IEEE Catalog Number: ISBN: CFP12299-PRT

2 2012 IEEE 13th International Conference on Mobile Data Management MDM 2012 Table of Contents Message from General Co-chairs xi Message from Program Chairs xiii Message from Panel Chairs xv Message from Industry Track Chairs xvi Message from Demonstration Program Chairs xvii Message from Advanced Seminars Chairs Message from Doctoral Colloquium Chairs xix Message from Workshop Chairs Conference Officers xviii xx xxi Program Committee xxiii External Reviewers xxv Sponsors DMPS 2012 Workshop Summary. xxvii xxviii Research Session I: for Mobile Data New Paradigms and Applications Efficient Similarity Joins on Massive High-Dimensional Datasets Using MapReduce 1 Wuman Luo, Haoyu Tan, Huajian Mao, and Lionel M. Ni Elastic Load-Balancing in a Distributed Spatial Cache Overlay 11 Carlos Lubbe, Anja Reuter, and Bernhard Mitschang Key Formulation Schemes for Spatial Index in Cloud Data Managements 21 Ya-Ting Hsu, Yi-Chin Pan, Ling-Yin Wei, Wen-Chih Peng, and Wang-Chien Lee Parking in Competitive Settings: A Gravitational Approach 27 Daniel Ayala, Ouri Wolf son, Bo Xu, Bhaskar DasGupta, and Jie Lin V

3 Research Session II: Mobile and Ubiquitous Middleware MELOC: Memory and Location Optimized Caching Model for Small Mobile Ad Hoc Networks Lekshmi M. Chidambaram, Sanjay Kumar Madria, Mark Linderman, and Takahiro Hara DATEM: Towards QoS Aware Event Notification Framework for Delay Tolerant Networks Phani Rohit Mullangi, Lakshmish Ramaswamy, and Raga Sowmya Tummalapenta Implementing and Optimizing an Encryption Filesystem on Android Zhaohui Wang, Rahul Murmuria, and Angelos Stavrou Exploiting Rich Telecom Data for Increased Monetization of Telecom Application Stores Vikas Agarwal, Sumit Mittat, Sougata Mukherjea, and Palak Dalai Research Session III: Query Processing Cooperative Scalable Moving Continuous Query Processing Xiaohul Li, Panagiotis Karras, Lei Shi, Kian-Lee Tan, and Christian S. Jensen Continuous All k-nearest-neighbor Querying in Smartphone Networks Georgios Chatzimilioudis, Demetrios Zeinalipour-Yazti, Wang-Chien Lee, and Marios D. Dikaiakos A Spatial Caching Framework for Map Operations in Geographical Information Systems Marcos R. Vieira, Petko Bakalov, Erik Hoel, and Vassilis J. Tsotras On Packing Very Large R-trees Haoyu Tan, Wuman Luo, Huajian Mao, and Lionel M. Ni Research Session IV: Mobile Sensing and Data Management OptiMoS: Optimal Sensing for Mobile Sensors 1 Zhixian Yan, Mien Eberle, and Karl Aberer Using On-the-Move Mining for Mobile Crowdsensing 1 Wanita Sherchan, Prem P. Jayaraman, Shonali Krishnaswamy, Arkady Zaslavsky, Seng Loke, and Abhijat Sinha A Predictive Protocol for Mobile Context Updates with Hard Energy Constraints 1 Stefan Foil, Florian Berg, Klaus Herrmann, and Kurt Rothermel vi

4 Comet: Decentralized Complex Event Detection in Mobile Delay Tolerant Networks 131 Jianxia Chen, Lakshmish Ramaswamy, David K. Lowenthal, and Shivkumar Kalyanaraman Research Session V: Sensor Networks Optimizing Multiple Data Acquisition Queries in Sparse Mobile Sensor Networks 137 Shili Xiang, Wei Wu, and Kian-Lee Tan An Efficient, Robust, and Scalable Trust Management Scheme for Unattended Wireless Sensor Networks 147 Yi Ren, Vladimir I. Zadorozhny, Vladimir A. Oleshchuk, and Frank Y. Li Trust Management of Encrypted Data Aggregation in a Sensor Network Environment 157 Nayot Poolsappasit, Michael Busby, and Sanjay Kumar Madria Research Session VI: Security and Privacy Privacy-Preserving Data Management in Mobile Environments: A Partial Encryption Approach 167 R.K.N. Sai Krishna, T.J.V.R.K.M.K. Sayi, R. Mukkamala, and P.K. Baruah Encrypted Searchable Storage of RFID Tracking Data 176 Florian Kerschbaum and Leonardo Weiss Ferreira Chaves Privacy-Preserving Sharing of Sensitive Semantic Locations under Road-Network Constraints 186 Emre Yigitoglu, Maria Luisa Damiani, Osman Abul, and Claudio Silvestri Secure Hierarchical Data Aggregation in Wireless Sensor Networks: Performance Evaluation and Analysis 196 Vimal Kumar and Sanjay Kumar Madria Research Session VII: Location and Trajectory Tracking the Dynamic Distribution of People in Indoor Space with Noisy Partitioning Sensors 202 Song Wang, X. Sean Wang, and Yan Huang Low Energy and Sufficiently Accurate Localization for Non-smartphones 212 Kuldeep Yadav, Vinayak Naik, Amarjeet Singh, Pushpendra Singh, and Umesh Chandra Calibrating Large Scale Vehicle Trajectory Data 222 Siyuan Liu, Ce Liu, Qiong Luo, Lionel M. Ni, and Ramayya Krishnan vii

5 Motion Trends Detection in Wireless Sensor Networks 232 Goce Trajcevski, Besim Avci, Fan Zhou, Roberto Tamassia, Peter Scheuermann, Lauren Miller, and Adam Barber Research Session VIII: Mobile Data Mining BP-growth: Searching Strategies for Efficient Behavior Pattern Mining 238 Xueying Li, Huanhuan Cao, Enhong Chen, Hui Xiong, and Jilei Tian Online Identification of Dwell Regions for Moving Objects 248 M. Reaz Uddin, Chinya V. Ravishankar, and Vassilis J. Tsotras MWGen: A Mini World Generator 258 Jianqiu Xu and Ralf Hartmut Guting ComeTogether: Discovering Communities of Places in Mobility Data 268 Igo Ramalho Brilhante, Michele Berlingerio, Roberto Trasarti, Chiara Renso, Jose Antonio Fernandes de Macedo, and Marco Antonio Casanova Poster Papers Maximizing Vehicular Network Connectivity through an Effective Placement of Road Side Units Using Voronoi Diagrams 274 Prithviraj Patil and Aniruddha Gokhale Social and Sensor Data Fusion in the Cloud 276 Surender Reddy Yerva, Jonnahtan Saltarin, Hoyoung Jeung, and Karl Aberer PhonePark: Street Parking Using Mobile Phones 278 Leon Stenneth, Ouri Wolfson, Bo Xu, and Philip S. Yu Detecting Hazardous Vehicles and Disseminating Their Behavior in Urban Areas 280 Vasilis Verroios, Carmen Ruiz Vicente, and Alex Delis Industry Papers Place Learning via Direct WiFi Fingerprint Clustering 282 Olivier Dousse, Mien Eberle, and Matthias Mertens Mining Significant Places from Cell ID Trajectories: A Geo-grid Based Approach 288 Tengfei Sao, Huanhuan Cao, Qiang Yang, Enhong Chen, and Jilei Tian System Management with IBM Mobile Systems Remote: A Question of Power and Scale 294 Jan S, Rellermeyer, Thomas H. Osiecki, Ernest A. Holloway, Patrick J. Bohrer, and Michael Kistier viii

6 Securing Enterprise Data on Smartphones Using Run Time Information Flow Control 300 Palanivel Kodeswaran, Anupam Joshi, and Sougata Mukherjea Vikrant Nandakumar, Shalini Kapoor, Pavan Kamaraju, Cityride: A Predictive Bike Sharing Journey Advisor 306 Ji Won Yoon, Fabio Pinelli, and Francesco Calabrese Demo Papers The Airplace Indoor Positioning Platform for Android Smartphones 312 Christos Laoudias, George Constantinou, Marios Constantinides, Silouanos Nicolaou, Demetrios Zeinalipour-Yazti, and Christos G. Panayiotou MARS: A Personalised Mobile Activity Recognition System 316 Joao Bartolo Gomes, Shonali Krishnaswamy, Mohamed Medhat Gaber, Pedro A. C. Sousa, and Ernestina Menasalvas To Taxi or Not to Taxi? - Enabling Personalised and Real-Time Transportation Decisions for Mobile Users 320 Wei Wu, Wee Siong Ng, Shonali Krishnaswamy, and Abhijat Sinha SmartP2P: A Multi-objective Framework for Finding Social Content in P2P Smartphone Networks 324 Andreas Konstantinidis, Christos Aplitsiotis, and Demetrios Zeinalipour-Yazti A Demonstration of Mining Significant Places from Cell ID Trajectories through a Geo-grid Based Approach 328 Tengfei Bao, Huanhuan Cao, Qiang Yang, Enhong Chen, and Jilei Tian A Smart Mobile Application for Identifying Storage Location of Small Industrial Assets 332 Harikrishna G. N. Rai, K. Sai Deepak, Shahanaz Syed, and P. Radha Krishna SAWLnet: Sensitivity Aware Location Cloaking on Road-NETworks 336 Claudio Silvestri, Emre Yigitoglu, Maria Luisa Damiani, and Osman Abul SimPI: A Simulation Platform for Elastic Load-Balancing in a Distributed Spatial Cache Overlay 340 Carlos Lubbe and Nazario Cipriani Building Activity Definitions to Recognize Complex Activities Using an Online Activity Toolkit 344 Saguna Saguna, Arkady Zaslavsky, and Dipanjan Chakraborty Delivering Mobile egovernance on Low-End-Phones 348 Geetha Manjunath, Revathi Muthanna, S, Thara, Harini Dhanasekaran, Priyanka Tiwari, and Prosenjit Das ix

7 Take Control of Your SMSes: Designing an Usable Spam SMS Filtering System Kuldeep Yadav, Swetank K. Saha; Ponnurangam Kumaraguru, and Rohit Kumra 352 Misco: A System for Data Analysis Applications on Networks of Smartphones Using MapReduce 356 Theofilos Kakantousis, loannis Boutsis, Vana Kalogeraki, Dimitrios Gunopulos, Giorgos Gasparis, and Adam Dou Advanced Seminar Abstracts Mobile Data Stream Mining: From Algorithms to 360 Applications Shonali Krishnaswamy, Joao Gama, and Mohamed Medhat Gaber Crowdsourcing: Dynamic Data Management in Mobile P2P Networks 364 Sanjay Kumar Madria and Anirban Mondal Ph.D. Colloquium Papers Defending Location Privacy Using Zero Knowledge Proof Concept in Location Based Services 368 Priti Jagwani and Saroj Kaushik Framework for Collaborative Download in Wireless Mobile Environment 372 Sourav Kumar Dandapat, Ravi Niranjan, and Niloy Ganguly Extracting Region of Interest (ROI) Details Using LBS Infrastructure and Web-Databases 376 Shivendra Tiwari and Saroj Kaushik Secured Data Management Paradigm for Mobile Grid Environment Using Surrogate Objects 380 H. Parveen Begam and Maluk Mohamed Author Index 385 X

MDM 2012 - The 13th International Conference on Mobile Data Management Bangalore, India Jul 23, 2012 - Jul 26, 2012. Conference Program

MDM 2012 - The 13th International Conference on Mobile Data Management Bangalore, India Jul 23, 2012 - Jul 26, 2012. Conference Program MDM 2012 - The 13th International Conference on Mobile Data Management Bangalore, India Jul 23, 2012 - Jul 26, 2012 http://www.mdmconferences.org/mdm2012/ Conference Program MDM Program 2012 Monday, July

More information

Big Data Analytics in Mobile Environments

Big Data Analytics in Mobile Environments 1 Big Data Analytics in Mobile Environments 熊 辉 教 授 罗 格 斯 - 新 泽 西 州 立 大 学 2012-10-2 Rutgers, the State University of New Jersey Why big data: historical view? Productivity versus Complexity (interrelatedness,

More information

Abstract Geo-localization and Location-aware Opportunistic Communication for Mobile Phones

Abstract Geo-localization and Location-aware Opportunistic Communication for Mobile Phones Abstract Geo-localization and Location-aware Opportunistic Communication for Mobile Phones by Kuldeep Yadav Department of Computer Science Indraprastha Institute of Information Technology, New Delhi Date:

More information

Global Soft Solutions JAVA IEEE PROJECT TITLES - 2015

Global Soft Solutions JAVA IEEE PROJECT TITLES - 2015 Global Soft Solutions No : 6, III Floor Chitra Complex Chatram Bus Stand Trichy 620 002 www.globalsoftsolutions.in Email : gsstrichy@gmail.com Ph : 0431 4544308 / Cell : 94431 22110 JAVA IEEE PROJECT TITLES

More information

CONTENTS. List of Contributors Preface Acknowledgments. mobility data modeling and representation

CONTENTS. List of Contributors Preface Acknowledgments. mobility data modeling and representation CONTENTS List of Contributors Preface Acknowledgments page xi xv xix part i mobility data modeling and representation 1 Trajectories and Their Representations 3 S. Spaccapietra, C. Parent, L. Spinsanti

More information

Cloud Computing. and Scheduling. Data-Intensive Computing. Frederic Magoules, Jie Pan, and Fei Teng SILKQH. CRC Press. Taylor & Francis Group

Cloud Computing. and Scheduling. Data-Intensive Computing. Frederic Magoules, Jie Pan, and Fei Teng SILKQH. CRC Press. Taylor & Francis Group Cloud Computing Data-Intensive Computing and Scheduling Frederic Magoules, Jie Pan, and Fei Teng SILKQH CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor

More information

Workflow Administration of Windchill 10.2

Workflow Administration of Windchill 10.2 Workflow Administration of Windchill 10.2 Overview Course Code Course Length TRN-4339-T 2 Days In this course, you will learn about Windchill workflow features and how to design, configure, and test workflow

More information

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM Macha Arun 1, B.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Holy Mary

More information

IEEE 2015-2016 JAVA TITLES

IEEE 2015-2016 JAVA TITLES ECWAY ECHNOLGIES IEEE 2015-2016 JAVA TITLES BE, B.TECH, ME, M.TECH, MSC, MCA PROJECTS Abstract: Introduction: Literature Survey: System Analysis: Existing System: Disadvantages: Proposed System: Advantages:

More information

Using Medical Big-Data Platforms to Creating Stochastic Preference for Adaptive Crowd sourcing

Using Medical Big-Data Platforms to Creating Stochastic Preference for Adaptive Crowd sourcing ISSN No: 2454-9614 Using Medical Big-Data Platforms to Creating Stochastic Preference for Adaptive Crowd sourcing L. Poornima Devi, N. Sathyabalaji * a) Department Of Computer Science and Engineering,

More information

Lecture and Presentation Topics (tentative) CS 7301: Recent Advances in Cloud Computing

Lecture and Presentation Topics (tentative) CS 7301: Recent Advances in Cloud Computing Lecture and Presentation Topics (tentative) CS 7301: Recent Advances in Cloud Computing Cloud storage systems The rise of big data on cloud computing: Review and open research issues Consistency models

More information

Hadoop. MPDL-Frühstück 9. Dezember 2013 MPDL INTERN

Hadoop. MPDL-Frühstück 9. Dezember 2013 MPDL INTERN Hadoop MPDL-Frühstück 9. Dezember 2013 MPDL INTERN Understanding Hadoop Understanding Hadoop What's Hadoop about? Apache Hadoop project (started 2008) downloadable open-source software library (current

More information

Program Learning Objectives

Program Learning Objectives Geographic Information Science, M.S. Majors in Computational Geosciences. 2012-201. Awase Khirni Syed 1 *, Bisheng Yang 2, Eliseo Climentini * 1 s.awasekhirni@tu.edu.sa, Assitant Professor, Taif University,

More information

A QoS-Aware Web Service Selection Based on Clustering

A QoS-Aware Web Service Selection Based on Clustering International Journal of Scientific and Research Publications, Volume 4, Issue 2, February 2014 1 A QoS-Aware Web Service Selection Based on Clustering R.Karthiban PG scholar, Computer Science and Engineering,

More information

Introduction to Windchill PDMLink 10.0 for Heavy Users

Introduction to Windchill PDMLink 10.0 for Heavy Users Introduction to Windchill PDMLink 10.0 for Heavy Users Overview Course Code Course Length TRN-3146-T 2 Days In this course, you will learn how to complete the day-to-day functions that enable you to create

More information

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing Security Infrastructure for Trusted Offloading in Mobile Cloud Computing Professor Kai Hwang University of Southern California Presentation at Huawei Forum, Santa Clara, Nov. 8, 2014 Mobile Cloud Security

More information

Business Administration of Windchill PDMLink 10.0

Business Administration of Windchill PDMLink 10.0 Business Administration of Windchill PDMLink 10.0 Overview Course Code Course Length TRN-3160-T 3 Days After completing this course, you will be well prepared to set up and manage a basic Windchill PDMLink

More information

International Journal of Computer & Organization Trends Volume21 Number1 June 2015 A Study on Load Balancing in Cloud Computing

International Journal of Computer & Organization Trends Volume21 Number1 June 2015 A Study on Load Balancing in Cloud Computing A Study on Load Balancing in Cloud Computing * Parveen Kumar * Er.Mandeep Kaur Guru kashi University,Talwandi Sabo Guru kashi University,Talwandi Sabo Abstract: Load Balancing is a computer networking

More information

Security Analysis of Cloud Computing: A Survey

Security Analysis of Cloud Computing: A Survey Security Analysis of Cloud Computing: A Survey Kamaljeet Pakhre 1, Navdeep Singh 2, Sanket Mani Tiwari 3 1,2,3 Research Scholar, M. Tech. (CSE), Galgotias University, Greater Noida, India. Abstract Now

More information

ISSN 2319-8885 Vol.04,Issue.19, June-2015, Pages:3633-3638. www.ijsetr.com

ISSN 2319-8885 Vol.04,Issue.19, June-2015, Pages:3633-3638. www.ijsetr.com ISSN 2319-8885 Vol.04,Issue.19, June-2015, Pages:3633-3638 www.ijsetr.com Refining Efficiency of Cloud Storage Services using De-Duplication SARA BEGUM 1, SHAISTA NOUSHEEN 2, KHADERBI SHAIK 3 1 PG Scholar,

More information

About the Authors Preface Acknowledgements List of Acronyms

About the Authors Preface Acknowledgements List of Acronyms Contents About the Authors Preface Acknowledgements List of Acronyms xiii xv xvii xix Part One Wireless Ad Hoc, Sensor and Mesh Networking 1 1 Introduction 3 1.1 Information Security 4 1.1.1 Computer Security

More information

IEEE (MDM 2014) Pages 1-373. 2014 IEEE 15th International Conference on Mobile Data Management. Brisbane, Australia. 14-18 July 2014.

IEEE (MDM 2014) Pages 1-373. 2014 IEEE 15th International Conference on Mobile Data Management. Brisbane, Australia. 14-18 July 2014. 2014 IEEE 15th International Conference on Mobile Data Management (MDM 2014) Brisbane, Australia 14-18 July 2014 Volume 1 Pages 1-373 IEEE IEEE Catalog Number: CFP14299-POD ISBN: 978-1-4799-5706-4 1/2

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

A Survey on Aware of Local-Global Cloud Backup Storage for Personal Purpose

A Survey on Aware of Local-Global Cloud Backup Storage for Personal Purpose A Survey on Aware of Local-Global Cloud Backup Storage for Personal Purpose Abhirupa Chatterjee 1, Divya. R. Krishnan 2, P. Kalamani 3 1,2 UG Scholar, Sri Sairam College Of Engineering, Bangalore. India

More information

Contemporary Techniques for Data Mining Social Media

Contemporary Techniques for Data Mining Social Media Contemporary Techniques for Data Mining Social Media Stephen Cutting (100063482) 1 Introduction Social media websites such as Facebook, Twitter and Google+ allow millions of users to communicate with one

More information

Developing. and Securing. the Cloud. Bhavani Thuraisingham CRC. Press. Taylor & Francis Group. Taylor & Francis Croup, an Informs business

Developing. and Securing. the Cloud. Bhavani Thuraisingham CRC. Press. Taylor & Francis Group. Taylor & Francis Croup, an Informs business Developing and Securing the Cloud Bhavani Thuraisingham @ CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an Informs business AN AUERBACH

More information

A Review on Load Balancing Algorithms in Cloud

A Review on Load Balancing Algorithms in Cloud A Review on Load Balancing Algorithms in Cloud Hareesh M J Dept. of CSE, RSET, Kochi hareeshmjoseph@ gmail.com John P Martin Dept. of CSE, RSET, Kochi johnpm12@gmail.com Yedhu Sastri Dept. of IT, RSET,

More information

Internet, broadband, and cell phone statistics

Internet, broadband, and cell phone statistics Internet, broadband, and cell phone statistics By: Lee Rainie, Director January 5, 2010 Overview In a national survey between November 30 and December 27, 2009, we find: 74% of American adults (ages 18

More information

CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW

CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW 1 XINQIN GAO, 2 MINGSHUN YANG, 3 YONG LIU, 4 XIAOLI HOU School of Mechanical and Precision Instrument Engineering, Xi'an University

More information

Capability Service Management System for Manufacturing Equipments in

Capability Service Management System for Manufacturing Equipments in Capability Service Management System for Manufacturing Equipments in Cloud Manufacturing 1 Junwei Yan, 2 Sijin Xin, 3 Quan Liu, 4 Wenjun Xu *1, Corresponding Author School of Information Engineering, Wuhan

More information

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,

More information

Mobile Image Offloading Using Cloud Computing

Mobile Image Offloading Using Cloud Computing Mobile Image Offloading Using Cloud Computing Chintan Shah, Aruna Gawade Student, Dept. of Computer., D.J.Sanghvi College of Engineering, Mumbai University, Mumbai, India Assistant Professor, Dept. of

More information

Mobile Adaptive Opportunistic Junction for Health Care Networking in Different Geographical Region

Mobile Adaptive Opportunistic Junction for Health Care Networking in Different Geographical Region International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 113-118 International Research Publications House http://www. irphouse.com /ijict.htm Mobile

More information

SOCIAL NETWORK DATA ANALYTICS

SOCIAL NETWORK DATA ANALYTICS SOCIAL NETWORK DATA ANALYTICS SOCIAL NETWORK DATA ANALYTICS Edited by CHARU C. AGGARWAL IBM T. J. Watson Research Center, Yorktown Heights, NY 10598, USA Kluwer Academic Publishers Boston/Dordrecht/London

More information

Metaheuristics in Big Data: An Approach to Railway Engineering

Metaheuristics in Big Data: An Approach to Railway Engineering Metaheuristics in Big Data: An Approach to Railway Engineering Silvia Galván Núñez 1,2, and Prof. Nii Attoh-Okine 1,3 1 Department of Civil and Environmental Engineering University of Delaware, Newark,

More information

Outsourcing with secure accessibility in mobile cloud computing

Outsourcing with secure accessibility in mobile cloud computing Outsourcing with secure accessibility in mobile cloud computing Monika Waghmare 1, Prof T.A.Chavan 2 Department of Information technology, Smt.Kashibai Navale College of Engineering, Pune, India. Abstract

More information

A Selective Neighbor Caching Approach for Supporting Mobility in Publish/Subscribe Networks

A Selective Neighbor Caching Approach for Supporting Mobility in Publish/Subscribe Networks A Selective Neighbor Caching Approach for Supporting Mobility in Publish/Subscribe Networks Vasilios A. Siris, Xenofon Vasilakos, and George C. Polyzos Mobile Multimedia Laboratory Department of Informatics

More information

Mobile Storage and Search Engine of Information Oriented to Food Cloud

Mobile Storage and Search Engine of Information Oriented to Food Cloud Advance Journal of Food Science and Technology 5(10): 1331-1336, 2013 ISSN: 2042-4868; e-issn: 2042-4876 Maxwell Scientific Organization, 2013 Submitted: May 29, 2013 Accepted: July 04, 2013 Published:

More information

Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds

Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds Ms. Jyotsna T. Kumbhar 1 ME Student, Department of Computer Engineering, TSSM S, P.V.P.I.T., Bavdhan, Pune University,

More information

Charith Pereral, Arkady Zaslavsky, Peter Christen, Ali Salehi and Dimitrios Georgakopoulos (IEEE 2012) Presented By- Anusha Sekar

Charith Pereral, Arkady Zaslavsky, Peter Christen, Ali Salehi and Dimitrios Georgakopoulos (IEEE 2012) Presented By- Anusha Sekar Charith Pereral, Arkady Zaslavsky, Peter Christen, Ali Salehi and Dimitrios Georgakopoulos (IEEE 2012) Presented By- Anusha Sekar Introduction Terms and Concepts Mobile Sensors Global Sensor Networks DAM4GSN

More information

Thresholds & Pre-requisites

Thresholds & Pre-requisites Thresholds & Pre-requisites Please see below the scoring thresholds and pre-requisites for the QS Stars Evaluation: OVERALL 1000 1 Star... 100 Must have the authority to grant valid degree level programs

More information

NETWORK SECURITY: CURRENT STATUS AND FUTURE DIRECTIONS

NETWORK SECURITY: CURRENT STATUS AND FUTURE DIRECTIONS NETWORK SECURITY: CURRENT STATUS AND FUTURE DIRECTIONS Preface. Contributors. 1. Computer Network Security: Basic Background and Current Issues (Panayiotis Kotzanikolaou and Christos Douligeris). 1.1 Some

More information

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN

More information

Recent advances in security and privacy in big data

Recent advances in security and privacy in big data University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers Faculty of Engineering and Information Sciences 2015 Recent advances in security and privacy in big data

More information

Contents. Preface. About Editors. Contributors. Acknowledgments I 1

Contents. Preface. About Editors. Contributors. Acknowledgments I 1 Preface v About Editors vii Contributors ix Acknowledgments xxi I 1 Chapter 1. Architectures and Cross-Layer Design for Cognitive Networks 3 Dzmitry Kliazovich, Fabrizio Granelli, and Nelson L. S. da Fonseca

More information

Secure semantic based search over cloud

Secure semantic based search over cloud Volume: 2, Issue: 5, 162-167 May 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Sarulatha.M PG Scholar, Dept of CSE Sri Krishna College of Technology Coimbatore,

More information

LIST OF FIGURES. Figure No. Caption Page No.

LIST OF FIGURES. Figure No. Caption Page No. LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS

More information

An Efficient Crowdsourcing Search Scheme in Vehicular Ad hoc Networks

An Efficient Crowdsourcing Search Scheme in Vehicular Ad hoc Networks Int'l Conf. Wireless Networks ICWN'15 195 An Efficient Crowdsourcing Search Scheme in Vehicular Ad hoc Networks Chyi-Ren Dow, Duc-Binh Nguyen, Zi-How Lin and Shiow-Fen Hwang Department of Information Engineering

More information

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving, Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party

More information

Big Data JAMES WARREN. Principles and best practices of NATHAN MARZ MANNING. scalable real-time data systems. Shelter Island

Big Data JAMES WARREN. Principles and best practices of NATHAN MARZ MANNING. scalable real-time data systems. Shelter Island Big Data Principles and best practices of scalable real-time data systems NATHAN MARZ JAMES WARREN II MANNING Shelter Island contents preface xiii acknowledgments xv about this book xviii ~1 Anew paradigm

More information

Towards Next Generation Secure DDDAS/Infosymbiotics Systems

Towards Next Generation Secure DDDAS/Infosymbiotics Systems ICCS 2015, Reykjavik, Iceland June 2015 Towards Next Generation Secure DDDAS/Infosymbiotics Systems Li Xiong and Vaidy Sunderam Students: Layla Pournajaf, Daniel Garcia-Ulloa, Xiaofeng Xu Dept. of Math

More information

A Network Simulation Experiment of WAN Based on OPNET

A Network Simulation Experiment of WAN Based on OPNET A Network Simulation Experiment of WAN Based on OPNET 1 Yao Lin, 2 Zhang Bo, 3 Liu Puyu 1, Modern Education Technology Center, Liaoning Medical University, Jinzhou, Liaoning, China,yaolin111@sina.com *2

More information

Privacy Preserving Distributed Cloud Storage

Privacy Preserving Distributed Cloud Storage Privacy Preserving Distributed Cloud Storage Praveenkumar Khethavath 1 *, Doyel Pal 2 1 Department of Mathematics, Engineering and Computer Science, LaGuardia Community College, Long Island City, NY 11101.

More information

Big Data Storage Architecture Design in Cloud Computing

Big Data Storage Architecture Design in Cloud Computing Big Data Storage Architecture Design in Cloud Computing Xuebin Chen 1, Shi Wang 1( ), Yanyan Dong 1, and Xu Wang 2 1 College of Science, North China University of Science and Technology, Tangshan, Hebei,

More information

23rd Annual ACM Symposium on Applied Computing Tutorial Proposal

23rd Annual ACM Symposium on Applied Computing Tutorial Proposal 23rd Annual ACM Symposium on Applied Computing Tutorial Proposal Tutorial Title: The Energy Role in the Design of Applications for Wireless Sensor Networks Authors: Raquel A. F. Mini Department of Computer

More information

Monitoring and Mining Sensor Data in Cloud Computing Environments

Monitoring and Mining Sensor Data in Cloud Computing Environments Monitoring and Mining Sensor Data in Cloud Computing Environments Wen-Chih Peng and Yu-Chee Tseng Dept. of Computer Science National Chiao Tung University {wcpeng, yctseng}@cs.nctu.edu.tw 1 Outline Sensor

More information

Efficient File Sharing Scheme in Mobile Adhoc Network

Efficient File Sharing Scheme in Mobile Adhoc Network Efficient File Sharing Scheme in Mobile Adhoc Network 1 Y. Santhi, 2 Mrs. M. Maria Sheeba 1 2ndMECSE, Ponjesly College of engineering, Nagercoil 2 Assistant professor, Department of CSE, Nagercoil Abstract:

More information

Secure Alternate Viable Technique of Securely Sharing The Personal Health Records in Cloud

Secure Alternate Viable Technique of Securely Sharing The Personal Health Records in Cloud Secure Alternate Viable Technique of Securely Sharing The Personal Health Records in Cloud K.S. Aswathy 1, G. Venifa Mini 2 1 M.E. Student, 2 Assistant Professor, Computer Science and Engineering, Noorul

More information

Introduction to Windchill Projectlink 10.2

Introduction to Windchill Projectlink 10.2 Introduction to Windchill Projectlink 10.2 Overview Course Code Course Length TRN-4270 1 Day In this course, you will learn how to participate in and manage projects using Windchill ProjectLink 10.2. Emphasis

More information

Borges Map How Big Data changes business strategy

Borges Map How Big Data changes business strategy Borges Map How Big Data changes business strategy European Leasing & Consumer Credit Industry Annual Conventions Barcelona, October 9, 2014 Philip Evans The world becomes its own map What the Google self-driving

More information

An Analysis and Review on Various Techniques of Mining Big Data

An Analysis and Review on Various Techniques of Mining Big Data Journal homepage: http://www.journalijar.com INTERNATIONAL JOURNAL OF ADVANCED RESEARCH RESEARCH ARTICLE An Analysis and Review on Various Techniques of Mining Big Data Hitesh Kumar Bhatia Masters of Computer

More information

Cloud based Spatial Cloaking for Mobile User Privacy Preservation

Cloud based Spatial Cloaking for Mobile User Privacy Preservation Cloud based Spatial Cloaking for Mobile User Privacy Preservation Revathy Gangadaren M Department of Computer Science and Engineering, MES College of Engineering Kuttippuram, Kerala, India Lijo V. P. Department

More information

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

Data Integrity for Secure Dynamic Cloud Storage System Using TPA International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure

More information

International Journal of Advancements in Research & Technology, Volume 3, Issue 5, May-2014 18 ISSN 2278-7763. BIG DATA: A New Technology

International Journal of Advancements in Research & Technology, Volume 3, Issue 5, May-2014 18 ISSN 2278-7763. BIG DATA: A New Technology International Journal of Advancements in Research & Technology, Volume 3, Issue 5, May-2014 18 BIG DATA: A New Technology Farah DeebaHasan Student, M.Tech.(IT) Anshul Kumar Sharma Student, M.Tech.(IT)

More information

Windchill Service Information Manager 10.2. Curriculum Guide

Windchill Service Information Manager 10.2. Curriculum Guide Windchill Service Information Manager 10.2 Curriculum Guide Live Classroom Curriculum Guide Introduction to Windchill Service Information Manager 10.2 Building Information Structures with Windchill Service

More information

GIS DRIVEN URBAN TRAFFIC ANALYSIS BASED ON ONTOLOGY

GIS DRIVEN URBAN TRAFFIC ANALYSIS BASED ON ONTOLOGY GIS DRIVEN URBAN TRAFFIC ANALYSIS BASED ON ONTOLOGY Tazin Malgundkar 1,Madhuri Rao 2 and Dr. S.S. Mantha 3 1 Student, Computer Engineering, Thadomal Shahani Engineering College, Bandra, Mumbai, India.

More information

BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON

BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON Overview * Introduction * Multiple faces of Big Data * Challenges of Big Data * Cloud Computing

More information

Large Scale Spatial Data Management on Mobile Phone data set Using Exploratory Data Analysis

Large Scale Spatial Data Management on Mobile Phone data set Using Exploratory Data Analysis Large Scale Spatial Data Management on Mobile Phone data set Using Exploratory Data Analysis K.S.Pandiyan, Dr.S.Sivakumar Research scholar, Professor, Department of Geology, Anna University, Chennai Abstract

More information

Development of an IoT Environmental Monitoring Application with a Novel Middleware for Resource Constrained Devices.

Development of an IoT Environmental Monitoring Application with a Novel Middleware for Resource Constrained Devices. Development of an IoT Environmental Monitoring Application with a Novel Middleware for Resource Constrained Devices. Article Accepted version S. Gaglio, G. Lo Re, G. Martorella, D. Peri, S.D. Vassallo

More information

Proposed Advance Taxi Recommender System Based On a Spatiotemporal Factor Analysis Model

Proposed Advance Taxi Recommender System Based On a Spatiotemporal Factor Analysis Model Proposed Advance Taxi Recommender System Based On a Spatiotemporal Factor Analysis Model Santosh Thakkar, Supriya Bhosale, Namrata Gawade, Prof. Sonia Mehta Department of Computer Engineering, Alard College

More information

Developing Scalable Smart Grid Infrastructure to Enable Secure Transmission System Control

Developing Scalable Smart Grid Infrastructure to Enable Secure Transmission System Control Developing Scalable Smart Grid Infrastructure to Enable Secure Transmission System Control EP/K006487/1 UK PI: Prof Gareth Taylor (BU) China PI: Prof Yong-Hua Song (THU) Consortium UK Members: Brunel University

More information

Windchill PDMLink 10.2. Curriculum Guide

Windchill PDMLink 10.2. Curriculum Guide Windchill PDMLink 10.2 Curriculum Guide Live Classroom Curriculum Guide Update to Windchill PDMLink 10.2 from Windchill PDMLink 9.0/9.1 for the End User Introduction to Windchill PDMLink 10.2 for Light

More information

A Framework for Data Warehouse Using Data Mining and Knowledge Discovery for a Network of Hospitals in Pakistan

A Framework for Data Warehouse Using Data Mining and Knowledge Discovery for a Network of Hospitals in Pakistan , pp.217-222 http://dx.doi.org/10.14257/ijbsbt.2015.7.3.23 A Framework for Data Warehouse Using Data Mining and Knowledge Discovery for a Network of Hospitals in Pakistan Muhammad Arif 1,2, Asad Khatak

More information

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan

More information

Teaching Scheme Credits Assigned Course Code Course Hrs./Week. BEITC802 Big Data 04 02 --- 04 01 --- 05 Analytics. Theory Marks

Teaching Scheme Credits Assigned Course Code Course Hrs./Week. BEITC802 Big Data 04 02 --- 04 01 --- 05 Analytics. Theory Marks Teaching Scheme Credits Assigned Course Code Course Hrs./Week Name Theory Practical Tutorial Theory Practical/Oral Tutorial Tota l BEITC802 Big Data 04 02 --- 04 01 --- 05 Analytics Examination Scheme

More information

Analysis of Email Fraud Detection Using WEKA Tool

Analysis of Email Fraud Detection Using WEKA Tool Analysis of Email Fraud Detection Using WEKA Tool Author:Tarushi Sharma, M-Tech(Information Technology), CGC Landran Mohali, Punjab,India, Co-Author:Mrs.Amanpreet Kaur (Assistant Professor), CGC Landran

More information

Mobile Cloud and Grid Web Service in a Smart City

Mobile Cloud and Grid Web Service in a Smart City Mobile Cloud and Grid Web Service in a Smart City Jong Won Park, Chang Ho Yun, Hae Sun Jung, Yong Woo LEE (Corresponding Author) School of Electrical & Computer Engineering The Smart City (Ubiquitous City)

More information

EFFECTIVE LOAD BALANCING WITH POWER CONSERVATION IN RFID

EFFECTIVE LOAD BALANCING WITH POWER CONSERVATION IN RFID EFFECTIVE LOAD BALANCING WITH POWER CONSERVATION IN RFID Vijayakumar.G.Dhas 1, Ramanathan Muthukaruppan 2, Konguvel Balakrishnan 2, Rajarajan Ganesan 2 1 Lecturer, Department of Information Technology,

More information

Workshop on Internet and BigData Finance (WIBF)

Workshop on Internet and BigData Finance (WIBF) Workshop on Internet and BigData Finance (WIBF) Central University of Finance and Economics June 11-12, 2015 In a 2013 study, IBM found that 71 percent of the banking and financial firms report that the

More information

Combining Smart Phone and Infrastructure Sensors To Improve Security in Enterprise Settings

Combining Smart Phone and Infrastructure Sensors To Improve Security in Enterprise Settings Combining Smart Phone and Infrastructure Sensors To Improve Security in Enterprise Settings Palanivel Kodeswaran Dipanjan Chakraborty IBM Research India. IBM Research India. Bangalore Delhi. India India

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014 RESEARCH ARTICLE OPEN ACCESS Survey of Optimization of Scheduling in Cloud Computing Environment Er.Mandeep kaur 1, Er.Rajinder kaur 2, Er.Sughandha Sharma 3 Research Scholar 1 & 2 Department of Computer

More information

BSM 9.0 ESSENTIALS. Instructor-Led Training

BSM 9.0 ESSENTIALS. Instructor-Led Training BSM 9.0 ESSENTIALS Instructor-Led Training INTENDED AUDIENCE New users of Business Service Management (BSM) 9.0, including: Database Administrators System Administrators Network Administrators Operations

More information

Beginning Windows 8. Mike Halsey Microsoft MVP for Windows. Apress*

Beginning Windows 8. Mike Halsey Microsoft MVP for Windows. Apress* Beginning Windows 8 Mike Halsey Microsoft MVP for Windows Apress* Contents at a Glance About the Author About the Technical Reviewers Acknowledgments Introduction xxi xxiii xxv xxvii Chapter 1: Introducing

More information

Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms

Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Kirill Krinkin Open Source and Linux lab Saint Petersburg, Russia kirill.krinkin@fruct.org Eugene Kalishenko Saint Petersburg

More information

UPS battery remote monitoring system in cloud computing

UPS battery remote monitoring system in cloud computing , pp.11-15 http://dx.doi.org/10.14257/astl.2014.53.03 UPS battery remote monitoring system in cloud computing Shiwei Li, Haiying Wang, Qi Fan School of Automation, Harbin University of Science and Technology

More information

b) Discussion of Bid c) Voting (1) Results: Coastal Carolina wins B. State Communications Coordinator of the Year 1. Winthrop University

b) Discussion of Bid c) Voting (1) Results: Coastal Carolina wins B. State Communications Coordinator of the Year 1. Winthrop University South Carolina Organization for Residential Education 2015 SCORE Boardroom Minutes I. Call to order at 8:02 am II. Roll Call: Clemson, Coastal Carolina, College of Charleston, Winthrop University, University

More information

Clearing The Clouds On Cloud Computing: Survey Paper

Clearing The Clouds On Cloud Computing: Survey Paper Clearing The Clouds On Cloud Computing: Survey Paper PS Yoganandani 1, Rahul Johari 2, Kunal Krishna 3, Rahul Kumar 4, Sumit Maurya 5 1,2,3,4,5 Guru Gobind Singh Indraparasta University, New Delhi Abstract

More information

Mobility Management in Mobile Cloud Computing

Mobility Management in Mobile Cloud Computing Mobility Management in Mobile Cloud Computing Karan Mitra Luleå University of Technology Skellefteå, Sweden karan.mitra@ltu.se https://karanmitra.me 19/06/2015, Nancy, France Agenda Introduction M2C2:

More information

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered

More information

Index Terms: Smart phones, Malwares, security, permission violation, malware detection, mobile devices, Android, security

Index Terms: Smart phones, Malwares, security, permission violation, malware detection, mobile devices, Android, security Permission Based Malware Detection Approach Using Naive Bayes Classifier Technique For Android Devices. Pranay Kshirsagar, Pramod Mali, Hrishikesh Bidwe. Department Of Information Technology G. S. Moze

More information

Seminar: Security Metrics in Cloud Computing (20-00-0577-se)

Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Technische Universität Darmstadt Dependable, Embedded Systems and Software Group (DEEDS) Hochschulstr. 10 64289 Darmstadt Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Topics Descriptions

More information

AN INFORMATION AGENT SYSTEM FOR CLOUD COMPUTING BASED LOCATION TRACKING

AN INFORMATION AGENT SYSTEM FOR CLOUD COMPUTING BASED LOCATION TRACKING I J I T E ISSN: 2229-7367 3(1-2), 2012, pp. 63-68 AN INFORMATION AGENT SYSTEM FOR CLOUD COMPUTING BASED LOCATION TRACKING ANWAR BASHA H. 1, SAMUEL GEOFFREY LAWRENCE 2 AND INDUMATHI, K. 3 1 Department of

More information

Mobile Cloud Computing: Critical Analysis of Application Deployment in Virtual Machines

Mobile Cloud Computing: Critical Analysis of Application Deployment in Virtual Machines 2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Mobile Cloud Computing: Critical Analysis of Application Deployment

More information

Novel Framework for Distributed Data Stream Mining in Big data Analytics Using Time Sensitive Sliding Window

Novel Framework for Distributed Data Stream Mining in Big data Analytics Using Time Sensitive Sliding Window ISSN(Print): 2377-0430 ISSN(Online): 2377-0449 JOURNAL OF COMPUTER SCIENCE AND SOFTWARE APPLICATION In Press Novel Framework for Distributed Data Stream Mining in Big data Analytics Using Time Sensitive

More information

Security and Privacy in Big Data, Blessing or Curse?

Security and Privacy in Big Data, Blessing or Curse? Security and Privacy in Big Data, Blessing or Curse? 2 nd National Cryptography Days 9-11 April 2015 Dr. Zeki Erkin Cyber Security Section Department of Intelligent Systems Delft University of Technology

More information

Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, 2013. p i.

Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, 2013. p i. New York, NY, USA: Basic Books, 2013. p i. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=2 New York, NY, USA: Basic Books, 2013. p ii. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=3 New

More information

JOURNAL OF COMPUTER SCIENCE AND ENGINEERING

JOURNAL OF COMPUTER SCIENCE AND ENGINEERING Exploration on Service Matching Methodology Based On Description Logic using Similarity Performance Parameters K.Jayasri Final Year Student IFET College of engineering nishajayasri@gmail.com R.Rajmohan

More information

Research on Architecture and Key Technologies of the Internet of things Qing Mi, Zhen-tao Ni and Xiao-duan Wang

Research on Architecture and Key Technologies of the Internet of things Qing Mi, Zhen-tao Ni and Xiao-duan Wang International Conference on Computational Science and Engineering (ICCSE 2015) Research on Architecture and Key Technologies of the Internet of things Qing Mi, Zhen-tao Ni and Xiao-duan Wang Informatization

More information

Data De-Duplication Aware Clustering for Optimized Storage in Wireless Multimedia Sensor Networks

Data De-Duplication Aware Clustering for Optimized Storage in Wireless Multimedia Sensor Networks , pp. 1-8 http://dx.doi.org/10.14257/ijsacs.2014.2.2.01 Data De-Duplication Aware Clustering for Optimized Storage in Wireless Multimedia Sensor Networks Sreeram Indraneel 1 and Kurra Raja Sekhara Rao

More information