Default Cover Image

2015 IEEE Conference on Collaboration and Internet Computing (CIC)

Oct. 27 2015 to Oct. 30 2015

Hangzhou, China

Table of Contents

[Title page i]Freely available from IEEE.pp. i-i
[Title page iii]Freely available from IEEE.pp. iii-iii
[Copyright notice]Freely available from IEEE.pp. iv-iv
Table of contentsFreely available from IEEE.pp. v-ix
Message from General ChairsFreely available from IEEE.pp. x-xi
Message from Program ChairsFreely available from IEEE.pp. xii-xiii
Conference OrganizationFreely available from IEEE.pp. xiv-xiv
Program CommitteeFreely available from IEEE.pp. xv-xvi
ReviewersFreely available from IEEE.pp. xvii-xvii
Steering CommitteeFreely available from IEEE.pp. xviii-xviii
KeynotesFull-text access may be available. Sign in or learn about subscription options.pp. xix-xxiii
Towards a Model-Defined Cloud-of-CloudsFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
CoShare: A Cost-Effective Data Sharing System for Data Center NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 11-18
Incremental Partitioning of Large Time-Evolving GraphsFull-text access may be available. Sign in or learn about subscription options.pp. 19-27
AR-ABAC: A New Attribute Based Access Control Model Supporting Attribute-Rules for Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 28-35
CARDS - Collaborative Audit and Report Data Sharing for A-Posteriori Access Control in DOSNsFull-text access may be available. Sign in or learn about subscription options.pp. 36-45
Community-Based Secure Information and Resource Sharing in AWS Public CloudFull-text access may be available. Sign in or learn about subscription options.pp. 46-53
Exploring Emotions in Social MediaFull-text access may be available. Sign in or learn about subscription options.pp. 54-61
Public Information Sharing Behaviors Analysis over Different Social MediaFull-text access may be available. Sign in or learn about subscription options.pp. 62-69
Jointly Learning Sentiment, Keyword and Opinion Leader in Social ReviewsFull-text access may be available. Sign in or learn about subscription options.pp. 70-79
Privacy-Preserving and Outsourced Multi-user K-Means ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 80-89
Playing the Odds: Decision Support and Risk Assessment in an Elastic FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 99-105
Collaborative Vehicle Routing and Scheduling with Cross-Docks under UncertaintyFull-text access may be available. Sign in or learn about subscription options.pp. 106-112
Genetic Algorithm Based QoS-aware Service Composition in Multi-cloudFull-text access may be available. Sign in or learn about subscription options.pp. 113-118
Collaboration & Mobile Cloud-Computing: Using CoAP to Enable Resource-Sharing between Clouds of Mobile DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 119-124
BF-MapReduce: A Bloom Filter Based Efficient Lightweight SearchFull-text access may be available. Sign in or learn about subscription options.pp. 125-129
WACCO and LOKO: Strong Consistency at Global ScaleFull-text access may be available. Sign in or learn about subscription options.pp. 130-141
Discovery-Driven Service Oriented IoT ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 142-149
Analyzing Reliability in Hybrid Compute UnitsFull-text access may be available. Sign in or learn about subscription options.pp. 150-159
UI Ripping in Android: Reverse Engineering of Graphical User Interfaces and its ApplicationFull-text access may be available. Sign in or learn about subscription options.pp. 160-167
An Efficient and Secure RFID Batch Authentication Protocol with Group Tags Ownership TransferFull-text access may be available. Sign in or learn about subscription options.pp. 168-175
iSeeker: Towards an Engine for Processing Aggregated Search on Linked DataFull-text access may be available. Sign in or learn about subscription options.pp. 184-191
The Dynamics of Vehicular Networks in Large-Scale Urban EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 192-199
A Bidirectional Broadcasting Authentication Scheme for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 200-204
Evolution of Mixed Strategies on Cooperative NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 205-209
A Workload-Based Approach to Partition the Volunteer CloudFull-text access may be available. Sign in or learn about subscription options.pp. 210-218
Scheduling Budget Constrained Cloud Workflows with Particle Swarm OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 219-226
WACO: Workload Aware Column Order for Scan Operator in Wide TableFull-text access may be available. Sign in or learn about subscription options.pp. 227-234
Carriers Selection for Content Dissemination in Social Opportunistic NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 235-243
Icebreaker: A Platform for Service Dependency DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 244-251
Entropy-Based Service Selection with Uncertain QoS for Mobile Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 252-259
A Collaborative Spectrum-Sharing Framework for LTE VirtualizationFull-text access may be available. Sign in or learn about subscription options.pp. 260-269
Self-Adaptive Extracting Academic Entities from World Wide WebFull-text access may be available. Sign in or learn about subscription options.pp. 270-277
Hike: A High Performance kNN Query Processing System for Multimedia DataFull-text access may be available. Sign in or learn about subscription options.pp. 296-303
Author indexFreely available from IEEE.pp. 304-305
[Publisher's information]Freely available from IEEE.pp. 306-306
Showing 51 out of 51