Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

2015 International Conference on Collaboration Technologies and Systems (CTS)

1-5 June 2015

Filter Results

Displaying Results 1 - 25 of 97
  • Preface

    Publication Year: 2015, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (71 KB) | HTML iconHTML
    Freely Available from IEEE
  • Advisory committee

    Publication Year: 2015, Page(s):1 - 11
    Request permission for commercial reuse | PDF file iconPDF (174 KB)
    Freely Available from IEEE
  • Tuesday keynote: Video communication for the 21st century

    Publication Year: 2015, Page(s):1 - 4
    Request permission for commercial reuse | PDF file iconPDF (309 KB)
    Freely Available from IEEE
  • CTS 2015 plenary speech: Agile at PayPal: A transformation towards leaner and more productive work collaboration

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • Tutorials

    Publication Year: 2015, Page(s):1 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB) | HTML iconHTML

    The tutorial aims to provide insights on Collaborative Business Intelligence for Open Innovation Governance. The tutorial introduces participants to concepts and frameworks for innovation monitoring. The relations between different types of innovation organizations and Business Intelligence architectures will be analyzed, from centralized organization to collaboration among autonomous organization... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Panel session I: Collaborative content creation

    Publication Year: 2015, Page(s):1 - 19
    Request permission for commercial reuse | PDF file iconPDF (924 KB)
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2015, Page(s):1 - 5
    Request permission for commercial reuse | PDF file iconPDF (336 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2015, Page(s):1 - 9
    Request permission for commercial reuse | PDF file iconPDF (166 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2015, Page(s):1 - 7
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (546 KB)
    Freely Available from IEEE
  • Deep web scientific sensor measurements usage: A standards-based approach

    Publication Year: 2015, Page(s):1 - 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (253 KB) | HTML iconHTML

    There is a growing need for scientists producing sensor measurements from scientific studies to make these available to global consumer scientific communities. The authors believe that this can largely be achieved by relying on well-established international standards bodies such as the World Wide Web Consortium (w3.org), building momentum in scientific communities to establish best practices for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Internet of Postal Things

    Publication Year: 2015, Page(s):3 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (193 KB) | HTML iconHTML

    The U.S. Postal Service has always been a major creator of large datasets - from mail origin/destination information to quality of service data, and letter mail scans. Recently, the U.S. Postal Service (USPS) Office of Inspector General has been examining how postal operators and customers could benefit from the big data USPS has access to. In this talk we envision an Internet of Postal Things (Io... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Compressive wireless pulse sensing

    Publication Year: 2015, Page(s):5 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (545 KB) | HTML iconHTML

    Enabled by recent sensing and wireless chips, small wireless sensors can now be attached to various wearable devices such as finger rings and wrist bands. In this paper, we describe a compressive sensing based approach to such wireless devices that exploits sparsity of signal to reduce power consumption for both sensing and transmission. Using subsampling methods, we can lower sensor wake-up frequ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of a smart home ontology and the implementation of a semantic sensor network simulator: An Internet of Things approach

    Publication Year: 2015, Page(s):12 - 18
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (655 KB) | HTML iconHTML

    Internet of Things (IoT) is a network that consists of embedded objects communicating with each other, sense their environment and interact with it. The number of connected devices is increasing day by day and it is expected to reach 26 billion by 2020. There is a huge potential for the development of many applications in IoT. Up to now, the communication of agents in IoT is solved in different wa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Smart EDIFICE — Smart EveryDay interoperating future devICEs

    Publication Year: 2015, Page(s):19 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (546 KB) | HTML iconHTML

    In the last years, a lot of attention has been paid to Internet of Things (IoT): everyday life objects, thanks to the advanced technological features added to them, are becoming “smarter”. Regarding this new and potentially disruptive field, it is important to take into account the primary role that the user has in these ecosystems. IoT applications will be used by different kinds of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security and privacy grand challenges for the Internet of Things

    Publication Year: 2015, Page(s):27 - 34
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (299 KB) | HTML iconHTML

    The growth of the Internet of Things (IoT) is driven by market pressures, and while security is being considered, the relationship between the unintended consequences of billions of such devices connecting to the Internet cannot be described with existing mathematical methods. The possibilities for unintended surveillance through lifestyle analysis, unauthorized access to information, and new atta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Value-oriented Big Data processing with applications

    Publication Year: 2015, Page(s):35 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (127 KB) | HTML iconHTML

    We discuss the nature of Big Data and address the role of semantics in analyzing and processing Big Data that arises in the context of Physical-Cyber-Social Systems. To handle Volume, we advocate semantic perception that can convert low-level observational data to higher-level abstractions more suitable for decision-making. To handle Variety, we resort to semantic models and annotations of data so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Harnessing personal data from Internet of Things: Privacy enhancing dynamic information monitoring

    Publication Year: 2015, Page(s): 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (99 KB) | HTML iconHTML

    Summary form only given. The Internet of Things (IoT) brings significant potential to enable many applications ranging from smart metering to remote health monitoring. The amount of personal or sensitive information collected in devices and sensors is constantly growing. There is an increasing need to harness and aggregate such data in real time for monitoring and analytics while ensuring data int... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Civilized collaboration: Ethical architectures for enforcing legal requirements and mediating social norms in HRI

    Publication Year: 2015, Page(s): 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (103 KB) | HTML iconHTML

    The ways in which we treat each other, typically underpinned by an ethical theory, serve as a foundation for civilized activity. Bounds and requirements are established for normal and acceptable interactions between humans. If we are to create robotic systems to reside among us, they must also adhere to a set of related values that humans operate under. This talk first describes the importance of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploring human-robot trust: Insights from the first 1000 subjects

    Publication Year: 2015, Page(s):485 - 486
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (140 KB) | HTML iconHTML

    Our work explores the possibility of using robots to aid humans in emergency evacuation situations [1, 2] Contrary to popular belief, the greatest risk to people during an emergency is not panic. Rather, it is the tendency to disregard automatic alarms and wait for further instructions [3]. Robots offer the possibility of providing individualized directions during an emergency. We believe that tai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Validation of vocal prosody modifications to communicate emotion in robot speech

    Publication Year: 2015, Page(s):39 - 46
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (286 KB) | HTML iconHTML

    This research investigated the use of Mary, an open source speech synthesizer, to convey the emotional intent of a robot through the robot's vocal prosody. The robot's pitch, pitch range, speech rate, and volume were varied to convey anger, fear, happiness, and sadness. The results indicate participants recognized the intended emotions at a rate statistically higher than chance whether they provid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploring humanoid factors of robots through transparent and reflective interactions

    Publication Year: 2015, Page(s):47 - 54
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (910 KB) | HTML iconHTML

    Humanoid robots that resemble human body, language and/or actions enable promising interactive agent behavior in people's life. The humanoid factor of being “like-a-human” implies that the interaction with a humanoid robot shares similarities with human-to-human communications. Designing a humanoid robot must take the users' perception of its social characteristics into consideration... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Connected underwater robots: Theory and practice

    Publication Year: 2015, Page(s):487 - 488
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    Reliable subsea communication is the principal technical challenge that limits the ability of underwater vehicles to collaboratively perform tasks. The subsea communication channel is extremely low bandwidth and suffers from latencies and frequent dropouts. We present fundamental advances in network theory and corresponding distributed estimation and control algorithms that enable autonomous under... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security services provided by the IEEE Wireless Access in Vehicular Environments standards: Limitations and implications for intelligent cooperative driving and autonomous connected vehicles

    Publication Year: 2015, Page(s):55 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (122 KB) | HTML iconHTML

    The Wireless Access in Vehicular Environments (WAVE) suite of standards has been developed to support a wide range of safety-related applications. Security and privacy concerns have significant implications for these applications. The standards and recent related research provide various mechanisms to address privacy concerns, as well as threats to integrity and confidentiality. However, the under... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Roland for an Oliver? Subjective perception of cooperation during conditionally automated driving

    Publication Year: 2015, Page(s):57 - 63
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB) | HTML iconHTML

    Cooperative driving, as observed during lane-change scenarios, reminds one of the saying “a Roland for an Oliver”, also known as quid pro quo: being offered a gap for moving in needs someone offering it in the left lane. This article investigates the subjectively perceived differences of cooperative behavior from the perspective of driving in the left and in the right lane. We design... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.