Instructor: Prof. Dr. Ling
Liu
Attention:
The information contained in this page is subject to changes.
Here are the Lecture-related course readings
Week |
Topics |
Notes (restricted access) |
Required Reading (Choose one on each of the
10 assignment weeks) |
1 |
1. Course Introduction 2. Search Engine Technology |
Lecture 1 |
No reading
assignment |
2 |
3. Peer to Peer Computing 4. Mobile Internet and Location based Services + Project Ideas |
[5.1 P2P]: 2, 4,
13, 8, 10, 15, 16, 17, 21, 22, 23 [5.2 Mobile]: 4, 8,
13, 16, 19, 22,23,24, 28, 30, 31, 32 |
|
3 |
5. Hadoop
MapReduce and Parallel Data Processing 6. Big Data Processing: Why Hadoop MapReduce is
not enough |
[7.CloudComputing]:
2,5,7,10,12,13,14,15,16,
18, 20, 21, 22, 23. |
|
4 |
7. Social
Recommendation Systems 8. Data Mining: Data Clustering |
[6.2 CF]:
1,2,3,4,7,8,10, 11 [6.1 Social
Networks]: 30, 31, 32, 34, 41, 42, 52, 57, 64, 66 |
|
5 |
9.
Data Mining: Association Rule Mining + Classification 10.
Information Monitoring with Continuous Queries Project Proposal Due on Friday
of Feb 8 midnight |
[6.3 AssociationMining] 1, 2, 3, 4, 8, 13 |
|
6 |
11. Web Servers, Application Servers,
Enterprise Application Integration 12. Web Information
Retrieval: Models and Algorithms |
[2.1 WS] 1, 2, 18 [2.2 WP] 4,6,7, 21 [3.AS] 14,15,118, 21, 31,
32, 33, 34 [5.1 P2P]: 5 |
|
7 |
13. Mobile/Spatial Data Management 14. Selected Project Proposal
Presentation |
[5.2 Mobile]: 4, 8, 13, 16, 19, 22,23,24, 28, 30, 31, 32 |
|
8 |
15. Content
Distribution Networks (CDNs) 16. Multicast on Internet |
[5.1 P2P]: 26, 27,
28, 31, 32, 33, 35, 36 |
|
9 |
17. Big Table and Key-Value Stores 18. Connecting Big Data with Big Data Analytics` |
|
[7.CloudComputing]:
1, 3, 6, 8, 11, 24,
25, 26, 27 … |
10 |
19. Anonymous Communication (Onion Routing and Tor)
20. Security and Secure Overlay Network Services |
8.1 Security]:
9,10,11,12,13,14, 15, 17 [8.2 Privacy] 1, 2,
3, 4, 5, 6 … [8.3 Location
Privacy]: 1,3,4,21,26,27 |
|
11 |
|
|
|
12 |
21. Trust and Reputation in Decentralized Overlay 22. Location Privacy in Mobile Computing and Application Services |
[5.4 RFID]1,2,3,4 [8.4 Trust]1, 2,
7, 11,12,13 |
|
13 |
23. Social Network Analysis + Social Influence 24. Performance Measurement |
||
14 |
25. Internet/Web Computing: Looking forward CS8803/CS4675 Workshop Day
(Project Presentation) |
|
|
15 |
CS8803/CS4675 Workshop Day (project presentations) CS8803/CS4675 Workshop Day (project presentations) |
|
|
16 |
CS8803/CS4675 Workshop Day (project presentations) CS8803/CS4675
Workshop Day (project presentations) Project
Demo 4/26 - 4/27 Technology Review Due: 4/30 midnight (Final exam day - Hard Deadline) |
|
|