Default Cover Image

2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2009)

Nov. 11 2009 to Nov. 14 2009

Washington, DC

Table of Contents

Steering CommitteeFreely available from IEEE.pp. 1-2
Tutorials [2 abstracts]Full-text access may be available. Sign in or learn about subscription options.pp. 1-2
Supporting collaborative work through flexible Process ExecutionFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Dynamic data servicesFull-text access may be available. Sign in or learn about subscription options.
Integrating external user profiles in collaboration applicationsFull-text access may be available. Sign in or learn about subscription options.
Session 2: Distributed systemsFreely available from IEEE.
Pedestrian network data collection through location-based social networksFull-text access may be available. Sign in or learn about subscription options.
ABTS: A transformation-based consistency control algorithm for wide-area collaborative applicationsFull-text access may be available. Sign in or learn about subscription options.
Artefact-Actor-Networks as tie between social networks and artefact networksFull-text access may be available. Sign in or learn about subscription options.
Session 3: Machine learningFreely available from IEEE.
CASTLE: A social framework for collaborative anti-phishing databasesFull-text access may be available. Sign in or learn about subscription options.
VisGBT: Visually analyzing evolving datasets for adaptive learningFull-text access may be available. Sign in or learn about subscription options.
Bio-inspired true coalition formation on intrusion detection by mobile robotsFull-text access may be available. Sign in or learn about subscription options.
Session 4: Application trackFreely available from IEEE.
A tabletop groupware system for computer-based music compositionFull-text access may be available. Sign in or learn about subscription options.
Online detection of web choreography misusesFull-text access may be available. Sign in or learn about subscription options.
Portal modules for Groupware systemsFull-text access may be available. Sign in or learn about subscription options.
User contribution and trust in WikipediaFull-text access may be available. Sign in or learn about subscription options.
Collaborative process modeling and reuse evaluationFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Building a stateful reference monitor with coloured petri netsFull-text access may be available. Sign in or learn about subscription options.
An analytical study of GWAP-based geospatial tagging systemsFull-text access may be available. Sign in or learn about subscription options.
Session 6: Wireless sensor networkFreely available from IEEE.
Square region-based coverage and connectivity probability model in wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.
A novel forwarding/dropping decision engine for wireless multi-hop ad-hoc networksFull-text access may be available. Sign in or learn about subscription options.
Session 7: P2PFreely available from IEEE.
Still alive: Extending keep-alive intervals in P2P overlay networksFull-text access may be available. Sign in or learn about subscription options.
A scale-free and self-organized P2P overlay for massive multiuser virtual environmentsFull-text access may be available. Sign in or learn about subscription options.
DDT: A distributed data structure for the support of P2P range queryFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Session 8: WebFreely available from IEEE.
Exploiting tags for concept extraction and information integrationFull-text access may be available. Sign in or learn about subscription options.
R4: Towards a holistic framework for designing and developing Social Web ApplicationsFull-text access may be available. Sign in or learn about subscription options.
Toward synchronization between decentralized orchestrations of composite web servicesFull-text access may be available. Sign in or learn about subscription options.
Session 9: SecurityFreely available from IEEE.
Aggregating uncertain access risk estimations from different sources invited paperFull-text access may be available. Sign in or learn about subscription options.
Towards a framework for group-centric secure collaborationFull-text access may be available. Sign in or learn about subscription options.
Enhanced security management for flexible and dynamic cooperative environmentsFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
VPAF: a flexible framework for establishing and monitoring prolonged authorization relationshipsFull-text access may be available. Sign in or learn about subscription options.
The PEI framework for application-centric securityFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Session 10: Distributed systems (2)Freely available from IEEE.
A decentralized mechanism for application level monitoring of distributed systemsFull-text access may be available. Sign in or learn about subscription options.
Improvement of HRV methodology for positive/negative emotion assessmentFull-text access may be available. Sign in or learn about subscription options.
DiSK: A distributed shared disk cache for HPC environmentsFull-text access may be available. Sign in or learn about subscription options.
Experiments in distributed side-by-side software developmentFull-text access may be available. Sign in or learn about subscription options.
Collaborative filtering via epidemic aggregation in distributed virtual environmentsFull-text access may be available. Sign in or learn about subscription options.
Comparing visualization techniques to structure collaborative conceptsFull-text access may be available. Sign in or learn about subscription options.
VaaS: Videoconference as a serviceFull-text access may be available. Sign in or learn about subscription options.pp. 1-11
GColl group-to-group videoconferencing system: design and first experiencesFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Session 12: Trust & dependable systemsFreely available from IEEE.
A policy management framework for trusted crossdomain collaborationFull-text access may be available. Sign in or learn about subscription options.
Learning communities supported by autonomic recommendation mechanismFull-text access may be available. Sign in or learn about subscription options.
Information retrieval on mind maps - what could it be good for?Full-text access may be available. Sign in or learn about subscription options.pp. 1-4
Flexible failure handling for cooperative processes in distributed systemsFull-text access may be available. Sign in or learn about subscription options.
Towards automatic recommendation of friend listsFull-text access may be available. Sign in or learn about subscription options.
A usage control policy specification with Petri netsFull-text access may be available. Sign in or learn about subscription options.
In-depth analysis of IPv6 security postureFull-text access may be available. Sign in or learn about subscription options.
Automatic policy conflict analysis for cross-domain collaborations using semantic temporal logicFull-text access may be available. Sign in or learn about subscription options.
Trusted computing - opportunities & risksFull-text access may be available. Sign in or learn about subscription options.
No hotel in D.C.Full-text access may be available. Sign in or learn about subscription options.
Status messages for the right audience with an ontology-based approachFull-text access may be available. Sign in or learn about subscription options.
The Quality Social Network: A collaborative environment for personalizing Web accessFull-text access may be available. Sign in or learn about subscription options.
SECUND: A protocol for SECUre neighborhooD creation in wireless ad hoc networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Showing 85 out of 85