Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253)最新文献

筛选
英文 中文
A scalable location tracking and message delivery scheme for mobile agents 一个可扩展的移动代理位置跟踪和消息传递方案
Sashi Lazar, I. Weerakoon, D. Sidhu
{"title":"A scalable location tracking and message delivery scheme for mobile agents","authors":"Sashi Lazar, I. Weerakoon, D. Sidhu","doi":"10.1109/ENABL.1998.725700","DOIUrl":"https://doi.org/10.1109/ENABL.1998.725700","url":null,"abstract":"We present a novel scheme to implement reliable message delivery, agent migration, and agent location tracking for mobile agent based systems. This scheme requires that the agents and messages are transmitted through an imposed logical tree-shaped hierarchy of runtime servers. We present the procedures for building and maintaining the domain gateway hierarchy. Using this scheme, the cost of locating an agent is asymptotically bound by O(lg n) on the number of hops, while the agent registration is achieved at no additional cost.","PeriodicalId":321059,"journal":{"name":"Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133679920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Enabling synchronous joint-working in Java 在Java中启用同步联合工作
V. Minenko
{"title":"Enabling synchronous joint-working in Java","authors":"V. Minenko","doi":"10.1109/ENABL.1998.725693","DOIUrl":"https://doi.org/10.1109/ENABL.1998.725693","url":null,"abstract":"This paper gives an outlook on technologies for joint-working with Java-based programs-applets and applications. Various approaches and APIs applied to the Java environment are discussed and compared. A new architecture for scalable Java application sharing is presented. Several suggestions on possible future features of JDK facing synchronous joint-working are presented.","PeriodicalId":321059,"journal":{"name":"Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134206361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
More than shared artifacts: collaboration via shared presence in MUDs 不仅仅是共享工件:在mud中通过共享存在进行协作
C. Landauer, V. E. Polichar
{"title":"More than shared artifacts: collaboration via shared presence in MUDs","authors":"C. Landauer, V. E. Polichar","doi":"10.1109/ENABL.1998.725691","DOIUrl":"https://doi.org/10.1109/ENABL.1998.725691","url":null,"abstract":"The paper argues that MUDs (multi-user domains) and the Web have complementary strengths, and that limiting our support of collaboration to either one by itself is simply wrong. The Web is about sharing artifacts, passing them around, and sometimes working together on them simultaneously. The MUDs are about shared presence, with people interacting with each other and their tools, in a common environment. We focus on MUDs, because their capabilities and potentials are not very well known.","PeriodicalId":321059,"journal":{"name":"Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117134964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Coordinating management activities in distributed software development projects 协调分布式软件开发项目的管理活动
Fawsy Bendeck, S. Goldmann, Harald Holz, Boris Kötting
{"title":"Coordinating management activities in distributed software development projects","authors":"Fawsy Bendeck, S. Goldmann, Harald Holz, Boris Kötting","doi":"10.1109/ENABL.1998.725665","DOIUrl":"https://doi.org/10.1109/ENABL.1998.725665","url":null,"abstract":"Coordinating distributed processes, especially engineering and software design processes, has been a research topic for some time now. Several approaches have been published that aim at coordinating large projects in general, and large software development processes specifically. However most of these approaches focus on the technical part of the design process and omit management activities like planning and scheduling the project, or monitoring it during execution. We focus on coordinating the management activities that accompany the technical software design process. We state the requirements for a Software Engineering Environment (SEE), accommodating management, and we describe a possible architecture for such an SEE.","PeriodicalId":321059,"journal":{"name":"Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130576300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Efficient security for large and dynamic multicast groups 大型动态组播组的有效安全性
G. Caronni, M. Waldvogel, Dan Sun, B. Plattner
{"title":"Efficient security for large and dynamic multicast groups","authors":"G. Caronni, M. Waldvogel, Dan Sun, B. Plattner","doi":"10.1109/ENABL.1998.725721","DOIUrl":"https://doi.org/10.1109/ENABL.1998.725721","url":null,"abstract":"Proposals for multicast security that have been published so far are complex, often require trust in network components or are inefficient. We propose a series of novel approaches for achieving scalable security in IP multicast, providing privacy and authentication on a group-wide basis. They can be employed to efficiently secure multi party applications where members of highly dynamic groups of arbitrary size may participate. Supporting dynamic groups implies that newly joining members must not be able to understand past group communications, and that leaving members may not follow future communications. Key changes are required for all group members when a leave or join occurs, which poses a problem if groups are large. The algorithms presented here require no trust in third parties, support either centralized or fully distributed management of keying material, and have low complexity (O(log N) or less). This grants scalability even for large groups.","PeriodicalId":321059,"journal":{"name":"Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125411986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 109
How to coordinate Internet applications based on mobile agents 如何协调基于移动代理的互联网应用
Giacomo Cabri, L. Leonardi, F. Zambonelli
{"title":"How to coordinate Internet applications based on mobile agents","authors":"Giacomo Cabri, L. Leonardi, F. Zambonelli","doi":"10.1109/ENABL.1998.725679","DOIUrl":"https://doi.org/10.1109/ENABL.1998.725679","url":null,"abstract":"The paper surveys the possible coordination models for mobile agent applications and evaluates them in the context of a widely distributed application in the area of WWW information retrieval. The analysis outlines the advantages and the drawbacks of each coordination model and shows how reactivity of the coordination media can provide the degree of flexibility and adaptability required by mobile agent applications.","PeriodicalId":321059,"journal":{"name":"Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115254909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Security and confidentiality in healthcare informatics 医疗保健信息学中的安全性和保密性
Y. Al-Salqan
{"title":"Security and confidentiality in healthcare informatics","authors":"Y. Al-Salqan","doi":"10.1109/ENABL.1998.725720","DOIUrl":"https://doi.org/10.1109/ENABL.1998.725720","url":null,"abstract":"In order to provide secure healthcare informatics systems, three different security levels need to be considered: 1) secure healthcare applications to provide user authentication and access control mechanism to healthcare applications, components, and objects.; 2) secure database to provide the protection of the database against unauthorized disclosure, alteration, or distinction of healthcare information by legal personnel; and 3) secure communication infrastructure which provides the protection of healthcare informatics systems from unauthorized attempts to access information or interfere with its operation. The author emphasises the database and communication security. Several issues are learned from experience in the Advanced Research TEstbed on Medical Information System (ARTEMIS) project.","PeriodicalId":321059,"journal":{"name":"Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124589797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信