Imperial College London

DrHamedHaddadi

Faculty of EngineeringDyson School of Design Engineering

Senior Lecturer
 
 
 
//

Contact

 

+44 (0)20 7594 2584h.haddadi Website

 
 
//

Location

 

Dyson BuildingSouth Kensington Campus

//

Summary

 

Publications

Publication Type
Year
to

75 results found

Hobbs-Chell H, King AJ, Sharratt H, Haddadi H, Rudiger SR, Hailes S, Morton AJ, Wilson AMet al., 2012, Data-loggers carried on a harness do not adversely affect sheep locomotion, RESEARCH IN VETERINARY SCIENCE, Vol: 93, Pages: 549-552, ISSN: 0034-5288

Journal article

King AJ, Wilson AM, Wilshin SD, Lowe J, Haddadi H, Hailes S, Morton AJet al., 2012, Selfish-herd behaviour of sheep under threat, CURRENT BIOLOGY, Vol: 22, Pages: R561-R562, ISSN: 0960-9822

Journal article

Cha M, Benevenuto F, Haddadi H, Gummadi Ket al., 2012, The World of Connections and Information Flow in Twitter, IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, Vol: 42, Pages: 991-998, ISSN: 1083-4427

Journal article

Haddadi H, Mortier R, Hand S, Brown I, Yoneki E, Crowcroft J, McAuley Det al., 2012, Privacy Analytics, ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, Vol: 42, Pages: 94-98, ISSN: 0146-4833

Journal article

Vallina-Rodriguez N, Scellato S, Haddadi H, Forsell C, Crowcroft J, Mascolo Cet al., 2012, Los Twindignados: The Rise of the Indignados Movement on Twitter, ASE/IEEE International Conference on Privacy, Security, Risk and Trust / ASE/IEEE International Confernece on Social Computing (SocialCom/PASSAT), Publisher: IEEE, Pages: 496-501

Conference paper

Fay D, Haddadi H, Uhlig S, Kilmartin L, Moore AW, Kunegis J, Iliofotou Met al., 2011, Discriminating graphs through spectral projections, COMPUTER NETWORKS, Vol: 55, Pages: 3458-3468, ISSN: 1389-1286

Journal article

Haddadi H, King AJ, Wills AP, Fay D, Lowe J, Morton AJ, Hailes S, Wilson AMet al., 2011, Determining association networks in social animals: choosing spatial-temporal criteria and sampling rates, BEHAVIORAL ECOLOGY AND SOCIOBIOLOGY, Vol: 65, Pages: 1659-1668, ISSN: 0340-5443

Journal article

Haddadi H, 2010, Fighting Online Click-Fraud Using Bluff Ads, ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, Vol: 40, Pages: 22-25, ISSN: 0146-4833

Journal article

Haddadi H, Henderson T, Crowcroft J, 2010, The Ambient Loo - Caught Short when Nature Calls?, ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, Vol: 40, Pages: 78-78, ISSN: 0146-4833

Journal article

Fay D, Haddadi H, Thomason A, Moore AW, Mortier R, Jamakovic A, Uhlig S, Rio Met al., 2010, Weighted Spectral Distribution for Internet Topology Analysis: Theory and Applications, IEEE-ACM TRANSACTIONS ON NETWORKING, Vol: 18, Pages: 164-176, ISSN: 1063-6692

Journal article

Haddadi H, Fay D, Uhlig S, Moore A, Mortier R, Jamakovic Aet al., 2010, Mixing Biases: Structural Changes in the AS Topology Evolution, 2nd International Workshop on Traffic Monitoring and Analysis, Publisher: SPRINGER-VERLAG BERLIN, Pages: 32-+, ISSN: 0302-9743

Conference paper

Clegg RG, Withall MS, Moore AW, Phillips IW, Parish DJ, Rio M, Landa R, Haddadi H, Kyriakopoulos K, Auge J, Clayton R, Salmon Det al., 2009, Challenges in the capture and dissemination of measurements from high-speed networks, IET COMMUNICATIONS, Vol: 3, Pages: 957-966, ISSN: 1751-8628

Journal article

Clegg RG, Landa R, Haddadi H, Rio Met al., 2009, Measuring the likelihood of models for network evolution, IEEE INFOCOM Conference 2009, Publisher: IEEE, Pages: 272-+

Conference paper

Haddadi H, Guha S, Francis P, 2009, Not All Adware Is Badware: Towards Privacy-Aware Advertising, 9th IFIP International Conference on e-Business, e-Service and e-Society, Publisher: SPRINGER-VERLAG BERLIN, Pages: 161-172, ISSN: 1868-4238

Conference paper

Haddadi H, Fay D, Jamakovic A, Maennel O, Moore AW, Mortier R, Uhlig Set al., 2009, On the Importance of Local Connectivity for Internet Topology Models, 21st International Teletraffic Congress (ITC 21), Publisher: IEEE, Pages: 177-184

Conference paper

Haddadi H, Uhlig S, Moore A, Mortier R, Rio Met al., 2008, Modeling Internet topology dynamics, ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, Vol: 38, Pages: 65-68, ISSN: 0146-4833

Journal article

Haddadi H, Fay D, Uhlig S, Moore A, Mortier R, Jamakovic A, Rio Met al., 2008, Tuning topology generators using spectral distributions, SPEC International Performance Evaluation Workshop (SIPEW 2008), Publisher: SPRINGER-VERLAG BERLIN, Pages: 154-+, ISSN: 0302-9743

Conference paper

Haddadi H, Rio M, Iannaccone G, Moore A, Mortier Ret al., 2008, NETWORK TOPOLOGIES: INFERENCE, MODELING, AND GENERATION, IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, Vol: 10, Pages: 49-70, ISSN: 1553-877X

Journal article

Haddadi H, Landa R, Moore AW, Bhatti S, Rio M, Che Xet al., 2008, Revisiting the Issues On Netflow Sample and Export Performance, 3rd International Conference on Communications and Networking in China, Publisher: IEEE, Pages: 421-+

Conference paper

Britton M, Shum V, Sacks L, Haddadi Het al., 2005, A biologically-inspired approach to designing wireless sensor networks, 2nd European Workshop on Wireless Sensor Networks, Publisher: IEEE, Pages: 256-266

Conference paper

Haddadi H, Inertial flow around obstacles in microchannels

Formation of recirculating wakes is a prominent feature of inertial flowaround bluff bodies. Below the onset of vortex shedding in uniform unboundedflows, the fluid in the recirculating wake region moves on closed planarorbits. The steady wake is thus an isolated zone in the flow and does notexchange fluid with the free stream. In this work, we utilize lattice-Boltzmannsimulations and microfluidic experiments to demonstrate that in microchannelinertial flow of Newtonian fluids, the recirculating wake is replaced by athree-dimensional vortical flow. Spiraling streamlines generate a continuousexchange of fluid between the vortex behind the obstacle and the free stream.The flow inertia is represented by Reynolds number defined as $Re =\frac{u_{max}D_{y}}{\nu}$, where $u_{max}$ is the maximum fluid velocity in thechannel inlet, $D_{y}$ is the characteristic obstacle length and $\nu$ is thefluid kinematic viscosity. We discuss the effects of $Re$, the obstacle shapeand the wall confinement on the fluid entry into the vortex. Further, wedemonstrate that in flow of a dilute suspension of particles around theobstacle, the fluid entry into the vortex can result in entrapment of particlesas well.

Journal article

Silina Y, Haddadi H, The Distant Heart: Mediating Long-Distance Relationships through Connected Computational Jewelry

In the world where increasingly mobility and long-distance relationships withfamily, friends and loved-ones became commonplace, there exists a gap inintimate interpersonal communication mediated by technology. Considering theadvances in the field of mediation of relationships through technology, as wellas prevalence of use of jewelry as love-tokens for expressing a wish to beremembered and to evoke the presence of the loved-one, developments in the newfield of computational jewelry offer some truly exciting possibilities. In thispaper we investigate the role that the jewelry-like form factor of prototypescan play in the context of studying effects of computational jewelry inmediating long-distance relationships.

Journal article

Dacres S, Haddadi H, Purver M, Topic and Sentiment Analysis on OSNs: a Case Study of Advertising Strategies on Twitter

Social media have substantially altered the way brands and businessesadvertise: Online Social Networks provide brands with more versatile anddynamic channels for advertisement than traditional media (e.g., TV and radio).Levels of engagement in such media are usually measured in terms of contentadoption (e.g., likes and retweets) and sentiment, around a given topic.However, sentiment analysis and topic identification are both non-trivialtasks. In this paper, using data collected from Twitter as a case study, we analyzehow engagement and sentiment in promoted content spread over a 10-day period.We find that promoted tweets lead to higher positive sentiment than promotedtrends; although promoted trends pay off in response volume. We observe thatlevels of engagement for the brand and promoted content are highest on thefirst day of the campaign, and fall considerably thereafter. However, we showthat these insights depend on the use of robust machine learning and naturallanguage processing techniques to gather focused, relevant datasets, and toaccurately gauge sentiment, rather than relying on the simple keyword- orfrequency-based metrics sometimes used in social media research.

Journal article

Haddadi H, Smaragdakis G, Ramakrishnan KK, Opportunities in a Federated Cloud Marketplace

Recent measurement studies show that there are massively distributed hostingand computing infrastructures deployed in the Internet. Such infrastructuresinclude large data centers and organizations' computing clusters. When idle,these resources can readily serve local users. Such users can be smartphone ortablet users wishing to access services such as remote desktop or CPU/bandwidthintensive activities. Particularly, when they are likely to have high latencyto access, or may have no access at all to, centralized cloud providers. Today,however, there is no global marketplace where sellers and buyers of availableresources can trade. The recently introduced marketplaces of Amazon and othercloud infrastructures are limited by the network footprint of their owninfrastructures and availability of such services in the target country andregion. In this article we discuss the potentials for a federated cloudmarketplace where sellers and buyers of a number of resources, includingstorage, computing, and network bandwidth, can freely trade. This ecosystem canbe regulated through brokers who act as service level monitors and auctioneers.We conclude by discussing the challenges and opportunities in this space.

Journal article

Haris M, Haddadi H, Hui P, Privacy Leakage in Mobile Computing: Tools, Methods, and Characteristics

The number of smartphones, tablets, sensors, and connected wearable devicesare rapidly increasing. Today, in many parts of the globe, the penetration ofmobile computers has overtaken the number of traditional personal computers.This trend and the always-on nature of these devices have resulted inincreasing concerns over the intrusive nature of these devices and the privacyrisks that they impose on users or those associated with them. In this paper,we survey the current state of the art on mobile computing research, focusingon privacy risks and data leakage effects. We then discuss a number of methods,recommendations, and ongoing research in limiting the privacy leakages andassociated risks by mobile computing.

Journal article

Mejova Y, Haddadi H, Noulas A, Weber Iet al., #FoodPorn: Obesity Patterns in Culinary Interactions

We present a large-scale analysis of Instagram pictures taken at 164,753restaurants by millions of users. Motivated by the obesity epidemic in theUnited States, our aim is three-fold: (i) to assess the relationship betweenfast food and chain restaurants and obesity, (ii) to better understand people'sthoughts on and perceptions of their daily dining experiences, and (iii) toreveal the nature of social reinforcement and approval in the context ofdietary health on social media. When we correlate the prominence of fast foodrestaurants in US counties with obesity, we find the Foursquare data to show agreater correlation at 0.424 than official survey data from the County HealthRankings would show. Our analysis further reveals a relationship between smallbusinesses and local foods with better dietary health, with such restaurantsgetting more attention in areas of lower obesity. However, even in such areas,social approval favors the unhealthy foods high in sugar, with donut shopsproducing the most liked photos. Thus, the dietary landscape our study revealsis a complex ecosystem, with fast food playing a role alongside socialinteractions and personal perceptions, which often may be at odds.

Journal article

Falahrastegar M, Haddadi H, Uhlig S, Mortier Ret al., Anatomy of the Third-Party Web Tracking Ecosystem

The presence of third-party tracking on websites has become customary.However, our understanding of the third-party ecosystem is still veryrudimentary. We examine third-party trackers from a geographical perspective,observing the third-party tracking ecosystem from 29 countries across theglobe. When examining the data by region (North America, South America, Europe,East Asia, Middle East, and Oceania), we observe significant geographicalvariation between regions and countries within regions. We find trackers thatfocus on specific regions and countries, and some that are hosted in countriesoutside their expected target tracking domain. Given the differences inregulatory regimes between jurisdictions, we believe this analysis sheds lighton the geographical properties of this ecosystem and on the problems that thesemay pose to our ability to track and manage the different data silos that nowstore personal data about us all.

Journal article

Hänsel K, Wilde N, Haddadi H, Alomainy Aet al., Wearable Computing for Health and Fitness: Exploring the Relationship between Data and Human Behaviour

Health and fitness wearable technology has recently advanced, making iteasier for an individual to monitor their behaviours. Previously self generateddata interacts with the user to motivate positive behaviour change, but issuesarise when relating this to long term mention of wearable devices. Previousstudies within this area are discussed. We also consider a new approach wheredata is used to support instead of motivate, through monitoring and logging toencourage reflection. Based on issues highlighted, we then make recommendationson the direction in which future work could be most beneficial.

Journal article

Mejova Y, Abbar S, Haddadi H, Fetishizing Food in Digital Age: #foodporn Around the World

What food is so good as to be considered pornographic? Worldwide, the popular#foodporn hashtag has been used to share appetizing pictures of peoples'favorite culinary experiences. But social scientists ask whether #foodpornpromotes an unhealthy relationship with food, as pornography would contributeto an unrealistic view of sexuality. In this study, we examine nearly 10million Instagram posts by 1.7 million users worldwide. An overwhelming (anduniform across the nations) obsession with chocolate and cake shows thedomination of sugary dessert over local cuisines. Yet, we find encouragingtraits in the association of emotion and health-related topics with #foodporn,suggesting food can serve as motivation for a healthy lifestyle. Socialapproval also favors the healthy posts, with users posting with healthyhashtags having an average of 1,000 more followers than those with unhealthyones. Finally, we perform a demographic analysis which shows nation-wide trendsof behavior, such as a strong relationship (r=0.51) between the GDP per capitaand the attention to healthiness of their favorite food. Our results expose anew facet of food "pornography", revealing potential avenues for utilizing thisprecarious notion for promoting healthy lifestyles.

Journal article

Clegg RG, Haddadi H, Landa R, Rio Met al., Towards Informative Statistical Flow Inversion

A problem which has recently attracted research attention is that ofestimating the distribution of flow sizes in internet traffic. On high trafficlinks it is sometimes impossible to record every packet. Researchers haveapproached the problem of estimating flow lengths from sampled packet data intwo separate ways. Firstly, different sampling methodologies can be tried tomore accurately measure the desired system parameters. One such method is thesample-and-hold method where, if a packet is sampled, all subsequent packets inthat flow are sampled. Secondly, statistical methods can be used to ``invert''the sampled data and produce an estimate of flow lengths from a sample. In this paper we propose, implement and test two variants on thesample-and-hold method. In addition we show how the sample-and-hold method canbe inverted to get an estimation of the genuine distribution of flow sizes.Experiments are carried out on real network traces to compare standard packetsampling with three variants of sample-and-hold. The methods are compared fortheir ability to reconstruct the genuine distribution of flow sizes in thetraffic.

Journal article

This data is extracted from the Web of Science and reproduced under a licence from Thomson Reuters. You may not copy or re-distribute this data in whole or in part without the written consent of the Science business of Thomson Reuters.

Request URL: http://wlsprd.imperial.ac.uk:80/respub/WEB-INF/jsp/search-html.jsp Request URI: /respub/WEB-INF/jsp/search-html.jsp Query String: id=00964123&limit=30&person=true&page=2&respub-action=search.html