9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing最新文献

筛选
英文 中文
Real-time collaborative planning with big data: Technical challenges and in-place computing (invited paper) 基于大数据的实时协同规划:技术挑战和就地计算(特邀论文)
9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing Pub Date : 2013-12-12 DOI: 10.4108/ICST.COLLABORATECOM.2013.254100
Wenwey Hseush, Yi-Cheng Huang, Shih-Chang Hsu, C. Pu
{"title":"Real-time collaborative planning with big data: Technical challenges and in-place computing (invited paper)","authors":"Wenwey Hseush, Yi-Cheng Huang, Shih-Chang Hsu, C. Pu","doi":"10.4108/ICST.COLLABORATECOM.2013.254100","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254100","url":null,"abstract":"There is increasing collaboration in new generation supply chain planning applications, where participants across a supply chain analyze and plan on a big volume of sales data over the internet together. To achieve real-time collaborative planning over big data, we have developed an unconventional technology, BigObject, based on an in-place computing approach in two ways. First, instead of moving (big) data around, move (small) code to where data resides for execution. Second, organize the complexity by determining the basic functional units (objects) for computing in the same sense that macromolecules are determined for living cells. The term ”in-place” indicates that data is in residence in memory space and ready for computing. BigObject is an in-place computing system, designed for storing and computing multidimensional data. Our experiment shows that in-place computing approach outperforms traditional computing approach in two orders of magnitude.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129498224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Understanding venue popularity in Foursquare 了解Foursquare的地点受欢迎程度
9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing Pub Date : 2013-12-12 DOI: 10.4108/ICST.COLLABORATECOM.2013.254258
Xuelian Long, Lei Jin, J. Joshi
{"title":"Understanding venue popularity in Foursquare","authors":"Xuelian Long, Lei Jin, J. Joshi","doi":"10.4108/ICST.COLLABORATECOM.2013.254258","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254258","url":null,"abstract":"Recently, social media has become an increasingly important part of business and marketing. More and more businesses use social media as part of their marketing platforms. Moreover, the fast development of the 4th generation mobile network and the ubiquity of the advanced mobile devices in which GPS modules are embedded promote the location-based services. Location-based social networks (LBSNs), as the combination of mobile, location-based service and social media, have been changing the way customers interact with the physical location of a business. Foursquare is one of such popular LBSNs in which a user can check in at his current location, leave tips about the venue, explore discounts around his current location, add other people as his friends and so on. These services provide more information to users on where to eat, shop and go for entertainment, as well as a platform to share their activities with their friends. In this paper, we analyze the Foursquare data pertaining to greater Pittsburgh area to investigate several interesting features that could impact venue popularity. By extracting various information in LBSNs, we investigate which are the popular venues, what kind of venues are popular, and what makes them popular. In particular, we study the local hot spots that indicate users' preferences of venues. We also explore if the special offers and web presence help venues become more popular in general. We also analyze trending venues (i.e., very popular venues at a certain time) to investigate the influence of these features on venue popularity over time. Our quantitative analysis could be used to help business owners to design better marketing strategies in LBSNs.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127251458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Cheeka: A mobile application for personal safety cheka:一个个人安全的移动应用程序
9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing Pub Date : 2013-12-12 DOI: 10.4108/ICST.COLLABORATECOM.2013.254079
S. Kanagaraj, G. Arjun, A. Shahina
{"title":"Cheeka: A mobile application for personal safety","authors":"S. Kanagaraj, G. Arjun, A. Shahina","doi":"10.4108/ICST.COLLABORATECOM.2013.254079","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254079","url":null,"abstract":"The number of users having smartphones equipped with GPS have increased rapidly. Hence, it can be used efficiently for personal security or various other protection purposes. This paper presents Cheeka, a multipurpose personal safety application developed for smartphones belonging to various platforms like Android, Windows Phone and Blackberry. It enables the user to track their Facebook friends with the timestamp of the position. If the user feels he is in danger, the application reports the location to the user's trusted contacts for every few minutes unless the user feels he is safe. Thus, it works like a security guard following behind till the person reaches a safe place. It consists of several other key features like speed monitor, panic alerts and unauthorized power offs. Cheeka also has the functionality of displaying the user's friends who are nearby through Augmented Reality. The ubiquitous nature of Cheeka leads to the cross platform application development across desktop and mobile.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122010509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Security analysis of mobile applications: A case study of a collaboration tool in healthcare 移动应用程序的安全分析:医疗保健领域协作工具的案例研究
9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing Pub Date : 2013-12-12 DOI: 10.4108/ICST.COLLABORATECOM.2013.254212
Julian Jang, Jane Li, S. Nepal, L. Alem
{"title":"Security analysis of mobile applications: A case study of a collaboration tool in healthcare","authors":"Julian Jang, Jane Li, S. Nepal, L. Alem","doi":"10.4108/ICST.COLLABORATECOM.2013.254212","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254212","url":null,"abstract":"Mobile-based collaboration tools are increasingly used for communication and information sharing in delivering healthcare services that need collaboration across different geographical locations. Some of the typical features found in the collaboration tools include video conferencing facility, images/documents exchange in real-time, and annotations to point and draw on shared rich media content. Though the innovations and conveniences of such collaboration tools are well understood, security implications of such systems are often overlooked. As a result, necessary security mechanisms are not supported by them. This can lead to serious security threats and privacy violations. In this paper, we first present a collaboration tool which was developed to facilitate the collaborations among health care providers using pervasive mobile devices for delivering health services to remote and regional areas. We provide a comprehensive security analysis of the tool. The aim of the analysis is to understand a variety of end-to-end security mechanisms needed in different layers of the system. We also provide security recommendations which can improve the overall security of the system.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127571970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Data architecture for telehealth services research: A case study of home tele-monitoring 远程医疗服务研究的数据架构:以家庭远程监测为例
9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing Pub Date : 2013-12-12 DOI: 10.4108/ICST.COLLABORATECOM.2013.254220
S. Nepal, Julian Jang, B. Celler, Bo Yan, L. Alem
{"title":"Data architecture for telehealth services research: A case study of home tele-monitoring","authors":"S. Nepal, Julian Jang, B. Celler, Bo Yan, L. Alem","doi":"10.4108/ICST.COLLABORATECOM.2013.254220","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254220","url":null,"abstract":"Telehealth services research projects often require to access a variety of data sources under different data access policies and privacy constrains. There is a need to link these clinical and administrative records from different data custodians and produce a research data for analytics. One of the challenges is that the research data must meet the data access policies and privacy constraints of all data custodians participating in the project. These data custodians often operate in different jurisdictions. In this paper, we present our practical experience through the design and implementation of a service-oriented data architecture for extracting research data for telehealth services research in the context of a tele-home monitoring project. This project is being carried out at six locations in five different states in Australia. Each site represents a different model of care for the management of chronic disease in the community ranging from community-based, nurse-led programs to a hospital-focused, chronic-disease management program. The aims of this project are wide ranging and investigate many aspects of deploying at home telehealth services to better manage chronic disease. This paper however focuses on data architecture. We highlight the underlying issues, our experience and explain a practical health data linkage protocol adopted in the project. We also explain the features of the research data service portal in operation.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128078979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Dynamic strategies of conflict resolution on human perception of equality within multi-user collaborative virtual environments 多用户协同虚拟环境中基于人类平等感知的冲突解决动态策略
9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing Pub Date : 2013-12-12 DOI: 10.4108/ICST.COLLABORATECOM.2013.254052
Aida Erfanian, Tao Zeng, Yaoping Hu
{"title":"Dynamic strategies of conflict resolution on human perception of equality within multi-user collaborative virtual environments","authors":"Aida Erfanian, Tao Zeng, Yaoping Hu","doi":"10.4108/ICST.COLLABORATECOM.2013.254052","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254052","url":null,"abstract":"Multi-user collaborative virtual environments (VEs) need strategies of conflict resolution to handle simultaneous interaction with shared objects. Current strategies are first-come-first-serve (FCFS) and predefined static priority of each user. These strategies cannot provide each user with a perceived equal opportunity of interaction and often lead to perceived unfairness to abandon collaboration. To offer an equal opportunity, we created a dynamic priority (DP) strategy and compared the strategy with the FCFS strategy based upon subjective perception of multiple users. Visual or haptic (pertinent to the sense of touch) cues assisted each user to perceive his/her gaining of interaction. We observed that the DP strategy yielded significantly an equal opportunity of interaction. The haptic cue offered lower variations in perceiving the equality than the visual cue under the DP strategy. These observations imply a potential application of the DP strategy in a VE, where various experts require equal opportunities in collaboration.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116558775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Accurate weather forecasting through locality based collaborative computing 通过基于位置的协同计算进行准确的天气预报
9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing Pub Date : 2013-12-12 DOI: 10.4108/ICST.COLLABORATECOM.2013.254178
Bård Fjukstad, J. Bjørndalen, Otto J. Anshus
{"title":"Accurate weather forecasting through locality based collaborative computing","authors":"Bård Fjukstad, J. Bjørndalen, Otto J. Anshus","doi":"10.4108/ICST.COLLABORATECOM.2013.254178","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254178","url":null,"abstract":"The Collaborative Symbiotic Weather Forecasting (CSWF) system lets a user compute a short time, high-resolution forecast for a small region around the user, in a few minutes, on-demand, on a PC. A collaborated forecast giving better uncertainty estimation is then created using forecasts from other users in the same general region. A collaborated forecast can be visualized on a range of devices and in a range of styles, typically as a composite of the individual forecasts. CSWF assumes locality between forecasts, regions, and PCs. Forecasts for a region are computed by and stored on PCs located within the region. To locate forecasts, CSWF simply scans specific ports on public IP addresses in the local area. Scanning is robust because it avoids maintaining state about others and fast because the number of computers is low and only a few forecasts are needed.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131777890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ensuring compliance of distributed and collaborative workflows 确保分布式和协作工作流的遵从性
9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing Pub Date : 2013-12-12 DOI: 10.4108/ICST.COLLABORATECOM.2013.254095
David Knuplesch, M. Reichert, R. Pryss, W. Fdhila, S. Rinderle-Ma
{"title":"Ensuring compliance of distributed and collaborative workflows","authors":"David Knuplesch, M. Reichert, R. Pryss, W. Fdhila, S. Rinderle-Ma","doi":"10.4108/ICST.COLLABORATECOM.2013.254095","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254095","url":null,"abstract":"Automated workflows must comply with domain-specific regulations, standards and rules. So far, compliance issues have been mainly addressed in the context of intra-organizational workflows. In turn, there exists only little work dealing with compliance of distributed and collaborative workflows. As opposed to intra-organizational workflows, for distributed and collaborative workflows compliance must be addressed at different levels. This includes local compliance rules of a particular partner as well as global compliance rules to be obeyed by multiple partners collaborating in the distributed workflow. As a particular challenge, the private elements of a particular partner workflow are hidden to the partners and hence not known by them. Accordingly, only limited information is available when checking compliance of distributed and collaborative workflows. This paper introduces techniques enabling compliance checking for distributed and collaborative workflows, taking these privacy constraints into account. Hence it enables ensuring compliance of distributed and collaborative workflows at design time.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123089499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Byzantine resistant reputation-based trust management 拜占庭式的基于声誉的信任管理
9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing Pub Date : 2013-12-12 DOI: 10.4108/ICST.COLLABORATECOM.2013.254048
Amira Bradai, W. Ben-Ameur, H. Afifi
{"title":"Byzantine resistant reputation-based trust management","authors":"Amira Bradai, W. Ben-Ameur, H. Afifi","doi":"10.4108/ICST.COLLABORATECOM.2013.254048","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254048","url":null,"abstract":"Cloud computing is very useful for improving distributed applications performance. However, it is difficult to manage risks related to trust when collaborating with unknown and potentially malicious peers. Besides, trust evaluation is the target of dishonest behaviors trying to disturb the control process. In this paper, reputation-based trust management models for cloud computing are proposed. These Peer-to-Peer (P2P) reputation models are based on the interaction between peers. Using evaluations and feedbacks, a central entity can estimate the trust of a given peer. Three approaches are proposed to estimate the trust: PerronTrust, CredTrust and CredTrust-trust. They are studied, simulated and compared between them and to two existing methods for trust under several attack scenarios. Our analysis clearly shows that the third approach CredTrust-trust combining the concepts of trust and credibility in an appropriate way is the most efficient to avoid malicious behaviors and to guide and advise future executions in the open cloud in term of selecting the dependable and reliable peers in cloud environment.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134621800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Android keylogging threat Android键盘记录威胁
9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing Pub Date : 2013-12-12 DOI: 10.4108/ICST.COLLABORATECOM.2013.254209
Fadi Mohsen, Mohamed Shehab
{"title":"Android keylogging threat","authors":"Fadi Mohsen, Mohamed Shehab","doi":"10.4108/ICST.COLLABORATECOM.2013.254209","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254209","url":null,"abstract":"The openness of Android platform has attracted users, developers and attackers. Android offers bunch of capabilities and flexibilities, for instance, developers can write their own keyboard service-similar to Android soft keyboards-using the KeyboardView class. This class is available since api level 3.0 and can be part of the layout of an activity. Users prefer to download and install third-party keyboards that offer better experience and capabilities. However, there are security risks related to users installing and using these custom keyboards. Attackers can build or take advantage of existing third-party keyboards to create keyloggers to spy on smartphones users. Third-party keyboard once activated would substitute the Android standard keyboard, so all keys events pass this app. As results, many attacks can be launched identified by the permissions granted to these apps. The objective of this paper is to present these attacks, analyze their causes, and provide possible solutions.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"336 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122835193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信