Abstract is missing.
- PrefaceElisa Bertino, Dimitrios Georgakopoulos. [doi]
- A study on evolution of email spam over fifteen yearsDe Wang, Danesh Irani, Calton Pu. 1-10 [doi]
- Towards comprehensive and collaborative forensics on email evidenceJustin Paglierani, Mike Mabey, Gail-Joon Ahn. 11-20 [doi]
- Non-intrusive process-based monitoring system to mitigate and prevent VM vulnerability explorationsChun-Jen Chung, Jingsong Cui, Pankaj Khatkar, Dijiang Huang. 21-30 [doi]
- Towards multi-policy support for IaaS clouds to secure data sharingYing Fairweather, Dongwan Shin. 31-39 [doi]
- Autonomic swarms for regenerative and collaborative networkingRui-ping Lua, Wee Keong Ng. 40-49 [doi]
- Supporting adaptable granularity of changes for massive-scale collaborative editingLuc André, Stéphane Martin, Gérald Oster, Claudia-Lavinia Ignat. 50-59 [doi]
- Supporting collaborative work by learning process models and patterns from casesStefan Schönig, Michael Zeising, Stefan Jablonski. 60-69 [doi]
- A context-aware architecture for improving collaboration of users in Groupware systemsLuis G. Montane-Jimenez, Edgard Benitez Guerrero, Carmen Mezura-Godoy. 70-76 [doi]
- Efficient opportunistic sensing using mobile collaborative platform MOSDENPrem Prakash Jayaraman, Charith Perera, Dimitrios Georgakopoulos, Arkady B. Zaslavsky. 77-86 [doi]
- Influence maximization for Big Data through entropy ranking and min-cutAgustin Sancen-Plaza, Andres Mendez-Vazquez. 87-95 [doi]
- Real-time collaborative planning with big data: Technical challenges and in-place computing (invited paper)Wenwey Hseush, Yi-Cheng Huang, Shih-Chang Hsu, Calton Pu. 96-104 [doi]
- Towards context-aware recommendations: Strategies for exploiting multi-criteria communitiesThuy Ngoc Nguyen, An-Te Nguyen. 105-114 [doi]
- A content-context-centric approach for detecting vandalism in WikipediaLakshmish Ramaswamy, Raga Sowmya Tummalapenta, Kang Li, Calton Pu. 115-122 [doi]
- Workflow definition by cloud collaborationChi Wu-Lee, Gwan-Hwan Hwang. 123-132 [doi]
- Ensuring compliance of distributed and collaborative workflowsDavid Knuplesch, Manfred Reichert, Rüdiger Pryss, Walid Fdhila, Stefanie Rinderle-Ma. 133-142 [doi]
- SBaaS: Safe Box as a serviceMounira Msahli, Ahmed Serhrouchni. 143-147 [doi]
- Concurrency control and awareness support for multi-synchronous collaborative editingMehdi Ahmed-Nacer, Pascal Urso, Valter Balegas, Nuno M. Preguiça. 148-157 [doi]
- MobiCloud: A reliable collaborative mobilecloud management systemAhmed Khalifa, Mohamed Eltoweissy. 158-167 [doi]
- Making offloading decisions resistant to network unavailability for mobile cloud collaborationHuijun Wu, Dijiang Huang, Samia Bouzefrane. 168-177 [doi]
- Collaboration support through mobile processes and entailment constraintsRüdiger Pryss, Steffen Musiol, Manfred Reichert. 178-187 [doi]
- uBeeMe - A platform to enable mobile collaborative applicationsJan Gäbler, Ronny Klauck, Mario Pink, Hartmut König. 188-196 [doi]
- A hybrid mobility model based on social, cultural and language diversityLutful Karim, Qusay H. Mahmoud. 197-204 [doi]
- Building multi-model collaboration in detecting multimedia semantic concepts (invited paper)Hsin-Yu Ha, Fausto Fleites, Shu-Ching Chen. 205-212 [doi]
- Modeling privacy settings of an online social network from a game-theoretical perspectiveJundong Chen, Matthias R. Brust, Ankunda R. Kiremire, Vir V. Phoha. 213-220 [doi]
- Web based collaborative social album authoring system using Facebook photosChanghyeon Lee, Fathoni Arief Musyaffa, Yong-Moo Kwon. 221-230 [doi]
- Silence behavior mining on online social networksQingbo Hu, Guan Wang, Shuyang Lin, Philip S. Yu. 231-240 [doi]
- Robust and fast authentication of session cookies in collaborative and social media using position-indexed hashingAmerah Alabrah, Mostafa A. Bassiouni. 241-249 [doi]
- Click traffic analysis of short URL spam on TwitterDe Wang, Shamkant B. Navathe, Ling Liu, Danesh Irani, Acar Tamersoy, Calton Pu. 250-259 [doi]
- Privacy aware service selection of composite web services invited paperAnna Cinzia Squicciarini, Barbara Carminati, Sushama Karumanchi. 260-268 [doi]
- Byzantine resistant reputation-based trust managementAmira Bradai, Walid Ben-Ameur, Hossam Afifi. 269-278 [doi]
- Collaborative approach for inter-domain botnet detection in large-scale networksHachem Guerid, Karel Mittig, Ahmed Serhrouchni. 279-288 [doi]
- Cheeka: A mobile application for personal safetyS. Ananda Kanagaraj, G. Arjun, A. Shahina. 289-294 [doi]
- Private overlay of enterprise social data and interactions in the public web contextKundan Singh, Venkatesh Krishnaswamy. 295-304 [doi]
- Social team awarenessDelfina Malandrino, Ilaria Manno, Alberto Negro, Andrea Petta, Vittorio Scarano, Luigi Serra. 305-314 [doi]
- Towards improving user satisfaction in decentralized P2P networksMarco Biazzini, Patricia Serrano-Alvarado, Raziel Carvajal-Gomez. 315-324 [doi]
- Increasing awareness in distributed software teams: A first evaluationKevin Dullemond, Rini van Solingen. 325-334 [doi]
- Browser-based collaborative modeling in near real-timePetru Nicolaescu, Michael Derntl, Ralf Klamma. 335-344 [doi]
- MapReduce-guided scalable compressed dictionary construction for evolving repetitive sequence streamsPallabi Parveen, Pratik Desai, Bhavani M. Thuraisingham, Latifur Khan. 345-352 [doi]
- A collaborative virtual workspace for factory configuration and evaluationIngo Zinnikus, Xiaoqi Cao, Matthias Klusch, Christopher Krauss, Andreas Nonnengart, Torsten Spieldenner, Philipp Slusallek. 353-362 [doi]
- Dynamic strategies of conflict resolution on human perception of equality within multi-user collaborative virtual environmentsAida Erfanian, Tao Zeng, Yaoping Hu. 363-370 [doi]
- Leadership's effect on overall temporal patterns of global virtual teamsIan Brooks, Kathy M. Swigger. 371-379 [doi]
- Impact of mediating technologies on talk and emotion: Questioning "commonsense"Joon-Suk Lee, Deborah G. Tatar. 380-389 [doi]
- Improving textual merge resultMehdi Ahmed-Nacer, Pascal Urso, François Charoy. 390-399 [doi]
- Profile sharing recommendation system for enterprise collaborationShivangi Agarwal, Krishna Kishore Dhara, Venkatesh Krishnaswamy. 400-408 [doi]
- Understanding venue popularity in FoursquareXuelian Long, Lei Jin, James Joshi. 409-418 [doi]
- A social trust based friend recommender for online communities "invited paper"Surya Nepal, Cécile Paris, Payam Aghaei Pour, Sanat Kumar Bista, Jill Freyne. 419-428 [doi]
- A capability requirements approach for predicting worker performance in crowdsourcingUmair ul Hassan, Edward Curry. 429-437 [doi]
- Answering complex location-based queries with crowdsourcingKarim Benouaret, Raman Valliyur-Ramalingam, François Charoy. 438-447 [doi]
- Personal health record storage on privacy preserving green cloudsKirill Belyaev, Indrakshi Ray, Indrajit Ray, Gary Luckasen. 448-457 [doi]
- Data architecture for telehealth services research: A case study of home tele-monitoringSurya Nepal, Julian Jang-Jaccard, Branko G. Celler, Bo Yan, Leila Alem. 458-467 [doi]
- Shared editing on the web: A classification of developer support librariesIstvan Koren, Andreas Guth, Ralf Klamma. 468-477 [doi]
- Domain ontology-based feature reduction for high dimensional drug data and its application to 30-day heart failure readmission predictionSisi Lu, Ye Ye, Rich Tsui, Howard Su, Ruhsary Rexit, Sahawut Wesaratchakit, Xiaochu Liu, Rebecca Hwa. 478-484 [doi]
- Enterprise 2.0 in action: Potentials for improvement of awareness support in enterprisesHilda Tellioglu, Simon Diesenreiter. 485-494 [doi]
- When to interrupt global software engineers to provide them with what information?Ben van Gameren, Rini van Solingen. 495-504 [doi]
- DynaSurface: A framework for device notifications using nano coatings in connected devicesSamudrala Nagaraju, B. M. Manjushree. 505-514 [doi]
- How to tag it right?: Semi-automatic support for email managementMateusz Dolata, Nils Jeners, Wolfgang Prinz. 515-524 [doi]
- Supporting secure collaborations with attribute-based access controlCarlos E. Rubio-Medrano, Clinton D'Souza, Gail-Joon Ahn. 525-530 [doi]
- Data-based access control in named data networkingBalkis Hamdane, Mounira Msahli, Ahmed Serhrouchni, Sihem Guemara El Fatmi. 531-536 [doi]
- Analysis of heuristic based access pattern obfuscationHuseyin Ulusoy, Murat Kantarcioglu, Bhavani M. Thuraisingham, Ebru Celikel Cankaya, Erman Pattuk. 537-544 [doi]
- Android keylogging threatFadi Mohsen, Mohamed Shehab. 545-552 [doi]
- Security analysis of mobile applications: A case study of a collaboration tool in healthcareJulian Jang-Jaccard, Jane Li, Surya Nepal, Leila Alem. 553-562 [doi]
- Finding anomalies in windows event logs using standard deviationJohn Dwyer, Traian Marius Truta. 563-570 [doi]
- Accurate weather forecasting through locality based collaborative computingBård Fjukstad, John Markus Bjørndalen, Otto J. Anshus. 571-578 [doi]
- A linked fusion of things, services, and data to support a collaborative data management facilityE. G. Stephan, T. O. Elsethagen, A. S. Wynne, C. Sivaraman, M. C. Macduff, L. K. Berg, W. J. Shaw. 579-584 [doi]
- Designing for self-configuration and self-adaptation in the Internet of ThingsArjun P. Athreya, Bruce DeBruhl, Patrick Tague. 585-592 [doi]
- A collaborative approach for metadata management for Internet of Things: Linking micro tasks with physical objectsUmair ul Hassan, Murilo Bassora, Ali H. Vahid, Seán O'Riain, Edward Curry. 593-598 [doi]
- Computation integrity in mobile cloud: Running probabilistically checkable proof on AndroidClinton Walker, Qijun Gu, Terry Penner. 599-602 [doi]
- Design and verification of cellphone-based cyber-physical systems: A position paperRodion M. Podorozhny. 603-607 [doi]
- Internet of Things Forensics: Challenges and approachesEdewede Oriwoh, David Jazani, Gregory Epiphaniou, Paul Sant. 608-615 [doi]
- SmartMart: IoT-based In-store mapping for mobile devicesDylan Hicks, Kevin Mannix, Hannah M. Bowles, Byron J. Gao. 616-621 [doi]
- Organizations preparing organizations for the IoT: The congruence of the IoT memeKelly T. Slaughter, Gurshaman Baweja. 622-625 [doi]