The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Accidents on roads are one of the main causes of human loss and damages to property every day and anywhere that vehicles travel. Communications-based approaches to reducing highway accidents include vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications. However, while V2V and V2I are promising approaches for reducing accidents, they require installation of new sensors in vehicles...
Decentralized and P2P (peer-to-peer) VPNs (virtual private networks) have recently become quite popular for connecting users in small to medium collaborative environments, such as academia, businesses, and homes. In the realm of VPNs, there exist centralized, decentralized, and P2P solutions. Centralized systems require a single entity to provide and manage VPN server(s); decentralized approaches...
Social information systems - popularized by Facebook, Wikipedia, Twitter, and other social websites - are emerging as a powerful new paradigm for distributed social-powered information management. While there has been growing interest in these systems by businesses, government agencies, and universities, there remain important open challenges that must be addressed if the potential of these social...
We foresee the need for dynamically clustering nodes in Wireless Sensor Networks (WSNs) according to a multitude of disparate co-existing contexts. To this end, we propose a distributed, low-overhead context-aware clustering protocol for WSNs. We employ Affinity Propagation (AP) for clustering nodes based on multiple criteria including location, residual energy, and contextual data sensed from the...
Collaborators use vocabulary germane to the domain in context. Collaboration applications and collaborating systems use vocabularies at different (lower) layers that are specific to the state in which they execute. Distributed, yet collaborative domain-specific applications have demonstrated success when lower layer vocabularies are well defined. These standard vocabularies enable platform neutral,...
Presence management, i.e., the ability to automatically identify the status and availability of communication partners, is becoming an invaluable tool for collaboration in enterprise contexts. In this paper, we argue for efficient presence management by means of a holistic view of both physical context and virtual presence in online communication channels. We sketch the components for enabling presence...
Software engineering education has been recognized as an important challenge in computer science undergraduate programs. Instruction in such area requires not only to deliver theoretical knowledge, but also to perform practical experiences that allow students to assimilate and apply such knowledge. This paper introduces a computer-supported Collaborative and Distributed Learning Activity (CODILA)...
Collaboration takes place in both closed and open environments. While closed collaboration focuses on information or resource sharing amongst selected participants, open collaboration assumes and emphasizes that anyone can participate. In open collaboration, although participation is open to anyone who wishes to contribute or observe, it does not follow that everyone participates on an equal footing...
Cloud computing has emerged as a popular paradigm that offers computing resources (e.g. CPU, storage, bandwidth, software) as scalable and on-demand services over the Internet. As more players enter this emerging market, a heterogeneous cloud computing market is expected to evolve, where individual players will have different volumes of resources, and will provide specialized services, and with different...
This paper describes the design and implementation of an improved version (2.0) of a computational cyberinfrastructure for neuroscience research, called CyberWorkstation (CW). CW can provide to neurophysiology laboratories the following: (1) data storage for large volumes of neural signals, experimental parameters and computational results, (2) integration of necessary experimental equipment, powerful...
In this (invited) paper, we present a work in progress social library and reference management system called SoJa (Social Jabref), which is realized on top of a decentralized (peer-to-peer) social information system. The contribution of the work is multi-fold. It provides a platform to collaborate and socialize to carry out a specific task (managing and sharing bibliographic meta-information). From...
In this paper, we motivate the need for new models for Secure Information Sharing (SIS) in the specific domain of community cyber security. We believe that similar models will be applicable in numerous other domains. The term community in this context refers to a county or larger city size unit with a clearly demarcated geographical boundary aligned more or less with a governance boundary. Our choice...
Short playback lag is preferred in many urgent and interactive scenarios such as live sports and distance education. However, measurement studies have shown that many popular P2P live streaming systems still suffer from long playback lag, say, more than 100 seconds, which makes the live streaming less realtime. Due to the unstructured nature of P2P networks, it is really a challenge to reduce the...
As the use of peer-to-peer (P2P) services for distributed file sharing has grown, the need for fine-grained access control (FGAC) has emerged. Existing access control frameworks use an all-or-nothing approach that is inadequate for sensitive content that may be shared by multiple users. In this paper, we propose a FGAC mechanism based on selective encryption techniques. Using this approach, the owner...
The objective of many applications with the surveillance missions in wireless sensor networks is to provide long-term monitoring of the specific environments, such as disaster-hit regions. These applications usually perform continuous monitoring without any maintenance, even if some sensor nodes fail. A significant challenge when designing the data collection approaches for such systems is that the...
In order to access sensitive documents shared over government, army and enterprise intranets, users rely on an indexing facility where they can quickly locate relevant documents they are allowed to access, (1) without leaking information about the remaining documents, (2) without imposing large load on the receptionist, and (3) with a balanced load on the index servers. To address this problem, we...
This paper presents MAPS - a personalized Multi-Attribute Probabilistic Selection framework - to estimate the probability of an item being a user's best choice and rank the items accordingly. The MAPS framework makes three original contributions in this paper. First, we capture the inter-attribute tradeoff by a visual angle model which maps multi-attribute items into points (stars) in a multidimensional...
Knowledge work in modern organizations is increasingly performed collaboratively by distributed teams. Such collaboration involves dynamically changing situations. Making the collaboration environment fit the needs of these situations is supported by system-initiated adaptation based on the user and team context. Adaptation in the collaboration environment may confuse the users, because they cannot...
Remote Collaboration in synchronous and in asynchronous communication settings demands for highly specialized solutions. The requirements are set even higher when teams are working creatively with methodologies such as Design Thinking where challenging and unusual problems are addressed. Based on our first Tele-Board1 prototype which supports real-time Design Thinking for teams distributed over different...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.