Sciweavers

ERCIMDL
1998
Springer
133views Education» more  ERCIMDL 1998»
14 years 4 months ago
MarketNet: Using Virtual Currency to Protect Information Systems
This paper describes novel market-based technologies for systematic, quantifiable and predictable protection of information systems against attacks. These technologies, incorporate...
Yechiam Yemini, Apostolos Dailianas, Danilo Floris...
COOPIS
1998
IEEE
14 years 4 months ago
A Generative Communication Service for Database Interoperability
Parallel and distributed programming is conceptually harder to undertake and to understand than sequential programming, because a programmer often has to manage the coexistence an...
Wilhelm Hasselbring, Mark Roantree
ICEIS
1999
IEEE
14 years 4 months ago
A New Method to Block Access to Illegal and Harmful Content on the Internet
: Filtering software is the most commonly used to protect children and young people from illegal and harmful contents on the Internet. Most of this software blocks access to Intern...
Byung-Jeon Yoo, Hyun-Gyoo Yook, Myong-Soon Park
ICEIS
1999
IEEE
14 years 4 months ago
The Future of Enterprise Groupware Applications
: This paper provides a review of groupware technology and products. The purpose of this review is to investigate the appropriateness of current groupware technology as the basis f...
Sotirios Terzis, Paddy Nixon, Vincent P. Wade, Sim...
ICEIS
1999
IEEE
14 years 4 months ago
Holonic Dynamic Scheduling Architecture and Services
: Manufacturing systems are changing its structure and organisation. Supply chain are evolving to more coupled organisations, like virtual enterprises, though maintaining the singl...
Nuno Silva, Carlos Ramos
ICEIS
1999
IEEE
14 years 4 months ago
Software Agents in Network Management
: The globalisation of Internet technology had a strong impact on technology price and availability, which resulted in the emerging of more opportunities and more services in dista...
Rui Pedro Lopes, José Luís Oliveira
ICEIS
1999
IEEE
14 years 4 months ago
Neural Networks for X-Ray Image Segmentation
Su Linying, Bernadette Sharp, Darryl N. Davis
ICEIS
1999
IEEE
14 years 4 months ago
A Method for Integrating Legacy Systems within Distributed Object Architecture
: The ability of a new technology to reuse legacy systems is very important for its economic success. This paper presents a method for integrating legacy systems within distributed...
Matjaz B. Juric, Ivan Rozman, Marjan Hericko
ICEIS
1999
IEEE
14 years 4 months ago
Implementing Network Protocols in Java-A Framework for Rapid Prototyping
Matthias Jung, Ernst Biersack, Alexander Pilger