Abstract is missing.
- Decentralized scale-free network construction and load balancing in Massive Multiuser Virtual EnvironmentsM. Esch, E. Tobias. 1-10 [doi]
- Collaborative information finding in smaller communities: The case of research talksPeter Brusilovsky, Denis Parra, Shaghayegh Sahebi, Chirayu Wongchokprasitti. 1-10 [doi]
- Collaborative information analysis for sensor-enabled scientific applicationsAli Salehi, M. Pathan, Dimitrios Georgakopoulos, D. Deery. 1-7 [doi]
- Fixed-precision approximate continuous aggregate queries in peer-to-peer databasesFarnoush Banaei Kashani, Cyrus Shahabi. 1-10 [doi]
- Introducing collaboration in single-user applications through the Centralized Control architectureIlaria Manno, Furio Belgiorno, Delfina Malandrino, Giuseppina Palmieri, D. Pirozzi, Vittorio Scarano. 1-10 [doi]
- Enhancing personalized ranking quality through multidimensional modeling of inter-item competitionQinyuan Feng, Ling Liu, Yan Sun, Ting Yu, Yafei Dai. 1-10 [doi]
- Message from the general chairsKarl Aberer, James Joshi. 1-2 [doi]
- A collaborative approach to facilitate intrusion detection and response against DDoS attacksSaman Taghavi Zargar, James B. D. Joshi. 1-8 [doi]
- Tool support for collaborative software development based on dependency analysisJean Marcel dos Reis Costa, Rafael Martins Feitosa, Cleidson R. B. de Souza. 1-10 [doi]
- Reviewing the reviewers: A study of author perception on peer reviews in computer scienceConny Kühne, Klemens Böhm, Jing Zhi Yue. 1-8 [doi]
- Cloud-based platform for personalization in a wellness management ecosystem: Why, what, and howPei-Yun Sabrina Hsueh, R. J. R. Lin, Mark J. H. Hsiao, Liangzhao Zeng, Sreeram Ramakrishnan, Henry Chang. 1-8 [doi]
- An architecture design of GPU-accelerated VoD streaming servers with network codingJin Zhao, Xinya Zhang, Xin Wang 0002. 1-10 [doi]
- A framework of collaborative adaptation authoringDade Nurjanah, Hugh C. Davis, Thanassis Tiropanis. 1-6 [doi]
- On security and reliability using cooperative transmissions in sensor networksAylin Aksu, Prashant Krishnamurthy, David Tipper, Özgür Erçetin. 1-10 [doi]
- Mimir: Term-distributed indexing and search for secret documentsGuoqiang Gao, Ruixuan Li, Xiwu Gu, Kunmei Wen, Zhengding Lu, Kun Yan. 1-9 [doi]
- SocialDNS: A decentralized naming service for collaborative P2P VPNsPierre St. Juste, David Isaac Wolinsky, Kyungyong Lee, P. Oscar Boykin, Renato J. O. Figueiredo. 1-10 [doi]
- A collaborative framework for privacy protection in online social networksYan Zhu, Zexing Hu, Huaixi Wang, Hongxin Hu, Gail-Joon Ahn. 1-10 [doi]
- SoJa: Collaborative reference management using a decentralized social information systemA. Datta. 1-9 [doi]
- Supporting evidence-based Software Engineering with collaborative information retrievalHeri Ramampiaro, Daniela Cruzes, Reidar Conradi, Manoel G. Mendonça. 1-5 [doi]
- Paper-digital meeting support and reviewAdriana Ispas, N. Li, Moira C. Norrie, Beat Signer. 1-10 [doi]
- Agiler: A P2P live streaming system with low playback lagDongbo Huang, Jin Zhao, Xin Wang 0002. 1-10 [doi]
- Model-driven simulation for cross-domain policy enforcementZhengping Wu, Lifeng Wang. 1-8 [doi]
- SocialTrust++: Building community-based trust in Social Information SystemsJames Caverlee, Zhiyuan Cheng, Brian Eoff, Chiao-Fang Hsu, Krishna Yeswanth Kamath, Said Kashoob, J. Kelley, Elham Khabiri, Kyumin Lee. 1-7 [doi]
- A recommender system based on the collaborative behavior of bird flocksEsin Saka, Olfa Nasraoui. 1-10 [doi]
- BMI CyberWorkstation: A cyberinfrastructure for collaborative experimental research on Brain-Machine InterfacesPrapaporn Rattanatamrong, Andréa M. Matsunaga, José A. B. Fortes. 1-10 [doi]
- A self-organized resource allocation scheme for decentralized distributed virtual environmentsJean Botev, Ingo Scholtes. 1-7 [doi]
- Modeling and implementing collaborative editing systems with transactional techniquesQinyi Wu, Calton Pu. 1-10 [doi]
- Global privacy and transportation mode homogeneity anonymization in location based mobile systems with continuous queriesLeon Stenneth, Philip S. Yu. 1-10 [doi]
- Keystroke-dynamics authentication against synthetic forgeriesDeian Stefan, Danfeng Yao. 1-8 [doi]
- Domain-based virtualized resource management in cloud computingDongwan Shin, Hakan Akkan. 1-6 [doi]
- A virtual workspace for distributed design and engineering tasksPaul Benölken, M. Wewior, U. Lang. 1-9 [doi]
- Vocabularies in collaboration channelsGeorge Mathew, Zoran Obradovic. 1-5 [doi]
- On the design of autonomic, decentralized VPNsDavid Isaac Wolinsky, Kyungyong Lee, P. Oscar Boykin, Renato J. O. Figueiredo. 1-10 [doi]
- Building parallel regeneration trees in distributed storage systems with asymmetric linksJun Li 0017, Shuang Yang, Xin Wang 0002. 1-10 [doi]
- Towards Consolidated PresenceManfred Hauswirth, Jérôme Euzenat, Owen Friel, Keith Griffin, P. Hession, Brendan Jennings, Tudor Groza, Siegfried Handschuh, Ivana Podnar Zarko, Axel Polleres, Antoine Zimmermann. 1-10 [doi]
- Patient-Centric Privacy: Envisioning collaboration between payers, providers & patients with the patient at the coreT. W. A. Grandison. 1-5 [doi]
- Some basic principles for proxy signature schemes based on ECDLPFengying Li, Qingshui Xue, Zhenfu Cao. 1-5 [doi]
- Load balancing and quality of service constrained framework for Distributed Virtual EnvironmentsN. Dietrich, Shankar M. Banik. 1-10 [doi]
- CollecTV intelligence: A 3-screen 'social search' system for TV and video queriesNitya Narasimhan, Myungcheol Doo, Joseph F. Wodka, V. Vasudevan. 1-6 [doi]
- Towards a framework for cyber social status based trusted open collaborationJaehong Park, Yuan Cheng, Ravi S. Sandhu. 1-8 [doi]
- Simulating collaboration from multiple, potentially non-collaborative healthcare systems to create a single view of a patientT. W. A. Grandison, Varun Bhagwan, Daniel Gruhl. 1-6 [doi]
- SPARTAN: A framework for Smart Phone Assisted Real-Time Health care Network designShinan Wang, Weisong Shi, Bengt B. Arnetz, Clairy Wiholm. 1-10 [doi]
- An utility-driven routing scheme for scaling multicast applicationsYuehua Wang, Ling Liu, Calton Pu, Gong Zhang. 1-10 [doi]
- Facilitating understanding of team-based adaptation policiesS. S. Hussain, Dirk Veiel, Jörg M. Haake, Stephan Lukosch. 1-8 [doi]
- Data collection for distributed surveillance sensor networks in disaster-hit regionsYao Zhao, Xin Wang 0002, Jin Zhao, Azman Osman Lim. 1-9 [doi]
- A policy-based approach for assuring data integrity in DBMSsHyo-Sang Lim, Chenyun Dai, Elisa Bertino. 1-10 [doi]
- A selective encryption approach to fine-grained access control for P2P file sharingAditi Gupta 0002, Salmin Sultana, Michael S. Kirkpatrick, Elisa Bertino. 1-10 [doi]
- Modeling and planning collaboration using organizational constraintsMichael Igler, Paulo Moura, Matthias Färber, Michael Zeising, Stefan Jablonski. 1-10 [doi]
- Combining access control and trust negotiations in an On-line Social NetworkStefano Braghin, Elena Ferrari, Alberto Trombetta. 1-10 [doi]
- An overlay multicast scheme for Distributed Interactive ApplicationsMi-young Kang, Yun-Seung Nam, Ji-Seung Nam. 1-7 [doi]
- CAEVA: A customizable and adaptive event aggregation framework for collaborative broker overlaysJianxia Chen, Lakshmish Ramaswamy, David K. Lowenthal, Shivkumar Kalyanaraman. 1-9 [doi]
- A comparison study of collaborative strategies for distributed defense against Internet worms based on small-world modelingHao Chen, Yu Chen. 1-10 [doi]
- CODILA: A Collaborative and Distributed Learning Activity applied to software engineering courses in Latin American UniversitiesCésar A. Collazos, Sergio F. Ochoa, Sergio Zapata, Fáber D. Giraldo, María Inés Lund, Laura Aballay, Gisela Torres de Clunie. 1-9 [doi]
- Preserving structural properties in anonymization of social networksAmirreza Masoumzadeh, James Joshi. 1-10 [doi]
- Optimized decentralization of composite web servicesWalid Fdhila, Marlon Dumas, Claude Godart. 1-10 [doi]
- Collaborative navigation systems for collision avoidanceHassan A. Karimi, Benjamin Zimmerman, D. Nawn, P. Sutovsky. 1-9 [doi]
- Information flow control in cloud computingRuoyu Wu, Gail-Joon Ahn, Hongxin Hu, Mukesh Singhal. 1-7 [doi]
- Towards Secure Information Sharing models for community Cyber SecurityRavi S. Sandhu, Ram Krishnan, G. B. White. 1-6 [doi]
- Hardware security device facilitated trusted residential energy servicesJohn Zic, Julian Jang, Dongxi Liu, Chen Wang, Martin de Groot. 1-6 [doi]
- Distributed context-aware Affinity Propagation clustering in Wireless Sensor NetworksM. ElGammal, M. ElToweissy. 1-7 [doi]
- Secure data storage and retrieval in the cloudBhavani M. Thuraisingham, Vaibhav Khadilkar, Anuj Gupta 0002, Murat Kantarcioglu, Latifur Khan. 1-8 [doi]
- Message capturing as a paradigm for asynchronous digital whiteboard interactionLutz Gericke, Raja Gumienny, Christoph Meinel. 1-10 [doi]
- Mining DNS for malicious domain registrationsYuanchen He, Zhenyu Zhong, Sven Krasser, Yuchun Tang. 1-6 [doi]
- On trust guided collaboration among cloud service providersLiu Xin, Anwitaman Datta. 1-8 [doi]
- Using LOTOS for rigorous specifications of workflow patternsPedro L. Takecian, João Eduardo Ferreira, Simon Malkowski, Calton Pu. 1-7 [doi]
- Collaboration by passing access rights for personal protected Web resourcesYasushi Shinjo, D. Kamikawa, Akira Sato. 1-10 [doi]
- Fast response PKC-based broadcast authentication in wireless sensor networksPanoat Chuchaisri, Richard E. Newman. 1-10 [doi]
- Log garbage collector-based real time collaborative editor for mobile devicesMoulay Driss Mechaoui, Asma Cherif, Abdessamad Imine, Fatima Bendella. 1-10 [doi]