Abstract is missing.
- An Access Control scheme for Big Data processingVincent C. Hu, Tim Grance, David F. Ferraiolo, D. Richard Kuhn. 1-7 [doi]
- Defending against device theft with human notarizationAlana Libonati, Kelly Caine, Apu Kapadia, Michael K. Reiter. 8-17 [doi]
- Role-playing game for studying user behaviors in security: A case study on email secrecyKui Xu, Danfeng Yao, Manuel A. Pérez-Quiñones, Casey Link, E. Scott Geller. 18-26 [doi]
- Preventing session hijacking in collaborative applications with hybrid cache-supported one-way hash chainsAmerah Alabrah, Mostafa A. Bassiouni. 27-34 [doi]
- Exploring HPC-based scientific software as a service using CometCloudMoustafa AbdelBaky, Javier Diaz Montes, Michael Johnston, Vipin Sachdeva, Richard L. Anderson, Kirk E. Jordan, Manish Parashar. 35-44 [doi]
- Transferring influence: Supervised learning for efficient influence maximization across networksQingbo Hu, Guan Wang, Philip S. Yu. 45-54 [doi]
- Performance modeling of computation and communication tradeoffs in vertex-centric graph processing clustersAmir Abdolrashidi, Lakshmish Ramaswamy, David S. Narron. 55-63 [doi]
- Multi-sectoral collaborative open data applicationsPaulo S. C. Alencar, Donald D. Cowan, Fred McGarry, R. Mark Palmer. 64-73 [doi]
- Effects of cohesion-based feedback on the collaborations in global software development teamsAlberto Castro-Hernández, Kathleen M. Swigger, Mirna P. Ponce-Flores. 74-83 [doi]
- A collaboration model for community-based Software Development with social machinesDave Murray-Rust, Ognjen Scekic, Hong Linh Truong, Dave Robertson, Schahram Dustdar. 84-93 [doi]
- Towards a common platform for the support of routine and agile business processesMichael Zeising, Stefan Schönig, Stefan Jablonski. 94-103 [doi]
- A framework for component selection in collaborative sensing application developmentJie Cao, Lingmei Ren, Weisong Shi, Zhifeng Yu. 104-113 [doi]
- Towards enabling probabilistic databases for participatory sensingNguyen Quoc Viet Hung, Saket Sathe, Chi Thang Duong, Karl Aberer. 114-123 [doi]
- Toward energy efficient multistream collaborative compression in wireless sensor networksTommy Szalapski, Sanjay Madria. 124-133 [doi]
- Resilient hybrid Mobile Ad-hoc Cloud over collaborating heterogeneous nodesAhmed Khalifa, Mohamed Azab, Mohamed Eltoweissy. 134-143 [doi]
- Security with privacy - A research agendaElisa Bertino, Bharath Kumar Samanthula. 144-153 [doi]
- Evolving stream classification using change detectionAhmad M. Mustafa, Ahsanul Haque, Latifur Khan, Michael Baron, Bhavani M. Thuraisingham. 154-162 [doi]
- Discovering and analyzing deviant communities: Methods and experimentsNapoleon Paxton, Dae-il Jang, Ira S. Moskowitz, Gail-Joon Ahn, Stephen Russell. 163-170 [doi]
- The impact of user corrections on a crawl-based digital library: A CiteSeerX perspectiveJian Wu, Kyle Williams, Madian Khabsa, C. Lee Giles. 171-176 [doi]
- SAGE2: A new approach for data intensive collaboration using Scalable Resolution Shared DisplaysThomas Marrinan, Jillian Aurisano, Arthur Nishimoto, Krishna Bharadwaj, Victor A. Mateevitsi, Luc Renambot, Lance Long, Andrew E. Johnson, Jason Leigh. 177-186 [doi]
- The effect of interaction models on multi-user usability of collaborative virtual environmentsAida Erfanian, Yaoping Hu. 187-194 [doi]
- Enhancing message collaboration through predictive modeling of user behaviorBiswajyoti Pal, Anupama Pasumarthy, Krishna Kishore Dhara, Venkatesh Krishnaswamy. 195-204 [doi]
- A user-friendly framework for database preferencesRoxana Gheorghiu, Alexandros Labrinidis, Panos K. Chrysanthis. 205-214 [doi]
- HConfig: Resource adaptive fast bulk loading in HBaseXianqiang Bao, Ling Liu, Nong Xiao, Fang Liu, Qi Zhang, Tao Zhu. 215-224 [doi]
- Automatic mapping rules and OWL ontology extraction for the OBDA OntopFayez Khazalah, Zaki Malik, Abdelmounaam Rezgui. 225-232 [doi]
- Multi-objective optimization based location and social network aware recommendationMakbule Gulcin Ozsoy, Faruk Polat, Reda Alhajj. 233-242 [doi]
- Impact of socio-technical network on process performanceRong Liu, Akhil Kumar. 243-252 [doi]
- Autonomy in collaborative manufacturing networksYun Guo, Amihai Motro. 253-260 [doi]
- Role and attribute based collaborative administration of intra-tenant cloud IaaSXin Jin, Ram Krishnan, Ravi Sandhu. 261-274 [doi]
- ProvenanceLens: Service provenance management in the cloudTao Li, Ling Liu, Xiaolong Zhang, Kai Xu, Chao Yang. 275-284 [doi]
- CATT: A cloud based authorization framework with trust and temporal aspectsEhtesham Zahoor, Olivier Perrin, Ahmed Bouchami. 285-294 [doi]
- DQS-Cloud: A Data Quality-Aware autonomic cloud for sensor servicesAbhishek Kothari, Vinay Boddula, Lakshmish Ramaswamy, Neda Abolhassani. 295-303 [doi]
- A web-based task-tracking collaboration system for the Florida Public Hurricane Loss ModelRaúl García, Diana Machado, Hsin-Yu Ha, Yimin Yang, Shu-Ching Chen, Shahid Hamid. 304-311 [doi]
- Combining human and machine computing elements for analysis via crowdsourcingJulian Jarrett, Iman Saleh, M. Brian Blake, Rohan Malcolm, Sean S. E. Thorpe, Tyrone Grandison. 312-321 [doi]
- Rafiki: A semantic and collaborative approach to community health-care in underserved areasPrimal Pappachan, Roberto Yus, Anupam Joshi, Tim Finin. 322-331 [doi]
- Programmer-controlled application-level multicastPrasun Dewan. 332-341 [doi]
- Audio retrieval based on perceptual similarityTeng Zhang, Ji Wu, Dingding Wang, Tao Li. 342-348 [doi]
- Towards composable prediction of contact groupsAndrew Ghobrial, Jacob W. Bartel, Prasun Dewan. 349-357 [doi]
- SideBar: Videoconferencing system supporting social engagementMorten Esbensen, Paolo Tell, Jakob E. Bardram. 358-367 [doi]
- Making your programming questions be answered quickly: A content oriented study to technical Q&A forumYi Wang. 368-377 [doi]
- Distribution, correlation and prediction of response times in Stack OverflowPreeti Arunapuram, Jacob W. Bartel, Prasun Dewan. 378-387 [doi]
- Location-based timely cooperation over social private networkYouna Jung, Renato J. O. Figueiredo, José A. B. Fortes. 388-396 [doi]
- Energy efficient and quality-driven continuous sensor management for mobile IoT applicationsLea Skorin-Kapov, Kresimir Pripuzic, Martina Marjanovic, Aleksandar Antonic, Ivana Podnar Zarko. 397-406 [doi]
- MACNET: Mobile Adhoc Collaborative NETworksJawwad A. Shamsi, Syed Ali Raza, Hassan Farid, Abbas Mehdi, S. Taha Munir. 407-416 [doi]
- PSO-HC: Particle swarm optimization protocol for hierarchical clustering in Wireless Sensor NetworksRiham S. Elhabyan, Mustapha C. E. Yagoub. 417-424 [doi]
- Performance evaluation of spectrum sensing in Cognitive Radio for conventional discrete-time memoryless MIMO fading channel modelDipak P. Patil, V. M. Wadhai. 425-430 [doi]
- Model for collaborative and adaptive multimedia content delivery in a collaborative m-learning environmentAleksandar Karadimce, Danco Davcev. 431-434 [doi]
- A distributed polygon retrieval algorithm using MapReduceQiulei Guo, Balaji Palanisamy, Hassan A. Karimi. 435-436 [doi]
- Mobile peer-mentoring: An approach to make veterans seek mental health-care support a normalityRizwana Rizia, Nadiyah Johnson, A. B. M. Kowser Patwary, Golam Mushih Tanimul Ahsan, Sheikh Iqbal Ahamed, Zeno Franco, Katinka Hooyer, Bob Curry, Mark Flower. 437-441 [doi]
- Direct transmission vs relay transmission for information dissemination in a MANet: an analytical studySerge Chaumette, Jonathan Ouoba. 442-446 [doi]
- A novel and collaborative network channel coded mobile communication architectureMarium Jalal Chaudhry, Sandeep Narayanan, Marco Di Renzo, Fabio Graziosi, Azhar Ul-Haq. 447-451 [doi]
- Hybrid approach to detect SQLi attacks and evasion techniquesAbdelhamid Makiou, Youcef Begriche, Ahmed Serhrouchni. 452-456 [doi]
- Developing a collaborative cloud-based platform for watershed analysis and managementPaulo S. C. Alencar, Donald D. Cowan, Fred McGarry, R. Mark Palmer. 457-459 [doi]
- Collaborative mobile-to-mobile computation offloadingAbderrahmen Mtibaa, Mohammad Abu Snober, Antonio Carelli, Roberto Beraldi, Hussein M. Alnuweiri. 460-465 [doi]
- Design considerations to realize automated SLA negotiations in a multi-Cloud brokerage systemSeokho Son, Dong-Jae Kang, Jin-Mee Kim. 466-468 [doi]
- Collaborative cloud service model for delivering multimedia content in mCloudAleksandar Karadimce, Danco Davcev. 469-474 [doi]
- Influencing data availability in IoT enabled cloud based e-health in a 30 day readmission contextRajesh Vargheese, Yannis Viniotis. 475-480 [doi]
- Flexible IoT middleware for integration of things and applicationsJoseph Boman, Jonathan Taylor, Anne H. H. Ngu. 481-488 [doi]
- Applications of multimodal physical (IoT), cyber and social data for reliable and actionable insightsAmit P. Sheth, Pramod Anantharam, Krishnaprasad Thirunarayan. 489-494 [doi]
- Recommending prime spots of a destination and time to visit from geo-tagged social dataVishal Sharma, Kyumin Lee, JinWook Chung. 495-500 [doi]
- JPrivacy: A java privacy profiling framework for Big Data applicationsMohamed Abdellatif, Iman Saleh, M. Brian Blake. 501-502 [doi]
- Achieving security assurance with assertion-based application constructionCarlos E. Rubio-Medrano, Gail-Joon Ahn, Karsten Sohr. 503-510 [doi]
- Establishing global policies over decentralized online social networksZhe Wang, Naftaly H. Minsky. 511-518 [doi]
- A real time provider identity verification service for a trusted telehealth video collaborationRajesh Vargheese, Prashant Prabhudesai. 519-522 [doi]
- Identifying network packets across translational boundariesNapoleon Paxton, Joseph Mathews. 523-530 [doi]
- Defensive maneuver cyber platform modeling with Stochastic Petri NetsWilliam Clay Moody, Hongxin Hu, Amy W. Apon. 531-538 [doi]
- Fault tolerance in heterogeneous distributed systemsZhe Wang, Naftaly H. Minsky. 539-545 [doi]
- Detection of plugin misuse drive-by download attacks using kernel machinesManoj Cherukuri, Srinivas Mukkamala, Dongwan Shin. 546-553 [doi]