Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
COLLABORATECOM
COLLABORATECOM 2009
Generate Citations
2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2009)
Nov. 11 2009 to Nov. 14 2009
Washington, DC
Table of Contents
Steering Committee
Freely available from IEEE.
pp. 1-2
Tutorials [2 abstracts]
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Murat Kantarcioglu
,
Alexandre Passant
Session 1: Communications / collaboration
Freely available from IEEE.
Multi-user multi-account interaction in groupware supporting single-display collaboration
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Bastian Steinert
,
Michael Grünewald
,
Stefan Richter
,
Jens Lincke
,
Robert Hirschfeld
Supporting collaborative work through flexible Process Execution
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Stefan Jablonski
,
Michael Igler
,
Christoph Günther
Dynamic data services
Full-text access may be available. Sign in or learn about subscription options.
by
Ruhollah Farchtchi
Integrating external user profiles in collaboration applications
Full-text access may be available. Sign in or learn about subscription options.
by
George Mathew
Session 2: Distributed systems
Freely available from IEEE.
Pedestrian network data collection through location-based social networks
Full-text access may be available. Sign in or learn about subscription options.
by
Piyawan Kasemsuppakorn
,
Hassan A. Karimi
ABTS: A transformation-based consistency control algorithm for wide-area collaborative applications
Full-text access may be available. Sign in or learn about subscription options.
by
Bin Shao
,
Du Li
,
Ning Gu
A collaborative framework for enforcing server commitments, and for regulating server interactive behavior in SOA-based systems
Full-text access may be available. Sign in or learn about subscription options.
by
Tin Lam
,
Naftaly Minsky
Artefact-Actor-Networks as tie between social networks and artefact networks
Full-text access may be available. Sign in or learn about subscription options.
by
Wolfgang Reinhardt
,
Matthias Moi
,
Tobias Varlemann
Economics of network sharing - A case study of mobile telecom sector in Pakistan
Full-text access may be available. Sign in or learn about subscription options.
by
Muhammad A Choudhary
,
Hasnat Babar
,
Hassan Shakeel
,
Aisha Abbas
Session 3: Machine learning
Freely available from IEEE.
CASTLE: A social framework for collaborative anti-phishing databases
Full-text access may be available. Sign in or learn about subscription options.
by
Arash Nourian
,
Sameer Ishtiaq
,
Muthucumaru Maheswaran
VisGBT: Visually analyzing evolving datasets for adaptive learning
Full-text access may be available. Sign in or learn about subscription options.
by
Keke Chen
,
Fengguang Tian
Bio-inspired true coalition formation on intrusion detection by mobile robots
Full-text access may be available. Sign in or learn about subscription options.
by
Xiannuan Liang
,
Yang Xiao
Session 4: Application track
Freely available from IEEE.
An IT appliance for remote collaborative review of mechanisms of injury to children in motor vehicle crashes
Full-text access may be available. Sign in or learn about subscription options.
by
M. Kumar
,
R. Newman
,
J. Fortes
,
D. Durbin
,
F. Winston
A tabletop groupware system for computer-based music composition
Full-text access may be available. Sign in or learn about subscription options.
by
Mauro C. Pichiliani
,
Celso M. Hirata
Online detection of web choreography misuses
Full-text access may be available. Sign in or learn about subscription options.
by
Murat Gunestas
,
Duminda Wijesekera
Portal modules for Groupware systems
Full-text access may be available. Sign in or learn about subscription options.
by
Nils Jeners
,
Steffen Budweg
,
Wolfgang Prinz
User contribution and trust in Wikipedia
Full-text access may be available. Sign in or learn about subscription options.
by
Sara Javanmardi
,
Yasser Ganjisaffar
,
Cristina Lopes
,
Pierre Baldi
Session 5: Software development and application
Freely available from IEEE.
JTangSynergy 3.0: A framework and software tool for integrating cross-organizational applications
Full-text access may be available. Sign in or learn about subscription options.
by
Hanwei Chen
,
Jianwei Yin
,
Haifeng Liu
,
Calton Pu
A new perspective on experimental analysis of N-tier systems: Evaluating database scalability, multi-bottlenecks, and economical operation
Full-text access may be available. Sign in or learn about subscription options.
by
Simon Malkowski
,
Markus Hedwig
,
Deepal Jayasinghe
,
Junhee Park
,
Yasuhiko Kanemasa
,
Calton Pu
Collaborative process modeling and reuse evaluation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Luiz F. C. Tomaz
,
José A. Rodrigues Nt
,
Geraldo B. Xexéo
,
Jano M. Souza
Building a stateful reference monitor with coloured petri nets
Full-text access may be available. Sign in or learn about subscription options.
by
Basel Katt
,
Michael Hafner
,
Xinwen Zhang
An analytical study of GWAP-based geospatial tagging systems
Full-text access may be available. Sign in or learn about subscription options.
by
Ling-Jyh Chen
,
Yu-Song Syu
,
Bo-Chun Wang
,
Wang-Chien Lee
Unified analytical models for Location Management costs and optimum design of location areas
Full-text access may be available. Sign in or learn about subscription options.
by
Eladio Martin
,
Ling Liu
,
Matt Weber
,
Peter Pesti
,
M. Woodward
Session 6: Wireless sensor network
Freely available from IEEE.
Square region-based coverage and connectivity probability model in wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
by
Xiaofei Xing
,
Guojun Wang
,
Jie Wu
,
Jie Li
Efficient dissemination of personalized video content in resource-constrained environments
Full-text access may be available. Sign in or learn about subscription options.
by
Piyush Parate
,
Lakshmish Ramaswamy
,
Suchendra Bhandarkar
,
Siddhartha Chattopadhyay
,
Hari Devulapally
Performance comparison of MQAM OFDM based WLAN System in presence of bluetooth interference with AWGN and rayleigh fading channel
Full-text access may be available. Sign in or learn about subscription options.
by
Minakshmi Roy
,
H.S. Jamadagni
A novel forwarding/dropping decision engine for wireless multi-hop ad-hoc networks
Full-text access may be available. Sign in or learn about subscription options.
by
A. M. AbdelRahman
,
M. Abou El-Nasr
,
Ossama Ismail
Session 7: P2P
Freely available from IEEE.
Protocol overhead versus router processing and memory tradeoffs in evaluating BGP inbound soft reset mechanisms for tactical IP networks
Full-text access may be available. Sign in or learn about subscription options.
by
Isil Sebuktekin
,
John Haluska
,
Pete Moyer
,
Kevin Adams
Still alive: Extending keep-alive intervals in P2P overlay networks
Full-text access may be available. Sign in or learn about subscription options.
by
Richard Price
,
Peter Tino
A scale-free and self-organized P2P overlay for massive multiuser virtual environments
Full-text access may be available. Sign in or learn about subscription options.
by
Markus Esch
,
Ingo Scholtes
Integrating P2PSIP into collaborative P2P applications: A case study with the P2P videoconferencing system BRAVIS
Full-text access may be available. Sign in or learn about subscription options.
by
Ronny Klauck
,
Michael Kirsche
DDT: A distributed data structure for the support of P2P range query
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Davide Carfí
,
Massimo Coppola
,
Domenico Laforenza
,
Laura Ricci
Session 8: Web
Freely available from IEEE.
SemSLATES: Improving enterprise 2.0 information systems using semantic Web technologies
Full-text access may be available. Sign in or learn about subscription options.
by
Alexandre Passant
,
Philippe Laublet
,
John G. Breslin
,
Stefan Decker
Exploiting tags for concept extraction and information integration
Full-text access may be available. Sign in or learn about subscription options.
by
Martha L. Escobar-Molano
,
Antonio Badia
,
Rafael Alonso
R4: Towards a holistic framework for designing and developing Social Web Applications
Full-text access may be available. Sign in or learn about subscription options.
by
Sungwon Peter Choe
,
Junehwa Song
Toward synchronization between decentralized orchestrations of composite web services
Full-text access may be available. Sign in or learn about subscription options.
by
Walid Fdhila
,
Claude Godart
Formal verification of mediatedweb service interactions considering client's expected behaviours
Full-text access may be available. Sign in or learn about subscription options.
by
Zhangbing Zhou
,
Sami Bhiri
,
Lei Shu
,
Manfred Hauswirth
Session 9: Security
Freely available from IEEE.
Aggregating uncertain access risk estimations from different sources invited paper
Full-text access may be available. Sign in or learn about subscription options.
by
Qun Ni
,
Elisa Bertino
Towards automatic privacy management in Web 2.0 with semantic analysis on annotations
Full-text access may be available. Sign in or learn about subscription options.
by
Nitya Vyas
,
Anna C. Squicciarini
,
Chih-Cheng Chang
,
Danfeng Yao
Towards a framework for group-centric secure collaboration
Full-text access may be available. Sign in or learn about subscription options.
by
Ram Krishnan
,
Ravi Sandhu
,
Jianwei Niu
,
William Winsborough
Enhanced security management for flexible and dynamic cooperative environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Jonas Schulte
,
Ingo Döpke
,
Reinhard Keil
,
Konrad Stark
,
Johann Eder
VPAF: a flexible framework for establishing and monitoring prolonged authorization relationships
Full-text access may be available. Sign in or learn about subscription options.
by
Eric Freudenthal
,
Bivas Das
The PEI framework for application-centric security
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Ravi Sandhu
Session 10: Distributed systems (2)
Freely available from IEEE.
A decentralized mechanism for application level monitoring of distributed systems
Full-text access may be available. Sign in or learn about subscription options.
by
Constantin Serban
,
Wenxuan Zhang
,
Naftaly Minsky
Improvement of HRV methodology for positive/negative emotion assessment
Full-text access may be available. Sign in or learn about subscription options.
by
Wanqing Wu
,
Jungtae Lee
DiSK: A distributed shared disk cache for HPC environments
Full-text access may be available. Sign in or learn about subscription options.
by
Brandon Szeliga
,
Tung Nguyen
,
Weisong Shi
Experiments in distributed side-by-side software development
Full-text access may be available. Sign in or learn about subscription options.
by
Prasun Dewan
,
Puneet Agrawal
,
Gautam Shroff
,
Rajesh Hegde
Collaborative filtering via epidemic aggregation in distributed virtual environments
Full-text access may be available. Sign in or learn about subscription options.
by
Patrick Gratz
,
Jean Botev
Session 11: Visualization and knowledge development
Freely available from IEEE.
DISCERN: A collaborative visualization system for learning cryptographic protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Giuseppe Cattaneo
,
Alfredo De Santis
,
Umberto Ferraro Petrillo
Comparing visualization techniques to structure collaborative concepts
Full-text access may be available. Sign in or learn about subscription options.
by
Sherry Koshman
,
Chi-Jung Lu
VaaS: Videoconference as a service
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Pedro Rodríguez
,
Daniel Gallego
,
Javier Cerviño
,
Fernando Escribano
,
Juan Quemada
,
Joaquín Salvachúa
GColl group-to-group videoconferencing system: design and first experiences
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Petr Slovák
,
Pavel Troubil
,
Petr Holub
LTM-SOLA - a service-oriented application to integrate high-tech laboratories and virtual knowledge spaces
Full-text access may be available. Sign in or learn about subscription options.
by
Henning Sommerkamp
,
Jonas Schulte
,
Reinhard Keil
,
Johann Rybka
,
Ferdinand Ferber
Session 12: Trust & dependable systems
Freely available from IEEE.
Enforcing relationships privacy through collaborative access control in web-based Social Networks
Full-text access may be available. Sign in or learn about subscription options.
by
Barbara Carminati
,
Elena Ferrari
A policy management framework for trusted crossdomain collaboration
Full-text access may be available. Sign in or learn about subscription options.
by
Zhengping Wu
,
Hao Wu
,
Yuanyao Liu
Learning communities supported by autonomic recommendation mechanism
Full-text access may be available. Sign in or learn about subscription options.
by
S. N. Brandao
,
R. T. Silva
,
J. M. Souza
Information retrieval on mind maps - what could it be good for?
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Jöran Beel
,
Bela Gipp
,
Jan-Olaf Stiller
A collaborative k-anonymity approach for location privacy in location-based services
Full-text access may be available. Sign in or learn about subscription options.
by
Hassan Takabi
,
James B. D. Joshi
,
Hassan A. Karimi
Flexible failure handling for cooperative processes in distributed systems
Full-text access may be available. Sign in or learn about subscription options.
by
Artin Avanes
,
Johann-Christoph Freytag
Session 1: Access control for collaborative systems
Freely available from IEEE.
An opensocial extension for enabling user-controlled persona in online social networks
Full-text access may be available. Sign in or learn about subscription options.
by
Rodrigo Lopes
,
Hakan Akkan
,
William Claycomb
,
Dongwan Shin
Towards automatic recommendation of friend lists
Full-text access may be available. Sign in or learn about subscription options.
by
Kelli Bacon
,
Prasun Dewan
A usage control policy specification with Petri nets
Full-text access may be available. Sign in or learn about subscription options.
by
Basel Katt
,
Michael Hafner
,
Xinwen Zhang
Session 2: Towards security of collaborative systems
Freely available from IEEE.
In-depth analysis of IPv6 security posture
Full-text access may be available. Sign in or learn about subscription options.
by
Abdur Rahim Choudhary
Automatic policy conflict analysis for cross-domain collaborations using semantic temporal logic
Full-text access may be available. Sign in or learn about subscription options.
by
Zhengping Wu
,
Yuanyao Liu
Trusted computing - opportunities & risks
Full-text access may be available. Sign in or learn about subscription options.
by
Nor Fatimah Bt Awang
No hotel in D.C.
Full-text access may be available. Sign in or learn about subscription options.
by
Francesco Bolici
Status messages for the right audience with an ontology-based approach
Full-text access may be available. Sign in or learn about subscription options.
by
Milan Stankovic
,
Alexandre Passant
,
Philippe Laublet
The Quality Social Network: A collaborative environment for personalizing Web access
Full-text access may be available. Sign in or learn about subscription options.
by
Andrea Perego
,
Barbara Carminati
,
Elena Ferrari
SECUND: A protocol for SECUre neighborhooD creation in wireless ad hoc networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Thaier Hayajneh
,
Prashant Krishnamurthy
,
David Tipper
Showing 85 out of 85