{"title":"Secure data aggregation and collaboration in wireless sensor networks","authors":"S. Madria","doi":"10.1109/CTS.2011.5928697","DOIUrl":"https://doi.org/10.1109/CTS.2011.5928697","url":null,"abstract":"Data aggregation is a technique used to conserve battery power in wireless sensor networks (WSN). When securing such a network, it is important that we minimize the number of computationally expensive security operations without compromising on the security. This talk deals with the test-bed implementation of our end to end secure data aggregation algorithm. Unlike previous algorithms which required separate phases for secure aggregation and integrity verification, ours does not require an additional phase for verification. This saves energy by avoiding additional transmissions and computation overhead on the sensor nodes. We have implemented our secure data aggregation algorithms on mica2 motes. To sum up our objectives as follows: 1. An encryption algorithm for data confidentiality which will allow us to aggregate encrypted data in a wireless sensor network. 2. An aggregate digital signature algorithm to preserve data integrity which allows us to aggregate digital signatures. 3. An implementation of these algorithms which is efficient in computational and communicational aspects in energy constrained environments.","PeriodicalId":426543,"journal":{"name":"2011 International Conference on Collaboration Technologies and Systems (CTS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126128479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secured histories for presence systems","authors":"E. Rieffel, Jacob T. Biehl, W. Melle, Adam J. Lee","doi":"10.1109/CTS.2011.5928723","DOIUrl":"https://doi.org/10.1109/CTS.2011.5928723","url":null,"abstract":"As sensors become ever more prevalent, more and more information will be collected about each of us. A long-term research question is how best to support beneficial uses while preserving individual privacy. Presence systems are an emerging class of applications that support collaboration. These systems leverage pervasive sensors to estimate end-user location, activities, and available communication channels. Because such presence data are sensitive, to achieve wide-spread adoption, sharing models must reflect the privacy and sharing preferences of the users. To reflect users' collaborative relationships and sharing desires, we introduce CollaPSE security, in which an individual has full access to her own data, a third party processes the data without learning anything about the data values, and users higher up in the hierarchy learn only statistical information about the employees under them. We describe simple schemes that efficiently realize CollaPSE security for time series data. We implemented these protocols using readily available cryptographic functions, and integrated the protocols with FXPAL's myUnity presence system.","PeriodicalId":426543,"journal":{"name":"2011 International Conference on Collaboration Technologies and Systems (CTS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126843305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
John Millar Carroll, Hao Jiang, M. Rosson, Shin-I Shih, Jing Wang, Lu Xiao, Dejin Zhao
{"title":"Supporting activity awareness in computer-mediated collaboration","authors":"John Millar Carroll, Hao Jiang, M. Rosson, Shin-I Shih, Jing Wang, Lu Xiao, Dejin Zhao","doi":"10.1109/CTS.2011.5928658","DOIUrl":"https://doi.org/10.1109/CTS.2011.5928658","url":null,"abstract":"Effective regulation of joint activity requires awareness of and coordination with partners at many levels. Our research focuses on understanding and supporting awareness in relatively large and complex activities such as emergency management, software development, information analysis, and education. We describe patterns and issues in the development of activity awareness, and approaches to supporting awareness with tools and methods.","PeriodicalId":426543,"journal":{"name":"2011 International Conference on Collaboration Technologies and Systems (CTS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124846158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrating online and offline community through facebook","authors":"Shaoke Zhang, Hao Jiang, John Millar Carroll","doi":"10.1109/CTS.2011.5928738","DOIUrl":"https://doi.org/10.1109/CTS.2011.5928738","url":null,"abstract":"This paper presents an interview study of how social network communication media, Facebook specifically, can facilitate and influence proximal communities. We investigated scenarios in which users integrated their online interactions with offline activities. We found that Facebook heightened the visibility of social identities, but that these identities are multifaceted and dynamically modulated by context. We found that Facebook broadly facilitated offline activities from proposing and planning through to report and commenting. We found that people use Facebook features differentially as they maintain strong and weak ties. Finally we discussed how social identities, social engagements, and social ties are mutually reinforcing and cultivating with the affordances of Facebook.","PeriodicalId":426543,"journal":{"name":"2011 International Conference on Collaboration Technologies and Systems (CTS)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125207025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The DARPA COORDINATORS program: A retrospective","authors":"Robert C. Kohout","doi":"10.1109/CTS.2011.5928708","DOIUrl":"https://doi.org/10.1109/CTS.2011.5928708","url":null,"abstract":"The goal of the DARPA COORDINATORS program was to create hand-held coordination assistants that would enable military units to adapt mission plans more rapidly, more accurately, with less cognitive load and with a greater degree of coordinated action. In early 2005, three teams of researchers began a concerted effort to create a distributed cognitive system that could adapt mission plans online via task/resource timing/allocation and contingency selection. This talk will provide a brief overview of the COORDINATORS program, its design and execution, successes, and lessons learned.","PeriodicalId":426543,"journal":{"name":"2011 International Conference on Collaboration Technologies and Systems (CTS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129818972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Layered interactive visual interface design: A visual interface for the navigation and analysis of digital text communications","authors":"Erica Edelman, J. McIntire","doi":"10.1109/CTS.2011.5928737","DOIUrl":"https://doi.org/10.1109/CTS.2011.5928737","url":null,"abstract":"We describe the preliminary development of an interactive visualization tool intended to produce a multi-layered visual interface design that allows for fast, easy navigation and analysis of digital text corpora and text communications, allowing for more efficient distributed collaboration and communications in the virtual world.","PeriodicalId":426543,"journal":{"name":"2011 International Conference on Collaboration Technologies and Systems (CTS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116240949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Executable behavior delegation in web services and ontology exchange systems","authors":"I. Toujilov, P. Taylor","doi":"10.1109/CTS.2011.5928719","DOIUrl":"https://doi.org/10.1109/CTS.2011.5928719","url":null,"abstract":"Web services and semantic web systems suffer from a number of practical problems, notably the difficulty of maintaining inter-operability. We propose a new principle for the design of such systems: the delegation of executable behavior. This principle leads to an alternative framework in which the operation environment, rather than XML messaging, is standardized. The operation environment can then execute remotely delegated behavior. Such delegation is achieved in three classes of web systems: dynamic script delegation systems, plug-in delegation systems, and ontology exchange systems. Examples of each class are presented here. An application of the proposed principle to use cases of web crawlers and software agents is discussed and an analysis of the advantages and disadvantages for the different types of system architectures is included. While the class of traditional web services is populated very well with existing systems, the three classes of executable behavior delegation systems are under-populated. However all the presented examples of executable behavior delegation systems have significant advantages over traditional web services. Thus it is expected that future trends in web system architectures will be seen as a migration from the class of traditional web services to the three classes of systems with executable behavior delegation.","PeriodicalId":426543,"journal":{"name":"2011 International Conference on Collaboration Technologies and Systems (CTS)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131827753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Constraints or consequences in the U.S. electricity Smart Grid","authors":"J. Hoag, S. A. Klein, Burzin Kahjotia","doi":"10.1109/CTS.2011.5928750","DOIUrl":"https://doi.org/10.1109/CTS.2011.5928750","url":null,"abstract":"Foundational to the development of distributed control systems is the need to understand the constraints imposed by all facets of communication infrastructure. This paper concerns implementation of advanced supervisory data acquisition and control in the emerging U.S. electricity Smart Grid, which is expected to perform new kinds of control tasks on a regional basis within a small number of 60Hz power cycles. In the context of a layered protocol architecture approach, several activities consume time including propagation and serialization delays; in addition, the introduction of interrupt-drive transactions, connection establishment, authentication, and encryption must also be modeled to ensure that proposed control activities are feasible.","PeriodicalId":426543,"journal":{"name":"2011 International Conference on Collaboration Technologies and Systems (CTS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128232654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cultural aspects in groupware application as an intercultural collaboration technology","authors":"R. Suadamara, S. Werner, A. Hunger","doi":"10.1109/CTS.2011.5928740","DOIUrl":"https://doi.org/10.1109/CTS.2011.5928740","url":null,"abstract":"As culture now becomes a critical issue, developers and designers have begun to realize the role of culture in the method and process on applying cultural factors design in collaborative application. By adopting cultural dimension introduced by Trompenaars [1], this paper reports about on-going research on how culture influence the design of a synchronous groupware application as an intercultural collaboration tools aimed for global virtual team which consist of multicultural users. As individuals are conditioned by their culture, it will try to analyze how culture influences the way users prefer to interact using a groupware so that we can understand the mechanism by which cultural differences could explain user's behavior toward the acceptance to a groupware application as a remote collaboration tool for global virtual team.","PeriodicalId":426543,"journal":{"name":"2011 International Conference on Collaboration Technologies and Systems (CTS)","volume":"20 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125775467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mail2Tag: Augmenting email for sharing with implicit tag-based categorization","authors":"Les Nelson, R. Nairn, Ed H. Chi, G. Convertino","doi":"10.1109/CTS.2011.5928661","DOIUrl":"https://doi.org/10.1109/CTS.2011.5928661","url":null,"abstract":"New technology can disrupt existing social processes, especially those formed within the workplace email habitat. Recent abundance of sharing tool choices and disruption of practices makes for a lack of agreement and coherence in the use of information sharing tools. At work, email remains the primary way for sharing information, despite years of knowledge management research. We examine the design of a system for lightweight organizational sharing called Mail2Tag, which augments email by utilizing existing email sharing practices to help gather content, implicitly organize that content, and evolve both the shared content and the groups of people interested in that content. The vision is to get the right information to the right people at the right time, without increasing overall information noise.","PeriodicalId":426543,"journal":{"name":"2011 International Conference on Collaboration Technologies and Systems (CTS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126021054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}