By Topic

Computer Supported Cooperative Work in Design, 2009. CSCWD 2009. 13th International Conference on

Date 22-24 April 2009

Filter Results

Displaying Results 1 - 25 of 134
  • [Front cover]

    Publication Year: 2009, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1156 KB)
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (81 KB)
    Freely Available from IEEE
  • Committees

    Publication Year: 2009, Page(s):ii - iii
    Request permission for commercial reuse | PDF file iconPDF (235 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (47 KB) | HTML iconHTML
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):I - VIII
    Request permission for commercial reuse | PDF file iconPDF (28736 KB)
    Freely Available from IEEE
  • Many computers, many people, and everything in between: Supporting shared computing

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (141 KB)
    Freely Available from IEEE
  • Multiagent systems and semantic services for very large-scale participatory design

    Publication Year: 2009, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (180 KB)
    Freely Available from IEEE
  • Collaborative projects as social networks

    Publication Year: 2009, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (101 KB)
    Freely Available from IEEE
  • Analyzing the use of VoIP technology in collaborative modeling

    Publication Year: 2009, Page(s):4 - 9
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (218 KB) | HTML iconHTML

    Collaborative editing systems often use communication channels in order to make the collaboration more effective. In this work, we present a case study of pair communication using audio via VoIP (Voice over Internet Protocol) technology during collaborative modeling sessions. The study provides an analysis of audio and textual chat as communication medium and presents data on usage patterns, user ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A management strategy for distributed data in collaborative design

    Publication Year: 2009, Page(s):10 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (546 KB) | HTML iconHTML

    This paper presents a distributed data management strategy for collaborative design, which supports the data exchange pattern based on any fine-grained data as well as that based on traditional file service. Data are represented using XML and their exchange is achieved through the publishing and subscription mechanism among individual participants. It is also shown in this paper that how the data ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An ontological conceptualization approach for awareness in domain-independent design groupware

    Publication Year: 2009, Page(s):15 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB) | HTML iconHTML

    One of the most important aspects of groupware systems is the concept of awareness, which refers to the perception and knowledge of the group and its activities. This paper extends a previously developed ontology-based conceptualization for the development of user interfaces in groupware systems that support awareness. Specifically, we are interested in domain-independent design groupware. We prop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new collaborative scheme of test vector compression based on equal-run-length coding (ERLC)

    Publication Year: 2009, Page(s):21 - 25
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (720 KB) | HTML iconHTML

    A new scheme of test data compression, namely equal-run-length coding (ERLC) scheme is presented, which is based on run-length. It first considers both types of runs of 0's and 1's, then it further explores the relationship between two consecutive runs on the basis of the traditional characteristic of run coding which uses shorter codeword to represent longer symbol (run-length). This scheme uses ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The role research in group awareness model

    Publication Year: 2009, Page(s):26 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    Role is an important concept in collaboration systems and CSCW systems especially in the aspect of group awareness. This paper proposes a new group awareness model based on role by the research of role in collaboration systems and the analysis of existing awareness models. In the new proposed model, the task is decomposed into activities in order to acquire the activity graph. Then the roles are e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The visualization of constraints conflict in collaborative design

    Publication Year: 2009, Page(s):32 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6400 KB) | HTML iconHTML

    Constraints conflict occurs inevitably in collaborative design process. Therefore, conflict detection and resolution becomes critical for successfully completing the design. This paper puts forward a novel process of constraints conflict visualization to help designers to solve the problem. The process begins with modeling of constraint information based on constraints satisfaction problem (CSP), ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A role hierarchical group awareness model and its time possibility analysis based fuzzy time

    Publication Year: 2009, Page(s):38 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (349 KB) | HTML iconHTML

    A role based hierarchical group awareness model (RHGAM) on the basis of the previous research was presented in this paper. Regarding role as the basis of the group cooperation, firstly RHGAM constructed a group cooperation environment (GCE), and then GCE was extended by group awareness content, awareness hierarchy, the task decomposition rule. The model divided the awareness information into four ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis and improvement of collaborative simulation algorithm

    Publication Year: 2009, Page(s):44 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (313 KB) | HTML iconHTML

    Collaborative simulation has become an important process of complex product development and works as a key technology to improve product dynamic characteristics and synthetic performances. This paper firstly introduces a model description of collaborative simulation, and gives a systematic analysis on all kinds of factors which affect performance of algorithm including speed, precision and converg... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Collaboration engineering, philosophy, and Democracy with LaSca

    Publication Year: 2009, Page(s):50 - 55
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    Now-a-days, with the wide availability of Internet access, a great diffusion of the decision-making in large groups concepts and practices is happening, with many softwares to support it and many people eager to participate and actually collaborating arising. However, these ideas are not exactly new. In the middle of the 5th-4th century BC, some Greek city-states, like Athens, already had a politi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model for planning problem of diaphragm caustic soda and its approach based on particle swarm optimization algorithm

    Publication Year: 2009, Page(s):56 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    A multi-stage, multi-product, multi-constraint, and mixed continuous/batch plants planning problem is abstracted from production of diaphragm caustic soda, and the problem is formulated as a mathematic optimization model based on the objective to maximize the total profit with constraints involved resources, work manufacture processes and production capacity etc. An approach based on particle swar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Random stimulus generation with self-tuning

    Publication Year: 2009, Page(s):62 - 65
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (403 KB) | HTML iconHTML

    Constrained random simulation methodology still plays an important role in hardware verification due to the limited scalability of formal verification, especially for the large and complex design in industry. There are two aspects to measure the stimulus generator which are the quality of the stimulus generated and the efficiency of the generator. In this paper, we propose a self-tuning method to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a Decentralized Cooperative BRMS for Service Collaborative Enterprise

    Publication Year: 2009, Page(s):66 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (267 KB) | HTML iconHTML

    BRMS has played an important role in the development of business applications with its capability of separating business logic from hardcode of programming languages as business rules in a manageable and executable manner to improve agility of these applications. In Service Collaborative Enterprise (SCE), BRMS needs to be utilized in a cooperative way to facilitate the participants defining and en... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Explaining for developing a shared context in collaborative design

    Publication Year: 2009, Page(s):72 - 77
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1462 KB) | HTML iconHTML

    Collaborative design often meets together experts of different domains. Such groups need to share a context but often limited this one is often limited to few elements as common language, common tools and a same goal (the design process). Our goal is to developing a shared context to make compatible different experts' viewpoints. Making context explicit and shared supposes some explanatory capabil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Leveraging single-user AutoCAD for collaboration by transparent adaptation

    Publication Year: 2009, Page(s):78 - 83
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1522 KB) | HTML iconHTML

    It has been years since Computer-Aided Design (CAD) technology was used to assist engineers, architects and other design professionals in their design activities. Collaboration has been increasingly needed in the CAD community and various CSCW technologies have thus been adopted to support the development of collaborative design systems. Existing collaborative CAD applications suffer from several ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting semantic maintenance of complex Undo operations in replicated Co-AutoCAD environments

    Publication Year: 2009, Page(s):84 - 89
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2441 KB) | HTML iconHTML

    In order to bridge the gap between complex operations and atomic operations in CAD groupware, adapter tools are introduced to decompose complex operations into atomic ones by breaking up the former according to different steps and different objects. However, during the decomposition process, because of the loss of the relationships between the original operations and the atomic ones, the intention... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An active controller study of genetic algorithm search

    Publication Year: 2009, Page(s):90 - 95
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3298 KB) | HTML iconHTML

    Inadequate selection of operators and parameters will produce premature convergence that will be avoided by adopting finer setting of parameters. This research was inspired by the concept of quality control utilizing as a control mechanism for process control in various GA searching processes. The process controllers attempt to apply these mechanisms to optimize the settings of the operators and p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Techniques of user-mode detecting System Service Descriptor Table

    Publication Year: 2009, Page(s):96 - 101
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (274 KB) | HTML iconHTML

    In order to protect system service descriptor table (SSDT) and discover the hook which is hidden in kernel module, we propose two methods which work in user-mode for detecting the hook of SSDT. The methods we propose are different from the method that must work in kernel-mode after loading rootkit drivers. The first method is using devicephysicalmemory to detect the hook in user-mode, and the seco... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.