{"title":"A collaborative approach to scaffold programming efficiency using spoken tutorials and its evaluation","authors":"K. Eranki, K. Moudgalya","doi":"10.4108/ICST.COLLABORATECOM.2012.250466","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2012.250466","url":null,"abstract":"Computer scientists and educators have argued that teaching programming skills helps enhance thinking skills and good problem solving aptitude. Learning to program is difficult for many students. Although several factors that affect learning have been identified over the years, we are still far from a full understanding of why some students learn to program easily and quickly while others flounder. This paper addresses this challenge using spoken-tutorials as a collaborative scaffolding tool to develop programming efficacy and evaluation of the students programming abilities. The results of the study show that programming self-efficacy is influenced by prior experience, and the students' mental models of programming influences their self-efficacy, and both the mental model and self-efficacy have a direct effect on overall perfomance of the students. Mastery of programming skills in one these languages also contributed in improved performances in other languages.","PeriodicalId":225191,"journal":{"name":"8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)","volume":"311 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114155512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting review spam: Challenges and opportunities","authors":"Yingying Ma, Fengjun Li","doi":"10.4108/ICST.COLLABORATECOM.2012.250640","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2012.250640","url":null,"abstract":"Online customer reviews for both products or merchants have greatly affected others' decision making in purchase. Considering the easily accessibility of the reviews and the significant impacts to the retailers, there is an increasing incentive to manipulate the reviews, mostly profit-driven. Without proper protection, spam reviews will cause gradual loss of credibility of the reviews and corrupt the entire online review systems eventually. Therefore, review spam detection is considered as the first step towards securing the online review systems. In this paper, we aim to overview existing detection approaches in a systematic way, define key research issues, and articulate future research challenges and opportunities for review spam detection.","PeriodicalId":225191,"journal":{"name":"8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)","volume":"209 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132330563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The role of leadership and its effect on the temporal patterns of global software development teams","authors":"I. Brooks, K. Swigger","doi":"10.4108/ICST.COLLABORATECOM.2012.250391","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2012.250391","url":null,"abstract":"Drawing on previous work, the authors explore the role of leaders and their effect on the temporal communication patterns of global software student project teams. Archived group interactions captured during the course of two virtual team projects involving students in the US, Panama, and Turkey were analyzed using a content analysis scheme derived from a collaboration theory that captures communication behavior associated with teams in virtual environments. Results from these analyses suggest that although teams with leaders have many more communications throughout a project, they have similar temporal patterns as compared to teams without leaders. However, the proportion of the different communication behaviors varies considerably between leader and leaderless teams as well as between leaders and their “followers.” More specifically, analysis demonstrated how variation in temporal patterns for leaders and their followers were different from those team members with no leader, thereby bolstering the argument for developing and testing temporal measures in group research.","PeriodicalId":225191,"journal":{"name":"8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)","volume":"25 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114092132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predictability trust for Wireless Sensor Networks to provide a defense against On/off attack","authors":"Younghun Chae, L. DiPippo, Y. Sun","doi":"10.4108/ICST.COLLABORATECOM.2012.250447","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2012.250447","url":null,"abstract":"In Wireless Sensor Networks (WSNs), sensors collaborate to perform various tasks, such as routing. A trust-based routing scheme can be used to route around compromised nodes that attempt to upset this collaboration. However, because wireless connections can be unreliable, the routing protocols must provide a redemption scheme to allow nodes to recover trust. Otherwise, occasional bad behaviors due to unreliable communications can result in false alarms in malicious node detection. Existing redemption schemes fail to discriminate between temporary errors and an On/off attack in which the attacker cleverly behaves well and badly alternatively. In this paper, we present a new trust redemption scheme that cannot only discriminate between temporary errors and an On/off attack, but can also provide a flexible design.","PeriodicalId":225191,"journal":{"name":"8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116101284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy-preserving assessment of social network data trustworthiness","authors":"Chenyun Dai, Fang-Yu Rao, T. Truta, E. Bertino","doi":"10.1142/S0218843014410044","DOIUrl":"https://doi.org/10.1142/S0218843014410044","url":null,"abstract":"Extracting useful knowledge from social network datasets is a challenging problem. To add to the difficulty of this problem, privacy concerns that exist for many social network datasets have restricted the ability to analyze these networks and consequently to maximize the knowledge that can be extracted from them. This paper addresses this issue by introducing the problem of data trustworthiness in social networks when repositories of anonymized social networks exist that can be used to assess such trustworthiness. Three trust score computation models (absolute, relative, and weighted) that can be instantiated for specific anonymization models are defined and algorithms to calculate these trust scores are developed. Using both real and synthetic social networks, the usefulness of the trust score computation is validated through a series of experiments.","PeriodicalId":225191,"journal":{"name":"8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121064609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yi Ren, Ling Liu, Xiao-Jian Liu, Jinzhu Kong, Huadong Dai, Q. Wu, Yuan Li
{"title":"A fast and transparent communication protocol for co-resident virtual machines","authors":"Yi Ren, Ling Liu, Xiao-Jian Liu, Jinzhu Kong, Huadong Dai, Q. Wu, Yuan Li","doi":"10.4108/ICST.COLLABORATECOM.2012.250405","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2012.250405","url":null,"abstract":"Network I/O workloads are dominating in most of the Cloud data centers today. One way to improve inter-VM communication efficiency is to support co-resident VM communication using a faster communication protocol than the traditional TCP/IP commonly used for inter-VM communications regardless whether VMs are located on the same physical host or different physical hosts. Although several co-resident VM communication mechanisms are proposed to reduce the unnecessary long path through the TCP/IP network stack, to avoid communication via Dom0, and to reduce invocation of multiple hypercalls when co-resident inter-VM communication is concerned. Most state of the art shared memory based approaches focus on performance, with programming transparency and live migration support considered. However, few of them provides performance, live migration support, user-kernel-hypervisor transparency at the same time. In this paper, we argue that all three above aspects are fundamental requirements for providing fast and highly transparent co-resident VM communication. We classify existing methods into three categories by their implementation layer in software stack: 1) user libraries and system calls layer, 2) below socket layer and above transport layer, 3) below IP layer. We argue that the choice of implementation layer has significant impact on both transparency and performance, even for live migration support. We present our design and implementation of XenVMC, a fast and transparent residency-aware inter-VM communication protocol with VM live migration support. XenVMC is implemented in layer 2. It supports live migration via automatic co-resident VM detection and transparent system call interception mechanisms, with multilevel transparency guaranteed. Our initial experimental evaluation shows that compared with virtualized TCP/IP method, XenVMC improves co-resident VM communication throughput by up to a factor of 9 and reduces corresponding latency by up to a factor of 6.","PeriodicalId":225191,"journal":{"name":"8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)","volume":"549 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123919118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EigenTrustp++: Attack resilient trust management","authors":"Xinxin Fan, Ling Liu, Mingchu Li, Zhiyuan Su","doi":"10.4108/ICST.COLLABORATECOM.2012.250420","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2012.250420","url":null,"abstract":"This paper argues that trust and reputation models should take into account not only direct experiences (local trust) and experiences from the circle of “friends”, but also be attack resilient by design in the presence of dishonest feedbacks and sparse network connectivity. We first revisit EigenTrust, one of the most popular reputation systems to date, and identify the inherent vulnerabilities of EigenTrust in terms of its local trust vector, its global aggregation of local trust values, and its eigenvector based reputation propagating model. Then we present EigenTrust++, an attack resilient trust management scheme. EigenTrust++ extends the eigenvector based reputation propagating model, the core of EigenTrust, and counters each of vulnerabilities identified with alternative methods that are by design more resilient to dishonest feedbacks and sparse network connectivity under four known attack models. We conduct extensive experimental evaluation on EigenTrust++, and show that EigenTrust++ can significantly outperform EigenTrust in terms of both performance and attack resilience in the presence of dishonest feedbacks and sparse network connectivity against four representative attack models.","PeriodicalId":225191,"journal":{"name":"8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127518952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Yao, J. Rolia, Sujoy Basu, S. Singhal, Akhil Kumar
{"title":"A Context-Aware framework for patient Navigation and Engagement (CANE)","authors":"W. Yao, J. Rolia, Sujoy Basu, S. Singhal, Akhil Kumar","doi":"10.4108/ICST.COLLABORATECOM.2012.250454","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2012.250454","url":null,"abstract":"Engaging patients in the management of their health care can improve the quality of their care and enhance their experience while making more efficient use of care provider resources, especially for chronic diseases. However, health care system complexity and the challenge of consumer health literacy hinder greater engagement. In this paper, we propose a Context-Aware patient Navigation and Engagement (CANE) framework to support informed decision making and more efficient use of health care services. We use the BPMN 2.0 workflow language to formalize the description of navigation processes derived from medical guidelines and develop a healthcare network ontology to assist patient understanding of various clinical activities from multiple perspectives (e.g., resource, logistics, financial, and time). A running example of type 2 diabetes management is used to illustrate our CANE framework. Finally, we describe the system architecture of our prototype.","PeriodicalId":225191,"journal":{"name":"8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128272437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling collaborative information seeking processes: A preliminary study of team search tactics","authors":"Zhen Yue, Daqing He","doi":"10.4108/ICST.COLLABORATECOM.2012.250455","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2012.250455","url":null,"abstract":"This paper presents an investigation on collaborative information seeking process of team users from the aspect of search tactics. Through the investigation, we identified team search tactics as essential components of collaborative search process. In the study, theory from both information science and social psychology are explored in a preliminary user study to build a conceptual framework of team search tactics, which can be used to guide the design and evaluation of information systems in supporting collaborative information seeking.","PeriodicalId":225191,"journal":{"name":"8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123818454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using gamification in an online community","authors":"S. Bista, S. Nepal, N. Colineau, Cécile Paris","doi":"10.4108/ICST.COLLABORATECOM.2012.250526","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2012.250526","url":null,"abstract":"Gamification has recently evolved as an approach to engage and encourage active participation of members in online communities. For an online community to start and proceed on to a sustainable operation, it is important that members are encouraged to contribute positively and frequently. This paper outlines the design and implementation of a gamification model for online communities and its instantiation for a specific online community we have developed in collaboration with a government agency to support welfare recipients transitioning to work. Besides enhancing community members' engagement, badges based gamification has offered us a way to monitor and analyse the online community, including categorising community members by the type of their contributions in the community. We present here some initial results from our online community.","PeriodicalId":225191,"journal":{"name":"8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127238328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}