Conferences in DBLP
Daniel P. Siewiorek Team-Based Design: Collaboration across Time and Space. [Citation Graph (0, 0)][DBLP ] WETICE, 2002, pp:3- [Conf ] Jeannette M. Wing Vulnerability Analysis of Networked Systems. [Citation Graph (0, 0)][DBLP ] WETICE, 2002, pp:4- [Conf ] Elaine M. Raybourn , Julian Newman WETICE 2002 Evaluating Collaborative Enterprises Workshop Report. [Citation Graph (0, 0)][DBLP ] WETICE, 2002, pp:7-11 [Conf ] Jill Drury , Marian G. Williams Framework for Role-Based Specification and Evaluation of Awareness Support in Synchronous Collaborative Applications . [Citation Graph (0, 0)][DBLP ] WETICE, 2002, pp:12-17 [Conf ] Marion A. Barfurth , Janice Singer , Bruno Emond , Norman G. Vinson , Martin Brooks , John Spence Evaluation Factors for Multi-Stakeholder Broadband Visual Communication Projects. [Citation Graph (0, 0)][DBLP ] WETICE, 2002, pp:18-22 [Conf ] Pascal Fenkam , Engin Kirda , Schahram Dustdar , Harald Gall , Gerald Reif Evaluation of a Publish/Subscribe System for Collaborative and Mobile Working. [Citation Graph (0, 0)][DBLP ] WETICE, 2002, pp:23-28 [Conf ] Jeffrey D. Campbell Characteristics of Group Development of Diagrams. [Citation Graph (0, 0)][DBLP ] WETICE, 2002, pp:29-34 [Conf ] Cornelia Boldyreff Determination and Evaluation of Web Accessibility. [Citation Graph (0, 0)][DBLP ] WETICE, 2002, pp:35-42 [Conf ] David P. Gilliam Summary Report on Enterprise Security Workshop. [Citation Graph (0, 0)][DBLP ] WETICE, 2002, pp:43-48 [Conf ] Marc Rennhard , Sandro Rafaeli , Laurent Mathy , Bernhard Plattner , David Hutchison Analysis of an Anonymity Network for Web Browsing. [Citation Graph (0, 0)][DBLP ] WETICE, 2002, pp:49-54 [Conf ] K. Shum , Victor K. Wei A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection. [Citation Graph (0, 0)][DBLP ] WETICE, 2002, pp:55-56 [Conf ] Kemal Bicakci , Nazife Baykal Infinite Length Hash Chains and Their Applications. [Citation Graph (0, 0)][DBLP ] WETICE, 2002, pp:57-61 [Conf ] Sandro Rafaeli , David Hutchison Hydra: A Decentralised Group Key Management. [Citation Graph (0, 0)][DBLP ] WETICE, 2002, pp:62-67 [Conf ] T. C. Lam , Victor K. Wei A Mobile Agent Clone Detection System with Itinerary Privacy. [Citation Graph (0, 0)][DBLP ] WETICE, 2002, pp:68-76 [Conf ] Sreekanth Malladi , Jim Alves-Foss , Sreenivas Malladi What are Multi-Protocol Guessing Attacks and How to Prevent Them. [Citation Graph (0, 0)][DBLP ] WETICE, 2002, pp:77-82 [Conf ] Gail-Joon Ahn , Dongwan Shin Towards Scalable Authentication in Health Services. [Citation Graph (0, 0)][DBLP ] WETICE, 2002, pp:83-88 [Conf ] Xiaofeng Gong , Julian Newman Selecting a Security Architecture for a New Model of Distributed Tutorial Support. [Citation Graph (0, 0)][DBLP ] WETICE, 2002, pp:89-94 [Conf ] Pascal Fenkam , Schahram Dustdar , Engin Kirda , Gerald Reif , Harald Gall Towards an Access Control System for Mobile Peer-to-Peer Collaborative Environments. [Citation Graph (0, 0)][DBLP ] WETICE, 2002, pp:95-102 [Conf ] P. C. Chan , Victor K. Wei Preemptive Distributed Intrusion Detection Using Mobile Agents. [Citation Graph (0, 0)][DBLP ] WETICE, 2002, pp:103-108 [Conf ] Nathalie Weiler Honeypots for Distributed Denial of Service Attacks. [Citation Graph (0, 0)][DBLP ] WETICE, 2002, pp:109-114 [Conf ] Joseph S. Sherif , Tommy G. Dearmond Intrusion Detection: Systems and Models. [Citation Graph (0, 0)][DBLP ] WETICE, 2002, pp:115-136 [Conf ] Thomas L. Wolfe , Yih-Chiao Joseph Liu , Hsin-Ping Pat Chang Maintaining Remote Services and Resources Over the Internet and Other Networks. [Citation Graph (0, 0)][DBLP ] WETICE, 2002, pp:137-138 [Conf ] Sasha Slijepcevic , Miodrag Potkonjak , Vlasios Tsiatsis , Scott Zimbeck , Mani B. Srivastava On Communication Security in Wireless Ad-Hoc Sensor Networks. [Citation Graph (0, 0)][DBLP ] WETICE, 2002, pp:139-144 [Conf ] Pascal Meunier , Sofie Nystrom , Seny Kamara , Scott Yost , Kyle Alexander , Dan Noland , Jared Crane ActiveSync, TCP/IP and 802.11b Wireless Vulnerabilities of WinCE-Based PDAs. [Citation Graph (0, 0)][DBLP ] WETICE, 2002, pp:145-152 [Conf ] David P. Gilliam , John D. Powell Integrating a Flexible Modeling Framework (FMF) with the Network Security Assessment Instrument to Reduce Software Security Risk. [Citation Graph (0, 0)][DBLP ] WETICE, 2002, pp:153-160 [Conf ] Giacomo Cabri , Gabriele Kotsis Web Infrastructures and Coordination Architectures for Collaborative Applications - Shared Artifacts, a Shared Language, or Shared Spaces. [Citation Graph (0, 0)][DBLP ] WETICE, 2002, pp:161-163 [Conf ] Guillermo de Jesús Hoyos-Rivera , Roberta Lima-Gomes , Jean-Pierre Courtiat A Flexible Architecture for Collaborative Browsing. [Citation Graph (0, 0)][DBLP ] WETICE, 2002, pp:164-169 [Conf ] Luis E. Anido-Rifón , Manuel Caeiro , Judith S. Rodríguez , Juan M. Santos Architecting CORBA-Based Frameworks to Support Distributed and Interoperable Training Systems in Large Enterprises. [Citation Graph (0, 0)][DBLP ] WETICE, 2002, pp:170-175 [Conf ] M. Brian Blake An Agent-Based Cross-Organizational Workflow Architecture in Support of Web Services. [Citation Graph (0, 0)][DBLP ] WETICE, 2002, pp:176-181 [Conf ] Manuel Caeiro , Luis E. Anido-Rifón , Juan M. Santos , Judith S. Rodríguez Towards the Standardization of Collaborative Learning Systems. [Citation Graph (0, 0)][DBLP ] WETICE, 2002, pp:182-187 [Conf ] J. Chugh , V. Jagannathan Voice-Enabling Enterprise Applications. [Citation Graph (0, 0)][DBLP ] WETICE, 2002, pp:188-189 [Conf ] Ravi Raman , Y. V. Ramana Reddy , Sumitra Reddy Collaboration Framework for Nomadic Healthcare Providers. [Citation Graph (0, 0)][DBLP ] WETICE, 2002, pp:190-192 [Conf ]