


default search action
4th CollaborateCom 2008: Orlando, FL, USA
- Elisa Bertino, James B. D. Joshi:

Collaborative Computing: Networking, Applications and Worksharing, 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 10, Springer / ICST 2009, ISBN 978-3-642-03353-7
Invited Short Papers
- Jun Wang, Jian Peng, Xiaoyang Cao:

A Distributed Collaborative Filtering Recommendation Model for P2P Networks. 1-10 - Minsoo Kim, James B. D. Joshi, Minkoo Kim:

Access Control for Cooperation Systems Based on Group Situation. 11-23 - Jiang Wang, Anup K. Ghosh, Yih Huang:

Web Canary: A Virtualized Web Browser to Support Large-Scale Silent Collaboration in Detecting Malicious Web Sites. 24-33 - Yasser Ganjisaffar, Sara Javanmardi, Stanley Grant, Cristina Videira Lopes:

CalSWIM: A Wiki-Based Data Sharing Platform. 34-43 - Yaser Mowafi, Dongsong Zhang, Guisseppi A. Forgionne:

Examining a Bayesian Approach to Personalizing Context Awareness in Ubiquitous Computing Environments. 44-55
Invited Full Papers
- Tiziana Catarci

, Febo Cincotti
, Massimiliano de Leoni
, Massimo Mecella
, Giuseppe Santucci
:
Smart Homes for All: Collaborating Services in a for-All Architecture for Domotics. 56-69 - Renato J. O. Figueiredo

, P. Oscar Boykin, José A. B. Fortes, Tao Li, Jie-Kwon Peir, David Wolinsky, Lizy K. John, David R. Kaeli, David J. Lilja, Sally A. McKee, Gokhan Memik, Alain Roy, Gary S. Tyson:
Archer: A Community Distributed Computing Infrastructure for Computer Architecture Research and Education. 70-84 - Thorben Burghardt, Erik Buchmann, Klemens Böhm, Chris Clifton:

Collaborative Search and User Privacy: How Can They Be Reconciled?. 85-99 - Fengjun Li

, Bo Luo
, Peng Liu, Anna Cinzia Squicciarini
, Dongwon Lee, Chao-Hsien Chu
:
Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering. 100-112 - Ryan Layfield, Murat Kantarcioglu, Bhavani Thuraisingham:

Incentive and Trust Issues in Assured Information Sharing. 113-125 - Barbara Carminati

, Elena Ferrari
, Andrea Perego
:
Combining Social Networks and Semantic Web Technologies for Personalizing Web Access. 126-144 - Carlos Sánchez, Le Gruenwald, Mauricio Sánchez:

Evaluating Security Policies in Pervasive Mobile Environments Using Context Information. 145-161 - Panayiotis Neophytou, Panos K. Chrysanthis, Alexandros Labrinidis:

Towards Continuous Workflow Enactment Systems. 162-178 - Devanir Zuliane, Marcio K. Oikawa

, Simon Malkowski, José de Jesús Pérez Alcázar, João Eduardo Ferreira
:
The RiverFish Approach to Business Process Modeling: Linking Business Steps to Control-Flow Patterns. 179-193 - Elisa Bertino, Rodolfo Ferrini, Andrea Musci, Federica Paci

, Kevin J. Steuer:
A Federated Digital Identity Management Approach for Business Processes. 194-206 - Tuan Phan, Danfeng (Daphne) Yao

:
SelectAudit: A Secure and Efficient Audit Framework for Networked Virtual Environments. 207-216 - Shouhuai Xu:

Collaborative Attack vs. Collaborative Defense. 217-228 - Yi Luo, Ladislau Bölöni:

Learning Models of the Negotiation Partner in Spatio-temporal Collaboration. 229-243
Full Papers
- William R. Claycomb, Dongwan Shin

:
Protecting Sensitive Information in Directory Services Using Virtual Directories. 244-257 - Mauro Carlos Pichiliani, Celso Massaki Hirata

, Fabricio da Silva Soares, Carlos Henrique Quartucci Forster
:
TeleEye: An Awareness Widget for Providing the Focus of Attention in Collaborative Editing Systems. 258-270 - Matthias Hauswirth:

Informa: An Extensible Framework for Group Response Systems. 271-286 - Dongxi Liu, Surya Nepal, David Moreland, Shiping Chen

, Chen Wang
, John Zic:
Secure and Conditional Resource Coordination for Successful Collaborations. 287-303 - Youna Jung, Amirreza Masoumzadeh, James B. D. Joshi, Minkoo Kim:

RiBAC: Role Interaction Based Access Control Model for Community Computing. 304-321 - Isabel F. Cruz, Rigel Gjomemo, Benjamin Lin, Mirko Orsini

:
A Constraint and Attribute Based Security Framework for Dynamic Role Assignment in Collaborative Environments. 322-339 - Jing Jin, Gail-Joon Ahn

, Michael J. Covington, Xinwen Zhang:
Access Control Model for Sharing Composite Electronic Health Records. 340-354 - Viplavi Donepudi, Mohamed F. Younis:

Employing Sink Mobility to Extend the Lifetime of Wireless Sensor Networks. 355-369 - Matthias R. Brust

, Carlos H. C. Ribeiro
, Jaruwan Mesit:
Avoiding Greediness in Cooperative Peer-to-Peer Networks. 370-378 - Arturo J. Sánchez-Ruíz, Karthikeyan Umapathy

, Jonathan Beckham, Patrick Welsh:
The Data Interoperability Problem as an Exemplary Case Study in the Development of Software Collaboration Environments. 379-389 - Hoda Hassan, Ramy Eltarras, Mohamed Eltoweissy:

Towards a Framework for Evolvable Network Design. 390-401 - Zhengping Wu:

A Comprehensive Comparison of Trust Management Systems for Federation. 402-415 - Fengying Li, Qingshui Xue, Jiping Zhang, Zhenfu Cao

:
A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme. 416-424 - Guoray Cai, Anna Cinzia Squicciarini

:
A Unified Theory of Trust and Collaboration. 425-438 - Dongwan Shin

, Rodrigo Lopes:
Enabling Interoperable and Selective Data Sharing among Social Networking Sites. 439-450 - Cam Tu Phan Le, Frédéric Cuppens, Nora Cuppens-Boulahia, Patrick Maillé

:
Evaluating the Trustworthiness of Contributors in a Collaborative Environment. 451-460 - Steffen Bartsch, Karsten Sohr

, Carsten Bormann
:
Supporting Agile Development of Authorization Rules for SME Applications. 461-471 - Jack L. Burbank, William T. Kasch:

The Application of Human and Social Behavioral-Inspired Security Models for Self-aware Collaborative Cognitive Radio Networks. 472-484 - Kori Inkpen, Steve Whittaker, Mary Czerwinski, Roland Fernandez, James R. Wallace:

GroupBanter: Supporting Serendipitous Group Conversations with IM. 485-498 - Sinéad McGivney, Alan F. Smeaton

, Hyowon Lee:
The Effect of Personality on Collaborative Task Performance and Interaction. 499-511 - Osama Al-Haj Hassan, Lakshmish Ramaswamy, John A. Miller

, Khaled Rasheed, E. Rodney Canfield:
Replication in Overlay Networks: A Multi-objective Optimization Approach. 512-528 - Stéphane Weiss, Pascal Urso, Pascal Molli

:
An Undo Framework for P2P Collaborative Editing. 529-544 - Surya Nepal, John Zic, Shiping Chen

:
A Contract Language for Service-Oriented Dynamic Collaborations. 545-562 - Anna Cinzia Squicciarini

, Federica Paci
:
Monitoring Contract Enforcement within Virtual Organizations. 563-577 - Ingo Scholtes

, Jean Botev
, Markus Esch, Hermann Schloss, Peter Sturm:
Using Epidemic Hoarding to Minimize Load Delays in P2P Distributed Virtual Environments. 578-593 - Sami Rollins, Cheryl Chang-Yit:

A Battery-Aware Algorithm for Supporting Collaborative Applications. 594-608 - Xiaoxin Wu, Guodong Pei:

Collaborative Graphic Rendering for Improving Visual Experience. 609-622 - Peter Géczy, Noriaki Izumi, Shotaro Akaho

, Kôiti Hasida
:
Analytics and Management of Collaborative Intranets. 623-631 - Ehtesham Zahoor, Olivier Perrin, Claude Godart:

Mashup Model and Verification Using Mashup Processing Network. 632-648 - Qihua Wang, Hongxia Jin, Stefan Nusser:

Automatic Categorization of Tags in Collaborative Environments. 649-662 - Mohammad Mehdi Gilanian Sadeghi, Borhanuddin Mohd Ali, Hossein Pedram, Mehdi Dehghan, Masoud Sabaei:

A New Method for Creating Efficient Security Policies in Virtual Private Network. 663-678 - Kewei Sha

, Guoxing Zhan, Safwan Al-Omari
, Tim Calappi, Weisong Shi, Carol J. Miller
:
Data Quality and Failures Characterization of Sensing Data in Environmental Applications. 679-695 - Wenjia Li, James Parker, Anupam Joshi

:
Security through Collaboration in MANETs. 696-714 - Korporn Panyim

, Prashant Krishnamurthy:
A Hybrid Key Predistribution Scheme for Sensor Networks Employing Spatial Retreats to Cope with Jamming Attacks. 715-731 - Eike Michael Meyer, Daniel Wichmann, Henning Büsch, Susanne Boll:

Location-Based Mapping Services to Support Collaboration in Spatially Distributed Workgroups. 732-745 - Sasa Junuzovic, Prasun Dewan:

Serial vs. Concurrent Scheduling of Transmission and Processing Tasks in Collaborative Systems. 746-759 - Xumin Liu, Athman Bouguettaya

:
Ontology Support for Managing Top-Down Changes in Composite Services. 760-777 - Yacine Atif

, Mohamed Adel Serhani, Piers Campbell, Sujith Samuel Mathew
:
Trusted Translation Services. 778-791 - Alison Lee, Umesh Chandra:

Enabling Meetings for "Anywhere and Anytime". 792-804 - Fusheng Wang

, Cristobal Vergara-Niedermayr:
Collaboratively Sharing Scientific Data. 805-823 - Claudio Bartolini:

IT Incident Management as a Collaborative Process: A Visualization Tool Inspired to Social Networks. 824-830

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














