


default search action
9th CollaborateCom 2013: Austin, TX, USA
- Elisa Bertino, Dimitrios Georgakopoulos, Mudhakar Srivatsa, Surya Nepal, Alessandro Vinciarelli:

9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, Austin, TX, USA, October 20-23, 2013. ICST / IEEE 2013, ISBN 978-1-936968-92-3 - Elisa Bertino, Dimitrios Georgakopoulos:

Preface.
Security
- De Wang, Danesh Irani, Calton Pu:

A study on evolution of email spam over fifteen years. 1-10 - Justin Paglierani, Mike Mabey, Gail-Joon Ahn

:
Towards comprehensive and collaborative forensics on email evidence. 11-20 - Chun-Jen Chung, Jingsong Cui, Pankaj Khatkar, Dijiang Huang

:
Non-intrusive process-based monitoring system to mitigate and prevent VM vulnerability explorations. 21-30 - Ying Fairweather, Dongwan Shin

:
Towards multi-policy support for IaaS clouds to secure data sharing. 31-39
collaborative Work
- Rui-ping Lua, Wee Keong Ng

:
Autonomic swarms for regenerative and collaborative networking. 40-49 - Luc André, Stéphane Martin, Gérald Oster, Claudia-Lavinia Ignat:

Supporting adaptable granularity of changes for massive-scale collaborative editing. 50-59 - Stefan Schönig

, Michael Zeising, Stefan Jablonski:
Supporting collaborative work by learning process models and patterns from cases. 60-69 - Luis G. Montané-Jiménez, Edgard Benítez-Guerrero

, Carmen Mezura-Godoy:
A context-aware architecture for improving collaboration of users in Groupware systems. 70-76
Big Data
- Prem Prakash Jayaraman

, Charith Perera, Dimitrios Georgakopoulos
, Arkady B. Zaslavsky:
Efficient opportunistic sensing using mobile collaborative platform MOSDEN. 77-86 - Agustin Sancen-Plaza

, Andres Mendez-Vazquez
:
Influence maximization for Big Data through entropy ranking and min-cut. 87-95 - Wenwey Hseush, Yi-Cheng Huang, Shih-Chang Hsu, Calton Pu:

Real-time collaborative planning with big data: Technical challenges and in-place computing (invited paper). 96-104 - Thuy Ngoc Nguyen, An Te Nguyen:

Towards context-aware recommendations: Strategies for exploiting multi-criteria communities. 105-114 - Lakshmish Ramaswamy, Raga Sowmya Tummalapenta, Kang Li, Calton Pu:

A content-context-centric approach for detecting vandalism in Wikipedia. 115-122
distributed Systems
- Chi Wu-Lee, Gwan-Hwan Hwang:

Workflow definition by cloud collaboration. 123-132 - David Knuplesch, Manfred Reichert, Rüdiger Pryss

, Walid Fdhila
, Stefanie Rinderle-Ma
:
Ensuring compliance of distributed and collaborative workflows. 133-142 - Mounira Msahli, Ahmed Serhrouchni:

SBaaS: Safe Box as a service. 143-147 - Mehdi Ahmed-Nacer, Pascal Urso, Valter Balegas, Nuno M. Preguiça

:
Concurrency control and awareness support for multi-synchronous collaborative editing. 148-157 - Ahmed Khalifa, Mohamed Eltoweissy:

MobiCloud: A reliable collaborative mobilecloud management system. 158-167
Mobile Collaboration
- Huijun Wu, Dijiang Huang

, Samia Bouzefrane:
Making offloading decisions resistant to network unavailability for mobile cloud collaboration. 168-177 - Rüdiger Pryss

, Steffen Musiol, Manfred Reichert:
Collaboration support through mobile processes and entailment constraints. 178-187 - Jan Gäbler, Ronny Klauck, Mario Pink, Hartmut König:

uBeeMe - A platform to enable mobile collaborative applications. 188-196 - Lutful Karim, Qusay H. Mahmoud

:
A hybrid mobility model based on social, cultural and language diversity. 197-204 - Hsin-Yu Ha, Fausto C. Fleites, Shu-Ching Chen:

Building multi-model collaboration in detecting multimedia semantic concepts (invited paper). 205-212
Social Network
- Jundong Chen

, Matthias R. Brust
, Ankunda R. Kiremire, Vir V. Phoha
:
Modeling privacy settings of an online social network from a game-theoretical perspective. 213-220 - Changhyeon Lee, Fathoni Arief Musyaffa, Yong-Moo Kwon:

Web based collaborative social album authoring system using Facebook photos. 221-230 - Qingbo Hu, Guan Wang, Shuyang Lin, Philip S. Yu:

Silence behavior mining on online social networks. 231-240 - Amerah Alabrah, Mostafa A. Bassiouni:

Robust and fast authentication of session cookies in collaborative and social media using position-indexed hashing. 241-249 - De Wang, Shamkant B. Navathe, Ling Liu, Danesh Irani, Acar Tamersoy, Calton Pu:

Click traffic analysis of short URL spam on Twitter. 250-259
Privacy and Trust
- Anna Cinzia Squicciarini

, Barbara Carminati
, Sushama Karumanchi:
Privacy aware service selection of composite web services invited paper. 260-268 - Amira Bradai, Walid Ben-Ameur, Hossam Afifi:

Byzantine resistant reputation-based trust management. 269-278 - Hachem Guerid, Karel Mittig, Ahmed Serhrouchni:

Collaborative approach for inter-domain botnet detection in large-scale networks. 279-288 - S. Ananda Kanagaraj, G. Arjun, A. Shahina

:
Cheeka: A mobile application for personal safety. 289-294 - Kundan Singh, Venkatesh Krishnaswamy:

Private overlay of enterprise social data and interactions in the public web context. 295-304
Team Collaboration
- Delfina Malandrino

, Ilaria Manno, Alberto Negro
, Andrea Petta, Vittorio Scarano
, Luigi Serra:
Social team awareness. 305-314 - Marco Biazzini, Patricia Serrano-Alvarado, Raziel Carvajal-Gomez:

Towards improving user satisfaction in decentralized P2P networks. 315-324 - Kevin Dullemond, Rini van Solingen:

Increasing awareness in distributed software teams: A first evaluation. 325-334 - Petru Nicolaescu, Michael Derntl

, Ralf Klamma
:
Browser-based collaborative modeling in near real-time. 335-344 - Pallabi Parveen, Pratik Desai, Bhavani Thuraisingham, Latifur Khan

:
MapReduce-guided scalable compressed dictionary construction for evolving repetitive sequence streams. 345-352
Virtual Collaboration
- Ingo Zinnikus, Xiaoqi Cao, Matthias Klusch, Christopher Krauss, Andreas Nonnengart, Torsten Spieldenner, Philipp Slusallek

:
A collaborative virtual workspace for factory configuration and evaluation. 353-362 - Aida Erfanian, Tao Zeng, Yaoping Hu:

Dynamic strategies of conflict resolution on human perception of equality within multi-user collaborative virtual environments. 363-370 - Ian Brooks, Kathy M. Swigger:

Leadership's effect on overall temporal patterns of global virtual teams. 371-379 - Joon-Suk Lee, Deborah G. Tatar:

Impact of mediating technologies on talk and emotion: Questioning "commonsense". 380-389 - Mehdi Ahmed-Nacer, Pascal Urso, François Charoy

:
Improving textual merge result. 390-399
Recommendadtion Systems
- Shivangi Agarwal, Krishna Kishore Dhara, Venkatesh Krishnaswamy:

Profile sharing recommendation system for enterprise collaboration. 400-408 - Xuelian Long, Lei Jin, James Joshi:

Understanding venue popularity in Foursquare. 409-418 - Surya Nepal

, Cécile Paris, Payam Aghaei Pour, Sanat Kumar Bista, Jill Freyne:
A social trust based friend recommender for online communities "invited paper". 419-428 - Umair ul Hassan

, Edward Curry
:
A capability requirements approach for predicting worker performance in crowdsourcing. 429-437 - Karim Benouaret, Raman Valliyur-Ramalingam, François Charoy

:
Answering complex location-based queries with crowdsourcing. 438-447
Web Data Management
- Kirill Belyaev, Indrakshi Ray, Indrajit Ray, Gary Luckasen:

Personal health record storage on privacy preserving green clouds. 448-457 - Surya Nepal

, Julian Jang-Jaccard
, Branko G. Celler
, Bo Yan, Leila Alem:
Data architecture for telehealth services research: A case study of home tele-monitoring. 458-467 - István Koren

, Andreas Guth, Ralf Klamma
:
Shared editing on the web: A classification of developer support libraries. 468-477 - Sisi Lu, Ye Ye, Rich Tsui, Howard Su, Ruhsary Rexit, Sahawut Wesaratchakit, Xiaochu Liu, Rebecca Hwa

:
Domain ontology-based feature reduction for high dimensional drug data and its application to 30-day heart failure readmission prediction. 478-484
Context Awareness and Awareness Support
- Hilda Tellioglu, Simon Diesenreiter:

Enterprise 2.0 in action: Potentials for improvement of awareness support in enterprises. 485-494 - Ben van Gameren, Rini van Solingen:

When to interrupt global software engineers to provide them with what information? 495-504 - Samudrala Nagaraju, B. M. Manjushree:

DynaSurface: A framework for device notifications using nano coatings in connected devices. 505-514 - Mateusz Dolata

, Nils Jeners, Wolfgang Prinz:
How to tag it right?: Semi-automatic support for email management. 515-524
TrustCol Workshop
- Carlos E. Rubio-Medrano, Clinton D'Souza, Gail-Joon Ahn

:
Supporting secure collaborations with attribute-based access control. 525-530 - Balkis Hamdane, Mounira Msahli, Ahmed Serhrouchni, Sihem Guemara El Fatmi:

Data-based access control in named data networking. 531-536 - Huseyin Ulusoy, Murat Kantarcioglu, Bhavani Thuraisingham, Ebru Celikel Cankaya, Erman Pattuk:

Analysis of heuristic based access pattern obfuscation. 537-544 - Fadi Mohsen, Mohamed Shehab

:
Android keylogging threat. 545-552 - Julian Jang-Jaccard

, Jane Li, Surya Nepal
, Leila Alem:
Security analysis of mobile applications: A case study of a collaboration tool in healthcare. 553-562 - John Dwyer, Traian Marius Truta:

Finding anomalies in windows event logs using standard deviation. 563-570 - Bård Fjukstad, John Markus Bjørndalen, Otto J. Anshus:

Accurate weather forecasting through locality based collaborative computing. 571-578
C-IOT Workshop
- Eric G. Stephan

, Todd Elsethagen, Adam S. Wynne, Chitra Sivaraman, Matthew C. Macduff, Larry K. Berg, Will J. Shaw
:
A linked fusion of things, services, and data to support a collaborative data management facility. 579-584 - Arjun P. Athreya, Bruce DeBruhl, Patrick Tague

:
Designing for self-configuration and self-adaptation in the Internet of Things. 585-592 - Umair ul Hassan

, Murilo Bassora, Ali Hosseinzadeh Vahid, Seán O'Riain, Edward Curry
:
A collaborative approach for metadata management for Internet of Things: Linking micro tasks with physical objects. 593-598 - Clinton Walker, Qijun Gu, Terry Penner:

Computation integrity in mobile cloud: Running probabilistically checkable proof on Android. 599-602 - Rodion M. Podorozhny:

Design and verification of cellphone-based cyber-physical systems: A position paper. 603-607 - Edewede Oriwoh, David Jazani, Gregory Epiphaniou

, Paul Sant
:
Internet of Things Forensics: Challenges and approaches. 608-615 - Dylan Hicks, Kevin Mannix, Hannah M. Bowles, Byron J. Gao:

SmartMart: IoT-based In-store mapping for mobile devices. 616-621 - Kelly T. Slaughter, Gurshaman Baweja:

Organizations preparing organizations for the IoT: The congruence of the IoT meme. 622-625

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














