2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises最新文献

筛选
英文 中文
Collabory: A Collaborative Throughput Stabilizer & Accelerator for P2P Protocols 协作:P2P协议的协作吞吐量稳定器和加速器
Shay Horovitz, D. Dolev
{"title":"Collabory: A Collaborative Throughput Stabilizer & Accelerator for P2P Protocols","authors":"Shay Horovitz, D. Dolev","doi":"10.1109/WETICE.2008.33","DOIUrl":"https://doi.org/10.1109/WETICE.2008.33","url":null,"abstract":"Common peer-to-peer (P2P) file sharing clients usually download at an unstable rate and hardly exploit the available bandwidth offered by low rate sources. The characteristic fluctuational throughput of the source peers might be caused by user behavior factors such as running other bandwidth consuming tasks, throttling of download speed by P2P software or even termination of the source.In this paper we propose Collabory - a solution for stabilizing and accelerating the download speed rate in existing P2P networks. We introduce a new role: \"feeders\" - peers that collaboratively aggregate the downloads from multiple sources into a single, stable stream served to the downloading peer. We show that the solution utilizes source nodes with an extremely low and unstable throughput without reducing the download rate of the downloading peer.Measurements in a test suite expressed a major increase in download rate and stability. Upgraded & stabilized throughput is demonstrated on eMule.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133636195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Managing Flow Dependencies: The "Missing Link" in Co-ordinating Distributed Teams in Large-Scale Development Projects 管理流依赖关系:大型开发项目中协调分布式团队的“缺失环节”
Wendy K. Ivins
{"title":"Managing Flow Dependencies: The \"Missing Link\" in Co-ordinating Distributed Teams in Large-Scale Development Projects","authors":"Wendy K. Ivins","doi":"10.1109/WETICE.2008.41","DOIUrl":"https://doi.org/10.1109/WETICE.2008.41","url":null,"abstract":"Distributed team members working in large-scale development projects would benefit from effective process support for co-ordinating their activities with the work of other team members. However, many of the techniques used to model and enact processes have a \"missing link\" as they do not explicitly consider the co-ordination activities needed to manage flow dependencies that arise from the fragmentation of the work. This can result in unnecessary rework and delays if informal and ad-hoc coordination is used to manage transitions between activities. We propose using explicit coordination processes to manage flow dependencies which address coordination problems associated with product development workflows.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122409015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Architecture for an Adaptive and Collaborative Learning Management System in Aviation Security 航空安全中自适应协同学习管理系统的体系结构
Yi Guo, A. Schwaninger, H. Gall
{"title":"An Architecture for an Adaptive and Collaborative Learning Management System in Aviation Security","authors":"Yi Guo, A. Schwaninger, H. Gall","doi":"10.1109/WETICE.2008.26","DOIUrl":"https://doi.org/10.1109/WETICE.2008.26","url":null,"abstract":"The importance of aviation security has increased dramatically in recent years. Frequently changing regulations and the need to adapt quickly to new and emerging threats are challenges that need to be addressed by airports, security companies and appropriate authorities across the world. Learning management systems (LMS) have been developed as effective tools for enhancing the management, integration and application of knowledge in organizations. In the aviation security domain, we need mechanisms to quickly adapt to new learning content, to different roles ranging from screeners to supervisors, to flexible training scenarios and solid job assessments. For that, a learning system has to be flexible and adaptive both in knowledge, organizational and in collaboration dimensions. Current LMS do not meet these requirements. In this paper we present a software architecture that is apt to support the adaptability and collaboration needs for such a system in aviation security. We discuss the requirements, roles, learning objects and course configuration in terms of adaptive and collaborative learning. We present a six-layer architecture and discuss some of its application scenarios. Our aim is to improve the quality and usefulness of LMS in aviation security by utilizing knowledge-based analysis for data analysis and integrating a process engine for collaborative learning. We briefly report on our prototype and the gained first feedback from the users.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129040352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Adaptive Process Management. Issues and (Some) Solutions 自适应流程管理。问题和(一些)解决方案
Massimo Mecella
{"title":"Adaptive Process Management. Issues and (Some) Solutions","authors":"Massimo Mecella","doi":"10.1109/WETICE.2008.50","DOIUrl":"https://doi.org/10.1109/WETICE.2008.50","url":null,"abstract":"The paper describes the principal issues presented in an invited talk given at the ProGility 2008 Workshop in the context of WETICE 2008. We discuss adaptive process management, by providing an introduction and a possible classification scheme, we review relevant research approaches and finally we present our approach, based on Situation Calculus.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114401357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
On NAT Traversal in Peer-to-Peer Applications 关于点对点应用中的NAT穿越
Konstantin Pussep, M. Weinert, A. Kovacevic, R. Steinmetz
{"title":"On NAT Traversal in Peer-to-Peer Applications","authors":"Konstantin Pussep, M. Weinert, A. Kovacevic, R. Steinmetz","doi":"10.1109/WETICE.2008.10","DOIUrl":"https://doi.org/10.1109/WETICE.2008.10","url":null,"abstract":"A widely used technique to overcome the shortage of unique public IP addresses is network address translation (NAT), which hides several hosts behind a single public address. This method works smoothly with client-server architectures; however, it causes severe problems with the peer-to-peer (p2p) communication paradigm. Due to the side effects of NAT, the establishing connection is made possible only by using special NAT traversal techniques. This paper presents a lightweight framework for NAT traversal, which smoothly integrates with p2p applications. The framework can be easily used by most p2p applications, is extensible and does not require additional maintenance overhead.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"35 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131833004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
COPS 2008 Workshop Final Report cop 2008研讨会最后报告
P. López
{"title":"COPS 2008 Workshop Final Report","authors":"P. López","doi":"10.1109/WETICE.2008.64","DOIUrl":"https://doi.org/10.1109/WETICE.2008.64","url":null,"abstract":"An apparatus and a method for remotely indicating that a fax has been received. Received faxes are detected using an infrared emitter that sprays infrared energy into space that is open when no paper is present in the paper tray that receives incoming faxes at a fax machine, but which space is occupied by paper when a fax has been received. When there is no paper present in the paper tray, the infrared energy is lost in space. When there is paper present in the paper tray, the infrared energy is reflected back to and sensed by a photo transistor. When the photo transistor senses the presence of paper in the paper tray, a high-brightness light emitting diode is flashed to indicate that a fax has been received.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124605445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of Data Aggregation on the Significance of Process Mining Results: An Experimental Evaluation 数据聚合对过程挖掘结果显著性的影响:一个实验评价
Kerstin Gerke
{"title":"Impact of Data Aggregation on the Significance of Process Mining Results: An Experimental Evaluation","authors":"Kerstin Gerke","doi":"10.1109/WETICE.2008.25","DOIUrl":"https://doi.org/10.1109/WETICE.2008.25","url":null,"abstract":"Today, many enterprises seek for efficient business process coordination and control to raise business process quality. Process mining technologies promise significant potentials in making business process knowledge explicit. However, it appears to be important to distinguish homogeneous process structures within a business process model to manage them accordingly. In this paper we present an experimental result of the classification of business processes according to their complexity. Furthermore, we evaluate if the homogeneity of the business processes correspond to the business process models derived with process mining.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133746323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mobile Ad Hoc Networks for Collaborative and Mission-Critical Mobile Scenarios: A Practical Study 用于协作和关键任务移动场景的移动自组织网络:一项实用研究
G. Bertelli, M. Leoni, Massimo Mecella, J. Dean
{"title":"Mobile Ad Hoc Networks for Collaborative and Mission-Critical Mobile Scenarios: A Practical Study","authors":"G. Bertelli, M. Leoni, Massimo Mecella, J. Dean","doi":"10.1109/WETICE.2008.37","DOIUrl":"https://doi.org/10.1109/WETICE.2008.37","url":null,"abstract":"Nowadays mobile ad hoc networks (MANETs) are proposed in many collaborative and mobile scenarios. Despite the effort of the research community on algorithms and implementations mainly targeted to laptops, very few implementations exist for commercial PDAs (i.e., equipped with Windows Mobile). In this work, a practical study on one of the few available and running implementations has been conducted, with the aim of providing a toolkit for researchers, engineers and practitioners willing to use MANETs in their scenarios/systems/applications.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130091301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Secure P2P Programming on Top of Tuple Spaces 基于元组空间的安全P2P编程
Fabrizio Benigni, Antonio Brogi, Jean-Louis Buchholz, Jean-Marie Jacquet, J. Lange, R. Popescu
{"title":"Secure P2P Programming on Top of Tuple Spaces","authors":"Fabrizio Benigni, Antonio Brogi, Jean-Louis Buchholz, Jean-Marie Jacquet, J. Lange, R. Popescu","doi":"10.1109/WETICE.2008.29","DOIUrl":"https://doi.org/10.1109/WETICE.2008.29","url":null,"abstract":"A new programming model for secure (embedded) peer-to-peer systems has been recently proposed in the context of the European project SMEPP. In this paper we present the design and implementation of such a model on top of tuple spaces. More precisely, we show how the SMEPP service-oriented interaction primitives can be effectively implemented using SecureLime.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124914607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Wolf – An Eclipse Plug-In for WADE Wolf——一个用于WADE的Eclipse插件
Giovanni Caire, Marisa Porta, E. Quarantotto, Giovanna Sacchi
{"title":"Wolf – An Eclipse Plug-In for WADE","authors":"Giovanni Caire, Marisa Porta, E. Quarantotto, Giovanna Sacchi","doi":"10.1109/WETICE.2008.57","DOIUrl":"https://doi.org/10.1109/WETICE.2008.57","url":null,"abstract":"This paper describes WOLF, a development environment for WADE-based applications. WADE is a software platform, based on JADE, a popular Open Source framework, for the development of distributed applications based on the agent oriented paradigm and exploiting the workflow metaphor to define system logics. The main advantage of the workflow metaphor is the expressiveness of the workflow itself, since it can be easily understood both by programmers and domain experts. The main feature of WOLF is the support for the graphical definition of workflows. Besides that, it also helps developers in setting up an Eclipse project for developing and managing WADE-based applications. WOLF is an Eclipse Plug-in and, as a consequence, allows WADE developers to exploit the full power of the Eclipse IDE.The paper focuses on the graphical definition of workflows and shows how WADE can take advantage of WOLF in defining the system logics by means of workflows.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126488484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信