Social Networks: Service Selection and Recommendation
|
|
- Vanessa Mathews
- 5 years ago
- Views:
Transcription
1 Social Networks: Service Selection and Recommendation Jebrin Al-Sharawneh Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Information Systems) Faculty of Engineering and Information Technology University of Technology, Sydney September, 2012
2 Abstract The Service-Oriented Computing paradigm is widely acknowledged for its potential to revolutionize the world of computing through the utilization of Web services. It is expected that Web services will fully leverage the Semantic Web to outsource some of their functionalities to other Web services that provide value-added services, and by integrating the business logic of Web services in the form of business to business and business to consumer e-commerce applications. In the Service Web, Web services and Web-Based Social Networks are emerging in which a wide range of similar functionalities are expected to be offered by a vast number of Web services, and applications can search and compose services according to users needs in a seamless and an automatic fashion. Web services are expected to outsource some of their functionalities to other Web services. In such situations, some services may be new to the service market, and some may act maliciously in order to be selected. A key requirement is to provide mechanisms for quality selection and recommendation of relevant Web services with perceived risk considerations. Although the future of Web service selection and recommendation looks promising, there are challenging issues related to user knowledge and behavior, as well as issues related to recommendation approaches. This dissertation addresses the demanding issues in Web service selection and recommendation from theory and practice perspectives. These challenges include cold-start users, who represent more than 50% of the social network population, the capture of users preferences, risk mitigation in service selection, customers privacy and application scalability. This dissertation proposes a novel approach to automate social-based Web service selection and recommendation in a dynamic environment. It utilizes Web-Based Social Networks and the Follow the Leader strategy, for a Credibility-based framework that includes two credibility models: the user Credibility model which is used to qualify i
3 consumers as either leaders or followers based on their credibility, and the service Credibility model which is used to identify the best services that act as market leaders. Experimental evaluation results demonstrate that the social network service selection and recommendation approach utilizing the credibility-based framework and Follow the Leader strategy provides an efficient, effective and scalable provision of credible services, especially for cold-start users. The research results take a further step towards developing a social-based automated and dynamically adaptive Web service selection and recommendation system in the future. ii
4 Certificate of Authorship/Originality I certify that the work in this thesis has not previously been submitted for a degree nor has it been submitted as part of requirements for a degree except as fully acknowledged within the text. I also certify that the thesis has been written by me. Any help that I have received in my research work and the preparation of the thesis itself has been acknowledged. In addition, I certify that all information sources and literature used are indicated in the thesis. Jebrin Al-Sharawneh September, 2012 iii
5 To the souls of my parents who taught me to love learning iv
6 Acknowledgments Although I planned to complete this degree thirty five years ago, as the Italian proverb says The right time comes but once. I think this research project would not have been possible without the support of the following people: First and foremost, I would like to express my gratitude to my supervisor Professor Mary- Anne Williams for her wise advice, careful guidance, useful connections, constant support and enduring patience throughout my studies and while writing this dissertation. Mary- Anne s advice on the use of Follow the Leader strategy was the turning point of my research. Learning how to research and produce publications is much easier with a supervisor who has as much experience and enthusiasm as Mary-Anne. I would like also to thank my co-supervisor, Associate Professor David Goldbaum for giving me the opportunity to work with him on the simulations of Follow the Leader project and for his invaluable inputs on Follow the Leader strategy. I must also acknowledge the following people from the University of Technology (UTS): My fellow students in the Innovation and Enterprise Research Laboratory, through countless discussions, they have provided me with insightful suggestions and valuable feedbacks that have helped enhance my work, special thanks also go to Dr. Benjamin Johnston who provided me with valuable feedback that enhanced the final version of this dissertation. QCIS people for their support. Special thanks go to all people at UTS who provided me with the needed support. The many researchers, including Dr. Mohammad Momani, Jamal and all other friends, whose kind suggestions, feedback and advice were invaluable in my research. Last, but not the least, I would like to thank my family for the endless support they provided me throughout my life. Without their love, patience and encouragements I would not have finished this thesis. First, I would like to thank my wife and best friend, Intisar, for supporting me and keeping me happy throughout my life until we achieved our mission towards our sons and this degree. I would like to thank my sons and their partners: Samer and Hanna, Rami and Marium, Fadi and Rawan for their love and support. Special thanks go to my daughters Hanna, Susan and Rawan who provided me with a continuous proof reading throughout my doctoral stint. I would also like to thank all my brothers and my sister for their support. Special thanks go to my brothers and friends: Ahmad, Yousef and v
7 Abu-Suhail, for giving me perspective whenever I needed it and all the numerous friends who have been there for me in times of need and helped me stay during the long, hard and ultimately enriching time that I have spent as a graduate student. In conclusion, I recognize that this research would not have been possible without the financial assistance from the University of Technology through the Australian Postgraduate Awards (APA), Faculty of Engineering and Information Technology (FEIT), Centre of Quantum Computation and Intelligent Systems (QCIS), and Innovation and Enterprise Research Laboratory; I express my gratitude to these agencies. vi
8 Table of Contents 1. Introduction Research Background and Related Work Credibility-Based Social Service Selection and Recommendation Experimentation and Evaluation - Recommendation Experimentation and Evaluation - Service Selection Mitigating Risk in Social Service Selection Conclusion and Future Work Bibliography vii
9 Extended Table of Contents Abstract... i List of Figures... xiii List of Tables... xvi List of Abbreviations... xviii Introduction Motivations Scenario Scenario Problem Scope and Definition Scope Limitations and Assumptions Significance Research Methodology Publications Arising From This Thesis Dissertation Outline Research Background and Related Work Terminology and Definitions Web Service Selection Overview of Key Technologies Semantic Web Services Web-based Social Networks Recommender Systems and Collaborative Based Filtering Web Service Selection and Recommendation Challenges Cold-Start Users Issue Sparsity Issue viii
10 Privacy Issue Scalability Capturing Users Preferences and Ratings Top Authors addressing Challenges Related Works Web-based Social Network Analysis Web-Based Social Networks and Trust Trust-Based Collaborative Filtering (CF) Follow the Leader Finding Expert Leaders in a Social Network Clustering and Collaborative Filtering Social Based Service Selection Reputation Based Approaches Recommender Based Approaches Referral Based Approaches Recommendation Approaches against Challenges Chapter Summary Credibility-Based Social Service Selection and Recommendation Introduction TECBF: Trustworthiness Expertise Credibility-Based Framework UCrM: User Credibility Model Trustworthiness Component Expertise Component Computing User Credibility Credibility Dynamism Clustering Users Based on Credibility Using Leaders as Potential Top-N Recommenders WSCrM: Web Service Credibility Model Web Service Credibility from Trustworthiness Web Service Credibility from Expertise Component Computing Web Service Credibility Web Service Credibility Dynamism ix
11 Web Service Credibility Characteristics Web Service Credibility Model - Flexibility and Robustness SSSRM: Social-based Service Selection and Recommendation Model Evaluation Framework Chapter Summary Experimentation and Evaluation - Recommendation Introduction Experiments Setup Datasets Selection Dataset Pre-Processing Preparation Datasets Summary Items not appearing in Leaders Scope Analysis WBSN Visualization The EPINIONS Subset Social Network Analysis Studio (SNAS) Cyclic Trust in SNAS Recommendation Prediction Using EPINIONS Subsets Benchmark Recommendation Prediction Algorithms Recommendation Prediction Evaluation Measures The EPINIONS Subsets Prediction Results Further Experiments on Large Datasets Test Options on Large Datasets Definitions Benchmark: MAE Comparison between Credibility and Trust Prediction Coverage Prediction Response Time Prediction Confidence Based on Average Number of Predictors WBSN Leaders Clustering and Identification Evaluation Centrality Measures for Three Datasets Interest Similarity Leaders Credibility Threshold Analysis Flexibility, Scalability and Applications x
12 4.7. Results Summary Conclusions Experimentation and Evaluation - Service Selection Social Service Selection Approach Motivation and Contributions Social Service Selection Related Works Notations and Definitions User Query Model Predicting Missing Quality Values Web Service Credibility Bootstrapping Benchmark Service Selection Algorithms Utility-Based Selection Approach Trustworthiness Based Selection Approach Experimental Evaluation Agent-based Modeling and Simulation (ABMS) Overview Simulation Model Evaluation Metrics Experiments and Simulation Results Validity of Web Service Credibility Computational Model Social Service Selection with User Domain Knowledge (UDK) Considerations Benchmarking Credibility-Based Approach with Utility-Based Approach Benchmarking Credibility Based Approach with Trustworthiness Based Approach Results Summary Conclusions Mitigating Risk in Social Service Selection Introduction Motivation and Contributions Related Works Trust and Risk in Service Selection xi
13 Mitigating Risk in Social Service Selection Perceived Risk and Risk Attitude in Web Service Selection Perceived Performance Risk in Web Service Selection Risk Attitude and Perceived Risk Customer Risk Attitude and Behavior Model Perceived Risk from Risk Attitude Perspective Service Selection with Risk Attitude and Perceived Risk Experimental Evaluation Simulation Model Validity and Dynamism of Perceived Risk Computation Model Risk-Based Social Service Selection Results Summary Summary and Conclusions Conclusion and Future Work Contributions Primary Contribution Secondary Contributions Scalability, Flexibility and Robustness Applications and Possible Commercialization Future Research Directions Concluding Remarks Bibliography xii
14 List of Figures Figure 2.1. Referral Graph [223] Figure 3.1. TECBF: Trustworthiness Expertise Credibility-Based Framework Figure 3.2. User Credibility Model (UCrM) in WBSN Figure 3.3. Direct and Indirect Followers Trust Figure 3.4. Impact of Decay Factor (λ) on Credibility Figure 3.5. Web service Credibility Model (WSCrM) Figure 3.6. Social Service Selection Based on UDK and Service Credibility Algorithm Figure 3.7. TECBF Evaluation framework Figure 4.1. Social Network Analysis Studio (SNAS) Graphical User interface Figure 4.2. Follow the Leader Model for Social Network in Item Figure 4.3. Social Network Relations in Item Figure 4.4. MAE Average for all Predictions over all Subsets Figure 4.5. Credibility Algorithm vs. Trust Algorithm Prediction for all Datasets Figure 4.6. Trust Algorithm Prediction % Coverage for all Datasets Figure 4.7. Trust Algorithm Prediction Coverage per Test Option for all Datasets Figure 4.8. Credibility Algorithm prediction time as % of Trust Algorithm time Figure 4.9. Leaders vs. Followers In-Degree and Average Ratings for all Datasets xiii
15 Figure Interest Similarity and Friends K12 Acting as Leaders - Ratio for all Datasets Figure 5.1. SNA Simulation Tool User Interface Figure 5.2. Impact of Trustworthiness and Expertise on WS Credibility for WS (S04) Figure 5.3. Malicious Web service behavior (Facebook Privacy Scenario) Figure 5.4. Social service selection Flowchart Algorithm Figure 5.5. Social Service Selection based on customer UDK and service credibility Follow the Leader Model Figure 5.6. Top-5 services credibility at last round Figure 5.7. S24 versus S12 during simulation session Figure 5.8. Social Service Selection with Credibility and UDK Follow the Leader Figure 5.9. Average number of candidate services returned from 99 services match: based on user preferences number (Utility-Based) Figure Number of candidate services versus varied user pref. number and QoS attributes (Utility-Based) Figure Top-M Candidates: Credibility-based versus Utilitybased Figure 6.1. User risk attitude and behavior Model Figure 6.2. Perceived risk variation with different risk attitudes Figure 6.3. Risk-based social service selection: Algorithm Figure 6.4. SNA Simulation Tool User Interface Figure 6.5. Expected utility based credibility vs. perceived risk for different risk attitudes RA = (1, 0.5, 0) Figure 6.6. Dynamism of expected utility and Perceived Risk for different Risk Attitudes, RA = (1, 0) from (WS=S05) xiv
16 Figure 6.7. Customers select Web service randomly Follow the leader Figure 6.8. Social Service Selection based on customer risk attitude and service credibility Follow the Leader Model xv
17 List of Tables Table 2.1: Recommendation approaches that address at least three challenges Table 2.2: Challenges addressed in recommendation approaches Table 3.1: User Credibility computation example Table 4.1: Datasets summary Table 4.2: Items not appearing in leaders scope analysis Table 4.3: Experimental results of prediction algorithms: cold-start Table 4.4: Experimental results of prediction algorithms: experienced users.. 96 Table 4.5: Detailed MAE comparison for all datasets: Credibility Algorithm vs. Trust Algorithm prediction for all test options Table 4.6: Credibility Algorithm vs. Trust Algorithm prediction for all datasets Table 4.7: Credibility average raters vs. Trust average raters Table 4.8: Leaders vs. followers centrality degree and average ratings for all datasets Table 4.9: Leaders vs. followers in-degree and average ratings for all datasets Table 4.10: EPINIONS dataset: Target user Interest Similarity measure with (leaders and friends) communities Table 4.11: All datasets: Target user Interest Similarity measure with (leaders and friends) communities Table 4.12: Credibility threshold analysis for EPINIONS dataset Table 5.1: List of home loan services Table 5.2: Top-5 services credibility at last round xvi
18 Table 5.3: R-Precision for credibility-based and utility-based models Table 5.4: User query QoS attributes template Table 6.1: Top-5 home loan services perceived risk as viewed from different users xvii
19 List of Abbreviations ABMS Agent-based Modeling and Simulation B2B Business-to-Business B2C Business-to-Consumer BPEL4WS Business Process Execution Language for Web Services CF Collaborative Filtering HITS Hyperlink-Induced Topic Search IOPE Input, Output, Post-conditions and Effects MAE Mean Absolute Error OWL Web Ontology Language P2P Peer to Peer QoS Quality of Service QoWS Quality of Web Service RDF Resource Description Framework RS Recommender System SLA Service Level Agreement SNA Social Network Analysis SNAS Social Network Analysis Studio SOA Service Oriented Architecture SOAP Simple Object Access Protocol SOC Service Oriented Computing SSSRM Social-based Service Selection and Recommendation Model SWS Semantic Web Services TECBF Trustworthiness Expertise Credibility-Based Framework UCrM User Credibility Model UDDI Universal Description, Discovery and Integration UDK User Domain Knowledge URI Uniform Resource Identifier xviii
20 W3C WBSN WS WSCrM WSDL WS-Policy XML World Wide Web Consortium Web-based Social Network Web Service Web Service Credibility Model Web Service Description Language Web Services Policy Framework Extensible Markup Language xix
Enhanced Web Log Based Recommendation by Personalized Retrieval
Enhanced Web Log Based Recommendation by Personalized Retrieval Xueping Peng FACULTY OF ENGINEERING AND INFORMATION TECHNOLOGY UNIVERSITY OF TECHNOLOGY, SYDNEY A thesis submitted for the degree of Doctor
More informationINTRODUCTION Background of the Problem Statement of the Problem Objectives of the Study Significance of the Study...
vii TABLE OF CONTENTS CHAPTER TITLE PAGE DECLARATION... ii DEDICATION... iii ACKNOWLEDGEMENTS... iv ABSTRACT... v ABSTRAK... vi TABLE OF CONTENTS... vii LIST OF TABLES... xii LIST OF FIGURES... xiii LIST
More informationContent distribution networks over shared infrastructure : a paradigm for future content network deployment
University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2005 Content distribution networks over shared infrastructure :
More informationAn Ontological Framework for Contextualising Information in Hypermedia Systems.
An Ontological Framework for Contextualising Information in Hypermedia Systems. by Andrew James Bucknell Thesis submitted for the degree of Doctor of Philosophy University of Technology, Sydney 2008 CERTIFICATE
More informationTOMRAS: A Task Oriented Mobile Remote Access System for Desktop Applications
DOCTORAL DISSERTATION TOMRAS: A Task Oriented Mobile Remote Access System for Desktop Applications Khaled Khankan kkhankan@it. uts. edu. au Supervised by: Prof. Robert Steele robert.steele@usyd.edu.au
More informationALGORITHMIC ASPECTS OF DOMINATION AND ITS VARIATIONS ARTI PANDEY
ALGORITHMIC ASPECTS OF DOMINATION AND ITS VARIATIONS ARTI PANDEY DEPARTMENT OF MATHEMATICS INDIAN INSTITUTE OF TECHNOLOGY DELHI JUNE 2016 c Indian Institute of Technology Delhi (IITD), New Delhi, 2016.
More informationA reputation system for BitTorrent peer-to-peer filesharing
University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2006 A reputation system for BitTorrent peer-to-peer filesharing
More informationA Frequent Max Substring Technique for. Thai Text Indexing. School of Information Technology. Todsanai Chumwatana
School of Information Technology A Frequent Max Substring Technique for Thai Text Indexing Todsanai Chumwatana This thesis is presented for the Degree of Doctor of Philosophy of Murdoch University May
More informationA Developer s Guide to the Semantic Web
A Developer s Guide to the Semantic Web von Liyang Yu 1. Auflage Springer 2011 Verlag C.H. Beck im Internet: www.beck.de ISBN 978 3 642 15969 5 schnell und portofrei erhältlich bei beck-shop.de DIE FACHBUCHHANDLUNG
More informationTABLE OF CONTENTS CHAPTER NO. TITLE PAGENO. LIST OF TABLES LIST OF FIGURES LIST OF ABRIVATION
vi TABLE OF CONTENTS ABSTRACT LIST OF TABLES LIST OF FIGURES LIST OF ABRIVATION iii xii xiii xiv 1 INTRODUCTION 1 1.1 WEB MINING 2 1.1.1 Association Rules 2 1.1.2 Association Rule Mining 3 1.1.3 Clustering
More informationEfficient Index Maintenance for Text Databases
Efficient Index Maintenance for Text Databases A thesis submitted for the degree of Doctor of Philosophy Nicholas Lester B.E. (Hons.), B.Sc, School of Computer Science and Information Technology, Science,
More informationThe Discovery and Retrieval of Temporal Rules in Interval Sequence Data
The Discovery and Retrieval of Temporal Rules in Interval Sequence Data by Edi Winarko, B.Sc., M.Sc. School of Informatics and Engineering, Faculty of Science and Engineering March 19, 2007 A thesis presented
More informationAUTOMATED STUDENT S ATTENDANCE ENTERING SYSTEM BY ELIMINATING FORGE SIGNATURES
AUTOMATED STUDENT S ATTENDANCE ENTERING SYSTEM BY ELIMINATING FORGE SIGNATURES K. P. M. L. P. Weerasinghe 149235H Faculty of Information Technology University of Moratuwa June 2017 AUTOMATED STUDENT S
More informationTree Rule Firewall. A Thesis Submitted for the Degree of. Doctor of Philosophy. Thawatchai Chomsiri. Faculty of Engineering and Information Technology
Tree Rule Firewall A Thesis Submitted for the Degree of Doctor of Philosophy By Thawatchai Chomsiri in Faculty of Engineering and Information Technology UNIVERSITY OF TECHNOLOGY, SYDNEY 17 th November
More informationTABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT 5 LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATIONS xxi
ix TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT 5 LIST OF TABLES xv LIST OF FIGURES xviii LIST OF SYMBOLS AND ABBREVIATIONS xxi 1 INTRODUCTION 1 1.1 INTRODUCTION 1 1.2 WEB CACHING 2 1.2.1 Classification
More informationA ROLE MANAGEMENT MODEL FOR USER AUTHORIZATION QUERIES IN ROLE BASED ACCESS CONTROL SYSTEMS A THESIS CH.SASI DHAR RAO
A ROLE MANAGEMENT MODEL FOR USER AUTHORIZATION QUERIES IN ROLE BASED ACCESS CONTROL SYSTEMS A THESIS Submitted by CH.SASI DHAR RAO in partial fulfillment for the award of the degree of MASTER OF PHILOSOPHY
More informationSupporting Quality of Service for Internet Applications A thesis presented for the degree of Master of Science Research
Supporting Quality of Service for Internet Applications A thesis presented for the degree of Master of Science Research Department of Computer Systems Faculty of Information Technology University of Technology,
More informationKnowledge libraries and information space
University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2009 Knowledge libraries and information space Eric Rayner University
More informationPrivacy Preserving Data Sharing in Data Mining Environment
Privacy Preserving Data Sharing in Data Mining Environment PH.D DISSERTATION BY SUN, XIAOXUN A DISSERTATION SUBMITTED TO THE UNIVERSITY OF SOUTHERN QUEENSLAND IN FULLFILLMENT OF THE REQUIREMENTS FOR THE
More informationChild Prime Label Approaches to Evaluate XML Structured Queries
Child Prime Label Approaches to Evaluate XML Structured Queries Shtwai Abdullah Alsubai Department of Computer Science the University of Sheffield This thesis is submitted for the degree of Doctor of Philosophy
More informationSummary of Contents LIST OF FIGURES LIST OF TABLES
Summary of Contents LIST OF FIGURES LIST OF TABLES PREFACE xvii xix xxi PART 1 BACKGROUND Chapter 1. Introduction 3 Chapter 2. Standards-Makers 21 Chapter 3. Principles of the S2ESC Collection 45 Chapter
More informationGEO BASED ROUTING FOR BORDER GATEWAY PROTOCOL IN ISP MULTI-HOMING ENVIRONMENT
GEO BASED ROUTING FOR BORDER GATEWAY PROTOCOL IN ISP MULTI-HOMING ENVIRONMENT Duleep Thilakarathne (118473A) Degree of Master of Science Department of Electronic and Telecommunication Engineering University
More informationParticle Swarm Optimization Methods for Pattern. Recognition and Image Processing
Particle Swarm Optimization Methods for Pattern Recognition and Image Processing by Mahamed G. H. Omran Submitted in partial fulfillment of the requirements for the degree Philosophiae Doctor in the Faculty
More informationSCALABLE IN-MEMORY DATA MANAGEMENT MODEL FOR ENTERPRISE APPLICATIONS
SCALABLE IN-MEMORY DATA MANAGEMENT MODEL FOR ENTERPRISE APPLICATIONS Anupama Piyumali Pathirage (138223D) Degree of Master of Science Department of Computer Science and Engineering University of Moratuwa
More informationNumerical analysis and comparison of distorted fingermarks from the same source. Bruce Comber
Numerical analysis and comparison of distorted fingermarks from the same source Bruce Comber This thesis is submitted pursuant to a Master of Information Science (Research) at the University of Canberra
More informationExcept as otherwise permitted under the Copyright, Designs and Patents Act 1988, this thesis may only be produced, stored or transmitted in any form
Except as otherwise permitted under the Copyright, Designs and Patents Act 1988, this thesis may only be produced, stored or transmitted in any form or by any means with the prior permission in writing
More informationBusiness Intelligence Roadmap HDT923 Three Days
Three Days Prerequisites Students should have experience with any relational database management system as well as experience with data warehouses and star schemas. It would be helpful if students are
More informationCHAPTER 7. Observations, Conclusions and Future Directions Observations 7.2. Limitations of the Model 7.3. Conclusions 7.4.
CHAPTER 7 Observations, Conclusions and Future Directions 7.1. Observations 7.2. Limitations of the Model 7.3. Conclusions 7.4. Future work Domain-specific Ontology for Student s Information in Academic
More informationCopyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and
Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and private study only. The thesis may not be reproduced elsewhere
More informationSTUDY ON MATURITY OF BUSINESS CONTINUITY MANAGEMENT AND ICT RELIANCE IN SRI LANKA MASTER OF BUSINESS ADMINISTRATION IN INFORMATION TECHNOLOGY
STUDY ON MATURITY OF BUSINESS CONTINUITY MANAGEMENT AND ICT RELIANCE IN SRI LANKA MASTER OF BUSINESS ADMINISTRATION IN INFORMATION TECHNOLOGY LIBRARY UNIVERSITY OF MORATUWA, SRI LANKA MORATUWA K.C. Usgoda
More informationAn agent-based peer-to-peer grid computing architecture
University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2005 An agent-based peer-to-peer grid computing architecture Jia
More informationPayload-based Anomaly Detection in HTTP Traffic
Payload-based Anomaly Detection in HTTP Traffic A Thesis submitted for the degree of Doctor of Philosophy By Aruna Jamdagni In Faculty of Engineering and information Technology School of Computing and
More informationCredibility-based Trust Management and Discovery of Cloud Services
Credibility-based Trust Management and Discovery of Cloud Services A dissertation submitted in fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science Talal Hashem Noor
More informationReal Time Multi-Sensor Data Acquisition and Processing for a Road Mapping System
Real Time Multi-Sensor Data Acquisition and Processing for a Road Mapping System by Xiang Luo A thesis submitted for the degree of Master of Engineering (Research) Faculty of Engineering and Information
More informationCopyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and
Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and private study only. The thesis may not be reproduced elsewhere
More informationSTUDY ON THE USE OF PUBLIC DATA CENTERS FOR IT INFRASTRUCTURE OUTSOURCING IN SRI LANKA
'LIBRARY SlIJVfcRSlTY Of MORATUWA. SRI IAMIU UORATUWA jlhl»o»{!9cko t l STUDY ON THE USE OF PUBLIC DATA CENTERS FOR IT INFRASTRUCTURE OUTSOURCING IN SRI LANKA THE CASE OFSUNTEL LTD By G.A.A.D. KARAUNARATNE
More informationADAPTIVE VIDEO STREAMING FOR BANDWIDTH VARIATION WITH OPTIMUM QUALITY
ADAPTIVE VIDEO STREAMING FOR BANDWIDTH VARIATION WITH OPTIMUM QUALITY Joseph Michael Wijayantha Medagama (08/8015) Thesis Submitted in Partial Fulfillment of the Requirements for the Degree Master of Science
More informationEXTRACTING GENERIC TEXT INFORMATION FROM IMAGES
EXTRACTING GENERIC TEXT INFORMATION FROM IMAGES A Thesis Submitted for the Degree of Doctor of Philosophy By Chao Zeng in School of Computing and Communications UNIVERSITY OF TECHNOLOGY, SYDNEY AUSTRALIA
More informationDedication. To the departed souls of my parents & father-in-law.
Abstract In this thesis work, a contribution to the field of Formal Verification is presented innovating a semantic-based approach for the verification of concurrent and distributed programs by applying
More informationBINUS INTERNATIONAL UNIVERSITAS BINA NUSANTARA. Major Computer Science Sarjana Komputer Thesis Semester [Even] year 2007
BINUS INTERNATIONAL UNIVERSITAS BINA NUSANTARA Major Computer Science Sarjana Komputer Thesis Semester [Even] year 2007 AN INTEGRATED MOBILE WEB SOLUTION FOR GAYA HIDUP SEHAT (GHS) TABLOID: THE IMPLEMENTATION
More informationAutomatic annotation of digital photos
University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2007 Automatic annotation of digital photos Wenbin Shao University
More informationCITY UNIVERSITY OF NEW YORK. Creating a New Project in IRBNet. i. After logging in, click Create New Project on left side of the page.
CITY UNIVERSITY OF NEW YORK Creating a New Project in IRBNet i. After logging in, click Create New Project on left side of the page. ii. Enter the title of the project, the principle investigator s (PI)
More informationStudent retention in distance education using on-line communication.
Doctor of Philosophy (Education) Student retention in distance education using on-line communication. Kylie Twyford AAPI BBus BEd (Hons) 2007 Certificate of Originality I certify that the work in this
More informationEuropean Risk Management Certification. Candidate Information Guide
European Risk Management Certification Candidate Information Guide Presentation of FERMA Certification 3 Benefits 4 Eligibility criteria 5 Application and fees Examination details Syllabus: FERMA rimap
More informationACKNOWLEDGEMENT. my PhD Supervisor Dr. Vidhyacharan Bhaskar, Professor, Department of
iv ACKNOWLEDGEMENT It is my pleasant duty to thank a large number of people for the various forms of help, encouragement and support that they have provided during the time I have been working on this
More informationAutomated Planning for Open Network Architectures
UNIVERSITY OF CALIFORNIA Los Angeles Automated Planning for Open Network Architectures A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Computer
More informationASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Systems. IS Ph.D. Program. Page 0
ASSIUT UNIVERSITY Faculty of Computers and Information Department of Information Systems Informatiio on Systems PhD Program IS Ph.D. Program Page 0 Assiut University Faculty of Computers & Informationn
More informationBECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW
BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW BECOME AN ISACA MEMBER TODAY. Nearing its 50th year, ISACA is a global association helping individuals and enterprises achieve the positive potential
More informationMSc Digital Marketing
MSc Digital Marketing Become a Certified Digital Marketing Master 2 YEARS PART-TIME STUDY ONLINE www.springhouse.com 610-321-3500 info@springhouse.com Validated by the Industry Advisory Council. Including
More informationPacket-Loss Prediction Model Based on Historical Symbolic Time-Series Forecasting
Packet-Loss Prediction Model Based on Historical Symbolic Time-Series Forecasting by Hooman Homayounfard A dissertation submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy
More informationEnergy-efficient Routing and Secure Communication in Wireless Sensor Networks
Energy-efficient Routing and Secure Communication in Wireless Sensor Networks A Thesis Submitted for the Degree of Doctor of Philosophy By Mian Ahmad Jan in Faculty of Engineering and Information Technology
More informationMY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE.
MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE. TIMO HEIKKINEN, CISA, CGEIT SENIOR AUDIT SPECIALIST, NORDEA HELSINKI, FINLAND ISACA MEMBER SINCE 1999 ABOUT US BE MORE INFORMED, VALUED
More informationYour CONNECTION to the CREDENTIALING COMMUNITY JOIN TODAY
Your CONNECTION to the CREDENTIALING COMMUNITY JOIN TODAY ACHIEVE SUCCESS with ICE ICE has given me a real edge in knowing more about the intricacies of credentialing and connecting with others in the
More informationIllumination invariant face detection
University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2009 Illumination invariant face detection Alister Cordiner University
More informationA Reliability-Aware Framework for Service-Based Software Development
A Reliability-Aware Framework for Service-Based Software Development by Ian Andrusiak A Thesis Submitted in Partial Fulfilment of the Requirements for the Degree of Masters of Applied Science in Electrical
More informationMITIGATING CACHE ASSOCIATIVITY AND COHERENCE SCALABILITY CONSTRAINTS FOR MANY-CORE CHIP MULTIPROCESSORS
MITIGATING CACHE ASSOCIATIVITY AND COHERENCE SCALABILITY CONSTRAINTS FOR MANY-CORE CHIP MULTIPROCESSORS Thesis By Malik Al-Manasia In Partial Fulfilment of the Requirements for the Degree of Doctor of
More informationA GENERIC FRAMEWORK FOR DISTRIBUTED COMPUTATION
A GENERIC FRAMEWORK FOR DISTRIBUTED COMPUTATION By Shailesh Kelkar A Thesis Submitted to the Graduate Faculty of Rensselaer Polytechnic Institute in Partial Fulfillment of the Requirements for the Degree
More informationCITY UNIVERSITY OF NEW YORK. i. Visit:
CITY UNIVERSITY OF NEW YORK I. ACCESSING IRB NET (New Registration) i. Visit: https://www.irbnet.org/release/index.html ii. New users: Click on New Registration in the top right corner iii. Fill-out the
More informationQoS-based semantic web service selection
Ryerson University Digital Commons @ Ryerson Theses and dissertations 1-1-2010 QoS-based semantic web service selection Yijun Chen Ryerson University Follow this and additional works at: http://digitalcommons.ryerson.ca/dissertations
More informationNOVEL TECHNIQUES AND ARCHITECTURES FOR ADAPTIVE BEAMFORMING
NOVEL TECHNIQUES AND ARCHITECTURES FOR ADAPTIVE BEAMFORMING By THUA VAN HO, B.A.Sc, M.A.Sc A Thesis Submitted to the School of Graduate Studies in Partial Fulfillment of the Requirements for the Degree
More informationThe Automatic Design of Batch Processing Systems
The Automatic Design of Batch Processing Systems by Barry Dwyer, M.A., D.A.E., Grad.Dip. A thesis submitted for the degree of Doctor of Philosophy in the Department of Computer Science University of Adelaide
More informationEnabling Component-Based Model Transformations with QVT. Li Dan
Enabling Component-Based Model Transformations with QVT by Li Dan Doctor of Philosophy in Software Engineering 2013 Faculty of Science and Technology University of Macau Enabling Component-Based Model
More informationPROGRAMME SPECIFICATION
PROGRAMME SPECIFICATION Master of Computing (Hons) in Computer Security Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool John Moores University
More information: Semantic Web (2013 Fall)
03-60-569: Web (2013 Fall) University of Windsor September 4, 2013 Table of contents 1 2 3 4 5 Definition of the Web The World Wide Web is a system of interlinked hypertext documents accessed via the Internet
More informationInstalling SharePoint Server 2007
Installing Microsoft Office SharePoint Server 2007 1. Login to the computer with Domain Admin Account 2. Install Microsoft Windows Server 2003 Enterprise or Standard 3. Install Windows Server 2003 Service
More informationThe Impact of SOA Policy-Based Computing on C2 Interoperation and Computing. R. Paul, W. T. Tsai, Jay Bayne
The Impact of SOA Policy-Based Computing on C2 Interoperation and Computing R. Paul, W. T. Tsai, Jay Bayne 1 Table of Content Introduction Service-Oriented Computing Acceptance of SOA within DOD Policy-based
More informationCruiseSmarter PRIVACY POLICY. I. Acceptance of Terms
I. Acceptance of Terms This Privacy Policy describes CRUISE SMARTER policies and procedures on the collection, use and disclosure of your information. CRUISE SMARTER LLC (hereinafter referred to as "we",
More informationContributions to pairing-based cryptography
University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2010 Contributions to pairing-based cryptography Tsz Hon Yuen University
More informationUniversiti Teknologi MARA. An Analysis on The Uses of Data Modeling in Database Application Development
CAJ (yo&ao 3 ĕr^?^ Universiti Teknologi MARA An Analysis on The Uses of Data Modeling in Database Application Development Hafiza Binti Ahmad Thesis submitted in fulfillment of the requirements for Bachelor
More informationINTELLIGENT NON-DESTRUCTIVE CLASSIFICATION OF JOSAPINE PINEAPPLE MATURITY USING ARTIFICIAL NEURAL NETWORK
INTELLIGENT NON-DESTRUCTIVE CLASSIFICATION OF JOSAPINE PINEAPPLE MATURITY USING ARTIFICIAL NEURAL NETWORK NAZRIYAH BINTI HAJI CHE ZAN @ CHE ZAIN MASTER OF ENGINEERING (ELECTRONICS) UNIVERSITI MALAYSIA
More informationAll LJMU programmes are delivered and assessed in English
PROGRAMME SPECIFICATION Master of Science in Computer Forensics Awarding institution Teaching institution JACS Code Programme Duration Language of Programme Subject benchmark statement Programme accredited
More informationKomal Patiyal 1, Sanjay 2 1,2 Computer Science & Engineering, Himachal Pradesh Technical University,Hamirpur. IJRASET: All Rights are Reserved
Study & Enhancement of Fly spray Bug Tracking Tool Komal Patiyal 1, Sanjay 2 1,2 Computer Science & Engineering, Himachal Pradesh Technical University,Hamirpur Abstract: As software projects become increasingly
More informationACCELERATED COMPLEX EVENT PROCESSING WITH GRAPHICS PROCESSING UNITS
ACCELERATED COMPLEX EVENT PROCESSING WITH GRAPHICS PROCESSING UNITS Prabodha Srimal Rodrigo Registration No. : 138230V Degree of Master of Science Department of Computer Science & Engineering University
More information"Charting the Course... MOC B Updating Your SQL Server Skills to Microsoft SQL Server 2014 Course Summary
Course Summary Description This five-day instructor-led course teaches students how to use the enhancements and new features that have been added to SQL Server and the Microsoft data platform since the
More informationUNIVERSITI TEKNOLOGI MARA A PROCEDURAL FRAMEWORK FOR EXTENSION OF TIME (EOT) CLAIM SETTLEMENT IN THE MALAYSIAN CONSTRUCTION INDUSTRY
UNIVERSITI TEKNOLOGI MARA A PROCEDURAL FRAMEWORK FOR EXTENSION OF TIME (EOT) CLAIM SETTLEMENT IN THE MALAYSIAN CONSTRUCTION INDUSTRY NORAZIAN MOHAMAD YUSUWAN Thesis submitted in fulfilment of the requirement
More informationAN INTEGRATED MOBILE CONTENT RECOMMENDATION SYSTEM. Worapat Paireekreng. B.B.A. Thammasat University, Thailand
AN INTEGRATED MOBILE CONTENT RECOMMENDATION SYSTEM Worapat Paireekreng B.B.A. Thammasat University, Thailand M.S. (Hons) National Institute of Development Administration, Thailand This thesis is presented
More informationINFORMATION ACCESS VIA VOICE. dissertation is my own or was done in collaboration with my advisory committee. Yapin Zhong
INFORMATION ACCESS VIA VOICE Except where reference is made to the work of others, the work described in this dissertation is my own or was done in collaboration with my advisory committee. Yapin Zhong
More informationLocation Based Selling Platform for Mobile Buyers
Location Based Selling Platform for Mobile Buyers M. M. Buddhika Mawella 149219M Faculty of Information Technology University of Moratuwa April 2017 Location Based Selling Platform for Mobile Buyers M.
More informationKINGS COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY. (An NBA Accredited Programme) ACADEMIC YEAR / EVEN SEMESTER
KINGS COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY (An NBA Accredited Programme) ACADEMIC YEAR 2012-2013 / EVEN SEMESTER YEAR / SEM : IV / VIII BATCH: 2009-2013 (2008 Regulation) SUB CODE
More informationService Level Agreement for Microsoft Azure operated by 21Vianet. Last updated: November Introduction
Service Level Agreement for Microsoft Azure operated by 21Vianet Last updated: November 2017 1. Introduction This Service Level Agreement for Azure (this SLA ) is made by 21Vianet in connection with, and
More informationCOMPUTATIONAL CHALLENGES IN HIGH-RESOLUTION CRYO-ELECTRON MICROSCOPY. Thesis by. Peter Anthony Leong. In Partial Fulfillment of the Requirements
COMPUTATIONAL CHALLENGES IN HIGH-RESOLUTION CRYO-ELECTRON MICROSCOPY Thesis by Peter Anthony Leong In Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy California Institute
More informationCITP Mentoring Program Guidelines
CITP Mentoring Program Guidelines 1 AICPA CITP Mentoring Program Guidelines 2017 American Institute of CPAs. All rights reserved. DISCLAIMER: The contents of this publication do not necessarily reflect
More informationBINUS UNIVERSITY INTERNATIONAL BINUS UNIVERSITY
BINUS UNIVERSITY INTERNATIONAL BINUS UNIVERSITY Major Information Systems Sarjana Komputer Thesis Semester EVEN year 2008 INVENTORY MANAGEMENT AND ORDERING SYSTEM FOR MIDDLE-UP RESTAURANT INVENTORY CONTROL
More information"Charting the Course... MOC C: Developing SQL Databases. Course Summary
Course Summary Description This five-day instructor-led course provides students with the knowledge and skills to develop a Microsoft SQL database. The course focuses on teaching individuals how to use
More informationAdvanced Migration of Schema and Data across Multiple Databases
Advanced Migration of Schema and Data across Multiple Databases D.M.W.E. Dissanayake 139163B Faculty of Information Technology University of Moratuwa May 2017 Advanced Migration of Schema and Data across
More informationTrust in the Internet of Things From Personal Experience to Global Reputation. 1 Nguyen Truong PhD student, Liverpool John Moores University
Trust in the Internet of Things From Personal Experience to Global Reputation 1 Nguyen Truong PhD student, Liverpool John Moores University 2 Outline I. Background on Trust in Computer Science II. Overview
More informationSecure communication over mobile ad-hoc network
University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2009 Secure communication over mobile ad-hoc network Zhenfei Zhang
More informationDISTRIBUTED LOCAL TRUST PROPAGATION MODEL AND ITS CLOUD- BASED IMPLEMENTATION
DISTRIBUTED LOCAL TRUST PROPAGATION MODEL AND ITS CLOUD- BASED IMPLEMENTATION A thesis submitted in partial fulfillment of the requirements for the degree of Master of Science By DHARAN KUMAR REDDY ALTHURU
More informationDiversity Optimization and Parameterized Analysis of Heuristic Search Methods for Combinatorial Optimization Problems
THE UNIVERSITY OF ADELAIDE DOCTORAL THESIS Diversity Optimization and Parameterized Analysis of Heuristic Search Methods for Combinatorial Optimization Problems Author: Wanru Gao Principle Supervisor:
More informationA Framework for Knowledge Derivation Incorporating Trust and Quality of Data
A Framework for Knowledge Derivation Incorporating Trust and Quality of Data By c 2013 Martin Kuehnhausen Submitted to the graduate degree program in Electrical Engineering and Computer Science and the
More informationMSc Digital Marketing
MSc Digital Marketing Become a 2 YEARS PART-TIME Digital Marketing Master STUDY ONLINE www.imarcomms.com Validated by the Industry Advisory Council. Including members from Content MSc Digital Marketing
More information"Charting the Course... SharePoint 2007 Hands-On Labs Course Summary
Course Summary Description This series of 33 hands-on labs allows students to explore the new features of Microsoft SharePoint Server, Microsoft Windows, Microsoft Office, including Microsoft Office Groove,
More informationThe Concept of Evolutionary Computing for Robust Surgical Endoscope Tracking and Navigation
The Concept of Evolutionary Computing for Robust Surgical Endoscope Tracking and Navigation Ying Wan School of Computing and Communications University of Technology, Sydney This dissertation is submitted
More informationa PennState A leader in online learning since 1998 Programs in Enterprise Architecture ~ World Campus A world of possibilities. Online.
A leader in online learning since 1998 To learn more about programs in Enterprise Architecture, visit: worldcampus.psu.edu/psueabt Programs in Enterprise Architecture a PennState ~ World Campus A world
More informationSemantic Web. Semantic Web Services. Morteza Amini. Sharif University of Technology Fall 94-95
ه عا ی Semantic Web Semantic Web Services Morteza Amini Sharif University of Technology Fall 94-95 Outline Semantic Web Services Basics Challenges in Web Services Semantics in Web Services Web Service
More informationRun the business. Not the risks.
Run the business. Not the risks. RISK-RESILIENCE FOR THE DIGITAL BUSINESS Cyber-attacks are a known risk to business. Today, with enterprises becoming pervasively digital, these risks have grown multifold.
More informationBPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.
BPS Suite and the OCEG Capability Model Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Contents Introduction... 2 GRC activities... 2 BPS and the Capability Model for GRC...
More informationInitial CITP and CSci (partial fulfilment). *Confirmation of full accreditation will be sought in 2020.
PROGRAMME SPECIFICATION Master of Computing (Hons) in Computer Forensics Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool John Moores University
More informationUniversity of Wollongong. Research Online
University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2009 Complete interoperability in healthcare : technical, semantic
More informationResource Allocation Strategies for Multiple Job Classes
Resource Allocation Strategies for Multiple Job Classes by Ye Hu A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master of Mathematics in Computer
More information