Sciweavers

WETICE
2005
IEEE
13 years 10 months ago
Trust Infrastructure for Policy based Messaging In Open Environments
Policy-based messaging (PBM) aims at carrying security policies with messages, which will be enforced at recipient systems to provide security features. PBM promotes a distributed...
Gansen Zhao, David W. Chadwick
WETICE
2005
IEEE
13 years 10 months ago
Issues on Decentralized Consistency Checking of Multi-lateral Collaborations
Decentralized consistency checking of multi-lateral collaborations is based on propagating local information to trading partners until a fixed point has been reached. However, wh...
Andreas Wombacher
WETICE
2005
IEEE
13 years 10 months ago
Entropy Based Worm and Anomaly Detection in Fast IP Networks
Detecting massive network events like worm outbreaks in fast IP networks, such as Internet backbones, is hard. One problem is that the amount of traffic data does not allow real-t...
Arno Wagner, Bernhard Plattner
WETICE
2005
IEEE
13 years 10 months ago
Challenges and Solutions for Model Driven Web Service Composition
System theory propagates the use of models which e level of abstraction to cope with complexity, evolving out of variety and connectivity. Different modeling techniques have been ...
Konrad Pfadenhauer, Burkhard Kittl, Schahram Dustd...
WETICE
2005
IEEE
13 years 10 months ago
Evaluation of an awareness distribution mechanism: A simulation approach
In distributed software engineering, the role of informal communication is frequently overlooked. Participants simply employ their own ad-hoc methods of informal communication. Co...
David Nutter, Cornelia Boldyreff
WETICE
2005
IEEE
13 years 10 months ago
Data access optimization on grid systems
— The execution of data intensive grid applications still raises several questions regarding job scheduling, data migration and replication. The optimization techniques applied b...
László Csaba Lorincz, Tamás K...
WETICE
2005
IEEE
13 years 10 months ago
A Reputation Management System in Structured Peer-to-Peer Networks
Since there is no method to verify the trustworthiness of shared files in P2P systems, malicious peers can spread untrustworthy files to the system. In order to prevent untrustw...
So Young Lee, O-Hoon Kwon, Jong Kim, Sung Je Hong
WETICE
2005
IEEE
13 years 10 months ago
CAFE - Collaborative Agents for Filtering E-mails
CAFE (Collaborative Agents for Filtering E-mails) is a multi-agent system to collaboratively filter spam from users’ mail stream. CAFE associates a proxy agent with each user, a...
Lorenzo Lazzari, Marco Mari, Agostino Poggi
WETICE
2005
IEEE
13 years 10 months ago
Minimum intrusion Grid - The Simple Model
: This paper describes the key ideas in the new Grid model: MiG (Minimum intrusion Grid). “The Simple Model” is a major milestone in developing the full MiG concept and when co...
Henrik Hoey Karlsen, Brian Vinter
WETICE
2005
IEEE
13 years 10 months ago
A Service Oriented Architecture Framework for Collaborative Services
The demand for flexible, efficient and user-friendly collaborative services is becoming more and more urgent as the competition in the current marketoriented arena is getting more...
Ivar Jørstad, Schahram Dustdar, Do Van Than...