By Topic

Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)

14-16 June 2000

Filter Results

Displaying Results 1 - 25 of 50
  • IEEE 9th international workshops on enabling technologies: infrastructure for collaborative enterprises (WET ICE 2000) [front matter]

    Publication Year: 2000, Page(s):iii - viii
    Request permission for commercial reuse | PDF file iconPDF (229 KB)
    Freely Available from IEEE
  • Towards an evaluation methodology for the development of research-oriented virtual communities

    Publication Year: 2000, Page(s):112 - 117
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB)

    This paper is part of a case study of collaborative environment use and part of a proposition for methodological approach for evaluating virtual environments based on the findings from that case study. We review the literature on evaluating collaborative environments and we also report on a usability study carried out on a research oriented virtual community. The report includes a cluster analysis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proceedings of the First International Conference on Web Information Systems Engineering

    Publication Year: 2000
    Request permission for commercial reuse | PDF file iconPDF (580 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2000, Page(s):291 - 292
    Request permission for commercial reuse | PDF file iconPDF (80 KB)
    Freely Available from IEEE
  • Commitment-based enhancement of e-commerce protocols

    Publication Year: 2000, Page(s):278 - 283
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB)

    Protocols represent the allowed interactions among communicating components. Protocols are essential in electronic commerce to constrain the behaviors of autonomous entities. Traditional representations of protocols include actions, but not their content, which limits their applicability in settings where autonomous entities must flexibly interact to handle exceptions and exploit opportunities. We... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Techniques for evaluating collaboration toolkits

    Publication Year: 2000, Page(s):92 - 97
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB)

    The most reliable approach to evaluating a collaboration toolkit is to carry out field studies. This approach has the problem that it requires each project to be interdisciplinary and create a complete, working system, which seems too costly given the budget for a typical research project and the complexity of a collaboration toolkit; and more important, does not allow a project to converge increm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A method to design process architecture in a distributed product realization environment

    Publication Year: 2000, Page(s):124 - 129
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB)

    Globalization, collaboration and competition are forcing product realization processes to become faster and more distributed. The requirements for higher efficiency, lower cost, and better product quality lead to challenges in the design of a product realization process in which concurrency and distribution are important. A distributed process structuring method (DPSM) is presented to help enginee... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Workspace awareness in mobile virtual teams

    Publication Year: 2000, Page(s):272 - 277
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (668 KB)

    Staying aware of each other in cooperative teamwork is something we take for granted in the everyday world, even if collaboration is not continuously face-to-face, and team members frequently shift from group to individual activity during work sessions. Maintaining this intuitive fidelity of awareness, e.g. of team members working in the office next door, is, on the other hand, something that has ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A review of groupware evaluations

    Publication Year: 2000, Page(s):86 - 91
    Cited by:  Papers (30)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (428 KB)

    A better understanding of how groupware systems have been evaluated in the past can help to frame the discussion of what methods and techniques should be considered for future evaluations. We reviewed all papers from the ACM CSCW conference (1990-1998) that introduced or evaluated a groupware system. Forty-five papers were included in the review. The main findings are that almost one-third of the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • EWS-a case study on access control in workflow systems

    Publication Year: 2000, Page(s):213 - 218
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB)

    EWS is a workflow engine under development with specific requirements for the access control. We study a subset of these requirements, concerning work assignment, lockups and delegation issues. Three other systems-Changengine, FloWare and the Two-Schema Architecture-have been studied with respect to these problems, and we use the insights gained from these studies to give our own solutions to the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing and evaluating collaborative engineering studios

    Publication Year: 2000, Page(s):118 - 123
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB)

    We discuss a vision of a work in progress on a collaborative engineering environment, the Collaborative Design Studio, being developed at the Geometric and Intelligent Computing Laboratory at Drexel University. This works seeks to integrate Computer-Aided Design (CAD) and communication tools through automatic extraction and embedding of design contest into communications, as well as provide archiv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Server-assisted generation of a strong secret from a password

    Publication Year: 2000, Page(s):176 - 180
    Cited by:  Papers (32)  |  Patents (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB)

    A roaming user, who accesses a network front different client terminals, can be supported by a credentials server that authenticates the user by password then assists in launching a secure environment for the user. However, traditional credentials server designs are vulnerable to exhaustive password guessing attack at the server. We describe a credentials server model and supporting protocol that ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Web infrastructure for people and agent interaction and collaboration

    Publication Year: 2000, Page(s):266 - 271
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB)

    Internet pervasive services call for flexible supports to enable a wide degree of collaboration. On the one hand, many people are connected to the Internet and surf the Web not only to retrieve information, but also to carry out several kinds of different tasks via online services. On the other hand, the Internet is likely soon to be populated by software agents that will act on behalf of users, a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Workshop on evaluating collaborative enterprises - workshop report

    Publication Year: 2000, Page(s):79 - 85
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IPsec-WIT: the NIST IPsec Web-based interoperability test system

    Publication Year: 2000, Page(s):147 - 152
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB)

    NIST is an active participant in the Internet Engineering Task Force (IETF) efforts to develop Internet Protocol Security (IPsec) technology. Our ultimate goal is to expedite the rapid commercialization and ubiquitous deployment of IPsec protocols. As initial IETF IPsec specifications began to emerge, it became apparent that the availability of interoperability testing would be the critical barrie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Report on major themes and issues arising from the workshop

    Publication Year: 2000, Page(s):225 - 229
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the implementation of a stand-alone JavaTM bytecode verifier

    Publication Year: 2000, Page(s):189 - 194
    Cited by:  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    A member of our research team has already produced a well-organized clear, technical and complete specification of the Java bytecode verifier. We are now using this specification to implement a stand-alone version of the verifier that totally complies with Sun's specification. We are also integrating static checks that are currently absent from their implementation. In this paper we share our expe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure multicast software delivery

    Publication Year: 2000, Page(s):207 - 212
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB)

    Nowadays, purchased software is delivered via sending CD-ROMs or downloading from the Internet. These solutions are either time-consuming or not scalable when the number of end-users becomes large. In this paper, we explore the use of multicast technology as an option for software delivery. We present a global structure for multicast software delivery and look into security issues, mainly focusing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building virtual worlds for informal science learning (SciCentr and SciFair) in the Active Worlds Educational Universe (AWEDU)

    Publication Year: 2000, Page(s):21 - 26
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB)

    As a focus of its exploration of desktop 3D environments for science outreach, the Cornell Theory Center (CTC), Cornell University's high-performance computing center, has been exploring the use of the Active Worlds client/server technology for implementation of a 3D multi-user virtual science museum, SciCentr, that incorporates interactive simulation-based exhibits. We present early lessons in ac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Initialization vector attacks on the IPsec protocol suite

    Publication Year: 2000, Page(s):171 - 175
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    In this paper, we analyze the security of IPsec against a class of attacks known as the IV attacks, which are based on modifying the initialization vector (IV) of a CBC-encrypted packet during transmission. We show that IV attacks can be a serious threat for IPsec if IPsec is not used carefully. We also discuss the defense methods against these attacks View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed collaborative design and manufacturability assessment for extended enterprise in XML-based agent system

    Publication Year: 2000, Page(s):260 - 265
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB)

    Reports on a pilot application of a decision-making environment for part manufacturability assessment in extended enterprises using collaborative design and manufacturing agents. The system is implemented as an XML/CORBA-based environment for conveying design and manufacturing messages across traditional technology boundaries. The approach is based on the exchange of manufacturability requests and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Position paper on integrated broadband environment for personalized TV experience (IBEX)

    Publication Year: 2000, Page(s):75 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB)

    As a next step towards the integration of TV and the Web environment, we started a new project on integrated broadband environment for personalized TV experience (IBEX). This is a position paper on IBEX describing an architectural overview of future multimedia environment. The IBEX project also intends to provide a service model for the TV-Anytime framework. The concept of the IBEX features three ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Summary report on enterprise security workshop

    Publication Year: 2000, Page(s):139 - 146
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards secure e-services

    Publication Year: 2000, Page(s):221 - 222
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (164 KB)

    The networked home with refrigerators and washing machines connected to the Internet and reachable through Web browsers will be reality soon. Following this development, the market for electronically deliverable services will evolve. Companies that want to provide electronic services cannot be expected to deal with cable, network and routing problems-they need to rely and build on a common, secure... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Collaborating in 3D virtual environments: a synchronous architecture

    Publication Year: 2000, Page(s):35 - 42
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (684 KB)

    To collaborate in a 3D environment, update messages corresponding to the change in the state of a shared object must be communicated among users. While a lot of research has been done in terms of transmission of update messages representing the motion of avatars and objects, very few works focus on the collaboration itself. In this paper, we present an architecture that enables tightly-coupled col... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.