Sciweavers

WETICE
2007
IEEE
14 years 5 months ago
Network Forensic on Encrypted Peer-to-Peer VoIP Traffics and the Detection, Blocking, and Prioritization of Skype Traffics
Skype is a popular peer-to-peer (P2P) voice over IP (VoIP) application evolving quickly since its launch in 2003. However, the ability to traverse network address translation (NAT...
Chun-Ming Leung, Yuen-Yan Chan
WETICE
2007
IEEE
14 years 5 months ago
A View-Based Analysis of Distributed and Mobile Teams
In this paper, we present emerging team forms, which are classified into Nimble, Virtual, and Mobile teams. Based on this classification, we present a systematic analysis of speci...
Christoph Dorn, Daniel Schall, Robert Gombotz, Sch...
WETICE
2007
IEEE
14 years 5 months ago
Service-Oriented Agent Methodologies
Agents and services are two concepts that more and more are integrating and exploiting the advantages of each other. Agent-oriented methodologies effectively support the developme...
Giacomo Cabri, Letizia Leonardi, Mariachiara Puvia...
WETICE
2007
IEEE
14 years 5 months ago
Towards Configurable Process Visualizations with Proviado
Visualizing complex business processes is an important task of process-aware information systems (PAIS). Current PAIS, however, fail in providing adequate mechanisms for visualizi...
Ralph Bobrik, Thomas Bauer
WETICE
2007
IEEE
14 years 5 months ago
Context Adaptation of Web Service Orchestrations
With orchestrations, one service may be realized through the cooperation of several services. This cooperation has to be formally described. In this paper, we propose to describe ...
Frédérick Seyler, Chantal Taconet, G...
WETICE
2007
IEEE
14 years 5 months ago
Collaborative Intrusion Prevention
Intrusion Prevention Systems (IPSs) have long been proposed as a defense against attacks that propagate too fast for any manual response to be useful. In an important class of IPS...
Simon P. Chung, Aloysius K. Mok
WETICE
2007
IEEE
14 years 5 months ago
Data-Driven Design of Engineering Processes with COREPROModeler
Enterprises increasingly demand IT support for the coordination of their engineering processes, which often consist of hundreds up to thousands of sub-processes. From a technical ...
Dominic Müller, Manfred Reichert, Joachim Her...
WETICE
2007
IEEE
14 years 5 months ago
A Dominating Set Based Peer-to-Peer Protocol for Real-Time Multi-source Collaboration
Designing a collaborative architecture for real-time applications is an intricate challenge that usually involves dealing with the real-time constraints, resource limitations and ...
Dewan Tanvir Ahmed, Shervin Shirmohammadi, Abdulmo...
WETICE
2007
IEEE
14 years 5 months ago
Managing Confidential Data in the gLite Middleware
How to manage confidential data in the grid environment is a critical issue because users’ data can be saved in untrusted remote storages. This paper introduces a service to sto...
Diego Scardaci, Giordano Scuderi