{"title":"Organizations preparing organizations for the IoT: The congruence of the IoT meme","authors":"Kelly T. Slaughter, G. Baweja","doi":"10.4108/ICST.COLLABORATECOM.2013.254140","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254140","url":null,"abstract":"While the Internet of Things (IoT) has significant economic promise, an obstacle to its rapid adoption is the development of a shared understanding of capabilities and purpose. As the IoT concerns the transformation of everyday products, organizations that have limited expertise in computing and networking technologies still have the need to understand IoT possibilities. In addition, if these organizations collectively select a similar IoT strategic direction, more value will be created for society on the whole. Recognizing this dilemma, technical organizations are taking the initiative to enhance their clients and potential clients' IoT understanding as it relates to opportunities with their products. In this paper we model this interorganizational learning as it relates to reaching a consensus on IoT purpose and briefly identify real world practices that technical organizations are undertaking to facilitate this transformation.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"533 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123045176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Non-intrusive process-based monitoring system to mitigate and prevent VM vulnerability explorations","authors":"Chun-Jen Chung, Jingsong Cui, Pankaj Khatkar, Dijiang Huang","doi":"10.4108/ICST.COLLABORATECOM.2013.254107","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254107","url":null,"abstract":"Cloud is gaining momentum but its true potential is hampered by the security concerns it has raised. Having vulnerable virtual machines in a virtualized environment is one such concern. Vulnerable virtual machines are an easy target and existence of such weak nodes in a network jeopardizes its entire security structure. Resource sharing nature of cloud favors the attacker, in that, compromised machines can be used to launch further devastating attacks. First line of defense in such case is to prevent vulnerabilities of a cloud network from being compromised and if not, to prevent propagation of the attack. To create this line of defense, we propose a hybrid intrusion detection framework to detect vulnerabilities, attacks, and their carriers, i.e. malicious processes in the virtual network and virtual machines. This framework is built on attack graph based analytical models, VMM-based malicious process detection, and reconfigurable virtual network-based countermeasures. The proposed framework leverages Software Defined Networking to build a monitor and control plane over distributed programmable virtual switches in order to significantly improve the attack detection and mitigate the attack consequences. The system and security evaluations demonstrate the efficiency and effectiveness of the proposed solution.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"26 16","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133170318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Parveen, Pratik Desai, B. Thuraisingham, L. Khan
{"title":"MapReduce-guided scalable compressed dictionary construction for evolving repetitive sequence streams","authors":"P. Parveen, Pratik Desai, B. Thuraisingham, L. Khan","doi":"10.4108/ICST.COLLABORATECOM.2013.254135","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254135","url":null,"abstract":"Users' repetitive daily or weekly activities may constitute user profiles. For example, a user's frequent command sequences may represent normative pattern of that user. To find normative patterns over dynamic data streams of unbounded length is challenging. For this, an unsupervised learning approach is proposed in our prior work by exploiting a compressed/quantized dictionary to model common behavior sequences. This work suffers scalability issues. Hence, in this paper, we propose and implement a MapReduce-based framework to construct a quantized dictionary. We show effectiveness of our distributed parallel solution on a benchmark dataset.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"368 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133081030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Delfina Malandrino, I. Manno, A. Negro, Andrea Petta, V. Scarano, Luigi Serra
{"title":"Social team awareness","authors":"Delfina Malandrino, I. Manno, A. Negro, Andrea Petta, V. Scarano, Luigi Serra","doi":"10.4108/ICST.COLLABORATECOM.2013.254087","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254087","url":null,"abstract":"Software that is meant to support collaboration is mostly developed “ad hoc”, placing some additional overhead to users, that are required to integrate the common work practices, realized with the traditional software applications, with the new collaborative features offered by the new application. It has been argued that this is likely to inject lack of motivation on users, jeopardizing the positive effects of collaboration in workplace, since the time dedicated to collaboration is perceived as wasted. In this paper we present a generic mechanism to provide team awareness through the integration between a social platform and a work environment. The integration mechanism is, indeed, generic and the work environment potentially can be any kind of application usually adopted by team members. We illustrate the mechanism through the design and implementation of SocSVN, a proof-of-concept example in the scenario of collaboration support in software development. SocSVN integrates a social platform (Elgg, a well known open source social networking engine) with SVN, a source code versioning system widely used in software development. We also abstract the mechanism provided and show how it is easily generalizable to other software, providing a list of the requirements and the amount of work to be integrated in the architecture.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132465825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jundong Chen, Matthias R. Brust, Ankunda R. Kiremire, V. Phoha
{"title":"Modeling privacy settings of an online social network from a game-theoretical perspective","authors":"Jundong Chen, Matthias R. Brust, Ankunda R. Kiremire, V. Phoha","doi":"10.4108/ICST.COLLABORATECOM.2013.254054","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254054","url":null,"abstract":"Users of online social networks are often required to adjust their privacy settings because of frequent changes in the users' connections as well as occasional changes in the social network's privacy policy. In this paper, we specifically model the user's behavior in the disclosure of user attributes in a possible social network from a game-theoretic perspective by introducing a weighted evolutionary game. We analyze the influence of attribute importance and network topology on the user's behavior in selecting privacy settings. Results show that users are more likely to reveal their most important attributes than less important attributes regardless of the risk. Results also show that the network topology exhibits a considerable effect on the privacy in a risk-included environment but a limited effect in a risk-free environment. The provided models and the gained results can be used to understand the influence of different factors on users' privacy choices.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123291254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A capability requirements approach for predicting worker performance in crowdsourcing","authors":"U. Hassan, E. Curry","doi":"10.4108/ICST.COLLABORATECOM.2013.254181","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254181","url":null,"abstract":"Assigning heterogeneous tasks to workers is an important challenge of crowdsourcing platforms. Current approaches to task assignment have primarily focused on content-based approaches, qualifications, or work history. We propose an alternative and complementary approach that focuses on what capabilities workers employ to perform tasks. First, we model various tasks according to the human capabilities required to perform them. Second, we capture the capability traces of the crowd workers performance on existing tasks. Third, we predict performance of workers on new tasks to make task routing decisions, with the help of capability traces. We evaluate the effectiveness of our approach on three different tasks including fact verification, image comparison, and information extraction. The results demonstrate that we can predict worker's performance based on worker capabilities. We also highlight limitations and extensions of the proposed approach.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124859702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards context-aware recommendations: Strategies for exploiting multi-criteria communities","authors":"T. Nguyen, A. Nguyen","doi":"10.4108/ICST.COLLABORATECOM.2013.254105","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254105","url":null,"abstract":"Nowadays, recommender systems are becoming popular since they help users alleviate the information overload problem by offering personalized recommendations. Most systems apply collaborative filtering to predict individual preferences based on opinions of like-minded people through their ratings on items. Recently, context-aware recommender systems (CARSs) exploit additional context data such as time, place and so on for providing better recommendations. However, the large majority of CARSs use only ratings as a criterion for building communities, and ignore other available data allowing users to be grouped into communities. In this paper, we present a novel approach for exploiting multi-criteria communities to generate context-aware recommendations. The underlying idea of three proposed algorithms CRMC, CRESC and CREOC is that for each context, communities from the most suitable criteria followed by the learning phase are incorporated into the recommendation process. Experimental results show that our approach can improve the quality of recommendations.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116631814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of mediating technologies on talk and emotion: Questioning “commonsense”","authors":"Joon-Suk Lee, D. Tatar","doi":"10.4108/ICST.COLLABORATECOM.2013.254047","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254047","url":null,"abstract":"Much CSCW research predominantly focuses on investigating how distributed, mediated interactions are different from collocated interactions, but rarely looks at how the use of technologies affect collocated people. We argue that the needs for studying the impact of mediating technologies among collocated people are current and large. A situation of seeing the other but not being able to see what captures his/her attention is endemic. In this paper, we investigate collocated triads as they play a collaborative, problem-solving game on laptops, on tablets or on a shared paper. People's positive emotion rose more when they talked about the complex relationships of the puzzle specifics and added new perspectives to other people's contributions during the game. People in computer conditions talked less about the specifics on the game board than people in the paper condition, but only people in the laptop condition experienced a significant decrease in positive emotion.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"1989 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125495772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
De Wang, S. Navathe, Ling Liu, Danesh Irani, Acar Tamersoy, C. Pu
{"title":"Click traffic analysis of short URL spam on Twitter","authors":"De Wang, S. Navathe, Ling Liu, Danesh Irani, Acar Tamersoy, C. Pu","doi":"10.4108/ICST.COLLABORATECOM.2013.254084","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254084","url":null,"abstract":"With an average of 80% length reduction, the URL shorteners have become the norm for sharing URLs on Twitter, mainly due to the 140-character limit per message. Unfortunately, spammers have also adopted the URL shorteners to camouflage and improve the user click-through of their spam URLs. In this paper, we measure the misuse of the short URLs and analyze the characteristics of the spam and non-spam short URLs. We utilize these measurements to enable the detection of spam short URLs. To achieve this, we collected short URLs from Twitter and retrieved their click traffic data from Bitly, a popular URL shortening system. We first investigate the creators of over 600,000 Bitly short URLs to characterize short URL spammers. We then analyze the click traffic generated from various countries and referrers, and determine the top click sources for spam and non-spam short URLs. Our results show that the majority of the clicks are from direct sources and that the spammers utilize popular websites to attract more attention by cross-posting the links. We then use the click traffic data to classify the short URLs into spam vs. non-spam and compare the performance of the selected classifiers on the dataset. We determine that the Random Tree algorithm achieves the best performance with an accuracy of 90.81% and an F-measure value of 0.913.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125583167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving textual merge result","authors":"Mehdi Ahmed-Nacer, Pascal Urso, F. Charoy","doi":"10.4108/ICST.COLLABORATECOM.2013.254103","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254103","url":null,"abstract":"In asynchronous collaborative systems, merging is an essential component. It allows to reconcile modifications made concurrently as well as managing software change through branching. The collaborative system is in charge to propose a merge result that includes user's modifications. The users now have to check and adapt this result. The adaptation should be as effort-less as possible, otherwise, the users may get frustrated and will quit the collaboration. The objective of this paper is to improve the result quality of the textual merge tool that constitutes the default merge tool of distributed version control systems. The basic idea is to study the behavior of the concurrent modifications during merge procedure. We identified when the existing merge techniques under-perform, and we propose solutions to improve the quality of the merge. We finally compare with the traditional merge tool through a large corpus of collaborative editing.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123698396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}