Sciweavers

WETICE
1998
IEEE
13 years 11 months ago
An Open Architecture for Supporting Collaboration on the Web
The MEMOIR framework supports researchers working with a vast quantity of distributed information, by assisting them in finding both relevant documents and researchers with relate...
David De Roure, Wendy Hall, Siegfried Reich, Aggel...
WETICE
1998
IEEE
13 years 11 months ago
Setting up a Secure Web Server and Clients on an Intranet
This paper discusses the practical issues that arise when securing the access to the World Wide Web (WWW). A brief overview of the different protocols that are proposed to secure ...
Joris Claessens, Mark Vandenwauver, Bart Preneel, ...
WETICE
1998
IEEE
13 years 11 months ago
A Framework for Adaptive Process Modeling and Execution (FAME)
This paper describes the architecture and concept of operation of a Framework for Adaptive Process Modeling and Execution (FAME). The research addresses the absence of robust meth...
Perakath C. Benjamin, Madhav Erraguntla, Richard J...
WETICE
1998
IEEE
13 years 11 months ago
Interactive Mobile Agents in X-Klaim
Mobile agents are processes which can migrate and execute on new hosts. Mobility is a key concept for network programming; it has stimulated much research about new programming la...
Lorenzo Bettini, Rocco De Nicola, Rosario Pugliese...
WETICE
1998
IEEE
13 years 11 months ago
Coordinating Management Activities in Distributed Software Development Projects
Fawsy Bendeck, Sigrid Goldmann, Harald Holz, Boris...
WETICE
1998
IEEE
13 years 11 months ago
Using SESAME's GSS-API to add Security to Unix Applications
SESAME is a security architecture that starts from the Kerberos protocol and adds to it public-key based authentication, role based access control, delegation of rights and an ext...
Paul Ashley, Mark Vandenwauver, Mark Rutherford, S...
WETICE
1998
IEEE
13 years 11 months ago
How to Coordinate Internet Applications based on Mobile Agents
The paper surveys the possible coordination models for mobile agent applications and evaluates them in the context of a widely distributed application in the area of WWW informati...
Giacomo Cabri, Letizia Leonardi, Franco Zambonelli
WETICE
1998
IEEE
13 years 11 months ago
Efficient Security for Large and Dynamic Multicast Groups
Proposals for multicast security that have been published so far are complex, often require trust in network components or are inefficient. In this paper we propose a series of no...
Germano Caronni, Marcel Waldvogel, Dan Sun, Bernha...
WETICE
1999
IEEE
13 years 11 months ago
A Hierarchical Proxy Architecture for Internet-Scale Event Services
The rapid growth of the Web has made it possible to build collaborative applications on an unprecedented scale. However, the request-reply interaction model of HTTP limits the rang...
Haobo Yu, Deborah Estrin, Ramesh Govindan