By Topic

Proceedings Tenth IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises. WET ICE 2001

20-22 June 2001

Filter Results

Displaying Results 1 - 25 of 75
  • Proceedings Tenth IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises. WET ICE 2001

    Publication Year: 2001
    Request permission for commercial reuse | PDF file iconPDF (324 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2001, Page(s):395 - 396
    Request permission for commercial reuse | PDF file iconPDF (94 KB)
    Freely Available from IEEE
  • WEBSIGN: A looking glass for e-services

    Publication Year: 2001, Page(s):311 - 312
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    Desktop browsers are excellent for browsing web sites but they keep users tethered. Wireless browsing technologies such as WAP and i-mode untether nomadic users by making these services available on the move. However, it is not clear if users will be satisfied with free form browsing offered by these wireless technologies. We believe that in addition to free form web browsing, nomadic users will c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The CommunityItemsTool-interoperable community support in practice

    Publication Year: 2001, Page(s):368 - 373
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB) | HTML iconHTML

    Computer based community support systems can provide powerful support in direct exchange of information and in finding people to exchange information with. We present the CommunityItemsTool, a community support system that helps people to publish and exchange bookmarks and bibliographic references. The application was built from a user need and shows different features which are important for know... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A layered design model for knowledge and information sharing cooperative systems

    Publication Year: 2001, Page(s):305 - 310
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (632 KB) | HTML iconHTML

    This paper presents a design model for knowledge sharing cooperative systems. The model distinguishes three processing layers, discusses their components from both system's and user's points of view and also characterizes the different roles and tools involved in each layer. On the cooperation layer, actors are end-users who contribute to produce and use global knowledge supported by cooperative a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Group task analysis for groupware usability evaluations

    Publication Year: 2001, Page(s):102 - 107
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB) | HTML iconHTML

    Techniques for inspecting the usability of groupware applications have recently been proposed. These techniques focus on the mechanics of collaboration rather than the work context in which a system is used and offer time and cost savings by not requiring actual users or fully functional prototypes. Although these techniques are valuable, adding information about task and work context could improv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Customer-oriented systems design through virtual prototypes

    Publication Year: 2001, Page(s):263 - 268
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB) | HTML iconHTML

    Rapid prototyping based on 3D models is well accepted for several applications. This article addresses the application of animated virtual 3D prototypes for the development of computer-based systems supporting early collaboration of the system designer with the external customer. Our methodology seamlessly integrates illustration through 3D animation with the main tasks of computer-based real-time... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A design framework for collaborative browsing

    Publication Year: 2001, Page(s):362 - 367
    Cited by:  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB) | HTML iconHTML

    Collaborative browsing has experienced increasing popularity as a topic for both academic research and commercial software development, due mainly to the promise that it represents an enabling technology for distant collaboration. Several areas are adequate for the application of this paradigm. We present the results of an overview analysis of different proposals found in the literature, and show ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Suitability of MPEG4's BIFS for development of collaborative virtual environments

    Publication Year: 2001, Page(s):299 - 304
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB) | HTML iconHTML

    Collaborative Virtual Environments provide the capability of remote users working together in a virtual reality simulation in order to accomplish a joint task. An application creating such an environment would make heavy use of 3-dimensional object descriptions and hence would require their efficient storage, transport and access. In this paper we will discuss the suitability and advantages of usi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting multi-device enabled Web services: challenges and open problems

    Publication Year: 2001, Page(s):49 - 54
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB) | HTML iconHTML

    Service providers face a number of challenges when providing services to users accessing the World Wide Web from hand-held devices. Among these challenges are the small display sixes, the low bandwidth, input limitations and the mobility of these devices. Web service providers need to be aware of these limitations in order to meet the exact needs of mobile clients. In this paper, we claim that new... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • XMLSpaces for coordination in web-based systems

    Publication Year: 2001, Page(s):322 - 327
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB) | HTML iconHTML

    XMLSpaces extends the Linda coordination language for Web-based applications. It supports XML documents as tuple fields and multiple matching routines implementing different relations amongst XML documents, including those given by XML query-languages. XMLSpaces is distributed with an encapsulated open distribution strategy View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Clinical trial automation: new, revolutionary therapies and fewer side-effects using mobile Internet technologies

    Publication Year: 2001, Page(s):68 - 72
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    The objective of the paper is to show how mobile Internet technology such as WAP can be applied to automation of clinical trial research. Automation is expected to reduce human error and inaccurate information during clinical trials. This is important both for humanitarian and economic reasons: speeding up approval of new life-saving drugs, increasing the safety of clinical trials and correctly es... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The TuCSoN coordination infrastructure for virtual enterprises

    Publication Year: 2001, Page(s):348 - 353
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB) | HTML iconHTML

    Virtual enterprises (YE) and workflow management systems (WFMS) require deployable and flexible infrastructures, promoting the integration of heterogenous resources and services, as well as the development of new VE business processes in terms of workflow (LVF) rules coordinating the activities of the VE's component enterprises. We argue that a suitable general-purpose coordination infrastructure ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Looking at the whole picture: a case study of analyzing a virtual workplace

    Publication Year: 2001, Page(s):96 - 101
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (696 KB) | HTML iconHTML

    Previously, we analyzed data from a field study to determine the usability problems in a groupware system (M. Steves et al., 2001). The fact that 75% of the system use was asynchronous, surprised us. Consequently, we suspected that the user centered method that had been employed in that evaluation, might have been insufficient to detect problems related to such heavy asynchronous use. Re-analysis ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Collaborative access model for shared virtual environments

    Publication Year: 2001, Page(s):257 - 262
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB) | HTML iconHTML

    As shared virtual environments move beyond mere exemplars of computer graphics techniques, and evolve more meaningful content, issues such as 'ownership' or 'access' become important. Some artefacts in synthetic environments have 'real world' counterparts and require 'real world' access control and security. Others are entirely synthetic, and may require more esoteric access control. In either cas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • English vs. sealed bid in anonymous electronic auction protocols

    Publication Year: 2001, Page(s):171 - 176
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB) | HTML iconHTML

    We propose an anonymous sealed-bid auction protocol based on C. Cachin's two server sealed-bid auction scheme (1999) by applying the idea from K. Omote and A. Miyaji's English auction scheme. The technique of group signatures and the identity escrow play the central roles in our proposed scheme. We further consider the relevance and gap between the English and the sealed-bid in anonymous auction p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Attendance or providing added value: a study of the structure of cooperative e-business applications

    Publication Year: 2001, Page(s):23 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    We discuss conditions for the structure of cooperative e-business applications that provide added value. The conclusions are based on the analysis of business improvement and reengineering experience, and oil own results with cooperative product engineering support for e-business applications. It is recommended that e-business applications and services integrate virtual modeling with decision supp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An architecture supporting the collection and monitoring of data openly contributed over the World Wide Web

    Publication Year: 2001, Page(s):380 - 385
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB) | HTML iconHTML

    Open data collection over the World Wide Web-in which any Web user can contribute to large databases of informal data-presents several challenges that require novel approaches in human interface design, algorithmic machine learning and collaborative infrastructure. Foremost among these challenges is the need to ensure data integrity and quality, by automatically or semiautomatically identifying un... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web-assisted visits to cultural heritage

    Publication Year: 2001, Page(s):356 - 361
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB) | HTML iconHTML

    The wide access to cultural heritage is gaining more and more interest from the information technology community. Museums, exhibitions and cultural places are becoming enterprises that supply new services to access cultural information, and this calls for suitable infrastructures and tools. In such a context, this paper proposes a distributed application to enable virtual visits, based on an infra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enterprise security: legal challenges and possible solutions

    Publication Year: 2001, Page(s):183 - 188
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB) | HTML iconHTML

    To survive in business, especially the online world, an enterprise requires an effective security infrastructure. However, enterprises should bear in mind that there is often also a legal obligation to keep certain data or information secure, emanating from legislation such as intellectual property, data protection or trade secret legislation or from contract. A number of technological measures al... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A tool for secure inter-organizational computing

    Publication Year: 2001, Page(s):194 - 199
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB)

    As the globalization of business becomes common practice, e-business and enterprise application integration receive much attention. In the case of enterprise application integration across organizations, participating organizations want to maintain autonomy and need mutual protection during the cooperation among organizations. These seemingly conflicting requirements have to be satisfied in an ent... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of a visual browser for network intrusion detection

    Publication Year: 2001, Page(s):132 - 137
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB) | HTML iconHTML

    We designed a visual browser for log browsing, adopting the Hyperbolic Tree and Hyperbolic Cell to visualize log data. The Hyperbolic Tree provides a whole view of log data, showing quantitative change in the log data by focusing on a specified part. The Hyperbolic Cell expresses the time change of log data. This enables real-time investigation and comparison between log attributes. Our visual bro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Creating genetic applications for informal science learning in multi-user virtual environments or virtual worlds

    Publication Year: 2001, Page(s):291 - 298
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (768 KB) | HTML iconHTML

    At the Cornell Theory Center (CTC), Cornell University's high-performance computing and interdisciplinary research center, we have implemented a 3D multi-user virtual science museum, SciCentr. SciCentr is a virtual world based on Active Worlds client/server technology. Virtual worlds captivate users through touch (keyboard interaction), sound and sight. These virtual environments can be applied to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SCENTOR: scenario-based testing of e-business applications

    Publication Year: 2001, Page(s):41 - 46
    Cited by:  Papers (6)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB) | HTML iconHTML

    E-business software is often developed on a tight schedule, and testing needs to keep pace. The advice from proponents of approaches like extreme programming is that by testing continuously, it is actually possible to compress development cycles. In this paper, we discuss a testing approach that supports developers with their task of creating automated functional test drivers for e-business applic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Group key management for IP multicast: model & architecture

    Publication Year: 2001, Page(s):223 - 228
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB) | HTML iconHTML

    The Internet key exchange protocol as it stands is unsuitable for secure group and IP multicast communications due to the method of negotiating security association (SA) elements. This paper reports developments in the IETF in this area. In particular, it describes the design of the group key management architecture and group security association (GSA) model within the secure multicast group (SMUG... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.