The SCEAS System
Navigation Menu

Conferences in DBLP

Workshop on Enabling Technologies: Infrastracture for Collaborative Enterprises (WETICE) (wetice)
2002 (conf/wetice/2002)

  1. Daniel P. Siewiorek
    Team-Based Design: Collaboration across Time and Space. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:3- [Conf]
  2. Jeannette M. Wing
    Vulnerability Analysis of Networked Systems. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:4- [Conf]
  3. Elaine M. Raybourn, Julian Newman
    WETICE 2002 Evaluating Collaborative Enterprises Workshop Report. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:7-11 [Conf]
  4. Jill Drury, Marian G. Williams
    Framework for Role-Based Specification and Evaluation of Awareness Support in Synchronous Collaborative Applications . [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:12-17 [Conf]
  5. Marion A. Barfurth, Janice Singer, Bruno Emond, Norman G. Vinson, Martin Brooks, John Spence
    Evaluation Factors for Multi-Stakeholder Broadband Visual Communication Projects. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:18-22 [Conf]
  6. Pascal Fenkam, Engin Kirda, Schahram Dustdar, Harald Gall, Gerald Reif
    Evaluation of a Publish/Subscribe System for Collaborative and Mobile Working. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:23-28 [Conf]
  7. Jeffrey D. Campbell
    Characteristics of Group Development of Diagrams. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:29-34 [Conf]
  8. Cornelia Boldyreff
    Determination and Evaluation of Web Accessibility. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:35-42 [Conf]
  9. David P. Gilliam
    Summary Report on Enterprise Security Workshop. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:43-48 [Conf]
  10. Marc Rennhard, Sandro Rafaeli, Laurent Mathy, Bernhard Plattner, David Hutchison
    Analysis of an Anonymity Network for Web Browsing. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:49-54 [Conf]
  11. K. Shum, Victor K. Wei
    A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:55-56 [Conf]
  12. Kemal Bicakci, Nazife Baykal
    Infinite Length Hash Chains and Their Applications. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:57-61 [Conf]
  13. Sandro Rafaeli, David Hutchison
    Hydra: A Decentralised Group Key Management. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:62-67 [Conf]
  14. T. C. Lam, Victor K. Wei
    A Mobile Agent Clone Detection System with Itinerary Privacy. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:68-76 [Conf]
  15. Sreekanth Malladi, Jim Alves-Foss, Sreenivas Malladi
    What are Multi-Protocol Guessing Attacks and How to Prevent Them. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:77-82 [Conf]
  16. Gail-Joon Ahn, Dongwan Shin
    Towards Scalable Authentication in Health Services. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:83-88 [Conf]
  17. Xiaofeng Gong, Julian Newman
    Selecting a Security Architecture for a New Model of Distributed Tutorial Support. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:89-94 [Conf]
  18. Pascal Fenkam, Schahram Dustdar, Engin Kirda, Gerald Reif, Harald Gall
    Towards an Access Control System for Mobile Peer-to-Peer Collaborative Environments. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:95-102 [Conf]
  19. P. C. Chan, Victor K. Wei
    Preemptive Distributed Intrusion Detection Using Mobile Agents. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:103-108 [Conf]
  20. Nathalie Weiler
    Honeypots for Distributed Denial of Service Attacks. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:109-114 [Conf]
  21. Joseph S. Sherif, Tommy G. Dearmond
    Intrusion Detection: Systems and Models. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:115-136 [Conf]
  22. Thomas L. Wolfe, Yih-Chiao Joseph Liu, Hsin-Ping Pat Chang
    Maintaining Remote Services and Resources Over the Internet and Other Networks. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:137-138 [Conf]
  23. Sasha Slijepcevic, Miodrag Potkonjak, Vlasios Tsiatsis, Scott Zimbeck, Mani B. Srivastava
    On Communication Security in Wireless Ad-Hoc Sensor Networks. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:139-144 [Conf]
  24. Pascal Meunier, Sofie Nystrom, Seny Kamara, Scott Yost, Kyle Alexander, Dan Noland, Jared Crane
    ActiveSync, TCP/IP and 802.11b Wireless Vulnerabilities of WinCE-Based PDAs. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:145-152 [Conf]
  25. David P. Gilliam, John D. Powell
    Integrating a Flexible Modeling Framework (FMF) with the Network Security Assessment Instrument to Reduce Software Security Risk. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:153-160 [Conf]
  26. Giacomo Cabri, Gabriele Kotsis
    Web Infrastructures and Coordination Architectures for Collaborative Applications - Shared Artifacts, a Shared Language, or Shared Spaces. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:161-163 [Conf]
  27. Guillermo de Jesús Hoyos-Rivera, Roberta Lima-Gomes, Jean-Pierre Courtiat
    A Flexible Architecture for Collaborative Browsing. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:164-169 [Conf]
  28. Luis E. Anido-Rifón, Manuel Caeiro, Judith S. Rodríguez, Juan M. Santos
    Architecting CORBA-Based Frameworks to Support Distributed and Interoperable Training Systems in Large Enterprises. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:170-175 [Conf]
  29. M. Brian Blake
    An Agent-Based Cross-Organizational Workflow Architecture in Support of Web Services. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:176-181 [Conf]
  30. Manuel Caeiro, Luis E. Anido-Rifón, Juan M. Santos, Judith S. Rodríguez
    Towards the Standardization of Collaborative Learning Systems. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:182-187 [Conf]
  31. J. Chugh, V. Jagannathan
    Voice-Enabling Enterprise Applications. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:188-189 [Conf]
  32. Ravi Raman, Y. V. Ramana Reddy, Sumitra Reddy
    Collaboration Framework for Nomadic Healthcare Providers. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:190-192 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002