Wenwey Hseush, Yi-Cheng Huang, Shih-Chang Hsu, C. Pu
{"title":"Real-time collaborative planning with big data: Technical challenges and in-place computing (invited paper)","authors":"Wenwey Hseush, Yi-Cheng Huang, Shih-Chang Hsu, C. Pu","doi":"10.4108/ICST.COLLABORATECOM.2013.254100","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254100","url":null,"abstract":"There is increasing collaboration in new generation supply chain planning applications, where participants across a supply chain analyze and plan on a big volume of sales data over the internet together. To achieve real-time collaborative planning over big data, we have developed an unconventional technology, BigObject, based on an in-place computing approach in two ways. First, instead of moving (big) data around, move (small) code to where data resides for execution. Second, organize the complexity by determining the basic functional units (objects) for computing in the same sense that macromolecules are determined for living cells. The term ”in-place” indicates that data is in residence in memory space and ready for computing. BigObject is an in-place computing system, designed for storing and computing multidimensional data. Our experiment shows that in-place computing approach outperforms traditional computing approach in two orders of magnitude.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129498224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Understanding venue popularity in Foursquare","authors":"Xuelian Long, Lei Jin, J. Joshi","doi":"10.4108/ICST.COLLABORATECOM.2013.254258","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254258","url":null,"abstract":"Recently, social media has become an increasingly important part of business and marketing. More and more businesses use social media as part of their marketing platforms. Moreover, the fast development of the 4th generation mobile network and the ubiquity of the advanced mobile devices in which GPS modules are embedded promote the location-based services. Location-based social networks (LBSNs), as the combination of mobile, location-based service and social media, have been changing the way customers interact with the physical location of a business. Foursquare is one of such popular LBSNs in which a user can check in at his current location, leave tips about the venue, explore discounts around his current location, add other people as his friends and so on. These services provide more information to users on where to eat, shop and go for entertainment, as well as a platform to share their activities with their friends. In this paper, we analyze the Foursquare data pertaining to greater Pittsburgh area to investigate several interesting features that could impact venue popularity. By extracting various information in LBSNs, we investigate which are the popular venues, what kind of venues are popular, and what makes them popular. In particular, we study the local hot spots that indicate users' preferences of venues. We also explore if the special offers and web presence help venues become more popular in general. We also analyze trending venues (i.e., very popular venues at a certain time) to investigate the influence of these features on venue popularity over time. Our quantitative analysis could be used to help business owners to design better marketing strategies in LBSNs.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127251458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cheeka: A mobile application for personal safety","authors":"S. Kanagaraj, G. Arjun, A. Shahina","doi":"10.4108/ICST.COLLABORATECOM.2013.254079","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254079","url":null,"abstract":"The number of users having smartphones equipped with GPS have increased rapidly. Hence, it can be used efficiently for personal security or various other protection purposes. This paper presents Cheeka, a multipurpose personal safety application developed for smartphones belonging to various platforms like Android, Windows Phone and Blackberry. It enables the user to track their Facebook friends with the timestamp of the position. If the user feels he is in danger, the application reports the location to the user's trusted contacts for every few minutes unless the user feels he is safe. Thus, it works like a security guard following behind till the person reaches a safe place. It consists of several other key features like speed monitor, panic alerts and unauthorized power offs. Cheeka also has the functionality of displaying the user's friends who are nearby through Augmented Reality. The ubiquitous nature of Cheeka leads to the cross platform application development across desktop and mobile.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122010509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security analysis of mobile applications: A case study of a collaboration tool in healthcare","authors":"Julian Jang, Jane Li, S. Nepal, L. Alem","doi":"10.4108/ICST.COLLABORATECOM.2013.254212","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254212","url":null,"abstract":"Mobile-based collaboration tools are increasingly used for communication and information sharing in delivering healthcare services that need collaboration across different geographical locations. Some of the typical features found in the collaboration tools include video conferencing facility, images/documents exchange in real-time, and annotations to point and draw on shared rich media content. Though the innovations and conveniences of such collaboration tools are well understood, security implications of such systems are often overlooked. As a result, necessary security mechanisms are not supported by them. This can lead to serious security threats and privacy violations. In this paper, we first present a collaboration tool which was developed to facilitate the collaborations among health care providers using pervasive mobile devices for delivering health services to remote and regional areas. We provide a comprehensive security analysis of the tool. The aim of the analysis is to understand a variety of end-to-end security mechanisms needed in different layers of the system. We also provide security recommendations which can improve the overall security of the system.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127571970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data architecture for telehealth services research: A case study of home tele-monitoring","authors":"S. Nepal, Julian Jang, B. Celler, Bo Yan, L. Alem","doi":"10.4108/ICST.COLLABORATECOM.2013.254220","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254220","url":null,"abstract":"Telehealth services research projects often require to access a variety of data sources under different data access policies and privacy constrains. There is a need to link these clinical and administrative records from different data custodians and produce a research data for analytics. One of the challenges is that the research data must meet the data access policies and privacy constraints of all data custodians participating in the project. These data custodians often operate in different jurisdictions. In this paper, we present our practical experience through the design and implementation of a service-oriented data architecture for extracting research data for telehealth services research in the context of a tele-home monitoring project. This project is being carried out at six locations in five different states in Australia. Each site represents a different model of care for the management of chronic disease in the community ranging from community-based, nurse-led programs to a hospital-focused, chronic-disease management program. The aims of this project are wide ranging and investigate many aspects of deploying at home telehealth services to better manage chronic disease. This paper however focuses on data architecture. We highlight the underlying issues, our experience and explain a practical health data linkage protocol adopted in the project. We also explain the features of the research data service portal in operation.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128078979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic strategies of conflict resolution on human perception of equality within multi-user collaborative virtual environments","authors":"Aida Erfanian, Tao Zeng, Yaoping Hu","doi":"10.4108/ICST.COLLABORATECOM.2013.254052","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254052","url":null,"abstract":"Multi-user collaborative virtual environments (VEs) need strategies of conflict resolution to handle simultaneous interaction with shared objects. Current strategies are first-come-first-serve (FCFS) and predefined static priority of each user. These strategies cannot provide each user with a perceived equal opportunity of interaction and often lead to perceived unfairness to abandon collaboration. To offer an equal opportunity, we created a dynamic priority (DP) strategy and compared the strategy with the FCFS strategy based upon subjective perception of multiple users. Visual or haptic (pertinent to the sense of touch) cues assisted each user to perceive his/her gaining of interaction. We observed that the DP strategy yielded significantly an equal opportunity of interaction. The haptic cue offered lower variations in perceiving the equality than the visual cue under the DP strategy. These observations imply a potential application of the DP strategy in a VE, where various experts require equal opportunities in collaboration.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116558775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accurate weather forecasting through locality based collaborative computing","authors":"Bård Fjukstad, J. Bjørndalen, Otto J. Anshus","doi":"10.4108/ICST.COLLABORATECOM.2013.254178","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254178","url":null,"abstract":"The Collaborative Symbiotic Weather Forecasting (CSWF) system lets a user compute a short time, high-resolution forecast for a small region around the user, in a few minutes, on-demand, on a PC. A collaborated forecast giving better uncertainty estimation is then created using forecasts from other users in the same general region. A collaborated forecast can be visualized on a range of devices and in a range of styles, typically as a composite of the individual forecasts. CSWF assumes locality between forecasts, regions, and PCs. Forecasts for a region are computed by and stored on PCs located within the region. To locate forecasts, CSWF simply scans specific ports on public IP addresses in the local area. Scanning is robust because it avoids maintaining state about others and fast because the number of computers is low and only a few forecasts are needed.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131777890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
David Knuplesch, M. Reichert, R. Pryss, W. Fdhila, S. Rinderle-Ma
{"title":"Ensuring compliance of distributed and collaborative workflows","authors":"David Knuplesch, M. Reichert, R. Pryss, W. Fdhila, S. Rinderle-Ma","doi":"10.4108/ICST.COLLABORATECOM.2013.254095","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254095","url":null,"abstract":"Automated workflows must comply with domain-specific regulations, standards and rules. So far, compliance issues have been mainly addressed in the context of intra-organizational workflows. In turn, there exists only little work dealing with compliance of distributed and collaborative workflows. As opposed to intra-organizational workflows, for distributed and collaborative workflows compliance must be addressed at different levels. This includes local compliance rules of a particular partner as well as global compliance rules to be obeyed by multiple partners collaborating in the distributed workflow. As a particular challenge, the private elements of a particular partner workflow are hidden to the partners and hence not known by them. Accordingly, only limited information is available when checking compliance of distributed and collaborative workflows. This paper introduces techniques enabling compliance checking for distributed and collaborative workflows, taking these privacy constraints into account. Hence it enables ensuring compliance of distributed and collaborative workflows at design time.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123089499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Byzantine resistant reputation-based trust management","authors":"Amira Bradai, W. Ben-Ameur, H. Afifi","doi":"10.4108/ICST.COLLABORATECOM.2013.254048","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254048","url":null,"abstract":"Cloud computing is very useful for improving distributed applications performance. However, it is difficult to manage risks related to trust when collaborating with unknown and potentially malicious peers. Besides, trust evaluation is the target of dishonest behaviors trying to disturb the control process. In this paper, reputation-based trust management models for cloud computing are proposed. These Peer-to-Peer (P2P) reputation models are based on the interaction between peers. Using evaluations and feedbacks, a central entity can estimate the trust of a given peer. Three approaches are proposed to estimate the trust: PerronTrust, CredTrust and CredTrust-trust. They are studied, simulated and compared between them and to two existing methods for trust under several attack scenarios. Our analysis clearly shows that the third approach CredTrust-trust combining the concepts of trust and credibility in an appropriate way is the most efficient to avoid malicious behaviors and to guide and advise future executions in the open cloud in term of selecting the dependable and reliable peers in cloud environment.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134621800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Android keylogging threat","authors":"Fadi Mohsen, Mohamed Shehab","doi":"10.4108/ICST.COLLABORATECOM.2013.254209","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254209","url":null,"abstract":"The openness of Android platform has attracted users, developers and attackers. Android offers bunch of capabilities and flexibilities, for instance, developers can write their own keyboard service-similar to Android soft keyboards-using the KeyboardView class. This class is available since api level 3.0 and can be part of the layout of an activity. Users prefer to download and install third-party keyboards that offer better experience and capabilities. However, there are security risks related to users installing and using these custom keyboards. Attackers can build or take advantage of existing third-party keyboards to create keyloggers to spy on smartphones users. Third-party keyboard once activated would substitute the Android standard keyboard, so all keys events pass this app. As results, many attacks can be launched identified by the permissions granted to these apps. The objective of this paper is to present these attacks, analyze their causes, and provide possible solutions.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"336 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122835193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}