Abstract is missing.
- A scale-free and self-organized P2P overlay for massive multiuser virtual environmentsMarkus Esch, Ingo Scholtes. 1-10 [doi]
- Protocol overhead versus router processing and memory tradeoffs in evaluating BGP inbound soft reset mechanisms for tactical IP networksIsil Sebüktekin, John Haluska, Pete Moyer, Kevin Adams. 1-7 [doi]
- Enforcing relationships privacy through collaborative access control in web-based Social NetworksBarbara Carminati, Elena Ferrari. 1-9 [doi]
- A new perspective on experimental analysis of N-tier systems: Evaluating database scalability, multi-bottlenecks, and economical operationSimon Malkowski, Markus Hedwig, Deepal Jayasinghe, Junhee Park, Yasuhiko Kanemasa, Calton Pu. 1-10 [doi]
- Formal verification of mediatedweb service interactions considering client s expected behavioursZhangBing Zhou, Sami Bhiri, Lei Shu, Manfred Hauswirth. 1-10 [doi]
- Unified analytical models for Location Management costs and optimum design of location areasEladio Martin, Ling Liu, Matt Weber, Péter Pesti, M. Woodward. 1-10 [doi]
- Still alive: Extending keep-alive intervals in P2P overlay networksRichard Price, Peter Tiño. 1-10 [doi]
- A collaborative k-anonymity approach for location privacy in location-based servicesHassan Takabi, James B. D. Joshi, Hassan A. Karimi. 1-9 [doi]
- Comparing visualization techniques to structure collaborative conceptsSherry Koshman, Chi-Jung Lu. 1-8 [doi]
- VaaS: Videoconference as a servicePedro Rodriguez, Daniel Gallego, Javier Cervino, Fernando Escribano, Juan Quemada, Joaquín Salvachúa. 1-11 [doi]
- Automatic policy conflict analysis for cross-domain collaborations using semantic temporal logicZhengping Wu, Yuanyao Liu. 1-8 [doi]
- ABTS: A transformation-based consistency control algorithm for wide-area collaborative applicationsBin Shao, Du Li, Ning Gu. 1-10 [doi]
- Collaborative filtering via epidemic aggregation in distributed virtual environmentsPatrick Gratz, Jean Botev. 1-9 [doi]
- Portal modules for Groupware systemsNils Jeners, Steffen Budweg, Wolfgang Prinz. 1-10 [doi]
- Towards a framework for group-centric secure collaborationRam Krishnan, Ravi S. Sandhu, Jianwei Niu, William H. Winsborough. 1-10 [doi]
- Integrating P2PSIP into collaborative P2P applications: A case study with the P2P videoconferencing system BRAVISRonny Klauck, Michael Kirsche. 1-10 [doi]
- R4: Towards a holistic framework for designing and developing Social Web ApplicationsSungwon Peter Choe, Junehwa Song. 1-9 [doi]
- Pedestrian network data collection through location-based social networksPiyawan Kasemsuppakorn, Hassan A. Karimi. 1-9 [doi]
- Exploiting tags for concept extraction and information integrationMartha Escobar-Molano, Antonio Badia, Rafael Alonso. 1-9 [doi]
- SemSLATES: Improving enterprise 2.0 information systems using semantic Web technologiesAlexandre Passant, Philippe Laublet, John G. Breslin, Stefan Decker. 1-10 [doi]
- Toward synchronization between decentralized orchestrations of composite web servicesWalid Fdhila, Claude Godart. 1-10 [doi]
- An IT appliance for remote collaborative review of mechanisms of injury to children in motor vehicle crashesMahendra Kumar, Richard E. Newman, José Fortes, Dennis R. Durbin, Flaura K. Winston. 1-9 [doi]
- A policy management framework for trusted crossdomain collaborationZhengping Wu, Hao Wu, Yuanyao Liu. 1-10 [doi]
- An opensocial extension for enabling user-controlled persona in online social networksRodrigo Lopes, Hakan Akkan, William Claycomb, Dongwan Shin. 1-5 [doi]
- DDT: A distributed data structure for the support of P2P range queryDavide Carfi, Massimo Coppola, Domenico Laforenza, Laura Ricci. 1-10 [doi]
- Learning communities supported by autonomic recommendation mechanismStainam N. Brandao, Ricardo T. Silva, Jano M. Souza. 1-10 [doi]
- Trusted computing - opportunities & risksNor Fatimah Bt. Awang. 1-5 [doi]
- User contribution and trust in WikipediaSara Javanmardi, Yasser Ganjisaffar, Cristina Videira Lopes, Pierre Baldi. 1-6 [doi]
- VPAF: a flexible framework for establishing and monitoring prolonged authorization relationshipsEric Freudenthal, Bivas Das. 1-4 [doi]
- A novel forwarding/dropping decision engine for wireless multi-hop ad-hoc networksA. Mohamed AbdelRahman, Mohamad Abou El-Nasr, Ossama Ismail. 1-5 [doi]
- Bio-inspired true coalition formation on intrusion detection by mobile robotsXiannuan Liang, Yang Xiao. 1-6 [doi]
- Experiments in distributed side-by-side software developmentPrasun Dewan, Puneet Agarwal, Gautam Shroff, Rajesh Hegde. 1-10 [doi]
- Improvement of HRV methodology for positive/negative emotion assessmentWanqing Wu, Jungtae Lee. 1-6 [doi]
- Square region-based coverage and connectivity probability model in wireless sensor networksXiaofei Xing, Guojun Wang, Jie Wu, Jie Li. 1-8 [doi]
- Information retrieval on mind maps - what could it be good for?Jöran Beel, Bela Gipp, Jan-Olaf Stiller. 1-4 [doi]
- CASTLE: A social framework for collaborative anti-phishing databasesArash Nourian, Sameer Ishtiaq, Muthucumaru Maheswaran. 1-10 [doi]
- Dynamic data services: Data access for collaborative networks in a multi-agent systems architectureRuhollah Farchtchi. 1-8 [doi]
- LTM-SOLA - a service-oriented application to integrate high-tech laboratories and virtual knowledge spacesHenning Sommerkamp, Jonas Schulte, Reinhard Keil, Johann Rybka, Ferdinand Ferber. 1-7 [doi]
- The Quality Social Network: A collaborative environment for personalizing Web accessAndrea Perego, Barbara Carminati, Elena Ferrari. 1-8 [doi]
- GColl group-to-group videoconferencing system: design and first experiencesPetr Slovák, Pavel Troubil, Petr Holub. 1-9 [doi]
- Artefact-Actor-Networks as tie between social networks and artefact networksWolfgang Reinhardt, Matthias Moi, Tobias Varlemann. 1-10 [doi]
- A tabletop groupware system for computer-based music compositionMauro Carlos Pichiliani, Celso Massaki Hirata. 1-10 [doi]
- No hotel in DC - Surfing Web 2.0 and your couch (Reality 2.0): Lessons from CouchSurfing communityFrancesco Bolici. 1-6 [doi]
- SECUND: A protocol for SECUre neighborhooD creation in wireless ad hoc networksThaier Hayajneh, Prashant Krishnamurthy, David Tipper. 1-10 [doi]
- Performance comparison of MQAM OFDM based WLAN System in presence of bluetooth interference with AWGN and rayleigh fading channelMinakshmi Roy, H. S. Jamadagni. 1-8 [doi]
- A usage control policy specification with Petri netsBasel Katt, Michael Hafner, Xinwen Zhang. 1-8 [doi]
- Status messages for the right audience with an ontology-based approachMilan Stankovic, Alexandre Passant, Philippe Laublet. 1-7 [doi]
- Collaborative process modeling and reuse evaluationLuiz F. C. Tomaz, José A. Rodrigues Nt., Geraldo Xexéo, Jano Moreira de Souza. 1-9 [doi]
- Integrating external user profiles in collaboration applicationsGeorge Mathew. 1-4 [doi]
- Towards automatic recommendation of friend listsKelli Bacon, Prasun Dewan. 1-5 [doi]
- Multi-user multi-account interaction in groupware supporting single-display collaborationBastian Steinert, Michael Grünewald, Stefan Richter, Jens Lincke, Robert Hirschfeld. 1-9 [doi]
- A collaborative framework for enforcing server commitments, and for regulating server interactive behavior in SOA-based systemsTin Lam, Naftaly Minsky. 1-10 [doi]
- Aggregating uncertain access risk estimations from different sources invited paperQun Ni, Elisa Bertino. 1-10 [doi]
- DiSK: A distributed shared disk cache for HPC environmentsBrandon Szeliga, Tung Nguyen, Weisong Shi. 1-8 [doi]
- An analytical study of GWAP-based geospatial tagging systemsLing-Jyh Chen, Yu-Song Syu, Bo-Chun Wang, Wang-Chien Lee. 1-10 [doi]
- Online detection of web choreography misusesMurat Gunestas, Duminda Wijesekera. 1-10 [doi]
- Towards automatic privacy management in Web 2.0 with semantic analysis on annotationsNitya Vyas, Anna Cinzia Squicciarini, Chih-Cheng Chang, Danfeng Yao. 1-10 [doi]
- Efficient dissemination of personalized video content in resource-constrained environmentsPiyush Parate, Lakshmish Ramaswamy, Suchendra M. Bhandarkar, Siddhartha Chattopadhyay, Hari Devulapally. 1-9 [doi]
- Flexible failure handling for cooperative processes in distributed systemsArtin Avanes, Johann Christoph Freytag. 1-10 [doi]
- Building a stateful reference monitor with coloured petri netsBasel Katt, Michael Hafner, Xinwen Zhang. 1-10 [doi]
- DISCERN: A collaborative visualization system for learning cryptographic protocolsGiuseppe Cattaneo, Alfredo De Santis, Umberto Ferraro Petrillo. 1-8 [doi]
- Supporting collaborative work through flexible Process ExecutionStefan Jablonski, Michael Igler, Chistoph Günther. 1-10 [doi]
- Enhanced security management for flexible and dynamic cooperative environmentsJonas Schulte, Ingo Döpke, Reinhard Keil, Konrad Stark, Johann Eder. 1-10 [doi]
- The PEI framework for application-centric securityRavi S. Sandhu. 1-5 [doi]
- In-depth analysis of IPv6 security postureAbdur Rahim Choudhary. 1-7 [doi]
- VisGBT: Visually analyzing evolving datasets for adaptive learningKeke Chen, Fengguang Tian. 1-10 [doi]
- A decentralized mechanism for application level monitoring of distributed systemsConstantin Serban, Wenxuan Zhang, Naftaly H. Minsky. 1-10 [doi]
- JTangSynergy 3.0: A framework and software tool for integrating cross-organizational applicationsHanwei Chen, Jianwei Yin, Haifeng Liu, Calton Pu. 1-7 [doi]