Default Cover Image

2012 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2012)

Oct. 14 2012 to Oct. 17 2012

Pittsburgh, PA

Table of Contents

A formal proximity model for RBAC systemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Access rule consistency in cooperative data access environmentFull-text access may be available. Sign in or learn about subscription options.pp. 11-20
WiseShare: A collaborative environment for knowledge sharing governed by ABAC policiesFull-text access may be available. Sign in or learn about subscription options.pp. 21-29
Peer-aware collaborative access control in social networksFull-text access may be available. Sign in or learn about subscription options.pp. 30-39
Evolutionary study of web spam: Webb Spam Corpus 2011 versus Webb Spam Corpus 2006Full-text access may be available. Sign in or learn about subscription options.pp. 40-49
Towards hierarchical email recipient predictionFull-text access may be available. Sign in or learn about subscription options.pp. 50-59
Chatty things - Making the Internet of Things readily usable for the masses with XMPPFull-text access may be available. Sign in or learn about subscription options.pp. 60-69
A fast and transparent communication protocol for co-resident virtual machinesFull-text access may be available. Sign in or learn about subscription options.pp. 70-79
Towards secure cooperation in online social networksFull-text access may be available. Sign in or learn about subscription options.pp. 80-88
Automatic social group organization and privacy managementFull-text access may be available. Sign in or learn about subscription options.pp. 89-96
Privacy-preserving assessment of social network data trustworthinessFull-text access may be available. Sign in or learn about subscription options.pp. 97-106
Confidentiality-preserving and fault-tolerant in-network aggregation for Collaborative WSNsFull-text access may be available. Sign in or learn about subscription options.pp. 107-116
Towards timed requirement verification for service choreographiesFull-text access may be available. Sign in or learn about subscription options.pp. 117-126
Incentive mechanisms for Opportunistic Cloud Computing ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 127-136
Secure composition of cascaded Web servicesFull-text access may be available. Sign in or learn about subscription options.pp. 137-146
Portable key management service for cloud storageFull-text access may be available. Sign in or learn about subscription options.pp. 147-156
Exploring social approach to recommend talks at research conferencesFull-text access may be available. Sign in or learn about subscription options.pp. 157-164
An entity-based platform for the integration of social and scientific servicesFull-text access may be available. Sign in or learn about subscription options.pp. 165-174
Comealong: Empowering experience-sharing through social networksFull-text access may be available. Sign in or learn about subscription options.pp. 175-180
Social media alert and response to threats to citizens (SMART-C)Full-text access may be available. Sign in or learn about subscription options.pp. 181-189
A lattice interpretation of group-centric collaboration with expedient insidersFull-text access may be available. Sign in or learn about subscription options.pp. 200-209
Modelling Bayesian attacker detection game in wireless networks with epistemic logicFull-text access may be available. Sign in or learn about subscription options.pp. 210-215
A collaborative approach to situational awareness for cybersecurityFull-text access may be available. Sign in or learn about subscription options.pp. 216-222
Data-aware interaction in distributed and collaborative workflows: Modeling, semantics, correctnessFull-text access may be available. Sign in or learn about subscription options.pp. 223-232
Incentivizing collaborative learning through visual feedback about conflict in WikiFull-text access may be available. Sign in or learn about subscription options.pp. 242-251
Automatic academic advisorFull-text access may be available. Sign in or learn about subscription options.pp. 262-268
Case-study: How to increase the value of computer science projects in higher educationFull-text access may be available. Sign in or learn about subscription options.pp. 269-278
Who is who: On visualizing organizational models in Collaborative SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 279-288
Idea relationship analysis in open innovation crowdsourcing systemsFull-text access may be available. Sign in or learn about subscription options.pp. 289-296
SpreadComp platform: A new paradigm for distributed spreadsheet collaboration and compositionFull-text access may be available. Sign in or learn about subscription options.pp. 297-305
Towards streamed services for co-located collaborative groupsFull-text access may be available. Sign in or learn about subscription options.pp. 306-315
A Context-Aware framework for patient Navigation and Engagement (CANE)Full-text access may be available. Sign in or learn about subscription options.pp. 316-325
A preemptive connection pool manager for web-based application collaborationFull-text access may be available. Sign in or learn about subscription options.pp. 326-334
Adaptation of single-user multi-touch components to support synchronous mobile collaborationFull-text access may be available. Sign in or learn about subscription options.pp. 335-344
A real-time collaboration-enabled Mobile Augmented Reality system with semantic multimediaFull-text access may be available. Sign in or learn about subscription options.pp. 345-354
An asynchronous based approach to improve concurrency control in mobile web serversFull-text access may be available. Sign in or learn about subscription options.pp. 355-362
A collaborative Bluetooth-based approach to localization of mobile devicesFull-text access may be available. Sign in or learn about subscription options.pp. 363-371
Collaborative media choice processes in virtual teamsFull-text access may be available. Sign in or learn about subscription options.pp. 372-380
The role of leadership and its effect on the temporal patterns of global software development teamsFull-text access may be available. Sign in or learn about subscription options.pp. 381-390
Auto-erecting virtual office wallsFull-text access may be available. Sign in or learn about subscription options.pp. 391-397
Collaboration should become a first-class citizen in support environments for software engineersFull-text access may be available. Sign in or learn about subscription options.pp. 398-405
Predictability trust for Wireless Sensor Networks to provide a defense against On/off attackFull-text access may be available. Sign in or learn about subscription options.pp. 406-415
EigenTrustp++: Attack resilient trust managementFull-text access may be available. Sign in or learn about subscription options.pp. 416-425
Robust expert ranking in online communities - fighting Sybil AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 426-434
Improving collaborative business process execution by traceability and expressivenessFull-text access may be available. Sign in or learn about subscription options.pp. 435-442
Optimized execution of business processes on crowdsourcing platformsFull-text access may be available. Sign in or learn about subscription options.pp. 443-451
Change propagation in collaborative processes scenariosFull-text access may be available. Sign in or learn about subscription options.pp. 452-461
Understanding lookup performance deficiencies in the KAD networkFull-text access may be available. Sign in or learn about subscription options.pp. 462-470
Controlled conflict resolution for replicated documentFull-text access may be available. Sign in or learn about subscription options.pp. 471-480
CUERA: Performance evaluation of a generic data- and undo/redo-consistency frameworkFull-text access may be available. Sign in or learn about subscription options.pp. 481-489
Semantic structure in a federated collaboration environmentFull-text access may be available. Sign in or learn about subscription options.pp. 490-499
Sensor source location privacy based on random perturbationsFull-text access may be available. Sign in or learn about subscription options.pp. 500-507
Detecting movement type by route segmentation and classificationFull-text access may be available. Sign in or learn about subscription options.pp. 508-513
Tweecalization: Efficient and intelligent location mining in twitter using semi-supervised learningFull-text access may be available. Sign in or learn about subscription options.pp. 514-523
Adapting association rule mining to discover patterns of collaboration in process logsFull-text access may be available. Sign in or learn about subscription options.pp. 531-534
Engagement analysis through computer visionFull-text access may be available. Sign in or learn about subscription options.pp. 535-539
Real-time collaborative resolving of merge conflictsFull-text access may be available. Sign in or learn about subscription options.pp. 540-543
Detecting social signals of flu symptomsFull-text access may be available. Sign in or learn about subscription options.pp. 544-545
Modeling collaborative information seeking processes: A preliminary study of team search tacticsFull-text access may be available. Sign in or learn about subscription options.pp. 546-549
Recommendation of points of interest from user generated data collectionFull-text access may be available. Sign in or learn about subscription options.pp. 550-555
A collaborative approach to scaffold programming efficiency using spoken tutorials and its evaluationFull-text access may be available. Sign in or learn about subscription options.pp. 556-559
Towards efficient query processing on massive time-evolving graphsFull-text access may be available. Sign in or learn about subscription options.pp. 567-574
Delta extraction optimization for view maintenance in a limited collaborative environmentFull-text access may be available. Sign in or learn about subscription options.pp. 575-582
Biologically-inspired network “memory” for smarter networkingFull-text access may be available. Sign in or learn about subscription options.pp. 583-590
Efficient processing of models for large-scale shotgun proteomics dataFull-text access may be available. Sign in or learn about subscription options.pp. 591-596
Where will I go next?: Predicting future categorical check-ins in Location Based Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 605-610
Using gamification in an online communityFull-text access may be available. Sign in or learn about subscription options.pp. 611-618
Preservation of structural properties in anonymized social networksFull-text access may be available. Sign in or learn about subscription options.pp. 619-627
Game theoretical analysis of collaborative social applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 628-634
Spontaneous organizations: Collaborative computing model of a networked organizationFull-text access may be available. Sign in or learn about subscription options.pp. 643-650
Detecting review spam: Challenges and opportunitiesFull-text access may be available. Sign in or learn about subscription options.pp. 651-654
CyberX: A biologically-inspired platform for cyber trust managementFull-text access may be available. Sign in or learn about subscription options.pp. 655-663
Reputation management in crowdsourcing systemsFull-text access may be available. Sign in or learn about subscription options.pp. 664-671
Reputation objects for interoperable reputation exchange: Implementation and design decisionsFull-text access may be available. Sign in or learn about subscription options.pp. 672-680
Method for two dimensional honeypot in a web applicationFull-text access may be available. Sign in or learn about subscription options.pp. 681-686
Similarity analysis of shellcodes in drive-by download attack kitsFull-text access may be available. Sign in or learn about subscription options.pp. 687-694
Towards improving browser extension permission management and user awarenessFull-text access may be available. Sign in or learn about subscription options.pp. 695-702
Fast semantic Attribute-Role-Based Access Control (ARBAC) in a collaborative environmentFull-text access may be available. Sign in or learn about subscription options.pp. 703-710
Secure sharing of electronic health records in cloudsFull-text access may be available. Sign in or learn about subscription options.pp. 711-718
L2TAP+SCIP: An audit-based privacy framework leveraging Linked DataFull-text access may be available. Sign in or learn about subscription options.pp. 719-726
Knowedge-based policy conflict analysis for collabrative workspaceFull-text access may be available. Sign in or learn about subscription options.pp. 727-734
Showing 88 out of 88