By Topic

2012 International Conference on Collaboration Technologies and Systems (CTS)

21-25 May 2012

Filter Results

Displaying Results 1 - 25 of 109
  • Welcome

    Publication Year: 2012, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (113 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committee

    Publication Year: 2012, Page(s):1 - 11
    Request permission for commercial reuse | PDF file iconPDF (211 KB)
    Freely Available from IEEE
  • CTS 2012 keynotes

    Publication Year: 2012, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB) | HTML iconHTML

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CTS 2012 plenary speech

    Publication Year: 2012, Page(s):1 - 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (154 KB) | HTML iconHTML

    Most work on collaboration technologies (GDSS, CSCW, etc.) has traditionally focused on supporting social action and communication in settings of relatively low goal conflict. This is appropriate in many organizational contexts, where common goals based on a shared management structure can be assumed. But much of communicative action in human societies occurs in an environment of conflict. We can ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CTS 2012 tutorials

    Publication Year: 2012, Page(s):1 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (547 KB) | HTML iconHTML

    These keynote speeches discuss the following: security of cloud computing, storage, and networking; P2P networks: file sharing to collaborative computing and data fusion; trust networks; collaborative document management and knowledge work; socialization of newcomers in online communities; models of coordination in multiagent decision making; introduction to complexity in collaborative environment... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CTS 2012 panel sessions [2 abstracts]

    Publication Year: 2012, Page(s):1 - 18
    Request permission for commercial reuse | PDF file iconPDF (1326 KB)
    Freely Available from IEEE
  • CTS 2012 sponsors

    Publication Year: 2012, Page(s):1 - 4
    Request permission for commercial reuse | PDF file iconPDF (462 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):1 - 9
    Request permission for commercial reuse | PDF file iconPDF (166 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2012, Page(s):1 - 8
    Request permission for commercial reuse | PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (347 KB)
    Freely Available from IEEE
  • Security of cloud computing, storage, and networking

    Publication Year: 2012, Page(s):1 - 5
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (454 KB) | HTML iconHTML

    Convergence and ubiquity are the key characteristics of tomorrows service provision infrastructures. Cloud architectures will constitute cost-efficient backbones that will support the transmission, storage, and computing of the applications contents. These architectures can be used for business, scientific, and pervasive computing purposes. The diversity of the services delivered through cloud inf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecture and measured characteristics of a cloud based internet of things

    Publication Year: 2012, Page(s):6 - 12
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (477 KB) | HTML iconHTML

    The Internet of Things (IoT) many be thought of as the availability of physical objects, or devices, on the Internet [1]. Given such an arrangement it is possible to access sensor data and control actuators remotely. Furthermore such data may be combined with data from other sources - e.g. with data that is contained in the Web - or operated on by cloud based services to create applications far ri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Challenges in middleware solutions for the internet of things

    Publication Year: 2012, Page(s):21 - 26
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (249 KB) | HTML iconHTML

    The Internet of Things (IoT) aims to interconnect our everyday life items. It provides them with information processing capabilities to enable computers to sense, integrate, present, and react to all aspects of the physical world. This move from “interconnected computers” to “interconnected things” requires simplifying the development of new applications and services by... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet of things implications on ICN

    Publication Year: 2012, Page(s):27 - 33
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1119 KB) | HTML iconHTML

    The number of connected devices over the Internet of Things (IoT) are expected to be over 25 billion by 2015. This is more than three devices for every human being on earth. The most common deployment of the IoT is expected to be based on Information-Centric Networking (ICN) where control and intelligent related information are hosted at a centralized location. Cleary performance and security impl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving quality of data user experience in 4G distributed telecommunication systems

    Publication Year: 2012, Page(s):34 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1236 KB) | HTML iconHTML

    We propose an efficient service management technique that enhances the quality of experience (QoE) of 4G users by enabling them to locate the best available network service provider (NSP) among many existing NSPs. We also propose a practical method that 4G users can use to implement the proposed technique in a purely distributed manner. Using simulations, we show that the proposed technique i) inc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Collaborative annotation of real time streams on android-enabled devices

    Publication Year: 2012, Page(s):39 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (940 KB) | HTML iconHTML

    Mobile based collaboration such as image tagging and video annotation has become a research hotspot for both academic groups and the industry. Mobile devices running with Google Android or Apples iOS have almost the same computing and multimedia capabilities as modern computers, which enables conducting regular collaborative activities on them. Moreover their embedded geographic sensors can provid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantically-supported team building in a KDD virtual environment

    Publication Year: 2012, Page(s):45 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB) | HTML iconHTML

    Team building plays a crucial role in many collaborative projects. The use of semantic technologies and tools, like ontologies and metadata management proved to be a powerful approach to organize people competencies and support the formation of teams. Although Knowledge Discovery in Databases (KDD) has inherent collaborative characteristics, team building in this domain has not been the subject of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge-based in-action in globally distributed advanced engineering and construction

    Publication Year: 2012, Page(s):53 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB) | HTML iconHTML

    One of the typical statements of many industries today is that they are knowledge-intensive, and that it is the thinking behind the work that separates the great from the ordinary. “Innovative”, “creative”, “skillful” and “apt” are terms that tend to be used interchangeably with knowledge as well. Hence, to manage a business well means to fac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Crisis Management experience based representation Road accident situations

    Publication Year: 2012, Page(s):61 - 67
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB) | HTML iconHTML

    Crisis management is a special type of collaborative situation in which the actors are subject to an uninterrupted stress. To deal with the important consequences (human and economic losses) of these situations, we study how to represent emergency management situations based on experience feedback. We use several techniques: situations representations, knowledge engineering techniques and scenario... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-agent coordination techniques for multi-robot task allocation and multi-robot area coverage

    Publication Year: 2012, Page(s): 75
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    Multi-robot systems have emerged as a central research theme within robotics with applications in several domains that require automated robotic assistants such as unmanned search and rescue, automated surveillance and reconnaissance operations, automated civilian transportation, extra-terrestrial exploration, and even domestic applications such as agriculture, lawn mowing, vacuum cleaning, etc. O... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Collaborative single and parallel machine scheduling by autonomous agents

    Publication Year: 2012, Page(s):76 - 83
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (573 KB) | HTML iconHTML

    Collaborative interorganizational systems is a relevant and promising research domain. When autonomous agents associated with different enterprises negotiate about rival resources, coordination is a major challenge. Information provided by the agents is a fruit of a poisonous tree because the selfish agents have an incentive to lie strategically which makes the revealed information unreliable and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mixed-initiative distributed simultaneous (MDS) planning

    Publication Year: 2012, Page(s):84 - 90
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (590 KB) | HTML iconHTML

    In many real-world situations, a problem emerges suddenly (e.g., Cyber attacks may take just milliseconds), while the response processes may last much longer (e.g., network system restoration after a Cyber attack may take hours or days). Presently, a fully automated response is impractical, due to complex dynamics and uncertainties, as well as social and political requirements (e.g., for humans to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AgentCity-An agent-based modeling approach to city planning and population dynamics

    Publication Year: 2012, Page(s):91 - 96
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (758 KB) | HTML iconHTML

    Cities spend time, revenue and resources in an effort to optimize the geographic and physical layout of property zones and services for the population. As physical construction of these various city models is prohibitive, we can create computational models for testing and experimentation. These computational models include human elements and simulate natural complex social system. These computatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software agent application to support the patient-at-home

    Publication Year: 2012, Page(s):97 - 103
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB) | HTML iconHTML

    This work is motivated by the Patient-at-Home (PAH). He or she is an ambulatory patient who requires a greater level of attention, such as individuals with chronic conditions, elderly patients, those with trauma injuries, etc. Latest developments in US national-level health care standards and specifications have focused on needs of in-hospital scenarios and interoperability among diverse instituti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A bluetooth-based architecture for android communication with an articulated robot

    Publication Year: 2012, Page(s):104 - 108
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (466 KB) | HTML iconHTML

    In industrial robotic environments, there are many different robots performing a variety of tasks. Each robot is controlled by its own teach pendant or via a networked socket application. However, to monitor the status or make minor changes to the programming of the robot, the user must obtain access to the teach pendant or terminal. In an effort to eliminate this need, this paper introduces an an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.