The Community for Technology Leaders
2012 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2012) (2012)
Pittsburgh, PA
Oct. 14, 2012 to Oct. 17, 2012
ISBN: 978-1-4673-2740-4
TABLE OF CONTENTS

A formal proximity model for RBAC systems (Abstract)

A. Gupta , Dept. of Comput. Sci., Purdue Univ., West Lafayette, IN, USA
M. Kirkpatrick , Dept. of Comput. Sci., James Madison Univ., Harrisonburg, VA, USA
E. Bertino , Dept. of Comput. Sci., Purdue Univ., West Lafayette, IN, USA
pp. 1-10

Access rule consistency in cooperative data access environment (PDF)

Meixing Le , Center for Secure Information Systems, George Mason University, Fairfax, VA, USA
Krishna Kant , Center for Secure Information Systems, George Mason University, Fairfax, VA, USA
Sushil Jajodia , Center for Secure Information Systems, George Mason University, Fairfax, VA, USA
pp. 11-20

WiseShare: A collaborative environment for knowledge sharing governed by ABAC policies (Abstract)

Hakima Ould-Slimane , Dept. of Comput., Ecole Polytech. de Montreal, Montreal, QC, Canada
M. Bande , Dept. of Comput., Ecole Polytech. de Montreal, Montreal, QC, Canada
H. Boucheneb , Dept. of Comput., Ecole Polytech. de Montreal, Montreal, QC, Canada
pp. 21-29

Peer-aware collaborative access control in social networks (PDF)

Qian Xiao , School of Computing and NUS Graduate School for Integrated Sciences and Engineering, National University of Singapore, Singapore
Kian-Lee Tan , School of Computing and NUS Graduate School for Integrated Sciences and Engineering, National University of Singapore, Singapore
pp. 30-39

Evolutionary study of web spam: Webb Spam Corpus 2011 versus Webb Spam Corpus 2006 (Abstract)

De Wang , Coll. of Comput., Georgia Inst. of Technol., Atlanta, GA, USA
D. Irani , Coll. of Comput., Georgia Inst. of Technol., Atlanta, GA, USA
C. Pu , Coll. of Comput., Georgia Inst. of Technol., Atlanta, GA, USA
pp. 40-49

Towards hierarchical email recipient prediction (Abstract)

J. Bartel , Dept. of Comput. Sci., Univ. of North Carolina, Chapel Hill, NC, USA
P. Dewan , Dept. of Comput. Sci., Univ. of North Carolina, Chapel Hill, NC, USA
pp. 50-59

Chatty things - Making the Internet of Things readily usable for the masses with XMPP (Abstract)

R. Klauck , IHP, Frankfurt (Oder), Germany
M. Kirsche , Comput. Networks & Commun. Syst. Group, Brandenburg Univ. of Technol., Cottbus, Germany
pp. 60-69

A fast and transparent communication protocol for co-resident virtual machines (PDF)

Yi Ren , College of Computer Science, National University of Defense Technology, Changsha, China, 410073
Ling Liu , College of Computing, Georgia Institute of Technology, Atlanta, 30332-0250, USA
Xiaojian Liu , College of Computer Science, National University of Defense Technology, Changsha, China, 410073
Jinzhu Kong , College of Computer Science, National University of Defense Technology, Changsha, China, 410073
Huadong Dai , College of Computer Science, National University of Defense Technology, Changsha, China, 410073
Qingbo Wu , College of Computer Science, National University of Defense Technology, Changsha, China, 410073
Yuan Li , College of Computer Science, National University of Defense Technology, Changsha, China, 410073
pp. 70-79

Towards secure cooperation in online social networks (PDF)

Youna Jung , ACIS, Department of Electrical and Computer Engineering, University of Florida, Gainesville, 32611, USA
Minsoo Kim , 5065 NW 45th Road, #102, Gainesville, FL 32606, USA
James B.D Joshi , LERSAIS, School of Information Science, University of Pittsburgh, PA 15260, USA
pp. 80-88

Automatic social group organization and privacy management (Abstract)

A. Squicciarini , Inf. Sci. & Technol., Pennsylvania State Univ., University Park, PA, USA
S. Karumanchi , Inf. Sci. & Technol., Pennsylvania State Univ., University Park, PA, USA
Dan Lin , Dept. of Comput. Sci., Missouri Univ. of Sci. & Technol., Rolla, MO, USA
N. DeSisto , Inf. Sci. & Technol., Pennsylvania State Univ., University Park, PA, USA
pp. 89-96

Privacy-preserving assessment of social network data trustworthiness (PDF)

Chenyun Dai , Department of Computer Science, Purdue University, West Lafayette, IN, USA
Fang-Yu Rao , Department of Computer Science, Purdue University, West Lafayette, IN, USA
Traian Marius Truta , Department of Computer Science, Northern Kentucky University, Highland Heights, USA
Elisa Bertino , Department of Computer Science, Purdue University, West Lafayette, IN, USA
pp. 97-106

Confidentiality-preserving and fault-tolerant in-network aggregation for Collaborative WSNs (Abstract)

Marian K. Iskander , Dept. of Comput. Sci., Univ. of Pittsburgh, Pittsburgh, PA, USA
A. J. Lee , Dept. of Comput. Sci., Univ. of Pittsburgh, Pittsburgh, PA, USA
D. Mosse , Dept. of Comput. Sci., Univ. of Pittsburgh, Pittsburgh, PA, USA
pp. 107-116

Towards timed requirement verification for service choreographies (Abstract)

N. Guermouche , LAAS, Toulouse, France
Silvano Dal Zilio , LAAS, Toulouse, France
pp. 117-126

Incentive mechanisms for Opportunistic Cloud Computing Services (Abstract)

E. Kuada , Center for Commun., Media & Inf. Technol., Aalborg Univ., Copenhagen, Denmark
H. Olesen , Center for Commun., Media & Inf. Technol., Aalborg Univ., Copenhagen, Denmark
pp. 127-136

Secure composition of cascaded Web services (Abstract)

B. Shafiq , Lahore Univ. of Manage. Sci., Lahore, Pakistan
Soon Chun , City Univ. of New York, Staten Island, NY, USA
J. Vaidya , Rutgers Univ., Newark, NJ, USA
N. Badar , Rutgers Univ., Newark, NJ, USA
N. Adam , Rutgers Univ., Newark, NJ, USA
pp. 137-146

Portable key management service for cloud storage (PDF)

Julian Jang-Jaccard , ICT Center, CSIRO, Australia
Avnish Manraj , ICT Center, CSIRO, Australia
Surya Nepal , ICT Center, CSIRO, Australia
pp. 147-156

Exploring social approach to recommend talks at research conferences (Abstract)

D. H. Lee , Sch. of Inf. Sci., Univ. of Pittsburgh, Pittsburgh, PA, USA
P. Brusilovsky , Sch. of Inf. Sci., Univ. of Pittsburgh, Pittsburgh, PA, USA
pp. 157-164

An entity-based platform for the integration of social and scientific services (Abstract)

R. Chenu-Abente , Dept. of Inf. Eng. & Comput. Sci., Univ. of Trento, Trento, Italy
M. Menendez , Dept. of Inf. Eng. & Comput. Sci., Univ. of Trento, Trento, Italy
F. Giunchiglia , Dept. of Inf. Eng. & Comput. Sci., Univ. of Trento, Trento, Italy
A. De Angeli , Dept. of Inf. Eng. & Comput. Sci., Univ. of Trento, Trento, Italy
pp. 165-174

Comealong: Empowering experience-sharing through social networks (PDF)

Beatrice Valeri , Department of Information Engineering and Computer Science, University of Trento, Italy, Via Sommarive, 5 I-38123
Marcos Baez , Department of Information Engineering and Computer Science, University of Trento, Italy, Via Sommarive, 5 I-38123
Fabio Casati , Department of Information Engineering and Computer Science, University of Trento, Italy, Via Sommarive, 5 I-38123
pp. 175-180

Social media alert and response to threats to citizens (SMART-C) (Abstract)

N. Adam , Sci. & Technol. Directorate, US Dept. of Homeland Security, Washington, DC, USA
J. Eledath , SRI Int., Princeton, NJ, USA
S. Mehrotra , Univ. of California, Irvine, Irvine, CA, USA
N. Venkatasubramanian , Univ. of California, Irvine, Irvine, CA, USA
pp. 181-189

A simple collaborative method in Web proxy access control for supporting complex authentication mechanisms (Abstract)

S. Takada , Grad. Sch. of Syst. & Inf. Eng., Univ. of Tsukuba, Tsukuba, Japan
A. Sato , Grad. Sch. of Syst. & Inf. Eng., Univ. of Tsukuba, Tsukuba, Japan
Y. Shinjo , Grad. Sch. of Syst. & Inf. Eng., Univ. of Tsukuba, Tsukuba, Japan
H. Nakai , Grad. Sch. of Libr., Inf. & Media Studies, Univ. of Tsukuba, Tsukuba, Japan
K. Sakurai , Grad. Sch. of Syst. & Inf. Eng., Univ. of Tsukuba, Tsukuba, Japan
K. Itano , Grad. Sch. of Syst. & Inf. Eng., Univ. of Tsukuba, Tsukuba, Japan
pp. 190-199

A lattice interpretation of group-centric collaboration with expedient insiders (Abstract)

K. Z. Bijon , Dept. of Comput. Sci., Univ. of Texas at San Antonio, San Antonio, TX, USA
T. Ahmed , Dept. of Comput. Sci., Univ. of Texas at San Antonio, San Antonio, TX, USA
R. Sandhu , Dept. of Comput. Sci., Univ. of Texas at San Antonio, San Antonio, TX, USA
R. Krishnan , Dept. of Electr. & Comput. Eng., Univ. of Texas at San Antonio, San Antonio, TX, USA
pp. 200-209

Modelling Bayesian attacker detection game in wireless networks with epistemic logic (Abstract)

Oldooz Dianat , Dept. of Comput., Macquarie Univ., Sydney, NSW, Australia
M. Orgun , Dept. of Comput., Macquarie Univ., Sydney, NSW, Australia
pp. 210-215

A collaborative approach to situational awareness for cybersecurity (Abstract)

M. L. Mathews , Comput. Sci. & Electr. Eng., Univ. of Maryland, College Park, MD, USA
P. Halvorsen , Comput. Sci. & Electr. Eng., Univ. of Maryland, College Park, MD, USA
A. Joshi , Comput. Sci. & Electr. Eng., Univ. of Maryland, College Park, MD, USA
T. Finin , Comput. Sci. & Electr. Eng., Univ. of Maryland, College Park, MD, USA
pp. 216-222

Data-aware interaction in distributed and collaborative workflows: Modeling, semantics, correctness (Abstract)

D. Knuplesch , Inst. of Databases & Inf. Syst., Ulm Univ., Ulm, Germany
R. Pryss , Inst. of Databases & Inf. Syst., Ulm Univ., Ulm, Germany
M. Reichert , Inst. of Databases & Inf. Syst., Ulm Univ., Ulm, Germany
pp. 223-232

MADIS: A Multimedia-Aided Disaster information Integration System for emergency management (Abstract)

Yimin Yang , Sch. of Comput. & Inf. Sci., Florida Int. Univ., Miami, FL, USA
Wenting Lu , Sch. of Comput. & Inf. Sci., Florida Int. Univ., Miami, FL, USA
J. Domack , Sch. of Comput. & Inf. Sci., Florida Int. Univ., Miami, FL, USA
Tao Li , Sch. of Comput. & Inf. Sci., Florida Int. Univ., Miami, FL, USA
Shu-Ching Chen , Sch. of Comput. & Inf. Sci., Florida Int. Univ., Miami, FL, USA
S. Luis , Sch. of Comput. & Inf. Sci., Florida Int. Univ., Miami, FL, USA
J. K. Navlakha , Sch. of Comput. & Inf. Sci., Florida Int. Univ., Miami, FL, USA
pp. 233-241

Incentivizing collaborative learning through visual feedback about conflict in Wiki (PDF)

Kewen Wu , School of Information Management, Nanjing University, China
Julita Vassileva , Department of Computer Science, University of Saskatchewan, Saskatoon, Canada
Qinghua Zhu , School of Information Management, Nanjing University, China
pp. 242-251

Collaborative e-learning through open social student modeling and Progressive Zoom navigation (PDF)

MinEr Liang , School of Computer Science, Fudan University, Shanghai, China
Julio Guerra , School of Information Sciences, University of Pittsburgh, PA, USA
G. Elisabeta Marai , Department of Computer Science, University of Pittsburgh, PA, USA
Peter Brusilovsky , School of Information Sciences, University of Pittsburgh, PA, USA
pp. 252-261

Automatic academic advisor (Abstract)

K. Taha , Dept. of Electr. & Comput. Eng., Khalifa Univ. of Sci., Technol. & Res., Abu Dhabi, United Arab Emirates
pp. 262-268

Case-study: How to increase the value of computer science projects in higher education (Abstract)

D. Kadenbach , Univ. of Appl. Sci. & Arts, Hannover, Germany
C. Kleiner , Univ. of Appl. Sci. & Arts, Hannover, Germany
pp. 269-278

Who is who: On visualizing organizational models in Collaborative Systems (Abstract)

S. Kriglstein , SBA Res., Vienna, Austria
J. Mangler , Fac. of Comput. Sci., Univ. of Vienna, Vienna, Austria
S. Rinderle-Ma , Fac. of Comput. Sci., Univ. of Vienna, Vienna, Austria
pp. 279-288

Idea relationship analysis in open innovation crowdsourcing systems (Abstract)

A. Westerski , Univ. Politec. de Madrid, Madrid, Spain
C. A. Iglesias , Univ. Politec. de Madrid, Madrid, Spain
J. E. Garcia , Univ. Politec. de Madrid, Madrid, Spain
pp. 289-296

SpreadComp platform: A new paradigm for distributed spreadsheet collaboration and composition (Abstract)

S. Mangiante , Comput. Platform Res. Center (CIPI), Univ. of Genoa, Genoa, Italy
M. Maresca , Comput. Platform Res. Center (CIPI), Univ. of Genoa, Genoa, Italy
L. Roncarolo , M3S S.r.l., Genoa, Italy
pp. 297-305

Towards streamed services for co-located collaborative groups (Abstract)

B. Falchuk , Appl. Commun. Sci., Piscataway, NJ, USA
T. Zernicki , Telcordia Poland Sp. z o.o, Poznań, Poland
M. Koziuk , Telcordia Poland Sp. z o.o, Poznań, Poland
pp. 306-315

A Context-Aware framework for patient Navigation and Engagement (CANE) (PDF)

Wen Yao , Services and Solutions Lab, HP Labs, Palo Alto, CA 94304, USA
Jerome Rolia , Services and Solutions Lab, HP Labs, Palo Alto, CA 94304, USA
Sujoy Basu , Services and Solutions Lab, HP Labs, Palo Alto, CA 94304, USA
Sharad Singhal , Services and Solutions Lab, HP Labs, Palo Alto, CA 94304, USA
Akhil Kumar , Smeal College of Business, Penn State University University Park, 16802, USA
pp. 316-325

Adaptation of single-user multi-touch components to support synchronous mobile collaboration (Abstract)

M. C. Pichiliani , Dept. of Comput. Sci., ITA - Inst. Tecnol. de Aeronaut., São José dos Campos, Brazil
C. M. Hirata , Dept. of Comput. Sci., ITA - Inst. Tecnol. de Aeronaut., São José dos Campos, Brazil
pp. 335-344

A real-time collaboration-enabled Mobile Augmented Reality system with semantic multimedia (Abstract)

D. Kovachev , Adv. Community Inf. Syst. (ACIS) Group, RWTH Aachen Univ., Aachen, Germany
G. Aksakali , Adv. Community Inf. Syst. (ACIS) Group, RWTH Aachen Univ., Aachen, Germany
R. Klamma , Adv. Community Inf. Syst. (ACIS) Group, RWTH Aachen Univ., Aachen, Germany
pp. 345-354

An asynchronous based approach to improve concurrency control in mobile web servers (Abstract)

S. Mishra , Dept. of Comput. Sci., Rochester Inst. of Technol., Rochester, NY, USA
S. Sarasvati , Dept. of Comput. Sci., Rochester Inst. of Technol., Rochester, NY, USA
S. Srivastava , Dept. of Comput. Sci., Rochester Inst. of Technol., Rochester, NY, USA
Xumin Liu , Dept. of Comput. Sci., Rochester Inst. of Technol., Rochester, NY, USA
pp. 355-362

A collaborative Bluetooth-based approach to localization of mobile devices (Abstract)

N. Mair , Sch. of Comput. Sci., Univ. of Guelph, Guelph, ON, Canada
Q. H. Mahmoud , Sch. of Comput. Sci., Univ. of Guelph, Guelph, ON, Canada
pp. 363-371

Collaborative media choice processes in virtual teams (PDF)

Katrin Bergener , Department for Information Systems, University of Münster - ERCIS, Germany
Sara Hofmann , Department for Information Systems, University of Münster - ERCIS, Germany
pp. 372-380

The role of leadership and its effect on the temporal patterns of global software development teams (PDF)

Ian Broooks , Computer Science and Engineering, University of North Texas, Denton, USA
Kathleen Swigger , Computer Science and Engineering, University of North Texas, Denton, USA
pp. 381-390

Auto-erecting virtual office walls (Abstract)

B. van Gameren , IHomer, Delft Univ. of Technol., Delft, Netherlands
K. Dullemond , IHomer, Delft Univ. of Technol., Delft, Netherlands
R. van Solingen , Prowareness, Delft Univ. of Technol., Delft, Netherlands
pp. 391-397

Collaboration should become a first-class citizen in support environments for software engineers (PDF)

Kevin Dullemond , Delft University of Technology, IHomer, The Netherlands
Ben van Gameren , Delft University of Technology, IHomer, The Netherlands
Rini van Solingen , Delft University of Technology, Prowareness, The Netherlands
pp. 398-405

Predictability trust for Wireless Sensor Networks to provide a defense against On/off attack (PDF)

Younghun Chae , Department of Computer Science and Statistics, University of Rhode Island, Kingston, 02881, USA
Lisa Cingiser DiPippo , Department of Computer Science and Statistics, University of Rhode Island, Kingston, 02881, USA
Yan Lindsay Sun , Department of Electrical, Computer and Biomedical Engineering, University of Rhode Island, Kingston, 02881, USA
pp. 406-415

EigenTrustp++: Attack resilient trust management (PDF)

Xinxin Fan , School of Software Technology, Dalian University of Technology, Liaoning, China, 116620
Ling Liu , College of Computing, Georgia Institute of Technology, Atlanta, 30332, USA
Mingchu Li , School of Software Technology, Dalian University of Technology, Liaoning, China, 116620
Zhiyuan Su , School of Software Technology, Dalian University of Technology, Liaoning, China, 116620
pp. 416-425

Robust expert ranking in online communities - fighting Sybil Attacks (Abstract)

K. A. N. Rashed , Adv. Community Inf. Syst. (ACIS), RWTH Aachen Univ., Aachen, Germany
C. Balasoiu , Adv. Community Inf. Syst. (ACIS), RWTH Aachen Univ., Aachen, Germany
R. Klamma , Adv. Community Inf. Syst. (ACIS), RWTH Aachen Univ., Aachen, Germany
pp. 426-434

Improving collaborative business process execution by traceability and expressiveness (Abstract)

Michael Zeising , Univ. of Bayreuth, Bayreuth, Germany
S. Schonig , Univ. of Bayreuth, Bayreuth, Germany
S. Jablonski , Univ. of Bayreuth, Bayreuth, Germany
pp. 435-442

Optimized execution of business processes on crowdsourcing platforms (Abstract)

R. Khazankin , Distrib. Syst. Group, Vienna Univ. of Technol., Vienna, Austria
B. Satzger , Distrib. Syst. Group, Vienna Univ. of Technol., Vienna, Austria
S. Dustdar , Distrib. Syst. Group, Vienna Univ. of Technol., Vienna, Austria
pp. 443-451

Change propagation in collaborative processes scenarios (Abstract)

W. Fdhila , Fac. of Comput. Sci., Univ. of Vienna, Vienna, Austria
S. Rinderle-Ma , Fac. of Comput. Sci., Univ. of Vienna, Vienna, Austria
M. Reichert , Inst. of Databases & Inf. Syst., Univ. of Ulm, Ulm, Germany
pp. 452-461

Understanding lookup performance deficiencies in the KAD network (PDF)

Yunzhao Li , Kansas State University, USA
Don Gruenbacher , Kansas State University, USA
Caterina Scoglio , Kansas State University, USA
pp. 462-470

Controlled conflict resolution for replicated document (Abstract)

S. Martin , INRIA, Univ. de Lorraine, Vandoeuvre-lès-Nancy, France
M. Ahmed-Nacer , INRIA, Univ. de Lorraine, Vandoeuvre-lès-Nancy, France
P. Urso , INRIA, Univ. de Lorraine, Vandoeuvre-lès-Nancy, France
pp. 471-480

CUERA: Performance evaluation of a generic data- and undo/redo-consistency framework (Abstract)

D. Stolzenberg , Inst. of Commun. Eng., Univ. of Rostock, Rostock, Germany
E. Muller , Inst. of Commun. Eng., Univ. of Rostock, Rostock, Germany
pp. 481-489

Semantic structure in a federated collaboration environment (Abstract)

J. Buford , IP Commun. Dept., Avaya Labs. Res., Basking Ridge, NJ, USA
V. Krishnaswamy , IP Commun. Dept., Avaya Labs. Res., Basking Ridge, NJ, USA
pp. 490-499

Sensor source location privacy based on random perturbations (Abstract)

U. Srimongkolpitak , Sch. of Eng., Catholic Univ. of America, Washington, DC, USA
Yi Yang , Sch. of Eng., Catholic Univ. of America, Washington, DC, USA
pp. 500-507

Detecting movement type by route segmentation and classification (Abstract)

K. Waga , Sch. of Comput., Univ. of Eastern Finland, Joensuu, Finland
A. Tabarcea , Sch. of Comput., Univ. of Eastern Finland, Joensuu, Finland
Minjie Chen , Sch. of Comput., Univ. of Eastern Finland, Joensuu, Finland
P. Franti , Sch. of Comput., Univ. of Eastern Finland, Joensuu, Finland
pp. 508-513

Tweecalization: Efficient and intelligent location mining in twitter using semi-supervised learning (Abstract)

S. Abrol , Dept. of Comput. Sci., Univ. of Texas at Dallas, Richardson, TX, USA
L. Khan , Dept. of Comput. Sci., Univ. of Texas at Dallas, Richardson, TX, USA
B. Thuraisingham , Dept. of Comput. Sci., Univ. of Texas at Dallas, Richardson, TX, USA
pp. 514-523

An ontology-based system for Cloud infrastructure services' discovery (PDF)

Miranda Zhang , Information Engineering Laboratory, CSIRO ICT Centre, Austria
Rajiv Ranjan , Information Engineering Laboratory, CSIRO ICT Centre, Austria
Armin Haller , Information Engineering Laboratory, CSIRO ICT Centre, Austria
Dimitrios Georgakopoulos , Information Engineering Laboratory, CSIRO ICT Centre, Austria
Michael Menzel , Karlsruhe Institute of Technology, Germany
Surya Nepal , Information Engineering Laboratory, CSIRO ICT Centre, Austria
pp. 524-530

Adapting association rule mining to discover patterns of collaboration in process logs (Abstract)

S. Schonig , Univ. of Bayreuth, Bayreuth, Germany
M. Zeising , Univ. of Bayreuth, Bayreuth, Germany
S. Jablonski , Univ. of Bayreuth, Bayreuth, Germany
pp. 531-534

Engagement analysis through computer vision (Abstract)

Z. M. MacHardy , Comput. Sci. Dept., Univ. of North Carolina at Chapel Hill, Chapel Hill, NC, USA
K. Syharath , Comput. Sci. Dept., Univ. of North Carolina at Chapel Hill, Chapel Hill, NC, USA
P. Dewan , Comput. Sci. Dept., Univ. of North Carolina at Chapel Hill, Chapel Hill, NC, USA
pp. 535-539

Real-time collaborative resolving of merge conflicts (Abstract)

A. Nieminen , Tampere Univ. of Technol., Tampere, Finland
pp. 540-543

Detecting social signals of flu symptoms (PDF)

Bumsuk Lee , Dept. of Computer Science and Engineering, The Catholic University of Korea, Korea
Jinyoung Yoon , Dept. of Computer Science and Engineering, The Catholic University of Korea, Korea
Seokjung Kim , Dept. of Computer Science and Engineering, The Catholic University of Korea, Korea
Byung-Yeon Hwang , Dept. of Computer Science and Engineering, The Catholic University of Korea, Korea
pp. 544-545

Modeling collaborative information seeking processes: A preliminary study of team search tactics (PDF)

Zhen Yue , School of Information Sciences, University of Pittsburgh, PA, USA
Daqing He , School of Information Sciences, University of Pittsburgh, PA, USA
pp. 546-549

Recommendation of points of interest from user generated data collection (Abstract)

K. Waga , Sch. of Comput., Univ. of Eastern Finland, Joensuu, Finland
A. Tabarcea , Sch. of Comput., Univ. of Eastern Finland, Joensuu, Finland
P. Franti , Sch. of Comput., Univ. of Eastern Finland, Joensuu, Finland
pp. 550-555

A collaborative approach to scaffold programming efficiency using spoken tutorials and its evaluation (PDF)

Kiran L.N. Eranki , IDP Educational Technology, Indian Institute of Technology Bombay, Powai, Mumbai 400076, India
Kannan M. Moudgalya , IDP Educational Technology, Indian Institute of Technology Bombay, Powai, Mumbai 400076, India
pp. 556-559

Using a distributed search engine to identify optimal product sets for use in an outbreak detection system (Abstract)

R. Rexit , Dept. of Biomed. Inf., Univ. of Pittsburgh, Pittsburgh, PA, USA
Fuchiang Tsui , Dept. of Biomed. Inf., Univ. of Pittsburgh, Pittsburgh, PA, USA
J. Espino , Dept. of Biomed. Inf., Univ. of Pittsburgh, Pittsburgh, PA, USA
S. Wesaratchakit , Dept. of Biomed. Inf., Univ. of Pittsburgh, Pittsburgh, PA, USA
Ye Ye , Dept. of Biomed. Inf., Univ. of Pittsburgh, Pittsburgh, PA, USA
P. K. Chrysanthis , Dept. of Comput. Sci., Univ. of Pittsburgh, Pittsburgh, PA, USA
pp. 560-566

Towards efficient query processing on massive time-evolving graphs (Abstract)

A. Fard , Dept. of Comput. Sci., Univ. of Georgia, Athens, GA, USA
A. Abdolrashidi , Dept. of Comput. Sci., Univ. of Georgia, Athens, GA, USA
L. Ramaswamy , Dept. of Comput. Sci., Univ. of Georgia, Athens, GA, USA
J. A. Miller , Dept. of Comput. Sci., Univ. of Georgia, Athens, GA, USA
pp. 567-574

Delta extraction optimization for view maintenance in a limited collaborative environment (PDF)

Zheng Lu , School of IT and Computer Science, University of Wollongong, Australia
Haijun Liu , Department of Mathematics, Zhengzhou University, China, 450052
Peter Hyland , School of IT and Computer Science, University of Wollongong, Australia
pp. 575-582

Biologically-inspired network “memory” for smarter networking (PDF)

Bassem Mokhtar , The Bradley Department of Electrical and Computer Engineering, Virginia Tech, USA
Mohamed Eltoweissy , Department of Computer Science and Engineering, Egypt-Japan University of Science and Technology, Alexandria, Egypt
pp. 583-590

Efficient processing of models for large-scale shotgun proteomics data (Abstract)

H. Grover , Dept. of Biomed. Inf., Univ. of Pittsburgh, Pittsburgh, PA, USA
V. Gopalakrishnan , Dept. of Biomed. Inf., Univ. of Pittsburgh, Pittsburgh, PA, USA
pp. 591-596

Robust Decision Engineering: Collaborative Big Data and its application to international development/aid (Abstract)

S. Chan , MIT Int. Dev. Initiative, Massachusetts Inst. of Technol., Cambridge, MA, USA
W. Rhodes , MIT Int. Dev. Initiative, Massachusetts Inst. of Technol., Cambridge, MA, USA
C. Atencio , MIT Int. Dev. Initiative, Massachusetts Inst. of Technol., Cambridge, MA, USA
C. Kuo , MIT Int. Dev. Initiative, Massachusetts Inst. of Technol., Cambridge, MA, USA
B. Ranalli , MIT Int. Dev. Initiative, Massachusetts Inst. of Technol., Cambridge, MA, USA
A. Miao , MIT Int. Dev. Initiative, Massachusetts Inst. of Technol., Cambridge, MA, USA
S. Sala , MIT Int. Dev. Initiative, Massachusetts Inst. of Technol., Cambridge, MA, USA
S. Serene , MIT Int. Dev. Initiative, Massachusetts Inst. of Technol., Cambridge, MA, USA
R. Helbling , MIT Int. Dev. Initiative, Massachusetts Inst. of Technol., Cambridge, MA, USA
S. Rumbley , MIT Int. Dev. Initiative, Massachusetts Inst. of Technol., Cambridge, MA, USA
M. Clement , Inst. of Life Sci., Swansea Univ., Swansea, UK
L. Sokol , Software Group, IBM Fed., Bethesda, MD, USA
L. Gary , Center for Public Leadership, Harvard Kennedy Sch., Cambridge, MA, USA
pp. 597-604

Where will I go next?: Predicting future categorical check-ins in Location Based Social Networks (Abstract)

V. Kounev , Telecommun. PhD Program, Univ. of Pittsburgh, Pittsburgh, PA, USA
pp. 605-610

Using gamification in an online community (PDF)

Sanat Kumar Bista , CSIRO ICT Centre, ANU Campus, North Rd, Canberra, Australia
Surya Nepal , CSIRO ICT Centre, Cnr Pembroke and Vimiera Rds, Marsfield NSW, 2122 Australia
Nathalie Colineau , CSIRO ICT Centre, Cnr Pembroke and Vimiera Rds, Marsfield NSW, 2122 Australia
Cecile Paris , CSIRO ICT Centre, Cnr Pembroke and Vimiera Rds, Marsfield NSW, 2122 Australia
pp. 611-618

Preservation of structural properties in anonymized social networks (Abstract)

T. M. Truta , Dept. of Comput. Sci., Northern Kentucky Univ., Highland Heights, KY, USA
A. Campan , Dept. of Comput. Sci., Northern Kentucky Univ., Highland Heights, KY, USA
A. L. Ralescu , Dept. of Comput. Sci., Univ. of Cincinnati, Cincinnati, OH, USA
pp. 619-627

Game theoretical analysis of collaborative social applications (Abstract)

A. Al-Dhanhani , Etisalat BT Innovation Centre, Abu Dhabi, United Arab Emirates
R. Mizouni , Khalifa Univ. of Sci., Technol. & Res., Abu Dhabi, United Arab Emirates
H. Otrok , Khalifa Univ. of Sci., Technol. & Res., Abu Dhabi, United Arab Emirates
A. Al-Rubai , Etisalat BT Innovation Centre, Abu Dhabi, United Arab Emirates
pp. 628-634

Spontaneous organizations: Collaborative computing model of a networked organization (Abstract)

S. Alqithami , Comput. Sci. Dept., Southern Illinois Univ., Carbondale, IL, USA
H. Hexmoor , Comput. Sci. Dept., Southern Illinois Univ., Carbondale, IL, USA
pp. 643-650

Detecting review spam: Challenges and opportunities (PDF)

Yingying Ma , Department of Electrical Engineering and Computer Science, The University of Kansas, Lawrence, 66045, USA
Fengjun Li , Department of Electrical Engineering and Computer Science, The University of Kansas, Lawrence, 66045, USA
pp. 651-654

CyberX: A biologically-inspired platform for cyber trust management (PDF)

Mohamed Azab , The Bradley Department of Electrical, and Computer Engineering, Virginia Tech, USA
Mohamed Eltoweissy1 , Egypt-Japan University of Science and Technology, Egypt
pp. 655-663

Reputation management in crowdsourcing systems (Abstract)

M. Allahbakhsh , Univ. of New South Wales, Sydney, NSW, Australia
A. Ignjatovic , Univ. of New South Wales, Sydney, NSW, Australia
B. Benatallah , Univ. of New South Wales, Sydney, NSW, Australia
S. Beheshti , Univ. of New South Wales, Sydney, NSW, Australia
E. Bertino , Purdue Univ., West Lafayette, IN, USA
N. Foo , Univ. of New South Wales, Sydney, NSW, Australia
pp. 664-671

Reputation objects for interoperable reputation exchange: Implementation and design decisions (Abstract)

R. Alnemr , Hasso Plattner Inst., Potsdam Univ., Potsdam, Germany
C. Meinel , Hasso Plattner Inst., Potsdam Univ., Potsdam, Germany
pp. 672-680

Method for two dimensional honeypot in a web application (Abstract)

N. Nassar , IBM, Somers, NY, USA
G. Miller , IBM, Arvada, CO, USA
pp. 681-686

Similarity analysis of shellcodes in drive-by download attack kits (Abstract)

M. Cherukuri , Comput. Sci., New Mexico Inst. of Min. & Technol., Socorro, NM, USA
S. Mukkamala , Comput. Sci., New Mexico Inst. of Min. & Technol., Socorro, NM, USA
Dongwan Shin , Comput. Sci., New Mexico Inst. of Min. & Technol., Socorro, NM, USA
pp. 687-694

Towards improving browser extension permission management and user awareness (Abstract)

S. Marouf , Dept. of Software & Inf. Syst., Univ. of North Carolina at Charlotte, Charlotte, NC, USA
M. Shehab , Dept. of Software & Inf. Syst., Univ. of North Carolina at Charlotte, Charlotte, NC, USA
pp. 695-702

Fast semantic Attribute-Role-Based Access Control (ARBAC) in a collaborative environment (Abstract)

L. Obrst , MITRE Corp., McLean, VA, USA
D. McCandless , MITRE Corp., Colorado Springs, CO, USA
D. Ferrell , MITRE Corp., McLean, VA, USA
pp. 703-710

Secure sharing of electronic health records in clouds (PDF)

Ruoyu Wu , Arizona State University, USA
Gail-Joon Ahn , Arizona State University, USA
Hongxin Hu , Delaware State University, USA
pp. 711-718

L2TAP+SCIP: An audit-based privacy framework leveraging Linked Data (Abstract)

R. Samavi , Inf. Eng., Univ. of Toronto, Toronto, ON, Canada
M. P. Consens , Inf. Eng., Univ. of Toronto, Toronto, ON, Canada
pp. 719-726

Knowedge-based policy conflict analysis for collabrative workspace (PDF)

Zhengping Wu , Department of Computer Science and Engineering, University of Bridgeport, 221 University Avenue, CT 06604, USA
Yuanyao Liu , Department of Computer Science and Engineering, University of Bridgeport, 221 University Avenue, CT 06604, USA
pp. 727-734
86 ms
(Ver 3.3 (11022016))