IEEE 2017

IEEE 2017 – IEEE has available to assist engineering students with their final-year projects.IEEE – IEEE Resources for Final-Year Engineering Projects. The Institute of Electrical and Electronics Engineers (IEEE) is a professional association with its corporate office in New York City.

Personal Web Revisitation by Context and Content Keywords with Relevance Feedback

Personal Web Revisitation by Context and Content Keywords with Relevance Feedback Introduction: Getting back to previously viewed web pages is a common yet uneasy task for users due to the large volume of personally accessed information on the web. This paper leverages human’s natural recall process of using episodic and semantic memory cues to facilitate …

Personal Web Revisitation by Context and Content Keywords with Relevance Feedback Read More »

PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks

PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks Introduction: This paper focuses on seeking a new heuristic scheme for an influence maximization problem in social networks: how to economically select a subset of individuals (so-called seeds) to trigger a large cascade of further adoptions of a new behavior based on a contagion …

PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks Read More »

QDA: A Query Driven Approach to Entity Resolution

QDA: A Query Driven Approach to Entity Resolution Introduction: This paper addresses the problem of query-aware data cleaning in the context of a user query. In particular, we develop a novel Query-Driven Approach (QDA) that systematically exploits the semantics of the predicates in SQL-like selection queries to reduce the data cleaning overhead. The objective of …

QDA: A Query Driven Approach to Entity Resolution Read More »

Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data

Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data Introduction: Query expansion has been widely adopted in Web search as a way of tackling the ambiguity of queries. Personalized search utilizing folksonomy data has demonstrated an extreme vocabulary mismatch problem that requires even more effective query expansion methods. Co-occurrence statistics, tag-tag relationships …

Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data Read More »

RAPARE: A Generic Strategy for Cold Start Rating Prediction Problem

RAPARE: A Generic Strategy for Cold Start Rating Prediction Problem Introduction: In recent years, recommender system is one of indispensable components in many e-commerce websites. One of the major challenges that largely remains open is the cold-start problem, which can be viewed as a barrier that keeps the cold-start users/items away from the existing ones. …

RAPARE: A Generic Strategy for Cold Start Rating Prediction Problem Read More »

SociRank: Identifying and Ranking Prevalent News Topics Using Social Media Factors

SociRank: Identifying and Ranking Prevalent News Topics Using Social Media Factors Introduction: Mass media sources, specifically the news media, have traditionally informed us of daily events. In modern times, social media services such as Twitter provide an enormous amount of user-generated data, which have great potential to contain informative news-related content. For these resources to …

SociRank: Identifying and Ranking Prevalent News Topics Using Social Media Factors Read More »

Towards Real-Time, Country-Level Location Classification of Worldwide Tweets

Towards Real-Time, Country-Level Location Classification of Worldwide Tweets Introduction: The increase of interest in using social media as a source for research has motivated tackling the challenge of automatically geolocating tweets, given the lack of explicit location information in the majority of tweets. In contrast to much previous work that has focused on location classification …

Towards Real-Time, Country-Level Location Classification of Worldwide Tweets Read More »

Trajectory Community Discovery and Recommendation by Multisource Diffusion Modeling

Trajectory Community Discovery and Recommendation by Multisource Diffusion Modeling Introduction: In this paper, we detect communities from trajectories. Existing algorithms for trajectory clustering usually rely on simplex representation and a single proximity-related metric. Unfortunately, additional information markers (e.g., social interactions or semantics in the spatial layout) are ignored, leading to the inability to fully discover …

Trajectory Community Discovery and Recommendation by Multisource Diffusion Modeling Read More »

Collaborative Filtering Service Recommendation Based on a Novel Similarity Computation Method

Collaborative Filtering Service Recommendation Based on a Novel Similarity Computation Method Introduction: Recently, collaborative filtering-based methods are widely used for service recommendation. QoS attribute value based collaborative filtering service recommendation includes two important steps. One is the similarity computation, and the other is the prediction for the QoS attribute value, which the user has not …

Collaborative Filtering Service Recommendation Based on a Novel Similarity Computation Method Read More »

Improving Automated Bug Triaging with Specialized Topic Model

Improving Automated Bug Triaging with Specialized Topic Model Introduction: Bug triaging refers to the process of assigning a bug to the most appropriate developer to fix. It becomes more and more difficult and complicated as the size of software and the number of developers increase. In this paper, we propose a new framework for bug …

Improving Automated Bug Triaging with Specialized Topic Model Read More »

A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection

A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection Introduction : Database Management Systems (DBMSs) provide access control mechanisms that allow database administrators (DBAs) to grant application programs access privileges to databases. Though such mechanisms are powerful, in practice finer-grained access control mechanism tailored to the semantics of the …

A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection Read More »

Two Stage Friend Recommendation

Two-Stage Friend Recommendation Based on Network Alignment and Series-Expansion of Probabilistic Topic Model

Two Stage Friend Recommendation Based on Network Alignment and Series-Expansion of Probabilistic Topic Model Introduction: Precise friend recommendation is an important problem in social media. Although most social websites provide some kinds of auto friend searching functions, their accuracies are not satisfactory. In this paper, we propose a more precise auto friend recommendation method with …

Two-Stage Friend Recommendation Based on Network Alignment and Series-Expansion of Probabilistic Topic Model Read More »

Transactional Behaviour Verification

Transactional Behaviour Verification in Business Process as a Service Configuration

Transactional Behaviour Verification in Business Process as a Service Configuration Introduction : Business Process as a Service (BPaaS) is an emerging type of cloud service that offers configurable and executable business processes to clients over the Internet. As BPaaS is still in early years of research, many open issues remain. Managing the configuration of BPaaS …

Transactional Behaviour Verification in Business Process as a Service Configuration Read More »

Efficient Geometric Range Queries

FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data

FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data Introduction : Spatial data have wide applications, e.g., location-based services, and geometric range queries (i.e., finding points inside geometric areas, e.g., circles or polygons) are one of the fundamental search functions over spatial data. The rising demand of outsourcing data is moving large-scale datasets, including large-scale …

FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data Read More »

Computations in Mobile Sensing Systems

Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems

Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems Introduction : Protecting the privacy of mobile phone user participants is extremely important for mobile phone sensing applications. In this paper, we study how an aggregator can expeditiously compute the minimum value or the k-th minimum value of all users’ data without knowing …

Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems Read More »

Credibility Analysis System

A Credibility Analysis System for Assessing Information on Twitter

A Credibility Analysis System for Assessing Information on Twitter Introduction : Information credibility on Twitter has been a topic of interest among researchers in the fields of both computer and social sciences, primarily because of the recent growth of this platform as a tool for information dissemination. Twitter has made it increasingly possible to offer …

A Credibility Analysis System for Assessing Information on Twitter Read More »

Incorporating Social Community and Global Collective Intelligence

iASK: A Distributed Q&A System Incorporating Social Community and Global Collective Intelligence

iASK: A Distributed Q&A System Incorporating Social Community and Global Collective Intelligence Introduction: Traditional web-based Question and Answer (Q&A) websites cannot easily solve non-factual questions to match askers’ preference. Recent research efforts begin to study social-based Q&A systems that rely on an asker’s social friends to provide answers. However, this method cannot find answerers for …

iASK: A Distributed Q&A System Incorporating Social Community and Global Collective Intelligence Read More »

Pre Existing Routing

SUPERMAN: Security Using Pre Existing Routing for Mobile Ad hoc Networks

SUPERMAN: Security Using Pre Existing Routing for Mobile Ad hoc Networks Introduction : The flexibility and mobility of Mobile Ad hoc Networks (MANETs) have made them increasing popular in a wide range of use cases. To protect these networks, security protocols have been developed to protect routing and application data. However, these protocols only protect …

SUPERMAN: Security Using Pre Existing Routing for Mobile Ad hoc Networks Read More »

Trajectories by Regions

Searching Trajectories by Regions of Interest

Searching Trajectories by Regions of Interest Introduction: With the increasing availability of moving-object tracking data, trajectory search is increasingly important. We propose and investigate a novel query type named trajectory search by regions of interest (TSR query). Given an argument set of trajectories, a TSR query takes a set of regions of interest as a …

Searching Trajectories by Regions of Interest Read More »

Quantifying Interdependent Privacy

Quantifying Interdependent Privacy Risks with Location Data

Quantifying Interdependent Privacy Risks with Location Data Introduction : Co-location information about users is increasingly available online. For instance, mobile users more and more frequently report their co-locations with other users in the messages and in the pictures they post on social networking websites by tagging the names of the friends they are with. The …

Quantifying Interdependent Privacy Risks with Location Data Read More »

Mobile Malicious Webpages

Detecting Mobile Malicious Webpages in Real Time

Detecting Mobile Malicious Webpages in Real Time Introduction : Mobile specific webpages differ significantly from their desktop counterparts in content, layout and functionality. Accordingly, existing techniques to detect malicious websites are unlikely to work for such webpages. In this paper, we design and implement kAYO, a mechanism that distinguishes between malicious and benign mobile webpages. …

Detecting Mobile Malicious Webpages in Real Time Read More »

Proxy based Collaboration System

A Proxy based Collaboration System to Minimize Content Download Time and Energy Consumption

A Proxy based Collaboration System to Minimize Content Download Time and Energy Consumption Introduction: Mobile collaborative community (MCC) is an emerging technology that allows multiple mobile nodes (MNs) to perform a resource intensive task, such as large content download, in a cooperative manner. In this paper, we introduce a proxy-based collaboration system for the MCC …

A Proxy based Collaboration System to Minimize Content Download Time and Energy Consumption Read More »

Exploiting Email Tunnels

SWEET: Serving the Web by Exploiting Email Tunnels

SWEET: Serving the Web by Exploiting Email Tunnels Introduction : Open communications over the Internet pose serious threats to countries with repressive regimes, leading them to develop and deploy censorship mechanisms within their networks. Unfortunately, existing censorship circumvention systems do not provide high availability guarantees to their users, as censors can easily identify, hence disrupt, …

SWEET: Serving the Web by Exploiting Email Tunnels Read More »

Routing in Accumulative

Routing in Accumulative Multi-Hop Networks

Routing in Accumulative Multi-Hop Networks Introduction : This paper investigates the problem of finding optimal paths in single-source single-destination accumulative multi-hop networks. We consider a single source that communicates to a single destination assisted by several relays through multiple hops. At each hop, only one node transmits, while all the other nodes receive the transmitted …

Routing in Accumulative Multi-Hop Networks Read More »

Two Tiered Sensor Networks

Privacy and Integrity Preserving Top-k Query Processing for Two Tiered Sensor Networks

Privacy and Integrity Preserving Top-k Query Processing for Two Tiered Sensor Networks Introduction : Privacy and integrity have been the main road block to the applications of two-tiered sensor networks. The storage nodes, which act as a middle tier between the sensors and the sink, could be compromised and allow attackers to learn sensitive data …

Privacy and Integrity Preserving Top-k Query Processing for Two Tiered Sensor Networks Read More »

Localizing Node Failures

Network Capability in Localizing Node Failures via End-to-End Path Measurements

Network Capability in Localizing Node Failures via End-to-End Path Measurements Introduction : We investigate the capability of localizing node failures in communication networks from binary states (normal/failed) of end-to-end paths. Given a set of nodes of interest, uniquely localizing failures within this set requires that different observable path states associate with different node failure events. …

Network Capability in Localizing Node Failures via End-to-End Path Measurements Read More »

FaceChange

FaceChange: Attaining Neighbour Node Anonymity in Mobile Opportunistic Social Networks With Fine-Grained Control

FaceChange: Attaining Neighbour Node Anonymity in Mobile Opportunistic Social Networks With Fine-Grained Control Introduction : In mobile opportunistic social networks (MOSNs), mobile devices carried by people communicate with each other directly when they meet for proximity-based MOSN services (e.g., file sharing) without the support of infrastructures. In current methods, when nodes meet, they simply communicate …

FaceChange: Attaining Neighbour Node Anonymity in Mobile Opportunistic Social Networks With Fine-Grained Control Read More »

user centric similarity search

User-Centric Similarity Search

User Centric Similarity Search Introduction: User preferences play a significant role in market analysis. In the database literature there has been extensive work on query primitives, such as the well known top-k query that can be used for the ranking of products based on the preferences customers have expressed. Still, the fundamental operation that evaluates …

User-Centric Similarity Search Read More »

User Vitality Ranking and Prediction

User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective

User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective Introduction: Social networking services have been prevalent at many online communities such as Twitter.com and Weibo.com, where millions of users keep interacting with each other every day. One interesting and important problem in the social networking services is to rank users based …

User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective Read More »

Understand Short Texts by Harvesting and Analyzing Semantic Knowledge

Understand Short Texts by Harvesting and Analyzing Semantic Knowledge Introduction: Understanding short texts is crucial to many applications, but challenges abound. First, short texts do not always observe the syntax of a written language. As a result, traditional natural language processing tools, ranging from part-of-speech tagging to dependency parsing, cannot be easily applied. Second, short …

Understand Short Texts by Harvesting and Analyzing Semantic Knowledge Read More »