


default search action
2nd CIC 2016: Pittsburgh, PA, USA
- 2nd IEEE International Conference on Collaboration and Internet Computing, CIC 2016, Pittsburgh, PA, USA, November 1-3, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-4607-2

Session 1: Collaboration
- Zihang Liu, Yu-Ru Lin, Maoquan Wang, Zhao Lu:

Discovering Opinion Changes in Online Reviews via Learning Fine-Grained Sentiments. 1-10 - Kahina Bessai, François Charoy

:
Business Process Tasks-Assignment and Resource Allocation in Crowdsourcing Context. 11-18 - Surya Nepal

, Cécile Paris:
Why Is It Difficult for Welfare Recipients to Return to Work? A Case Study through a Collaborative Online Community. 19-28 - Anne H. H. Ngu, Shawn Fang, Helen Paik:

Social-PPM: Personal Experience Sharing and Recommendation. 29-36
Session 2: Access Control
- Smriti Bhatt, Farhan Patwa, Ravi S. Sandhu:

An Attribute-Based Access Control Extension for OpenStack and Its Enforcement Utilizing the Policy Machine. 37-45 - Harsha S. Gardiyawasam Pussewalage, Vladimir A. Oleshchuk:

A Patient-Centric Attribute Based Access Control Scheme for Secure Sharing of Personal Health Records Using Cloud Computing. 46-53 - Prajit Kumar Das, Anupam Joshi, Tim Finin:

Capturing Policies for Fine-Grained Access Control on Mobile Devices. 54-63 - Sadhana Jha, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:

An Administrative Model for Collaborative Management of ABAC Systems and Its Security Analysis. 64-73
Session 3: Privacy
- Hasini Gunasinghe, Elisa Bertino:

RahasNym: Pseudonymous Identity Management System for Protecting against Linkability. 74-85 - Star Ying, Tyrone Grandison:

Big Data Privacy Risk: Connecting Many Large Data Sets. 86-91 - Hafiz Salman Asif, Tanay Talukdar, Jaideep Vaidya, Basit Shafiq, Nabil R. Adam:

Collaborative Differentially Private Outlier Detection for Categorical Data. 92-101 - Hassan Takabi, Anuj Bhalotiya, Manar Alohaly:

Brain Computer Interface (BCI) Applications: Privacy Threats and Countermeasures. 102-111
Session 4: Data Security
- Zhisheng Hu, Ping Chen, Yang Lu, Minghui Zhu, Peng Liu:

Towards a Science for Adaptive Defense: Revisit Server Protection. 112-121 - Mohamed Azab, Bassem Mokhtar, Amr S. Abed, Mohamed Eltoweissy:

Smart Moving Target Defense for Linux Container Resiliency. 122-130 - Amani Abu Jabal, Elisa Bertino:

QL-SimP: Query Language for Secure Interoperable Multi-Granular Provenance Framework. 131-138 - Mortada Al-Banna, Boualem Benatallah, Moshe Chai Barukh:

Software Security Professionals: Expertise Indicators. 139-148
Session 5: Cloud and Internet
- Chen Chen, David Barrera, Adrian Perrig:

Modeling Data-Plane Power Consumption of Future Internet Architectures. 149-158 - Waheed Aslam Ghumman, Alexander Schill, Jörg Lässig:

The Flip-Flop SLA Negotiation Strategy Using Concession Extrapolation and 3D Utility Function. 159-168 - Robert Wenger, Xiru Zhu, Jayanth Krishnamurthy, Muthucumaru Maheswaran:

A Programming Language and System for Heterogeneous Cloud of Things. 169-177 - Brijesh Kashyap Chejerla, Sanjay Madria:

Information Fusion Architecture for Variable-Load Scheduling in a Cloud-Assisted CPS. 178-187
Session 6: Web Security and Privacy
- Jega Anish Dev:

On the Imminent Advent of Botnet Powered Cracking. 188-195 - Fadi Mohsen, Mohamed Shehab:

Hardening the OAuth-WebView Implementations in Android Applications by Re-Factoring the Chromium Library. 196-205 - Christopher Griffin, Sarah Michele Rajtmajer, Anna Cinzia Squicciarini:

Invited Paper: A Model of Paradoxical Privacy Behavior in Online Users. 206-211 - Hassan Takabi, Samir Koppikar, Saman Taghavi Zargar:

Differentially Private Distributed Data Analysis. 212-218
Session 7: Distributed Processing
- Jia Zhang, Qihao Bao, Xiaoyi Duan, Shiyong Lu, Lijun Xue, Runyu Shi, Pingbo Tang:

Collaborative Scientific Workflow Composition as a Service: An Infrastructure Supporting Collaborative Data Analytics Workflow Design and Management. 219-228 - Hyerim Bae, Sung-Hyun Sim

, Yulim Choi, Ling Liu:
Statistical Verification of Process Conformance Based on Log Equality Test. 229-235 - Anand Tripathi:

A Transaction Model with Multilevel Consistency for Shared Data in Distributed Groupware Systems. 236-245 - Aveksha Kapoor, Vinay Arora:

Application of Bloom Filter for Duplicate URL Detection in a Web Crawler. 246-255
Session 8: Twitter and Sentiments
- Amanda Dennett, Surya Nepal

, Cécile Paris, Bella Robinson
:
TweetRipple: Understanding Your Twitter Audience and the Impact of Your Tweets. 256-265 - Quang-Vinh Dang

, Claudia-Lavinia Ignat:
Measuring Quality of Collaboratively Edited Documents: The Case of Wikipedia. 266-275 - Aibek Musaev, Qixuan Hou:

Gathering High Quality Information on Landslides from Twitter by Relevance Ranking of Users and Tweets. 276-284 - Brian Heredia, Taghi M. Khoshgoftaar, Joseph D. Prusa, Michael Crawford:

Integrating Multiple Data Sources to Enhance Sentiment Prediction. 285-291
Session 9: Data Processing
- Bing Li:

Constructing the Three Graphs for the Large-Scale Heterogeneous Information System. 292-303 - Negar Mosharraf, Anura P. Jayasumana, Indrakshi Ray:

Compacted Bloom Filter. 304-311 - De Wang, Aibek Musaev, Calton Pu:

Information Diffusion Analysis of Rumor Dynamics over a Social-Interaction Based Model. 312-320 - Anne Marie Amja, Abdel Obaid, Hafedh Mili, Zahi Jarir:

Feature-Based Adaptation and Its Implementation. 321-328
Session 10: Mining
- Yasmeen Alufaisan, Murat Kantarcioglu, Yan Zhou:

Detecting Discrimination in a Black-Box Classifier. 329-338 - Prasun Dewan:

Inferred Awareness to Support Mixed-Activity Collaboration. 339-348 - John Calvin Alumbaugh, Qinghua Li, Vincent C. Hu

:
Differentiating Non-Isomorphic Graphlets for Graph Analytics. 349-356 - Xidao Wen, Di Lu, Yu-Ru Lin, Claudia López

:
The Roles of Information Seeking Dynamics in Sustaining the Community Participation. 357-362
Session 11: Online Social Networks
- Amira Soliman, Sarunas Girdzijauskas

:
DLSAS: Distributed Large-Scale Anti-Spam Framework for Decentralized Online Social Networks. 363-372 - Hariton Efstathiades, Demetris Antoniades, George Pallis, Marios D. Dikaiakos:

Distributed Large-Scale Data Collection in Online Social Networks. 373-380
Session 12: Citizens and Society
- Jiawei Zhang, Philip S. Yu:

Trip Route Planning for Bicycle-Sharing Systems. 381-390 - Michael D. Scott

, Lakshmish Ramaswamy, Victor Lawson:
CyanoTRACKER: A Citizen Science Project for Reporting Harmful Algal Blooms. 391-397 - Cécile Paris, Surya Nepal

:
Can a Government Use Social Media to Support Disadvantaged Citizens? 398-407
Session 13: Data Security 2
- Ajay Modi, Zhibo Sun

, Anupam Panwar, Tejas Khairnar, Ziming Zhao, Adam Doupé, Gail-Joon Ahn
, Paul Black:
Towards Automated Threat Intelligence Fusion. 408-416 - Runhua Xu, James B. D. Joshi:

Enabling Attribute Based Encryption as an Internet Service. 417-425
Workshop: ISCBD and TrustCol 2016
- Jameela Al-Jaroodi, Nader Mohamed:

Characteristics and Requirements of Big Data Analytics Applications. 426-432 - Neda Abolhassani, Teresa Tung, Karthik Gomadam, Lakshmish Ramaswamy:

Knowledge Graph-Based Query Rewriting in a Relational Data Harmonization Framework. 433-438 - Nader Nassar, Li-Chiou Chen:

Image-Based Seed Generation. 439-444 - Bernard Ngabonziza, Daniel Martin, Anna Bailey, Haehyun Cho, Sarah Martin:

TrustZone Explained: Architectural Features and Use Cases. 445-451 - Napoleon C. Paxton:

Cloud Security: A Review of Current Issues and Proposed Solutions. 452-455
Workshop: CIC-DM 2016
- Fred Morstatter:

Using Biased Social Samples for Disaster Response: Extended Abstract. 456-457 - Xingsheng He, Yu-Ru Lin:

Monitoring Collective Attention During Disasters. 458-462 - Kimberly Glasgow, Clay Fink, Jessica Vitak

, Yla R. Tausczik:
"Our Hearts Go Out": Social Support and Gratitude after Disaster. 463-469 - David J. Wallace:

Data Driven Approaches to Define Acute Care Referral Regions and Resources. 470-473 - Patrick M. Dudas, Samantha Weirman, Christopher Griffin

:
Little Data, Big Stories: Taking the Pulse of Large-Scaled Events on Twitter. 474-482 - Jae-geun Moon, Jin-Seong Kim, Im Young Jung, Su-an Eom:

Social Safety Guard Based on Internet of Things. 483-485 - Irena Gao:

Using the Social Network Internet of Things to Mitigate Public Mass Shootings. 486-489 - Ashish Rauniyar

, Paal Engelstad, Boning Feng, Do Van Thanh:
Crowdsourcing-Based Disaster Management Using Fog Computing in Internet of Things Paradigm. 490-494 - Yue Su, Ziyi Lan, Yu-Ru Lin, Louise K. Comfort, James Joshi:

Tracking Disaster Response and Relief Following the 2015 Nepal Earthquake. 495-499 - Wen-Ting Chung, Yu-Ru Lin:

Probing Construct Validity in Data-Driven Disaster Analysis. 500-501
Workshop: PiCSoC 2016
- Martin Degeling

, Christopher Lentzsch
, Alexander Nolte
, Thomas Herrmann
, Kai-Uwe Loser:
Privacy by Socio-Technical Design: A Collaborative Approach for Privacy Friendly System Design. 502-505 - Saul Ricardo Medrano Castillo, Zhiyuan Chen:

Using Transfer Learning to Identify Privacy Leaks in Tweets. 506-513 - Davide Alberto Albertini, Barbara Carminati

, Elena Ferrari
:
Privacy Settings Recommender for Online Social Network. 514-521 - Amirreza Masoumzadeh, Andrew Cortese:

Towards Measuring Knowledge Exposure in Online Social Networks. 522-529 - Asma Alshehri, Ravi S. Sandhu:

Access Control Models for Cloud-Enabled Internet of Things: A Proposed Architecture and Research Agenda. 530-538 - Manar Alohaly, Hassan Takabi:

If You Can't Measure It, You Can't Manage It: Towards Quantification of Privacy Policies. 539-545 - Fadi Mohsen, Mohamed Shehab

:
The Listening Patterns to System Events by Benign and Malicious Android Apps. 546-553 - Leila Karimi, Balaji Palanisamy, James Joshi:

A Dynamic Privacy Aware Access Control Model for Location Based Services. 554-557

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














