Abstract is missing.
- Overhearing conversations in global software engineering - Requirements and an implementationKevin Dullemond, Ben van Gameren, Rini van Solingen. 1-8 [doi]
- REUSES: Questionnaire-driven design for the automatic generation of web-based collaborative applicationsRuth Cobos, Rafael Martín, Jaime Moreno-Llorena, Esther Guerra, Juan de Lara. 9-18 [doi]
- Bootstrapping operation-level web service ontology: A bottom-up approachXumin Liu, Hua Liu. 19-26 [doi]
- Analyzing distributed whiteboard interactionsLutz Gericke, Raja Gumienny, Christoph Meinel. 27-34 [doi]
- OTPM: Failure handling in data-intensive analytical processingBinh Han, Edward Omiecinski, Leo Mark, Ling Liu. 35-44 [doi]
- A scalable cooperative semantic caching (CoopSC) approach to improve range queriesAndrei Vancea, Laurent d'Orazio, Burkhard Stiller. 45-54 [doi]
- PrIvacy Risks And Countermeasures In Publishing And Mining Social Network DataChiemi Watanabe, Toshiyuki Amagasa, Ling Liu. 55-66 [doi]
- Data management support via spectrum perturbation-based subspace classification in collaborative environmentsChao Chen, Mei-Ling Shyu, Shu-Ching Chen. 67-76 [doi]
- Efficient shortest paths on massive social graphsXiaohan Zhao, Alessandra Sala, Haitao Zheng, Ben Y. Zhao. 77-86 [doi]
- Your best might not be good enough: Ranking in collaborative social search enginesPrantik Bhattacharyya, Jeff Rowe, Shyhtsun Felix Wu, Karen Zita Haigh, Niklas Lavesson, Henric Johnson. 87-94 [doi]
- An ensemble-based approach to fast classification of multi-label data streamsXiangnan Kong, Philip S. Yu. 95-104 [doi]
- Consistent replication in distributed multi-tier architecturesThomas Repantis, Arun Iyengar, Vana Kalogeraki, Isabelle Rouvellou. 105-114 [doi]
- A cooperative game theoretic approach for data replication in mobile ad-hoc networksDan Hirsch, Sanjay Madria. 115-124 [doi]
- Content-based retrieval in peer-to-peer networks using cooperative cachingBo Yang. 125-131 [doi]
- Memory-enabled autonomic resilient networkingBassem Mokhtar, Mohamed Eltoweissy. 132-141 [doi]
- A content-aware collaborative accessing model in ad hoc networksBo Yang 0005, Mareboyana Manohar. 142-150 [doi]
- Decentralized work-in-process optimization in cooperative resource allocationDoraid Dalalah. 151-157 [doi]
- The ABA problem in multicore data structures with collaborating operationsDamian Dechev. 158-167 [doi]
- Towards a personalized trust architectureHisham Salah, Mohamed Eltoweissy. 168-171 [doi]
- Towards privacy preserving access control in the cloudMohamed Nabeel, Elisa Bertino, Murat Kantarcioglu, Bhavani M. Thuraisingham. 172-180 [doi]
- CONFLuEnCE: Implementation and application designPanayiotis Neophytou, Panos K. Chrysanthis, Alexandros Labrinidis. 181-190 [doi]
- Collaborative integrity verification in hybrid cloudsYan Zhu, Hongxin Hu, Gail-Joon Ahn, Yujing Han, Shimin Chen. 191-200 [doi]
- Mobile XMPP and cloud service collaboration: An alliance for flexible disaster managementRonny Klauck, Jan Gäbler, Michael Kirsche, Sebastian Schoepke. 201-210 [doi]
- A contract-extended push-pull-clone modelHien Thi Thu Truong, Claudia-Lavinia Ignat, Mohamed-Rafik Bouguelia, Pascal Molli. 211-220 [doi]
- On data provenance in group-centric secure collaborationJaehong Park, Dang Nguyen, Ravi S. Sandhu. 221-230 [doi]
- Collaborative access control in on-line social networksBarbara Carminati, Elena Ferrari. 231-240 [doi]
- ChameleonSoft: A moving target defense systemMohamed Azab, Riham Hassan, Mohamed Eltoweissy. 241-250 [doi]
- Collaborative map matching in Nav2NavMonsak Socharoentum, Hassan A. Karimi. 251-257 [doi]
- Constant-time operation transformation and integration for collaborative editingWeihai Yu. 258-267 [doi]
- Supporting mood awareness in collaborative settingsSimone Mora, Verónica Rivera-Pelayo, Lars Müller. 268-277 [doi]
- A distributed web browser as a platform for running collaborative applicationsYasushi Shinjo, Fei Guo, Naoya Kaneko, Takejiro Matsuyama, Tatsuya Taniuchi, Akira Sato. 278-286 [doi]
- Static analysis based invariant detection for commodity operating systemsJinpeng Wei, Feng Zhu, Yasushi Shinjo. 287-296 [doi]
- On the relationship between response probability and redundancy in teams of collaborating agentsRamya Pradhan, Annie S. Wu. 297-306 [doi]
- An exploratory study on open conversation spaces in Software EngineeringKevin Dullemond, Ben van Gameren, Rini van Solingen. 307-316 [doi]
- The BCP: An integrated communication and collaboration platform for biosecurity research and incident response workgroupsChristian Müller-Tomfelde, Jane Li, John Zic, Alex Hyatt. 317-323 [doi]
- Protocol for mitigating the risk of hijacking social networking sitesJeffrey Cashion, Mostafa Bassiouni. 324-331 [doi]
- DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environmentsSaman Taghavi Zargar, Hassan Takabi, James B. D. Joshi. 332-341 [doi]
- Provenance for collaboration: Detecting suspicious behaviors and assessing trust in informationM. David Allen, Adriane Chapman, Len Seligman, Barbara T. Blaustein. 342-351 [doi]
- Collaborative assessment of information provider's reliability and expertise using subjective logicKonstantinos Pelechrinis, Vladimir Zadorozhny, Vladimir A. Oleshchuk. 352-361 [doi]
- MovieCommenter: Aspect-based collaborative filtering by utilizing user commentsMinsam Ko, Hyung W. Kim, Mun Y. Yi, Junehwa Song, Ying Liu. 362-371 [doi]
- Featuring automatic adaptivity through workflow enactment and planningAndrea Marrella, Massimo Mecella, Alessandro Russo 0001. 372-381 [doi]
- A test-bed for the evaluation of business process prediction techniquesSuraj Pandey, Surya Nepal, Shiping Chen. 382-391 [doi]
- Defense as a service cloud for Cyber-Physical SystemsMohamed Azab, Mohamed Eltoweissy. 392-401 [doi]
- Incident-driven routing in wireless sensor networks, a cross-layer approachMohammad Reza Faghani, Uyen Trang Nguyen. 402-406 [doi]
- Evaluating trust in peer-to-peer service provider communitiesIoan Petri, Omer Rana, Yacine Rezgui, Gheorghe Cosmin Silaghi. 407-414 [doi]
- Why rating is not enough: A study on online reputation systemsRehab Alnemr, Christoph Meinel. 415-421 [doi]
- Formalizing informal social behavior - developing a visual tool to support collaborative discussionsKarin Hansson, Harko Verhagen, Petter Karlström, Aron Larsson. 422-429 [doi]
- Me-Friends-Web (MFW): A model for navigation assistance through social navigation networksHassan A. Karimi. 430-435 [doi]
- TweetGames: A framework for twitter-based collaborative social online gamesMarkus Esch, Aleksandrina Kovacheva, Ingo Scholtes, Steffen Rothkugel. 436-442 [doi]
- Social computing implications for technology usage and team interactions in virtual teamsArchisman Majumdar, S. Krishna. 443-450 [doi]
- User-centered development of social collaboration softwareRaja Gumienny, Lutz Gericke, Markus Dreseler, Sebastian Meyer, Christoph Meinel. 451-457 [doi]
- CoDE - An application-layer framework for confidentiality in distributed environmentsJean Botev, Marco Milanesio. 458-465 [doi]
- Privacy through web-traveler policies in social network environmentsSmitha Sundareswaran, Anna Cinzia Squicciarini. 466-472 [doi]
- RT-based administrative models for community cyber security information sharingRavi S. Sandhu, Khalid Zaman Bijon, Xin Jin, Ram Krishnan. 473-478 [doi]
- Security protocols as environments: A lesson from non-collaborationMaria-Camilla Fiazza, Michele Peroli, Luca Viganò. 479-486 [doi]
- Ontology-based policy anomaly management for autonomic computingHongxin Hu, Gail-Joon Ahn, Ketan Kulkarni. 487-494 [doi]
- Change propagation in decentralized composite web servicesWalid Fdhila, Aymen Baouab, Karim Dahman, Claude Godart, Olivier Perrin, François Charoy. 508-511 [doi]
- Using group storytelling to recall information in emergency responseAdriana S. Vivacqua, Marcos R. S. Borges. 512-515 [doi]
- Mitigating the cognitive overload of contemporary argumentation-based collaboration settingsNikos I. Karacapilidis, Nikos Karousos, Manolis Tzagarakis, Spyros Christodoulou. 516-519 [doi]
- A trust-based approach to mitigate rerouting attacksJesus M. Gonzalez, Mohd Anwar, James B. D. Joshi. 520-523 [doi]
- Collaborative refinement of emergency plans through public engagementMaría del Carmen Penadés, Marcos R. S. Borges, Adriana S. Vivacqua, José Hilario Canós, Carlos Solís. 524-527 [doi]
- Collaborating with executable content across space and timeMahadev Satyanarayanan, Vasanth Bala, Gloriana St. Clair, Erika Linke. 528-537 [doi]
- Collaborative authoring of adaptive learning resources: Opportunities and challengesDade Nurjanah, Hugh C. Davis, Thanassis Tiropanis. 538-542 [doi]