2012 International Conference on Collaboration Technologies and Systems (CTS)最新文献

筛选
英文 中文
A Cellular Automaton based Network Diffusion model: Preparation for more scalable Viral Marketing 基于元胞自动机的网络扩散模型:为更可扩展的病毒式营销做准备
2012 International Conference on Collaboration Technologies and Systems (CTS) Pub Date : 2012-05-21 DOI: 10.1109/CTS.2012.6261068
Yin Guisheng, Wei Jijie, Dong Hongbin
{"title":"A Cellular Automaton based Network Diffusion model: Preparation for more scalable Viral Marketing","authors":"Yin Guisheng, Wei Jijie, Dong Hongbin","doi":"10.1109/CTS.2012.6261068","DOIUrl":"https://doi.org/10.1109/CTS.2012.6261068","url":null,"abstract":"Nowadays, social network web sites are becoming increasingly popular. Accordingly, viral marketing which aimed to promote products in social network received more and more attention. The Network Diffusion model describes how information or influence is propagated in a social network. It is of great importance to the viral marketing/influence maximization problem. However, there are two challenges: first, how to build the diffusion model so as to simulate the diffusion process better, and second, how improve the efficiency of the diffusion model so that it can be applied to more scalable viral marketing problems. To tackle these two problems, we proposed a Cellular Automaton based Network Diffusion (CAND) model. We also proved that the CAND model is equivalent to the Linear Threshold (LT) model under certain conditions. Moreover, the model is realized and a speed up method is used so as to improve the efficiency of the model. Experiments show that compared with the LT model, our model is much more efficient on four real life social network datasets, indicating a better scalability for Viral Marketing.","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115504109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Topological analysis of proteomic data 蛋白质组学数据的拓扑分析
2012 International Conference on Collaboration Technologies and Systems (CTS) Pub Date : 2012-05-21 DOI: 10.1109/CTS.2012.6261006
David Gnabasik, G. Alaghband
{"title":"Topological analysis of proteomic data","authors":"David Gnabasik, G. Alaghband","doi":"10.1109/CTS.2012.6261006","DOIUrl":"https://doi.org/10.1109/CTS.2012.6261006","url":null,"abstract":"Cells become unregulated because topological properties of their interactive behavior make it impossible for them to be regulated. To explore this hypothesis, 2-D PAGE gel electrophoresis protein concentration assay data is embedded and analyzed within a topological computing framework. These 2-D PAGE data are produced using protocols that are standardized, established and widely used. These data are also precise, specific and reliably calibrated alongside an internal reference standard, making the data readily comparable. Importantly, protein concentration data preserve the influence of local interactions, which makes possible a topological analysis. Protein behavior models are developed from longitudinal studies of changes in protein sample concentrations. Continuous variations in protein interactive behavior and their rates of change are shown to produce discontinuous phase shifts in protein concentrations. Preliminary data indicate that a topological analysis of protein data from cancerous cells expose discontinuities in protein behavior space.","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125534668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new cooperative architecture for sharing services managed by secure elements controlled by android phones with IP objects 一种新的合作架构,用于共享由android手机控制的安全元素与IP对象管理的服务
2012 International Conference on Collaboration Technologies and Systems (CTS) Pub Date : 2012-05-21 DOI: 10.1109/CTS.2012.6261084
P. Urien, Christophe Kiennert
{"title":"A new cooperative architecture for sharing services managed by secure elements controlled by android phones with IP objects","authors":"P. Urien, Christophe Kiennert","doi":"10.1109/CTS.2012.6261084","DOIUrl":"https://doi.org/10.1109/CTS.2012.6261084","url":null,"abstract":"In this paper we present a new cooperative architecture that aims at sharing services managed by secure elements. Smartphones such as Android mobiles include IP resources and support several kinds of secure elements (SIM module, removable SD memory, external NFC smartcard…). These devices typically host payment or access control services. Because users often own multiple IP objects such as laptops or tablets, we have designed a new protocol named MobileSE whose goal is to remotely and securely use these services via the intranet communication (typically Wi-Fi) means. We present a use case in which, an OPENID service hosted in a contactless smartcard, feed and controlled by an Android phone, is exported towards a laptop.","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121997255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Combining decentralized collaborative filtering on PDAs with multi-touch tabletops for group recommendation 将pda上的分散协同过滤与多点触控桌面相结合,实现群组推荐
2012 International Conference on Collaboration Technologies and Systems (CTS) Pub Date : 2012-05-21 DOI: 10.1109/CTS.2012.6261110
W. Wörndl, M. Frieß
{"title":"Combining decentralized collaborative filtering on PDAs with multi-touch tabletops for group recommendation","authors":"W. Wörndl, M. Frieß","doi":"10.1109/CTS.2012.6261110","DOIUrl":"https://doi.org/10.1109/CTS.2012.6261110","url":null,"abstract":"We have designed and implemented an approach based on decentralized, item-based collaborative filtering to recommend items on Personal Digital Assistants (PDAs). The system exchanges rating vectors among the mobile devices, computes local matrices of item similarity and utilizes them to generate recommendations. In addition, our approach incorporates recommendations for groups of users that are present at a public shared display in a collocated setting. This system can be extended with interaction on a multi-touch tabletop to improve group recommendations using critique-based recommender techniques.","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121590527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Architecture and measured characteristics of a cloud based internet of things 基于云的物联网的架构和测量特征
2012 International Conference on Collaboration Technologies and Systems (CTS) Pub Date : 2012-05-21 DOI: 10.1109/CTS.2012.6261020
Geoffrey Fox, Supun Kamburugamuve, Ryan D. Hartman
{"title":"Architecture and measured characteristics of a cloud based internet of things","authors":"Geoffrey Fox, Supun Kamburugamuve, Ryan D. Hartman","doi":"10.1109/CTS.2012.6261020","DOIUrl":"https://doi.org/10.1109/CTS.2012.6261020","url":null,"abstract":"The Internet of Things (IoT) many be thought of as the availability of physical objects, or devices, on the Internet [1]. Given such an arrangement it is possible to access sensor data and control actuators remotely. Furthermore such data may be combined with data from other sources - e.g. with data that is contained in the Web - or operated on by cloud based services to create applications far richer than can be provided by isolated embedded systems [2,3]. This is the vision of the Internet of Things. We present a cloud-compatible open source controller and an extensible API, hereafter referred to as `IoTCloud', which enables developers to create scalable high performance IoT and sensor-centric applications. The IoTCloud software is written in Java and built on popular open source packages such as Apache Active MQ [4] and JBoss Netty [5]. We present an overview of the IoT Cloud architecture and describe its developer API. Next we introduce the FutureGrid - a geographically distributed and heterogeneous cloud test-bed [6,7] - used in our experiments. Our preliminary results indicate that a distributed cloud infrastructure like the FutureGrid coupled with our flexible IoTCloud framework is an environment suitable for the study and development of IoT and sensor-centric applications. We also report on our initial study of certain measured characteristics of an IoTCloud application running on the FutureGrid. We conclude by inviting interested parties to use the IoTCloud to create their own IoT applications or contribute to its further development.","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115876532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 143
A platform for collaborative and distributed KDD process design 协作和分布式KDD过程设计的平台
2012 International Conference on Collaboration Technologies and Systems (CTS) Pub Date : 2012-05-21 DOI: 10.1109/CTS.2012.6261118
C. Diamantini, D. Potena, Emanuele Storti
{"title":"A platform for collaborative and distributed KDD process design","authors":"C. Diamantini, D. Potena, Emanuele Storti","doi":"10.1109/CTS.2012.6261118","DOIUrl":"https://doi.org/10.1109/CTS.2012.6261118","url":null,"abstract":"Knowledge Discovery in Databases (KDD) is a complex and computationally intensive process aimed at extracting knowledge from large amounts of data. To provide effective support to users, especially non-experts, in this work we propose a knowledge-centric platform specifically aimed at supporting collaborative design of KDD processes in distributed environments.","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132323341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A paradigm shift is coming - continuous failure 一种模式的转变即将到来——持续的失败
2012 International Conference on Collaboration Technologies and Systems (CTS) Pub Date : 2012-05-21 DOI: 10.1109/CTS.2012.6261077
A. Geist
{"title":"A paradigm shift is coming - continuous failure","authors":"A. Geist","doi":"10.1109/CTS.2012.6261077","DOIUrl":"https://doi.org/10.1109/CTS.2012.6261077","url":null,"abstract":"Resilience is a measure of the ability of a computing system and its applications to continue working in the presence of system degradations and failures. This talk presents the factors that are driving an exponential increase in system fault rate. At the rate of increase, if the hardware and software are not fault tolerant at Exascale, then even relatively short-lived applications are unlikely to finish; or worse, the applications may complete with incorrect results. New paradigms must be developed for handling faults within both the system software and user applications. Also presented are new approaches for integrating detection algorithms in both the hardware and software and new techniques to help simulations adapt to faults.","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128833613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An environmental paradigm for defending security protocols 保护安全协议的环境范例
2012 International Conference on Collaboration Technologies and Systems (CTS) Pub Date : 2012-05-21 DOI: 10.1109/CTS.2012.6261087
M. Fiazza, Michele Peroli, L. Viganò
{"title":"An environmental paradigm for defending security protocols","authors":"M. Fiazza, Michele Peroli, L. Viganò","doi":"10.1109/CTS.2012.6261087","DOIUrl":"https://doi.org/10.1109/CTS.2012.6261087","url":null,"abstract":"In scenarios with multiple non-collaborating attackers, interference between simultaneous attack procedures can emerge. Interference has a wide range of consequences: it demands network models capable of supporting concurrence, it marks an unexpected complexity of the network environment, it can be exploited to construct partial defenses for vulnerable security protocols. In this paper, we describe a paradigm shift to support the investigation of interference with applications to constructing executable defenses for vulnerable protocols. We recruit tools from fields, such as AI and robotics, that have a suitably complex notion of agent, introduce a mechanism for the controlled execution of a protocol run and formalize it in terms of labeled transition systems. Finally, we show how the general problem of constructing defenses can be addressed systematically within the paradigm.","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127503458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A multi-modal intelligent user interface for supervisory control of unmanned platforms 用于无人驾驶平台监控的多模态智能用户界面
2012 International Conference on Collaboration Technologies and Systems (CTS) Pub Date : 2012-05-21 DOI: 10.1109/CTS.2012.6261037
Glenn Taylor, Rich Frederiksen, J. Crossman, Michael Quist, Patrick Theisen
{"title":"A multi-modal intelligent user interface for supervisory control of unmanned platforms","authors":"Glenn Taylor, Rich Frederiksen, J. Crossman, Michael Quist, Patrick Theisen","doi":"10.1109/CTS.2012.6261037","DOIUrl":"https://doi.org/10.1109/CTS.2012.6261037","url":null,"abstract":"Typical human-robot interaction (HRI) is through tele-operation or point-and-click interfaces that require extensive training to become proficient and require the user's complete attention to operate. For unmanned platforms to reach their full potential, users must be able to exert supervisory control over those platforms. This requires more effective means of communication in both directions, including high-level commands given to the vehicle and meaningful feedback to the user. Our aim is to reduce the training requirements and workload needed to interact with unmanned systems effectively and to raise the level of user interaction with these systems so that supervisory control is possible. In this paper we describe an intelligent user interface, called the Smart Interaction Device (SID) that facilitates a dialogue between the user and the unmanned platform. SID works with the user to understand the user's intent, including asking any clarification questions. Once an understanding is established, SID translates that intent into the language of the platform. SID also monitors the platform's progress in order to give feedback to the user about status or problems that arise. We have incorporated multiple input modalities, including speech, gesture, and sketch as natural ways for a user to communicate with unmanned platforms. SID also provides multiple modes of feedback, including graphics, video and speech. We describe SID's architecture and some examples of its application in different domains.","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129112031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A group-centric model for collaboration with expedient insiders in multilevel systems 在多层系统中与权宜之计内部人员协作的以组为中心的模型
2012 International Conference on Collaboration Technologies and Systems (CTS) Pub Date : 2012-05-21 DOI: 10.1109/CTS.2012.6261086
K. Bijon, R. Sandhu, R. Krishnan
{"title":"A group-centric model for collaboration with expedient insiders in multilevel systems","authors":"K. Bijon, R. Sandhu, R. Krishnan","doi":"10.1109/CTS.2012.6261086","DOIUrl":"https://doi.org/10.1109/CTS.2012.6261086","url":null,"abstract":"An authorization model for group-centric organizational collaboration has been recently proposed wherein multiple organizations may collaborate via groups [3]. Each group is independent of all others and adheres to the formal semantics of Group-Centric Secure Information Sharing models (g-SIS) [2], [4]. Motivated by [3], in this paper, we develop a model for group-centric collaboration in which an organization forms groups to collaborate with outside consultants on specific projects. A core principle is that such outsiders cannot fit in the existing organizational access control structure as they are not “true insiders” but rather “expedient insiders.” In our proposed model, each group duplicates the organizational access control structure in an identical but separate copy—initially without any assignment of users or objects. The group is then populated and maintained by bringing selected true insiders, expedient insiders, and objects together to enable collaboration. The formal model consists of administrative and operational parts covering the complete life-cycle. While the general concepts are applicable regardless of the specific models used for the organizational access control structure, to be concrete we consider the specific case of multilevel systems that enforce lattice-based access control [7].","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130862439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信