


default search action
12th WETICE 2003: Linz, Austria
- 12th IEEE International Workshops on Enabling Technologies (WETICE 2003), Infrastructure for Collaborative Enterprises, 9-11 June 2003, Linz, Austria. IEEE Computer Society 2003, ISBN 0-7695-1963-6

Plenary Talks
- Alois Ferscha:

Coordination in Pervasive Computing Environments. 3-9 - Jesper M. Johansson:

Network Threat Modeling. 10 - Wolfgang Gerteis, Joachim Schaper:

Instructional Design for Collaborative E-Learning. 11 - N. Dhyanesh, G. C. Vineel, S. V. Raghavan:

DEVISE: A Methodology for Building Web Services Based Infrastructure for Collaborative Enterprises. 12-
Workshop: Agent-Based Computing for Enterprise Collaboration (ACEC)
- M. Brian Blake, Giacomo Cabri:

Agent-based Computing for Enterprise Collaboration - What Can Agents Learn from Human Collaboration? 21-23 - Daniel Frey, Tim Stockheim, Peer-Oliver Woelk, Roland Zimmermann:

Integrated Multi-agent-based Supply Chain Management. 24-29 - Ismail Khalil Ibrahim, Gabriele Kotsis

, Wieland Schwinger:
Mapping Abstractions of Norms in Electronic Institutions. 30-35 - Stefan Kirn, Christian Heine, Rainer Herrler, Karl-Heinz Krempels:

Agent.Hospital - agent-based open framework for clinical applications. 36-41 - Giacomo Cabri, Luca Ferrari, Letizia Leonardi

:
A Case Study in Role-based Agent Interactions. 42-47 - Zakaria Maamar, Fahim Akhter, Mohammed Lahkim:

An Agent-based Approach to Specify a Web Service-oriented Environment. 48-
Workshop: Distributed and Mobile Collaboration (DMC)
- Schahram Dustdar

, Harald C. Gall
:
DMC - Distributed and Mobile Collaboration Workshop Report. 53-
DMC-Collaboration and Coordination
- Alexander Levine, Vassilis Prevelakis, John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis:

WebDAVA: An Administrator-Free Approach To Web File-Sharing. 59-64 - José Martín Molina Espinosa, Jean Fanchon, Khalil Drira:

A Logical Model for Coordination Rule Classes in Collaborative Sessions. 65-70 - Ping Jiang, Quentin Mair, Julian Newman

:
Using UML to Design Distributed Collaborative Workflows: from UML to XPDL. 71-76 - Stefan Berger, Rainer Mohr, Holger Nösekabel, Klaus J. Schäfer:

Mobile Collaboration Tool for University Education. 77-
DMC-Frameworks
- Mauro Caporuscio

, Paola Inverardi:
Yet Another Framework for Supporting Mobile and Collaborative Work. 81-86 - Zorlu Yalniz, Engin Kirda:

Supporting Collaboration in the Development of Tools and Dies in Manufacturing Networks. 87-
Issues in Peer-to-Peer Systems
- Ming Zhang, Kian-Lee Tan

:
Supporting Rich Queries in DHT-based Peer-to-Peer Systems. 95-100 - Prasenjit Dey, Anwitaman Datta:

On Optimal Update Policies and Cluster Sizes for 2-Tier Distributed Systems. 101-107 - Claus Eikemeier, Ulrike Lechner:

Introducing domain specific ad-hoc collaboration: The peer-to-peer tool iKnow. 107-112 - Clare Gryce, Giacomo Piccinelli, Christian Zirpins:

A Provision-centric Model for Electronic Services. 113-
Designing DMC Systems
- Nikolay Mehandjiev, Anthony Karageorgos

, Gee Hin Tsang:
Designing Coordination Systems for Distributed Teamwork. 117-122 - Paola Inverardi, Massimo Tivoli, Antonio Bucchiarone

:
Automatic synthesis of coordinators for COTS group-ware applications: an example. 123-
Workshop: Evaluating Collaborative Information Systems and Support for Virtual Enterprises (ECE)
- Julian Newman, Elaine M. Raybourn, Josie P. H. Huang:

WETICE 2003 Evaluating Collaborative Enterprises Workshop Report. 131-136 - Linda M. L. Peters:

The Virtual Environment: The "How-to" of Studying Collaboration and Performance of Geographically Dispersed Teams. 137-141 - France Bouthillier, Kathleen Shearer:

Assessing Collaborative Tools from an Information-Processing Perspective: Identification of Value-Added Processes. 142-147 - Lydia M. S. Lau, Craig A. Adams, Peter M. Dew, Christine Leigh:

Use of Scenario Evaluation in Preparation for Deployment of a Collaborative System for Knowledge Transfer - the Case of KiMERA. 148-152 - Mirjam Huis in 't Veld, J. H. Erik Andriessen, Robert M. Verburg

:
E-MAGINE: The Development of an Evaluation Method to Assess Groupware Applications. 153-158 - Sobah Abbas Petersen:

An Agent-based Evaluation Framework for Supporting Virtual Enterprise Formation. 159-164 - Samir Tata, Imed Boughzala:

Modeling contribution for virtual enterprise support. 165-170 - David Nutter, Cornelia Boldyreff:

Historical Awareness Support and Its Evaluation in Collaborative Software Engineering. 171-
Workshop: Enterprise Security (ES)
- David P. Gilliam:

Eighth Enterprise Security (ES) Workshop Report. 179-183 - Krzysztof Juszczyszyn:

Verifying Enterprise's Mandatory Access Control Policies with Coloured Petri Nets. 184-189 - Grzegorz Kolaczek

:
Specification and Verification of Constraints in Role Based Access Control for Enterprise Security System. 190-195 - András Belokosztolszki, David M. Eyers

, Wei Wang, Ken Moody:
Policy Storage for Role-Based Access Control Systems. 196-201 - Gail-Joon Ahn

:
Specification and Classification of Role-based Authorization Policies. 202-207 - Claudiu Duma, Nahid Shahmehri, Patrick Lambrix

:
A Hybrid Key Tree Scheme for Multicast to Balance Security and Efficiency Requirements. 208-213 - Edward T. Chow, Matthew Chew Spence, Barney Pell, Helen Stewart, David J. Korsmeyer, Yih-Chiao Joseph Liu, Hsin-Ping Pat Chang, Conan Viernes, Andre Goforth:

Secured Advanced Federated Environment (SAFE): A NASA Solution for Secure Cross-Organization Collaboration. 214-219 - Stelios Sidiroglou, Angelos D. Keromytis:

A Network Worm Vaccine Architecture. 220-225 - Ramaprabhu Janakiraman, Marcel Waldvogel, Qi Zhang:

Indra: A peer-to-peer approach to network intrusion detection and prevention. 226-231 - Gilles Goncalves

, Fred Hemery, Aneta Poniszewska
:
Verification of Access Control Coherence in Information System during Modifications. 232-237 - Scott Campbell:

Supporting Digital Signatures in Mobile Environments. 238-242 - David P. Gilliam, Thomas L. Wolfe, Joseph S. Sherif, Matt Bishop

:
Software Security Checklist for the Software Life Cycle. 243-248 - Adrian von Bidder, Nathalie Weiler:

Key Exchange (KX) - A Next Generation Protocol to Synchronise PGP Keyservers. 249-254 - Marc Rennhard, Bernhard Plattner:

Practical Anonymity for the Masses with Mix-Networks. 255-
Trust Management
- Cristiano Castelfranchi, Rino Falcone, Giovanni Pezzulo

:
Cooperating through a Belief-based Trust Computation. 263-268 - Sotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith:

Design and Implementation of Virtual Private Services. 269-274 - Andrew Twigg, Nathan Dimmock:

Attack-Resistance of Computational Trust Models. 275-280 - Nathan Dimmock:

How much is "enough"? Risk in Trust-Based Access Control. 281-282 - Colin English, Sotirios Terzis

, Waleed Wagealla, Helen Lowe, Paddy Nixon, Andrew D. McGettrick:
Trust Dynamics for Collaborative Global Computing. 283-
Workshop: Knowledge Management for Distributed Agile Processes (KMDAP)
- Harald Holz, Grigori Melnik, Martin Schaaf:

Knowledge Management for Distributed Agile Processes: Models, Techniques, and Infrastructure. 291-294 - Heiner Stuckenschmidt:

Ontology-Based Information in Dynamic Environments. 295 - Michael Granitzer

, Wolfgang Kienreich, Vedran Sabol, Gisela Dösinger:
WebRat: Supporting Agile Knowledge Retrieval through Dynamic, Incremental Clustering and Automatic Labelling of Web Search Result Sets. 296-301 - Thomas Chau, Frank Maurer

, Grigori Melnik:
Knowledge Sharing: Agile Methods vs. Tayloristic Methods. 302-307 - Frauke Paetsch, Armin Eberlein

, Frank Maurer
:
Requirements Engineering and Agile Software Development. 308-313 - Gerardo Canfora

, Aniello Cimitile, Corrado Aaron Visaggio
:
Lessons learned about distributed pair programming: what are the knowledge needs to address? 314-319 - Harald Holz, Jochen Schäfer:

Collaborative, Task-Specific Information Delivery for Agile Processes. 320-325 - Thomas Sauer:

Using Design Rationales for Agile Documentation. 326-331 - Kerstin Maximini, Martin Schaaf:

The PROGEMM Approach For Managing Clinical Processes. 332-337 - Rosina Weber

:
Proactive Knowledge Distribution for Agile Processes. 338-339 - Ludger van Elst, Felix-Robinson Aschoff, Ansgar Bernardi, Heiko Maus

, Sven Schwarz:
Weakly-structured Workflows for Knowledge-intensive Tasks: An Experimental Evaluation. 340-345 - Ettore Colombo, Fabio Sartori:

KEPT: a Knowledge Elicitation Tool to Support Communities of Practice. 346-
Workshop: Theory and Practice of Open Computational Systems (TAPOCS)
- Martin Fredriksson, Rune Gustavsson, Andrea Omicini, Alessandro Ricci

:
First International Workshop on Theory and Practice of Open Computational Systems. 355-358 - Martin Fredriksson, Rune Gustavsson:

Quality of Service in Network-Centric Warfare and Challenges in Open Computational Systems Engineering. 359-364 - Alessandro Ricci

, Andrea Omicini:
Supporting Coordination in Open Computational Systems with TuCSoN. 365-370 - David Keil, Dina Q. Goldin:

Modeling Indirect Interaction in Open Computational Systems. 371-376 - Giuseppe Trautteur, Raniero Virgilio:

An Agent-based Computational Model for the Battle of Trafalgar: A Comparison Between Analytical and Simulative Methods of Research. 377-382 - Davy Capera, Jean-Pierre Georgé

, Marie-Pierre Gleizes, Pierre Glize:
The AMAS theory for complex problem solving based on self-organizing cooperative agents. 383-388 - Jean-Pierre Georgé

, Gauthier Picard
, Marie-Pierre Gleizes, Pierre Glize:
Living Design for Open Computational Systems. 389-394 - Eric Sanchis:

Designing new Agent Based Applications Architectures with the AGP Methodology. 395-400 - Marco Mamei, Franco Zambonelli, Letizia Leonardi

:
Developing Adaptive and Context-aware Applications in Dynamic Networks. 401-

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














