Collaborative Computing: Networking, Applications and Worksharing -

Collaborative Computing: Networking, Applications and Worksharing (eBook)

4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers
eBook Download: PDF
2009 | 1. Auflage
XIII, 846 Seiten
Springer-Verlag
978-3-642-03354-4 (ISBN)
Systemvoraussetzungen
101,65 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book constitutes the proceedings of the 4th conference CollaborateCom 2008 in Orlando, Florida and reflects the research results in collaborative computing networks, systems, and applications. The 18 invited papers and 41 full papers demonstate recent advances in many computing fields, including multi-core architectures, 3G/4G wireless networks, web 2.0 technologies, computing clouds, and software as a service. This volume is aimed at researchers interested in networking, systems, and collaborative learning and educations alike.

Title Page 2
Preface 5
Table of Contents 9
Invited Short Papers 14
A Distributed Collaborative Filtering Recommendation Model for P2P Networks 14
Introduction 14
A Distributed Collaborative Filtering Recommendation Architecture 15
CF Module 17
Routing Module 18
Messaging Module 20
Experiment 21
Conclusion 22
References 22
Access Control for Cooperation Systems Based on Group Situation 24
Introduction 24
A Motivating Example – $Preparing Presentation$ 26
Context, Situation, and Group Situation 27
Context and Situation 27
Group Situation Based Cooperation 28
Group Situation Based Access Control 28
User-Role Mapping 29
Role-Permission Assignment 30
Illustrative Examples 32
Conclusions and Future Works 34
References 35
Web Canary: A Virtualized Web Browser to Support Large-Scale Silent Collaboration in Detecting Malicious Web Sites 37
Introduction 37
Related Work 39
Design 40
System Monitoring and Filtering Module 40
URL Collecting Module 40
Auto-Reversion 41
Persistent Storage 41
Attacks That Web Canaries Cannot Detect 41
Implementation 41
Evaluation 42
Testbed 43
Effectiveness to Detect Malicious Web Pages 43
Performance Evaluation 44
Conclusion 45
References 45
CalSWIM: A Wiki–Based Data Sharing Platform 47
Introduction 47
Background and Related Work 48
CalSWIM Wiki 50
Content Creation 52
Version Control 53
Content Structure 53
Access Control 53
Evaluation 54
Conclusions and Future Work 55
References 55
Examining a Bayesian Approach to Personalizing Context Awareness in Ubiquitous Computing Environments 57
Introduction 57
Related Work 58
User-Centered Context Awareness 60
A Bayesian User Context Model 60
Building and Training the Model 61
Evaluation of Model Performance 63
Conclusion and Future Work 65
References 66
Invited Full Papers 69
Smart Homes for All: Collaborating Services in a for-All Architecture for Domotics 69
Introduction 69
Related Work 71
Architecture 72
Service Composition 75
Brain-Computer Interaction 76
Conclusions 80
References 80
Archer: A Community Distributed Computing Infrastructure for Computer Architecture Research and Education 83
Introduction 83
Background and Motivations 85
Archer Infrastructure 87
Overall Design Approach 87
Archer Core Middleware 88
Collaboration and Sharing 91
Deployment Modes 91
Security Considerations 92
Performance Considerations 92
Related Work 94
Conclusions and Future Work 95
References 96
Collaborative Search and User Privacy: How Can They Be Reconciled? 98
Introduction 98
Related Work 100
Study Design and Environment 101
Study Design Decisions 101
Study Environment and Methodology 101
Study Representativeness 103
Study Evaluation 104
Policy Structure 104
General Policies 104
Conditions 105
Groups 106
Link Policies 107
Discussion 108
Enforcing CSE Policies 108
Reciprocity 109
Anonymous Collaborative Search 109
Conclusions 110
References 111
Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering 113
Introduction 113
Related Work 115
Information Brokering Overview 115
The Attribute-Correlation Attack 116
New Privacy-Preserving IBS Design 117
Broker Tree Construction 118
Query Segment Encryption 119
Analysis 122
Privacy Analysis 122
Performance Analysis 123
Conclusion 124
References 124
Incentive and Trust Issues in Assured Information Sharing 126
Introduction 126
Related Work 128
Our Model 128
Behaviors 131
Experimental Setup 132
Experimental Results 132
Conclusions 136
References 137
Combining Social Networks and Semantic Web Technologies for Personalizing Web Access 139
Introduction 139
Overview of the Proposed Approach 142
Overall Framework 142
System Architecture 143
Users’ Credentials and Relationships, Web Metadata and Ratings 144
Users’ Credentials and Relationships 144
Web Metadata 145
Ratings 147
Trust Policies 149
User Preferences 152
User Preference Enforcement 154
Conclusions and Future Work 156
References 157
Evaluating Security Policies in Pervasive Mobile Environments Using Context Information 158
Introduction 158
Modeling Context Variables 160
The Monte Carlo Method 164
The Monte Carlo Method for One Context Variable 164
The Monte Carlo Method for Multiple Context Dependent Variables 165
Risk 168
Security Policies 169
Related Work 171
Conclusions and Future Work 172
References 172
Towards Continuous Workflow Enactment Systems 175
Introduction 175
Existing Workflow Model 177
From the Existing to the Continuous Workflow Model 179
Communication Patterns 179
Ability of Existing Workflows to Support Push Input 179
Continuous Workflow Model 181
Windows 182
Workflow Patterns in Continuous Workflows 183
Applicability of Continuous Workflow Patterns 188
Conclusions and Future Work 189
References 190
The RiverFish Approach to Business Process Modeling: Linking Business Steps to Control-Flow Patterns 192
Introduction 192
Related Work 194
Foundation 195
Control-Flow Patterns 195
RiverFish Conceptual Schema 195
From Business Steps to Control-Flow Patterns 198
Declaring and Classifying Business Steps (Phase 1) 199
Positioning Business Steps (Phase 2) 200
Dependency among the Business Steps (Phase 3) 201
Graphical Modeling of Business Process (Phase 4) 201
Describing the Split and Merge Points (Phase 5) 202
Identifying Control-Flow Patterns (Phase 6) 202
Representing Process Modeling in BPM Tools (Phase 7) 203
Conclusion 205
References 206
A Federated Digital Identity Management Approach for Business Processes 207
Introduction 207
Running Example 208
Identity Management for Business Processes 209
Preliminary Concepts 210
Interoperable Multi-factor Authentication 212
Identity Attribute Matching Protocol 212
Multi-factor Authentication 215
System Architecture and Implementation 216
Experimental Evaluation 218
Concluding Remarks 219
References 219
$SelectAudit$: A Secure and Efficient Audit Framework for Networked Virtual Environments 220
Introduction 220
An Example 222
Preliminaries 223
Our Approach 224
Overview 225
Our SelectAudit Protocol 226
Conclusions 228
References 229
Collaborative Attack vs. Collaborative Defense 230
Introduction 230
Our Contributions 231
Related Work 232
Collaborative Attack vs. Collaborative Defense: An High-Level Evaluation Framework 232
A Characterization of Collaborative Attack 235
A Characterization of Collaborative Defense 238
Summary and Future Work 240
References 241
Learning Models of the Negotiation Partner in Spatio-temporal Collaboration 242
Introduction 242
Justifying the CRF Problem 243
Bayesian Learning of Preferences 245
Bayesian Learning 245
Determining the Posterior Probabilities 246
Experimental Study 248
Strategies Used by the Opponent 248
Performance of Learning 249
Performance of Negotiation with or without Learning 253
Related Work 254
Conclusion 255
References 255
Full Papers 257
Protecting Sensitive Information in Directory Services Using Virtual Directories 257
Introduction 257
Background and Related Work 259
Directory Services 259
Protecting Information in Directory Services 259
Metadirectories and Virtual Directories 260
Our Approach 261
Data Encryption 261
System Architecture 262
Collaboration and Delegation 264
Implementation and Performance Testing 265
Discussion 267
Advantages of Using Virtual Directories 267
Advantages of Using Encryption 268
Vulnerabilities 268
Performance Analysis 268
Future Work and Conclusion 269
References 269
TeleEye: An Awareness Widget for Providing the Focus of Attention in Collaborative Editing Systems 271
Introduction 271
Awareness in CES 272
Eye Tracking Mechanisms 275
An Awareness Widget for Providing the Focus of Attention Using the User’s Point of Regard 277
Comparison of Awareness Widgets 280
Conclusions, Comments and Future Work 281
References 282
Informa: An Extensible Framework for Group Response Systems 284
Introduction 284
Goals 286
Informa 287
Architecture 287
Pedagogical Script 287
Protocol 288
Example Usage Scenario 290
Preparation 290
Classroom 291
Anonymity and Grouping 293
ProblemTypes 294
Multiple-Choice Questions 294
Text Highlighting Problems 295
Writing New Problem Type Plug-Ins 296
Evaluation 297
Related Work 298
Conclusions 298
References 299
Secure and Conditional Resource Coordination for Successful Collaborations 300
Introduction 300
Overview of the Collaborative Resource Model 301
Overview of the Resource CoordinationMechanism 301
A Scenario for Resource Centric Collaboration 302
The Collaborative Resource Model 303
Certificates and Certificate Patterns 303
Resource Dependency Graph 305
Access Polices 306
Access Conditions 308
Resource Satisfaction 308
Coordination Based on State-Space Exploration 309
States 310
State Transitions 310
Correctness 311
A Coordination Algorithm 312
Related Work 314
Conclusion 315
References 315
RiBAC: Role Interaction Based Access Control Model for Community Computing 317
Introduction and Motivation 317
Community Computing 318
Related Cooperation Based Approaches 318
Community Computing Model 319
Role Interaction-Based Access Control Model 321
Core RiBAC Model 322
Hierarchical RiBAC Model (H-RiBAC) 325
Constrained RiBAC Model (C-RiBAC) 327
Constrained Hierarchical RiBAC Model (CH-RiBAC) 329
Extended Simple Community Computing Model 330
Related Works 332
Conclusion and Future Work 332
References 333
A Constraint and Attribute Based Security Framework for Dynamic Role Assignment in Collaborative Environments 335
Introduction 335
Security Model 338
Scenario 338
Framework Components 339
Attribute Constraints 340
Role-Constraints Partial Order 341
Transformation Functions 342
Reasoning 343
Prototype 345
Domain Ontology 345
RBAC Ontology 346
Transformation Functions 348
Graphical User Interface 348
Client Server Architecture 349
Related Work 349
Conclusions 350
References 351
Access Control Model for Sharing Composite Electronic Health Records 353
Introduction 353
A Motivation Scenario 354
Related Work 355
Logical Composite EHR Model 357
Authorization Model 361
Authorization Subject 361
Authorization Objects and Property Match 362
Information Sharing Privileges 363
Access Control Policy Specification 364
Concluding Remarks 364
References 366
Appendix 367
Employing Sink Mobility to Extend the Lifetime of Wireless Sensor Networks 368
Introduction 368
Related Work 370
Sink Mobility Strategy 372
Design Issues 372
Density-Based Touring Strategy 373
Experimental Validation 375
Simulation Environment 375
Experiments Setup and Performance Metrics 376
Experimental Results 376
Conclusion 380
References 380
Avoiding Greediness in Cooperative Peer-to-Peer Networks 383
Introduction 383
The T4TNT Game 385
Problem Definition 385
Reducing the T4TNT Game to the Leecher Problem 386
Study 386
Conclusions and Future Work 390
References 390
The Data Interoperability Problem as an Exemplary Case Study in the Development of Software Collaboration Environments 392
Introduction 392
Our Collaboration Metaphor 393
Facets Associated with the Development of Software Collaboration Environments 394
Cross–Cutting Concerns 394
Variability Axes 396
Functional Requirements 396
Review of Some Technologies 397
Technologies That Do Not Target End–Users Per Se 397
Actual Implementation Technologies 398
Technology Comparison 399
Characterizing ‘Killer Apps’ 400
Other Related Work 400
Conclusions and Current Status 401
References 401
Towards a Framework for Evolvable Network Design 403
Introduction 403
Computer Network Design 404
The Network Cell 405
Network Cell Evolution 407
The CellNet Framework 409
Formal CellNet Based Network Definition 410
Network Realization Using CellNet 411
Related Work 413
Conclusion 413
References 414
A Comprehensive Comparison of Trust Management Systems for Federation 415
Introduction 415
Requirements of Federated Trust Management 416
Examination of Extant Systems 417
Characteristics of Federated Trust Management 419
Quality of Functionality 419
Cost of Functionality 419
Usability 420
Comprehensive Comparisons of Extant Systems 420
Trust Exchange 420
Trust Representation 422
Trust Establishment 424
Trust Enforcement 425
Conclusion 427
References 427
A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme 429
Introduction 429
Related Knowledge 431
Bilinear Pairings 431
Some Mathematical Problems 431
Basic ID-Based Designated-Verifier Proxy Signature Scheme 432
Review of Cha and Cheon’s ID-Based Signature Scheme 432
A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signature Scheme 433
Proxy Share Generation Phase 433
Proxy Signature Generation Phase 434
Proxy Signature Verification Phase 435
Correctness of above Scheme 435
Conclusions 436
References 436
A Unified Theory of Trust and Collaboration 438
Introduction 438
A Theory of Collaborative Activities 440
A Theory of Trust and Trust Communication 442
Definition of Trust 442
Trust Communication 444
Meshing of Collaboration and Trust 445
Trust as Prerequisite for Advancing the State of a Collaborative Activity 445
Collaborative Activity as Trust-Requiring Situation 446
A Running Example 447
Intentional Structure of the Domain Activity 447
Intentional Structure of Trust Communications 448
Discussion and Conclusion 448
References 449
Enabling Interoperable and Selective Data Sharing among Social Networking Sites 452
Introduction 452
Background and Related Technologies 453
Online Social Networks and Privacy Issues 453
OpenSocial and Profile Sharing 454
Credential Systems 455
Our Approach 455
Selective Disclosure Credentials 455
Extensions to the OpenSocial API 457
Attribute Mapping from OpenSocial to ADT-Based Credential 459
Current Implementation 460
Future Work 462
Conclusion 462
References 463
Evaluating the Trustworthiness of Contributors in a Collaborative Environment 464
Introduction 464
Model 465
Roles 465
Document Development 466
Trust Calculation: Algorithm and Implementation 466
Principles for the Trust Score Definition 467
Trust Score Components 467
Definition of Trust Scores 468
Algorithm and Implementation 469
The Command {/tt Svn Diff} 469
Management of Deletion Propositions 470
Computing Trust Scores 471
Why a Reverse Order Processing? 472
Conclusions and Perspectives 472
References 473
Supporting Agile Development of Authorization Rules for SME Applications 474
Introduction 474
Agile Security Engineering 476
End-User Development of Authorization Policies 477
The Declarative Authorization Plugin 478
Authorization Rules DSL 478
Usage in Application Code 481
Early Feedback 482
Conclusion and Future Work 482
References 483
The Application of Human and Social Behavioral-Inspired Security Models for Self-aware Collaborative Cognitive Radio Networks 485
Introduction 485
The Cognitive Network Decision-Making Process 486
Cognitive Radio Network Security – A New Complex Dimension of Network Security 488
A Human and Social Behavior Approach 490
Potential Benefits of a Human-Social Behavioral Approach and Open Research Questions 492
Conclusions 496
References 496
GroupBanter: Supporting Serendipitous Group Conversations with IM 498
Introduction 498
Related Work 500
Group Conversations in IM 501
GroupBanter Prototype 502
Field Studies 502
Participants 503
Procedure 503
Data Collection and Analyses 503
Results 504
New Opportunities and Exchanges 507
Attitudes towards GroupBanter 507
Ephemeral versus Persistent Conversations 508
Design Suggestions and Challenges 508
Concluding Remarks 509
References 510
The Effect of Personality on Collaborative Task Performance and Interaction 512
Introduction 512
Group Personality Studies 513
Systems Used 514
DiamondTouch and DiamondSpin 514
F/'{ }schl/'{a}r-DT 515
Experimental Methodology 518
Participant Recruitment 518
Data Gathered 519
Results 519
Personality and Performance 519
Personality and Interaction 521
Conclusions 523
References 524
Replication in Overlay Networks: A Multi-objective Optimization Approach 525
Introduction 525
Background and Related Work 527
Architectural Overview 527
Problem Formulation 528
Latency 529
System Reliability 530
Storage 531
Conflicting Objectives 531
Our Approach: Multi-objective Optimization 532
Solution (Chromosome) Representation 532
Multi-objective Evolutionary (MOE) Optimization 532
Multi-objective Randomized Greedy (MORG) Optimization 534
Experiments and Results 535
Experimental Setup 535
Latency-Reliability Tradeoff 536
Storage-Reliability Tradeoff 537
Execution Time 539
Discussion 539
Conclusion 539
References 540
An Undo Framework for P2P Collaborative Editing 542
Introduction 542
Motivation 543
UNO Idea 544
The Operational Transformation (OT) Approach 545
Proposition: Undo as a New Operation 546
Instantiation 547
The Tombstones Transformation Functions 547
Undo Operation 547
Correctness 549
Integrating the UNO with Existing Integration Algorithms 551
Related Work 552
Conclusions 554
References 554
Appendix 556
A Contract Language for Service-Oriented Dynamic Collaborations 558
Introduction 558
Background and Motivation 560
WS-CCDL Framework 561
WS-CCDL Runtime Framework 566
Connectivity Service 568
Conclusions and Future Work 573
References 574
Monitoring Contract Enforcement within Virtual Organizations 576
Introduction 576
Contract Specification and Local Policy Representation in Virtual Organizations 578
Virtual Organization Lifecycle 580
Security Enhanced Virtual Organization Lifecycle 580
Virtual Organization Creation and Contract Distribution 580
Contract Enforcement and Monitoring 581
System Implementation 583
Related Work 587
Conclusions 588
References 589
A CheckRequestResource’s Code 589
Using Epidemic Hoarding to Minimize Load Delays in P2P Distributed Virtual Environments 591
Introduction 591
Motivation 592
Epidemic Hoarding 594
P2P Overlay Topology and Data Distribution 594
Epidemic Hot Spot Aggregation 595
Hoarding of Hot Spot Data 597
Evaluation Results 597
Preferential Way Point Mobility Model 598
Simulation Results 598
Related Work 602
Conclusion and Future Work 603
References 604
A Battery-Aware Algorithm for Supporting Collaborative Applications 607
Introduction 607
Data Collection 608
Churn and Battery Characteristics 609
Discussion 611
Battery-Aware Supernode Selection 612
Experimental Setup 612
Supernode Selection Algorithms 613
Results 613
Additional Observations 616
Discussion 617
Related Work 618
Conclusion 619
References 620
Collaborative Graphic Rendering for Improving Visual Experience 622
Introduction 622
Collaborative Graphic Rendering Design 624
Architecture 624
Potential Performance Bottlenecks 624
Improve Game Performance 626
Frame Rate Analysis: Mathematical Models 627
Basic Collaborative Rendering Platform 628
Collaboration with Local GPU Partially on 629
Performance Evaluation 629
Numerical Results 629
Measurement: Tocrs over Collaborative Rendering Platform 630
Conclusion 634
References 634
Analytics and Management of Collaborative Intranets 636
Introduction 636
Analytics Deployment 637
Analytic Framework 638
Case Study 639
Analytic Findings and Managerial Implications 640
Conclusions 643
References 644
Mashup Model and Verification Using Mashup Processing Network 645
Introduction 645
Related Work and Motivation 646
Patients Checkout Handling Mashup Example 648
Modeling Mashups 649
Introduction 649
MPN: Mashup Processing Network 649
Data Composition Operations 651
Routing 651
Aggregator 652
Data Transformation Operations 653
Data Validation 653
Mashup Validation 656
Implementation 657
Conclusion 660
References 661
Automatic Categorization of Tags in Collaborative Environments 662
Introduction 662
Problem Description 665
A Tag-Categoration Approach 666
A Prototype for Fringe 671
Experimental Results 671
Related Work 674
Conclusion and Future Work 674
References 675
A New Method for Creating Efficient Security Policies in Virtual Private Network 676
Introduction 676
Related Works 678
Creating Security Policies to Meet Security Requirements 678
Selection Decision 680
Policies Decision 680
Proposed Method 683
Analyses and Simulation 687
Conclusion and Future Work 689
References 690
Data Quality and Failures Characterization of Sensing Data in Environmental Applications 692
Introduction 692
Background 693
Quality-Oriented Sensing Data Analysis 694
Time Series Analysis for Individual Parameter 695
Multi-Modality and Spatial Sensing Data Analysis 701
Failure Analysis 703
Methodology 703
Failure Analysis by Type 704
Failure Analysis by Location 705
Summary and Implications 706
Related Work 706
Conclusion 707
References 707
Security through Collaboration in MANETs 709
Introduction 709
Related Work 710
Outlier Detection 710
Misbehavior Detection in Mobile Ad Hoc Networks 711
Gossip-Based Outlier Detection Algorithm 712
Algorithm Description 712
Trust Establishment and Management 714
An Example Scenario 714
Evaluation 716
Experimentation Setup 716
Experimentation Results 717
Conclusion 725
References 725
A Hybrid Key Predistribution Scheme for Sensor Networks Employing Spatial Retreats to Cope with Jamming Attacks 728
Introduction 728
Background 730
Key Predistribution for Sensor Networks 730
Jamming Attacks 732
Impact of Jamming on Secure Communications in Sensor Networks 733
Hybrid Key Predistribution Scheme 736
Performance Evaluation 737
Discussions, Limitations, and Ongoing Work 742
Conclusion 743
References 743
Location-Based Mapping Services to Support Collaboration in Spatially Distributed Workgroups 745
Introduction 745
Related Work 747
Concept of the Collaborative Map 749
The POPEYE Platform for Collaborative Applications 751
CoMa Realization 751
Map-Based Visualization 751
Interaction with CoMa 752
Implementation of Collaboration 754
Integration of CoMa with POPEYE 754
Future Work 756
Conclusion 756
References 757
Serial vs. Concurrent Scheduling of Transmission and Processing Tasks in Collaborative Systems 759
Introduction 759
Processing and Transmission Tasks 760
Scheduling of Tasks 762
Running Example 762
Process-first and Transmit-First Scheduling Policies 763
Concurrent Scheduling Policy 765
Simultaneous Commands 767
Simulations 767
Parameter Values 768
Simulations 769
Process-First vs. Transmit-First 769
Concurrent vs. Sequential 770
Conclusions and Future Work 771
References 772
Ontology Support for Managing Top-Down Changes in Composite Services 773
Introduction 773
Preliminary 775
A Supporting Infrastructure of an SOE 776
The Change Layers 776
Ontology-Based Framework for Change Management 777
Top-Down Change Model 777
Change Manager 778
The Ontology Manager 779
Web Service Ontology 780
Ontology Definition 780
Ontology Structure 781
Service Ontology Query Infrastructure 782
Processing the Service Ontology Queries 782
Automatic SOE Schema Modification 785
Experiments 786
Constructing the Service Ontology 786
Performance Study 787
Related Work 788
Conclusion 789
References 789
Trusted Translation Services 791
Introduction 791
Background and Related Work 793
Translation Workflows and Web Services 794
Trust Specification 799
Prototype and Case Study 800
Murshid Web Service 800
XLIFF Specification for Murshid Web Service 801
Conclusion 802
References 803
Enabling Meetings for “Anywhere and Anytime” 805
Introduction 805
Meeting Opportunities Enabled by Mobility 806
Related Work 807
EasyMeet V1.0: Design and Implementation 808
Features and Capabilities 808
Implementation of EasyMeet 810
EasyMeet V2.0: Design and Implementation 812
S60 Web Runtime Widget 812
Simultaneous Voice and Data Sharing 813
Remote Content Access from Mobile Phone 813
Leveraging Mobile Phone Platform Capabilities as Web Services 814
Initial Feedback 815
Conclusion 816
References 816
Collaboratively Sharing Scientific Data 818
Introduction 818
Overview of Scientific Data Management with SciPort 820
Scientific Data Modeling 820
XML Based Implementation 820
Sharing Distributed Scientific Data 821
Sharing Data through a Central Server 822
Data Synchronization 823
Security and Trust between Local Servers and the Central Server 823
Sharing Data in Multiple Data Networks 825
Sharing Schemas 825
Publishing Schemas 826
Three Scenarios of Schemas Sharing 828
Uniform Schema Sharing and Management 829
Uniform Schema Management 829
An Example of Uniform Schema Management 831
Distributed Multiform Schema Sharing 832
Schema Change Detection 833
Related Work 833
Conclusion 835
References 835
IT Incident Management as a Collaborative Process: A Visualization Tool Inspired to Social Networks 837
Introduction 837
The IT Incident Management Process 838
ITSupportster 840
Validation of the Prototype 842
Related Work 842
Conclusion and Future Work 843
References 843
Author Index 844

Erscheint lt. Verlag 1.1.2009
Sprache englisch
Themenwelt Schulbuch / Wörterbuch Unterrichtsvorbereitung Unterrichts-Handreichungen
Mathematik / Informatik Informatik Netzwerke
Informatik Software Entwicklung User Interfaces (HCI)
Sozialwissenschaften Pädagogik
Sozialwissenschaften Politik / Verwaltung Staat / Verwaltung
Schlagworte access sharing • Collaboration • Data Sharing • Distributed Computing • Groupware • Identity • Information Sharing • Intranet • learning • Pervasive Computing • Process Modeling • search engine marketing (SEM) • Social Networking • Social Networks • ubiquitous computing • verification • Visualization • Web • Wiki
ISBN-10 3-642-03354-7 / 3642033547
ISBN-13 978-3-642-03354-4 / 9783642033544
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 21,3 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Eine praxisorientierte Einführung mit Anwendungen in Oracle, SQL …

von Edwin Schicker

eBook Download (2017)
Springer Vieweg (Verlag)
34,99
Unlock the power of deep learning for swift and enhanced results

von Giuseppe Ciaburro

eBook Download (2024)
Packt Publishing (Verlag)
35,99