Search For:

Displaying 1-32 out of 32 total
A Flexible GridFTP Client for Scheduling of Big Data Transfers
Found in: 2013 IEEE 16th International Conference on Computational Science and Engineering (CSE)
By Esma Yildirim
Issue Date:December 2013
pp. 1067-1074
Big Data generated in massive amounts by digital sources ranging from scientific instruments, business transactions to the social networks, has changed the way we understand and handle data. It has caused scientific and business community, as well as gover...
 
Privacy Framework for Peer Affective Feedback
Found in: 2013 International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)
By Mouna Selmi,Esma Aimeur,Hicham Hage
Issue Date:December 2013
pp. 1049-1056
In Intelligent Tutoring System (ITS), peer affective feedback could be an effective solution to regulate the learners' emotions when the feedback provided by the ITS is inadequate. However, this option raises many privacy problems since peer affective feed...
 
The Scourge of Internet Personal Data Collection
Found in: 2013 Eighth International Conference on Availability, Reliability and Security (ARES)
By Esma Aimeur,Manuel Lafond
Issue Date:September 2013
pp. 821-828
In today's age of exposure, websites and Internet services are collecting personal data-with or without the knowledge or consent of users. Not only does new technology provide an abundance of methods for organizations to gather and store information, but p...
 
How GridFTP Pipelining, Parallelism and Concurrency Work: A Guide for Optimizing Large Dataset Transfers
Found in: 2012 SC Companion: High Performance Computing, Networking, Storage and Analysis (SCC)
By Esma Yildirim,JangYoung Kim,Tevfik Kosar
Issue Date:November 2012
pp. 506-515
Optimizing the transfer of large files over high-bandwidth networks is a challenging task that requires the consideration of many parameters (e.g. network speed, round-trip time, and current traffic). Unfortunately, this task becomes more complex when tran...
 
A Highly-Accurate and Low-Overhead Prediction Model for Transfer Throughput Optimization
Found in: 2012 SC Companion: High Performance Computing, Networking, Storage and Analysis (SCC)
By JangYoung Kim,Esma Yildirim,Tevfik Kosar
Issue Date:November 2012
pp. 787-795
An important bottleneck for data-intensive scalable computing systems is efficient utilization of the network links that connect the collaborating institutions with their remote partners, data sources, and computational sites. To alleviate this bottleneck,...
 
SMURF: A SVM-based Incremental Anti-pattern Detection Approach
Found in: 2012 19th Working Conference on Reverse Engineering (WCRE)
By Abdou Maiga,Nasir Ali,Neelesh Bhattacharya,Aminata Sabane,Yann-Gael Gueheneuc,Esma Aimeur
Issue Date:October 2012
pp. 466-475
In current, typical software development projects, hundreds of developers work asynchronously in space and time and may introduce anti-patterns in their software systems because of time pressure, lack of understanding, communication, and -- or skills. Anti...
 
Support vector machines for anti-pattern detection
Found in: Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering (ASE 2012)
By Abdou Maiga, Aminata Sabané, Esma Aïmeur, Giuliano Antoniol, Nasir Ali, Neelesh Bhattacharya, Yann-Gaël Guéhéneuc
Issue Date:September 2012
pp. 278-281
Developers may introduce anti-patterns in their software systems because of time pressure, lack of understanding, communication, and--or skills. Anti-patterns impede development and maintenance activities by making the source code more difficult to underst...
     
Support vector machines for anti-pattern detection
Found in: 2012 27th IEEE/ACM International Conference on Automated Software Engineering (ASE)
By Abdou Maiga,Nasir Ali,Neelesh Bhattacharya,Aminata Sabane,Yann-Gael Gueheneuc,Giuliano Antoniol,Esma Aimeur
Issue Date:September 2012
pp. 278-281
Developers may introduce anti-patterns in their software systems because of time pressure, lack of understanding, communication, and--or skills. Anti-patterns impede development and maintenance activities by making the source code more difficult to underst...
 
Privacy invasion in business environments
Found in: 2012 Tenth Annual International Conference on Privacy, Security and Trust (PST)
By Manuel Lafond,Pierre-Olivier Brosseau,Esma Aimeur
Issue Date:July 2012
pp. 221-224
It is not uncommon for business managers to use recent innovations in information and communications technology to monitor employees and job candidates. These methods not only rely on heavy surveillance during working hours of employees but can also be app...
 
Network-aware end-to-end data throughput optimization
Found in: Proceedings of the first international workshop on Network-aware data management (NDM '11)
By Esma Yildirim, Tevfik Kosar
Issue Date:November 2011
pp. 21-30
The rapidly advancing optical networking technology allows us high-bandwidth connectivity up to 100Gbps these days. However, the end-users and their applications can only observe a fraction of this available bandwidth capacity due to inefficient transport ...
     
Probe design optimization of HLA microarray: Data cleaning of probe signals from cDNA tiling microarray: Outlier detection, noise reduction, and identification of uninformative probes in HLA typing application
Found in: Bioinformatics and Biomedicine Workshop, IEEE International Conference on
By Esma Dilek,Tanya Zlateva,Guang Lan Zhang,Lou Chitkushev,Jae Young Lee,Vladimir Brusic
Issue Date:November 2011
pp. 680-682
Custom made tiling cDNA microarrays have been developed for high resolution HLA genotyping. The array comprises tens of thousands of sequence-specific oligonucleotide probes (SSOP) that hybridize with HLA sequences. Sophisticated methods for analyzing the ...
 
Prediction of Optimal Parallelism Level in Wide Area Data Transfers
Found in: IEEE Transactions on Parallel and Distributed Systems
By Esma Yildirim,Dengpan Yin,Tevfik Kosar
Issue Date:December 2011
pp. 2033-2045
Wide area data transfer may be a major bottleneck for the end-to-end performance of distributed applications. A practical way of increasing the wide area throughput at the application layer is using multiple parallel streams. Although increased number of p...
 
A Data Throughput Prediction and Optimization Service for Widely Distributed Many-Task Computing
Found in: IEEE Transactions on Parallel and Distributed Systems
By Dengpan Yin,Esma Yildirim,Sivakumar Kulasekaran,Brandon Ross,Tevfik Kosar
Issue Date:June 2011
pp. 899-909
In this paper, we present the design and implementation of an application-layer data throughput prediction and optimization service for many-task computing in widely distributed environments. This service uses multiple parallel TCP streams to improve the e...
 
Towards a Privacy-Enhanced Social Networking Site
Found in: Availability, Reliability and Security, International Conference on
By Esma Aïmeur, Sébastien Gambs, Ai Ho
Issue Date:February 2010
pp. 172-179
Social Networking Sites (SNS), such as Facebook and LinkedIn, have become the established place for keeping contact with old friends and meeting new acquaintances. As a result, a user leaves a big trail of personal information about him and his friends on ...
 
A Survey on Salmonella of Working Tools and Storage Area of Meat/Chicken Stores in Iran (Amol)
Found in: Environmental and Computer Science, International Conference on
By Rabehe Izadi Amoli,Peiman Ariaii,Mahroo Esmaeli,Fateme Zaboli
Issue Date:December 2009
pp. 245-249
Most Salmonella are considered Human pathogens. Meat and chicken transmit this bacterium. Since there is a possibility for transmitting the bacteria by labor instruments and storage area of meat/chicken stores, this research has been performed. To accompli...
 
A data throughput prediction and optimization service for widely distributed many-task computing
Found in: Proceedings of the 2nd Workshop on Many-Task Computing on Grids and Supercomputers (MTAGS '09)
By Dengpan Yin, Esma Yildirim, Tevfik Kosar
Issue Date:November 2009
pp. 1-10
In this paper, we present the design and implementation of a network throughput prediction and optimization service for many-task computing in widely distributed environments. This service uses multiple parallel TCP streams to improve the end-to-end throug...
     
Preventing Computer Threats Using a Secure e-Learning Framework
Found in: Signal-Image Technologies and Internet-Based System, International IEEE Conference on
By Jonathan Sawyer, Esma Aïmeur
Issue Date:December 2009
pp. 369-376
Networks in computer sciences have brought their load of problems when it became important to protect one’s own virtual environment. People of varied profiles are faced with different threats and are often unaware of the danger inherent to these. Many thre...
 
Balancing TCP buffer vs parallel streams in application level throughput optimization
Found in: Proceedings of the second international workshop on Data-aware distributed computing (DADC '09)
By Dengpan Yin, Esma Yildirim, Tevfik Kosar
Issue Date:June 2009
pp. 21-30
The end-to-end performance of TCP over wide-area may be a major bottleneck for large-scale network-based applications. Two practical ways of increasing the TCP performance at the application layer is using multiple parallel streams and tuning the buffer si...
     
UPP: User Privacy Policy for Social Networking Sites
Found in: Internet and Web Applications and Services, International Conference on
By Esma Aïmeur, Sébastien Gambs, Ai Ho
Issue Date:May 2009
pp. 267-272
Since their introduction, SNS (Social Networking Sites) such as MySpace, Facebook and LinkedIn have attracted millions of users and have become established places for keeping contact with old acquaintances and meeting new ones. Nonetheless, due to lack of ...
 
Privacy protection issues in social networking sites
Found in: Computer Systems and Applications, ACS/IEEE International Conference on
By Ai Ho, Abdou Maiga, Esma Aimeur
Issue Date:May 2009
pp. 271-278
Social Networking Sites (SNS) have become very popular during the past few years, as they allow users to both express their individuality and meet people with similar interests. Nonetheless, there are also many potential threats to privacy associated with ...
 
Papyres: A Research Paper Management System
Found in: E-Commerce Technology and Enterprise Computing, E-Commerce and E-Services, IEEE Conference and Fifth IEEE Conference
By Amine Naak, Hicham Hage, Esma Aïmeur
Issue Date:July 2008
pp. 201-208
In the context of a research and development department of an enterprise, researchers regularly access, review, and use large amounts of literature, yet none of the exiting tools and solutions provide the wide range of functionalities required to properly ...
 
Dynamically tuning level of parallelism in wide area data transfers
Found in: Proceedings of the 2008 international workshop on Data-aware distributed computing (DADC '08)
By Esma Yildirim, Mehmet Balman, Tevfik Kosar
Issue Date:June 2008
pp. 39-48
Using multiple parallel streams for wide area data transfers may yield much better performance than using a single stream, but overwhelming the network by opening too many streams may have an inverse effect. The congestion created by excess number of strea...
     
Experimental Demonstration of a Hybrid Privacy-Preserving Recommender System
Found in: Availability, Reliability and Security, International Conference on
By Esma Aimeur, Gilles Brassard, Jose M. Fernandez, Flavien Serge Mani Onana, Zbigniew Rakowski
Issue Date:March 2008
pp. 161-170
Recommender systems enable merchants to assist customers in finding products that best satisfy their needs. Unfortunately, current recommender systems suffer from various privacy-protection vulnerabilities. We report on the first experimental realization o...
 
Anonymous Credentials for Privacy-Preserving E-learning
Found in: International MCETECH Conference on e-Technologies
By Esma Aïmeur, Hicham Hage, Flavien Serge Mani Onana
Issue Date:January 2008
pp. 70-80
E-learning systems have made considerable progress within the last few years. Nonetheless, the issue of learner privacy has been practically ignored. Existing E-learning standards offer some provisions for privacy and the security of E-learning systems off...
 
HELP: A Recommender System to Locate Expertise in Organizational Memories
Found in: Computer Systems and Applications, ACS/IEEE International Conference on
By Esma Aimeur, Flavien Serge Mani Onana, Anita Saleman
Issue Date:May 2007
pp. 866-874
The rapid evolution of our world means that learning and knowledge sharing are fast becoming a key challenge for individuals and organizations. In this paper, we present a system called HELP, whose aim is to locate information and recommend experts in orga...
 
Better control on recommender systems
Found in: E-Commerce Technology, IEEE International Conference on, and Enterprise Computing, E-Commerce, and E-Services, IEEE International Conference on
By Esma Aimeur, Flavien Serge Mani Onana
Issue Date:June 2006
pp. 38
In the context of electronic commerce, recommender systems enable merchants to assist customers in finding available products that will best satisfy their need. However, a recommender system usually operates as a kind of black box from which customers rece...
 
Community Cooperation in Recommender Systems
Found in: E-Business Engineering, IEEE International Conference on
By Alexandre Desmarais-Frantz, Esma Aimeur
Issue Date:October 2005
pp. 229-236
<p>Recommender systems have been widely used in commercial and research oriented systems. In this paper, we propose to develop an intelligent, Internetbased movie recommender system, to help moviegoers choose movies. Our system, COOP-R uses a hybrid ...
 
Personal Knowledge Publishing: Fostering Interdisciplinary Communication
Found in: IEEE Intelligent Systems
By Esma Aïmeur, Gilles Brassard, Sébastien Paquet
Issue Date:March 2005
pp. 46-53
The social and language barriers that exist between knowledge communities significantly hinder knowledge sharing and slow down progress. In this article, the authors investigate whether personal knowledge publishing (PKP)-a Web-based communication derived ...
 
Building a Multi-Agent System for Automatic Negotiation in Web Service Applications
Found in: Autonomous Agents and Multiagent Systems, International Joint Conference on
By Ambroise Ncho, Esma Aïmeur
Issue Date:July 2004
pp. 1466-1467
Within the last decade, much effort has been put into the development of standards and technologies that enable the integration of Internet applications and the interoperability of Web services. The ultimate goal of these initiatives is to increase the aut...
   
A Multimedia Training System Applied to Telephony
Found in: Advanced Learning Technologies, IEEE International Conference on
By Esma Aïmeur, Bahram Salehian
Issue Date:July 2003
pp. 272
The proper combination of Hypermedia and interactive multimedia systems for a particular learning style can greatly enhance the learning environment. By interacting with this virtual environment, the learner can gain practical experience. This paper descri...
   
PCFinder: An Intelligent Product Recommendation Agent for E-Commerce
Found in: E-Commerce Technology, IEEE International Conference on
By Bin Xiao, Esma Aïmeur, José Manuel Fernandez
Issue Date:June 2003
pp. 181
There are many e-commerce applications on the web. A comon shortcoming is the lack of customer service and marketing analysis tools in most e-commerce web sites. In order to overcome this problem, we have constructed an intelligent agent based on Case-Base...
 
Intelligent Agent in Electronic Commerce-XMLFinder
Found in: Enabling Technologies, IEEE International Workshops on
By Yanping Ma, Esma Aïmeur
Issue Date:June 2001
pp. 273
E-commerce is a rapidly growing area on the Internet. There are various types of online shopping sites that help consumers find products to purchase. The intelligent agent is among the most promising technologies in recommender systems and CBR (case-based ...
 
 1