default search action
9th CollaborateCom 2013: Austin, TX, USA
- Elisa Bertino, Dimitrios Georgakopoulos, Mudhakar Srivatsa, Surya Nepal, Alessandro Vinciarelli:
9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, Austin, TX, USA, October 20-23, 2013. ICST / IEEE 2013, ISBN 978-1-936968-92-3 - Elisa Bertino, Dimitrios Georgakopoulos:
Preface.
Security
- De Wang, Danesh Irani, Calton Pu:
A study on evolution of email spam over fifteen years. 1-10 - Justin Paglierani, Mike Mabey, Gail-Joon Ahn:
Towards comprehensive and collaborative forensics on email evidence. 11-20 - Chun-Jen Chung, Jingsong Cui, Pankaj Khatkar, Dijiang Huang:
Non-intrusive process-based monitoring system to mitigate and prevent VM vulnerability explorations. 21-30 - Ying Fairweather, Dongwan Shin:
Towards multi-policy support for IaaS clouds to secure data sharing. 31-39
collaborative Work
- Rui-ping Lua, Wee Keong Ng:
Autonomic swarms for regenerative and collaborative networking. 40-49 - Luc André, Stéphane Martin, Gérald Oster, Claudia-Lavinia Ignat:
Supporting adaptable granularity of changes for massive-scale collaborative editing. 50-59 - Stefan Schönig, Michael Zeising, Stefan Jablonski:
Supporting collaborative work by learning process models and patterns from cases. 60-69 - Luis G. Montané-Jiménez, Edgard Benítez-Guerrero, Carmen Mezura-Godoy:
A context-aware architecture for improving collaboration of users in Groupware systems. 70-76
Big Data
- Prem Prakash Jayaraman, Charith Perera, Dimitrios Georgakopoulos, Arkady B. Zaslavsky:
Efficient opportunistic sensing using mobile collaborative platform MOSDEN. 77-86 - Agustin Sancen-Plaza, Andres Mendez-Vazquez:
Influence maximization for Big Data through entropy ranking and min-cut. 87-95 - Wenwey Hseush, Yi-Cheng Huang, Shih-Chang Hsu, Calton Pu:
Real-time collaborative planning with big data: Technical challenges and in-place computing (invited paper). 96-104 - Thuy Ngoc Nguyen, An Te Nguyen:
Towards context-aware recommendations: Strategies for exploiting multi-criteria communities. 105-114 - Lakshmish Ramaswamy, Raga Sowmya Tummalapenta, Kang Li, Calton Pu:
A content-context-centric approach for detecting vandalism in Wikipedia. 115-122
distributed Systems
- Chi Wu-Lee, Gwan-Hwan Hwang:
Workflow definition by cloud collaboration. 123-132 - David Knuplesch, Manfred Reichert, Rüdiger Pryss, Walid Fdhila, Stefanie Rinderle-Ma:
Ensuring compliance of distributed and collaborative workflows. 133-142 - Mounira Msahli, Ahmed Serhrouchni:
SBaaS: Safe Box as a service. 143-147 - Mehdi Ahmed-Nacer, Pascal Urso, Valter Balegas, Nuno M. Preguiça:
Concurrency control and awareness support for multi-synchronous collaborative editing. 148-157 - Ahmed Khalifa, Mohamed Eltoweissy:
MobiCloud: A reliable collaborative mobilecloud management system. 158-167
Mobile Collaboration
- Huijun Wu, Dijiang Huang, Samia Bouzefrane:
Making offloading decisions resistant to network unavailability for mobile cloud collaboration. 168-177 - Rüdiger Pryss, Steffen Musiol, Manfred Reichert:
Collaboration support through mobile processes and entailment constraints. 178-187 - Jan Gäbler, Ronny Klauck, Mario Pink, Hartmut König:
uBeeMe - A platform to enable mobile collaborative applications. 188-196 - Lutful Karim, Qusay H. Mahmoud:
A hybrid mobility model based on social, cultural and language diversity. 197-204 - Hsin-Yu Ha, Fausto C. Fleites, Shu-Ching Chen:
Building multi-model collaboration in detecting multimedia semantic concepts (invited paper). 205-212
Social Network
- Jundong Chen, Matthias R. Brust, Ankunda R. Kiremire, Vir V. Phoha:
Modeling privacy settings of an online social network from a game-theoretical perspective. 213-220 - Changhyeon Lee, Fathoni Arief Musyaffa, Yong-Moo Kwon:
Web based collaborative social album authoring system using Facebook photos. 221-230 - Qingbo Hu, Guan Wang, Shuyang Lin, Philip S. Yu:
Silence behavior mining on online social networks. 231-240 - Amerah Alabrah, Mostafa A. Bassiouni:
Robust and fast authentication of session cookies in collaborative and social media using position-indexed hashing. 241-249 - De Wang, Shamkant B. Navathe, Ling Liu, Danesh Irani, Acar Tamersoy, Calton Pu:
Click traffic analysis of short URL spam on Twitter. 250-259
Privacy and Trust
- Anna Cinzia Squicciarini, Barbara Carminati, Sushama Karumanchi:
Privacy aware service selection of composite web services invited paper. 260-268 - Amira Bradai, Walid Ben-Ameur, Hossam Afifi:
Byzantine resistant reputation-based trust management. 269-278 - Hachem Guerid, Karel Mittig, Ahmed Serhrouchni:
Collaborative approach for inter-domain botnet detection in large-scale networks. 279-288 - S. Ananda Kanagaraj, G. Arjun, A. Shahina:
Cheeka: A mobile application for personal safety. 289-294 - Kundan Singh, Venkatesh Krishnaswamy:
Private overlay of enterprise social data and interactions in the public web context. 295-304
Team Collaboration
- Delfina Malandrino, Ilaria Manno, Alberto Negro, Andrea Petta, Vittorio Scarano, Luigi Serra:
Social team awareness. 305-314 - Marco Biazzini, Patricia Serrano-Alvarado, Raziel Carvajal-Gomez:
Towards improving user satisfaction in decentralized P2P networks. 315-324 - Kevin Dullemond, Rini van Solingen:
Increasing awareness in distributed software teams: A first evaluation. 325-334 - Petru Nicolaescu, Michael Derntl, Ralf Klamma:
Browser-based collaborative modeling in near real-time. 335-344 - Pallabi Parveen, Pratik Desai, Bhavani Thuraisingham, Latifur Khan:
MapReduce-guided scalable compressed dictionary construction for evolving repetitive sequence streams. 345-352
Virtual Collaboration
- Ingo Zinnikus, Xiaoqi Cao, Matthias Klusch, Christopher Krauss, Andreas Nonnengart, Torsten Spieldenner, Philipp Slusallek:
A collaborative virtual workspace for factory configuration and evaluation. 353-362 - Aida Erfanian, Tao Zeng, Yaoping Hu:
Dynamic strategies of conflict resolution on human perception of equality within multi-user collaborative virtual environments. 363-370 - Ian Brooks, Kathy M. Swigger:
Leadership's effect on overall temporal patterns of global virtual teams. 371-379 - Joon-Suk Lee, Deborah G. Tatar:
Impact of mediating technologies on talk and emotion: Questioning "commonsense". 380-389 - Mehdi Ahmed-Nacer, Pascal Urso, François Charoy:
Improving textual merge result. 390-399
Recommendadtion Systems
- Shivangi Agarwal, Krishna Kishore Dhara, Venkatesh Krishnaswamy:
Profile sharing recommendation system for enterprise collaboration. 400-408 - Xuelian Long, Lei Jin, James Joshi:
Understanding venue popularity in Foursquare. 409-418 - Surya Nepal, Cécile Paris, Payam Aghaei Pour, Sanat Kumar Bista, Jill Freyne:
A social trust based friend recommender for online communities "invited paper". 419-428 - Umair ul Hassan, Edward Curry:
A capability requirements approach for predicting worker performance in crowdsourcing. 429-437 - Karim Benouaret, Raman Valliyur-Ramalingam, François Charoy:
Answering complex location-based queries with crowdsourcing. 438-447
Web Data Management
- Kirill Belyaev, Indrakshi Ray, Indrajit Ray, Gary Luckasen:
Personal health record storage on privacy preserving green clouds. 448-457 - Surya Nepal, Julian Jang-Jaccard, Branko G. Celler, Bo Yan, Leila Alem:
Data architecture for telehealth services research: A case study of home tele-monitoring. 458-467 - István Koren, Andreas Guth, Ralf Klamma:
Shared editing on the web: A classification of developer support libraries. 468-477 - Sisi Lu, Ye Ye, Rich Tsui, Howard Su, Ruhsary Rexit, Sahawut Wesaratchakit, Xiaochu Liu, Rebecca Hwa:
Domain ontology-based feature reduction for high dimensional drug data and its application to 30-day heart failure readmission prediction. 478-484
Context Awareness and Awareness Support
- Hilda Tellioglu, Simon Diesenreiter:
Enterprise 2.0 in action: Potentials for improvement of awareness support in enterprises. 485-494 - Ben van Gameren, Rini van Solingen:
When to interrupt global software engineers to provide them with what information? 495-504 - Samudrala Nagaraju, B. M. Manjushree:
DynaSurface: A framework for device notifications using nano coatings in connected devices. 505-514 - Mateusz Dolata, Nils Jeners, Wolfgang Prinz:
How to tag it right?: Semi-automatic support for email management. 515-524
TrustCol Workshop
- Carlos E. Rubio-Medrano, Clinton D'Souza, Gail-Joon Ahn:
Supporting secure collaborations with attribute-based access control. 525-530 - Balkis Hamdane, Mounira Msahli, Ahmed Serhrouchni, Sihem Guemara El Fatmi:
Data-based access control in named data networking. 531-536 - Huseyin Ulusoy, Murat Kantarcioglu, Bhavani Thuraisingham, Ebru Celikel Cankaya, Erman Pattuk:
Analysis of heuristic based access pattern obfuscation. 537-544 - Fadi Mohsen, Mohamed Shehab:
Android keylogging threat. 545-552 - Julian Jang-Jaccard, Jane Li, Surya Nepal, Leila Alem:
Security analysis of mobile applications: A case study of a collaboration tool in healthcare. 553-562 - John Dwyer, Traian Marius Truta:
Finding anomalies in windows event logs using standard deviation. 563-570 - Bård Fjukstad, John Markus Bjørndalen, Otto J. Anshus:
Accurate weather forecasting through locality based collaborative computing. 571-578
C-IOT Workshop
- Eric G. Stephan, Todd Elsethagen, Adam S. Wynne, Chitra Sivaraman, Matthew C. Macduff, Larry K. Berg, Will J. Shaw:
A linked fusion of things, services, and data to support a collaborative data management facility. 579-584 - Arjun P. Athreya, Bruce DeBruhl, Patrick Tague:
Designing for self-configuration and self-adaptation in the Internet of Things. 585-592 - Umair ul Hassan, Murilo Bassora, Ali Hosseinzadeh Vahid, Seán O'Riain, Edward Curry:
A collaborative approach for metadata management for Internet of Things: Linking micro tasks with physical objects. 593-598 - Clinton Walker, Qijun Gu, Terry Penner:
Computation integrity in mobile cloud: Running probabilistically checkable proof on Android. 599-602 - Rodion M. Podorozhny:
Design and verification of cellphone-based cyber-physical systems: A position paper. 603-607 - Edewede Oriwoh, David Jazani, Gregory Epiphaniou, Paul Sant:
Internet of Things Forensics: Challenges and approaches. 608-615 - Dylan Hicks, Kevin Mannix, Hannah M. Bowles, Byron J. Gao:
SmartMart: IoT-based In-store mapping for mobile devices. 616-621 - Kelly T. Slaughter, Gurshaman Baweja:
Organizations preparing organizations for the IoT: The congruence of the IoT meme. 622-625
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.