10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing最新文献

筛选
英文 中文
An Access Control scheme for Big Data processing 面向大数据处理的访问控制方案
10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257649
Vincent C. Hu, T. Grance, David F. Ferraiolo, D. R. Kuhn
{"title":"An Access Control scheme for Big Data processing","authors":"Vincent C. Hu, T. Grance, David F. Ferraiolo, D. R. Kuhn","doi":"10.4108/ICST.COLLABORATECOM.2014.257649","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257649","url":null,"abstract":"Access Control (AC) systems are among the most critical of network security components. A system's privacy and security controls are more likely to be compromised due to the misconfiguration of access control policies rather than the failure of cryptographic primitives or protocols. This problem becomes increasingly severe as software systems become more and more complex, such as Big Data (BD) processing systems, which are deployed to manage a large amount of sensitive information and resources organized into a sophisticated BD processing cluster. Basically, BD access control requires the collaboration among cooperating processing domains to be protected as computing environments that consist of computing units under distributed AC managements. Many BD architecture designs were proposed to address BD challenges; however, most of them were focused on the processing capabilities of the “three Vs” (Velocity, Volume, and Variety). Considerations for security in protecting BD are mostly ad hoc and patch efforts. Even with some inclusion of security in recent BD systems, a critical security component, AC (Authorization), for protecting BD processing components and their users from the insider attacks, remains elusive. This paper proposes a general purpose AC scheme for distributed BD processing clusters.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123588654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Audio retrieval based on perceptual similarity 基于感知相似度的音频检索
10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257704
Teng Zhang, Ji Wu, Dingding Wang, Tao Li
{"title":"Audio retrieval based on perceptual similarity","authors":"Teng Zhang, Ji Wu, Dingding Wang, Tao Li","doi":"10.4108/ICST.COLLABORATECOM.2014.257704","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257704","url":null,"abstract":"Given a short query audio clip, the goal of audio retrieval is to automatically fetch all similar clips from a given audio database. Different from traditional audio similarity which is mainly based on priori knowledge of objective reality, this paper proposes to use a more subjective method to measure the perceptual similarity between audio clips. These perceptual features focus on users' personal experience, which can be very helpful for audio retrieval across different databases. In addition, indexing and audio matching methods are introduced to speed up the retrieval process. Experimental results on four different datasets are conducted to evaluate the effectiveness and efficiency of our proposed approaches..","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115018600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Location-based timely cooperation over social private network 基于位置的社交私网即时合作
10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257321
Youna Jung, R. Figueiredo, J. Fortes
{"title":"Location-based timely cooperation over social private network","authors":"Youna Jung, R. Figueiredo, J. Fortes","doi":"10.4108/ICST.COLLABORATECOM.2014.257321","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257321","url":null,"abstract":"The increasing use of online social networks (OSNs) in emergency situations shows us a promising future of human cooperation through OSNs. Despite this intense interest, a number of fundamental limitations still exist, such as lack of appropriate conceptual models and limitations on cooperation methods and shareable resources. To address existing limitations, we propose Whistle - a cooperation framework for OSN users which can dynamically organize an emergency community with nearby users and guarantee unrestricted cooperation and resource sharing by leveraging the Jitsi communicator and the SocialVPN. To test the feasibility and applicability of Whistle, we present an implemented prototype and demonstrate its applicability to an example use case.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122572737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Applications of multimodal physical (IoT), cyber and social data for reliable and actionable insights 多模态物理(IoT)、网络和社会数据的应用,以获得可靠和可操作的见解
10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257553
A. Sheth, Pramod Anantharam, K. Thirunarayan
{"title":"Applications of multimodal physical (IoT), cyber and social data for reliable and actionable insights","authors":"A. Sheth, Pramod Anantharam, K. Thirunarayan","doi":"10.4108/ICST.COLLABORATECOM.2014.257553","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257553","url":null,"abstract":"Physical objects with embedded sensors are increasingly being networked together using wireless and internet technologies to form Internet of Things (IoT). However, early applications that rely on IoT data fail to provide comprehensive situational awareness. This often requires combining physical (i.e., IoT) data with social data created by humans on the Web and increasingly on their mobile phones (i.e., citizen sensing) as well as other data such as structured open data and background knowledge available on the Web (i.e., cyber data and knowledge). In this paper, we explore how integration and analysis of multimodal physical-cybersocial data can support advanced applications and enrich human experience. Specifically, we illustrate the complementary role played by sensor and social data, often intermediated by other Web based data and knowledge, using real-world examples in the domain of situational awareness, traffic monitoring, and healthcare. We also show how semantic techniques and technologies support critical data interoperability needs, advanced computation capabilities including reasoning, and significantly enhance our ability to exploit growing amount of data from the proliferation of Internet of Things.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114546080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Effects of cohesion-based feedback on the collaborations in global software development teams 基于内聚的反馈对全球软件开发团队协作的影响
Alberto Castro-Hernández, K. Swigger, Mirna Patricia Ponce Flores
{"title":"Effects of cohesion-based feedback on the collaborations in global software development teams","authors":"Alberto Castro-Hernández, K. Swigger, Mirna Patricia Ponce Flores","doi":"10.4108/eai.21-12-2015.150818","DOIUrl":"https://doi.org/10.4108/eai.21-12-2015.150818","url":null,"abstract":"This paper describes a study that examines the effect of cohesion-based feedback on a team members' behaviors in a global software development project. Chat messages and forum posts were collected from a software development project involving students living in the US and Mexico. Half of the teams in the project received feedback in the form of a graphical representation that displayed the group's cohesion level, while the other teams received no feedback. The nature of the group interactions as well as the linguistic content of such interactions was then analyzed and compared. Results from this analysis show statistically significant differences between the feedback and non-feedback conditions. More specifically, cohesion-based feedback had a positive relation to a team's total message count, response rate, and individual cohesion score. In addition, the analysis of linguistic categories showed that the most salient categories observed were related to words about time and work. Although the feedback system did not appear to affect individual performance, the findings suggest that the cohesion measure defined in the study is positively correlated to the task cohesion construct and is also related to individual and team performance.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130393613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Impact of socio-technical network on process performance 社会技术网络对过程绩效的影响
10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257288
R. Liu, Akhil Kumar
{"title":"Impact of socio-technical network on process performance","authors":"R. Liu, Akhil Kumar","doi":"10.4108/ICST.COLLABORATECOM.2014.257288","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257288","url":null,"abstract":"There is a growing interest in socio-technical networks that encompass people, process and technology. They capture connections among technical artifacts and human resources. Existing studies have shown that social networks among resources that collaborate to work on a business process instance have an impact on the performance of the instance. Hence, the social network among the resources should be aligned with the technical work structure. Thus, we propose to identify empirically the specific features of social networks (e.g. size, closeness, density, etc.) that have the most significant impact on the performance of a process. Then, we can leverage these significant social network features to optimize dynamic assignment of tasks to resources for better performance. In general, organizations can use this two-part approach to evaluate their resource social networks and shape their resource networks to achieve socio-technical network alignment. We use real data from business processes in the IT incident management domain for this study to demonstrate our proposed methodology.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125435139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Role and attribute based collaborative administration of intra-tenant cloud IaaS 基于角色和属性的租户内云IaaS协同管理
10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257591
Xin Jin, R. Krishnan, R. Sandhu
{"title":"Role and attribute based collaborative administration of intra-tenant cloud IaaS","authors":"Xin Jin, R. Krishnan, R. Sandhu","doi":"10.4108/ICST.COLLABORATECOM.2014.257591","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257591","url":null,"abstract":"Cloud Infrastructure as a Service (IaaS), where traditional IT infrastructure resources such as compute, storage and networking are owned by a cloud service provider (CSP) and offered as on-demand virtual resources to customers (tenants), is the fastest maturing service model in cloud computing. The transformation of physical resources into virtual offers great flexibility to CSP customers including network based remote collaborative administration. This flexibility can be fully availed only if complemented by commensurately flexible access control to the customers remote IT resources by the customer's IT users. Since customer policies in this regard can vary greatly, the CSP needs a flexible model to accommodate diverse policy requirements. In this paper, we investigate attribute-based access control (ABAC) in cloud IaaS. In ABAC, access requests are evaluated based on the attributes of cloud tenant users and those of objects such as virtual machines, storage volumes, networks, etc. We investigate the access control models supported by commercial IaaS providers such as Amazon AWS and opensource OpenStack, as well as other models in the literature, which mostly use role-based access control (RBAC). We demonstrate their limitations and motivate the need for ABAC support to realize the true potential of IaaS. Building on prior published ABAC models we define a formal ABAC model suitable for IaaS. As proof-of-concept we implement this model in OpenStack, a widely-used open source cloud IaaS software platform. We discuss enforcement alternatives in this context and partially evaluate their performance.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130440140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Programmer-controlled application-level multicast 程序员控制的应用层多播
10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257266
P. Dewan
{"title":"Programmer-controlled application-level multicast","authors":"P. Dewan","doi":"10.4108/ICST.COLLABORATECOM.2014.257266","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257266","url":null,"abstract":"Group communication abstractions provide application-level multicasting to communicate information among distributed processes. A variety of such abstractions have been provided to implement synchronous collaborative applications but they do not allow control over the multicast of information to the selected group of processes. We have developed a new abstraction that overcomes this limitation. It defines a two-level grouping of distributed processes, with one level defining the users interacting with a specific collaborative application, and the other defining the set of collaborative applications a set of users is sharing simultaneously to perform some collaborative task. It allows information to be sent directly to the receiving processes or through a centralized relayer. In either case, programmer-choosable and replaceable send and receive filters provide consistency guarantees. The abstraction provides message passing rather than remote procedure calls, and supports asynchronous sending and receiving of messages. It is designed to support both centralized and replicated architectures. The abstraction has been implemented on top of the Java Remote Method Invocation layer and has been used to implement a broad range of collaboration functions.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134008292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DQS-Cloud: A Data Quality-Aware autonomic cloud for sensor services DQS-Cloud:用于传感器服务的数据质量感知自主云
10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257475
Abhishek Kothari, Vinay Boddula, Lakshmish Ramaswamy, Neda Abolhassani
{"title":"DQS-Cloud: A Data Quality-Aware autonomic cloud for sensor services","authors":"Abhishek Kothari, Vinay Boddula, Lakshmish Ramaswamy, Neda Abolhassani","doi":"10.4108/ICST.COLLABORATECOM.2014.257475","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257475","url":null,"abstract":"With the advent of Internet of Things, the field of domain sensing is increasingly being servitized. In order to effectively support this servitization, there is a growing need for a powerful and easy-to-use infrastructure that enables seamless sharing of sensor data in real-time. In this paper, we present the design and evaluation of Data Quality-Aware Sensor Cloud (DQS-Cloud), a cloud-based sensor data services infrastructure. DQS-Cloud is characterized by three novel features. First, data-quality is pervasive throughout the infrastructure ranging from feed discovery to failure resilience. Second, it incorporates autonomic-computing-based techniques for dealing with sensor failures as well as data quality dynamics. Third, DQS-Cloud also features a unique sensor stream management engine that optimizes the system performance by dynamically placing stream management operators. This paper reports several experiments to study the effectiveness and the efficiency of the framework.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"53 15-18","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114045383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
MACNET: Mobile Adhoc Collaborative NETworks 移动自组织协作网络
10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257322
J. Shamsi, S. Raza, Hassan Farid, A. Mehdi, S. Munir
{"title":"MACNET: Mobile Adhoc Collaborative NETworks","authors":"J. Shamsi, S. Raza, Hassan Farid, A. Mehdi, S. Munir","doi":"10.4108/ICST.COLLABORATECOM.2014.257322","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257322","url":null,"abstract":"Resource limitation is considered as a major bottleneck in smart phones. This paper aims to address this problem by proposing a collaborative ad-hoc network of smart phones which utilizes trust relationship among peer devices to provide a computationally powerful, resilient, available, and low cost solution. MACNET (Mobile Ad-hoc Collaborative NETwork) implements a middleware to address the issues of collaboration, trust, and network connectivity. A large number of applications can utilize the MACNET framework for improved connectivity, rapid response, and better communication. The paper elaborates sample applications and addresses the architectural details of the solution. It also explains the implementation details and provides results to demonstrate the effectiveness and benefits.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117260137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信