Guest Editorial: Selected Papers from IEEE IEEE/EAI CollaborateCom 2013
Journal Title: EAI Endorsed Transactions on Collaborative Computing - Year 2015, Vol 1, Issue 1
Abstract
This issue of EAI Transactions on Collaborative Computing includes extended versions of articles selected from the program of the 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2013), which was held during October 20-23, 2013, in Austin, Texas USA. The final program had 20 research papers, 23 application papers, 2 industry papers, 11 invited papers, 3 keynotes, 2 panels, and 2 full day workshops. Five research papers were invited for submission for this special issue of EAI Transactions on Collaborative Computing. The journal submissions were substantially extended and went through an additional review process by selected members of the CollaborateCom 2013 program committee as well as external reviewers. The first article “Is Email Business Dying?: A Study on Evolution of Email Spam Over Fifteen Years”, by De Wang, Danesh Irani, and Calton Pu, analyses 5.5 million spam emails over 15 years (1998 – 2013) and explores the real trend of email spam. The paper uses the topic modelling and network analysis techniques to understand the behaviours of spammers. The paper concludes that the email spam business is still alive and has become more capricious. It is also found that spammers changed topics over time to attract users. The second article “A Game Theoretic Approach for Modeling Privacy Settings of an Online Social Network”, by Jundong Chen, Ankunda Kiremire, Matthias Brust, and Vir Phoha, studies the privacy settings in social networks analyzing the behavior of users using a variety of factors such as attribute importance, benefit, risk and network topology. The paper uses a game-theoretical model that enables users to adjust their privacy settings according to certain strategy options. The results show that the most important attributes exhibit higher levels of revelation than the least important attributes. The paper also found that the network topology exhibits a considerable effect on the privacy in an environment with high level of risks. The third article “A Collaborative Virtual Workspace for Factory Configuration and Evaluation” by Ingo Zinnikus, Sergiy Byelozyorov, Xiaoqi Cao, Matthias Klusch, Christopher Krauss, Andreas Nonnengart, Torsten Spieldenner, Stefan Warwas, and Philipp Slusallek, presents a collaborative, synchronized web-based framework to create 3D scenarios for product design, simulation and training assisted by animated avatars. The paper uses the service-oriented approach which enables easy extension of the framework by developing plugins and adapting it to specific use-case scenarios. The fourth article “MOSDEN: A Scalable Mobile Collaborative Platform for Opportunistic Sensing Applications” by Prem Prakash Jayaraman, Charith Perera, Dimitrios Georgakopoulos, and Arkady Zaslavsky, proposes a mobile collaborative platform called MOSDEN that enables and supports opportunistic sensing at run time. The key features of the platform include: capturing and sharing sensor data across multiple applications, devices and users; supporting separation of sensors from application-specific processing, storing and sharing; promotion of reuse and repurposing of sensor data. The proposed framework has been implemented on Android-based smartphones and tablets. The fifth article “Harnessing Context for Vandalism Detection in Wikipedia” by Lakshmish Ramaswamy, Raga Sowmya Tummalapenta, Deepika Sethi, Kang Li, and Calton Pu, proposes a context-based vandalism detection framework for Wikipedia to detect the vandalism. This paper identifies two distinct types of context that are potentially valuable for vandalism detection, namely content-context and contributor-context, and use them in their framework. Their experimental results show that the accuracy of vandalism detection can be improved significantly by utilizing context. We strongly believe the readers will find these papers interesting and useful, and we hope that they will enjoy them.
Authors and Affiliations
Elisa Bertino, Dimitrios Georgakopoulos, Surya Nepal, Mudhakar Srivatsa, Alessandro Vinciarelli
PVSio-web: mathematically based tool support for the design of interactive and interoperable medical systems
Use errors, where medical devices work to specification but lead to the clinicians making mistakes resulting in patient harm, is a critical problem. Manufacturers need tools to help them find such design flaws at an earl...
A Hybrid Model Ranking Search Result for Research Paper Searching on Social Bookmarking
Social bookmarking and publication sharing systems are essential tools for web resource discovery. The performance and capabilities of search results from research paper bookmarking system are vital. Many researchers use...
Evolving and Controlling Perimeter, Rendezvous, and Foraging Behaviors in a Computation-Free Robot Swarm
Designing and controlling the collective behavior of a swarm often requires complex range, bearing sensors, and peer-to-peer communication strategies. Recent work studying swarm of robots that have no computational power...
A Collaboration Model for Community-Based Software Development with Social Machines
Crowdsourcing is generally used for tasks with minimal coordination, providing limited support for dynamic reconfiguration. Modern systems, exemplified by social ma chines, are subject to continual flux in both the clien...
An Alert System on the Presence of Myriapods in Peanut Farms in Senegal
In Senegal, agriculture remains one of the most important sectors of the economy and the culture of peanut is one of the pillars in this domain. Unfortunately, the expansion of this culture is constantly hampered by atta...