Management (MDM 2012) IEEE IEEE 13th International. Bengaluru, India. July Conference on Mobile Data CFP12299-PRT

Size: px
Start display at page:

Download "Management (MDM 2012) IEEE. 2012 IEEE 13th International. Bengaluru, India. July 2012. Conference on Mobile Data CFP12299-PRT 978-1-4673-1796-2"

Transcription

1 IEEE 13th International Conference on Mobile Data Management (MDM 2012) Bengaluru, India 23 - July 2012 IEEE IEEE Catalog Number: ISBN: CFP12299-PRT

2 2012 IEEE 13th International Conference on Mobile Data Management MDM 2012 Table of Contents Message from General Co-chairs xi Message from Program Chairs xiii Message from Panel Chairs xv Message from Industry Track Chairs xvi Message from Demonstration Program Chairs xvii Message from Advanced Seminars Chairs Message from Doctoral Colloquium Chairs xix Message from Workshop Chairs Conference Officers xviii xx xxi Program Committee xxiii External Reviewers xxv Sponsors DMPS 2012 Workshop Summary. xxvii xxviii Research Session I: for Mobile Data New Paradigms and Applications Efficient Similarity Joins on Massive High-Dimensional Datasets Using MapReduce 1 Wuman Luo, Haoyu Tan, Huajian Mao, and Lionel M. Ni Elastic Load-Balancing in a Distributed Spatial Cache Overlay 11 Carlos Lubbe, Anja Reuter, and Bernhard Mitschang Key Formulation Schemes for Spatial Index in Cloud Data Managements 21 Ya-Ting Hsu, Yi-Chin Pan, Ling-Yin Wei, Wen-Chih Peng, and Wang-Chien Lee Parking in Competitive Settings: A Gravitational Approach 27 Daniel Ayala, Ouri Wolf son, Bo Xu, Bhaskar DasGupta, and Jie Lin V

3 Research Session II: Mobile and Ubiquitous Middleware MELOC: Memory and Location Optimized Caching Model for Small Mobile Ad Hoc Networks Lekshmi M. Chidambaram, Sanjay Kumar Madria, Mark Linderman, and Takahiro Hara DATEM: Towards QoS Aware Event Notification Framework for Delay Tolerant Networks Phani Rohit Mullangi, Lakshmish Ramaswamy, and Raga Sowmya Tummalapenta Implementing and Optimizing an Encryption Filesystem on Android Zhaohui Wang, Rahul Murmuria, and Angelos Stavrou Exploiting Rich Telecom Data for Increased Monetization of Telecom Application Stores Vikas Agarwal, Sumit Mittat, Sougata Mukherjea, and Palak Dalai Research Session III: Query Processing Cooperative Scalable Moving Continuous Query Processing Xiaohul Li, Panagiotis Karras, Lei Shi, Kian-Lee Tan, and Christian S. Jensen Continuous All k-nearest-neighbor Querying in Smartphone Networks Georgios Chatzimilioudis, Demetrios Zeinalipour-Yazti, Wang-Chien Lee, and Marios D. Dikaiakos A Spatial Caching Framework for Map Operations in Geographical Information Systems Marcos R. Vieira, Petko Bakalov, Erik Hoel, and Vassilis J. Tsotras On Packing Very Large R-trees Haoyu Tan, Wuman Luo, Huajian Mao, and Lionel M. Ni Research Session IV: Mobile Sensing and Data Management OptiMoS: Optimal Sensing for Mobile Sensors 1 Zhixian Yan, Mien Eberle, and Karl Aberer Using On-the-Move Mining for Mobile Crowdsensing 1 Wanita Sherchan, Prem P. Jayaraman, Shonali Krishnaswamy, Arkady Zaslavsky, Seng Loke, and Abhijat Sinha A Predictive Protocol for Mobile Context Updates with Hard Energy Constraints 1 Stefan Foil, Florian Berg, Klaus Herrmann, and Kurt Rothermel vi

4 Comet: Decentralized Complex Event Detection in Mobile Delay Tolerant Networks 131 Jianxia Chen, Lakshmish Ramaswamy, David K. Lowenthal, and Shivkumar Kalyanaraman Research Session V: Sensor Networks Optimizing Multiple Data Acquisition Queries in Sparse Mobile Sensor Networks 137 Shili Xiang, Wei Wu, and Kian-Lee Tan An Efficient, Robust, and Scalable Trust Management Scheme for Unattended Wireless Sensor Networks 147 Yi Ren, Vladimir I. Zadorozhny, Vladimir A. Oleshchuk, and Frank Y. Li Trust Management of Encrypted Data Aggregation in a Sensor Network Environment 157 Nayot Poolsappasit, Michael Busby, and Sanjay Kumar Madria Research Session VI: Security and Privacy Privacy-Preserving Data Management in Mobile Environments: A Partial Encryption Approach 167 R.K.N. Sai Krishna, T.J.V.R.K.M.K. Sayi, R. Mukkamala, and P.K. Baruah Encrypted Searchable Storage of RFID Tracking Data 176 Florian Kerschbaum and Leonardo Weiss Ferreira Chaves Privacy-Preserving Sharing of Sensitive Semantic Locations under Road-Network Constraints 186 Emre Yigitoglu, Maria Luisa Damiani, Osman Abul, and Claudio Silvestri Secure Hierarchical Data Aggregation in Wireless Sensor Networks: Performance Evaluation and Analysis 196 Vimal Kumar and Sanjay Kumar Madria Research Session VII: Location and Trajectory Tracking the Dynamic Distribution of People in Indoor Space with Noisy Partitioning Sensors 202 Song Wang, X. Sean Wang, and Yan Huang Low Energy and Sufficiently Accurate Localization for Non-smartphones 212 Kuldeep Yadav, Vinayak Naik, Amarjeet Singh, Pushpendra Singh, and Umesh Chandra Calibrating Large Scale Vehicle Trajectory Data 222 Siyuan Liu, Ce Liu, Qiong Luo, Lionel M. Ni, and Ramayya Krishnan vii

5 Motion Trends Detection in Wireless Sensor Networks 232 Goce Trajcevski, Besim Avci, Fan Zhou, Roberto Tamassia, Peter Scheuermann, Lauren Miller, and Adam Barber Research Session VIII: Mobile Data Mining BP-growth: Searching Strategies for Efficient Behavior Pattern Mining 238 Xueying Li, Huanhuan Cao, Enhong Chen, Hui Xiong, and Jilei Tian Online Identification of Dwell Regions for Moving Objects 248 M. Reaz Uddin, Chinya V. Ravishankar, and Vassilis J. Tsotras MWGen: A Mini World Generator 258 Jianqiu Xu and Ralf Hartmut Guting ComeTogether: Discovering Communities of Places in Mobility Data 268 Igo Ramalho Brilhante, Michele Berlingerio, Roberto Trasarti, Chiara Renso, Jose Antonio Fernandes de Macedo, and Marco Antonio Casanova Poster Papers Maximizing Vehicular Network Connectivity through an Effective Placement of Road Side Units Using Voronoi Diagrams 274 Prithviraj Patil and Aniruddha Gokhale Social and Sensor Data Fusion in the Cloud 276 Surender Reddy Yerva, Jonnahtan Saltarin, Hoyoung Jeung, and Karl Aberer PhonePark: Street Parking Using Mobile Phones 278 Leon Stenneth, Ouri Wolfson, Bo Xu, and Philip S. Yu Detecting Hazardous Vehicles and Disseminating Their Behavior in Urban Areas 280 Vasilis Verroios, Carmen Ruiz Vicente, and Alex Delis Industry Papers Place Learning via Direct WiFi Fingerprint Clustering 282 Olivier Dousse, Mien Eberle, and Matthias Mertens Mining Significant Places from Cell ID Trajectories: A Geo-grid Based Approach 288 Tengfei Sao, Huanhuan Cao, Qiang Yang, Enhong Chen, and Jilei Tian System Management with IBM Mobile Systems Remote: A Question of Power and Scale 294 Jan S, Rellermeyer, Thomas H. Osiecki, Ernest A. Holloway, Patrick J. Bohrer, and Michael Kistier viii

6 Securing Enterprise Data on Smartphones Using Run Time Information Flow Control 300 Palanivel Kodeswaran, Anupam Joshi, and Sougata Mukherjea Vikrant Nandakumar, Shalini Kapoor, Pavan Kamaraju, Cityride: A Predictive Bike Sharing Journey Advisor 306 Ji Won Yoon, Fabio Pinelli, and Francesco Calabrese Demo Papers The Airplace Indoor Positioning Platform for Android Smartphones 312 Christos Laoudias, George Constantinou, Marios Constantinides, Silouanos Nicolaou, Demetrios Zeinalipour-Yazti, and Christos G. Panayiotou MARS: A Personalised Mobile Activity Recognition System 316 Joao Bartolo Gomes, Shonali Krishnaswamy, Mohamed Medhat Gaber, Pedro A. C. Sousa, and Ernestina Menasalvas To Taxi or Not to Taxi? - Enabling Personalised and Real-Time Transportation Decisions for Mobile Users 320 Wei Wu, Wee Siong Ng, Shonali Krishnaswamy, and Abhijat Sinha SmartP2P: A Multi-objective Framework for Finding Social Content in P2P Smartphone Networks 324 Andreas Konstantinidis, Christos Aplitsiotis, and Demetrios Zeinalipour-Yazti A Demonstration of Mining Significant Places from Cell ID Trajectories through a Geo-grid Based Approach 328 Tengfei Bao, Huanhuan Cao, Qiang Yang, Enhong Chen, and Jilei Tian A Smart Mobile Application for Identifying Storage Location of Small Industrial Assets 332 Harikrishna G. N. Rai, K. Sai Deepak, Shahanaz Syed, and P. Radha Krishna SAWLnet: Sensitivity Aware Location Cloaking on Road-NETworks 336 Claudio Silvestri, Emre Yigitoglu, Maria Luisa Damiani, and Osman Abul SimPI: A Simulation Platform for Elastic Load-Balancing in a Distributed Spatial Cache Overlay 340 Carlos Lubbe and Nazario Cipriani Building Activity Definitions to Recognize Complex Activities Using an Online Activity Toolkit 344 Saguna Saguna, Arkady Zaslavsky, and Dipanjan Chakraborty Delivering Mobile egovernance on Low-End-Phones 348 Geetha Manjunath, Revathi Muthanna, S, Thara, Harini Dhanasekaran, Priyanka Tiwari, and Prosenjit Das ix

7 Take Control of Your SMSes: Designing an Usable Spam SMS Filtering System Kuldeep Yadav, Swetank K. Saha; Ponnurangam Kumaraguru, and Rohit Kumra 352 Misco: A System for Data Analysis Applications on Networks of Smartphones Using MapReduce 356 Theofilos Kakantousis, loannis Boutsis, Vana Kalogeraki, Dimitrios Gunopulos, Giorgos Gasparis, and Adam Dou Advanced Seminar Abstracts Mobile Data Stream Mining: From Algorithms to 360 Applications Shonali Krishnaswamy, Joao Gama, and Mohamed Medhat Gaber Crowdsourcing: Dynamic Data Management in Mobile P2P Networks 364 Sanjay Kumar Madria and Anirban Mondal Ph.D. Colloquium Papers Defending Location Privacy Using Zero Knowledge Proof Concept in Location Based Services 368 Priti Jagwani and Saroj Kaushik Framework for Collaborative Download in Wireless Mobile Environment 372 Sourav Kumar Dandapat, Ravi Niranjan, and Niloy Ganguly Extracting Region of Interest (ROI) Details Using LBS Infrastructure and Web-Databases 376 Shivendra Tiwari and Saroj Kaushik Secured Data Management Paradigm for Mobile Grid Environment Using Surrogate Objects 380 H. Parveen Begam and Maluk Mohamed Author Index 385 X

MDM 2012 - The 13th International Conference on Mobile Data Management Bangalore, India Jul 23, 2012 - Jul 26, 2012. Conference Program

MDM 2012 - The 13th International Conference on Mobile Data Management Bangalore, India Jul 23, 2012 - Jul 26, 2012. Conference Program MDM 2012 - The 13th International Conference on Mobile Data Management Bangalore, India Jul 23, 2012 - Jul 26, 2012 http://www.mdmconferences.org/mdm2012/ Conference Program MDM Program 2012 Monday, July

More information

Big Data Analytics in Mobile Environments

Big Data Analytics in Mobile Environments 1 Big Data Analytics in Mobile Environments 熊 辉 教 授 罗 格 斯 - 新 泽 西 州 立 大 学 2012-10-2 Rutgers, the State University of New Jersey Why big data: historical view? Productivity versus Complexity (interrelatedness,

More information

Abstract Geo-localization and Location-aware Opportunistic Communication for Mobile Phones

Abstract Geo-localization and Location-aware Opportunistic Communication for Mobile Phones Abstract Geo-localization and Location-aware Opportunistic Communication for Mobile Phones by Kuldeep Yadav Department of Computer Science Indraprastha Institute of Information Technology, New Delhi Date:

More information

CONTENTS. List of Contributors Preface Acknowledgments. mobility data modeling and representation

CONTENTS. List of Contributors Preface Acknowledgments. mobility data modeling and representation CONTENTS List of Contributors Preface Acknowledgments page xi xv xix part i mobility data modeling and representation 1 Trajectories and Their Representations 3 S. Spaccapietra, C. Parent, L. Spinsanti

More information

Global Soft Solutions JAVA IEEE PROJECT TITLES - 2015

Global Soft Solutions JAVA IEEE PROJECT TITLES - 2015 Global Soft Solutions No : 6, III Floor Chitra Complex Chatram Bus Stand Trichy 620 002 www.globalsoftsolutions.in Email : gsstrichy@gmail.com Ph : 0431 4544308 / Cell : 94431 22110 JAVA IEEE PROJECT TITLES

More information

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM Macha Arun 1, B.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Holy Mary

More information

Cloud Computing. and Scheduling. Data-Intensive Computing. Frederic Magoules, Jie Pan, and Fei Teng SILKQH. CRC Press. Taylor & Francis Group

Cloud Computing. and Scheduling. Data-Intensive Computing. Frederic Magoules, Jie Pan, and Fei Teng SILKQH. CRC Press. Taylor & Francis Group Cloud Computing Data-Intensive Computing and Scheduling Frederic Magoules, Jie Pan, and Fei Teng SILKQH CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor

More information

Workflow Administration of Windchill 10.2

Workflow Administration of Windchill 10.2 Workflow Administration of Windchill 10.2 Overview Course Code Course Length TRN-4339-T 2 Days In this course, you will learn about Windchill workflow features and how to design, configure, and test workflow

More information

Lecture and Presentation Topics (tentative) CS 7301: Recent Advances in Cloud Computing

Lecture and Presentation Topics (tentative) CS 7301: Recent Advances in Cloud Computing Lecture and Presentation Topics (tentative) CS 7301: Recent Advances in Cloud Computing Cloud storage systems The rise of big data on cloud computing: Review and open research issues Consistency models

More information

Security Analysis of Cloud Computing: A Survey

Security Analysis of Cloud Computing: A Survey Security Analysis of Cloud Computing: A Survey Kamaljeet Pakhre 1, Navdeep Singh 2, Sanket Mani Tiwari 3 1,2,3 Research Scholar, M. Tech. (CSE), Galgotias University, Greater Noida, India. Abstract Now

More information

IEEE 2015-2016 JAVA TITLES

IEEE 2015-2016 JAVA TITLES ECWAY ECHNOLGIES IEEE 2015-2016 JAVA TITLES BE, B.TECH, ME, M.TECH, MSC, MCA PROJECTS Abstract: Introduction: Literature Survey: System Analysis: Existing System: Disadvantages: Proposed System: Advantages:

More information

CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW

CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW 1 XINQIN GAO, 2 MINGSHUN YANG, 3 YONG LIU, 4 XIAOLI HOU School of Mechanical and Precision Instrument Engineering, Xi'an University

More information

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing Security Infrastructure for Trusted Offloading in Mobile Cloud Computing Professor Kai Hwang University of Southern California Presentation at Huawei Forum, Santa Clara, Nov. 8, 2014 Mobile Cloud Security

More information

Hadoop. MPDL-Frühstück 9. Dezember 2013 MPDL INTERN

Hadoop. MPDL-Frühstück 9. Dezember 2013 MPDL INTERN Hadoop MPDL-Frühstück 9. Dezember 2013 MPDL INTERN Understanding Hadoop Understanding Hadoop What's Hadoop about? Apache Hadoop project (started 2008) downloadable open-source software library (current

More information

Using Medical Big-Data Platforms to Creating Stochastic Preference for Adaptive Crowd sourcing

Using Medical Big-Data Platforms to Creating Stochastic Preference for Adaptive Crowd sourcing ISSN No: 2454-9614 Using Medical Big-Data Platforms to Creating Stochastic Preference for Adaptive Crowd sourcing L. Poornima Devi, N. Sathyabalaji * a) Department Of Computer Science and Engineering,

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

Introduction to Windchill PDMLink 10.0 for Heavy Users

Introduction to Windchill PDMLink 10.0 for Heavy Users Introduction to Windchill PDMLink 10.0 for Heavy Users Overview Course Code Course Length TRN-3146-T 2 Days In this course, you will learn how to complete the day-to-day functions that enable you to create

More information

Program Learning Objectives

Program Learning Objectives Geographic Information Science, M.S. Majors in Computational Geosciences. 2012-201. Awase Khirni Syed 1 *, Bisheng Yang 2, Eliseo Climentini * 1 s.awasekhirni@tu.edu.sa, Assitant Professor, Taif University,

More information

A QoS-Aware Web Service Selection Based on Clustering

A QoS-Aware Web Service Selection Based on Clustering International Journal of Scientific and Research Publications, Volume 4, Issue 2, February 2014 1 A QoS-Aware Web Service Selection Based on Clustering R.Karthiban PG scholar, Computer Science and Engineering,

More information

Business Administration of Windchill PDMLink 10.0

Business Administration of Windchill PDMLink 10.0 Business Administration of Windchill PDMLink 10.0 Overview Course Code Course Length TRN-3160-T 3 Days After completing this course, you will be well prepared to set up and manage a basic Windchill PDMLink

More information

A Review on Load Balancing Algorithms in Cloud

A Review on Load Balancing Algorithms in Cloud A Review on Load Balancing Algorithms in Cloud Hareesh M J Dept. of CSE, RSET, Kochi hareeshmjoseph@ gmail.com John P Martin Dept. of CSE, RSET, Kochi johnpm12@gmail.com Yedhu Sastri Dept. of IT, RSET,

More information

Capability Service Management System for Manufacturing Equipments in

Capability Service Management System for Manufacturing Equipments in Capability Service Management System for Manufacturing Equipments in Cloud Manufacturing 1 Junwei Yan, 2 Sijin Xin, 3 Quan Liu, 4 Wenjun Xu *1, Corresponding Author School of Information Engineering, Wuhan

More information

About the Authors Preface Acknowledgements List of Acronyms

About the Authors Preface Acknowledgements List of Acronyms Contents About the Authors Preface Acknowledgements List of Acronyms xiii xv xvii xix Part One Wireless Ad Hoc, Sensor and Mesh Networking 1 1 Introduction 3 1.1 Information Security 4 1.1.1 Computer Security

More information

Big Data Storage Architecture Design in Cloud Computing

Big Data Storage Architecture Design in Cloud Computing Big Data Storage Architecture Design in Cloud Computing Xuebin Chen 1, Shi Wang 1( ), Yanyan Dong 1, and Xu Wang 2 1 College of Science, North China University of Science and Technology, Tangshan, Hebei,

More information

Mobile Image Offloading Using Cloud Computing

Mobile Image Offloading Using Cloud Computing Mobile Image Offloading Using Cloud Computing Chintan Shah, Aruna Gawade Student, Dept. of Computer., D.J.Sanghvi College of Engineering, Mumbai University, Mumbai, India Assistant Professor, Dept. of

More information

Mobile Adaptive Opportunistic Junction for Health Care Networking in Different Geographical Region

Mobile Adaptive Opportunistic Junction for Health Care Networking in Different Geographical Region International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 113-118 International Research Publications House http://www. irphouse.com /ijict.htm Mobile

More information

Internet, broadband, and cell phone statistics

Internet, broadband, and cell phone statistics Internet, broadband, and cell phone statistics By: Lee Rainie, Director January 5, 2010 Overview In a national survey between November 30 and December 27, 2009, we find: 74% of American adults (ages 18

More information

ISSN 2319-8885 Vol.04,Issue.19, June-2015, Pages:3633-3638. www.ijsetr.com

ISSN 2319-8885 Vol.04,Issue.19, June-2015, Pages:3633-3638. www.ijsetr.com ISSN 2319-8885 Vol.04,Issue.19, June-2015, Pages:3633-3638 www.ijsetr.com Refining Efficiency of Cloud Storage Services using De-Duplication SARA BEGUM 1, SHAISTA NOUSHEEN 2, KHADERBI SHAIK 3 1 PG Scholar,

More information

Outsourcing with secure accessibility in mobile cloud computing

Outsourcing with secure accessibility in mobile cloud computing Outsourcing with secure accessibility in mobile cloud computing Monika Waghmare 1, Prof T.A.Chavan 2 Department of Information technology, Smt.Kashibai Navale College of Engineering, Pune, India. Abstract

More information

Borges Map How Big Data changes business strategy

Borges Map How Big Data changes business strategy Borges Map How Big Data changes business strategy European Leasing & Consumer Credit Industry Annual Conventions Barcelona, October 9, 2014 Philip Evans The world becomes its own map What the Google self-driving

More information

International Journal of Computer & Organization Trends Volume21 Number1 June 2015 A Study on Load Balancing in Cloud Computing

International Journal of Computer & Organization Trends Volume21 Number1 June 2015 A Study on Load Balancing in Cloud Computing A Study on Load Balancing in Cloud Computing * Parveen Kumar * Er.Mandeep Kaur Guru kashi University,Talwandi Sabo Guru kashi University,Talwandi Sabo Abstract: Load Balancing is a computer networking

More information

IEEE (MDM 2014) Pages 1-373. 2014 IEEE 15th International Conference on Mobile Data Management. Brisbane, Australia. 14-18 July 2014.

IEEE (MDM 2014) Pages 1-373. 2014 IEEE 15th International Conference on Mobile Data Management. Brisbane, Australia. 14-18 July 2014. 2014 IEEE 15th International Conference on Mobile Data Management (MDM 2014) Brisbane, Australia 14-18 July 2014 Volume 1 Pages 1-373 IEEE IEEE Catalog Number: CFP14299-POD ISBN: 978-1-4799-5706-4 1/2

More information

A Survey on Aware of Local-Global Cloud Backup Storage for Personal Purpose

A Survey on Aware of Local-Global Cloud Backup Storage for Personal Purpose A Survey on Aware of Local-Global Cloud Backup Storage for Personal Purpose Abhirupa Chatterjee 1, Divya. R. Krishnan 2, P. Kalamani 3 1,2 UG Scholar, Sri Sairam College Of Engineering, Bangalore. India

More information

Mobile Storage and Search Engine of Information Oriented to Food Cloud

Mobile Storage and Search Engine of Information Oriented to Food Cloud Advance Journal of Food Science and Technology 5(10): 1331-1336, 2013 ISSN: 2042-4868; e-issn: 2042-4876 Maxwell Scientific Organization, 2013 Submitted: May 29, 2013 Accepted: July 04, 2013 Published:

More information

Developing. and Securing. the Cloud. Bhavani Thuraisingham CRC. Press. Taylor & Francis Group. Taylor & Francis Croup, an Informs business

Developing. and Securing. the Cloud. Bhavani Thuraisingham CRC. Press. Taylor & Francis Group. Taylor & Francis Croup, an Informs business Developing and Securing the Cloud Bhavani Thuraisingham @ CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an Informs business AN AUERBACH

More information

Contemporary Techniques for Data Mining Social Media

Contemporary Techniques for Data Mining Social Media Contemporary Techniques for Data Mining Social Media Stephen Cutting (100063482) 1 Introduction Social media websites such as Facebook, Twitter and Google+ allow millions of users to communicate with one

More information

UPS battery remote monitoring system in cloud computing

UPS battery remote monitoring system in cloud computing , pp.11-15 http://dx.doi.org/10.14257/astl.2014.53.03 UPS battery remote monitoring system in cloud computing Shiwei Li, Haiying Wang, Qi Fan School of Automation, Harbin University of Science and Technology

More information

BSM 9.0 ESSENTIALS. Instructor-Led Training

BSM 9.0 ESSENTIALS. Instructor-Led Training BSM 9.0 ESSENTIALS Instructor-Led Training INTENDED AUDIENCE New users of Business Service Management (BSM) 9.0, including: Database Administrators System Administrators Network Administrators Operations

More information

NETWORK SECURITY: CURRENT STATUS AND FUTURE DIRECTIONS

NETWORK SECURITY: CURRENT STATUS AND FUTURE DIRECTIONS NETWORK SECURITY: CURRENT STATUS AND FUTURE DIRECTIONS Preface. Contributors. 1. Computer Network Security: Basic Background and Current Issues (Panayiotis Kotzanikolaou and Christos Douligeris). 1.1 Some

More information

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN

More information

Monitoring and Mining Sensor Data in Cloud Computing Environments

Monitoring and Mining Sensor Data in Cloud Computing Environments Monitoring and Mining Sensor Data in Cloud Computing Environments Wen-Chih Peng and Yu-Chee Tseng Dept. of Computer Science National Chiao Tung University {wcpeng, yctseng}@cs.nctu.edu.tw 1 Outline Sensor

More information

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving, Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party

More information

Towards Next Generation Secure DDDAS/Infosymbiotics Systems

Towards Next Generation Secure DDDAS/Infosymbiotics Systems ICCS 2015, Reykjavik, Iceland June 2015 Towards Next Generation Secure DDDAS/Infosymbiotics Systems Li Xiong and Vaidy Sunderam Students: Layla Pournajaf, Daniel Garcia-Ulloa, Xiaofeng Xu Dept. of Math

More information

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,

More information

Metaheuristics in Big Data: An Approach to Railway Engineering

Metaheuristics in Big Data: An Approach to Railway Engineering Metaheuristics in Big Data: An Approach to Railway Engineering Silvia Galván Núñez 1,2, and Prof. Nii Attoh-Okine 1,3 1 Department of Civil and Environmental Engineering University of Delaware, Newark,

More information

A Selective Neighbor Caching Approach for Supporting Mobility in Publish/Subscribe Networks

A Selective Neighbor Caching Approach for Supporting Mobility in Publish/Subscribe Networks A Selective Neighbor Caching Approach for Supporting Mobility in Publish/Subscribe Networks Vasilios A. Siris, Xenofon Vasilakos, and George C. Polyzos Mobile Multimedia Laboratory Department of Informatics

More information

A Network Simulation Experiment of WAN Based on OPNET

A Network Simulation Experiment of WAN Based on OPNET A Network Simulation Experiment of WAN Based on OPNET 1 Yao Lin, 2 Zhang Bo, 3 Liu Puyu 1, Modern Education Technology Center, Liaoning Medical University, Jinzhou, Liaoning, China,yaolin111@sina.com *2

More information

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered

More information

Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds

Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds Ms. Jyotsna T. Kumbhar 1 ME Student, Department of Computer Engineering, TSSM S, P.V.P.I.T., Bavdhan, Pune University,

More information

International Journal of Advancements in Research & Technology, Volume 3, Issue 5, May-2014 18 ISSN 2278-7763. BIG DATA: A New Technology

International Journal of Advancements in Research & Technology, Volume 3, Issue 5, May-2014 18 ISSN 2278-7763. BIG DATA: A New Technology International Journal of Advancements in Research & Technology, Volume 3, Issue 5, May-2014 18 BIG DATA: A New Technology Farah DeebaHasan Student, M.Tech.(IT) Anshul Kumar Sharma Student, M.Tech.(IT)

More information

Charith Pereral, Arkady Zaslavsky, Peter Christen, Ali Salehi and Dimitrios Georgakopoulos (IEEE 2012) Presented By- Anusha Sekar

Charith Pereral, Arkady Zaslavsky, Peter Christen, Ali Salehi and Dimitrios Georgakopoulos (IEEE 2012) Presented By- Anusha Sekar Charith Pereral, Arkady Zaslavsky, Peter Christen, Ali Salehi and Dimitrios Georgakopoulos (IEEE 2012) Presented By- Anusha Sekar Introduction Terms and Concepts Mobile Sensors Global Sensor Networks DAM4GSN

More information

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

Data Integrity for Secure Dynamic Cloud Storage System Using TPA International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure

More information

An Efficient Crowdsourcing Search Scheme in Vehicular Ad hoc Networks

An Efficient Crowdsourcing Search Scheme in Vehicular Ad hoc Networks Int'l Conf. Wireless Networks ICWN'15 195 An Efficient Crowdsourcing Search Scheme in Vehicular Ad hoc Networks Chyi-Ren Dow, Duc-Binh Nguyen, Zi-How Lin and Shiow-Fen Hwang Department of Information Engineering

More information

Development of an IoT Environmental Monitoring Application with a Novel Middleware for Resource Constrained Devices.

Development of an IoT Environmental Monitoring Application with a Novel Middleware for Resource Constrained Devices. Development of an IoT Environmental Monitoring Application with a Novel Middleware for Resource Constrained Devices. Article Accepted version S. Gaglio, G. Lo Re, G. Martorella, D. Peri, S.D. Vassallo

More information

Research on Architecture and Key Technologies of the Internet of things Qing Mi, Zhen-tao Ni and Xiao-duan Wang

Research on Architecture and Key Technologies of the Internet of things Qing Mi, Zhen-tao Ni and Xiao-duan Wang International Conference on Computational Science and Engineering (ICCSE 2015) Research on Architecture and Key Technologies of the Internet of things Qing Mi, Zhen-tao Ni and Xiao-duan Wang Informatization

More information

Large Scale Spatial Data Management on Mobile Phone data set Using Exploratory Data Analysis

Large Scale Spatial Data Management on Mobile Phone data set Using Exploratory Data Analysis Large Scale Spatial Data Management on Mobile Phone data set Using Exploratory Data Analysis K.S.Pandiyan, Dr.S.Sivakumar Research scholar, Professor, Department of Geology, Anna University, Chennai Abstract

More information

Recent advances in security and privacy in big data

Recent advances in security and privacy in big data University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers Faculty of Engineering and Information Sciences 2015 Recent advances in security and privacy in big data

More information

Developing Scalable Smart Grid Infrastructure to Enable Secure Transmission System Control

Developing Scalable Smart Grid Infrastructure to Enable Secure Transmission System Control Developing Scalable Smart Grid Infrastructure to Enable Secure Transmission System Control EP/K006487/1 UK PI: Prof Gareth Taylor (BU) China PI: Prof Yong-Hua Song (THU) Consortium UK Members: Brunel University

More information

Secure semantic based search over cloud

Secure semantic based search over cloud Volume: 2, Issue: 5, 162-167 May 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Sarulatha.M PG Scholar, Dept of CSE Sri Krishna College of Technology Coimbatore,

More information

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India Call for Papers Cloud computing has emerged as a de facto computing

More information

LIST OF FIGURES. Figure No. Caption Page No.

LIST OF FIGURES. Figure No. Caption Page No. LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS

More information

Windchill PDMLink 10.2. Curriculum Guide

Windchill PDMLink 10.2. Curriculum Guide Windchill PDMLink 10.2 Curriculum Guide Live Classroom Curriculum Guide Update to Windchill PDMLink 10.2 from Windchill PDMLink 9.0/9.1 for the End User Introduction to Windchill PDMLink 10.2 for Light

More information

Thresholds & Pre-requisites

Thresholds & Pre-requisites Thresholds & Pre-requisites Please see below the scoring thresholds and pre-requisites for the QS Stars Evaluation: OVERALL 1000 1 Star... 100 Must have the authority to grant valid degree level programs

More information

23rd Annual ACM Symposium on Applied Computing Tutorial Proposal

23rd Annual ACM Symposium on Applied Computing Tutorial Proposal 23rd Annual ACM Symposium on Applied Computing Tutorial Proposal Tutorial Title: The Energy Role in the Design of Applications for Wireless Sensor Networks Authors: Raquel A. F. Mini Department of Computer

More information

(93)

(93) 1 3 0 6 0 4 0 9 0 2 0 9 0 7 0 7 0 8 0 1 0 7. 0 5 0 2 0 8 0 7 2 0 1 3 (93) 1 3 0 6 0 5 0 0 0 3 0 5 0 6 0 6 0 8 0 7 0 4 0 8 0 9 0 5 0 5 0 8 0 2 0 1 0 2 0 1 0 2 0 5 0 7 0 2 0 8 0 4 0 5 0 6 0 0 0 3 0 1 0 1

More information

Teaching Scheme Credits Assigned Course Code Course Hrs./Week. BEITC802 Big Data 04 02 --- 04 01 --- 05 Analytics. Theory Marks

Teaching Scheme Credits Assigned Course Code Course Hrs./Week. BEITC802 Big Data 04 02 --- 04 01 --- 05 Analytics. Theory Marks Teaching Scheme Credits Assigned Course Code Course Hrs./Week Name Theory Practical Tutorial Theory Practical/Oral Tutorial Tota l BEITC802 Big Data 04 02 --- 04 01 --- 05 Analytics Examination Scheme

More information

SOCIAL NETWORK DATA ANALYTICS

SOCIAL NETWORK DATA ANALYTICS SOCIAL NETWORK DATA ANALYTICS SOCIAL NETWORK DATA ANALYTICS Edited by CHARU C. AGGARWAL IBM T. J. Watson Research Center, Yorktown Heights, NY 10598, USA Kluwer Academic Publishers Boston/Dordrecht/London

More information

Big Data JAMES WARREN. Principles and best practices of NATHAN MARZ MANNING. scalable real-time data systems. Shelter Island

Big Data JAMES WARREN. Principles and best practices of NATHAN MARZ MANNING. scalable real-time data systems. Shelter Island Big Data Principles and best practices of scalable real-time data systems NATHAN MARZ JAMES WARREN II MANNING Shelter Island contents preface xiii acknowledgments xv about this book xviii ~1 Anew paradigm

More information

Mobile Cloud Computing: Paradigms and Challenges 移 动 云 计 算 : 模 式 与 挑 战

Mobile Cloud Computing: Paradigms and Challenges 移 动 云 计 算 : 模 式 与 挑 战 Mobile Cloud Computing: Paradigms and Challenges 移 动 云 计 算 : 模 式 与 挑 战 Jiannong Cao Internet & Mobile Computing Lab Department of Computing Hong Kong Polytechnic University Email: csjcao@comp.polyu.edu.hk

More information

Combining Smart Phone and Infrastructure Sensors To Improve Security in Enterprise Settings

Combining Smart Phone and Infrastructure Sensors To Improve Security in Enterprise Settings Combining Smart Phone and Infrastructure Sensors To Improve Security in Enterprise Settings Palanivel Kodeswaran Dipanjan Chakraborty IBM Research India. IBM Research India. Bangalore Delhi. India India

More information

Seminar: Security Metrics in Cloud Computing (20-00-0577-se)

Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Technische Universität Darmstadt Dependable, Embedded Systems and Software Group (DEEDS) Hochschulstr. 10 64289 Darmstadt Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Topics Descriptions

More information

Introduction to Windchill Projectlink 10.2

Introduction to Windchill Projectlink 10.2 Introduction to Windchill Projectlink 10.2 Overview Course Code Course Length TRN-4270 1 Day In this course, you will learn how to participate in and manage projects using Windchill ProjectLink 10.2. Emphasis

More information

GIS DRIVEN URBAN TRAFFIC ANALYSIS BASED ON ONTOLOGY

GIS DRIVEN URBAN TRAFFIC ANALYSIS BASED ON ONTOLOGY GIS DRIVEN URBAN TRAFFIC ANALYSIS BASED ON ONTOLOGY Tazin Malgundkar 1,Madhuri Rao 2 and Dr. S.S. Mantha 3 1 Student, Computer Engineering, Thadomal Shahani Engineering College, Bandra, Mumbai, India.

More information

Trends and Research Opportunities in Spatial Big Data Analytics and Cloud Computing NCSU GeoSpatial Forum

Trends and Research Opportunities in Spatial Big Data Analytics and Cloud Computing NCSU GeoSpatial Forum Trends and Research Opportunities in Spatial Big Data Analytics and Cloud Computing NCSU GeoSpatial Forum Siva Ravada Senior Director of Development Oracle Spatial and MapViewer 2 Evolving Technology Platforms

More information

AN INFORMATION AGENT SYSTEM FOR CLOUD COMPUTING BASED LOCATION TRACKING

AN INFORMATION AGENT SYSTEM FOR CLOUD COMPUTING BASED LOCATION TRACKING I J I T E ISSN: 2229-7367 3(1-2), 2012, pp. 63-68 AN INFORMATION AGENT SYSTEM FOR CLOUD COMPUTING BASED LOCATION TRACKING ANWAR BASHA H. 1, SAMUEL GEOFFREY LAWRENCE 2 AND INDUMATHI, K. 3 1 Department of

More information

An Analysis and Review on Various Techniques of Mining Big Data

An Analysis and Review on Various Techniques of Mining Big Data Journal homepage: http://www.journalijar.com INTERNATIONAL JOURNAL OF ADVANCED RESEARCH RESEARCH ARTICLE An Analysis and Review on Various Techniques of Mining Big Data Hitesh Kumar Bhatia Masters of Computer

More information

Research of Smart Space based on Business Intelligence

Research of Smart Space based on Business Intelligence Research of Smart Space based on Business Intelligence 1 Jia-yi YAO, 2 Tian-tian MA 1 School of Economics and Management, Beijing Jiaotong University, jyyao@bjtu.edu.cn 2 School of Economics and Management,

More information

BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON

BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON Overview * Introduction * Multiple faces of Big Data * Challenges of Big Data * Cloud Computing

More information

Efficient File Sharing Scheme in Mobile Adhoc Network

Efficient File Sharing Scheme in Mobile Adhoc Network Efficient File Sharing Scheme in Mobile Adhoc Network 1 Y. Santhi, 2 Mrs. M. Maria Sheeba 1 2ndMECSE, Ponjesly College of engineering, Nagercoil 2 Assistant professor, Department of CSE, Nagercoil Abstract:

More information

Wireless Sensor Network: Challenges, Issues and Research

Wireless Sensor Network: Challenges, Issues and Research ISBN 978-93-84468-20-0 Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015) Singapore, March 29-30, 2015, pp. 224-228 Wireless Sensor Network: Challenges, Issues

More information

Mobile Cloud Computing: Critical Analysis of Application Deployment in Virtual Machines

Mobile Cloud Computing: Critical Analysis of Application Deployment in Virtual Machines 2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Mobile Cloud Computing: Critical Analysis of Application Deployment

More information

Development of Software As a Service Based GIS Cloud for Academic Institutes. Singh, Pushpraj 1 and Gupta, R. D. 2

Development of Software As a Service Based GIS Cloud for Academic Institutes. Singh, Pushpraj 1 and Gupta, R. D. 2 Development of Software As a Service Based GIS Cloud for Academic Institutes Singh, Pushpraj 1 and Gupta, R. D. 2 1 Student, M. Tech. (GIS & Remote Sensing); GIS Cell; Motilal Nehru National Institute

More information

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise

More information

Proposed Advance Taxi Recommender System Based On a Spatiotemporal Factor Analysis Model

Proposed Advance Taxi Recommender System Based On a Spatiotemporal Factor Analysis Model Proposed Advance Taxi Recommender System Based On a Spatiotemporal Factor Analysis Model Santosh Thakkar, Supriya Bhosale, Namrata Gawade, Prof. Sonia Mehta Department of Computer Engineering, Alard College

More information

Contents. Preface. About Editors. Contributors. Acknowledgments I 1

Contents. Preface. About Editors. Contributors. Acknowledgments I 1 Preface v About Editors vii Contributors ix Acknowledgments xxi I 1 Chapter 1. Architectures and Cross-Layer Design for Cognitive Networks 3 Dzmitry Kliazovich, Fabrizio Granelli, and Nelson L. S. da Fonseca

More information

Windchill Service Information Manager 10.2. Curriculum Guide

Windchill Service Information Manager 10.2. Curriculum Guide Windchill Service Information Manager 10.2 Curriculum Guide Live Classroom Curriculum Guide Introduction to Windchill Service Information Manager 10.2 Building Information Structures with Windchill Service

More information

Secure Alternate Viable Technique of Securely Sharing The Personal Health Records in Cloud

Secure Alternate Viable Technique of Securely Sharing The Personal Health Records in Cloud Secure Alternate Viable Technique of Securely Sharing The Personal Health Records in Cloud K.S. Aswathy 1, G. Venifa Mini 2 1 M.E. Student, 2 Assistant Professor, Computer Science and Engineering, Noorul

More information

Homomorphic Encryption Schema for Privacy Preserving Mining of Association Rules

Homomorphic Encryption Schema for Privacy Preserving Mining of Association Rules Homomorphic Encryption Schema for Privacy Preserving Mining of Association Rules M.Sangeetha 1, P. Anishprabu 2, S. Shanmathi 3 Department of Computer Science and Engineering SriGuru Institute of Technology

More information

Managing Data in Motion

Managing Data in Motion Managing Data in Motion Data Integration Best Practice Techniques and Technologies April Reeve ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY

More information

Towards Cloud Factory Simulation. Abstract

Towards Cloud Factory Simulation. Abstract Towards Cloud Factory Simulation 第 十 八 屆 決 策 分 析 研 討 會 Toly Chen Department of Industrial Engineering and Systems Management, Feng Chia University *tolychen@ms37.hinet.net Abstract An important and practical

More information

Participatory Cloud Computing and the Privacy and Security of Medical Information Applied to A Wireless Smart Board Network

Participatory Cloud Computing and the Privacy and Security of Medical Information Applied to A Wireless Smart Board Network Participatory Cloud Computing and the Privacy and Security of Medical Information Applied to A Wireless Smart Board Network Lutando Ngqakaza ngqlut003@myuct.ac.za UCT Department of Computer Science Abstract:

More information

Optimized New Efficient Load Balancing Technique For Scheduling Virtual Machine

Optimized New Efficient Load Balancing Technique For Scheduling Virtual Machine Optimized New Efficient Load Balancing Technique For Scheduling Virtual Machine B.Preethi 1, Prof. C. Kamalanathan 2, 1 PG Scholar, 2 Professor 1,2 Bannari Amman Institute of Technology Sathyamangalam,

More information

User Modeling in Big Data. Qiang Yang, Huawei Noah s Ark Lab and Hong Kong University of Science and Technology 杨 强, 华 为 诺 亚 方 舟 实 验 室, 香 港 科 大

User Modeling in Big Data. Qiang Yang, Huawei Noah s Ark Lab and Hong Kong University of Science and Technology 杨 强, 华 为 诺 亚 方 舟 实 验 室, 香 港 科 大 User Modeling in Big Data Qiang Yang, Huawei Noah s Ark Lab and Hong Kong University of Science and Technology 杨 强, 华 为 诺 亚 方 舟 实 验 室, 香 港 科 大 Who we are: Noah s Ark LAB Have you watched the movie 2012?

More information

GeoGrid Project and Experiences with Hadoop

GeoGrid Project and Experiences with Hadoop GeoGrid Project and Experiences with Hadoop Gong Zhang and Ling Liu Distributed Data Intensive Systems Lab (DiSL) Center for Experimental Computer Systems Research (CERCS) Georgia Institute of Technology

More information

Big Data Analytics: Where is it Going and How Can it Be Taught at the Undergraduate Level?

Big Data Analytics: Where is it Going and How Can it Be Taught at the Undergraduate Level? Big Data Analytics: Where is it Going and How Can it Be Taught at the Undergraduate Level? Dr. Frank Lee Chair, ECE/CS/IT New York Institute of Technology Old Westbury, NY 11568 Topics This talk describes:

More information

Enforcing Secure and Privacy-Preserving Information Brokering with Dynamic Load Balancing in Distributed Information Sharing.

Enforcing Secure and Privacy-Preserving Information Brokering with Dynamic Load Balancing in Distributed Information Sharing. Enforcing Secure and Privacy-Preserving Information Brokering with Dynamic Load Balancing in Distributed Information Sharing. 1 M.E. Computer Engineering Department GHRCEM, Wagholi, Pune. Jyotimore2283@gmail.com

More information

Mobile Cloud and Grid Web Service in a Smart City

Mobile Cloud and Grid Web Service in a Smart City Mobile Cloud and Grid Web Service in a Smart City Jong Won Park, Chang Ho Yun, Hae Sun Jung, Yong Woo LEE (Corresponding Author) School of Electrical & Computer Engineering The Smart City (Ubiquitous City)

More information

Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms

Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Kirill Krinkin Open Source and Linux lab Saint Petersburg, Russia kirill.krinkin@fruct.org Eugene Kalishenko Saint Petersburg

More information

Analysis of Email Fraud Detection Using WEKA Tool

Analysis of Email Fraud Detection Using WEKA Tool Analysis of Email Fraud Detection Using WEKA Tool Author:Tarushi Sharma, M-Tech(Information Technology), CGC Landran Mohali, Punjab,India, Co-Author:Mrs.Amanpreet Kaur (Assistant Professor), CGC Landran

More information