9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing最新文献

筛选
英文 中文
Organizations preparing organizations for the IoT: The congruence of the IoT meme 为物联网做准备的组织:物联网模因的一致性
9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing Pub Date : 2013-12-12 DOI: 10.4108/ICST.COLLABORATECOM.2013.254140
Kelly T. Slaughter, G. Baweja
{"title":"Organizations preparing organizations for the IoT: The congruence of the IoT meme","authors":"Kelly T. Slaughter, G. Baweja","doi":"10.4108/ICST.COLLABORATECOM.2013.254140","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254140","url":null,"abstract":"While the Internet of Things (IoT) has significant economic promise, an obstacle to its rapid adoption is the development of a shared understanding of capabilities and purpose. As the IoT concerns the transformation of everyday products, organizations that have limited expertise in computing and networking technologies still have the need to understand IoT possibilities. In addition, if these organizations collectively select a similar IoT strategic direction, more value will be created for society on the whole. Recognizing this dilemma, technical organizations are taking the initiative to enhance their clients and potential clients' IoT understanding as it relates to opportunities with their products. In this paper we model this interorganizational learning as it relates to reaching a consensus on IoT purpose and briefly identify real world practices that technical organizations are undertaking to facilitate this transformation.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"533 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123045176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-intrusive process-based monitoring system to mitigate and prevent VM vulnerability explorations 非侵入式的基于进程的监控系统,以减轻和防止VM漏洞的探索
9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing Pub Date : 2013-12-12 DOI: 10.4108/ICST.COLLABORATECOM.2013.254107
Chun-Jen Chung, Jingsong Cui, Pankaj Khatkar, Dijiang Huang
{"title":"Non-intrusive process-based monitoring system to mitigate and prevent VM vulnerability explorations","authors":"Chun-Jen Chung, Jingsong Cui, Pankaj Khatkar, Dijiang Huang","doi":"10.4108/ICST.COLLABORATECOM.2013.254107","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254107","url":null,"abstract":"Cloud is gaining momentum but its true potential is hampered by the security concerns it has raised. Having vulnerable virtual machines in a virtualized environment is one such concern. Vulnerable virtual machines are an easy target and existence of such weak nodes in a network jeopardizes its entire security structure. Resource sharing nature of cloud favors the attacker, in that, compromised machines can be used to launch further devastating attacks. First line of defense in such case is to prevent vulnerabilities of a cloud network from being compromised and if not, to prevent propagation of the attack. To create this line of defense, we propose a hybrid intrusion detection framework to detect vulnerabilities, attacks, and their carriers, i.e. malicious processes in the virtual network and virtual machines. This framework is built on attack graph based analytical models, VMM-based malicious process detection, and reconfigurable virtual network-based countermeasures. The proposed framework leverages Software Defined Networking to build a monitor and control plane over distributed programmable virtual switches in order to significantly improve the attack detection and mitigate the attack consequences. The system and security evaluations demonstrate the efficiency and effectiveness of the proposed solution.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"26 16","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133170318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
MapReduce-guided scalable compressed dictionary construction for evolving repetitive sequence streams mapreduce引导的可扩展压缩字典构建,用于不断发展的重复序列流
9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing Pub Date : 2013-12-12 DOI: 10.4108/ICST.COLLABORATECOM.2013.254135
P. Parveen, Pratik Desai, B. Thuraisingham, L. Khan
{"title":"MapReduce-guided scalable compressed dictionary construction for evolving repetitive sequence streams","authors":"P. Parveen, Pratik Desai, B. Thuraisingham, L. Khan","doi":"10.4108/ICST.COLLABORATECOM.2013.254135","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254135","url":null,"abstract":"Users' repetitive daily or weekly activities may constitute user profiles. For example, a user's frequent command sequences may represent normative pattern of that user. To find normative patterns over dynamic data streams of unbounded length is challenging. For this, an unsupervised learning approach is proposed in our prior work by exploiting a compressed/quantized dictionary to model common behavior sequences. This work suffers scalability issues. Hence, in this paper, we propose and implement a MapReduce-based framework to construct a quantized dictionary. We show effectiveness of our distributed parallel solution on a benchmark dataset.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"368 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133081030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Social team awareness 社会团队意识
9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing Pub Date : 2013-12-12 DOI: 10.4108/ICST.COLLABORATECOM.2013.254087
Delfina Malandrino, I. Manno, A. Negro, Andrea Petta, V. Scarano, Luigi Serra
{"title":"Social team awareness","authors":"Delfina Malandrino, I. Manno, A. Negro, Andrea Petta, V. Scarano, Luigi Serra","doi":"10.4108/ICST.COLLABORATECOM.2013.254087","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254087","url":null,"abstract":"Software that is meant to support collaboration is mostly developed “ad hoc”, placing some additional overhead to users, that are required to integrate the common work practices, realized with the traditional software applications, with the new collaborative features offered by the new application. It has been argued that this is likely to inject lack of motivation on users, jeopardizing the positive effects of collaboration in workplace, since the time dedicated to collaboration is perceived as wasted. In this paper we present a generic mechanism to provide team awareness through the integration between a social platform and a work environment. The integration mechanism is, indeed, generic and the work environment potentially can be any kind of application usually adopted by team members. We illustrate the mechanism through the design and implementation of SocSVN, a proof-of-concept example in the scenario of collaboration support in software development. SocSVN integrates a social platform (Elgg, a well known open source social networking engine) with SVN, a source code versioning system widely used in software development. We also abstract the mechanism provided and show how it is easily generalizable to other software, providing a list of the requirements and the amount of work to be integrated in the architecture.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132465825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Modeling privacy settings of an online social network from a game-theoretical perspective 基于博弈论的在线社交网络隐私设置建模
9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing Pub Date : 2013-12-12 DOI: 10.4108/ICST.COLLABORATECOM.2013.254054
Jundong Chen, Matthias R. Brust, Ankunda R. Kiremire, V. Phoha
{"title":"Modeling privacy settings of an online social network from a game-theoretical perspective","authors":"Jundong Chen, Matthias R. Brust, Ankunda R. Kiremire, V. Phoha","doi":"10.4108/ICST.COLLABORATECOM.2013.254054","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254054","url":null,"abstract":"Users of online social networks are often required to adjust their privacy settings because of frequent changes in the users' connections as well as occasional changes in the social network's privacy policy. In this paper, we specifically model the user's behavior in the disclosure of user attributes in a possible social network from a game-theoretic perspective by introducing a weighted evolutionary game. We analyze the influence of attribute importance and network topology on the user's behavior in selecting privacy settings. Results show that users are more likely to reveal their most important attributes than less important attributes regardless of the risk. Results also show that the network topology exhibits a considerable effect on the privacy in a risk-included environment but a limited effect in a risk-free environment. The provided models and the gained results can be used to understand the influence of different factors on users' privacy choices.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123291254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A capability requirements approach for predicting worker performance in crowdsourcing 预测众包中员工绩效的能力需求方法
9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing Pub Date : 2013-12-12 DOI: 10.4108/ICST.COLLABORATECOM.2013.254181
U. Hassan, E. Curry
{"title":"A capability requirements approach for predicting worker performance in crowdsourcing","authors":"U. Hassan, E. Curry","doi":"10.4108/ICST.COLLABORATECOM.2013.254181","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254181","url":null,"abstract":"Assigning heterogeneous tasks to workers is an important challenge of crowdsourcing platforms. Current approaches to task assignment have primarily focused on content-based approaches, qualifications, or work history. We propose an alternative and complementary approach that focuses on what capabilities workers employ to perform tasks. First, we model various tasks according to the human capabilities required to perform them. Second, we capture the capability traces of the crowd workers performance on existing tasks. Third, we predict performance of workers on new tasks to make task routing decisions, with the help of capability traces. We evaluate the effectiveness of our approach on three different tasks including fact verification, image comparison, and information extraction. The results demonstrate that we can predict worker's performance based on worker capabilities. We also highlight limitations and extensions of the proposed approach.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124859702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Towards context-aware recommendations: Strategies for exploiting multi-criteria communities 面向上下文感知的建议:利用多标准社区的策略
9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing Pub Date : 2013-12-12 DOI: 10.4108/ICST.COLLABORATECOM.2013.254105
T. Nguyen, A. Nguyen
{"title":"Towards context-aware recommendations: Strategies for exploiting multi-criteria communities","authors":"T. Nguyen, A. Nguyen","doi":"10.4108/ICST.COLLABORATECOM.2013.254105","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254105","url":null,"abstract":"Nowadays, recommender systems are becoming popular since they help users alleviate the information overload problem by offering personalized recommendations. Most systems apply collaborative filtering to predict individual preferences based on opinions of like-minded people through their ratings on items. Recently, context-aware recommender systems (CARSs) exploit additional context data such as time, place and so on for providing better recommendations. However, the large majority of CARSs use only ratings as a criterion for building communities, and ignore other available data allowing users to be grouped into communities. In this paper, we present a novel approach for exploiting multi-criteria communities to generate context-aware recommendations. The underlying idea of three proposed algorithms CRMC, CRESC and CREOC is that for each context, communities from the most suitable criteria followed by the learning phase are incorporated into the recommendation process. Experimental results show that our approach can improve the quality of recommendations.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116631814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Impact of mediating technologies on talk and emotion: Questioning “commonsense” 中介技术对谈话和情绪的影响:对“常识”的质疑
9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing Pub Date : 2013-12-12 DOI: 10.4108/ICST.COLLABORATECOM.2013.254047
Joon-Suk Lee, D. Tatar
{"title":"Impact of mediating technologies on talk and emotion: Questioning “commonsense”","authors":"Joon-Suk Lee, D. Tatar","doi":"10.4108/ICST.COLLABORATECOM.2013.254047","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254047","url":null,"abstract":"Much CSCW research predominantly focuses on investigating how distributed, mediated interactions are different from collocated interactions, but rarely looks at how the use of technologies affect collocated people. We argue that the needs for studying the impact of mediating technologies among collocated people are current and large. A situation of seeing the other but not being able to see what captures his/her attention is endemic. In this paper, we investigate collocated triads as they play a collaborative, problem-solving game on laptops, on tablets or on a shared paper. People's positive emotion rose more when they talked about the complex relationships of the puzzle specifics and added new perspectives to other people's contributions during the game. People in computer conditions talked less about the specifics on the game board than people in the paper condition, but only people in the laptop condition experienced a significant decrease in positive emotion.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"1989 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125495772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Click traffic analysis of short URL spam on Twitter Twitter短URL垃圾点击流量分析
9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing Pub Date : 2013-12-12 DOI: 10.4108/ICST.COLLABORATECOM.2013.254084
De Wang, S. Navathe, Ling Liu, Danesh Irani, Acar Tamersoy, C. Pu
{"title":"Click traffic analysis of short URL spam on Twitter","authors":"De Wang, S. Navathe, Ling Liu, Danesh Irani, Acar Tamersoy, C. Pu","doi":"10.4108/ICST.COLLABORATECOM.2013.254084","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254084","url":null,"abstract":"With an average of 80% length reduction, the URL shorteners have become the norm for sharing URLs on Twitter, mainly due to the 140-character limit per message. Unfortunately, spammers have also adopted the URL shorteners to camouflage and improve the user click-through of their spam URLs. In this paper, we measure the misuse of the short URLs and analyze the characteristics of the spam and non-spam short URLs. We utilize these measurements to enable the detection of spam short URLs. To achieve this, we collected short URLs from Twitter and retrieved their click traffic data from Bitly, a popular URL shortening system. We first investigate the creators of over 600,000 Bitly short URLs to characterize short URL spammers. We then analyze the click traffic generated from various countries and referrers, and determine the top click sources for spam and non-spam short URLs. Our results show that the majority of the clicks are from direct sources and that the spammers utilize popular websites to attract more attention by cross-posting the links. We then use the click traffic data to classify the short URLs into spam vs. non-spam and compare the performance of the selected classifiers on the dataset. We determine that the Random Tree algorithm achieves the best performance with an accuracy of 90.81% and an F-measure value of 0.913.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125583167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 79
Improving textual merge result 改进文本合并结果
9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing Pub Date : 2013-12-12 DOI: 10.4108/ICST.COLLABORATECOM.2013.254103
Mehdi Ahmed-Nacer, Pascal Urso, F. Charoy
{"title":"Improving textual merge result","authors":"Mehdi Ahmed-Nacer, Pascal Urso, F. Charoy","doi":"10.4108/ICST.COLLABORATECOM.2013.254103","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254103","url":null,"abstract":"In asynchronous collaborative systems, merging is an essential component. It allows to reconcile modifications made concurrently as well as managing software change through branching. The collaborative system is in charge to propose a merge result that includes user's modifications. The users now have to check and adapt this result. The adaptation should be as effort-less as possible, otherwise, the users may get frustrated and will quit the collaboration. The objective of this paper is to improve the result quality of the textual merge tool that constitutes the default merge tool of distributed version control systems. The basic idea is to study the behavior of the concurrent modifications during merge procedure. We identified when the existing merge techniques under-perform, and we propose solutions to improve the quality of the merge. We finally compare with the traditional merge tool through a large corpus of collaborative editing.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123698396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信