By Topic

Collaborative Technologies and Systems (CTS), 2010 International Symposium on

Date 17-21 May 2010

Filter Results

Displaying Results 1 - 25 of 96
  • Welcome

    Publication Year: 2010, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (94 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committee

    Publication Year: 2010, Page(s):1 - 9
    Request permission for commercial reuse | PDF file iconPDF (149 KB)
    Freely Available from IEEE
  • Keynotes

    Publication Year: 2010, Page(s):1 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (369 KB)

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CTS 2010 plenary speech: Adventures in the cyber-commons — A classroom for the playstation generation

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (101 KB)

    A cyber-commons is a technology-enhanced meeting room that supports local and distance collaboration, promoting group-oriented problem solving. The centerpiece of our newest cyber-commons classroom is a large tiled LCD display wall with 20 gigabits of networking. Making this kind of advanced technology available to students for their classes as well as their casual meetings allows us to prototype ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tutorials

    Publication Year: 2010, Page(s):1 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (315 KB) | HTML iconHTML

    Provides an abstract for each of the presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Present

    Publication Year: 2010, Page(s):1 - 19
    Request permission for commercial reuse | PDF file iconPDF (760 KB)
    Freely Available from IEEE
  • The 2010 International Symposium on Collaborative Technologies and Systems (CTS 2010) May 17 - 21, 2010, Chicago, Illinois, USA. CTS 2010 Sponsors

    Publication Year: 2010, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (346 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):1 - 8
    Request permission for commercial reuse | PDF file iconPDF (163 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2010, Page(s):1 - 7
    Request permission for commercial reuse | PDF file iconPDF (97 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (729 KB)
    Freely Available from IEEE
  • Understanding considerate systems — UCS (pronounced: You see us)

    Publication Year: 2010, Page(s):1 - 12
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    Interactions between people occur in a social realm. On the other hand, “things”, including devices for communication and computation, are generally socially deficient. Imagine socially aware systems moving from an interruption model of communication to an introduction model. To create considerate systems, there is a need to model social context, social behavior, and communication go... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Capitalization of collective knowledge: From knowledge engineering, multi-agent systems to CSCW and socio semantic web

    Publication Year: 2010, Page(s):13 - 20
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (180 KB) | HTML iconHTML

    Knowledge Management (KM) is one of the key progress factors in organizations. It aims at capturing explicit and tacit knowledge of an organization in order to facilitate the access, sharing, and reuse of that knowledge as well as creation of new knowledge and organizational learning. We introduce in this tutorial knowledge engineering techniques that help at structuring information and knowledge ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Introduction to XMPP protocol and developing online collaboration applications using open source software and libraries

    Publication Year: 2010, Page(s):21 - 25
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (104 KB) | HTML iconHTML

    Extensible Messaging and Presence Protocol (XMPP) is an open, XML-based protocol aimed at near-real-time, extensible instant messaging (IM) and presence information. It has been expanded into the broader realm of message-oriented middleware. Built to be extensible, the protocol has been extended with features such as Voice over IP and file transfer signaling. XMPP protocol has been used by many so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving video performance in VNC under high latency conditions

    Publication Year: 2010, Page(s):26 - 35
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (241 KB) | HTML iconHTML

    Virtual Network Computing, or VNC, is a popular thin client application used to access files and applications on remote computers. However, VNC can suffer from significant losses in throughput when there is high latency between the client and server. These losses become especially apparent in the case of video, where updates are both large and frequent. In this work, we present a Message Accelerat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • BlackTie: Injecting elements of formality into enterprise social software

    Publication Year: 2010, Page(s):36 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (571 KB) | HTML iconHTML

    Successful organizations rely on a healthy mixture of formal and informal structures to coordinate effectively and operate efficiently. Formal structures, such as documented business processes, are valuable when they can be applied successfully to new contexts and because they provide a high degree of visibility and traceability during their application. When they fail, or are simply not available... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Social Collaborative virtual environment for software development

    Publication Year: 2010, Page(s):46 - 55
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (714 KB) | HTML iconHTML

    Software development teams often require information and expert help that are not supported by conventional development environments. This paper presents a social development environment called SCI (Social Collaborative IDE) that unifies the concepts of social network and collaborative development environment. SCI integrates presence and activity awareness information and collaborative program dev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting collaboration by providing real-time assessment of individual and team performance

    Publication Year: 2010, Page(s): 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (47 KB) | HTML iconHTML

    Summary form only given. The management of team work and task work in modern high-paced, collaborative environments is challenging due to unyielding time constraints, constant switching of cognitive tasks, and collating incoming and outgoing information requests to and from collaborators who vary in their expertise. To ensure the effectiveness of collaboration in these environments, agencies frequ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Relational access control with bivalent permissions in a social Web/collaboration architecture

    Publication Year: 2010, Page(s):57 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (402 KB) | HTML iconHTML

    We describe an access control model that has been implemented in the web content management framework “Deme” (which rhymes with “team”). Access control in Deme is an example of what we call “bivalent relation object access control” (BROAC). This model builds on recent work by Giunchiglia et al. on relation-based access control (RelBAC), as well as other wo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User centric authentication for web applications

    Publication Year: 2010, Page(s):67 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (225 KB) | HTML iconHTML

    Due to its large penetration and ease of use, the web environment provides a platform that enables collaboration among people working on a joint topic. Regardless of the actual focus of collaborating groups, security is very often a key aspect of such an environment. Provision of the proper level of authentication and access control is a necessity in almost any real world deployment of collaborati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing user authentication in claim-based identity management

    Publication Year: 2010, Page(s):75 - 83
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1073 KB) | HTML iconHTML

    In claim-based identity management (CBIM) systems, users identify themselves using security tokens that contain personally identifiable information, and that are signed by an identity provider. However, a malicious identity provider could readily impersonate any user by generating appropriate tokens. The growing number of identity theft techniques raises the risk of service providers being deceive... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Role-based domain discovery in decentralized secure interoperations

    Publication Year: 2010, Page(s):84 - 93
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (359 KB) | HTML iconHTML

    Multi-domain collaborative environments are becoming a reality as can be witnessed in emerging Internet-based enterprise applications. Access control to ensure secure interoperation in such multi-domain environments is a crucial challenge. Decentralized secure interoperation approaches are becoming promising since it requires no centralized administration and thus can accommodate very large scale ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Engineering intelligent sensor networks with ASSL and DMF

    Publication Year: 2010, Page(s):94 - 102
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (855 KB) | HTML iconHTML

    We describe the use of ASSL (Autonomic System Specification Language) and DMF (Demand Migration Framework) in the development of software systems for intelligent sensor networks. ASSL is used to formally specify and automatically generate autonomous intelligent sensor nodes. DMF is applied to connect those nodes in a sensor network. ASSL provides sensor networks with self-management behavior based... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic state-based routing for load balancing and efficient data gathering in wireless sensor networks

    Publication Year: 2010, Page(s):103 - 112
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (193 KB) | HTML iconHTML

    We consider the online data gathering problem in wireless sensor networks and examine the key issues of load balancing the nodes to achieve longer network lifetime, and that of load balancing the network links to achieve greater reliability in the network. We model the given network as a shortest-path DAG D, which defines a set of parent nodes for each node that determine the minimum-hops paths fr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Networks of Timed Automata for collaborative systems: A network monitoring case study

    Publication Year: 2010, Page(s):113 - 122
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (195 KB) | HTML iconHTML

    We introduce Dynamic Networks of Timed Automata, an extension of (Networks of) Timed Automata useful for specifying concurrently executing timed-processes. The main difference with Timed Automata is that we allow the instantiation at run-time of multiple copies of automata. In this paper we also show an industrial case study where a system for monitoring a network of wireless devices is built appl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Targeted ontology mapping

    Publication Year: 2010, Page(s):123 - 132
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (154 KB) | HTML iconHTML

    We examine the ontology mapping problem with three different groups of readers in mind: system designers, who need to know what is and isn't possible given the current state of alignment algorithms and what pitfalls to watch out for when someone suggests the use of ontologies in a project; system developers, who require knowledge of specific algorithms and useful software libraries; and semantic i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.