default search action
2nd CIC 2016: Pittsburgh, PA, USA
- 2nd IEEE International Conference on Collaboration and Internet Computing, CIC 2016, Pittsburgh, PA, USA, November 1-3, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-4607-2
Session 1: Collaboration
- Zihang Liu, Yu-Ru Lin, Maoquan Wang, Zhao Lu:
Discovering Opinion Changes in Online Reviews via Learning Fine-Grained Sentiments. 1-10 - Kahina Bessai, François Charoy:
Business Process Tasks-Assignment and Resource Allocation in Crowdsourcing Context. 11-18 - Surya Nepal, Cécile Paris:
Why Is It Difficult for Welfare Recipients to Return to Work? A Case Study through a Collaborative Online Community. 19-28 - Anne H. H. Ngu, Shawn Fang, Helen Paik:
Social-PPM: Personal Experience Sharing and Recommendation. 29-36
Session 2: Access Control
- Smriti Bhatt, Farhan Patwa, Ravi S. Sandhu:
An Attribute-Based Access Control Extension for OpenStack and Its Enforcement Utilizing the Policy Machine. 37-45 - Harsha S. Gardiyawasam Pussewalage, Vladimir A. Oleshchuk:
A Patient-Centric Attribute Based Access Control Scheme for Secure Sharing of Personal Health Records Using Cloud Computing. 46-53 - Prajit Kumar Das, Anupam Joshi, Tim Finin:
Capturing Policies for Fine-Grained Access Control on Mobile Devices. 54-63 - Sadhana Jha, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
An Administrative Model for Collaborative Management of ABAC Systems and Its Security Analysis. 64-73
Session 3: Privacy
- Hasini Gunasinghe, Elisa Bertino:
RahasNym: Pseudonymous Identity Management System for Protecting against Linkability. 74-85 - Star Ying, Tyrone Grandison:
Big Data Privacy Risk: Connecting Many Large Data Sets. 86-91 - Hafiz Salman Asif, Tanay Talukdar, Jaideep Vaidya, Basit Shafiq, Nabil R. Adam:
Collaborative Differentially Private Outlier Detection for Categorical Data. 92-101 - Hassan Takabi, Anuj Bhalotiya, Manar Alohaly:
Brain Computer Interface (BCI) Applications: Privacy Threats and Countermeasures. 102-111
Session 4: Data Security
- Zhisheng Hu, Ping Chen, Yang Lu, Minghui Zhu, Peng Liu:
Towards a Science for Adaptive Defense: Revisit Server Protection. 112-121 - Mohamed Azab, Bassem Mokhtar, Amr S. Abed, Mohamed Eltoweissy:
Smart Moving Target Defense for Linux Container Resiliency. 122-130 - Amani Abu Jabal, Elisa Bertino:
QL-SimP: Query Language for Secure Interoperable Multi-Granular Provenance Framework. 131-138 - Mortada Al-Banna, Boualem Benatallah, Moshe Chai Barukh:
Software Security Professionals: Expertise Indicators. 139-148
Session 5: Cloud and Internet
- Chen Chen, David Barrera, Adrian Perrig:
Modeling Data-Plane Power Consumption of Future Internet Architectures. 149-158 - Waheed Aslam Ghumman, Alexander Schill, Jörg Lässig:
The Flip-Flop SLA Negotiation Strategy Using Concession Extrapolation and 3D Utility Function. 159-168 - Robert Wenger, Xiru Zhu, Jayanth Krishnamurthy, Muthucumaru Maheswaran:
A Programming Language and System for Heterogeneous Cloud of Things. 169-177 - Brijesh Kashyap Chejerla, Sanjay Madria:
Information Fusion Architecture for Variable-Load Scheduling in a Cloud-Assisted CPS. 178-187
Session 6: Web Security and Privacy
- Jega Anish Dev:
On the Imminent Advent of Botnet Powered Cracking. 188-195 - Fadi Mohsen, Mohamed Shehab:
Hardening the OAuth-WebView Implementations in Android Applications by Re-Factoring the Chromium Library. 196-205 - Christopher Griffin, Sarah Michele Rajtmajer, Anna Cinzia Squicciarini:
Invited Paper: A Model of Paradoxical Privacy Behavior in Online Users. 206-211 - Hassan Takabi, Samir Koppikar, Saman Taghavi Zargar:
Differentially Private Distributed Data Analysis. 212-218
Session 7: Distributed Processing
- Jia Zhang, Qihao Bao, Xiaoyi Duan, Shiyong Lu, Lijun Xue, Runyu Shi, Pingbo Tang:
Collaborative Scientific Workflow Composition as a Service: An Infrastructure Supporting Collaborative Data Analytics Workflow Design and Management. 219-228 - Hyerim Bae, Sung-Hyun Sim, Yulim Choi, Ling Liu:
Statistical Verification of Process Conformance Based on Log Equality Test. 229-235 - Anand Tripathi:
A Transaction Model with Multilevel Consistency for Shared Data in Distributed Groupware Systems. 236-245 - Aveksha Kapoor, Vinay Arora:
Application of Bloom Filter for Duplicate URL Detection in a Web Crawler. 246-255
Session 8: Twitter and Sentiments
- Amanda Dennett, Surya Nepal, Cécile Paris, Bella Robinson:
TweetRipple: Understanding Your Twitter Audience and the Impact of Your Tweets. 256-265 - Quang-Vinh Dang, Claudia-Lavinia Ignat:
Measuring Quality of Collaboratively Edited Documents: The Case of Wikipedia. 266-275 - Aibek Musaev, Qixuan Hou:
Gathering High Quality Information on Landslides from Twitter by Relevance Ranking of Users and Tweets. 276-284 - Brian Heredia, Taghi M. Khoshgoftaar, Joseph D. Prusa, Michael Crawford:
Integrating Multiple Data Sources to Enhance Sentiment Prediction. 285-291
Session 9: Data Processing
- Bing Li:
Constructing the Three Graphs for the Large-Scale Heterogeneous Information System. 292-303 - Negar Mosharraf, Anura P. Jayasumana, Indrakshi Ray:
Compacted Bloom Filter. 304-311 - De Wang, Aibek Musaev, Calton Pu:
Information Diffusion Analysis of Rumor Dynamics over a Social-Interaction Based Model. 312-320 - Anne Marie Amja, Abdel Obaid, Hafedh Mili, Zahi Jarir:
Feature-Based Adaptation and Its Implementation. 321-328
Session 10: Mining
- Yasmeen Alufaisan, Murat Kantarcioglu, Yan Zhou:
Detecting Discrimination in a Black-Box Classifier. 329-338 - Prasun Dewan:
Inferred Awareness to Support Mixed-Activity Collaboration. 339-348 - John Calvin Alumbaugh, Qinghua Li, Vincent C. Hu:
Differentiating Non-Isomorphic Graphlets for Graph Analytics. 349-356 - Xidao Wen, Di Lu, Yu-Ru Lin, Claudia López:
The Roles of Information Seeking Dynamics in Sustaining the Community Participation. 357-362
Session 11: Online Social Networks
- Amira Soliman, Sarunas Girdzijauskas:
DLSAS: Distributed Large-Scale Anti-Spam Framework for Decentralized Online Social Networks. 363-372 - Hariton Efstathiades, Demetris Antoniades, George Pallis, Marios D. Dikaiakos:
Distributed Large-Scale Data Collection in Online Social Networks. 373-380
Session 12: Citizens and Society
- Jiawei Zhang, Philip S. Yu:
Trip Route Planning for Bicycle-Sharing Systems. 381-390 - Michael D. Scott, Lakshmish Ramaswamy, Victor Lawson:
CyanoTRACKER: A Citizen Science Project for Reporting Harmful Algal Blooms. 391-397 - Cécile Paris, Surya Nepal:
Can a Government Use Social Media to Support Disadvantaged Citizens? 398-407
Session 13: Data Security 2
- Ajay Modi, Zhibo Sun, Anupam Panwar, Tejas Khairnar, Ziming Zhao, Adam Doupé, Gail-Joon Ahn, Paul Black:
Towards Automated Threat Intelligence Fusion. 408-416 - Runhua Xu, James B. D. Joshi:
Enabling Attribute Based Encryption as an Internet Service. 417-425
Workshop: ISCBD and TrustCol 2016
- Jameela Al-Jaroodi, Nader Mohamed:
Characteristics and Requirements of Big Data Analytics Applications. 426-432 - Neda Abolhassani, Teresa Tung, Karthik Gomadam, Lakshmish Ramaswamy:
Knowledge Graph-Based Query Rewriting in a Relational Data Harmonization Framework. 433-438 - Nader Nassar, Li-Chiou Chen:
Image-Based Seed Generation. 439-444 - Bernard Ngabonziza, Daniel Martin, Anna Bailey, Haehyun Cho, Sarah Martin:
TrustZone Explained: Architectural Features and Use Cases. 445-451 - Napoleon C. Paxton:
Cloud Security: A Review of Current Issues and Proposed Solutions. 452-455
Workshop: CIC-DM 2016
- Fred Morstatter:
Using Biased Social Samples for Disaster Response: Extended Abstract. 456-457 - Xingsheng He, Yu-Ru Lin:
Monitoring Collective Attention During Disasters. 458-462 - Kimberly Glasgow, Clay Fink, Jessica Vitak, Yla R. Tausczik:
"Our Hearts Go Out": Social Support and Gratitude after Disaster. 463-469 - David J. Wallace:
Data Driven Approaches to Define Acute Care Referral Regions and Resources. 470-473 - Patrick M. Dudas, Samantha Weirman, Christopher Griffin:
Little Data, Big Stories: Taking the Pulse of Large-Scaled Events on Twitter. 474-482 - Jae-geun Moon, Jin-Seong Kim, Im Young Jung, Su-an Eom:
Social Safety Guard Based on Internet of Things. 483-485 - Irena Gao:
Using the Social Network Internet of Things to Mitigate Public Mass Shootings. 486-489 - Ashish Rauniyar, Paal Engelstad, Boning Feng, Do Van Thanh:
Crowdsourcing-Based Disaster Management Using Fog Computing in Internet of Things Paradigm. 490-494 - Yue Su, Ziyi Lan, Yu-Ru Lin, Louise K. Comfort, James Joshi:
Tracking Disaster Response and Relief Following the 2015 Nepal Earthquake. 495-499 - Wen-Ting Chung, Yu-Ru Lin:
Probing Construct Validity in Data-Driven Disaster Analysis. 500-501
Workshop: PiCSoC 2016
- Martin Degeling, Christopher Lentzsch, Alexander Nolte, Thomas Herrmann, Kai-Uwe Loser:
Privacy by Socio-Technical Design: A Collaborative Approach for Privacy Friendly System Design. 502-505 - Saul Ricardo Medrano Castillo, Zhiyuan Chen:
Using Transfer Learning to Identify Privacy Leaks in Tweets. 506-513 - Davide Alberto Albertini, Barbara Carminati, Elena Ferrari:
Privacy Settings Recommender for Online Social Network. 514-521 - Amirreza Masoumzadeh, Andrew Cortese:
Towards Measuring Knowledge Exposure in Online Social Networks. 522-529 - Asma Alshehri, Ravi S. Sandhu:
Access Control Models for Cloud-Enabled Internet of Things: A Proposed Architecture and Research Agenda. 530-538 - Manar Alohaly, Hassan Takabi:
If You Can't Measure It, You Can't Manage It: Towards Quantification of Privacy Policies. 539-545 - Fadi Mohsen, Mohamed Shehab:
The Listening Patterns to System Events by Benign and Malicious Android Apps. 546-553 - Leila Karimi, Balaji Palanisamy, James Joshi:
A Dynamic Privacy Aware Access Control Model for Location Based Services. 554-557
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.