14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05)最新文献

筛选
英文 中文
AgentWeb Gateway - a middleware for dynamic integration of multi agent system and Web services framework AgentWeb网关——一种用于动态集成多代理系统和Web服务框架的中间件
M. O. Shafiq, Arshad Ali, H. F. Ahmad, H. Suguri
{"title":"AgentWeb Gateway - a middleware for dynamic integration of multi agent system and Web services framework","authors":"M. O. Shafiq, Arshad Ali, H. F. Ahmad, H. Suguri","doi":"10.1109/WETICE.2005.16","DOIUrl":"https://doi.org/10.1109/WETICE.2005.16","url":null,"abstract":"Web services framework has been evolved in context of convergence of Web and service oriented computing and then to Web services resource framework acting as basis for grid computing. It provides a loose coupled and implementation neutral infrastructure for distributed applications. On the other hand, multi agent systems has evolved as distributed system in context of autonomic computing having ultimate aim of self-managing systems to overcome their rapidly growing complexity and to enable their further growth. In this paper, we present our solution for dynamic and seamless integration of type the distributed systems. It would help in facilitating the requirements of next generation distributed applications requiring higher demands and complexity. The AgentWeb Gateway acts as middleware between both the technologies for dynamic integration and provides protocol transformations including service discovery, service description and service invocation.","PeriodicalId":128074,"journal":{"name":"14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126263131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Evaluation of an awareness distribution mechanism: a simulation approach 意识分配机制的评估:模拟方法
D. Nutter, C. Boldyreff
{"title":"Evaluation of an awareness distribution mechanism: a simulation approach","authors":"D. Nutter, C. Boldyreff","doi":"10.1109/WETICE.2005.37","DOIUrl":"https://doi.org/10.1109/WETICE.2005.37","url":null,"abstract":"In distributed software engineering, the role of informal communication is frequently overlooked. Participants simply employ their own ad-hoc methods of informal communication. Consequently such communication is haphazard, irregular, and rarely recorded as part of the project documentation. Thus, a need for tool support to facilitate more systematic informal communication via awareness has been identified. The tool proposed is based on the provision of awareness support that recognizes the complete context of the evolution of software artefacts rather than single events. Peer-to-peer (P2P) networking has been successfully employed to develop various distributed software engineering support tools. However, there are scalability problems inherent in naive P2P networks. To this end a semantic overlay network organization algorithm has been developed and tested in simulation prior to deployment as part of a forthcoming awareness extension to the Eclipse environment. The simulation verified that the self-organization algorithm was suitable for arranging a P2P network but several unexpected behaviors were observed. These included wandering nodes, starved nodes, and local maxima. Each of these problems required modification of the original algorithm design to solve or ameliorate them.","PeriodicalId":128074,"journal":{"name":"14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131111329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Challenges and solutions for model driven Web service composition 模型驱动的Web服务组合的挑战和解决方案
K. Pfadenhauer, B. Kittl, S. Dustdar
{"title":"Challenges and solutions for model driven Web service composition","authors":"K. Pfadenhauer, B. Kittl, S. Dustdar","doi":"10.1109/WETICE.2005.24","DOIUrl":"https://doi.org/10.1109/WETICE.2005.24","url":null,"abstract":"System theory propagates the use of models which raise the level of abstraction to cope with complexity, evolving out of variety and connectivity. Different modeling techniques have been invented for the abstract description of certain aspects of dynamic system behaviour. Nowadays process models are also an accepted part of service oriented process design. Although service oriented architecture (SOA) is the aim, rather isolated processes are the starting point for executable code generation and not the changing functionality distribution the system offers. Thus we claim the system view, necessary for process lifecycle management, is missing. Moreover, in the context of Web service composition, a vertical, bi-directional model driven approach allows for manifold allocation of e.g. testing, validation or binding tasks within the layer stack of MDAs (model driven architecture). In this paper, we discuss two distinctive proposals for model driven service composition, followed by a comparison of representative mapping scenarios offered by IBM and Microsoft.","PeriodicalId":128074,"journal":{"name":"14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134095143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
COPS - Collaborative Peer-to-Peer Information Systems Workshop Report 协作点对点信息系统研讨会报告
M. Angelaccio, B. Buttarazzi
{"title":"COPS - Collaborative Peer-to-Peer Information Systems Workshop Report","authors":"M. Angelaccio, B. Buttarazzi","doi":"10.1109/WETICE.2005.26","DOIUrl":"https://doi.org/10.1109/WETICE.2005.26","url":null,"abstract":"The first International Workshop on Collaborative Peer-to-Peer Information Systems, COPS05 was held in Linköping University as part of WETICE-2005. It was the first meeting devoted to the study of the emerging field of Cooperative Information Systems and P2P networks or Cooperative P2Pbased Information Systems (COPS). P2P Systems are popular because of the many benefits they offer: adaptation, self-organization, fault tolerance, and massive distribution and replication of large number of resources. The P2P environment is particularly challenging to work in Collaborative Information Systems because of the scale of the network and fault-tolerant nature of peers that characterize most P2P systems today. However, the P2P systems research community has focused on search and security aspects. Collaboration has been mainly viewed as an architectural paradigm instead of as an application framework for P2P systems. There is a need for a next generation tools for the development of applications that must integrate, for example, web servers network and p2p clients. Research communities working in database and distributed systems have included these topics in their agenda. However, a more specialized workshop could be an interesting place to exchange new ideas in the field of COPS.","PeriodicalId":128074,"journal":{"name":"14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05)","volume":"441 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122479204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self port scanning tool: providing a more secure computing environment through the use of proactive port scanning 自我端口扫描工具:通过使用主动端口扫描提供更安全的计算环境
Joshua E. Kocher, D. Gilliam
{"title":"Self port scanning tool: providing a more secure computing environment through the use of proactive port scanning","authors":"Joshua E. Kocher, D. Gilliam","doi":"10.1109/WETICE.2005.51","DOIUrl":"https://doi.org/10.1109/WETICE.2005.51","url":null,"abstract":"Secure computing is a necessity in the hostile environment that the Internet has become. Protection from nefarious individuals and organizations requires a solution that is more a methodology than a one time fix. One aspect of this methodology is having the knowledge of which network ports a computer has open to the world. These network ports are essentially the doorways from the Internet into the computer. An assessment method which uses the nmap software to scan ports has been developed to aid system administrators (SAs) with analysis of open ports on their system(s). Additionally, baselines for several operating systems have been developed so that SAs can compare their open ports to a baseline for a given operating system. Further, the tool is deployed on a Web site where SAs and users can request a port scan of their computer. The results are then emailed to the requester. This tool aids users, SAs, and security professionals by providing an overall picture of what services are running, what ports are open, potential trojan programs or back doors, and what ports can be closed.","PeriodicalId":128074,"journal":{"name":"14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128053666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A reputation management system in structured peer-to-peer networks 结构化点对点网络中的声誉管理系统
So Young Lee, O-Hoon Kwon, Jong Kim, S. Hong
{"title":"A reputation management system in structured peer-to-peer networks","authors":"So Young Lee, O-Hoon Kwon, Jong Kim, S. Hong","doi":"10.1109/WETICE.2005.9","DOIUrl":"https://doi.org/10.1109/WETICE.2005.9","url":null,"abstract":"Since there is no method to verify the trustworthiness of shared files in P2P systems, malicious peers can spread untrustworthy files to the system. In order to prevent these untrustworthy files from spreading, we propose an effective reputation management system using peer reputation and file reputation together in DHT-based structured P2P networks. Simulation results show that the proposed system works better in preventing untrustworthy files from spreading than existing systems even in cases of allowing malicious peers to change their identities.","PeriodicalId":128074,"journal":{"name":"14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125449022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Is P2P the unique solution for knowledge-rich collaboration working environments? P2P是知识丰富的协作工作环境的唯一解决方案吗?
I. Ballesteros
{"title":"Is P2P the unique solution for knowledge-rich collaboration working environments?","authors":"I. Ballesteros","doi":"10.1109/WETICE.2005.42","DOIUrl":"https://doi.org/10.1109/WETICE.2005.42","url":null,"abstract":"This paper discusses peer economics and P2P IT technologies. Conclude that P2P technology is best solution for a peer economy. Also states that P2P might not be the unique solution for managing distributed working environments at global scale. However, P2P technologies are to be an essential component of any future distributed working environment.","PeriodicalId":128074,"journal":{"name":"14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126606686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Emerging Technologies for Next-generation GRID 下一代GRID的新兴技术
A. Corsaro, A. Stefano, G. Pappalardo, C. Santoro, E. Tramontana
{"title":"Emerging Technologies for Next-generation GRID","authors":"A. Corsaro, A. Stefano, G. Pappalardo, C. Santoro, E. Tramontana","doi":"10.1109/WETICE.2005.33","DOIUrl":"https://doi.org/10.1109/WETICE.2005.33","url":null,"abstract":"The second international workshop on Emerging Technologies for Next-generation GRID (ETNGRID) gathered many researchers working on emerging aspects of Grid computing. Submitted papers focused on challenging open problems, proposing solutions based on approaches borrowed from the world of distributed systems, as well as new and promising techniques. We provide here a brief overview of the papers, showing the contribution given and the advances introduced in the field of Grid computing.","PeriodicalId":128074,"journal":{"name":"14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122878338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信