By Topic

Collaboration Technologies and Systems (CTS), 2012 International Conference on

Date 21-25 May 2012

Filter Results

Displaying Results 1 - 25 of 109
  • Welcome

    Publication Year: 2012 , Page(s): 1 - 3
    Save to Project icon | Request Permissions | PDF file iconPDF (113 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Committee

    Publication Year: 2012 , Page(s): 1 - 11
    Save to Project icon | Request Permissions | PDF file iconPDF (211 KB)  
    Freely Available from IEEE
  • CTS 2012 keynotes

    Publication Year: 2012 , Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (356 KB) |  | HTML iconHTML  

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CTS 2012 plenary speech

    Publication Year: 2012 , Page(s): 1 - 2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (154 KB) |  | HTML iconHTML  

    Most work on collaboration technologies (GDSS, CSCW, etc.) has traditionally focused on supporting social action and communication in settings of relatively low goal conflict. This is appropriate in many organizational contexts, where common goals based on a shared management structure can be assumed. But much of communicative action in human societies occurs in an environment of conflict. We can distinguish at least two dimensions of conflict: one involving beliefs and one involving goals. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CTS 2012 tutorials

    Publication Year: 2012 , Page(s): 1 - 17
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (547 KB) |  | HTML iconHTML  

    These keynote speeches discuss the following: security of cloud computing, storage, and networking; P2P networks: file sharing to collaborative computing and data fusion; trust networks; collaborative document management and knowledge work; socialization of newcomers in online communities; models of coordination in multiagent decision making; introduction to complexity in collaborative environments. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CTS 2012 panel sessions

    Publication Year: 2012 , Page(s): 1 - 18
    Save to Project icon | Request Permissions | PDF file iconPDF (1326 KB)  
    Freely Available from IEEE
  • CTS 2012 sponsors

    Publication Year: 2012 , Page(s): 1 - 4
    Save to Project icon | Request Permissions | PDF file iconPDF (462 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012 , Page(s): 1 - 9
    Save to Project icon | Request Permissions | PDF file iconPDF (166 KB)  
    Freely Available from IEEE
  • Author index

    Publication Year: 2012 , Page(s): 1 - 8
    Save to Project icon | Request Permissions | PDF file iconPDF (119 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (347 KB)  
    Freely Available from IEEE
  • Security of cloud computing, storage, and networking

    Publication Year: 2012 , Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (454 KB) |  | HTML iconHTML  

    Convergence and ubiquity are the key characteristics of tomorrows service provision infrastructures. Cloud architectures will constitute cost-efficient backbones that will support the transmission, storage, and computing of the applications contents. These architectures can be used for business, scientific, and pervasive computing purposes. The diversity of the services delivered through cloud infrastructures increases their vulnerability to security incidents and attacks. The cost and complexity reduction requirements render the design and development of protection mechanisms even more challenging. In addition, key design features such as confidentiality, privacy, authentication, anonymity, survivability, dependability, and fault-tolerance are, in some extent, conflicting. The objective of this tutorial is to present the state-of-the-art of security and explore research directions and technology trends to address the protection of cloud communications and networking infrastructures. An emphasis will be made on the collaboration of mobile devices in cloud based infrastructures. The fundamental concepts of cloud computing security will be explored, including cloud security services, cloud security principles, cloud security requirements, and testing techniques. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecture and measured characteristics of a cloud based internet of things

    Publication Year: 2012 , Page(s): 6 - 12
    Cited by:  Papers (8)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (477 KB) |  | HTML iconHTML  

    The Internet of Things (IoT) many be thought of as the availability of physical objects, or devices, on the Internet [1]. Given such an arrangement it is possible to access sensor data and control actuators remotely. Furthermore such data may be combined with data from other sources - e.g. with data that is contained in the Web - or operated on by cloud based services to create applications far richer than can be provided by isolated embedded systems [2,3]. This is the vision of the Internet of Things. We present a cloud-compatible open source controller and an extensible API, hereafter referred to as `IoTCloud', which enables developers to create scalable high performance IoT and sensor-centric applications. The IoTCloud software is written in Java and built on popular open source packages such as Apache Active MQ [4] and JBoss Netty [5]. We present an overview of the IoT Cloud architecture and describe its developer API. Next we introduce the FutureGrid - a geographically distributed and heterogeneous cloud test-bed [6,7] - used in our experiments. Our preliminary results indicate that a distributed cloud infrastructure like the FutureGrid coupled with our flexible IoTCloud framework is an environment suitable for the study and development of IoT and sensor-centric applications. We also report on our initial study of certain measured characteristics of an IoTCloud application running on the FutureGrid. We conclude by inviting interested parties to use the IoTCloud to create their own IoT applications or contribute to its further development. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Challenges in middleware solutions for the internet of things

    Publication Year: 2012 , Page(s): 21 - 26
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (249 KB) |  | HTML iconHTML  

    The Internet of Things (IoT) aims to interconnect our everyday life items. It provides them with information processing capabilities to enable computers to sense, integrate, present, and react to all aspects of the physical world. This move from “interconnected computers” to “interconnected things” requires simplifying the development of new applications and services by supporting interoperability among heterogeneous devices; so that the programmer can focus on the development of applications enabled by the infrastructure of IoT. Middleware is a software layer interposed between the infrastructure and the applications using it [1] that basically aims to support important requirements for these applications. This paper surveys existing middleware designed for IoT and focuses on various technical challenges in this domain. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet of things implications on ICN

    Publication Year: 2012 , Page(s): 27 - 33
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1119 KB) |  | HTML iconHTML  

    The number of connected devices over the Internet of Things (IoT) are expected to be over 25 billion by 2015. This is more than three devices for every human being on earth. The most common deployment of the IoT is expected to be based on Information-Centric Networking (ICN) where control and intelligent related information are hosted at a centralized location. Cleary performance and security implications must be considered very carefully when developing IOT architectural frameworks. This paper addresses the key ICN performance and security requirements of IP based IoT networks and presents a case study using smart services in IT infrastructure network. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving quality of data user experience in 4G distributed telecommunication systems

    Publication Year: 2012 , Page(s): 34 - 38
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1236 KB) |  | HTML iconHTML  

    We propose an efficient service management technique that enhances the quality of experience (QoE) of 4G users by enabling them to locate the best available network service provider (NSP) among many existing NSPs. We also propose a practical method that 4G users can use to implement the proposed technique in a purely distributed manner. Using simulations, we show that the proposed technique i) increases network service availability by allowing 4G users to quickly find available NSPs, ii) are very scalable by performing well regardless of the number of users in the system, and iii) are implementable in decentralized fashion by relying on information that can be observed locally and without any cooperation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Collaborative annotation of real time streams on android-enabled devices

    Publication Year: 2012 , Page(s): 39 - 44
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (940 KB) |  | HTML iconHTML  

    Mobile based collaboration such as image tagging and video annotation has become a research hotspot for both academic groups and the industry. Mobile devices running with Google Android or Apples iOS have almost the same computing and multimedia capabilities as modern computers, which enables conducting regular collaborative activities on them. Moreover their embedded geographic sensors can provide useful auxiliary metadata to help improve the accuracy of several collaboration features such as location annotation and tagging recommendation. In this paper, we firstly analyze recent research on mobile based collaboration and annotation projects, and then we introduce our efforts in expanding a collaborative annotation framework to the mobile platforms, especially the android-enabled devices. A prototype of the mobile extension that supports collaborative annotation on real time data streams especially audiovisual streams is introduced as well as several preliminary performance experiments. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantically-supported team building in a KDD virtual environment

    Publication Year: 2012 , Page(s): 45 - 52
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (532 KB) |  | HTML iconHTML  

    Team building plays a crucial role in many collaborative projects. The use of semantic technologies and tools, like ontologies and metadata management proved to be a powerful approach to organize people competencies and support the formation of teams. Although Knowledge Discovery in Databases (KDD) has inherent collaborative characteristics, team building in this domain has not been the subject of extensive work yet. In this paper we start filling this gap by presenting TeamOnto, an ontology for the representation of project teams. TeamOnto is part of a wide, modular and integrated Knowledge Base about KDD projects, of which we briefly illustrate some modules, showing their use to support team building in the KDD domain. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge-based in-action in globally distributed advanced engineering and construction

    Publication Year: 2012 , Page(s): 53 - 60
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (440 KB) |  | HTML iconHTML  

    One of the typical statements of many industries today is that they are knowledge-intensive, and that it is the thinking behind the work that separates the great from the ordinary. “Innovative”, “creative”, “skillful” and “apt” are terms that tend to be used interchangeably with knowledge as well. Hence, to manage a business well means to facilitate the development and exploitation of such knowledge, and make sure that it is not idle or hidden. This paper re-examines the idea of a structured, collaborative knowledge management and identifies gaps between its conceptualization and observable practice. Our case study has been globally distributed shipbuilding, for which we identify different variants of knowledge-based in-action that we think needs to be managed, rather than aiming to implement a repository-like organizational “memory”. This analysis is reflected in a design framework, which we aim to use for implementing flexible information architectures for knowledge management in large-scale advanced engineering and construction. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Crisis Management experience based representation Road accident situations

    Publication Year: 2012 , Page(s): 61 - 67
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (392 KB) |  | HTML iconHTML  

    Crisis management is a special type of collaborative situation in which the actors are subject to an uninterrupted stress. To deal with the important consequences (human and economic losses) of these situations, we study how to represent emergency management situations based on experience feedback. We use several techniques: situations representations, knowledge engineering techniques and scenarios definition. Several dimensions are considered in this study: organization, communication and problem solving activities. We present in this paper our first results related to the representation of a specific type of crisis management: a road accident. Our first concern is to define the structures and interface in order to handle experience of crisis management. This creates the necessary foundation to help the actors to make decisions during the management of crisis. This work is done with the collaboration of the Aube' Emergency Department. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-agent coordination techniques for multi-robot task allocation and multi-robot area coverage

    Publication Year: 2012 , Page(s): 75
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (230 KB) |  | HTML iconHTML  

    Multi-robot systems have emerged as a central research theme within robotics with applications in several domains that require automated robotic assistants such as unmanned search and rescue, automated surveillance and reconnaissance operations, automated civilian transportation, extra-terrestrial exploration, and even domestic applications such as agriculture, lawn mowing, vacuum cleaning, etc. One of the major computational challenges in multi-robot systems is to design appropriate coordination techniques between the robots that enable them to perform operations efficiently in terms of time, cost and energy expended while keeping the system robust to individual robot failures as well as scalable in the number of robots. Coordination technologies from the field of multi-agent systems offer a rich array of solutions that can be adapted to multi-robot sytems. In this talk, we will summarize our research on two operations that are frequently encountered in many multi-robot domains, namely, multi-robot area coverage [1] and multi-robot task allocation [2]. First, we will describe a coalition game theory based technique for dynamically reconfiguring multi-robot teams by splitting or merging them, when they encounter obstacles while covering an initially unknown environment. We will introduce two heuristics that, given the set of robots requiring reconfiguration, guarantee rapid convergence to the appropriate partition of the set of robots while taking into consideration the physical characteristics of the robots and the environment [3]. Secondly, I will describe a distributed, auction-based multirobot task allocation algorithm called DynamicBids [4] that improves the performance of tasks and significantly reduces the communication overhead between robots by allowing a bidder robot to selectively revise its bids on tasks if that improves the cost of the schedule of the tasks to the bidder robot. For both techniques, we will describe analytical results, and, experimental- results from simulations on the Webots simulator as well as on physical robots. Finally, we will demonstrate our ongoing work on autonomous, multi-robot landmine detection that uses the techniques mentioned above to coordinate a set of robots, fitted with different types of landmine detection sensors, to potentially improve the accuracy with which landmines can be detected [5]. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Collaborative single and parallel machine scheduling by autonomous agents

    Publication Year: 2012 , Page(s): 76 - 83
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (573 KB) |  | HTML iconHTML  

    Collaborative interorganizational systems is a relevant and promising research domain. When autonomous agents associated with different enterprises negotiate about rival resources, coordination is a major challenge. Information provided by the agents is a fruit of a poisonous tree because the selfish agents have an incentive to lie strategically which makes the revealed information unreliable and misleading for a central authority. Moreover, the agents might not be willing to reveal information due to privacy concerns. Thus, there is a need for sophisticated mechanisms in collaborative systems that facilitate the coordination of non-cooperative agents. This paper deals with rival machine scheduling of one or more homogeneous machines by autonomous agents. Overall objectives are the minimization of the collective total weighted tardiness and Pareto efficient outcomes. We have developed a mediated negotiation protocol drawing on quotas for the acceptance of contract proposals. The protocol ensures that the agents accept sufficient proposals such that they can overcome individual local optima and achieve Pareto superior outcomes. For evaluation purposes, we have conducted several computational experiments. The experiments show that the proposed protocol achieves beneficial outcomes. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mixed-initiative distributed simultaneous (MDS) planning

    Publication Year: 2012 , Page(s): 84 - 90
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (590 KB) |  | HTML iconHTML  

    In many real-world situations, a problem emerges suddenly (e.g., Cyber attacks may take just milliseconds), while the response processes may last much longer (e.g., network system restoration after a Cyber attack may take hours or days). Presently, a fully automated response is impractical, due to complex dynamics and uncertainties, as well as social and political requirements (e.g., for humans to be “in the loop”). Thus, a viable approach is to augment human capabilities to solve the problem, but this results in a subsequent complication: the technical skills required are not all residing in one place and a network of dispersed experts must plan and carry out an effective response together. This paper aims to define and investigate a special challenge, named Mixed-initiative Distributed Simultaneous (MDS) planning, arising from complex real-world problems. A framework named We-Plan, its multi-agent based system architecture and a software prototype have been designed and developed to address MDS planning. We present the appropriate background and a definition of the challenge, a brief literature review, an architecture design, and a software prototype implementation featuring a step-by-step walkthrough demonstrating how collaborative processes and multi-agent technologies can be employed to effectively carry out MDS planning. The paper does not delve into algorithmic details as a partial solution, but aims to present a viable and practical framework for addressing the aforementioned challenges. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AgentCity-An agent-based modeling approach to city planning and population dynamics

    Publication Year: 2012 , Page(s): 91 - 96
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (758 KB) |  | HTML iconHTML  

    Cities spend time, revenue and resources in an effort to optimize the geographic and physical layout of property zones and services for the population. As physical construction of these various city models is prohibitive, we can create computational models for testing and experimentation. These computational models include human elements and simulate natural complex social system. These computational-models also provide opportunities to study emergent behaviors similar to the real world. These computational emergent behaviors can give us insight into the effectiveness of our city model. This paper will focus on creating a computational model of a virtual city with zoning and a heterogeneous population using NetLogo modelling environment. Results of our implementation are described and future opportunities are identified. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software agent application to support the patient-at-home

    Publication Year: 2012 , Page(s): 97 - 103
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (528 KB) |  | HTML iconHTML  

    This work is motivated by the Patient-at-Home (PAH). He or she is an ambulatory patient who requires a greater level of attention, such as individuals with chronic conditions, elderly patients, those with trauma injuries, etc. Latest developments in US national-level health care standards and specifications have focused on needs of in-hospital scenarios and interoperability among diverse institutionally-situated software systems. This work provides a focus of bringing the Patient-at-Home into collaborative partnership with the emerging standards-based electronic health care support. To accomplish this, an approach involving collaborative elements was developed. These include interactions between the PAH and an agent-based software application named Patient-at-Home Supporting Software Agents (PAHSSA) and between the PAH and the Family Physician. The point of connection between the Patient-at-Home and the emerging electronic health care system involves the Family Physician's Electronic Health Record (EHR). In this work, we develop a set of scenario elements that pertain to the PAH. We then derive requirements that can be utilized as use case snippets in order to design meaningful collaboration between the PAH and the health care system. Finally, we present an initial agent system design for PAHSSA to support the collaboration. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A bluetooth-based architecture for android communication with an articulated robot

    Publication Year: 2012 , Page(s): 104 - 108
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (466 KB) |  | HTML iconHTML  

    In industrial robotic environments, there are many different robots performing a variety of tasks. Each robot is controlled by its own teach pendant or via a networked socket application. However, to monitor the status or make minor changes to the programming of the robot, the user must obtain access to the teach pendant or terminal. In an effort to eliminate this need, this paper introduces an android platform that communicates with robots over a Bluetooth connection. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.