Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)最新文献

筛选
英文 中文
A review of groupware evaluations 对群件评价的回顾
David Pinelle, C. Gutwin
{"title":"A review of groupware evaluations","authors":"David Pinelle, C. Gutwin","doi":"10.1109/ENABL.2000.883709","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883709","url":null,"abstract":"A better understanding of how groupware systems have been evaluated in the past can help to frame the discussion of what methods and techniques should be considered for future evaluations. We reviewed all papers from the ACM CSCW conference (1990-1998) that introduced or evaluated a groupware system. Forty-five papers were included in the review. The main findings are that almost one-third of the groupware systems were not evaluated in any formal way, that only about one-quarter of the articles included evaluations in a real-world setting, and that a wide variety of evaluation techniques are in use. Our main conclusions from the review are that more attention must be paid to evaluating groupware systems and that there is room for additional evaluation techniques that are simple and low in cost.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122456765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 122
Walking the Web of trust 行走在信任的网络上
G. Caronni
{"title":"Walking the Web of trust","authors":"G. Caronni","doi":"10.1109/ENABL.2000.883720","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883720","url":null,"abstract":"Most currently deployed public key infrastructures (PKIs) are hierarchically oriented and rely on a centralized design. Hierarchical PKIs may be appropriate solutions for many usage-scenarios, but there exists the viable alternative of the 'Web of Trust'. In a web of trust, each user of the system can choose for himself whom he elects to trust, and whom not. After contrasting the properties of web-of-trust based PKIs to those of hierarchical PKIs, an introduction to webs of trust and to quantitative trust calculations is given. The paper concludes with the presentation of an efficient, sub-exponential algorithm that allows heuristic computations of trust paths in a web of trust.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126774706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 148
Should users inhabit visualisations? 用户应该使用可视化吗?
C. Knight, M. Munro
{"title":"Should users inhabit visualisations?","authors":"C. Knight, M. Munro","doi":"10.1109/ENABL.2000.883703","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883703","url":null,"abstract":"The use of three-dimensions for visualisation is a lot newer than the technology required to achieve such visual representations. A further extension of this work is to add multiple users to one visualisation environment to create visualisations that go beyond individual intelligence amplification and become knowledge repositories, shared workspaces and integral parts of the management of the data which they represent. The issues surrounding such uses of visualisations are presented in this paper, with an extension of a three-dimensional visualisation to encompass these ideas.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129283412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
UML-based representation of role-based access control 基于uml的基于角色的访问控制表示
M. Shin, Gail-Joon Ahn
{"title":"UML-based representation of role-based access control","authors":"M. Shin, Gail-Joon Ahn","doi":"10.1109/ENABL.2000.883728","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883728","url":null,"abstract":"In role-based access control (RBAC) permissions are associated with roles, and users are made members of appropriate roles thereby acquiring the roles' permissions. The principal motivation behind RBAC is to simplify administration. Several framework for the development of role-based systems have been introduced. However, there are a few works specifying RBAC in a way which system developers or software engineers can easily understand and refer to develop role-based systems. The Unified Modeling Language (UML) is a general-purpose visual modeling language in which we can specify, visualize, and document the components of a software system. In this paper we represent the RBAC model with this well-known modeling language to reduce a gap between security models and system developments. We specify the RBAC model with three views: static view, functional view, and dynamic view. In addition, we briefly discuss about the future directions.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127993756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 87
Towards an evaluation methodology for the development of research-oriented virtual communities 面向研究型虚拟社区发展的评价方法研究
Janet Ho, M. Schraefel, M. Chignell
{"title":"Towards an evaluation methodology for the development of research-oriented virtual communities","authors":"Janet Ho, M. Schraefel, M. Chignell","doi":"10.1109/ENABL.2000.883714","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883714","url":null,"abstract":"This paper is part of a case study of collaborative environment use and part of a proposition for methodological approach for evaluating virtual environments based on the findings from that case study. We review the literature on evaluating collaborative environments and we also report on a usability study carried out on a research oriented virtual community. The report includes a cluster analysis of the questionnaire results and the use of those results in profiling user attitudes. We propose that this type of differential cluster analysis should be used in the future to identify people who are generally better able to make discriminating judgements, and also to identify people who are able to analyse the usability of different components of an environment rather than just the overall environment.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129951234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
A coordination infrastructure for agent-based Internet applications 基于代理的Internet应用程序的协调基础结构
E. Denti, Andrea Omicini
{"title":"A coordination infrastructure for agent-based Internet applications","authors":"E. Denti, Andrea Omicini","doi":"10.1109/ENABL.2000.883735","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883735","url":null,"abstract":"Internet applications are often structured as collections of interactive, heterogeneous agents, which have to coordinate to pursue the application goals. These applications require design methodologies that are far from being well established and new standard technologies models, languages, technologies and tools specifically tailored to the agent metaphor and to agent-based systems. This article presents LuCe, a coordination infrastructure for the design and the development of agent-based distributed applications on the Internet, which integrates Java logic-based languages, and tuple-based coordination models. We discuss the impact of this approach on the design both of the single agents and of Internet applications, then suggest how it could be exploited in the design/development/test cycle.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128146530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An evaluation and comparison of the industrial and educational usage of CSCW within the design process 在设计过程中对CSCW的工业和教育用途进行评估和比较
A. Thomson, S. MacGregor, W. Ion
{"title":"An evaluation and comparison of the industrial and educational usage of CSCW within the design process","authors":"A. Thomson, S. MacGregor, W. Ion","doi":"10.1109/ENABL.2000.883713","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883713","url":null,"abstract":"This paper presents the findings of three recent research projects carried out at the University of Strathclyde. Two of the projects, ICON (Institutional Collaboration Over Networks) and ICON2 investigated the usage of CSCW tools by disparate engineering design students whilst, a Design Council funded research project investigated the introduction and usage of shared workspace technology within the design process of three companies and their supply chain. This is followed by a comparative reflection of the results allowing identification of generic findings together with opportunities for cross-sectoral lessons.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129796200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Tapping alert protocol 监听警报协议
G. Ahn, Kwangjo Kim, Hee Yong Youn
{"title":"Tapping alert protocol","authors":"G. Ahn, Kwangjo Kim, Hee Yong Youn","doi":"10.1109/ENABL.2000.883721","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883721","url":null,"abstract":"This paper proposes a new protocol called tapping alert protocol (TAP), which detects if any computer is eavesdropping on the network. When tapping is detected, it alerts the network users on the danger of tapping. In designing the protocol, a model for an attacker is developed who sniffs the network and breaks down the proposed protocol, and the requirements on the protocol in terms of efficiency and security are defined. We also describe how to detect if a network interface card on a remote computer is in the sniffing mode. The proposed protocol employs cryptographic schemes to guarantee authentication of the code monitoring tapping operation and integrity of the data being sent. Finally, the proposed protocol can protect authorized users from illegal eavesdropping on the network.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114386221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The mechanics of collaboration: developing low cost usability evaluation methods for shared workspaces 协作机制:为共享工作空间开发低成本的可用性评估方法
C. Gutwin, S. Greenberg
{"title":"The mechanics of collaboration: developing low cost usability evaluation methods for shared workspaces","authors":"C. Gutwin, S. Greenberg","doi":"10.1109/ENABL.2000.883711","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883711","url":null,"abstract":"We introduce a conceptual framework that articulates the mechanics of collaboration for shared-workspace groupware: the low level actions and interactions that must be carried out to complete a task in a shared manner. These include communication, coordination, planning, monitoring, assistance, and protection. The framework also includes three general measures of these mechanics: effectiveness, efficiency, and satisfaction. The underlying idea of the framework is that some usability problems in groupware systems are not inherently tied to the social context in which the system is used but rather are a result of poor support for the basic activities of collaborative work in shared spaces. We believe that existing low-cost evaluation methods-heuristic evaluation, walkthroughs, user observations and questionnaires-can be modified to include this framework in a way that helps a groupware evaluator uncover these usability problems.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132587055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 259
CVE technology development based an real world application and user needs CVE技术的开发基于现实世界的应用和用户需求
E. Daphne, M. William, P.R. Steve, W.J. Adrian
{"title":"CVE technology development based an real world application and user needs","authors":"E. Daphne, M. William, P.R. Steve, W.J. Adrian","doi":"10.1109/ENABL.2000.883698","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883698","url":null,"abstract":"Argues that the development of collaborative virtual environment (CVE) technology must be guided by application and end-user needs. A collaboration is described between human factors and technological researchers based on observations of prototypes in use in a real-world educational situation. The aim of the research is to develop a framework of design factors for the use of virtual actors in CVEs and to inform the development of the underlying CVE technology. The methodological approach followed involves the development of prototype virtual learning environments in a series of distinct phases of increasing sophistication. The environments are based on an ancient Egyptian game (Senet) and are aimed at children at Key Stage Level 2 of the National Curriculum for education in England. The paper shows how established 2D multimedia technologies were used to develop robust prototypes which were then observed in use by children. Results from these phases have been used to guide the current phase of work. This involves the construction of a 3D shared virtual environment using the experimental Deva virtual reality system.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115730519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信