2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing最新文献

筛选
英文 中文
Comparing visualization techniques to structure collaborative concepts 比较可视化技术结构协作概念
Sherry Koshman, Chi-Jung Lu
{"title":"Comparing visualization techniques to structure collaborative concepts","authors":"Sherry Koshman, Chi-Jung Lu","doi":"10.4108/ICST.COLLABORATECOM2009.8351","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM2009.8351","url":null,"abstract":"Much research has been devoted to collaborative tools for writing, group communication, reviewing, managing projects, and developing network infrastructures to support sharing activities. However the creation and display of foundational collaborative concepts that manage group work has not been paid significant attention. Information visualization potentially addresses the progression of distributed concept building and presentation by visually representing group-generated concepts. This paper analyzes current visualization-based techniques including tag clouds, node-link diagrams, and mapping structures in a web-based environment. The analysis contributes to exploring the use of visualization tools for creating group concept structures that organize ideas for documents, projects, or specifications in academia and industry. A comparative features table is built and used as a basis for presenting an initial interface design to develop a collaborative visualization tool for concept management. Implications for future work include visualization system interface design, user evaluation, and adaptation to mobile collaborative visualization environments.","PeriodicalId":232795,"journal":{"name":"2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131030183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Flexible failure handling for cooperative processes in distributed systems 分布式系统中协作过程的灵活故障处理
Artin Avanes, J. Freytag
{"title":"Flexible failure handling for cooperative processes in distributed systems","authors":"Artin Avanes, J. Freytag","doi":"10.4108/ICST.COLLABORATECOM2009.8306","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM2009.8306","url":null,"abstract":"Distributed systems will be increasingly built on top of wireless networks, such as sensor networks or hand-held devices with advanced sensing and computational abilities. Supporting cooperative processes executed by such unreliable and dynamic system components poses a various number of new technical challenges. In terms of recovery, limited resource capabilities have be considered during re-scheduling of failed process activities. In terms of concurrency, a non-blocking protocol is required to allow a high degree of parallelism. In this paper, we introduce a flexible and resource-oriented failure handling mechanism for cooperative processes in hierarchical and distributed systems. The objective is to ensure both - transactional semantics as well as the selection of suitable nodes with respect to available resource capabilities. Based on a nested execution model, we develop a multi-stage algorithm that uses constraint solving techniques in a parallel fashion thus achieving a more efficient recovery. We evaluate our proposed techniques in a prototype implementation, and demonstrate significant performance gains by using a parallel re-scheduling.","PeriodicalId":232795,"journal":{"name":"2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128226331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VPAF: a flexible framework for establishing and monitoring prolonged authorization relationships VPAF:用于建立和监视长时间授权关系的灵活框架
E. Freudenthal, Bivas Das
{"title":"VPAF: a flexible framework for establishing and monitoring prolonged authorization relationships","authors":"E. Freudenthal, Bivas Das","doi":"10.4108/ICST.COLLABORATECOM2009.8366","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM2009.8366","url":null,"abstract":"We describe a generic framework for determining and monitoring access rights derived from credential documents. Distributed authorization systems intended to support collaborative coalitions (such as Trust Management systems) typically incorporate mechanisms to both validate credentials, and to determine authorization. This conjunction of distinct functions increases complexity of both components and limits overall flexibility. Furthermore, while authorization decisions frequently enable the commencement of a prolonged relationship, current authorization systems are designed to authorize instantaneous transactions and provide no mechanisms to detect and propagate revocation after an authorization decision is made. VPAF (a Validated and Prolonged Authorization Framework) will separate these duties in a manner that permits credential validation and authorization decisions to be managed separately. VPAF is intended to enable vigilant monitoring of prolonged authorization relationships that span mutually distrustful administrative domains such as is common when multiple organizations collaborate.","PeriodicalId":232795,"journal":{"name":"2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122080915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Collaborative process modeling and reuse evaluation 协作过程建模和重用评估
Luiz F. C. Tomaz, J. A. R. Nt., G. Xexéo, J. Souza
{"title":"Collaborative process modeling and reuse evaluation","authors":"Luiz F. C. Tomaz, J. A. R. Nt., G. Xexéo, J. Souza","doi":"10.4108/ICST.COLLABORATECOM2009.8365","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM2009.8365","url":null,"abstract":"Business process management systems are largely used nowadays. Process Modeling, whether for depicting new processes or for optimizing existing ones, requires knowledge and proper tools. However, most process models are created from scratch, not having reuse promoted, i.e., not considering existing knowledge. Large enterprises not using a unique integrated system, and also some of them that do, have the same business process implemented in a variety of ways, due to differences in their units, culture or environments. In this work we evaluate BPCE, a P2P tool we previously proposed as a way of collaboratively developing process models. We describe tool implementation issues, a modeling case study, a simulation conducted using the tool and the changes in the original proposal caused by those investigations. The results present evidence that such a tool can minimize the time to develop new models, reduce the differences among similar business processes conducted in distinct organization units, enhance the quality of process design and promote reuse.","PeriodicalId":232795,"journal":{"name":"2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"200 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123368642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Learning communities supported by autonomic recommendation mechanism 自主推荐机制支持的学习社区
Stainam Nogueira Brandão, Ricardo Tadeu da Silva, J. M. Souza
{"title":"Learning communities supported by autonomic recommendation mechanism","authors":"Stainam Nogueira Brandão, Ricardo Tadeu da Silva, J. M. Souza","doi":"10.4108/ICST.COLLABORATECOM2009.8348","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM2009.8348","url":null,"abstract":"Peer-to-peer (P2P) offers good solutions for many applications such as large data sharing and collaboration. Thus, it appears as a powerful paradigm to develop scalable distributed applications, as reflected by the increasing number of emerging projects based on this technology. However, building trustworthy P2P collaborative tool is difficult because they must be deployed on a large number of autonomous nodes, which may be part of the virtual community and to make the collaboration effectively happen among the nodes. Within this scenario, this article presents an autonomic recommendation mechanism of knowledge chains, which is based on the apprentice profile and his current knowledge to recommend the best learning strategy after the analysis of the learning community in this peer-to-peer environment.","PeriodicalId":232795,"journal":{"name":"2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114399959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrating external user profiles in collaboration applications 在协作应用程序中集成外部用户配置文件
George Mathew
{"title":"Integrating external user profiles in collaboration applications","authors":"George Mathew","doi":"10.4108/ICST.COLLABORATECOM2009.8329","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM2009.8329","url":null,"abstract":"Due to the increase in federated nature of collaboration applications, users from multiple institutions have the potential to participate in activities centered around common regions of interest. However, existing technologies address external users at a coarse grained level. Consequently, mechanisms to integrate external user profiles into collaboration applications are practically non-existent. This prevents an end user from having locus of control in managing permissions to resources for users that are external to their parent institution. In this paper, the need for a fine grained access control mechanism for end users, that allows them to transparently manage permissions to external users in collaboration applications, is addressed. Mechanisms that need to be in place to provide a framework for realizing this capability are outlined. Some of the components that exist now are reviewed in this context. The end users will benefit from a holistic framework by having empowerment over resource management for external collaborators in a natural way.","PeriodicalId":232795,"journal":{"name":"2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133447314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic policy conflict analysis for cross-domain collaborations using semantic temporal logic 基于语义时态逻辑的跨域协作策略冲突自动分析
Zhengping Wu, Yuanyao Liu
{"title":"Automatic policy conflict analysis for cross-domain collaborations using semantic temporal logic","authors":"Zhengping Wu, Yuanyao Liu","doi":"10.4108/ICST.COLLABORATECOM2009.8392","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM2009.8392","url":null,"abstract":"Policy-based methods simplify the management of cross-domain collaborations by establishing policies to control various cross-domain activities involved in those collaborations. Administrators and users from participant domains can use policies to define control rules and restrictions, and to configure execution environments for these collaborations. To detect and resolve potential dynamic conflicts between different administrative domains, Semantic Temporal Logic (STL) is proposed and implemented in this paper to automatically analyze policy conflicts. STL incorporates relationships between different policy elements into temporal logic using a semantic format (ontology). A prototype system in the web services environment is implemented to illustrate the capability of STL and the dynamic policy analysis framework utilizing STL.","PeriodicalId":232795,"journal":{"name":"2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123975420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Economics of network sharing - A case study of mobile telecom sector in Pakistan 网络共享的经济学——巴基斯坦移动电信部门的案例研究
M. A. Choudhary, Hasnat Babar, Hasan Shakeel, A. Abbas
{"title":"Economics of network sharing - A case study of mobile telecom sector in Pakistan","authors":"M. A. Choudhary, Hasnat Babar, Hasan Shakeel, A. Abbas","doi":"10.4108/ICST.COLLABORATECOM2009.8390","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM2009.8390","url":null,"abstract":"The cellular mobile industry in Pakistan has shown an unprecedented growth since the promulgation of Pakistan Telecommunication (Reorganization) Act of 1996. Over 90 million cellular mobile users and penetration grew to 55.6% and 4.8 million landlines connections provide a teledensity of 58.8% to the nation. The mobile networks provide coverage to over 90 percent of the population. During 2007–08 mobiles traffic exceeded 42 billion minutes while ARPU decreased to US$ 3.11. Total telecom investment during the year 2007–08 was US $ 3.12 billion while the share of telecommunication sector in GDP was 2.0%. Telecom companies invested over US$ 10 billion during the last five years, mobile sector investment share accounted for 66% of the total investment. China Mobile alone invested about US$ 2 billion during 2007–08 for expansion of its CMPak networks. The mobile sector paid over a billion dollars in taxes to the National Exchequer during the year 2007–08. The telecom sector received above US$ 1.438 billion FDI, i.e., 28% of the total FDI and helped create over one million jobs since the deregulation of the telecom sector began. The competitive pressures and decline in ARPU has increased the need for improving technical as well as economic efficiencies. Our analyses indicate there are serious economic efficiencies embedded in infrastructure sharing paradigm for mobile operators. Only the passive sharing of additional sites can yield CAPEX savings of over 5000 million US dollars and OPEX savings of these sites can yield another billion US dollars every year. It is thus concluded that the growing business model of decoupling the revenues from that of mobile traffic warrant serious consideration.","PeriodicalId":232795,"journal":{"name":"2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122516381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Protocol overhead versus router processing and memory tradeoffs in evaluating BGP inbound soft reset mechanisms for tactical IP networks 在评估战术IP网络的BGP入站软复位机制时,协议开销与路由器处理和内存权衡
Isil Sebüktekin, J. Haluska, Pete Moyer, K. Adams
{"title":"Protocol overhead versus router processing and memory tradeoffs in evaluating BGP inbound soft reset mechanisms for tactical IP networks","authors":"Isil Sebüktekin, J. Haluska, Pete Moyer, K. Adams","doi":"10.4108/ICST.COLLABORATECOM2009.8373","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM2009.8373","url":null,"abstract":"Border Gateway Protocol (BGP) is the inter-domain routing protocol of choice across the Global Information Grid (GIG) as in the commercial Internet. There is a future need and motivation to extend BGP to connect the large-scale future military networks of the Army, Navy and Air Force to the GIG as independent Autonomous Systems (ASes) using satellite and wide area networking (WAN) technologies. These networks are expected to be highly mobile and multi-homed to the GIG. Higher BGP protocol activity and policy use, both in the inter-and intra-domain, is anticipated for such mobile ASes compared to the largely static commercial counterparts. Wireless bandwidth being a scarcer and more volatile network resource, emphasizes the need to manage protocol overheads among routers in dynamic mobile network environments. This is in contrast to the primary concern of optimizing router packet processing and memory utilization in significantly higher speed provider networks of the Internet. In consideration of the different dynamics expected, we analyze BGP “soft resets” as one small but high-impact operational property of BGP for the tactical Internet, specifically the “inbound soft resets” and the different methods for implementing them. We support our comparative analysis with empirical results, 1 also evaluating impacts on BGP Route Reflectors with multiple peers.","PeriodicalId":232795,"journal":{"name":"2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115649927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VaaS: Videoconference as a service VaaS:视频会议即服务
P. Rodríguez, Daniel Gallego, Javier Cerviño, Fernando Escribano, J. Quemada, J. Salvachúa
{"title":"VaaS: Videoconference as a service","authors":"P. Rodríguez, Daniel Gallego, Javier Cerviño, Fernando Escribano, J. Quemada, J. Salvachúa","doi":"10.4108/ICST.COLLABORATECOM2009.8285","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM2009.8285","url":null,"abstract":"Internet is a place nowadays where interoperating services are offered which can be integrated or mashed up in order to fulfill user demands. This paper proposes a way to offer videoconference as a Web service over an interface which can be used by third parties to enrich their applications. This interface includes a security mechanism supporting delegated authorization to allow integration into third party's environments. Via this interface virtual rooms are provided where users can collaborate with audio, video, shared applications, IM, etc. An implementation of these concepts is described, including performance figures and validation results. We would finally like to stress that this architecture has been defined to support a scalable cloud computing service over the Internet.","PeriodicalId":232795,"journal":{"name":"2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122227570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信