Conferences in DBLP
Fawzi Daoud Workshop Report: Knowledge Media Networking. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:3-5 [Conf ] Lynne Rosenthal , Vincent M. Stanford NIST Smart Space: Pervasive Computing Initiative. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:6-11 [Conf ] Daphne Economou , William L. Mitchell , Steve Pettifer , Adrian J. West CVE Technology Development Based on Real World Application and User Needs. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:12-20 [Conf ] Margaret Corbit Building Virtual Worlds for Informal Science Learning (SciCentr and SciFair) in the Active Worlds Educational Universe (AWEDU). [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:21-26 [Conf ] Ralf Dörner , Paul Grimm ETOILE - An Environment for Team, Organizational and Individual Learning in Emergencies. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:27-34 [Conf ] Shervin Shirmohammadi , Nicolas D. Georganas Collaborating in 3D Virtual Environments: A Synchronous Architecture. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:35-42 [Conf ] Claire Knight , Malcolm Munro Should Users Inhabit Visualizations? [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:43-50 [Conf ] Cristina Russo Dos Santos , Pascal Gros , Pierre Abel , Didier Loisel , N. Trichaud , J. P. Paris Experiments in Information Visualization Using 3D Metaphoric Worlds. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:51-58 [Conf ] Jo Link-Pezet , Pierre Glize , Marie Pierre Gleizes Abrose: An Adaptive Multi-Agent Tool for Electronic Commerce. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:59-66 [Conf ] Dawit Yimam , Alfred Kobsa DEMOIR: A Hybrid Architecture for Expertise Modeling and Recommender Systems. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:67-74 [Conf ] Yoshihisa Gonno , Fumihiko Nishio , Yasuaki Yamagishi , Tomohiro Tsunoda Position Paper on Integrated Broadband Environment for Personalized TV Experience (IBEX). [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:75-78 [Conf ] Amy J. Knutilla , Michelle Potts Steves , Robert H. Allen Workshop on Evaluating Collaborative Enterprises - Workshop Report. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:79-85 [Conf ] David Pinelle , Carl Gutwin A Review of Groupware Evaluations. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:86-91 [Conf ] Prasun Dewan Techniques for Evaluating Collaborative Toolkits. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:92-97 [Conf ] Carl Gutwin , Saul Greenberg The Mechanics of Collaboration: Developing Low Cost Usability Evaluation Methods for Shared Workspaces. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:98-103 [Conf ] Emile L. Morse , Michelle Potts Steves CollabLogger: A Tool for Visualizing Groups at Work. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:104-109 [Conf ] A. I. Thomson , S. P. MacGregor , W. J. Ion An Evaluation and Comparison of the Industrial and Educational Usage of CSCW within the Design Process. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:110-111 [Conf ] Janet Ho , Monica M. C. Schraefel , Mark H. Chignell Towards an Evaluation Methodology for the Development of Research-Oriented Virtual Communities. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:112-117 [Conf ] Jonathan Sevy , Vera Zaychik , Thomas T. Hewett , William C. Regli Developing and Evaluating Collaborative Engineering Studios. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:118-123 [Conf ] Angran Xiao , Janet K. Allen , David Rosen , Farrokh Mistree A Method to Design Process Architecture in a Distributed Product Realization Environment. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:124-129 [Conf ] Catherine Plaisant , Anita Komlodi , Francis Lindsay Evaluation Challenges for a Federation of Heterogeneous Information Providers: The Case of NASA's Earth Science Information Partnerships. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:130-138 [Conf ] Wu Wen , Yahya Y. Al-Salqan Summary Report on Enterprise Security Workshop. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:139-140 [Conf ] David P. Gilliam , John C. Kelly , Matt Bishop Reducing Software Security Risk through an Integrated Approach. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:141-146 [Conf ] Rob Glenn , Sheila Frankel , Doug Montgomery IPsec-WIT: The NIST IPsec Web-Based Interoperability Test System. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:147-152 [Conf ] Germano Caronni Walking the Web of Trust. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:153-158 [Conf ] Gookwhan Ahn , Kwangjo Kim , Hee Yong Youn Tapping Alert Protocol. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:159-164 [Conf ] Fumio Mizoguchi Anomaly Detection Using Visualization and Machine Learning. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:165-170 [Conf ] Christopher B. McCubbin , Ali Aydin Selçuk , Deepinder P. Sidhu Initialization Vector Attacks on the IPsec Protocol Suite. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:171-175 [Conf ] Warwick Ford , Burton S. Kaliski Jr. Server-Assisted Generation of a Strong Secret from a Password. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:176-180 [Conf ] Wu Wen A Delayed Commitment Scheme to Enhance Public Key Certificate Based Protocols. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:181-182 [Conf ] Mourad Debbabi , E. Giasson , Béchir Ktari , F. Michaud , Nadia Tawbi Secure Self-Certified COTS. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:183-188 [Conf ] Frédéric Painchaud , Mourad Debbabi On the Implementation of a Stand-Alone Java(tm) Bytecode Verifier. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:189-194 [Conf ] Michael E. Shin , Gail-Joon Ahn UML-Based Representation of Role-Based Access Control. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:195-200 [Conf ] Takamichi Saito , Kentaro Umesawa , Hiroshi G. Okuno Privacy-Enhanced Access Control by SPKI and Its Application to Web Server. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:201-206 [Conf ] Lin Han , Nahid Shahmehri Secure Multicast Software Delivery. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:207-212 [Conf ] Åsa Hagström , Viiveke Fåk , Mark Vandenwauver EWS-A Case Study on Access Control in Workflow Systems. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:213-218 [Conf ] Myong H. Kang , Judith N. Froscher A Framework for Secure Enterprise Computing. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:219-220 [Conf ] Claudiu Duma , Almut Herzog , Nahid Shahmehri Towards Secure e-Services. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:221-224 [Conf ] Kirstie L. Bellman , Christopher Landauer , Robert Tolksdorf , Alois Ferscha Report On Major Themes and Issues Arising from the Workshop. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:225-229 [Conf ] Enrico Denti , Andrea Omicini A Coordination Infrastructure for Agent-based Internet Applications. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:230-235 [Conf ] A. T. M. Aerts , Nicolae B. Szirbik , Dieter K. Hammer , Jan Goossenaerts , Hans Wortmann On the Design of a Mobile Agent Web for Supporting Virtual Enterprises. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:236-241 [Conf ] Lukasz Beca Applications of XML and Customizable Components in Building Virtual Places on the Web. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:242-247 [Conf ] Robert Tolksdorf Coordinating Work on the Web with Workspaces. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:248-253 [Conf ] Vassil Roussev , Prasun Dewan , Naveen Koorakula , Sriram Sellappa Integrating XML and Object-Based Programming for Distributed Collaboration. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:254-259 [Conf ] Joe Y. Shiau , Svetan M. Ratchev , George Valtchanov Distributed Collaborative Design and Manufacturability Assessment for Extended Enterprise in XML-Based Agent Systems. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:260-265 [Conf ] Giacomo Cabri , Letizia Leonardi , Franco Zambonelli A Web Infrastructure for People and Agent Interaction and Collaboration. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:266-271 [Conf ] Alois Ferscha Workspace Awareness in Mobile Virtual Teams. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:272-277 [Conf ] Pinar Yolum , Munindar P. Singh Commitment-Based Enhancement of E-Commerce Protocols. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:278-283 [Conf ] Wolfram Conen , Fredj Dridi , Eckhart Köppen A Secure XML/Java-Based Implementation of Auction Services for Complex Resource Allocation Problems. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:284-290 [Conf ]