• IoT-based smart parking system for sporting event management 

      Kubler, Sylvain; Robert, Jeremy; Hefnawy, Ahmed A; Cherifi, Chantal; Bouras, Abdelaziz; ... more authors ( Association for Computing Machinery , 2016 , Conference Paper)
      By connecting devices, people, vehicles and infrastructures everywhere in a city, governments and their partners can improve community wellbeing and other economic and financial aspects (e.g., cost and energy savings). ...
    • ISDNet: AI-enabled Instance Segmentation of Aerial Scenes for Smart Cities 

      Garg, P.; Chakravarthy, Anirudh Srinivasan; Mandal, Murari; Narang, Pratik; Chamola, Vinay; ... more authors ( Association for Computing Machinery , 2021 , Article)
      Aerial scenes captured by UAVs have immense potential in IoT applications related to urban surveillance, road and building segmentation, land cover classification, and so on, which are necessary for the evolution of smart ...
    • LA3: A scalable link-and locality-aware linear algebra-based graph analytics system 

      Ahmad Y.; Khattab O.; Malik A.; Musleh A.; Hammoud M.; ... more authors ( Association for Computing Machinery , 2018 , Conference Paper)
      This paper presents LA3, a scalable distributed system for graph analytics. LA3 couples a vertex-based programming model with a highly optimized linear algebra-based engine. It translates any vertex-centric program into ...
    • Machine unlearning: Its need and implementation strategies 

      Tahiliani, Aman; Hassija, Vikas; Chamola, Vinay; Guizani, Mohsen ( Association for Computing Machinery , 2021 , Conference Paper)
      Generally when users share information about themselves on some online platforms, they knowingly or unknowingly allow this data to be used by the companies behind these companies for various purposes including selling this ...
    • Malware Classification Based on Multilayer Perception and Word2Vec for IoT Security 

      Qiao, Yanchen; Zhang, Weizhe; Du, Xiaojiang; Guizani, Mohsen ( Association for Computing Machinery , 2022 , Article)
      With the construction of smart cities, the number of Internet of Things (IoT) devices is growing rapidly, leading to an explosive growth of malware designed for IoT devices. These malware pose a serious threat to the ...
    • On realistic target coverage by autonomous drones 

      Saeed A.; Abdelkader A.; Khan M.; Neishaboori A.; Harras K.A.; ... more authors ( Association for Computing Machinery , 2019 , Article)
      Low-cost mini-drones with advanced sensing and maneuverability enable a new class of intelligent sensing systems. To achieve the full potential of such drones, it is necessary to develop new enhanced formulations of both ...
    • Optimum design of haptic seat for driving simulator 

      Halabi, Osama; Ba Hameish, Mariam; Al-Naimi, Latefa; Al-Kaabi, Amna ( Association for Computing Machinery , 2014 , Conference Paper)
      This work aims to design and develop an optimal vibrotactile seat to provide a high level of satisfaction to the driver. The main critical design parameters were considered and experiments were conducted to investigate the ...
    • Orochi: investigating requirements and expectations for multipurpose daily used supernumerary robotic limbs 

      Al-Sada M.; Hoglund T.; Khamis M.; Urbani J.; Nakajima T. ( Association for Computing Machinery , 2019 , Conference Paper)
      Supernumerary robotic limbs (SRLs) present many opportunities for daily use. However, their obtrusiveness and limitations in interaction genericity hinder their daily use. To address challenges of daily use, we extracted ...
    • Performance and security improvements for Tor: A survey 

      Alsabah, Mashael; Goldberg, Ian ( Association for Computing Machinery , 2016 , Article)
      Tor [Dingledine et al. 2004] is the most widely used anonymity network today, serving millions of users on a daily basis using a growing number of volunteer-run routers. Since its deployment in 2003, there have been more ...
    • Pervasive HoloMoL: A mobile pervasive game with mixed reality enhanced method of loci 

      Irie, Keisuke; Sada, Mohammed Al; Yamada, Yuki; Gushima, Kota; Nakajima, Tatsuo ( Association for Computing Machinery , 2017 , Conference Paper)
      This paper presents a mobile pervasive mixed reality game based on HoloMoL named Pervasive HoloMoL, where HoloMoL is a platform that helps us memorize different types of information by combining the method of loci memorization ...
    • Prioritizing deadline-constrained data flows in cloud datacenter networks 

      Khabbaz, Maurice; Shaban, Khaled; Assi, Chadi; Qu, Long ( Association for Computing Machinery , 2016 , Conference Paper)
      Real-time interactive application workloads (e.g. web search, social networking, etc.) are composed of a remarkably large number of mini request partitions that require stringent delayminimal aggregation of responses and ...
    • Re-ranking web search results for better fact-checking: A preliminary study 

      Yasser K.; Kutlu M.; Elsayed T. ( Association for Computing Machinery , 2018 , Conference Paper)
      Even though Web search engines play an important role in finding documents relevant to user queries, there is little to no attention given to how they perform in terms of usefulness for fact-checking claims. In this paper, ...
    • SDN Controllers: A Comprehensive Analysis and Performance Evaluation Study 

      Zhu, Liehuang; Karim, Md M.; Sharif, Kashif; Xu, Chang; Li, Fan; ... more authors ( Association for Computing Machinery , 2021 , Book Review)
      Software-defined networks offer flexible and intelligent network operations by splitting a traditional network into a centralized control plane and a programmable data plane. The controller in the control plane is the ...
    • Social access control language (SocACL) 

      Caprin, Edward; Zhang, Yan; Khan, Khaled M. ( Association for Computing Machinery , 2013 , Conference Paper)
      Online Social Networks hold vast amounts of readily accessible personal information leaving them particularly vulnerable to privacy breach attacks [6]. With the impact these breaches varying from simply embarrassing the ...
    • The limit of blockchains: Infeasibility of a smart obama-trump contract 

      Wang, Yongge; Malluhi, Qutaibah M. ( Association for Computing Machinery , 2019 , Article)
      Although smart contracts are Turing complete, it is a misconception that they can fulfill all routine contracts.
    • Three Dimensional Denoising Filter for Effective Source Smartphone Video Identification and Verification 

      Ashref Lawgaly; Fouad Khelifi; Ahmed Bouridane; Somaya Al-maadeed; Younes Akbari ( Association for Computing Machinery , 2022 , Conference Paper)
      The field of digital image and video forensics has recently seen significant advances and has attracted attention from a growing number of researchers given the availability of imaging functionalities in most current ...
    • When rank order isn't enough: New statistical-significance-aware correlation measures 

      Kutlu M.; Elsayed T.; Hasanain M.; Lease M. ( Association for Computing Machinery , 2018 , Conference Paper)
      Because it is expensive to construct test collections for Cranfield-based evaluation of information retrieval systems, a variety of lower-cost methods have been proposed. The reliability of these methods is often validated ...