Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
COLLABORATECOM
COLLABORATECOM 2012
Generate Citations
2012 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2012)
Oct. 14 2012 to Oct. 17 2012
Pittsburgh, PA
Table of Contents
A formal proximity model for RBAC systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
A. Gupta
,
M. Kirkpatrick
,
E. Bertino
Access rule consistency in cooperative data access environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-20
by
Meixing Le
,
Krishna Kant
,
Sushil Jajodia
WiseShare: A collaborative environment for knowledge sharing governed by ABAC policies
Full-text access may be available. Sign in or learn about subscription options.
pp. 21-29
by
Hakima Ould-Slimane
,
M. Bande
,
H. Boucheneb
Peer-aware collaborative access control in social networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 30-39
by
Qian Xiao
,
Kian-Lee Tan
Evolutionary study of web spam: Webb Spam Corpus 2011 versus Webb Spam Corpus 2006
Full-text access may be available. Sign in or learn about subscription options.
pp. 40-49
by
De Wang
,
D. Irani
,
C. Pu
Towards hierarchical email recipient prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 50-59
by
J. Bartel
,
P. Dewan
Chatty things - Making the Internet of Things readily usable for the masses with XMPP
Full-text access may be available. Sign in or learn about subscription options.
pp. 60-69
by
R. Klauck
,
M. Kirsche
A fast and transparent communication protocol for co-resident virtual machines
Full-text access may be available. Sign in or learn about subscription options.
pp. 70-79
by
Yi Ren
,
Ling Liu
,
Xiaojian Liu
,
Jinzhu Kong
,
Huadong Dai
,
Qingbo Wu
,
Yuan Li
Towards secure cooperation in online social networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 80-88
by
Youna Jung
,
Minsoo Kim
,
James B.D Joshi
Automatic social group organization and privacy management
Full-text access may be available. Sign in or learn about subscription options.
pp. 89-96
by
A. Squicciarini
,
S. Karumanchi
,
Dan Lin
,
N. DeSisto
Privacy-preserving assessment of social network data trustworthiness
Full-text access may be available. Sign in or learn about subscription options.
pp. 97-106
by
Chenyun Dai
,
Fang-Yu Rao
,
Traian Marius Truta
,
Elisa Bertino
Confidentiality-preserving and fault-tolerant in-network aggregation for Collaborative WSNs
Full-text access may be available. Sign in or learn about subscription options.
pp. 107-116
by
Marian K. Iskander
,
Adam J. Lee
,
Daniel Mossé
Towards timed requirement verification for service choreographies
Full-text access may be available. Sign in or learn about subscription options.
pp. 117-126
by
N. Guermouche
,
Silvano Dal Zilio
Incentive mechanisms for Opportunistic Cloud Computing Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 127-136
by
E. Kuada
,
H. Olesen
Secure composition of cascaded Web services
Full-text access may be available. Sign in or learn about subscription options.
pp. 137-146
by
B. Shafiq
,
Soon Chun
,
J. Vaidya
,
N. Badar
,
N. Adam
Portable key management service for cloud storage
Full-text access may be available. Sign in or learn about subscription options.
pp. 147-156
by
Julian Jang-Jaccard
,
Avnish Manraj
,
Surya Nepal
Exploring social approach to recommend talks at research conferences
Full-text access may be available. Sign in or learn about subscription options.
pp. 157-164
by
D. H. Lee
,
P. Brusilovsky
An entity-based platform for the integration of social and scientific services
Full-text access may be available. Sign in or learn about subscription options.
pp. 165-174
by
R. Chenu-Abente
,
M. Menendez
,
F. Giunchiglia
,
A. De Angeli
Comealong: Empowering experience-sharing through social networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 175-180
by
Beatrice Valeri
,
Marcos Baez
,
Fabio Casati
Social media alert and response to threats to citizens (SMART-C)
Full-text access may be available. Sign in or learn about subscription options.
pp. 181-189
by
N. Adam
,
J. Eledath
,
S. Mehrotra
,
N. Venkatasubramanian
A simple collaborative method in Web proxy access control for supporting complex authentication mechanisms
Full-text access may be available. Sign in or learn about subscription options.
pp. 190-199
by
S. Takada
,
A. Sato
,
Y. Shinjo
,
H. Nakai
,
K. Sakurai
,
K. Itano
A lattice interpretation of group-centric collaboration with expedient insiders
Full-text access may be available. Sign in or learn about subscription options.
pp. 200-209
by
K. Z. Bijon
,
T. Ahmed
,
R. Sandhu
,
R. Krishnan
Modelling Bayesian attacker detection game in wireless networks with epistemic logic
Full-text access may be available. Sign in or learn about subscription options.
pp. 210-215
by
Oldooz Dianat
,
M. Orgun
A collaborative approach to situational awareness for cybersecurity
Full-text access may be available. Sign in or learn about subscription options.
pp. 216-222
by
M. L. Mathews
,
P. Halvorsen
,
A. Joshi
,
T. Finin
Data-aware interaction in distributed and collaborative workflows: Modeling, semantics, correctness
Full-text access may be available. Sign in or learn about subscription options.
pp. 223-232
by
D. Knuplesch
,
R. Pryss
,
M. Reichert
MADIS: A Multimedia-Aided Disaster information Integration System for emergency management
Full-text access may be available. Sign in or learn about subscription options.
pp. 233-241
by
Yimin Yang
,
Wenting Lu
,
J. Domack
,
Tao Li
,
Shu-Ching Chen
,
S. Luis
,
J. K. Navlakha
Incentivizing collaborative learning through visual feedback about conflict in Wiki
Full-text access may be available. Sign in or learn about subscription options.
pp. 242-251
by
Kewen Wu
,
Julita Vassileva
,
Qinghua Zhu
Collaborative e-learning through open social student modeling and Progressive Zoom navigation
Full-text access may be available. Sign in or learn about subscription options.
pp. 252-261
by
MinEr Liang
,
Julio Guerra
,
G. Elisabeta Marai
,
Peter Brusilovsky
Automatic academic advisor
Full-text access may be available. Sign in or learn about subscription options.
pp. 262-268
by
K. Taha
Case-study: How to increase the value of computer science projects in higher education
Full-text access may be available. Sign in or learn about subscription options.
pp. 269-278
by
D. Kadenbach
,
C. Kleiner
Who is who: On visualizing organizational models in Collaborative Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 279-288
by
S. Kriglstein
,
J. Mangler
,
S. Rinderle-Ma
Idea relationship analysis in open innovation crowdsourcing systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 289-296
by
A. Westerski
,
C. A. Iglesias
,
J. E. Garcia
SpreadComp platform: A new paradigm for distributed spreadsheet collaboration and composition
Full-text access may be available. Sign in or learn about subscription options.
pp. 297-305
by
S. Mangiante
,
M. Maresca
,
L. Roncarolo
Towards streamed services for co-located collaborative groups
Full-text access may be available. Sign in or learn about subscription options.
pp. 306-315
by
B. Falchuk
,
T. Zernicki
,
M. Koziuk
A Context-Aware framework for patient Navigation and Engagement (CANE)
Full-text access may be available. Sign in or learn about subscription options.
pp. 316-325
by
Wen Yao
,
Jerome Rolia
,
Sujoy Basu
,
Sharad Singhal
,
Akhil Kumar
A preemptive connection pool manager for web-based application collaboration
Full-text access may be available. Sign in or learn about subscription options.
pp. 326-334
by
Zhen Zhao
Adaptation of single-user multi-touch components to support synchronous mobile collaboration
Full-text access may be available. Sign in or learn about subscription options.
pp. 335-344
by
M. C. Pichiliani
,
C. M. Hirata
A real-time collaboration-enabled Mobile Augmented Reality system with semantic multimedia
Full-text access may be available. Sign in or learn about subscription options.
pp. 345-354
by
D. Kovachev
,
G. Aksakali
,
R. Klamma
An asynchronous based approach to improve concurrency control in mobile web servers
Full-text access may be available. Sign in or learn about subscription options.
pp. 355-362
by
S. Mishra
,
S. Sarasvati
,
S. Srivastava
,
Xumin Liu
A collaborative Bluetooth-based approach to localization of mobile devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 363-371
by
N. Mair
,
Q. H. Mahmoud
Collaborative media choice processes in virtual teams
Full-text access may be available. Sign in or learn about subscription options.
pp. 372-380
by
Katrin Bergener
,
Sara Hofmann
The role of leadership and its effect on the temporal patterns of global software development teams
Full-text access may be available. Sign in or learn about subscription options.
pp. 381-390
by
Ian Broooks
,
Kathleen Swigger
Auto-erecting virtual office walls
Full-text access may be available. Sign in or learn about subscription options.
pp. 391-397
by
B. van Gameren
,
K. Dullemond
,
R. van Solingen
Collaboration should become a first-class citizen in support environments for software engineers
Full-text access may be available. Sign in or learn about subscription options.
pp. 398-405
by
Kevin Dullemond
,
Ben van Gameren
,
Rini van Solingen
Predictability trust for Wireless Sensor Networks to provide a defense against On/off attack
Full-text access may be available. Sign in or learn about subscription options.
pp. 406-415
by
Younghun Chae
,
Lisa Cingiser DiPippo
,
Yan Lindsay Sun
EigenTrustp++: Attack resilient trust management
Full-text access may be available. Sign in or learn about subscription options.
pp. 416-425
by
Xinxin Fan
,
Ling Liu
,
Mingchu Li
,
Zhiyuan Su
Robust expert ranking in online communities - fighting Sybil Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 426-434
by
K. A. N. Rashed
,
C. Balasoiu
,
R. Klamma
Improving collaborative business process execution by traceability and expressiveness
Full-text access may be available. Sign in or learn about subscription options.
pp. 435-442
by
Michael Zeising
,
S. Schonig
,
S. Jablonski
Optimized execution of business processes on crowdsourcing platforms
Full-text access may be available. Sign in or learn about subscription options.
pp. 443-451
by
R. Khazankin
,
B. Satzger
,
S. Dustdar
Change propagation in collaborative processes scenarios
Full-text access may be available. Sign in or learn about subscription options.
pp. 452-461
by
W. Fdhila
,
S. Rinderle-Ma
,
M. Reichert
Understanding lookup performance deficiencies in the KAD network
Full-text access may be available. Sign in or learn about subscription options.
pp. 462-470
by
Yunzhao Li
,
Don Gruenbacher
,
Caterina Scoglio
Controlled conflict resolution for replicated document
Full-text access may be available. Sign in or learn about subscription options.
pp. 471-480
by
S. Martin
,
M. Ahmed-Nacer
,
P. Urso
CUERA: Performance evaluation of a generic data- and undo/redo-consistency framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 481-489
by
D. Stolzenberg
,
E. Muller
Semantic structure in a federated collaboration environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 490-499
by
J. Buford
,
V. Krishnaswamy
Sensor source location privacy based on random perturbations
Full-text access may be available. Sign in or learn about subscription options.
pp. 500-507
by
U. Srimongkolpitak
,
Yi Yang
Detecting movement type by route segmentation and classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 508-513
by
K. Waga
,
A. Tabarcea
,
Minjie Chen
,
P. Franti
Tweecalization: Efficient and intelligent location mining in twitter using semi-supervised learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 514-523
by
S. Abrol
,
L. Khan
,
B. Thuraisingham
An ontology-based system for Cloud infrastructure services' discovery
Full-text access may be available. Sign in or learn about subscription options.
pp. 524-530
by
Miranda Zhang
,
Rajiv Ranjan
,
Armin Haller
,
Dimitrios Georgakopoulos
,
Michael Menzel
,
Surya Nepal
Adapting association rule mining to discover patterns of collaboration in process logs
Full-text access may be available. Sign in or learn about subscription options.
pp. 531-534
by
S. Schonig
,
M. Zeising
,
S. Jablonski
Engagement analysis through computer vision
Full-text access may be available. Sign in or learn about subscription options.
pp. 535-539
by
Z. M. MacHardy
,
K. Syharath
,
P. Dewan
Real-time collaborative resolving of merge conflicts
Full-text access may be available. Sign in or learn about subscription options.
pp. 540-543
by
A. Nieminen
Detecting social signals of flu symptoms
Full-text access may be available. Sign in or learn about subscription options.
pp. 544-545
by
Bumsuk Lee
,
Jinyoung Yoon
,
Seokjung Kim
,
Byung-Yeon Hwang
Modeling collaborative information seeking processes: A preliminary study of team search tactics
Full-text access may be available. Sign in or learn about subscription options.
pp. 546-549
by
Zhen Yue
,
Daqing He
Recommendation of points of interest from user generated data collection
Full-text access may be available. Sign in or learn about subscription options.
pp. 550-555
by
K. Waga
,
A. Tabarcea
,
P. Franti
A collaborative approach to scaffold programming efficiency using spoken tutorials and its evaluation
Full-text access may be available. Sign in or learn about subscription options.
pp. 556-559
by
Kiran L.N. Eranki
,
Kannan M. Moudgalya
Using a distributed search engine to identify optimal product sets for use in an outbreak detection system
Full-text access may be available. Sign in or learn about subscription options.
pp. 560-566
by
R. Rexit
,
Fuchiang Tsui
,
J. Espino
,
S. Wesaratchakit
,
Ye Ye
,
P. K. Chrysanthis
Towards efficient query processing on massive time-evolving graphs
Full-text access may be available. Sign in or learn about subscription options.
pp. 567-574
by
A. Fard
,
A. Abdolrashidi
,
L. Ramaswamy
,
J. A. Miller
Delta extraction optimization for view maintenance in a limited collaborative environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 575-582
by
Zheng Lu
,
Haijun Liu
,
Peter Hyland
Biologically-inspired network “memory” for smarter networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 583-590
by
Bassem Mokhtar
,
Mohamed Eltoweissy
Efficient processing of models for large-scale shotgun proteomics data
Full-text access may be available. Sign in or learn about subscription options.
pp. 591-596
by
H. Grover
,
V. Gopalakrishnan
Robust Decision Engineering: Collaborative Big Data and its application to international development/aid
Full-text access may be available. Sign in or learn about subscription options.
pp. 597-604
by
S. Chan
,
W. Rhodes
,
C. Atencio
,
C. Kuo
,
B. Ranalli
,
A. Miao
,
S. Sala
,
S. Serene
,
R. Helbling
,
S. Rumbley
,
M. Clement
,
L. Sokol
,
L. Gary
Where will I go next?: Predicting future categorical check-ins in Location Based Social Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 605-610
by
V. Kounev
Using gamification in an online community
Full-text access may be available. Sign in or learn about subscription options.
pp. 611-618
by
Sanat Kumar Bista
,
Surya Nepal
,
Nathalie Colineau
,
Cecile Paris
Preservation of structural properties in anonymized social networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 619-627
by
T. M. Truta
,
A. Campan
,
A. L. Ralescu
Game theoretical analysis of collaborative social applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 628-634
by
A. Al-Dhanhani
,
R. Mizouni
,
H. Otrok
,
A. Al-Rubai
Light CS cooperation/coordination
Full-text access may be available. Sign in or learn about subscription options.
pp. 635-642
by
Tatiana Smirnova
,
Usman Akram
,
Jelena Marković
,
Tonima Mukherjee
,
Imran Ahmad
,
Abdullah Feroz
,
Nikitia Mehta
,
Sahar Vahadatii
,
Ekaterina Sirazitdinova
,
Elyas Esnaashari
,
Masood Azizi
,
Nils Jeners
,
Wolfgang Graether
,
Vo Günal
,
Emrah Ozkan
,
Lusine Stepanyan
,
Nasim Khadem
Spontaneous organizations: Collaborative computing model of a networked organization
Full-text access may be available. Sign in or learn about subscription options.
pp. 643-650
by
S. Alqithami
,
H. Hexmoor
Detecting review spam: Challenges and opportunities
Full-text access may be available. Sign in or learn about subscription options.
pp. 651-654
by
Yingying Ma
,
Fengjun Li
CyberX: A biologically-inspired platform for cyber trust management
Full-text access may be available. Sign in or learn about subscription options.
pp. 655-663
by
Mohamed Azab
,
M. Eltoweissy
Reputation management in crowdsourcing systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 664-671
by
M. Allahbakhsh
,
A. Ignjatovic
,
B. Benatallah
,
S. Beheshti
,
E. Bertino
,
N. Foo
Reputation objects for interoperable reputation exchange: Implementation and design decisions
Full-text access may be available. Sign in or learn about subscription options.
pp. 672-680
by
R. Alnemr
,
C. Meinel
Method for two dimensional honeypot in a web application
Full-text access may be available. Sign in or learn about subscription options.
pp. 681-686
by
N. Nassar
,
G. Miller
Similarity analysis of shellcodes in drive-by download attack kits
Full-text access may be available. Sign in or learn about subscription options.
pp. 687-694
by
M. Cherukuri
,
S. Mukkamala
,
Dongwan Shin
Towards improving browser extension permission management and user awareness
Full-text access may be available. Sign in or learn about subscription options.
pp. 695-702
by
S. Marouf
,
M. Shehab
Fast semantic Attribute-Role-Based Access Control (ARBAC) in a collaborative environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 703-710
by
Leo Obrsta
,
Dru McCandlessb
,
David Ferrella
Secure sharing of electronic health records in clouds
Full-text access may be available. Sign in or learn about subscription options.
pp. 711-718
by
Ruoyu Wu
,
Gail-Joon Ahn
,
Hongxin Hu
L2TAP+SCIP: An audit-based privacy framework leveraging Linked Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 719-726
by
R. Samavi
,
M. P. Consens
Knowedge-based policy conflict analysis for collabrative workspace
Full-text access may be available. Sign in or learn about subscription options.
pp. 727-734
by
Zhengping Wu
,
Yuanyao Liu
Showing 88 out of 88