Abstract is missing.
- Coordination in Pervasive Computing EnvironmentsAlois Ferscha. 3-9 [doi]
- Network Threat ModelingJesper M. Johansson. 10 [doi]
- Instructional Design for Collaborative E-LearningWolfgang Gerteis, Joachim Schaper. 11 [doi]
- DEVISE: A Methodology for Building Web Services Based Infrastructure for Collaborative EnterprisesN. Dhyanesh, G. C. Vineel, S. V. Raghavan. 12 [doi]
- Agent-based Computing for Enterprise Collaboration - What Can Agents Learn from Human Collaboration?M. Brian Blake, Giacomo Cabri. 21-23 [doi]
- Integrated Multi-agent-based Supply Chain ManagementDaniel Frey, Tim Stockheim, Peer-Oliver Woelk, Roland Zimmermann. 24-29 [doi]
- Mapping Abstractions of Norms in Electronic InstitutionsIsmail Khalil Ibrahim, Gabriele Kotsis, Wieland Schwinger. 30-35 [doi]
- Agent.Hospital - agent-based open framework for clinical applicationsStefan Kirn, Christian Heine, Rainer Herrler, Karl-Heinz Krempels. 36-41 [doi]
- A Case Study in Role-based Agent InteractionsGiacomo Cabri, Luca Ferrari, Letizia Leonardi. 42-47 [doi]
- An Agent-based Approach to Specify a Web Service-oriented EnvironmentZakaria Maamar, Fahim Akhter, Mohammed Lahkim. 48 [doi]
- DMC - Distributed and Mobile Collaboration Workshop ReportSchahram Dustdar, Harald Gall. 53 [doi]
- WebDAVA: An Administrator-Free Approach To Web File-SharingAlexander Levine, Vassilis Prevelakis, John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis. 59-64 [doi]
- A Logical Model for Coordination Rule Classes in Collaborative SessionsJosé Martín Molina Espinosa, Jean Fanchon, Khalil Drira. 65-70 [doi]
- Using UML to Design Distributed Collaborative Workflows: from UML to XPDLPing Jiang, Quentin Mair, Julian Newman. 71-76 [doi]
- Mobile Collaboration Tool for University EducationStefan Berger, Rainer Mohr, Holger Nösekabel, Klaus J. Schäfer. 77 [doi]
- Yet Another Framework for Supporting Mobile and Collaborative WorkMauro Caporuscio, Paola Inverardi. 81-86 [doi]
- Supporting Collaboration in the Development of Tools and Dies in Manufacturing NetworksZorlu Yalniz, Engin Kirda. 87 [doi]
- Supporting Rich Queries in DHT-based Peer-to-Peer SystemsMing Zhang, Kian-Lee Tan. 95-100 [doi]
- On Optimal Update Policies and Cluster Sizes for 2-Tier Distributed SystemsPrasenjit Dey, Anwitaman Datta. 101-107 [doi]
- Introducing domain specific ad-hoc collaboration: The peer-to-peer tool iKnowClaus Eikemeier, Ulrike Lechner. 107-112 [doi]
- A Provision-centric Model for Electronic ServicesClare Gryce, Giacomo Piccinelli, Christian Zirpins. 113 [doi]
- Designing Coordination Systems for Distributed TeamworkNikolay Mehandjiev, Anthony Karageorgos, Gee Hin Tsang. 117-122 [doi]
- Automatic synthesis of coordinators for COTS group-ware applications: an examplePaola Inverardi, Massimo Tivoli, Antonio Bucchiarone. 123 [doi]
- WETICE 2003 Evaluating Collaborative Enterprises Workshop ReportJulian Newman, Elaine M. Raybourn, Josie P. H. Huang. 131-136 [doi]
- The Virtual Environment: The How-to of Studying Collaboration and Performance of Geographically Dispersed TeamsLinda M. L. Peters. 137-141 [doi]
- Assessing Collaborative Tools from an Information-Processing Perspective: Identification of Value-Added ProcessesFrance Bouthillier, Kathleen Shearer. 142-147 [doi]
- Use of Scenario Evaluation in Preparation for Deployment of a Collaborative System for Knowledge Transfer - the Case of KiMERALydia M. S. Lau, Craig A. Adams, Peter M. Dew, Christine Leigh. 148-152 [doi]
- E-MAGINE: The Development of an Evaluation Method to Assess Groupware ApplicationsMirjam Huis in t Veld, J. H. Erik Andriessen, Robert M. Verburg. 153-158 [doi]
- An Agent-based Evaluation Framework for Supporting Virtual Enterprise FormationSobah Abbas Petersen. 159-164 [doi]
- Modeling contribution for virtual enterprise supportSamir Tata, Imed Boughzala. 165-170 [doi]
- Historical Awareness Support and Its Evaluation in Collaborative Software EngineeringDavid Nutter, Cornelia Boldyreff. 171 [doi]
- Eighth Enterprise Security (ES) Workshop ReportDavid P. Gilliam. 179-183 [doi]
- Verifying Enterprise s Mandatory Access Control Policies with Coloured Petri NetsKrzysztof Juszczyszyn. 184-189 [doi]
- Specification and Verification of Constraints in Role Based Access Control for Enterprise Security SystemGrzegorz Kolaczek. 190-195 [doi]
- Policy Storage for Role-Based Access Control SystemsAndrás Belokosztolszki, David M. Eyers, Wei Wang, Ken Moody. 196-201 [doi]
- Specification and Classification of Role-based Authorization PoliciesGail-Joon Ahn. 202-207 [doi]
- A Hybrid Key Tree Scheme for Multicast to Balance Security and Efficiency RequirementsClaudiu Duma, Nahid Shahmehri, Patrick Lambrix. 208-213 [doi]
- Secured Advanced Federated Environment (SAFE): A NASA Solution for Secure Cross-Organization CollaborationEdward T. Chow, Matthew Chew Spence, Barney Pell, Helen Stewart, David J. Korsmeyer, Yih-Chiao Joseph Liu, Hsin-Ping Pat Chang, Conan Viernes, Andre Goforth. 214-219 [doi]
- A Network Worm Vaccine ArchitectureStelios Sidiroglou, Angelos D. Keromytis. 220-225 [doi]
- Indra: A peer-to-peer approach to network intrusion detection and preventionRamaprabhu Janakiraman, Marcel Waldvogel, Qi Zhang. 226-231 [doi]
- Verification of Access Control Coherence in Information System during ModificationsGilles Goncalves, Fred Hemery, Aneta Poniszewska. 232-237 [doi]
- Supporting Digital Signatures in Mobile EnvironmentsScott Campbell. 238-242 [doi]
- Software Security Checklist for the Software Life CycleDavid P. Gilliam, Thomas L. Wolfe, Joseph S. Sherif, Matt Bishop. 243-248 [doi]
- Key Exchange (KX) - A Next Generation Protocol to Synchronise PGP KeyserversAdrian von Bidder, Nathalie Weiler. 249-254 [doi]
- Practical Anonymity for the Masses with Mix-NetworksMarc Rennhard, Bernhard Plattner. 255 [doi]
- Cooperating through a Belief-based Trust ComputationCristiano Castelfranchi, Rino Falcone, Giovanni Pezzulo. 263-268 [doi]
- Design and Implementation of Virtual Private ServicesSotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith. 269-274 [doi]
- Attack-Resistance of Computational Trust ModelsAndrew Twigg, Nathan Dimmock. 275-280 [doi]
- How much is enough ? Risk in Trust-Based Access ControlNathan Dimmock. 281-282
- Trust Dynamics for Collaborative Global ComputingColin English, Sotirios Terzis, Waleed Wagealla, Helen Lowe, Paddy Nixon, Andrew D. McGettrick. 283 [doi]
- Knowledge Management for Distributed Agile Processes: Models, Techniques, and InfrastructureHarald Holz, Grigori Melnik, Martin Schaaf. 291-294 [doi]
- Ontology-Based Information in Dynamic EnvironmentsHeiner Stuckenschmidt. 295 [doi]
- WebRat: Supporting Agile Knowledge Retrieval through Dynamic, Incremental Clustering and Automatic Labelling of Web Search Result SetsMichael Granitzer, Wolfgang Kienreich, Vedran Sabol, Gisela Dösinger. 296-301 [doi]
- Knowledge Sharing: Agile Methods vs. Tayloristic MethodsThomas Chau, Frank Maurer, Grigori Melnik. 302-307 [doi]
- Requirements Engineering and Agile Software DevelopmentFrauke Paetsch, Armin Eberlein, Frank Maurer. 308-313 [doi]
- Lessons learned about distributed pair programming: what are the knowledge needs to address?Gerardo Canfora, Aniello Cimitile, Corrado Aaron Visaggio. 314-319 [doi]
- Collaborative, Task-Specific Information Delivery for Agile ProcessesHarald Holz, Jochen Schäfer. 320-325 [doi]
- Using Design Rationales for Agile DocumentationThomas Sauer. 326-331 [doi]
- The PROGEMM Approach For Managing Clinical ProcessesKerstin Maximini, Martin Schaaf. 332-337 [doi]
- Proactive Knowledge Distribution for Agile ProcessesRosina Weber. 338-339 [doi]
- Weakly-structured Workflows for Knowledge-intensive Tasks: An Experimental EvaluationLudger van Elst, Felix-Robinson Aschoff, Ansgar Bernardi, Heiko Maus, Sven Schwarz. 340-345 [doi]
- KEPT: a Knowledge Elicitation Tool to Support Communities of PracticeEttore Colombo, Fabio Sartori. 346 [doi]
- First International Workshop on Theory and Practice of Open Computational SystemsMartin Fredriksson, Rune Gustavsson, Andrea Omicini, Alessandro Ricci. 355-358 [doi]
- Quality of Service in Network-Centric Warfare and Challenges in Open Computational Systems EngineeringMartin Fredriksson, Rune Gustavsson. 359-364 [doi]
- Supporting Coordination in Open Computational Systems with TuCSoNAlessandro Ricci, Andrea Omicini. 365-370 [doi]
- Modeling Indirect Interaction in Open Computational SystemsDavid Keil, Dina Q. Goldin. 371-376 [doi]
- An Agent-based Computational Model for the Battle of Trafalgar: A Comparison Between Analytical and Simulative Methods of ResearchGiuseppe Trautteur, Raniero Virgilio. 377-382 [doi]
- The AMAS theory for complex problem solving based on self-organizing cooperative agentsDavy Capera, Jean-Pierre Georgé, Marie Pierre Gleizes, Pierre Glize. 383-388 [doi]
- Living Design for Open Computational SystemsJean-Pierre Georgé, Gauthier Picard, Marie Pierre Gleizes, Pierre Glize. 389-394 [doi]
- Designing new Agent Based Applications Architectures with the AGP MethodologyEric Sanchis. 395-400 [doi]
- Developing Adaptive and Context-aware Applications in Dynamic NetworksMarco Mamei, Franco Zambonelli, Letizia Leonardi. 401 [doi]