Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Physical Sciences and Mathematics (22)
- Computer Sciences (21)
- Electrical and Computer Engineering (7)
- Social and Behavioral Sciences (6)
- Computer and Systems Architecture (5)
-
- Hardware Systems (5)
- Public Affairs, Public Policy and Public Administration (4)
- Transportation (4)
- Digital Communications and Networking (3)
- Medicine and Health Sciences (3)
- Other Electrical and Computer Engineering (3)
- Communication (2)
- Data Storage Systems (2)
- Operations Research, Systems Engineering and Industrial Engineering (2)
- Robotics (2)
- Social Media (2)
- Aerospace Engineering (1)
- Art and Design (1)
- Artificial Intelligence and Robotics (1)
- Arts and Humanities (1)
- Aviation (1)
- Civil Engineering (1)
- Civil and Environmental Engineering (1)
- Databases and Information Systems (1)
- Digital Circuits (1)
- Game Design (1)
- Industrial Engineering (1)
- Mechanical Engineering (1)
- Keyword
-
- Journal Publications (6)
- Electrical Engineering (3)
- Image transmission (3)
- Introduction to quantum computing (3)
- Linear algebra for quantum computing (3)
-
- Peer-to-peer networks (3)
- Quantum Computer Programming (3)
- Quantum computing for beginners (3)
- Quantum computing from scratch (3)
- Scalable coding (3)
- Activity tracking (2)
- Peer assignment (2)
- Personalized assistant (2)
- Predictive models (2)
- Recommender systems (2)
- Wearable technology (2)
- Accident Prevention (1)
- Advanced Driver Assistance systems (ADAS) (1)
- All-pairs (1)
- Applied Machine Learning (1)
- Articles in Refereed Journals and Book Series (1)
- Artificial intelligence (1)
- Autonomous system (1)
- Big data (1)
- Biologically inspired robotics and micro-biorobotics - Biologically inspired locomotion (1)
- Bit-sliced index (1)
- Bitmap index (1)
- Bounded similarity graph (1)
- Bridges (1)
- Building permit (1)
- Publication Year
Articles 31 - 60 of 62
Full-Text Articles in Computer Engineering
A Multi-Value Sequence Generated By Power Residue Symbol And Trace Function Over Odd Characteristic Field, Yasuyuki Nogami, Satoshi Uehara, Kazuyoshi Tsuchiya, Nasima Begum, Hiroto Ino, Robert Morelos-Zaragoza
A Multi-Value Sequence Generated By Power Residue Symbol And Trace Function Over Odd Characteristic Field, Yasuyuki Nogami, Satoshi Uehara, Kazuyoshi Tsuchiya, Nasima Begum, Hiroto Ino, Robert Morelos-Zaragoza
Faculty Publications
This paper proposes a new multi-value sequence generated by utilizing primitive element, trace, and power residue symbol over odd characteristic finite field. In detail, let p and k be an odd prime number as the characteristic and a prime factor of p-1, respectively. Our proposal generates k-value sequence T={ti | ti=fk(Tr(ωi)+A)}, where ω is a primitive element in the extension field $\F{p}{m}$, Tr(⋅) is the trace function that maps $\F{p}{m} \rightarrow \f{p}$, A is a non-zero scalar in the prime field $\f{p}$, and fk(⋅) is a certain mapping function based on k-th power residue symbol. Thus, the proposed sequence has …
Advances In Repurposing And Recycling Of Post-Vehicle-Application Lithium-Ion Batteries, Charles R. Standridge, Lindsay Corneal, Nicholas Baine
Advances In Repurposing And Recycling Of Post-Vehicle-Application Lithium-Ion Batteries, Charles R. Standridge, Lindsay Corneal, Nicholas Baine
Mineta Transportation Institute
Increased electrification of vehicles has increased the use of lithium-ion batteries for energy storage, and raised the issue of what to do with post-vehicle-application batteries. Three possibilities have been identified: 1) remanufacturing for intended reuse in vehicles; 2) repurposing for non-vehicle, stationary storage applications; and 3) recycling, extracting the precious metals, chemicals and other byproducts. Advances in repurposing and recycling are presented, along with a mathematical model that forecasts the manufacturing capacity needed for remanufacturing, repurposing, and recycling. Results obtained by simulating the model show that up to a 25% reduction in the need for new batteries can be achieved …
Threshold-Bounded Influence Dominating Sets For Recommendations In Social Networks, Magdalini Eirinaki, Nuno Moniz, Katerina Potika
Threshold-Bounded Influence Dominating Sets For Recommendations In Social Networks, Magdalini Eirinaki, Nuno Moniz, Katerina Potika
Faculty Publications
The process of decision making in humans involves a combination of the genuine information held by the individual, and the external influence from their social network connections. This helps individuals to make decisions or adopt behaviors, opinions or products. In this work, we seek to investigate under which conditions and with what cost we can form neighborhoods of influence within a social network, in order to assist individuals with little or no prior genuine information through a two-phase recommendation process. Most of the existing approaches regard the problem of identifying influentials as a long-term, network diffusion process, where information cascading …
Time-Based Ensembles For Prediction Of Rare Events In News Streams, Nuno Moniz, Luís Torgo, Magdalini Eirinaki
Time-Based Ensembles For Prediction Of Rare Events In News Streams, Nuno Moniz, Luís Torgo, Magdalini Eirinaki
Faculty Publications
Thousands of news are published everyday reporting worldwide events. Most of these news obtain a low level of popularity and only a small set of events become highly popular in social media platforms. Predicting rare cases of highly popular news is not a trivial task due to shortcomings of standard learning approaches and evaluation metrics. So far, the standard task of predicting the popularity of news items has been tackled by either of two distinct strategies related to the publication time of news. The first strategy, a priori, is focused on predicting the popularity of news upon their publication when …
Development Of Cloud-Based Uav Monitoring And Management System, Mason Itkin, Mihui Kim, Younghee Park
Development Of Cloud-Based Uav Monitoring And Management System, Mason Itkin, Mihui Kim, Younghee Park
Faculty Publications
Unmanned aerial vehicles (UAVs) are an emerging technology with the potential to revolutionize commercial industries and the public domain outside of the military. UAVs would be able to speed up rescue and recovery operations from natural disasters and can be used for autonomous delivery systems (e.g., Amazon Prime Air). An increase in the number of active UAV systems in dense urban areas is attributed to an influx of UAV hobbyists and commercial multi-UAV systems. As airspace for UAV flight becomes more limited, it is important to monitor and manage many UAV systems using modern collision avoidance techniques. In this paper, …
A Cloud-Based Framework For Smart Permit System For Buildings, Magdalini Eirinaki, Subhankar Dhar, Shishir Mathur
A Cloud-Based Framework For Smart Permit System For Buildings, Magdalini Eirinaki, Subhankar Dhar, Shishir Mathur
Faculty Publications
In this paper we propose a novel cloud-based platform for building permit system that is efficient, user-friendly, transparent, and has quick turn-around time for homeowners. Compared to the existing permit systems, the proposed smart city permit framework provides a pre-permitting decision workflow, and incorporates a data analytics and mining module that enables the continuous improvement of a) the end user experience, by analyzing explicit and implicit user feedback, and b) the permitting and urban planning process, allowing a gleaning of key insights for real estate development and city planning purposes, by analyzing how users interact with the system depending on …
Pro-Fit: Exercise With Friends, Saumil Dharia, Vijesh Jain, Jvalant Patel, Jainikkumar Vora, Rizen Yamauchi, Magdalini Eirinaki, Iraklis Varlamis
Pro-Fit: Exercise With Friends, Saumil Dharia, Vijesh Jain, Jvalant Patel, Jainikkumar Vora, Rizen Yamauchi, Magdalini Eirinaki, Iraklis Varlamis
Faculty Publications
The advancements in wearable technology, where embedded accelerometers, gyroscopes and other sensors enable the users to actively monitor their activity have made it easier for individuals to pursue a healthy lifestyle. However, most of the existing applications expect continuous commitment from the end users, who need to proactively interact with the application in order to connect with friends and attain their goals. These applications fail to engage and motivate users who have busy schedules, or are not as committed and self-motivated. In this work, we present PRO-Fit, a personalized fitness assistant application that employs machine learning and recommendation algorithms in …
A Human-Centered Credit-Banking System For Convenient, Fair And Secure Carpooling Among Members Of An Association, H.-S. Jacob Tsao, Magdalini Eirinaki
A Human-Centered Credit-Banking System For Convenient, Fair And Secure Carpooling Among Members Of An Association, H.-S. Jacob Tsao, Magdalini Eirinaki
Faculty Publications
This paper proposes an unconventional carpool-matching system concept that is different from existing systems with four innovative operational features: (F1) The proposed matching system will be used by members of an association and sponsored by the association, e.g., the employees of a company, members of a homeowner association, employees of a shopping center. This expands the scope beyond commute trips. Such associations can also voluntarily form alliances to increase the number of possible carpool partners and geographical reach. (F2) Service provided by a driver or received by a rider incurs credit or debt to a bank centrally and fairly managed …
Querie: Collaborative Database Exploration, Magdalini Eirinaki, Suju Abraham, Neoklis Polyzotis, Naushin Shaikh
Querie: Collaborative Database Exploration, Magdalini Eirinaki, Suju Abraham, Neoklis Polyzotis, Naushin Shaikh
Faculty Publications
No abstract provided.
On Optimal Media/Video Distribution In Closed P2p-Based Iptv Networks, Hao Cui, Xiao Su, Weijia Shang
On Optimal Media/Video Distribution In Closed P2p-Based Iptv Networks, Hao Cui, Xiao Su, Weijia Shang
Faculty Publications
Video distribution over the Internet has become a popular service because of technological advances in internet (e.g., higher network bandwidth) and video coding (e.g., H.264/SVC). In this and other similar media distribution applications, a server or distribution center sends a media/video to a group peers with different bandwidth resources and display capacities. In one of the approaches, the peer-to-peer approach, the server sends only one copy of the media over Internet, and each peer receives one segment of the media and exchanges his/her segment with other peers to receive the complete media. A key design issue in this approach is …
Querie: Collaborative Database Exploration, Magdalini Eirinaki, S. Abraham, N. Polyzotis, N. Shaikh
Querie: Collaborative Database Exploration, Magdalini Eirinaki, S. Abraham, N. Polyzotis, N. Shaikh
Faculty Publications
Interactive database exploration is a key task in information mining. However, users who lack SQL expertise or familiarity with the database schema face great difficulties in performing this task. To aid these users, we developed the QueRIE system for personalized query recommendations. QueRIE continuously monitors the user’s querying behavior and finds matching patterns in the system’s query log, in an attempt to identify previous users with similar information needs. Subsequently, QueRIE uses these “similar” users and their queries to recommend queries that the current user may find interesting. In this work we describe an instantiation of the QueRIE framework, where …
A Smartphone Design Approach To User Communication Interface For Administering Storage System Network, Weider Yu, Xiao Su, Jason Hansen
A Smartphone Design Approach To User Communication Interface For Administering Storage System Network, Weider Yu, Xiao Su, Jason Hansen
Faculty Publications
This paper investigates the feasibility and potential of using a mobile smartphone as a user administration control for storage system network. It includes the design and implementation of a mobile smartphone software system that can be used to perform system administration activities on the storage system without the need of using a laptop or desktop system. In the paper the design of some effective metaphors to present the storage system on the limited display area of a mobile smartphone device and the set of system features chosen for implementation are presented. Current storage system administration is limited to using storage …
Feature-Based Opinion Mining And Ranking, Magdalini Eirinaki, S. Pisal, J. Singh
Feature-Based Opinion Mining And Ranking, Magdalini Eirinaki, S. Pisal, J. Singh
Faculty Publications
The proliferation of blogs and social networks presents a new set of challenges and opportunities in the way information is searched and retrieved. Even though facts still play a very important role when information is sought on a topic, opinions have become increasingly important as well. Opinions expressed in blogs and social networks are playing an important role influencing everything from the products people buy to the presidential candidate they support. Thus, there is a need for a new type of search engine which will not only retrieve facts, but will also enable the retrieval of opinions. Such a search …
Power Spectral Densities Of Baseband Signals In Epc Class-1 Gen-2 Uhf Rfid Systems, Robert H. Morelos-Zaragoza
Power Spectral Densities Of Baseband Signals In Epc Class-1 Gen-2 Uhf Rfid Systems, Robert H. Morelos-Zaragoza
Faculty Publications
The power spectral densities (PSD) of baseband signals in EPC Class-1 Gen-2 UHF RFID systems are shown. PSD are obtained using Matlab as the Fourier transform (via the FFT algorithm) of the autocorrelation function of random pulse sequences. The PSD of PIE, FM0 and Miller subcarrier for M=2, 4 and 8 are shown for both unipolar (for 100% ASK or OOK modulation) and polar (PSK modulation) waveforms.
Identification Of Influential Social Networkers, Magdalini Eirinaki, S. P. Singh Monga, S. Sundaram
Identification Of Influential Social Networkers, Magdalini Eirinaki, S. P. Singh Monga, S. Sundaram
Faculty Publications
Online social networking is deeply interleaved in today's lifestyle. People come together and build communities to share thoughts, offer suggestions, exchange information, ideas, and opinions. Moreover, social networks often serve as platforms for information dissemination and product placement or promotion through viral marketing. The success rate in this type of marketing could be increased by targeting specific individuals, called 'influential users', having the largest possible reach within an online community. In this paper, we present a method aiming at identifying the influential users within an online social networking application. We introduce ProfileRank, a metric that uses popularity and activity characteristics …
Sql Querie Recommendations: A Query Fragment-Based Approach, Jayad Akbarnejad, Magdalini Eirinaki, Suju Koshy, Duc On, Neoklis Polyzotis
Sql Querie Recommendations: A Query Fragment-Based Approach, Jayad Akbarnejad, Magdalini Eirinaki, Suju Koshy, Duc On, Neoklis Polyzotis
Faculty Publications
Relational database systems are becoming increasingly popular in the scientific community to support the interactive exploration of large volumes of data. In this scenario, users employ a query interface (typically, a web-based client) to issue a series of SQL queries that aim to analyze the data and mine it for interesting information. First-time users, however, may not have the necessary knowledge to know where to start their exploration. Other times, users may simply overlook queries that retrieve important information. In this work we describe a framework to assist non-expert users by providing personalized query recommendations. The querying behavior of the …
Personal Vs. Social, Magdalini Eirinaki
Personal Vs. Social, Magdalini Eirinaki
Faculty Publications
The last few years we witnessed an impressive growth in social networks and in applications that add value to their amassed information. At the same time, the continuing expansion of mobile platforms and applications (e.g. iPhone), combined with the overwhelming supply of information and services, makes effective personalization and context-awareness much required features. One may consider "personal" and "social" data management as comprising two distinct directions with conflicting characteristics. However, it can be argued that they complement each other and that in future applications they will ultimately converge. This "personal vs. social" predicament presents a number of interesting topics that …
Mining Frequent Generalized Patterns For Web Personalization In The Presence Of Taxonomies, P. Giannikopoulos, I. Varlamis, Magdalini Eirinaki
Mining Frequent Generalized Patterns For Web Personalization In The Presence Of Taxonomies, P. Giannikopoulos, I. Varlamis, Magdalini Eirinaki
Faculty Publications
The Web is a continuously evolving environment, since its content is updated on a regular basis. As a result, the traditional usage-based approach to generate recommendations that takes as input the navigation paths recorded on the Web page level, is not as effective. Moreover, most of the content available online is either explicitly or implicitly characterized by a set of categories organized in a taxonomy, allowing the page-level navigation patterns to be generalized to a higher, aggregate level. In this direction, the authors present the Frequent Generalized Pattern (FGP) algorithm. FGP takes as input the transaction data and a hierarchy …
Incentive Mechanisms In P2p Media Streaming Systems, Xiao Su, Suchreet Dhaliwal
Incentive Mechanisms In P2p Media Streaming Systems, Xiao Su, Suchreet Dhaliwal
Faculty Publications
This paper highlights the need to curb free-riding in P2P media streaming systems and discusses the mechanisms by which this could be accomplished. Free riding, whereby a peer utilizes network resources, but does not contribute services could have a huge impact on the efficacy of blue streaming systems, leading to scalability issues and service degradation. We discuss why BitTorrent-like tit-for-tat mechanisms cannot be simply tailored and used in streaming. Even though the problem of free riding is more severe in P2P media streaming than in file sharing, the deployed systems still lack incentive schemes. In this paper, we categorize, analyze, …
Mobility Handling In Mac For Wireless Ad Hoc Networks, Anjali Raja, Xiao Su
Mobility Handling In Mac For Wireless Ad Hoc Networks, Anjali Raja, Xiao Su
Faculty Publications
Wireless Sensor Networks (WSNs) are becoming popular in a wide variety of applications. In a WSN, sensor nodes can be static or mobile, depending on applications. Handling mobility in a sensor network can pose interesting challenges in sensor protocol design, and special algorithms are needed to adapt to mobility in the network. In this paper, we survey the current state of art in handling mobility in sensor networks. We first study how mobility affects the design of different layers in the sensor network architecture, and then take a closer look at mobility handling in the MAC layer. We also describe …
Query Recommendations For Interactive Database Exploration, Gloria Chatzopoulou, Magdalini Eirinaki, Neoklis Polyzotis
Query Recommendations For Interactive Database Exploration, Gloria Chatzopoulou, Magdalini Eirinaki, Neoklis Polyzotis
Faculty Publications
Relational database systems are becoming increasingly popular in the scientific community to support the interactive exploration of large volumes of data. In this scenario, users employ a query interface (typically, a web-based client) to issue a series of SQL queries that aim to analyze the data and mine it for interesting information. First-time users, however, may not have the necessary knowledge to know where to start their exploration. Other times, users may simply overlook queries that retrieve important information. To assist users in this context, we draw inspiration from Web recommender systems and propose the use of personalized query recommendations. …
Selfish Wavelength Assignment In Multifiber Optical Networks, Evangelos Bampas, Aris Pagourtzis, George Pierrakos, Katerina Potika
Selfish Wavelength Assignment In Multifiber Optical Networks, Evangelos Bampas, Aris Pagourtzis, George Pierrakos, Katerina Potika
Faculty Publications, Computer Science
No abstract provided.
Efficient Peer Assignment For Low-Latency Transmission Of Scalable Coded Images, Xiao Su, Tao Wang
Efficient Peer Assignment For Low-Latency Transmission Of Scalable Coded Images, Xiao Su, Tao Wang
Faculty Publications
In this paper, we propose efficient peer assignment algorithms for low-latency transmission of scalable coded images in peer-to-peer networks, in which peers may dynamically join and leave the networks. The objective of our algorithm is to minimize the transmission time of a requested image that is scalable coded. When an image is scalable coded in different bit rates, the bit stream encoded in a lower bit rate is a prefix subset of the one encoded in a higher bit rate. Therefore, a peer with the same requested image coded in any bit rate, even when it is different from the …
A Survey Of Worm Detection And Containment, Pele Li, M. Salour, Xiao Su
A Survey Of Worm Detection And Containment, Pele Li, M. Salour, Xiao Su
Faculty Publications
Self-duplicating, self-propagating malicious codes known as computer worms spread themselves without any human interaction and launch the most destructive attacks against computer networks. At the same time, being fully automated makes their behavior repetitious and predictable. This article presents a survey and comparison of Internet worm detection and containment schemes. We first identify worm characteristics through their behavior, and then classify worm detection algorithms based on the parameters used in the algorithms. Furthermore, we analyze and compare different detection algorithms with reference to the worm characteristics by identifying the type of worms that can and cannot be detected by these …
Web Site Personalization Based On Link Analysis And Navigational Patterns, Magdalini Eirinaki, M. Varzirgiannis
Web Site Personalization Based On Link Analysis And Navigational Patterns, Magdalini Eirinaki, M. Varzirgiannis
Faculty Publications
The continuous growth in the size and use of the World Wide Web imposes new methods of design and development of on-line information services. The need for predicting the users’ needs in order to improve the usability and user retention of a web site is more than evident and can be addressed by personalizing it. Recommendation algorithms aim at proposing “next” pages to users based on their current visit and the past users’ navigational patterns. In the vast majority of related algorithms, however, only the usage data are used to produce recommendations, disregarding the structural properties of the web graph. …
Sequence Of Linear Programming For Transmission Of Fine-Scalable Coded Content In Bandwidth-Limited Environments, Xiao Su, Tao Wang
Sequence Of Linear Programming For Transmission Of Fine-Scalable Coded Content In Bandwidth-Limited Environments, Xiao Su, Tao Wang
Faculty Publications
In this paper, we propose an optimal peer assignment algorithm on peer-to-peer networks. This algorithm is designed to maximize the quality of transmitting fine-scalable coded content by exploiting the embedding property of scalable coding. To be more realistic, we assume that the requesting peer has a delay constraint to display the content within a certain delay bound, and it also has limited incoming bandwidth. We first use a simple example to illustrate the peer assignment problem, and then formulate this problem as a linear programming problem, followed by a nonlinear programming problem. To efficiently solve the second nonlinear problem, we …
Loss Aware Rate Allocations In H.263 Coded Video Transmissions, Xiao Su, Benjamin Wah
Loss Aware Rate Allocations In H.263 Coded Video Transmissions, Xiao Su, Benjamin Wah
Faculty Publications
For packet video, information loss and bandwidth limitation are two factors that affect video playback quality. Traditional rate allocation approaches have focused on optimizing video quality under bandwidth constraint alone. However, in the best-effort Internet, packets carrying video data are susceptible to losses, which need to be reconstructed at the receiver side. In this paper, we propose loss aware rate allocations in both group-of-block (GOB) level and macroblock level, given that certain packets are lost during transmissions and reconstructed using simple interpolation methods at the receiver side. Experimental results show that our proposed algorithms can produce videos of higher quality …
Ontologies In Web Personalization, Magdalini Eirinaki, Michalis Vazirgiannis
Ontologies In Web Personalization, Magdalini Eirinaki, Michalis Vazirgiannis
Faculty Publications
No abstract provided.
Optimizing Transmission Time Of Scalable Coded Images In Peer-To-Peer Networks, Xiao Su, Rod Fatoohi, Tao Wang
Optimizing Transmission Time Of Scalable Coded Images In Peer-To-Peer Networks, Xiao Su, Rod Fatoohi, Tao Wang
Faculty Publications
In this paper, we study how to optimize image transmission time in peer-to-peer networks by considering the property of bitstreams generated by image coding algorithms. Images can be either scalable coded or nonscalable coded. Since transmission of nonscalable coded images is well understood, we focus on the transmission of scalable coded images in this paper.Because scalable coding embeds lower bit-rate bitstreams into higher bit-rate bitstreams, there exists a many-to-one relationship between supplying and requesting peers. When a requesting peer asks for an image coded in a particular bit rate, multiple peers with the same image but coded in different bit …
Delay-Constrained Transmission Of Fine Scalable Coded Content Over P2p Networks, Xiao Su, Yi Shang, Tao Wang, Yuqing Mai
Delay-Constrained Transmission Of Fine Scalable Coded Content Over P2p Networks, Xiao Su, Yi Shang, Tao Wang, Yuqing Mai
Faculty Publications
Images or videos are generally coded before transmission, and they can be either non-scalable coded or scalable coded, which can be further classified into fine-scalable coded and coarse-scalable coded. In this paper, we focus on delivery of fine-scalable coded content. The objective of our work is to design algorithms to optimize the quality of fine-scalable coded images or videos on peer-to-peer networks when a requesting peer is delay-sensitive and has to display content within a certain delay bound. Fine-scalable coding has two properties: (1) it embeds lower bit-rate bitstreams into higher bit-rate bitstreams; and (2) its coding quality increases with …