By Topic

Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE), 2010 19th IEEE International Workshop on

Date 28-30 June 2010

Filter Results

Displaying Results 1 - 25 of 64
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (463 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (15 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (59 KB) | HTML iconHTML
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (145 KB)
    Freely Available from IEEE
  • General Chair's Report

    Publication Year: 2010, Page(s):x - xi
    Request permission for commercial reuse | PDF file iconPDF (81 KB) | HTML iconHTML
    Freely Available from IEEE
  • From the Desk of the Conference Organizer

    Publication Year: 2010, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (77 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committees

    Publication Year: 2010, Page(s):xiii - xiv
    Request permission for commercial reuse | PDF file iconPDF (67 KB)
    Freely Available from IEEE
  • Workshop Committees and Reviewers

    Publication Year: 2010, Page(s):xv - xxii
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • Towards the Next Generation of Ambient Intelligent Environments

    Publication Year: 2010, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB) | HTML iconHTML

    Next Generation Ambient Intelligent Environments (NGAIEs) will offer intelligent and trustworthy services (although probably not for free), will be populated with Ambient Ecologies of smart objects, and will support the Activity Spheres of their multiple occupants. Ubiquitous computing applications will be composed from heterogeneous services offered by objects connected via the web and NGAIEs. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Data Wave: Data Management and Mining

    Publication Year: 2010, Page(s):7 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (266 KB) | HTML iconHTML

    Nowadays, massive amounts of data that are often geographically distributed and owned by different organisations are being mined. As consequence, a large mount of knowledge is being produced. This causes the problem of efficient knowledge management and mining. The main aim is to develop DM infrastructures to fully exploit the benefit of the knowledge contained in these very large data repositorie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Importance of Corporate Forensic Readiness in the Information Security Framework

    Publication Year: 2010, Page(s):12 - 16
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (692 KB) | HTML iconHTML

    Corporate forensics is rapidly becoming an essential component of modern business. Having no a priori knowledge on whether a security related event or corporate policy violation will lead to litigation, it is argued in this paper that digital forensics principles need to be applied to all corporate investigatory, monitoring and auditing activities. Corporate forensics are also necessary in modern ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Alpha-Flow Use-Case of Breast Cancer Treatment - Modeling Inter-institutional Healthcare Workflows by Active Documents

    Publication Year: 2010, Page(s):17 - 22
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (497 KB) | HTML iconHTML

    In healthcare, inter-institutional process support implicates decentralized and ad-hoc workflows. From the perspective of system integration, the autonomy of the sites which are participating in a healthcare network is mostly untouchable. Traditional activity-oriented workflow models or content-oriented workflow models do not provide adequate support in such system environments and workflow scenar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agent Architecture and Infrastructure for Dynamic Collaborative Learning (AICOL)

    Publication Year: 2010, Page(s):23 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB) | HTML iconHTML

    This paper presents an agent-based system to facilitate online learning activities. The system comprises of learning support agents that collaborate and negotiate with providers of various courses based on learner preferences, applying suitable agent negotiation strategies, adapting learning plans and formalizing e-contracts based on the changing needs of the learner. The agent-based system addres... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis and Categorization of Enterprises for Agent-Based Automation

    Publication Year: 2010, Page(s):29 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (706 KB) | HTML iconHTML

    Enterprise as a sociotechnical system consisting of interacting human and man-made agents is analysed using agent-oriented models. Two fundamental types of enterprises are distinguished based on their sales and planning processes. The categorization and analysis can be used for automation by software agents or robots. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Agent-Based 'Smart' Collaboration in Enterprise Networks

    Publication Year: 2010, Page(s):35 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (434 KB) | HTML iconHTML

    International competition and dynamically changing customer demands lead SME's to join dynamically formed, `smart' enterprise networks aiming to increase their competitiveness and market share. Supporting such networks with decision making related to collaborations and providing adaptive user interfaces are key challenges. In this paper, we use furniture manufacturing SME's as a case study and we ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Agent Based Approach for Balancing Commuter Traffic

    Publication Year: 2010, Page(s):41 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (203 KB) | HTML iconHTML

    Transport congestion within cities represents an omnipresent yet increasingly serious problem. Traditionally the main method of control available to combat it has been the efficient control of traffic lights. The recent rise of intelligent mobile devices carried by road users offers an additional point of control, potentially enabling the manipulation of the routes that people take within the city... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WETICE 2010 2nd Workshop on Collaboration and Cloud Computing (CCC) Theme: Computing Clouds with Telecom Grade "Trust" and Global Interoperability

    Publication Year: 2010, Page(s):44 - 47
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (221 KB) | HTML iconHTML

    The combination of hardware assisted virtualization and the broadband Internet have taken the Information Technology (IT) hosted managed services to a next level of evolution, where the software applications have become independent of the hardware infrastructure and can be migrated at will. This introduces two key issues that need to be addressed to fully leverage the potential that the new server... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Next Generation Cloud Computing Architecture: Enabling Real-Time Dynamism for Shared Distributed Physical Infrastructure

    Publication Year: 2010, Page(s):48 - 53
    Cited by:  Papers (16)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (580 KB) | HTML iconHTML

    Cloud computing is fundamentally altering the expectations for how and when computing, storage and networking resources should be allocated, managed and consumed. End-users are increasingly sensitive to the latency of services they consume. Service Developers want the Service Providers to ensure or provide the capability to dynamically allocate and manage resources in response to changing demand p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enterprise Usability of Cloud Computing Environments: Issues and Challenges

    Publication Year: 2010, Page(s):54 - 59
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (267 KB) | HTML iconHTML

    Cloud Computing Environments enable business agility and enterprises to exploit/respond quickly to changes in the marketplace, competition, technology and operational environment. For enterprises, CCE present a number of issues and challenges. Some of these include the inability to take advantage of the dynamic resource elasticity of CCE, issues of data fragmentation and duplication, the challenge... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application Development: Fly to the Clouds or Stay In-house?

    Publication Year: 2010, Page(s):60 - 65
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (262 KB) | HTML iconHTML

    Cloud computing is a recent trend in IT that moves computing and data away from desktop and portable PCs into large data centers, and outsources the “applications” (hardware and software) as services over the Internet. Cloud computing promises to increase the velocity with which applications are deployed, increase innovation, and lower costs, all while increasing business agility. Bu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CloudGauge: A Dynamic Cloud and Virtualization Benchmarking Suite

    Publication Year: 2010, Page(s):66 - 75
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (702 KB) | HTML iconHTML

    Cloud Computing and virtualization technology are taking the momentum nowadays in data centres, research institutions and IT infrastructure models. Having a reference and performance benchmarks for the dynamic workloads in virtualized and cloud environments is a vital thing to develop. Virtualized workload benchmark will help data center's architects and administrators to design an elegant data ce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Virtualization to Prepare Your Data Center for "Real-Time Assurance of Business Continuity"

    Publication Year: 2010, Page(s):76 - 81
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (628 KB) | HTML iconHTML

    This paper describes our experience using the dynamic resource reallocation capabilities offered by virtualization technologies, in implementing: 1. Automation of end-to-end failover of mission critical virtualized application, a SAN network and EMC Clarion based storage to a remote site and 2. On-demand and scheduled assurance of failover and measurement of RPO and RTO (The Recovery Point Objecti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Creating Next Generation Cloud Computing Operation Support Services by Social OSS: Contribution with Telecom NGN Experience

    Publication Year: 2010, Page(s):82 - 87
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (935 KB) | HTML iconHTML

    Currently, Cloud network operators and service providers are managing server, network and storage resources by various management systems to manage hardware, applications, traffic, and resources monitoring including bandwidth, storage capacity, and throughput utilization. However, these systems are not coordinated with accounting, security and configuration systems to provide end-to-end service ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Framework of Scientific Workflow Management Systems for Multi-tenant Cloud Orchestration Environment

    Publication Year: 2010, Page(s):88 - 93
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (864 KB) | HTML iconHTML

    The volumetric growth of data complexity is increasing day by day. The computational world is becoming massive and needs scalable and efficient systems. Data management is an important stage to accelerate the petabytes processing. Such environment requires scientific work flows to compose and manage those volumetric data sets. Scientific Workflow is different than general workflow. It deals with s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.