


default search action
5th CollaborateCom 2009: Washington, DC, USA
- James B. D. Joshi, Tao Zhang:

The 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2009, Washington DC, USA, November 11-14, 2009. ICST / IEEE 2009, ISBN 978-963-9799-76-9
Communications / Collaboration
- Bastian Steinert, Michael Grünewald, Stefan Richter, Jens Lincke, Robert Hirschfeld:

Multi-user multi-account interaction in groupware supporting single-display collaboration. 1-9 - Stefan Jablonski, Michael Igler, Christoph Günther:

Supporting collaborative work through flexible Process Execution. 1-10 - Ruhollah Farchtchi:

Dynamic data services: Data access for collaborative networks in a multi-agent systems architecture. 1-8 - George Mathew:

Integrating external user profiles in collaboration applications. 1-4
Distributed Systems
- Piyawan Kasemsuppakorn, Hassan A. Karimi:

Pedestrian network data collection through location-based social networks. 1-9 - Bin Shao, Du Li, Ning Gu:

ABTS: A transformation-based consistency control algorithm for wide-area collaborative applications. 1-10 - Tin Lam, Naftaly H. Minsky:

A collaborative framework for enforcing server commitments, and for regulating server interactive behavior in SOA-based systems. 1-10 - Wolfgang Reinhardt, Matthias Moi, Tobias Varlemann:

Artefact-Actor-Networks as tie between social networks and artefact networks. 1-10 - Muhammad A. Choudhary, Hasnat Babar, Hasan Shakeel, Aisha Abbas:

Economics of network sharing - A case study of mobile telecom sector in Pakistan. 1-6
Machine Learning
- Arash Nourian, Sameer Ishtiaq, Muthucumaru Maheswaran:

CASTLE: A social framework for collaborative anti-phishing databases. 1-10 - Keke Chen, Fengguang Tian:

VisGBT: Visually analyzing evolving datasets for adaptive learning. 1-10 - Xiannuan Liang, Yang Xiao

:
Bio-inspired true coalition formation on intrusion detection by mobile robots. 1-6
Application Track
- Mahendra Kumar, Richard E. Newman, José A. B. Fortes

, Dennis R. Durbin, Flaura K. Winston
:
An IT appliance for remote collaborative review of mechanisms of injury to children in motor vehicle crashes. 1-9 - Mauro Carlos Pichiliani, Celso Massaki Hirata

:
A tabletop groupware system for computer-based music composition. 1-10 - Murat Gunestas

, Duminda Wijesekera:
Online detection of web choreography misuses. 1-10 - Nils Jeners, Steffen Budweg, Wolfgang Prinz:

Portal modules for Groupware systems. 1-10 - Sara Javanmardi, Yasser Ganjisaffar, Cristina Videira Lopes, Pierre Baldi:

User contribution and trust in Wikipedia. 1-6
Software Development and Application
- Hanwei Chen, Jianwei Yin, Haifeng Liu, Calton Pu:

JTangSynergy 3.0: A framework and software tool for integrating cross-organizational applications. 1-7 - Simon Malkowski, Markus Hedwig, Deepal Jayasinghe, Junhee Park, Yasuhiko Kanemasa, Calton Pu:

A new perspective on experimental analysis of N-tier systems: Evaluating database scalability, multi-bottlenecks, and economical operation. 1-10 - Luiz F. C. Tomaz, José A. Rodrigues Nt., Geraldo Xexéo

, Jano Moreira de Souza
:
Collaborative process modeling and reuse evaluation. 1-9 - Basel Katt, Michael Hafner, Xinwen Zhang:

Building a stateful reference monitor with coloured petri nets. 1-10 - Ling-Jyh Chen

, Yu-Song Syu, Bo-Chun Wang, Wang-Chien Lee:
An analytical study of GWAP-based geospatial tagging systems. 1-10 - Eladio Martin, Ling Liu, Matt Weber, Péter Pesti, M. Woodward:

Unified analytical models for Location Management costs and optimum design of location areas. 1-10
Wireless Sensor Network
- Xiaofei Xing, Guojun Wang, Jie Wu, Jie Li

:
Square region-based coverage and connectivity probability model in wireless sensor networks. 1-8 - Thaier Hayajneh

, Prashant Krishnamurthy, David Tipper:
SECUND: A protocol for SECUre neighborhooD creation in wireless ad hoc networks. 1-10 - Piyush Parate, Lakshmish Ramaswamy, Suchendra M. Bhandarkar, Siddhartha Chattopadhyay, Hari Devulapally:

Efficient dissemination of personalized video content in resource-constrained environments. 1-9 - Minakshmi Roy, H. S. Jamadagni:

Performance comparison of MQAM OFDM based WLAN System in presence of bluetooth interference with AWGN and rayleigh fading channel. 1-8 - A. Mohamed AbdelRahman, Mohamad Abou El-Nasr, Ossama Ismail:

A novel forwarding/dropping decision engine for wireless multi-hop ad-hoc networks. 1-5
P2P
- Isil Sebüktekin, John Haluska, Pete Moyer, Kevin Adams:

Protocol overhead versus router processing and memory tradeoffs in evaluating BGP inbound soft reset mechanisms for tactical IP networks. 1-7 - Richard Price, Peter Tiño

:
Still alive: Extending keep-alive intervals in P2P overlay networks. 1-10 - Markus Esch, Ingo Scholtes

:
A scale-free and self-organized P2P overlay for massive multiuser virtual environments. 1-10 - Ronny Klauck, Michael Kirsche

:
Integrating P2PSIP into collaborative P2P applications: A case study with the P2P videoconferencing system BRAVIS. 1-10 - Davide Carfi

, Massimo Coppola, Domenico Laforenza, Laura Ricci
:
DDT: A distributed data structure for the support of P2P range query. 1-10
Web
- Alexandre Passant, Philippe Laublet, John G. Breslin, Stefan Decker

:
SemSLATES: Improving enterprise 2.0 information systems using semantic Web technologies. 1-10 - Martha Escobar-Molano, Antonio Badia

, Rafael Alonso:
Exploiting tags for concept extraction and information integration. 1-9 - Sungwon Peter Choe, Junehwa Song:

R4: Towards a holistic framework for designing and developing Social Web Applications. 1-9 - Walid Fdhila

, Claude Godart:
Toward synchronization between decentralized orchestrations of composite web services. 1-10 - ZhangBing Zhou, Sami Bhiri

, Lei Shu
, Manfred Hauswirth:
Formal verification of mediatedweb service interactions considering client's expected behaviours. 1-10
Security
- Qun Ni, Elisa Bertino:

Aggregating uncertain access risk estimations from different sources invited paper. 1-10 - Nitya Vyas, Anna Cinzia Squicciarini

, Chih-Cheng Chang, Danfeng Yao
:
Towards automatic privacy management in Web 2.0 with semantic analysis on annotations. 1-10 - Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William H. Winsborough:

Towards a framework for group-centric secure collaboration. 1-10 - Jonas Schulte, Ingo Döpke, Reinhard Keil, Konrad Stark, Johann Eder

:
Enhanced security management for flexible and dynamic cooperative environments. 1-10 - Eric Freudenthal, Bivas Das:

VPAF: a flexible framework for establishing and monitoring prolonged authorization relationships. 1-4 - Ravi S. Sandhu:

The PEI framework for application-centric security. 1-5
Distributed Systems (2)
- Constantin Serban, Wenxuan Zhang, Naftaly H. Minsky:

A decentralized mechanism for application level monitoring of distributed systems. 1-10 - Wanqing Wu, Jungtae Lee:

Improvement of HRV methodology for positive/negative emotion assessment. 1-6 - Brandon Szeliga, Tung Nguyen, Weisong Shi:

DiSK: A distributed shared disk cache for HPC environments. 1-8 - Prasun Dewan, Puneet Agarwal, Gautam Shroff, Rajesh Hegde:

Experiments in distributed side-by-side software development. 1-10 - Patrick Gratz, Jean Botev

:
Collaborative filtering via epidemic aggregation in distributed virtual environments. 1-9
Visualization and Knowledge Development
- Giuseppe Cattaneo

, Alfredo De Santis
, Umberto Ferraro Petrillo:
DISCERN: A collaborative visualization system for learning cryptographic protocols. 1-8 - Sherry Koshman, Chi-Jung Lu:

Comparing visualization techniques to structure collaborative concepts. 1-8 - Pedro Rodríguez, Daniel Gallego, Javier Cerviño, Fernando Escribano, Juan Quemada

, Joaquín Salvachúa
:
VaaS: Videoconference as a service. 1-11 - Petr Slovák, Pavel Troubil, Petr Holub

:
GColl group-to-group videoconferencing system: design and first experiences. 1-9 - Henning Sommerkamp, Jonas Schulte, Reinhard Keil, Johann Rybka, Ferdinand Ferber:

LTM-SOLA - a service-oriented application to integrate high-tech laboratories and virtual knowledge spaces. 1-7
Trust & Dependable Systems
- Barbara Carminati

, Elena Ferrari
:
Enforcing relationships privacy through collaborative access control in web-based Social Networks. 1-9 - Zhengping Wu, Hao Wu, Yuanyao Liu:

A policy management framework for trusted crossdomain collaboration. 1-10 - Stainam Nogueira Brandão, Ricardo Tadeu da Silva, Jano M. Souza

:
Learning communities supported by autonomic recommendation mechanism. 1-10 - Jöran Beel, Bela Gipp

, Jan-Olaf Stiller:
Information retrieval on mind maps - what could it be good for? 1-4 - Hassan Takabi, James B. D. Joshi, Hassan A. Karimi:

A collaborative k-anonymity approach for location privacy in location-based services. 1-9 - Artin Avanes, Johann Christoph Freytag:

Flexible failure handling for cooperative processes in distributed systems. 1-10
TrustCol Workshop
Access Control for Collaborative Systems
- Rodrigo Lopes, Hakan Akkan, William R. Claycomb, Dongwan Shin

:
An opensocial extension for enabling user-controlled persona in online social networks. 1-5 - Kelli Bacon, Prasun Dewan:

Towards automatic recommendation of friend lists. 1-5 - Basel Katt, Michael Hafner, Xinwen Zhang:

A usage control policy specification with Petri nets. 1-8
Towards Security of Collaborative Systems
- Abdur Rahim Choudhary:

In-depth analysis of IPv6 security posture. 1-7 - Zhengping Wu, Yuanyao Liu:

Automatic policy conflict analysis for cross-domain collaborations using semantic temporal logic. 1-8 - Nor Fatimah Bt. Awang

:
Trusted computing - opportunities & risks. 1-5
CollaborateSN Workshop
- Francesco Bolici:

No hotel in DC - Surfing Web 2.0 and your couch (Reality 2.0): Lessons from CouchSurfing community. 1-6 - Milan Stankovic, Alexandre Passant, Philippe Laublet:

Status messages for the right audience with an ontology-based approach. 1-7 - Andrea Perego

, Barbara Carminati
, Elena Ferrari
:
The Quality Social Network: A collaborative environment for personalizing Web access. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














