Pub Date : 2005-12-19DOI: 10.1109/COLCOM.2005.1651232
M. Rappa, Sarah E. Smith, A. Yacoub, L. Williams
Today, it is common for university instructors to compile links to online resources for the courses they teach, either as a supplement to a textbook, reading packet or, in some cases, as a replacement. Finding resources and keeping them up to date is time consuming. Instructors who teach similar subjects at different universities might benefit from working together to compile and share online resources for their courses. This paper describes a tool for sharing instructional materials called OpenSeminar. The purpose of OpenSeminar is to facilitate the structured compilation of open, online resources among a group of collaborators who share a common area of interest. Using OpenSeminar, the selection of resources can be customized and deployed to meet the specific needs of each professor. OpenSeminar adopts an editorial peer review framework to ensure content quality control. An illustration of OpenSeminar in the field of software engineering is provided
{"title":"OpenSeminar: Web-based Collaboration Tool for Open Educational Resources","authors":"M. Rappa, Sarah E. Smith, A. Yacoub, L. Williams","doi":"10.1109/COLCOM.2005.1651232","DOIUrl":"https://doi.org/10.1109/COLCOM.2005.1651232","url":null,"abstract":"Today, it is common for university instructors to compile links to online resources for the courses they teach, either as a supplement to a textbook, reading packet or, in some cases, as a replacement. Finding resources and keeping them up to date is time consuming. Instructors who teach similar subjects at different universities might benefit from working together to compile and share online resources for their courses. This paper describes a tool for sharing instructional materials called OpenSeminar. The purpose of OpenSeminar is to facilitate the structured compilation of open, online resources among a group of collaborators who share a common area of interest. Using OpenSeminar, the selection of resources can be customized and deployed to meet the specific needs of each professor. OpenSeminar adopts an editorial peer review framework to ensure content quality control. An illustration of OpenSeminar in the field of software engineering is provided","PeriodicalId":365186,"journal":{"name":"2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130694773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-19DOI: 10.1109/COLCOM.2005.1651217
Hisayoshi Sugiyama, T. Tsujioka, M. Murata
We investigated a collaboration scheme for rescue robots for reliable and effective operation of rescue systems using robots. The investigation focused on the collaborative movement of robots to maintain their wireless network. We propose classifying the robots into search robots and relay robots and using a behavior algorithm for their collaborative movement. According to the algorithm, search robots explore the disaster area and search for victims, whereas relay robots act as relay terminals within the network. Each robot classifies itself autonomously and repeatedly as the system operation progresses. We evaluated the performance of the victim detection system (a rescue system introduced in our previous paper) based on the proposed scheme by computer simulation. Its performance was improved compared with the case where every robot walked randomly in the disaster area and no classification occurred
{"title":"Collaborative movement of rescue robots for reliable and effective networking in disaster area","authors":"Hisayoshi Sugiyama, T. Tsujioka, M. Murata","doi":"10.1109/COLCOM.2005.1651217","DOIUrl":"https://doi.org/10.1109/COLCOM.2005.1651217","url":null,"abstract":"We investigated a collaboration scheme for rescue robots for reliable and effective operation of rescue systems using robots. The investigation focused on the collaborative movement of robots to maintain their wireless network. We propose classifying the robots into search robots and relay robots and using a behavior algorithm for their collaborative movement. According to the algorithm, search robots explore the disaster area and search for victims, whereas relay robots act as relay terminals within the network. Each robot classifies itself autonomously and repeatedly as the system operation progresses. We evaluated the performance of the victim detection system (a rescue system introduced in our previous paper) based on the proposed scheme by computer simulation. Its performance was improved compared with the case where every robot walked randomly in the disaster area and no classification occurred","PeriodicalId":365186,"journal":{"name":"2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115683601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-19DOI: 10.1109/COLCOM.2005.1651219
Steve Webb, Subramanyam Chitti, C. Pu
In this paper, we show experimentally that learning filters are able to classify large corpora of spam and legitimate email messages with a high degree of accuracy. The corpora in our experiments contain about half a million spam messages and a similar number of legitimate messages, making them two orders of magnitude larger than the corpora used in current research. The use of such large corpora represents a collaborative approach to spam filtering because the corpora combine spam and legitimate messages from many different sources. First, we show that this collaborative approach creates very accurate spam filters. Then, we introduce an effective attack against these filters which successfully degrades their ability to classify spam. Finally, we present an effective solution to the above attack which involves retraining the filters to accurately identify the attack messages
{"title":"An experimental evaluation of spam filter performance and robustness against attack","authors":"Steve Webb, Subramanyam Chitti, C. Pu","doi":"10.1109/COLCOM.2005.1651219","DOIUrl":"https://doi.org/10.1109/COLCOM.2005.1651219","url":null,"abstract":"In this paper, we show experimentally that learning filters are able to classify large corpora of spam and legitimate email messages with a high degree of accuracy. The corpora in our experiments contain about half a million spam messages and a similar number of legitimate messages, making them two orders of magnitude larger than the corpora used in current research. The use of such large corpora represents a collaborative approach to spam filtering because the corpora combine spam and legitimate messages from many different sources. First, we show that this collaborative approach creates very accurate spam filters. Then, we introduce an effective attack against these filters which successfully degrades their ability to classify spam. Finally, we present an effective solution to the above attack which involves retraining the filters to accurately identify the attack messages","PeriodicalId":365186,"journal":{"name":"2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121310258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-19DOI: 10.1109/COLCOM.2005.1651220
Fuwen Liu, H. König
Confidentiality is a key demand for many collaborative applications in the Internet, e.g. business meetings. In a more and more mobile society there is an increasing need of spontaneous meetings in ad hoc environments, often with changing partners. To assure confidentiality of such meetings the partners have to agree upon a common secret key for encrypting their communication. While centralized collaborative systems provide practicable solutions for this, it still represents a challenging task in decentralized systems using the peer-to-peer paradigm. In this paper we present a simple key distribution protocol, called VTKD, which was especially designed for small dynamic peer groups. It consists of two parts: a mutual authentication of the partners and a secure key renewal. The protocol uses a virtual token to determine the partner responsible for the key generation and distribution procedure. VTKD fulfills the relevant demands concerning group key exchange and is more efficient related to key renewal delay than existing key exchange protocols
{"title":"Secure and efficient key distribution for collaborative applications","authors":"Fuwen Liu, H. König","doi":"10.1109/COLCOM.2005.1651220","DOIUrl":"https://doi.org/10.1109/COLCOM.2005.1651220","url":null,"abstract":"Confidentiality is a key demand for many collaborative applications in the Internet, e.g. business meetings. In a more and more mobile society there is an increasing need of spontaneous meetings in ad hoc environments, often with changing partners. To assure confidentiality of such meetings the partners have to agree upon a common secret key for encrypting their communication. While centralized collaborative systems provide practicable solutions for this, it still represents a challenging task in decentralized systems using the peer-to-peer paradigm. In this paper we present a simple key distribution protocol, called VTKD, which was especially designed for small dynamic peer groups. It consists of two parts: a mutual authentication of the partners and a secure key renewal. The protocol uses a virtual token to determine the partner responsible for the key generation and distribution procedure. VTKD fulfills the relevant demands concerning group key exchange and is more efficient related to key renewal delay than existing key exchange protocols","PeriodicalId":365186,"journal":{"name":"2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123232927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-19DOI: 10.1109/COLCOM.2005.1651238
J. Quemada, T. Miguel, Santiago Pavón, G. Huecas, T. Robles, J. Salvachúa, Diego Andres Acosta Ortiz, Vicente Sirvent, Fernando Escribano, J. Sedano
Isabel is a P2P like multipoint group collaboration tool for the Internet, which implements an innovative service concept for synchronous collaborations based on a flexible and programmable floor control. This approach leads to a more natural and effective management of collaboration sessions. The flexible and programmable floor control incorporates the experience gained in many years of service trials with real users in distributed conferences, classrooms or meetings. The main conclusion after all those trials is that services should use more or less the same media components (audio, video or application sharing), but differ in the floor control model used. The flexible floor control is especially well suited for multipoint audience interconnection in distributed classrooms, conferences, meetings, etc. The development of Isabel started in 1993 for the distribution of the RACE Summer Schools on Advanced Broadband Communication (ABC93-6) where the early versions of this service concept were developed and tuned. The effectiveness of the Isabel service concept has been proven and enhanced since then in many other distributed events, such as Global360x, IDC9x, Global IPv6 Summitts, Telecom I+D, etc. The adaptation of Isabel to the broadband Internet (including VPNs, IPv4/IPv6 transition scenarios, mixtures of unicast and multicast) has reached maturity recently
{"title":"Isabel: an application for real time collaboration with a flexible floor control","authors":"J. Quemada, T. Miguel, Santiago Pavón, G. Huecas, T. Robles, J. Salvachúa, Diego Andres Acosta Ortiz, Vicente Sirvent, Fernando Escribano, J. Sedano","doi":"10.1109/COLCOM.2005.1651238","DOIUrl":"https://doi.org/10.1109/COLCOM.2005.1651238","url":null,"abstract":"Isabel is a P2P like multipoint group collaboration tool for the Internet, which implements an innovative service concept for synchronous collaborations based on a flexible and programmable floor control. This approach leads to a more natural and effective management of collaboration sessions. The flexible and programmable floor control incorporates the experience gained in many years of service trials with real users in distributed conferences, classrooms or meetings. The main conclusion after all those trials is that services should use more or less the same media components (audio, video or application sharing), but differ in the floor control model used. The flexible floor control is especially well suited for multipoint audience interconnection in distributed classrooms, conferences, meetings, etc. The development of Isabel started in 1993 for the distribution of the RACE Summer Schools on Advanced Broadband Communication (ABC93-6) where the early versions of this service concept were developed and tuned. The effectiveness of the Isabel service concept has been proven and enhanced since then in many other distributed events, such as Global360x, IDC9x, Global IPv6 Summitts, Telecom I+D, etc. The adaptation of Isabel to the broadband Internet (including VPNs, IPv4/IPv6 transition scenarios, mixtures of unicast and multicast) has reached maturity recently","PeriodicalId":365186,"journal":{"name":"2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129615839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-19DOI: 10.1109/COLCOM.2005.1651237
Manuel Rodriguez-Perez, O. Esparza, J. L. Muñoz
Peer-to-peer systems consist of groups of nodes acting as clients and servers. These groups of nodes communicate directly among themselves through wide-area networks. Some of the benefits of fully distributed peer-to-peer systems are scalability, resource aggregation and interoperability without any administration cost or centralized infrastructure support. In this context, reputation schemes aid the service requesters to choose the proper resource provider and to prevent malicious behaviors. This paper analyzes reputation management in fully distributed peer-to-peer systems. This paper discusses the main issues that a reputation framework must address and analyzes the most representative distributed reputation systems. This paper also discusses the main advantages and drawbacks of each proposal in relation to peer-to-peer reputation system requirements
{"title":"Analysis of peer-to-peer distributed reputation schemes","authors":"Manuel Rodriguez-Perez, O. Esparza, J. L. Muñoz","doi":"10.1109/COLCOM.2005.1651237","DOIUrl":"https://doi.org/10.1109/COLCOM.2005.1651237","url":null,"abstract":"Peer-to-peer systems consist of groups of nodes acting as clients and servers. These groups of nodes communicate directly among themselves through wide-area networks. Some of the benefits of fully distributed peer-to-peer systems are scalability, resource aggregation and interoperability without any administration cost or centralized infrastructure support. In this context, reputation schemes aid the service requesters to choose the proper resource provider and to prevent malicious behaviors. This paper analyzes reputation management in fully distributed peer-to-peer systems. This paper discusses the main issues that a reputation framework must address and analyzes the most representative distributed reputation systems. This paper also discusses the main advantages and drawbacks of each proposal in relation to peer-to-peer reputation system requirements","PeriodicalId":365186,"journal":{"name":"2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126200943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-19DOI: 10.1109/COLCOM.2005.1651228
Gautam Das, M. Fazio, M. Villari, A. Puliafito
Data dissemination is used in mobile ad hoc networks (MANETs) for activities like issuing commands, propagating alarms, and configuring nodes. Existing forms of data dissemination are based upon push or pull approaches. We present a novel data dissemination approach that supports push and pull approaches as well as direct node-to-node dissemination method. Our proposal is to develop a highly connected core based on two-hop neighbor information to assist in dissemination. We propose some algorithms for selecting a subset of network's nodes to perform data dissemination on behalf of the complete network. The core structure is characterized by its ability to work with limited neighbor information, connectivity maintenance, high connectivity with other features related to node degree. This property helps to lessen the control overhead as piggybacking can be used to gain partial neighbor information. We provide simulation results showing the performances of the proposed scheme
{"title":"Distributed core assisted scalable data dissemination in mobile ad hoc networks","authors":"Gautam Das, M. Fazio, M. Villari, A. Puliafito","doi":"10.1109/COLCOM.2005.1651228","DOIUrl":"https://doi.org/10.1109/COLCOM.2005.1651228","url":null,"abstract":"Data dissemination is used in mobile ad hoc networks (MANETs) for activities like issuing commands, propagating alarms, and configuring nodes. Existing forms of data dissemination are based upon push or pull approaches. We present a novel data dissemination approach that supports push and pull approaches as well as direct node-to-node dissemination method. Our proposal is to develop a highly connected core based on two-hop neighbor information to assist in dissemination. We propose some algorithms for selecting a subset of network's nodes to perform data dissemination on behalf of the complete network. The core structure is characterized by its ability to work with limited neighbor information, connectivity maintenance, high connectivity with other features related to node degree. This property helps to lessen the control overhead as piggybacking can be used to gain partial neighbor information. We provide simulation results showing the performances of the proposed scheme","PeriodicalId":365186,"journal":{"name":"2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115814014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-19DOI: 10.1109/COLCOM.2005.1651242
S. Xia, David Sun, Chengzheng Sun, David Chen
Object grouping is an effective means for managing the complexity in graphics editing. However, research on collaborative object grouping has not been adequate. In this paper, we contribute a novel collaborative object grouping technique, called CoGroup. CoGroup can achieve maximal combined effects among compatible operations and preserve all users' work in the face of conflict without the overhead of undoing and redoing conflict operations as in existing serialization approaches. CoGroup has been implemented in collaborative word processing (CoWord) and slide authoring (CoPowerPoint) systems and is generally applicable to a range of off-the-shelf commercial graphics applications, particularly CAD/CASE tools
{"title":"Collaborative object grouping in graphics editing systems","authors":"S. Xia, David Sun, Chengzheng Sun, David Chen","doi":"10.1109/COLCOM.2005.1651242","DOIUrl":"https://doi.org/10.1109/COLCOM.2005.1651242","url":null,"abstract":"Object grouping is an effective means for managing the complexity in graphics editing. However, research on collaborative object grouping has not been adequate. In this paper, we contribute a novel collaborative object grouping technique, called CoGroup. CoGroup can achieve maximal combined effects among compatible operations and preserve all users' work in the face of conflict without the overhead of undoing and redoing conflict operations as in existing serialization approaches. CoGroup has been implemented in collaborative word processing (CoWord) and slide authoring (CoPowerPoint) systems and is generally applicable to a range of off-the-shelf commercial graphics applications, particularly CAD/CASE tools","PeriodicalId":365186,"journal":{"name":"2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116435807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-19DOI: 10.1109/COLCOM.2005.1651243
Haifeng Shen, Chengzheng Sun
With the rapid popularity of computer networks, collaborative document writing becomes increasingly desirable in recent years. In practice, collaborative writing is more likely to be done in an asynchronous manner, where collaborators usually work in parallel with different time schedules and are not present at the same time. Merging is the key technique to support concurrent writing and textual merging remains the primary and the only successful merging function to date. However, most of existing systems support constrained textual merging for the simplicity of the underling merging algorithms. In this paper, we propose a flexible operation-based syntactic textual merging algorithm that is capable of reconciling changes made in parallel by different users according to the syntax of the files to be merged or user-specified merging policies. Moreover, this syntax-based reconciliation algorithm is able to preserve the intentions of individual changes
{"title":"Syntax-based reconciliation for asynchronous collaborative writing","authors":"Haifeng Shen, Chengzheng Sun","doi":"10.1109/COLCOM.2005.1651243","DOIUrl":"https://doi.org/10.1109/COLCOM.2005.1651243","url":null,"abstract":"With the rapid popularity of computer networks, collaborative document writing becomes increasingly desirable in recent years. In practice, collaborative writing is more likely to be done in an asynchronous manner, where collaborators usually work in parallel with different time schedules and are not present at the same time. Merging is the key technique to support concurrent writing and textual merging remains the primary and the only successful merging function to date. However, most of existing systems support constrained textual merging for the simplicity of the underling merging algorithms. In this paper, we propose a flexible operation-based syntactic textual merging algorithm that is capable of reconciling changes made in parallel by different users according to the syntax of the files to be merged or user-specified merging policies. Moreover, this syntax-based reconciliation algorithm is able to preserve the intentions of individual changes","PeriodicalId":365186,"journal":{"name":"2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128619903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-12-19DOI: 10.1109/COLCOM.2005.1651230
Amina Tariq, A. Basharat, Arshad Ali, H. F. Ahmad, H. Suguri
Distributed collaborative computing services have taken over centralized computing platforms allowing the development of distributed collaborative user applications. These applications enable people and computers to work together more productively. Multi-agent system (MAS) has emerged as a distributed collaborative environment which allows a number of agents to cooperate and interact with each other in a complex environment. We want to place our agents in problems whose solutions require the collation and fusion of information, knowledge or data from distributed and autonomous information sources. In this paper we present the design and implementation of an agent based conference planner application that uses collaborative effort of agents which function continuously and autonomously in a particular environment. The application also enables the collaborative use of services deployed geographically wide in different technologies i.e. software agents, grid computing and Web service. The premise of the application is that it allows autonomous agents interacting with Web and grid services to plan a conference as a proxy to their owners (humans)
{"title":"A collaborative multi-agent based conference planner application using Web and grid services","authors":"Amina Tariq, A. Basharat, Arshad Ali, H. F. Ahmad, H. Suguri","doi":"10.1109/COLCOM.2005.1651230","DOIUrl":"https://doi.org/10.1109/COLCOM.2005.1651230","url":null,"abstract":"Distributed collaborative computing services have taken over centralized computing platforms allowing the development of distributed collaborative user applications. These applications enable people and computers to work together more productively. Multi-agent system (MAS) has emerged as a distributed collaborative environment which allows a number of agents to cooperate and interact with each other in a complex environment. We want to place our agents in problems whose solutions require the collation and fusion of information, knowledge or data from distributed and autonomous information sources. In this paper we present the design and implementation of an agent based conference planner application that uses collaborative effort of agents which function continuously and autonomously in a particular environment. The application also enables the collaborative use of services deployed geographically wide in different technologies i.e. software agents, grid computing and Web service. The premise of the application is that it allows autonomous agents interacting with Web and grid services to plan a conference as a proxy to their owners (humans)","PeriodicalId":365186,"journal":{"name":"2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130125983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}