Abstract is missing.
- Workshop Report: Knowledge Media NetworkingFawzi Daoud. 3-5 [doi]
- NIST Smart Space: Pervasive Computing InitiativeLynne Rosenthal, Vincent M. Stanford. 6-11 [doi]
- CVE Technology Development Based on Real World Application and User NeedsDaphne Economou, William L. Mitchell, Steve Pettifer, Adrian J. West. 12-20 [doi]
- Building Virtual Worlds for Informal Science Learning (SciCentr and SciFair) in the Active Worlds Educational Universe (AWEDU)Margaret Corbit. 21-26 [doi]
- ETOILE - An Environment for Team, Organizational and Individual Learning in EmergenciesRalf Dörner, Paul Grimm. 27-34 [doi]
- Collaborating in 3D Virtual Environments: A Synchronous ArchitectureShervin Shirmohammadi, Nicolas D. Georganas. 35-42 [doi]
- Should Users Inhabit Visualizations?Claire Knight, Malcolm Munro. 43-50 [doi]
- Experiments in Information Visualization Using 3D Metaphoric WorldsCristina Russo Dos Santos, Pascal Gros, Pierre Abel, Didier Loisel, N. Trichaud, J. P. Paris. 51-58 [doi]
- Abrose: An Adaptive Multi-Agent Tool for Electronic CommerceJo Link-Pezet, Pierre Glize, Marie Pierre Gleizes. 59-66 [doi]
- DEMOIR: A Hybrid Architecture for Expertise Modeling and Recommender SystemsDawit Yimam, Alfred Kobsa. 67-74 [doi]
- Position Paper on Integrated Broadband Environment for Personalized TV Experience (IBEX)Yoshihisa Gonno, Fumihiko Nishio, Yasuaki Yamagishi, Tomohiro Tsunoda. 75-78 [doi]
- Workshop on Evaluating Collaborative Enterprises - Workshop ReportAmy J. Knutilla, Michelle Potts Steves, Robert H. Allen. 79-85 [doi]
- A Review of Groupware EvaluationsDavid Pinelle, Carl Gutwin. 86-91 [doi]
- Techniques for Evaluating Collaborative ToolkitsPrasun Dewan. 92-97 [doi]
- The Mechanics of Collaboration: Developing Low Cost Usability Evaluation Methods for Shared WorkspacesCarl Gutwin, Saul Greenberg. 98-103 [doi]
- CollabLogger: A Tool for Visualizing Groups at WorkEmile L. Morse, Michelle Potts Steves. 104-109 [doi]
- An Evaluation and Comparison of the Industrial and Educational Usage of CSCW within the Design ProcessAvril I. Thomson, Stephen P. MacGregor, W. J. Ion. 110-111 [doi]
- Towards an Evaluation Methodology for the Development of Research-Oriented Virtual CommunitiesJanet Ho, Monica M. C. Schraefel, Mark H. Chignell. 112-117 [doi]
- Developing and Evaluating Collaborative Engineering StudiosJonathan Sevy, Vera Zaychik, Thomas T. Hewett, William C. Regli. 118-123 [doi]
- A Method to Design Process Architecture in a Distributed Product Realization EnvironmentAngran Xiao, Janet K. Allen, David W. Rosen, Farrokh Mistree. 124-129 [doi]
- Evaluation Challenges for a Federation of Heterogeneous Information Providers: The Case of NASA s Earth Science Information PartnershipsCatherine Plaisant, Anita Komlodi, Francis Lindsay. 130-138 [doi]
- Summary Report on Enterprise Security WorkshopWu Wen, Yahya Y. Al-Salqan. 139-140 [doi]
- Reducing Software Security Risk through an Integrated ApproachDavid P. Gilliam, John C. Kelly, Matt Bishop. 141-146 [doi]
- IPsec-WIT: The NIST IPsec Web-Based Interoperability Test SystemRob Glenn, Sheila Frankel, Doug Montgomery. 147-152 [doi]
- Walking the Web of TrustGermano Caronni. 153-158 [doi]
- Tapping Alert ProtocolGookwhan Ahn, Kwangjo Kim, Hee Yong Youn. 159-164 [doi]
- Anomaly Detection Using Visualization and Machine LearningFumio Mizoguchi. 165-170 [doi]
- Initialization Vector Attacks on the IPsec Protocol SuiteChristopher B. McCubbin, Ali Aydin Selçuk, Deepinder P. Sidhu. 171-175 [doi]
- Server-Assisted Generation of a Strong Secret from a PasswordWarwick Ford, Burton S. Kaliski Jr.. 176-180 [doi]
- A Delayed Commitment Scheme to Enhance Public Key Certificate Based ProtocolsWu Wen. 181-182 [doi]
- Secure Self-Certified COTSMourad Debbabi, E. Giasson, Béchir Ktari, F. Michaud, Nadia Tawbi. 183-188 [doi]
- On the Implementation of a Stand-Alone Java(tm) Bytecode VerifierFrédéric Painchaud, Mourad Debbabi. 189-194 [doi]
- UML-Based Representation of Role-Based Access ControlMichael E. Shin, Gail-Joon Ahn. 195-200 [doi]
- Privacy-Enhanced Access Control by SPKI and Its Application to Web ServerTakamichi Saito, Kentaro Umesawa, Hiroshi G. Okuno. 201-206 [doi]
- Secure Multicast Software DeliveryLin Han, Nahid Shahmehri. 207-212 [doi]
- EWS-A Case Study on Access Control in Workflow SystemsÅsa Hagström, Viiveke Fåk, Mark Vandenwauver. 213-218 [doi]
- A Framework for Secure Enterprise ComputingMyong H. Kang, Judith N. Froscher. 219-220 [doi]
- Towards Secure e-ServicesClaudiu Duma, Almut Herzog, Nahid Shahmehri. 221-224 [doi]
- Report On Major Themes and Issues Arising from the WorkshopKirstie L. Bellman, Christopher Landauer, Robert Tolksdorf, Alois Ferscha. 225-229 [doi]
- A Coordination Infrastructure for Agent-based Internet ApplicationsEnrico Denti, Andrea Omicini. 230-235 [doi]
- On the Design of a Mobile Agent Web for Supporting Virtual EnterprisesA. T. M. Aerts, Nicolae B. Szirbik, Dieter K. Hammer, Jan Goossenaerts, Hans Wortmann. 236-241 [doi]
- Applications of XML and Customizable Components in Building Virtual Places on the WebLukasz Beca. 242-247 [doi]
- Coordinating Work on the Web with WorkspacesRobert Tolksdorf. 248-253 [doi]
- Integrating XML and Object-Based Programming for Distributed CollaborationVassil Roussev, Prasun Dewan, Naveen Koorakula, Sriram Sellappa. 254-259 [doi]
- Distributed Collaborative Design and Manufacturability Assessment for Extended Enterprise in XML-Based Agent SystemsJoe Y. Shiau, Svetan M. Ratchev, George Valtchanov. 260-265 [doi]
- A Web Infrastructure for People and Agent Interaction and CollaborationGiacomo Cabri, Letizia Leonardi, Franco Zambonelli. 266-271 [doi]
- Workspace Awareness in Mobile Virtual TeamsAlois Ferscha. 272-277 [doi]
- Commitment-Based Enhancement of E-Commerce ProtocolsPinar Yolum, Munindar P. Singh. 278-283 [doi]
- A Secure XML/Java-Based Implementation of Auction Services for Complex Resource Allocation ProblemsWolfram Conen, Fredj Dridi, Eckhart Köppen. 284-290 [doi]