Pub Date : 2009-05-18DOI: 10.1109/CTS.2009.5067510
Linyuan Liu, Zhiqiu Huang, Haibin Zhu
Web services collaborative environments are highly automatic, dynamic, heterogeneous, and full of cheating. These characteristics always lead to high risks of the services for the interaction participants. Hence, to guarantee that the private data in Cross-Organizational collaborative applications are not illegally collected and disclosed becomes a key for implementing the security services collaboration. In order to improve the reliability of the system, it is necessary in privacy-aware Web services collaboration systems to verify whether the implementation of a set of services satisfies the requirement specification of the system. This paper proposes a role-based privacy-aware Web services collaborative model, which delegates the privacy authorization based on trust relationships of services and then presents algorithms to make the consistency verification between the requirement specification and the implementation services. Finally, this paper verifies the correctness and efficiency of the role-based approach through an application example.
{"title":"Role-based consistency verification for privacy-aware Web services","authors":"Linyuan Liu, Zhiqiu Huang, Haibin Zhu","doi":"10.1109/CTS.2009.5067510","DOIUrl":"https://doi.org/10.1109/CTS.2009.5067510","url":null,"abstract":"Web services collaborative environments are highly automatic, dynamic, heterogeneous, and full of cheating. These characteristics always lead to high risks of the services for the interaction participants. Hence, to guarantee that the private data in Cross-Organizational collaborative applications are not illegally collected and disclosed becomes a key for implementing the security services collaboration. In order to improve the reliability of the system, it is necessary in privacy-aware Web services collaboration systems to verify whether the implementation of a set of services satisfies the requirement specification of the system. This paper proposes a role-based privacy-aware Web services collaborative model, which delegates the privacy authorization based on trust relationships of services and then presents algorithms to make the consistency verification between the requirement specification and the implementation services. Finally, this paper verifies the correctness and efficiency of the role-based approach through an application example.","PeriodicalId":420399,"journal":{"name":"2009 International Symposium on Collaborative Technologies and Systems","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127327442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-05-18DOI: 10.1109/cts.2009.5067514
S. Maini, Joshua J. Rosen, M. Pierce, G. Fox
In this paper, we explain the architecture and provide implementation details of a synchronous collaborative tool we created using a lightweight Web 2.0 mash-up development methodology. This approach allowed us to put together a client interface with reasonable capabilities, scalability, and robustness rapidly. The rapid development of this tool also allowed us to perform thorough testing and incorporation of the system in a live, production environment in a relatively short amount of time.
{"title":"AVATS: Audio-video and textual synchronization","authors":"S. Maini, Joshua J. Rosen, M. Pierce, G. Fox","doi":"10.1109/cts.2009.5067514","DOIUrl":"https://doi.org/10.1109/cts.2009.5067514","url":null,"abstract":"In this paper, we explain the architecture and provide implementation details of a synchronous collaborative tool we created using a lightweight Web 2.0 mash-up development methodology. This approach allowed us to put together a client interface with reasonable capabilities, scalability, and robustness rapidly. The rapid development of this tool also allowed us to perform thorough testing and incorporation of the system in a live, production environment in a relatively short amount of time.","PeriodicalId":420399,"journal":{"name":"2009 International Symposium on Collaborative Technologies and Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124971882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-05-18DOI: 10.1109/CTS.2009.5067502
Wei Li, D. Hoang
Security is a critical requirement for the e-health system because the patient's sensitive information can be accessed remotely and this makes the entire system vulnerable to malicious attacks. In this paper, we present a novel role-interaction-organization security model and apply it to the e-health system which is modeled as a multi-agent system. The roles in our proposed model do not only determine access rights passively, but also initiate requests to interact dynamically with the agents who meet the security requirements. The interaction and the organization models help to identify the actions and responsibilities that a role can assume in the system within the organization and any dynamic interactions it can partake. A simple case from the e-health system is given to illustrate the application of the model.
{"title":"A new security scheme for e-health system","authors":"Wei Li, D. Hoang","doi":"10.1109/CTS.2009.5067502","DOIUrl":"https://doi.org/10.1109/CTS.2009.5067502","url":null,"abstract":"Security is a critical requirement for the e-health system because the patient's sensitive information can be accessed remotely and this makes the entire system vulnerable to malicious attacks. In this paper, we present a novel role-interaction-organization security model and apply it to the e-health system which is modeled as a multi-agent system. The roles in our proposed model do not only determine access rights passively, but also initiate requests to interact dynamically with the agents who meet the security requirements. The interaction and the organization models help to identify the actions and responsibilities that a role can assume in the system within the organization and any dynamic interactions it can partake. A simple case from the e-health system is given to illustrate the application of the model.","PeriodicalId":420399,"journal":{"name":"2009 International Symposium on Collaborative Technologies and Systems","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126097600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-05-18DOI: 10.1109/CTS.2009.5067504
Yong Liu, Otto J. Anshus
A tiled display wall comprises several computers and projectors for a total of twenty to one hundred megapixel displayed over a whole wall. It is well suited for collaboration because multiple users can easily fit in front of it, simultaneously viewing much more information and interacting with many more applications than what is possible using standard-sized displays.
{"title":"Improving the performance of VNC for high-resolution display walls","authors":"Yong Liu, Otto J. Anshus","doi":"10.1109/CTS.2009.5067504","DOIUrl":"https://doi.org/10.1109/CTS.2009.5067504","url":null,"abstract":"A tiled display wall comprises several computers and projectors for a total of twenty to one hundred megapixel displayed over a whole wall. It is well suited for collaboration because multiple users can easily fit in front of it, simultaneously viewing much more information and interacting with many more applications than what is possible using standard-sized displays.","PeriodicalId":420399,"journal":{"name":"2009 International Symposium on Collaborative Technologies and Systems","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114472811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-05-18DOI: 10.1109/CTS.2009.5067474
Yang Zheng, Haifeng Shen, Chengzheng Sun
Real-time collaborative systems allow geographically dispersed users to concurrently work on shared artifacts. Conflict detection and management present major challenges in the design of those systems. In this paper, we propose a novel technique for detecting “combine-related” semantic conflicts in real-time collaborative systems. It can maximally capture the semantics of conflicting “combine-based” operations and help users analyze conflicts from different perspectives. The technique can provide maximal agility in detecting semantic conflicts among operations with intricate interrelations. It can also significantly improve users' understanding of the conflicts towards finding suitable solutions. The technique is particularly useful for conflict detection and resolution in semantic-rich collaborative systems such as word processing systems, CAD systems, image processing systems and digital media design systems.
{"title":"Agile semantic conflict detection in real-time collaborative systems","authors":"Yang Zheng, Haifeng Shen, Chengzheng Sun","doi":"10.1109/CTS.2009.5067474","DOIUrl":"https://doi.org/10.1109/CTS.2009.5067474","url":null,"abstract":"Real-time collaborative systems allow geographically dispersed users to concurrently work on shared artifacts. Conflict detection and management present major challenges in the design of those systems. In this paper, we propose a novel technique for detecting “combine-related” semantic conflicts in real-time collaborative systems. It can maximally capture the semantics of conflicting “combine-based” operations and help users analyze conflicts from different perspectives. The technique can provide maximal agility in detecting semantic conflicts among operations with intricate interrelations. It can also significantly improve users' understanding of the conflicts towards finding suitable solutions. The technique is particularly useful for conflict detection and resolution in semantic-rich collaborative systems such as word processing systems, CAD systems, image processing systems and digital media design systems.","PeriodicalId":420399,"journal":{"name":"2009 International Symposium on Collaborative Technologies and Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114519507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-05-18DOI: 10.1109/CTS.2009.5067526
Youssef Roummieh, P. Ghodous
In collaborative applications, tasks are distributed among actors. Such actors collaborate with each other to accomplish their objectives. Each actor needs a particular user interface. In this paper, we present AICE architecture, which is intended to extracting the corresponding user interface to the collaborative applications. In this architecture, we describe the collaborative application by an XML document and we propose an algorithm - the filter algorithm - which is able to retrieves the user's corresponding interface.
{"title":"Abstract user interface for collaborative environments","authors":"Youssef Roummieh, P. Ghodous","doi":"10.1109/CTS.2009.5067526","DOIUrl":"https://doi.org/10.1109/CTS.2009.5067526","url":null,"abstract":"In collaborative applications, tasks are distributed among actors. Such actors collaborate with each other to accomplish their objectives. Each actor needs a particular user interface. In this paper, we present AICE architecture, which is intended to extracting the corresponding user interface to the collaborative applications. In this architecture, we describe the collaborative application by an XML document and we propose an algorithm - the filter algorithm - which is able to retrieves the user's corresponding interface.","PeriodicalId":420399,"journal":{"name":"2009 International Symposium on Collaborative Technologies and Systems","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123834219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-05-18DOI: 10.1109/CTS.2009.5067522
R. Fernandes, Biyan Li, P. Benjamin, R. Mayer
Enterprise architecture development is inherently collaborative in nature, where members of the model development team share different perspectives and facets of the enterprise or system. In this paper, we describe an approach by which the executable content of enterprise architectures can be extracted from core enterprise architectural modeling languages (e.g., IDEF, UML) and be extended to develop abstractions of various discrete simulation paradigms such as Colored Petri nets, Monte Carlo, and Discrete Event Simulation. We also describe the use of representation structures at various levels of abstraction to enable collaboration by members of the systems modeling and simulation team in order to perform numerous verification and validation checks of the system or system-of-systems that is being modeled. Use of various levels of enterprise architecture abstractions facilitates not only model reuse but also collaborative effort within a team of diverse skills ranging from domain expertise, enterprise modeling, abstract and concrete simulation modeling, and design of experiments.
{"title":"Collaboration support for executable enterprise architectures","authors":"R. Fernandes, Biyan Li, P. Benjamin, R. Mayer","doi":"10.1109/CTS.2009.5067522","DOIUrl":"https://doi.org/10.1109/CTS.2009.5067522","url":null,"abstract":"Enterprise architecture development is inherently collaborative in nature, where members of the model development team share different perspectives and facets of the enterprise or system. In this paper, we describe an approach by which the executable content of enterprise architectures can be extracted from core enterprise architectural modeling languages (e.g., IDEF, UML) and be extended to develop abstractions of various discrete simulation paradigms such as Colored Petri nets, Monte Carlo, and Discrete Event Simulation. We also describe the use of representation structures at various levels of abstraction to enable collaboration by members of the systems modeling and simulation team in order to perform numerous verification and validation checks of the system or system-of-systems that is being modeled. Use of various levels of enterprise architecture abstractions facilitates not only model reuse but also collaborative effort within a team of diverse skills ranging from domain expertise, enterprise modeling, abstract and concrete simulation modeling, and design of experiments.","PeriodicalId":420399,"journal":{"name":"2009 International Symposium on Collaborative Technologies and Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123614221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-05-18DOI: 10.1109/CTS.2009.5067506
Chayoung Kim, Jinho Ahn
In this paper, we present a novel file searching protocol to structure a DHT ring consisting of only ultrapeers, not all the nodes. The DHT ring in this protocol is much less sensitive to the churn rate because ultrapeers have much longer uptime compared with leaf nodes. Thus, this feature makes the protocol more scalable and efficient than the previous DHT ones in terms of costs of file search, node join and leave operations and the number of routing table entries each node should maintain. Moreover, it is more effective for locating rare files than Gnutella-like searching protocols.
{"title":"Scalable ultrapeer-based DHT protocol for file sharing","authors":"Chayoung Kim, Jinho Ahn","doi":"10.1109/CTS.2009.5067506","DOIUrl":"https://doi.org/10.1109/CTS.2009.5067506","url":null,"abstract":"In this paper, we present a novel file searching protocol to structure a DHT ring consisting of only ultrapeers, not all the nodes. The DHT ring in this protocol is much less sensitive to the churn rate because ultrapeers have much longer uptime compared with leaf nodes. Thus, this feature makes the protocol more scalable and efficient than the previous DHT ones in terms of costs of file search, node join and leave operations and the number of routing table entries each node should maintain. Moreover, it is more effective for locating rare files than Gnutella-like searching protocols.","PeriodicalId":420399,"journal":{"name":"2009 International Symposium on Collaborative Technologies and Systems","volume":"47 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132388503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-05-18DOI: 10.1109/CTS.2009.5067525
Ju Wang, Hongsik Choi, Changyong Jung
Using multiple channels and smart frequency reuse strategy could significantly improve the performance of wireless sensor networks. In this paper we propose an method to determine channel usage based on discrete Particle Swarming Optimization (PSO) algorithm. In stead of searching for a collision-free channel assignment which is not achievable in many scenarios, the goal of our algorithm is to find a channel allocation that results in the least amount of channel interference. Our method search discrete variables in the search space, and candidate solutions containing space-channel reuse. Local node channel state information is used to update the particle velocity as well as the current swarm optimum. Our results show that PSO can find very good channel allocation and significantly increase the overall communication efficiency and battery life.
{"title":"A distributed wireless channel assignment algorithm with collision reduction","authors":"Ju Wang, Hongsik Choi, Changyong Jung","doi":"10.1109/CTS.2009.5067525","DOIUrl":"https://doi.org/10.1109/CTS.2009.5067525","url":null,"abstract":"Using multiple channels and smart frequency reuse strategy could significantly improve the performance of wireless sensor networks. In this paper we propose an method to determine channel usage based on discrete Particle Swarming Optimization (PSO) algorithm. In stead of searching for a collision-free channel assignment which is not achievable in many scenarios, the goal of our algorithm is to find a channel allocation that results in the least amount of channel interference. Our method search discrete variables in the search space, and candidate solutions containing space-channel reuse. Local node channel state information is used to update the particle velocity as well as the current swarm optimum. Our results show that PSO can find very good channel allocation and significantly increase the overall communication efficiency and battery life.","PeriodicalId":420399,"journal":{"name":"2009 International Symposium on Collaborative Technologies and Systems","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133923612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-05-18DOI: 10.1109/CTS.2009.5067518
Sergio Cleger-Tamayo, J. M. Fernández-Luna, J. Huete, Ramiro Pérez-Vázquez, Julio C. Rodríguez Cano
Current research on Collaborative Information Retrieval area reveals a significant synergy among Information Retrieval, Human-Computer Interaction and Computer-Supported Cooperative Work disciplines. This fact has a high incidence in the modernization of Information Retrieval Systems. In this paper, we describe both our current research efforts to design an experimental platform for collaborative information retrieval, and our progress towards implementing it as a pluggable groupware. The platform's core has been designed as a framework, to maximize its reusability and adaptability to experiment with collaborative information retrieval techniques, with a minimal programming effort.
{"title":"A proposal for an experimental platform on Collaborative Information Retrieval","authors":"Sergio Cleger-Tamayo, J. M. Fernández-Luna, J. Huete, Ramiro Pérez-Vázquez, Julio C. Rodríguez Cano","doi":"10.1109/CTS.2009.5067518","DOIUrl":"https://doi.org/10.1109/CTS.2009.5067518","url":null,"abstract":"Current research on Collaborative Information Retrieval area reveals a significant synergy among Information Retrieval, Human-Computer Interaction and Computer-Supported Cooperative Work disciplines. This fact has a high incidence in the modernization of Information Retrieval Systems. In this paper, we describe both our current research efforts to design an experimental platform for collaborative information retrieval, and our progress towards implementing it as a pluggable groupware. The platform's core has been designed as a framework, to maximize its reusability and adaptability to experiment with collaborative information retrieval techniques, with a minimal programming effort.","PeriodicalId":420399,"journal":{"name":"2009 International Symposium on Collaborative Technologies and Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134092761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}