Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

San Jose State University

Series

Discipline
Keyword
Publication Year
Publication

Articles 31 - 60 of 62

Full-Text Articles in Computer Engineering

A Multi-Value Sequence Generated By Power Residue Symbol And Trace Function Over Odd Characteristic Field, Yasuyuki Nogami, Satoshi Uehara, Kazuyoshi Tsuchiya, Nasima Begum, Hiroto Ino, Robert Morelos-Zaragoza Dec 2016

A Multi-Value Sequence Generated By Power Residue Symbol And Trace Function Over Odd Characteristic Field, Yasuyuki Nogami, Satoshi Uehara, Kazuyoshi Tsuchiya, Nasima Begum, Hiroto Ino, Robert Morelos-Zaragoza

Faculty Publications

This paper proposes a new multi-value sequence generated by utilizing primitive element, trace, and power residue symbol over odd characteristic finite field. In detail, let p and k be an odd prime number as the characteristic and a prime factor of p-1, respectively. Our proposal generates k-value sequence T={ti | ti=fk(Tr(ωi)+A)}, where ω is a primitive element in the extension field $\F{p}{m}$, Tr(⋅) is the trace function that maps $\F{p}{m} \rightarrow \f{p}$, A is a non-zero scalar in the prime field $\f{p}$, and fk(⋅) is a certain mapping function based on k-th power residue symbol. Thus, the proposed sequence has …


Advances In Repurposing And Recycling Of Post-Vehicle-Application Lithium-Ion Batteries, Charles R. Standridge, Lindsay Corneal, Nicholas Baine May 2016

Advances In Repurposing And Recycling Of Post-Vehicle-Application Lithium-Ion Batteries, Charles R. Standridge, Lindsay Corneal, Nicholas Baine

Mineta Transportation Institute

Increased electrification of vehicles has increased the use of lithium-ion batteries for energy storage, and raised the issue of what to do with post-vehicle-application batteries. Three possibilities have been identified: 1) remanufacturing for intended reuse in vehicles; 2) repurposing for non-vehicle, stationary storage applications; and 3) recycling, extracting the precious metals, chemicals and other byproducts. Advances in repurposing and recycling are presented, along with a mathematical model that forecasts the manufacturing capacity needed for remanufacturing, repurposing, and recycling. Results obtained by simulating the model show that up to a 25% reduction in the need for new batteries can be achieved …


Threshold-Bounded Influence Dominating Sets For Recommendations In Social Networks, Magdalini Eirinaki, Nuno Moniz, Katerina Potika Jan 2016

Threshold-Bounded Influence Dominating Sets For Recommendations In Social Networks, Magdalini Eirinaki, Nuno Moniz, Katerina Potika

Faculty Publications

The process of decision making in humans involves a combination of the genuine information held by the individual, and the external influence from their social network connections. This helps individuals to make decisions or adopt behaviors, opinions or products. In this work, we seek to investigate under which conditions and with what cost we can form neighborhoods of influence within a social network, in order to assist individuals with little or no prior genuine information through a two-phase recommendation process. Most of the existing approaches regard the problem of identifying influentials as a long-term, network diffusion process, where information cascading …


Time-Based Ensembles For Prediction Of Rare Events In News Streams, Nuno Moniz, Luís Torgo, Magdalini Eirinaki Jan 2016

Time-Based Ensembles For Prediction Of Rare Events In News Streams, Nuno Moniz, Luís Torgo, Magdalini Eirinaki

Faculty Publications

Thousands of news are published everyday reporting worldwide events. Most of these news obtain a low level of popularity and only a small set of events become highly popular in social media platforms. Predicting rare cases of highly popular news is not a trivial task due to shortcomings of standard learning approaches and evaluation metrics. So far, the standard task of predicting the popularity of news items has been tackled by either of two distinct strategies related to the publication time of news. The first strategy, a priori, is focused on predicting the popularity of news upon their publication when …


Development Of Cloud-Based Uav Monitoring And Management System, Mason Itkin, Mihui Kim, Younghee Park Jan 2016

Development Of Cloud-Based Uav Monitoring And Management System, Mason Itkin, Mihui Kim, Younghee Park

Faculty Publications

Unmanned aerial vehicles (UAVs) are an emerging technology with the potential to revolutionize commercial industries and the public domain outside of the military. UAVs would be able to speed up rescue and recovery operations from natural disasters and can be used for autonomous delivery systems (e.g., Amazon Prime Air). An increase in the number of active UAV systems in dense urban areas is attributed to an influx of UAV hobbyists and commercial multi-UAV systems. As airspace for UAV flight becomes more limited, it is important to monitor and manage many UAV systems using modern collision avoidance techniques. In this paper, …


A Cloud-Based Framework For Smart Permit System For Buildings, Magdalini Eirinaki, Subhankar Dhar, Shishir Mathur Jan 2016

A Cloud-Based Framework For Smart Permit System For Buildings, Magdalini Eirinaki, Subhankar Dhar, Shishir Mathur

Faculty Publications

In this paper we propose a novel cloud-based platform for building permit system that is efficient, user-friendly, transparent, and has quick turn-around time for homeowners. Compared to the existing permit systems, the proposed smart city permit framework provides a pre-permitting decision workflow, and incorporates a data analytics and mining module that enables the continuous improvement of a) the end user experience, by analyzing explicit and implicit user feedback, and b) the permitting and urban planning process, allowing a gleaning of key insights for real estate development and city planning purposes, by analyzing how users interact with the system depending on …


Pro-Fit: Exercise With Friends, Saumil Dharia, Vijesh Jain, Jvalant Patel, Jainikkumar Vora, Rizen Yamauchi, Magdalini Eirinaki, Iraklis Varlamis Jan 2016

Pro-Fit: Exercise With Friends, Saumil Dharia, Vijesh Jain, Jvalant Patel, Jainikkumar Vora, Rizen Yamauchi, Magdalini Eirinaki, Iraklis Varlamis

Faculty Publications

The advancements in wearable technology, where embedded accelerometers, gyroscopes and other sensors enable the users to actively monitor their activity have made it easier for individuals to pursue a healthy lifestyle. However, most of the existing applications expect continuous commitment from the end users, who need to proactively interact with the application in order to connect with friends and attain their goals. These applications fail to engage and motivate users who have busy schedules, or are not as committed and self-motivated. In this work, we present PRO-Fit, a personalized fitness assistant application that employs machine learning and recommendation algorithms in …


A Human-Centered Credit-Banking System For Convenient, Fair And Secure Carpooling Among Members Of An Association, H.-S. Jacob Tsao, Magdalini Eirinaki Jan 2015

A Human-Centered Credit-Banking System For Convenient, Fair And Secure Carpooling Among Members Of An Association, H.-S. Jacob Tsao, Magdalini Eirinaki

Faculty Publications

This paper proposes an unconventional carpool-matching system concept that is different from existing systems with four innovative operational features: (F1) The proposed matching system will be used by members of an association and sponsored by the association, e.g., the employees of a company, members of a homeowner association, employees of a shopping center. This expands the scope beyond commute trips. Such associations can also voluntarily form alliances to increase the number of possible carpool partners and geographical reach. (F2) Service provided by a driver or received by a rider incurs credit or debt to a bank centrally and fairly managed …


Querie: Collaborative Database Exploration, Magdalini Eirinaki, Suju Abraham, Neoklis Polyzotis, Naushin Shaikh Jul 2014

Querie: Collaborative Database Exploration, Magdalini Eirinaki, Suju Abraham, Neoklis Polyzotis, Naushin Shaikh

Faculty Publications

No abstract provided.


On Optimal Media/Video Distribution In Closed P2p-Based Iptv Networks, Hao Cui, Xiao Su, Weijia Shang Feb 2014

On Optimal Media/Video Distribution In Closed P2p-Based Iptv Networks, Hao Cui, Xiao Su, Weijia Shang

Faculty Publications

Video distribution over the Internet has become a popular service because of technological advances in internet (e.g., higher network bandwidth) and video coding (e.g., H.264/SVC). In this and other similar media distribution applications, a server or distribution center sends a media/video to a group peers with different bandwidth resources and display capacities. In one of the approaches, the peer-to-peer approach, the server sends only one copy of the media over Internet, and each peer receives one segment of the media and exchanges his/her segment with other peers to receive the complete media. A key design issue in this approach is …


Querie: Collaborative Database Exploration, Magdalini Eirinaki, S. Abraham, N. Polyzotis, N. Shaikh Jan 2013

Querie: Collaborative Database Exploration, Magdalini Eirinaki, S. Abraham, N. Polyzotis, N. Shaikh

Faculty Publications

Interactive database exploration is a key task in information mining. However, users who lack SQL expertise or familiarity with the database schema face great difficulties in performing this task. To aid these users, we developed the QueRIE system for personalized query recommendations. QueRIE continuously monitors the user’s querying behavior and finds matching patterns in the system’s query log, in an attempt to identify previous users with similar information needs. Subsequently, QueRIE uses these “similar” users and their queries to recommend queries that the current user may find interesting. In this work we describe an instantiation of the QueRIE framework, where …


A Smartphone Design Approach To User Communication Interface For Administering Storage System Network, Weider Yu, Xiao Su, Jason Hansen Dec 2012

A Smartphone Design Approach To User Communication Interface For Administering Storage System Network, Weider Yu, Xiao Su, Jason Hansen

Faculty Publications

This paper investigates the feasibility and potential of using a mobile smartphone as a user administration control for storage system network. It includes the design and implementation of a mobile smartphone software system that can be used to perform system administration activities on the storage system without the need of using a laptop or desktop system. In the paper the design of some effective metaphors to present the storage system on the limited display area of a mobile smartphone device and the set of system features chosen for implementation are presented. Current storage system administration is limited to using storage …


Feature-Based Opinion Mining And Ranking, Magdalini Eirinaki, S. Pisal, J. Singh Jul 2012

Feature-Based Opinion Mining And Ranking, Magdalini Eirinaki, S. Pisal, J. Singh

Faculty Publications

The proliferation of blogs and social networks presents a new set of challenges and opportunities in the way information is searched and retrieved. Even though facts still play a very important role when information is sought on a topic, opinions have become increasingly important as well. Opinions expressed in blogs and social networks are playing an important role influencing everything from the products people buy to the presidential candidate they support. Thus, there is a need for a new type of search engine which will not only retrieve facts, but will also enable the retrieval of opinions. Such a search …


Power Spectral Densities Of Baseband Signals In Epc Class-1 Gen-2 Uhf Rfid Systems, Robert H. Morelos-Zaragoza Mar 2012

Power Spectral Densities Of Baseband Signals In Epc Class-1 Gen-2 Uhf Rfid Systems, Robert H. Morelos-Zaragoza

Faculty Publications

The power spectral densities (PSD) of baseband signals in EPC Class-1 Gen-2 UHF RFID systems are shown. PSD are obtained using Matlab as the Fourier transform (via the FFT algorithm) of the autocorrelation function of random pulse sequences. The PSD of PIE, FM0 and Miller subcarrier for M=2, 4 and 8 are shown for both unipolar (for 100% ASK or OOK modulation) and polar (PSK modulation) waveforms.


Identification Of Influential Social Networkers, Magdalini Eirinaki, S. P. Singh Monga, S. Sundaram Jan 2012

Identification Of Influential Social Networkers, Magdalini Eirinaki, S. P. Singh Monga, S. Sundaram

Faculty Publications

Online social networking is deeply interleaved in today's lifestyle. People come together and build communities to share thoughts, offer suggestions, exchange information, ideas, and opinions. Moreover, social networks often serve as platforms for information dissemination and product placement or promotion through viral marketing. The success rate in this type of marketing could be increased by targeting specific individuals, called 'influential users', having the largest possible reach within an online community. In this paper, we present a method aiming at identifying the influential users within an online social networking application. We introduce ProfileRank, a metric that uses popularity and activity characteristics …


Sql Querie Recommendations: A Query Fragment-Based Approach, Jayad Akbarnejad, Magdalini Eirinaki, Suju Koshy, Duc On, Neoklis Polyzotis Sep 2010

Sql Querie Recommendations: A Query Fragment-Based Approach, Jayad Akbarnejad, Magdalini Eirinaki, Suju Koshy, Duc On, Neoklis Polyzotis

Faculty Publications

Relational database systems are becoming increasingly popular in the scientific community to support the interactive exploration of large volumes of data. In this scenario, users employ a query interface (typically, a web-based client) to issue a series of SQL queries that aim to analyze the data and mine it for interesting information. First-time users, however, may not have the necessary knowledge to know where to start their exploration. Other times, users may simply overlook queries that retrieve important information. In this work we describe a framework to assist non-expert users by providing personalized query recommendations. The querying behavior of the …


Personal Vs. Social, Magdalini Eirinaki Sep 2010

Personal Vs. Social, Magdalini Eirinaki

Faculty Publications

The last few years we witnessed an impressive growth in social networks and in applications that add value to their amassed information. At the same time, the continuing expansion of mobile platforms and applications (e.g. iPhone), combined with the overwhelming supply of information and services, makes effective personalization and context-awareness much required features. One may consider "personal" and "social" data management as comprising two distinct directions with conflicting characteristics. However, it can be argued that they complement each other and that in future applications they will ultimately converge. This "personal vs. social" predicament presents a number of interesting topics that …


Mining Frequent Generalized Patterns For Web Personalization In The Presence Of Taxonomies, P. Giannikopoulos, I. Varlamis, Magdalini Eirinaki Jan 2010

Mining Frequent Generalized Patterns For Web Personalization In The Presence Of Taxonomies, P. Giannikopoulos, I. Varlamis, Magdalini Eirinaki

Faculty Publications

The Web is a continuously evolving environment, since its content is updated on a regular basis. As a result, the traditional usage-based approach to generate recommendations that takes as input the navigation paths recorded on the Web page level, is not as effective. Moreover, most of the content available online is either explicitly or implicitly characterized by a set of categories organized in a taxonomy, allowing the page-level navigation patterns to be generalized to a higher, aggregate level. In this direction, the authors present the Frequent Generalized Pattern (FGP) algorithm. FGP takes as input the transaction data and a hierarchy …


Incentive Mechanisms In P2p Media Streaming Systems, Xiao Su, Suchreet Dhaliwal Jan 2010

Incentive Mechanisms In P2p Media Streaming Systems, Xiao Su, Suchreet Dhaliwal

Faculty Publications

This paper highlights the need to curb free-riding in P2P media streaming systems and discusses the mechanisms by which this could be accomplished. Free riding, whereby a peer utilizes network resources, but does not contribute services could have a huge impact on the efficacy of blue streaming systems, leading to scalability issues and service degradation. We discuss why BitTorrent-like tit-for-tat mechanisms cannot be simply tailored and used in streaming. Even though the problem of free riding is more severe in P2P media streaming than in file sharing, the deployed systems still lack incentive schemes. In this paper, we categorize, analyze, …


Mobility Handling In Mac For Wireless Ad Hoc Networks, Anjali Raja, Xiao Su Mar 2009

Mobility Handling In Mac For Wireless Ad Hoc Networks, Anjali Raja, Xiao Su

Faculty Publications

Wireless Sensor Networks (WSNs) are becoming popular in a wide variety of applications. In a WSN, sensor nodes can be static or mobile, depending on applications. Handling mobility in a sensor network can pose interesting challenges in sensor protocol design, and special algorithms are needed to adapt to mobility in the network. In this paper, we survey the current state of art in handling mobility in sensor networks. We first study how mobility affects the design of different layers in the sensor network architecture, and then take a closer look at mobility handling in the MAC layer. We also describe …


Query Recommendations For Interactive Database Exploration, Gloria Chatzopoulou, Magdalini Eirinaki, Neoklis Polyzotis Jan 2009

Query Recommendations For Interactive Database Exploration, Gloria Chatzopoulou, Magdalini Eirinaki, Neoklis Polyzotis

Faculty Publications

Relational database systems are becoming increasingly popular in the scientific community to support the interactive exploration of large volumes of data. In this scenario, users employ a query interface (typically, a web-based client) to issue a series of SQL queries that aim to analyze the data and mine it for interesting information. First-time users, however, may not have the necessary knowledge to know where to start their exploration. Other times, users may simply overlook queries that retrieve important information. To assist users in this context, we draw inspiration from Web recommender systems and propose the use of personalized query recommendations. …


Selfish Wavelength Assignment In Multifiber Optical Networks, Evangelos Bampas, Aris Pagourtzis, George Pierrakos, Katerina Potika Apr 2008

Selfish Wavelength Assignment In Multifiber Optical Networks, Evangelos Bampas, Aris Pagourtzis, George Pierrakos, Katerina Potika

Faculty Publications, Computer Science

No abstract provided.


Efficient Peer Assignment For Low-Latency Transmission Of Scalable Coded Images, Xiao Su, Tao Wang Mar 2008

Efficient Peer Assignment For Low-Latency Transmission Of Scalable Coded Images, Xiao Su, Tao Wang

Faculty Publications

In this paper, we propose efficient peer assignment algorithms for low-latency transmission of scalable coded images in peer-to-peer networks, in which peers may dynamically join and leave the networks. The objective of our algorithm is to minimize the transmission time of a requested image that is scalable coded. When an image is scalable coded in different bit rates, the bit stream encoded in a lower bit rate is a prefix subset of the one encoded in a higher bit rate. Therefore, a peer with the same requested image coded in any bit rate, even when it is different from the …


A Survey Of Worm Detection And Containment, Pele Li, M. Salour, Xiao Su Jan 2008

A Survey Of Worm Detection And Containment, Pele Li, M. Salour, Xiao Su

Faculty Publications

Self-duplicating, self-propagating malicious codes known as computer worms spread themselves without any human interaction and launch the most destructive attacks against computer networks. At the same time, being fully automated makes their behavior repetitious and predictable. This article presents a survey and comparison of Internet worm detection and containment schemes. We first identify worm characteristics through their behavior, and then classify worm detection algorithms based on the parameters used in the algorithms. Furthermore, we analyze and compare different detection algorithms with reference to the worm characteristics by identifying the type of worms that can and cannot be detected by these …


Web Site Personalization Based On Link Analysis And Navigational Patterns, Magdalini Eirinaki, M. Varzirgiannis Oct 2007

Web Site Personalization Based On Link Analysis And Navigational Patterns, Magdalini Eirinaki, M. Varzirgiannis

Faculty Publications

The continuous growth in the size and use of the World Wide Web imposes new methods of design and development of on-line information services. The need for predicting the users’ needs in order to improve the usability and user retention of a web site is more than evident and can be addressed by personalizing it. Recommendation algorithms aim at proposing “next” pages to users based on their current visit and the past users’ navigational patterns. In the vast majority of related algorithms, however, only the usage data are used to produce recommendations, disregarding the structural properties of the web graph. …


Sequence Of Linear Programming For Transmission Of Fine-Scalable Coded Content In Bandwidth-Limited Environments, Xiao Su, Tao Wang Jun 2006

Sequence Of Linear Programming For Transmission Of Fine-Scalable Coded Content In Bandwidth-Limited Environments, Xiao Su, Tao Wang

Faculty Publications

In this paper, we propose an optimal peer assignment algorithm on peer-to-peer networks. This algorithm is designed to maximize the quality of transmitting fine-scalable coded content by exploiting the embedding property of scalable coding. To be more realistic, we assume that the requesting peer has a delay constraint to display the content within a certain delay bound, and it also has limited incoming bandwidth. We first use a simple example to illustrate the peer assignment problem, and then formulate this problem as a linear programming problem, followed by a nonlinear programming problem. To efficiently solve the second nonlinear problem, we …


Loss Aware Rate Allocations In H.263 Coded Video Transmissions, Xiao Su, Benjamin Wah Dec 2005

Loss Aware Rate Allocations In H.263 Coded Video Transmissions, Xiao Su, Benjamin Wah

Faculty Publications

For packet video, information loss and bandwidth limitation are two factors that affect video playback quality. Traditional rate allocation approaches have focused on optimizing video quality under bandwidth constraint alone. However, in the best-effort Internet, packets carrying video data are susceptible to losses, which need to be reconstructed at the receiver side. In this paper, we propose loss aware rate allocations in both group-of-block (GOB) level and macroblock level, given that certain packets are lost during transmissions and reconstructed using simple interpolation methods at the receiver side. Experimental results show that our proposed algorithms can produce videos of higher quality …


Ontologies In Web Personalization, Magdalini Eirinaki, Michalis Vazirgiannis Oct 2005

Ontologies In Web Personalization, Magdalini Eirinaki, Michalis Vazirgiannis

Faculty Publications

No abstract provided.


Optimizing Transmission Time Of Scalable Coded Images In Peer-To-Peer Networks, Xiao Su, Rod Fatoohi, Tao Wang Aug 2005

Optimizing Transmission Time Of Scalable Coded Images In Peer-To-Peer Networks, Xiao Su, Rod Fatoohi, Tao Wang

Faculty Publications

In this paper, we study how to optimize image transmission time in peer-to-peer networks by considering the property of bitstreams generated by image coding algorithms. Images can be either scalable coded or nonscalable coded. Since transmission of nonscalable coded images is well understood, we focus on the transmission of scalable coded images in this paper.Because scalable coding embeds lower bit-rate bitstreams into higher bit-rate bitstreams, there exists a many-to-one relationship between supplying and requesting peers. When a requesting peer asks for an image coded in a particular bit rate, multiple peers with the same image but coded in different bit …


Delay-Constrained Transmission Of Fine Scalable Coded Content Over P2p Networks, Xiao Su, Yi Shang, Tao Wang, Yuqing Mai Jan 2005

Delay-Constrained Transmission Of Fine Scalable Coded Content Over P2p Networks, Xiao Su, Yi Shang, Tao Wang, Yuqing Mai

Faculty Publications

Images or videos are generally coded before transmission, and they can be either non-scalable coded or scalable coded, which can be further classified into fine-scalable coded and coarse-scalable coded. In this paper, we focus on delivery of fine-scalable coded content. The objective of our work is to design algorithms to optimize the quality of fine-scalable coded images or videos on peer-to-peer networks when a requesting peer is delay-sensitive and has to display content within a certain delay bound. Fine-scalable coding has two properties: (1) it embeds lower bit-rate bitstreams into higher bit-rate bitstreams; and (2) its coding quality increases with …