EAI Endorsed Transactions on Collaborative Computing

EAI Endorsed Transactions on Collaborative Computing

Basic info

  • Publisher: European Alliance for Innovation
  • Country of publisher: belgium
  • Date added to EuroPub: 2019/Jun/07

Subject and more

  • LCC Subject Category: Computer and Information Science, Computer Architecture, Data Communication and Networks
  • Publisher's keywords: Computing, Collaborative Computing, Collaborative Networks, worksharing, Collaborative Web Services Technologies, Mobile Networks, Wireless Sensor Networks, Large Scale Databases and Big Data
  • Language of fulltext: english
  • Full-text formats available: PDF

Publication charges

  • Article Processing Charges (APCs): No
  • Submission charges: No
  • Waiver policy for charges? No

Editorial information

Open access & licensing

  • Type of License: CC BY
  • License terms
  • Open Access Statement: Yes
  • Year open access content began: 2015
  • Does the author retain unrestricted copyright? True
  • Does the author retain publishing rights? True

Best practice polices

  • Permanent article identifier: DOI
  • Content digitally archived in:
  • Deposit policy registered in: None

This journal has '48' articles

Welcome Message from the Editors-in-Chief

Welcome Message from the Editors-in-Chief

Authors: James Joshi, Calton Pu
( 0 downloads)
Abstract

On behalf of the Editorial Board and the Advisory Board, we are pleased to welcome all to the inaugural issue of the EAI Endorsed Transactions on Collaborative Computing. This journal reflects the increasing maturity of the growing community of researchers involved in various areas of collaborative systems, networks, infrastructures and applications. The journal is also aligned with our IEEE/EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing (IEEE/EAI CollaborateCom) which has nurtured the community. We could not find a better timing for this inaugural issue than the 10th anniversary of IEEE/EAI CollaborateCom that will be held in Miami, USA on Oct 22-25, 2014. Given the ongoing rapid advances in computing and information technologies, we see unprecedented collaboration opportunities for individuals and distributed teams of humans, computer systems and applications, and highly heterogeneous computing devices. The contributions from the community have evolved from standalone tools to open systems, and further, from general purpose tools to specialized collaboration infrastructures that facilitate intensive collaboration in multi-organizational settings, reaching towards global scale social interactions and worksharing. Such collaboration-enhancing technologies enable large and globally dispersed organizations to achieve a much higher level of productivity and efficiency while accelerating innovation. The goal of this journal is to serve as a premier international venue for publishing innovative and cutting edge research results in theory as well as applied systems, applications and networking areas that enable intensive and efficient collaboration across and among networked cyberphysical and social systems and applications, individuals as well as enterprises. Novel collaboration solutions that fully realize the promises of electronic collaboration, and pushes the limits of human endeavor, productivity and discovery require innovations and advancements in broad areas of computing including networking, systems and applications, user interfaces and interaction paradigms, and seamless interoperation among system, network and applicationspecific components and tools. Sample topics of interest include, but are not limited to:  Participatory sensing, crowdsourcing, and citizen science,  Theoretical foundations and algorithms for collaborative networks, applications, and infrastructures,  Architectures, protocols, and enabling technologies for collaborative networks, systems and applications  Autonomic computing and quality of services in collaborative networks, systems, and applications  Collaboration in context-aware, pervasive, cloud computing, and social networking environments  Cyber physical and Cyber human environments, and Internet of Things (IoT)  Collaborative multimedia systems/applications, large scale databases and BigData  Collaboration in e-health, e-learning, e-government, and digital libraries  Collaborative network infrastructures such as body area networks, wireless sensor networks, VANETS, mobile networks, etc.  Models and mechanisms for real-time and large scale collaboration, information and work sharing  Security, privacy, resiliency/survivability and trust management in collaborative networks, systems, and applications  Simulation, performance evaluation, experiments, and case studies of collaborative environments  Collaborative web services technologies, business processes, workflows, and service-oriented systems and architectures  Etc.

Keywords: Welcome Message from the Editors-in-Chief
Guest Editorial: Selected Papers from IEEE IEEE/EAI CollaborateCom 2013

Guest Editorial: Selected Papers from IEEE IEEE/EAI CollaborateCom 2013

Authors: Elisa Bertino, Dimitrios Georgakopoulos, Surya Nepal, Mudhakar Srivatsa, Alessandro Vinciarelli
( 0 downloads)
Abstract

This issue of EAI Transactions on Collaborative Computing includes extended versions of articles selected from the program of the 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2013), which was held during October 20-23, 2013, in Austin, Texas USA. The final program had 20 research papers, 23 application papers, 2 industry papers, 11 invited papers, 3 keynotes, 2 panels, and 2 full day workshops. Five research papers were invited for submission for this special issue of EAI Transactions on Collaborative Computing. The journal submissions were substantially extended and went through an additional review process by selected members of the CollaborateCom 2013 program committee as well as external reviewers. The first article “Is Email Business Dying?: A Study on Evolution of Email Spam Over Fifteen Years”, by De Wang, Danesh Irani, and Calton Pu, analyses 5.5 million spam emails over 15 years (1998 – 2013) and explores the real trend of email spam. The paper uses the topic modelling and network analysis techniques to understand the behaviours of spammers. The paper concludes that the email spam business is still alive and has become more capricious. It is also found that spammers changed topics over time to attract users. The second article “A Game Theoretic Approach for Modeling Privacy Settings of an Online Social Network”, by Jundong Chen, Ankunda Kiremire, Matthias Brust, and Vir Phoha, studies the privacy settings in social networks analyzing the behavior of users using a variety of factors such as attribute importance, benefit, risk and network topology. The paper uses a game-theoretical model that enables users to adjust their privacy settings according to certain strategy options. The results show that the most important attributes exhibit higher levels of revelation than the least important attributes. The paper also found that the network topology exhibits a considerable effect on the privacy in an environment with high level of risks. The third article “A Collaborative Virtual Workspace for Factory Configuration and Evaluation” by Ingo Zinnikus, Sergiy Byelozyorov, Xiaoqi Cao, Matthias Klusch, Christopher Krauss, Andreas Nonnengart, Torsten Spieldenner, Stefan Warwas, and Philipp Slusallek, presents a collaborative, synchronized web-based framework to create 3D scenarios for product design, simulation and training assisted by animated avatars. The paper uses the service-oriented approach which enables easy extension of the framework by developing plugins and adapting it to specific use-case scenarios. The fourth article “MOSDEN: A Scalable Mobile Collaborative Platform for Opportunistic Sensing Applications” by Prem Prakash Jayaraman, Charith Perera, Dimitrios Georgakopoulos, and Arkady Zaslavsky, proposes a mobile collaborative platform called MOSDEN that enables and supports opportunistic sensing at run time. The key features of the platform include: capturing and sharing sensor data across multiple applications, devices and users; supporting separation of sensors from application-specific processing, storing and sharing; promotion of reuse and repurposing of sensor data. The proposed framework has been implemented on Android-based smartphones and tablets. The fifth article “Harnessing Context for Vandalism Detection in Wikipedia” by Lakshmish Ramaswamy, Raga Sowmya Tummalapenta, Deepika Sethi, Kang Li, and Calton Pu, proposes a context-based vandalism detection framework for Wikipedia to detect the vandalism. This paper identifies two distinct types of context that are potentially valuable for vandalism detection, namely content-context and contributor-context, and use them in their framework. Their experimental results show that the accuracy of vandalism detection can be improved significantly by utilizing context. We strongly believe the readers will find these papers interesting and useful, and we hope that they will enjoy them.

Keywords: Guest Editorial, IEEE IEEE/EAI CollaborateCom 2013
Is Email Business Dying?: A Study on Evolution of Email Spam Over Fifteen Years

Is Email Business Dying?: A Study on Evolution of Email Spam Over Fifteen Years

Authors: De Wang, Danesh Irani, Calton Pu
( 0 downloads)
Abstract

With the increasing dedication and sophistication of spammers, email spam is a persistent problem even today. Popular social network sites such as Facebook, Twitter, and Google+ are not exempt from email spam as they all interface with email systems. While some report predicts that email spam business is dying due to the decreasing volume of email spam. Whether email spam business is really dying is an interesting question. In this paper, we analyze email spam trends on Spam Archive dataset, which contains 5.5 million spam emails over 15 years (1998 – 2013). We statistically analyze emails contents including header information (e.g. content type) and embedded items (e.g. URL links). Also, we investigate topic drift using topic modeling technique. Moreover, we perform network analysis on sender-to-receiver IP routing networks. Our study shows the dynamic nature of email spam over one and a half decades and demonstrate that the email spam business is not dying but more capricious.

Keywords: email, spam, evolution
A Game Theoretic Approach for Modeling Privacy Settings of an Online Social Network

A Game Theoretic Approach for Modeling Privacy Settings of an Online Social Network

Authors: Jundong Chen, Ankunda R. Kiremire, Matthias R. Brust, Vir V. Phoha
( 0 downloads)
Abstract

Users of online social networks often adjust their privacy settings to control how much information on their profiles is accessible to other users of the networks. While a variety of factors have been shown to affect the privacy strategies of these users, very little work has been done in analyzing how these factors influence each other and collectively contribute towards the users’ privacy strategies. In this paper, we analyze the influence of attribute importance, benefit, risk and network topology on the users’ attribute disclosure behavior by introducing a weighted evolutionary game model. Results show that: irrespective of risk, users aremore likely to reveal theirmost important attributes than their least important attributes; when the users’ range of influence is increased, the risk factor plays a smaller role in attribute disclosure; the network topology exhibits a considerable effect on the privacy in an environment with risk.

Keywords: game theory, social network, privacy settings, network topology
MOSDEN: A Scalable Mobile Collaborative Platform for Opportunistic Sensing Applications

MOSDEN: A Scalable Mobile Collaborative Platform for Opportunistic Sensing Applications

Authors: Prem Prakash Jayaraman, Charith Perera, Dimitrios Georgakopoulos, Arkady Zaslavsky
( 0 downloads)
Abstract

Mobile smartphones along with embedded sensors have become an efficient enabler for various mobile applications including opportunistic sensing. The hi-tech advances in smartphones are opening up a world of possibilities. This paper proposes a mobile collaborative platform called MOSDEN that enables and supports opportunistic sensing at run time. MOSDEN captures and shares sensor data acrossmultiple apps, smartphones and users. MOSDEN supports the emerging trend of separating sensors from application-specific processing, storing and sharing. MOSDEN promotes reuse and re-purposing of sensor data hence reducing the efforts in developing novel opportunistic sensing applications. MOSDEN has been implemented on Android-based smartphones and tablets. Experimental evaluations validate the scalability and energy efficiency of MOSDEN and its suitability towards real world applications. The results of evaluation and lessons learned are presented and discussed in this paper.

Keywords: opportunistic sensing, crowdsensing, mobile middleware, mobile data analytics
Harnessing Context for Vandalism Detection in Wikipedia

Harnessing Context for Vandalism Detection in Wikipedia

Authors: Lakshmish Ramaswamy, Raga Sowmya Tummalapenta, Deepika Sethi, Kang Li, Calton Pu
( 0 downloads)
Abstract

The importance of collaborative social media (CSM) applications such as Wikipedia to modern free societies can hardly be overemphasized. By allowing end users to freely create and edit content, Wikipedia has greatly facilitated democratization of information. However, over the past several years, Wikipedia has also become susceptible to vandalism, which has adversely affected its information quality. Traditional vandalism detection techniques that rely upon simple textual features such as spammy or abusive words have not been very effective in combating sophisticated vandal attacks that do not contain common vandalism markers. In this paper, we propose a context-based vandalism detection framework for Wikipedia. We first propose a contextenhanced finite state model for representing the context evolution ofWikipedia articles. This paper identifies two distinct types of context that are potentially valuable for vandalism detection, namely content-context and contributor-context. The distinguishing powers of these contexts are discussed by providing empirical results. We design two novel metrics for measuring how well the content-context of an incoming edit fits into the topic and the existing content of a Wikipedia article. We outline machine learning-based vandalism identification schemes that utilize these metrics. Our experiments indicate that utilizing context can substantially improve vandalism detection accuracy.

Keywords: Collaborative Social Media, Vandalism, Content-context, Contributor-context
Collaborating with executable content across space and time

Collaborating with executable content across space and time

Authors: Mahadev Satyanarayanan, Vasanth Bala, Gloriana St. Clair, Erika Linke
( 0 downloads)
Abstract

Executable content is of growing importance in many domains. How does one share and archive such content at Internet-scale for spatial and temporal collaboration? Spatial collaboration refers to the classic concept of user collaboration: two or more users who are at different Internet locations performing a task using shared context. Temporal collaboration refers to the archiving of context by one user and use of that context by another user, possibly many years or decades later. The term “shared context” has typically meant shared documents or a shared workspace such as a whiteboard. However, executable content forces us to think differently. Just specifying a standardized data format is not sufficient; one has to accurately reproduce computation. We observe that the precise encapsulation of computing state provided by a virtual machine (VM) may help us solve this problem. We can cope with large VM size through a streaming mechanism that demand fetches memory and disk state during execution. Based on our positive initial experience with VMs for archiving execution state, we propose the creation of Olive, an Internet ecosystem of curated VM image collections.

Keywords: virtual machine monitors, file systems, operating systems, open source software, archival storage
A Collaborative VirtualWorkspace for Factory Configuration and Evaluation

A Collaborative VirtualWorkspace for Factory Configuration and Evaluation

Authors: Ingo Zinnikus, Sergiy Byelozyorov, Xiaoqi Cao, Matthias Klusch, Christopher Krauss
( 0 downloads)
Abstract

The convergence of information technologies (IT) has enabled the Digital Enterprise in which engineering, production planning, manufacturing and sales processes are supported by IT-based collaboration, simulation and enactment. As a result, borders between reality and its virtual representations become increasingly blurred. Advanced tools need to support flexibility, specialization and collaborative evolution of the design where the exchange of knowledge between domain experts helps to improve informed decision making. In this paper, we present a collaborative, synchronized web-based framework to create 3D scenarios for product design, simulation and training assisted by animated avatars.

Keywords: Collaborative computing architectures and networks, Computer supported collaborative work, Web-based collaboration, Visualization techniques for collaborative networks and applications, Service-oriented architectures for collaborative networking and applications
Message from the Editors-in-Chief

Message from the Editors-in-Chief

Authors: James Jun, Calton Pu
( 0 downloads)
Abstract

We are very pleased to welcome you all to the second issue of this journal. In this issue, we present six selected invited papers that span various aspects of collaborative computing and technologies. In particular, the themes of the papers cover Crowdsourcing, a collaborative approach to secure and oblivious storage, a virtual network infrastructure to enable collaboration, collaborative social navigation support for way-finding for people with disabilities, a collaborative approach to sharing information in social networks, and an approach to understand collaboration and coordination among members in a community. This issue, thus, aims to highlight the role of collaboration technologies and techniques in highly diverse application domains. We thank the authors for their valuable contributions. In “Reconciling Schema Matching Networks Through Crowdsourcing,” authors Viet Hung, Thanh Tam, Miklós and Aberer propose to use crowdsourcing techniques to address the challenge of schema matching during data integration. The proposed Crowdsourcing technique tries to validate the correspondences between the attributes of database schema generated by a large group of people who are non-experts. The work assumes that there is a need to have attribute correspondences established not just between two schemas but also in a network. However, there is a potentially inherent unreliability issue with regards to the users’ inputs in Crowdsourcing. The authors propose using integrity and consistency constraints to improve the process. They show that such constraints improve aggregated answers, and also help estimate better the quality of answers of each worker and detect potential spammers. Frikken, Wang and Atallah in “A Scheme for Collaboratively Processing Nearest Neighbor Queries in Oblivious Storage” address the issue related to confidentiality of both the outsourced data as well as the patterns of access to that data. They propose an extension of the existing Oblivious Storage semantics to include an oblivious index. The proposed oblivious index supports finding the keys nearest to the query in the key-value store. The authors show that the extension has performance that is similar to the existing Oblivious Storage schemes in terms of storage at both clients and servers, as well as the rounds of communication involved. Juste, Jeong, Eom, Baker and Figueiredo in “TinCan: User-Defined P2P Virtual Network Overlays for Ad-hoc Collaboration,” propose a virtual network called TinCan that is based on peer-to-peer private tunnels. Such virtual private networks are important for collaborative environments to provide private, authenticated communication between collaborating partners that belong to multiple institutions and are potentially mobile. The paper presents the architecture and design of TinCan which goes beyond the traditional centralized VPN based approaches. They also present a prototype that supports Windows, Linux, and Android mobile devices, and its experimental evaluation. In “Wayfinding and Navigation for People with Disabilities Using Social Navigation Networks,” authors Karimi, Dias, Pearlman and Zimmerman focus on issues related to safe and independent mobility associated with navigation of unfamiliar indoor as well as outdoor environments. They argue that despite great advances in technologies, the existing solutions for way-finding and navigation do not appropriately address the needs of the people with disabilities (PWDs). The authors further argue that such limitations exist because there is a lack of experience centric approach integrated into these systems and services. They propose using a hybrid approach where the compute-centric and experience-centric methods are combined to overcome such shortcomings to support the needs of the PWDs.

Keywords: Message from the Editors-in-Chief
Reconciling Schema Matching Networks Through Crowdsourcing

Reconciling Schema Matching Networks Through Crowdsourcing

Authors: Nguyen Quoc Viet Hung, Nguyen Thanh Tam, Zoltán Miklós, Karl Aberer
( 0 downloads)
Abstract

for data integration purposes. Although several automatic schema matching tools have been developed, their results are often incomplete or erroneous. To obtain a correct set of correspondences, usually human effort is required to validate the generated correspondences. This validation process is often costly, as it is performed by highly skilled experts. Our paper analyzes how to leverage crowdsourcing techniques to validate the generated correspondences by a large group of non-experts. In our work we assume that one needs to establish attribute correspondences not only between two schemas but in a network. We also assume that the matching is realized in a pairwise fashion, in the presence of consistency expectations about the network of attribute correspondences. We demonstrate that formulating these expectations in the form of integrity constraints can improve the process of reconciliation. As in the case of crowdsourcing the user’s input is unreliable, we need specific aggregation techniques to obtain good quality. We demonstrate that consistency constraints can not only improve the quality of aggregated answers, but they also enable us to more reliably estimate the quality answers of individual workers and detect spammers. Moreover, these constraints also enable to minimize the necessary human effort needed, for the same expected quality of results.

Keywords: data integration, schema matching, crowdsourcing, worker assessment, user effort
A Scheme for Collaboratively Processing Nearest Neighbor Queries in Oblivious Storage

A Scheme for Collaboratively Processing Nearest Neighbor Queries in Oblivious Storage

Authors: Keith B. Frikken, Shumiao Wang, Mikhail J. Atallah
( 0 downloads)
Abstract

Security concerns are a substantial impediment to the wider deployment of cloud storage. There are two main concerns on the confidentiality of outsourced data: i) protecting the data, and ii) protecting the access pattern (i.e., which data is being accessed). To mitigate these concerns, schemes for Oblivious Storage (OS) have been proposed. In OS, the data owner outsources a key-value store to a cloud server, and then can later execute get, put, and remove queries, by collaboration with the server; furthermore, both the data and the access pattern are hidden from the server. In this paper, we extend the semantics of OS by proposing an oblivious index that supports nearest neighbor queries. That is, finding the nearest keys to the query in the key-value store. Our proposed index structure for supporting nearest-neighbor has similar performance bounds to previous OS schemes that did not support nearest-neighbor, in terms of client storage, server storage and rounds of communication.

Keywords: Collaborative Cloud Storage, Oblivious Storage, Collaboration in Cloud Computing
TinCan: User-Defined P2P Virtual Network Overlays for Ad-hoc Collaboration

TinCan: User-Defined P2P Virtual Network Overlays for Ad-hoc Collaboration

Authors: Pierre St Juste, Kyuho Jeong, Heungsik Eom, Corey Baker, Renato Figueiredo
( 0 downloads)
Abstract

Virtual private networking (VPN) has become an increasingly important component of a collaboration environment because it ensures private, authenticated communication among participants, using existing collaboration tools, where users are distributed across multiple institutions and can be mobile. The majority of current VPN solutions are based on a centralized VPN model, where all IP traffic is tunneled through a VPN gateway. Nonetheless, there are several use case scenarios that require a model where end-to-end VPN links are tunneled upon existing Internet infrastructure in a peer-to-peer (P2P) fashion, removing the bottleneck of a centralized VPN gateway. We propose a novel virtual network — TinCan — based on peerto-peer private network tunnels. It reuses existing standards and implementations of services for discovery notification (XMPP), reflection (STUN) and relaying (TURN), facilitating configuration. In this approach, trust relationships maintained by centralized (or federated) services are automatically mapped to TinCan links. In one use scenario, TinCan allows unstructured P2P overlays connecting trusted end-user devices — while only requiring VPN software on user devices and leveraging online social network (OSN) infrastructure already widely deployed. This paper describes the architecture and design of TinCan and presents an experimental evaluation of a prototype supporting Windows, Linux, and Android mobile devices. Results quantify the overhead introduced by the network virtualization layer, and the resource requirements imposed on services needed to bootstrap TinCan links.

Keywords: vpn, peer-to-peer, networking, privacy, virtual organization
Wayfinding and Navigation for People with Disabilities Using Social Navigation Networks

Wayfinding and Navigation for People with Disabilities Using Social Navigation Networks

Authors: Hassan A. Karimi, M. Bernardine Dias, Jonathan Pearlman, George J. Zimmerman
( 0 downloads)
Abstract

To achieve safe and independent mobility, people usually depend on published information, prior experience, the knowledge of others, and/or technology to navigate unfamiliar outdoor and indoor environments. Today, due to advances in various technologies, wayfinding and navigation systems and services are commonplace and are accessible on desktop, laptop, and mobile devices. However, despite their popularity and widespread use, current wayfinding and navigation solutions often fail to address the needs of people with disabilities (PWDs). We argue that these shortcomings are primarily due to the ubiquity of the compute-centric approach adopted in these systems and services, where they do not benefit from the experience-centric approach. We propose that following a hybrid approach of combining experience-centric and compute-centric methods will overcome the shortcomings of current wayfinding and navigation solutions for PWDs.

Keywords: wayfinding, navigation, social navigation networks, people with disabilities, assistive technology
SocialCloudShare: a Facebook Application for a Relationship-based Information Sharing in the Cloud

SocialCloudShare: a Facebook Application for a Relationship-based Information Sharing in the Cloud

Authors: Davide Albertini, Barbara Carminati, Elena Ferrari
( 0 downloads)
Abstract

In last few years, Online Social Networks (OSNs) have become one of the most used platforms for sharing data (e.g., pictures, short texts) on the Internet. Nowadays Facebook and Twitter are the most popular OSN providers, though they implement different social models. However, independently from the social model they implement, OSN platforms have become a widespread repository of personal information. All these data (e.g., profile information, shared elements, users’ likes) are stored in a centralized repository that can be exploited for data mining and marketing analysis. With this data collection process, lots of sensitive information are gathered by OSN providers that, in time, have become more and more targeted by malicious attackers. To overcome this problem, in this paper we present an architectural framework that, by means of a Social Application registered in Facebook, allows users to move their data (e.g., relationships, resources) outside the OSN realm and to store them in the public Cloud. Given that the public Cloud is not a secure and private environment, our proposal provides users security and privacy guarantees over their data by encrypting the resources and by anonymizing their social graphs. The presented framework enforces Relationship-Based Access Control (ReBAC) rules over the anonymized social graph, providing OSN users the possibility to selectively share information and resources as they are used to do in Facebook.

Keywords: Online Social Networks; Collaborative graph anonymization; Controlled information sharing; Privacypreserving path finding
Tracing Coordination and Cooperation Structures via Semantic Burst Detection

Tracing Coordination and Cooperation Structures via Semantic Burst Detection

Authors: Yu-Ru Lin, Drew Margolin, David Lazer
( 0 downloads)
Abstract

Developing technologies that support collaboration requires understanding how knowledge and expertise are shared and distributed among community members. We explore two forms of knowledge distribution structures, coordination and cooperation, that are central to successful collaboration. We propose a novel method for detecting the coordination of strategic communication among members of political communities. Our method identifies a “rapid semantic convergence,” a sudden burst in the use linguistic constructions by multiple individuals within a short time, as a signature of coordination. We apply our method to the public statements of U.S. Senators in the 112th U.S. Congress and construct coordination and cooperation networks among these individuals. We then compare aspects of these networks to other known properties of the Senators. Results indicate that the detected networks reflect underlying tendencies in the social relationships among Senators and reveal interesting differences in how the different parties coordinate communication.

Keywords: semantic burst, semantic convergence, burst detection, coordination, cooperation, social networks, public statement, political network, strategic communications

About Europub

EuroPub is a comprehensive, multipurpose database covering scholarly literature, with indexed records from active, authoritative journals, and indexes articles from journals all over the world. The result is an exhaustive database that assists research in every field. Easy access to a vast database at one place, reduces searching and data reviewing time considerably and helps authors in preparing new articles to a great extent. EuroPub aims at increasing the visibility of open access scholarly journals, thereby promoting their increased usage and impact.