2012 International Conference on Collaboration Technologies and Systems (CTS)最新文献

筛选
英文 中文
CTS 2012 tutorials CTS 2012教程
2012 International Conference on Collaboration Technologies and Systems (CTS) Pub Date : 2012-05-21 DOI: 10.1109/CTS.2012.6261013
Mohamed Hamdi, A. Jayasumana, K. Thirunarayan, Pramod Anatharam, Cory Henson, Amit P. Sheth, S. Kristoffersen, Rosta Farzan, Christopher Amato, S. Semwal, George Mudrak, Michael Bolei
{"title":"CTS 2012 tutorials","authors":"Mohamed Hamdi, A. Jayasumana, K. Thirunarayan, Pramod Anatharam, Cory Henson, Amit P. Sheth, S. Kristoffersen, Rosta Farzan, Christopher Amato, S. Semwal, George Mudrak, Michael Bolei","doi":"10.1109/CTS.2012.6261013","DOIUrl":"https://doi.org/10.1109/CTS.2012.6261013","url":null,"abstract":"These keynote speeches discuss the following: security of cloud computing, storage, and networking; P2P networks: file sharing to collaborative computing and data fusion; trust networks; collaborative document management and knowledge work; socialization of newcomers in online communities; models of coordination in multiagent decision making; introduction to complexity in collaborative environments.","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"264 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115940689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Information propagation through a dependency network model 通过依赖网络模型进行信息传播
2012 International Conference on Collaboration Technologies and Systems (CTS) Pub Date : 2012-05-21 DOI: 10.1109/CTS.2012.6261059
B. Drabble
{"title":"Information propagation through a dependency network model","authors":"B. Drabble","doi":"10.1109/CTS.2012.6261059","DOIUrl":"https://doi.org/10.1109/CTS.2012.6261059","url":null,"abstract":"Central to any collaboration problem are the twin issues of firstly understanding what information needs to be communicated and secondly what are the methods or information conduits through which the information needs to pass. For example, what information is key to the capabilities of an insurgent network, which has the information and how is it communicated to the others within and without the network. The same analysis can be applied to the FEMA and other emergency response networks established in the aftermath of events such as Hurricane Katrina and 9/11 where there was a need to understand what information was available, how it could be communicated and what the effect of proposed changes would be across the networks. This paper describes a dependency based network model which allows the explicit modeling of information/knowledge content, the conduits through which information passes, and the impact on the inter-dependent network of people, organizations, locations, resources and concepts if the content or the conduits are modified. The dependency model handles both quantitative and qualitative node outputs enabling it to identify the key dependent nodes and information content within the network. This analysis allows the development of Plan Models which capture the changes required in the network to bring about desired effects. Plan Models identify the mechanisms and/or resources that should be used to bring about the desired effects either directly by affecting a node outputs or indirectly by affecting the outputs of the nodes they are dependent upon. An example taken from a counter insurgency scenario is used to illustrate the benefits of the approach and range and scope of its applicability.","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116219981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Using sentiment analysis to measure the effects of leaders in global software development 使用情感分析来衡量全球软件开发领导者的影响
2012 International Conference on Collaboration Technologies and Systems (CTS) Pub Date : 2012-05-21 DOI: 10.1109/CTS.2012.6261099
I. Brooks, K. Swigger
{"title":"Using sentiment analysis to measure the effects of leaders in global software development","authors":"I. Brooks, K. Swigger","doi":"10.1109/CTS.2012.6261099","DOIUrl":"https://doi.org/10.1109/CTS.2012.6261099","url":null,"abstract":"This study examines the effect of a leader's communication activities on global software development learning teams. Data collected from students' chat histories and forum discussions from two global software development projects were processed and compared. Several quantitative analysis methods were used to determine the differences between leader and leaderless teams. In addition, Linguistic Inquiry and Word Count (LIWC) measures were used to investigate the linguistic features of distributed software teams. The results show that teams with leaders had more communication, performed better, and used different word categories than teams with no leaders. These findings are discussed and their implications for research are described in the paper.","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128081477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Engaging the human in the design of residential energy reduction applications 让人类参与住宅节能应用的设计
2012 International Conference on Collaboration Technologies and Systems (CTS) Pub Date : 2012-05-21 DOI: 10.1109/CTS.2012.6261072
J. Flora, A. Sahoo, Annie Scalmanini, Alexandra Liptsey-Rahe, Shaun Stehly, Brian Wong, Banny Banerjee
{"title":"Engaging the human in the design of residential energy reduction applications","authors":"J. Flora, A. Sahoo, Annie Scalmanini, Alexandra Liptsey-Rahe, Shaun Stehly, Brian Wong, Banny Banerjee","doi":"10.1109/CTS.2012.6261072","DOIUrl":"https://doi.org/10.1109/CTS.2012.6261072","url":null,"abstract":"Most online energy conservation interfaces assume that information provision is sufficient to induce behavior change and energy use reductions. A gap between behavioral theory and field practice partly explains why interfaces have not achieved this goal. In this paper, we describe a research program on human centered interactive interface design that bridges this gap with consumer based investigation of two energy reduction interfaces: Kidogo and Powerbar. Kidogo allows users to donate savings from energy conservation to public goods. In the first study, which examines Kidogo components, we investigate how alternative beneficiaries help users to connect emotionally with saving energy. In our second study, comparing Kidogo and Powerbar interventions, we investigate the ability of affectively and cognitively framed interfaces to persuade individuals to perform conservation behaviors. The first study suggests that interfaces should use negative valence images to establish an emotional connection, and the second provides evidence that affectively framed interfaces promote willingness to perform conservation behaviors.","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127139299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A robust key management scheme with strong connectivity for wireless sensor network 为无线传感器网络提供了一种鲁棒的强连接密钥管理方案
2012 International Conference on Collaboration Technologies and Systems (CTS) Pub Date : 2012-05-21 DOI: 10.1109/CTS.2012.6261049
A. Chaurasia, Utkarsh Dubey, R. K. Ghosh
{"title":"A robust key management scheme with strong connectivity for wireless sensor network","authors":"A. Chaurasia, Utkarsh Dubey, R. K. Ghosh","doi":"10.1109/CTS.2012.6261049","DOIUrl":"https://doi.org/10.1109/CTS.2012.6261049","url":null,"abstract":"In a wireless sensor network (WSN), creating pairwise secure links between resource constrained sensor nodes is a major challenge. In this paper we point out three serious weaknesses, namely, lack of scalability, high memory requirements and vulnerability to node capture attacks in an earlier scheme for designing pair-wise key agreement between any pair of sensor nodes in a WSN proposed by Chien et al. [1]. We develop a new scheme based on Blom's key agreement protocol [2] which is free from the weaknesses mentioned above. Compared to [1], our scheme not only achieves better resilience against the node capture attack, but also requires less memory and at the same time provides more secure accesses to the network. Furthermore, the computational efficiency of the new scheme is comparable to that of [1].","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123640570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Energy efficient round rotation method for a random cluster based WSN 基于随机聚类的WSN节能轮转方法
2012 International Conference on Collaboration Technologies and Systems (CTS) Pub Date : 2012-05-21 DOI: 10.1109/CTS.2012.6261043
Rabia Noor Enam, S. Misbahuddin, Mumtazul Imam
{"title":"Energy efficient round rotation method for a random cluster based WSN","authors":"Rabia Noor Enam, S. Misbahuddin, Mumtazul Imam","doi":"10.1109/CTS.2012.6261043","DOIUrl":"https://doi.org/10.1109/CTS.2012.6261043","url":null,"abstract":"The energy consumed in cluster head (CH) selection phase of a random cluster based wireless sensor network (WSN) has been assumed as an insignificant factor in the previous research works. In this paper, the consumption of energy during the transmission of data from sensor nodes to the sink has been calculated. Through extensive simulations it has been shown that 20% of the network's total consumed energy is exhausted in the random CH selection phase only. This energy consumption can be taken as an overhead energy. To overcome the overhead energy, an energy efficient “Round Rotation” (RR) mechanism has been proposed. By implementing the RR mechanism with random CH selection phase, the over head energy has been reduced to 4% of the total network energy consumed in data transmissions. This has consequently affected the network lifetime which has been augmented by 20%. Keywords-WSN; CH selection phase; overhead energy; efficient energy; Round Rotation method.","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"46 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129236109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Collaborative monitoring and visualization of HPC data HPC数据的协同监控和可视化
2012 International Conference on Collaboration Technologies and Systems (CTS) Pub Date : 2012-05-01 DOI: 10.1109/CTS.2012.6261083
Roselyne B. Tchoua, H. Abbasi, S. Klasky, Qing Liu, N. Podhorszki, D. Pugmire, Yuan Tian, M. Wolf
{"title":"Collaborative monitoring and visualization of HPC data","authors":"Roselyne B. Tchoua, H. Abbasi, S. Klasky, Qing Liu, N. Podhorszki, D. Pugmire, Yuan Tian, M. Wolf","doi":"10.1109/CTS.2012.6261083","DOIUrl":"https://doi.org/10.1109/CTS.2012.6261083","url":null,"abstract":"As simulations begin to scale to extreme processor counts trying to understand the mysteries of the universe, collaboration becomes an essential piece of the scientists' daily life as they work to run, analyze, and process their data from these simulations. Most of the teams that we collaborate with work identically to the way they did in the past, without using effective collaborative tools to share their knowledge with their peers. Collaboration is usually an afterthought, and is often handled in an awkward setting. We believe the best way to introduce collaboration into areas that are resistant by nature is to embed into low level and hidden system components so that scientists collaborate without consciously putting in extra efforts. Based on this hypothesis, this paper presents our work in creating a collaborative system, which allows a diverse set of scientists to work together efficiently. Two of the main aspects of our system are in our use of provenance to associate files and its associated metadata with the information that domain experts are interested in, and an easy-to-use high-performance I/O system which automatically annotates the output file(s) with a unified schema. To accomplish our goals, we leverage an existing I/O framework, ADIOS and an existing web interface, eSiMon, and add new techniques and mechanism to efficiently bring together computation and visualization.","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131911376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cloud calculus: Security verification in elastic cloud computing platform 云计算:弹性云计算平台中的安全验证
2012 International Conference on Collaboration Technologies and Systems (CTS) Pub Date : 2012-05-01 DOI: 10.1109/CTS.2012.6261089
Yosr Jarraya, A. Eghtesadi, M. Debbabi, Y. Zhang, M. Pourzandi
{"title":"Cloud calculus: Security verification in elastic cloud computing platform","authors":"Yosr Jarraya, A. Eghtesadi, M. Debbabi, Y. Zhang, M. Pourzandi","doi":"10.1109/CTS.2012.6261089","DOIUrl":"https://doi.org/10.1109/CTS.2012.6261089","url":null,"abstract":"Cloud orchestration involves cloud resources scaling up and down, management, as well as manipulation to better respond user's requests and to facilitate operational objectives of the service providers. These promote the elastic nature of cloud platform but force upon significant challenges to cloud service providers. Particularly, security issues such as inconsistency may arise while dynamic changes such as virtual machine migration occur. In this paper, we propose a formal framework for the specification of virtual machines migration and security policies updates. This framework enables us to verify that the global security policy after the migration is consistently preserved with respect to the initial one. To this end, we define a new calculus, namely cloud calculus that can be used to specify the topology of a cloud computing system and firewall security rules. It also enables specifying the virtual machines migration along with their security policies. The semantics of our calculus is based on structural congruence and a reduction relation. In order to verify the global security policy within the new configuration, we define a testing equivalence over cloud terms. Finally, we provide an illustrative case study to demonstrate the applicability of our approach.","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115361147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信