13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises最新文献

筛选
英文 中文
Work centered evaluation of collaborative systems - the Collate experience 以工作为中心的协作系统评估- Collate经验
H. Albrechtsen, Hans H. K. Andersen, B. Cleal
{"title":"Work centered evaluation of collaborative systems - the Collate experience","authors":"H. Albrechtsen, Hans H. K. Andersen, B. Cleal","doi":"10.1109/ENABL.2004.83","DOIUrl":"https://doi.org/10.1109/ENABL.2004.83","url":null,"abstract":"The paper presents a qualitative empirical evaluation of a collaboratory for interactive knowledge integration within the domain of film archive research. The empirical evaluation of the Collate collaboratory was conducted in an evaluation workshop where professional users from three national film archives interacted. The evaluation workshop found that the facilities in the prototype did not support the collaborating users' strategies for knowledge integration, and that there was a need for an integrated and uniform representation of the semantics of their common workspace.","PeriodicalId":391459,"journal":{"name":"13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128908331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Agent-based computing for enterprise collaboration - human-agent and agent-agent collaboration 基于agent的企业协作计算——人-agent和agent-agent协作
F. Bergenti, M. Blake, Giacomo Cabri
{"title":"Agent-based computing for enterprise collaboration - human-agent and agent-agent collaboration","authors":"F. Bergenti, M. Blake, Giacomo Cabri","doi":"10.1109/ENABL.2004.6","DOIUrl":"https://doi.org/10.1109/ENABL.2004.6","url":null,"abstract":"The second \"Agent-based Computing for Enterprise Collaboration\" workshop at WETICE was aimed at bringing together researcher in the field of software agent-supported collaboration. This paper briefly discusses the content of the papers as presented by participating authors. Moreover, it provides a summary of the main issues of the concluding panel discussion.","PeriodicalId":391459,"journal":{"name":"13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133544480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
How to sanitize data? 如何清理数据?
M. Bishop, B. Bhumiratana, Rick Crawford, K. Levitt
{"title":"How to sanitize data?","authors":"M. Bishop, B. Bhumiratana, Rick Crawford, K. Levitt","doi":"10.1109/ENABL.2004.36","DOIUrl":"https://doi.org/10.1109/ENABL.2004.36","url":null,"abstract":"Balancing the needs of a data analyst with the privacy needs of a data provider is a key issue when data is sanitized. We treat both the requirements of the analyst and the privacy expectations as policies, and compose the two policies to detect conflicts. The result can be applied to an intermediate data representation to sanitize the relevant pans of the data. We conclude that this method has promise, but more work is needed to determine its effectiveness and limits.","PeriodicalId":391459,"journal":{"name":"13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125154229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
P2P architecture for scientific collaboration 用于科学协作的P2P架构
José Mitre, Leandro Navarro-Moldes
{"title":"P2P architecture for scientific collaboration","authors":"José Mitre, Leandro Navarro-Moldes","doi":"10.1109/ENABL.2004.48","DOIUrl":"https://doi.org/10.1109/ENABL.2004.48","url":null,"abstract":"P2P networks are often associated with file exchange applications among private users. However, their features make them suitable for other uses. In this paper we present a P2P architecture for scientific collaboration networks, which takes advantage of the properties inherent in these social networks - small-world, clustering, community structure, assortative mixing, preferential attachment and small and stable groups - in order to obtain better performance, efficient use of resources and system resilience.","PeriodicalId":391459,"journal":{"name":"13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"15 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114383278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Mobile agent-based software management in grid 网格中基于移动代理的软件管理
G. Jezic, M. Kusek, T. Marenic, I. Ljubi, I. Lovrek, S. Desic, B. Dellas
{"title":"Mobile agent-based software management in grid","authors":"G. Jezic, M. Kusek, T. Marenic, I. Ljubi, I. Lovrek, S. Desic, B. Dellas","doi":"10.1109/ENABL.2004.43","DOIUrl":"https://doi.org/10.1109/ENABL.2004.43","url":null,"abstract":"This paper presents a method called Remote Maintenance Shell (RMS), developed for software management in large distributed environments. It allows software upgrading, testing and maintenance of several versions on a remote target system without suspending its regular operation. The method is based on the remote operations performed by cooperative mobile agents. A case study of software upgrading in the grid system is elaborated.","PeriodicalId":391459,"journal":{"name":"13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115644311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An enhanced approach to support collaborative systems evaluation 支持协作系统评估的增强方法
Josie P. H. Huang
{"title":"An enhanced approach to support collaborative systems evaluation","authors":"Josie P. H. Huang","doi":"10.1109/ENABL.2004.12","DOIUrl":"https://doi.org/10.1109/ENABL.2004.12","url":null,"abstract":"In this paper, a lifecycle-based within stakeholder-oriented approach is introduced. In order to provide a conceptual understanding of the evaluation of collaborative systems to support development of a virtual enterprise, a case study was carried out within DIECoM (distributed integrated environment for configuration management), an EC Framework V project. With the lessons learned from DIECoM, a need for further improvement in the approach is indicated. The lifecycle-based approach is therefore revised and a sequence derived: defining an evaluation plan, user requirements analysis, designing instruments, implementing the evaluation instruments, using feedback from users to modify the instruments and follow up. Moreover, it highlights needs to be addressed by further research.","PeriodicalId":391459,"journal":{"name":"13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"286 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124884437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Alarm reduction and correlation in defence of IP networks IP网络防御中的降噪与关联
Tobias Chyssler, S. Nadjm-Tehrani, S. Burschka, K. Burbeck
{"title":"Alarm reduction and correlation in defence of IP networks","authors":"Tobias Chyssler, S. Nadjm-Tehrani, S. Burschka, K. Burbeck","doi":"10.1109/ENABL.2004.7","DOIUrl":"https://doi.org/10.1109/ENABL.2004.7","url":null,"abstract":"Society's critical infrastructures are increasingly dependent on IP networks. Intrusion detection and tolerance within data networks is therefore imperative for dependability in other domains such as telecommunications and future energy management networks. Today's data networks are protected by human operators who are overwhelmed by the massive information overload through false alarm rates of the protection mechanisms. This paper studies the role of alarm reduction and correlation in supporting the security administrator in an enterprise network. We present an architecture that incorporates intrusion detection systems as sensors, and provides improved alarm data to the human operator or to automated actuators. Alarm reduction and correlation via static and adaptive filtering, normalisation, and aggregation is demonstrated on the output from three sensors (Snort, Samhain and Syslog) used in a telecom test network.","PeriodicalId":391459,"journal":{"name":"13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130809998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
An architecture supporting the development of collaborative applications for mobile users 支持为移动用户开发协作应用程序的体系结构
Vagner José do Sacramento Rodrigues, M. Endler, Hana K. Rubinsztejn, Luciana dos S. Lima, Kléder Miranda Gonçalves, Giulliano A. Bueno
{"title":"An architecture supporting the development of collaborative applications for mobile users","authors":"Vagner José do Sacramento Rodrigues, M. Endler, Hana K. Rubinsztejn, Luciana dos S. Lima, Kléder Miranda Gonçalves, Giulliano A. Bueno","doi":"10.1109/ENABL.2004.10","DOIUrl":"https://doi.org/10.1109/ENABL.2004.10","url":null,"abstract":"This article present a software architecture and services, which comprise a middleware infrastructure for the development and operation of collaborative applications for mobile users. The design of the architecture, named Mobile Collaboration Architecture - MoCA, was driven by the following goals: support scalability in terms of the number of users and services, flexibility and extensibility with respect to the used communication protocols and the application requirements, and facilitate the monitoring, processing and use of context information regarding single users and the collaborative group within the applications.","PeriodicalId":391459,"journal":{"name":"13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129074345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Talk on activities of security and grid computing service project 安全与网格计算服务项目活动报告会
F. Mizoguchi
{"title":"Talk on activities of security and grid computing service project","authors":"F. Mizoguchi","doi":"10.1109/ENABL.2004.63","DOIUrl":"https://doi.org/10.1109/ENABL.2004.63","url":null,"abstract":"Summary form only given. With the rapid expansion of the GRID environment and the maturing of software technology such as multiagent system, systems that provide commercial services are faced with conventional commercial concerns, namely how to build trust between service owners and users. Authentication and authorization must be enforced on the use and provision of services. Based on our experiences, we introduce an authorization-based trust model (ABTM) (W. Wen et al., 2000) for such an environment, and then introduce a graphic-based authentication interface.","PeriodicalId":391459,"journal":{"name":"13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126124739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
WETICE 2004 Ninth Enterprise Security (ES) Workshop Report 2004年第九届企业安全(ES)研讨会报告
D. Gilliam
{"title":"WETICE 2004 Ninth Enterprise Security (ES) Workshop Report","authors":"D. Gilliam","doi":"10.1109/ENABL.2004.82","DOIUrl":"https://doi.org/10.1109/ENABL.2004.82","url":null,"abstract":"The topics covered Role Based Access Control (RBAC), Security Risk Management and Software Security, Data Sanitization, and Network Intrusion Detection and Prevention. Two papers tied for best paper and presentation combination. The papers were: 1. \"An Economic Damage Model for Large-Scale Internet Attacks,\" by Thomas Dübendorfer, Arno Wagner, Bernhard Plattner, ETH Zurich, Switzerland. 2. A Model for Access Negotiations in Dynamic Coalitions,\" by Himanshu Khurana, NCSA, University of Illinois, and Virgil Gligor, University of Maryland.","PeriodicalId":391459,"journal":{"name":"13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134158209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信