Default Cover Image

International MCETECH Conference on e-Technologies

Jan. 23 2008 to Jan. 25 2008

ISBN: 978-0-7695-3082-6

Table of Contents

Papers
Conference organizationFreely available from IEEE.pp. xii
Papers
[Roster]Freely available from IEEE.pp. 264
Papers
Program CommitteeFreely available from IEEE.pp. xi
Papers
Table of contentsFreely available from IEEE.pp. v-vii
[Copyright notice]Freely available from IEEE.pp. iv-iv
Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
Message du Pr?sident du Congr?Freely available from IEEE.pp. viii
Papers
Message from the Conference ChairFreely available from IEEE.pp. ix
Papers
Message from the Program Committee Co-chairsFreely available from IEEE.pp. x
Papers
Modelling the Interaction of Distributed Systems as ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 16-24
Papers
Human Workflows via Document-Driven Process ChoreographyFull-text access may be available. Sign in or learn about subscription options.pp. 25-33
Papers
Towards Adaptability Support in Collaborative Business ProcessesFull-text access may be available. Sign in or learn about subscription options.pp. 34-45
Papers
Formal Modeling for Security Behavior Analysis of Computer SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 49-59
Papers
A Model of Trusted Data Collection for Knowledge Discovery in B2B NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 60-69
Papers
Anonymous Credentials for Privacy-Preserving E-learningFull-text access may be available. Sign in or learn about subscription options.pp. 70-80
Papers
Understanding and Countering Insider Threats in Software DevelopmentFull-text access may be available. Sign in or learn about subscription options.pp. 81-90
Papers
Strategies for Cross-Organizational Service CompositionFull-text access may be available. Sign in or learn about subscription options.pp. 93-103
Papers
Signature-Based Composition of Web ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 104-115
Papers
Failure Semantics in a SOA EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 116-121
Papers
Design and Implementation of the Pervaho Middleware for Mobile Context-Aware ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 125-135
Papers
Contextualized Linguistic Matching for Heterogeneous Data Source IntegrationFull-text access may be available. Sign in or learn about subscription options.pp. 136-147
Papers
Recommendation Quality Evolution Based on Neighbors DiscriminationFull-text access may be available. Sign in or learn about subscription options.pp. 148-153
Papers
Ontology Learning from Text Using Relational Concept AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 154-163
Papers
NetSim: a Simulation and Visualization Software for Information Network ModelingFull-text access may be available. Sign in or learn about subscription options.pp. 167-177
Papers
Towards a Knowledge-Base for Building Complex, Proactive and Service-Oriented E-negotiation SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 178-189
Papers
Issues for IT Governance in a Large Not-for-Profit Organization: A Case StudyFull-text access may be available. Sign in or learn about subscription options.pp. 193-202
Papers
Public-Private Partnership in e-Government: A Case ImplementationFull-text access may be available. Sign in or learn about subscription options.pp. 203-211
Papers
Learning to Trust the Crowd: Some Lessons from WikipediaFull-text access may be available. Sign in or learn about subscription options.pp. 212-216
Papers
Assessing the Applicability of Use Case Maps for Business Process and Workflow DescriptionFull-text access may be available. Sign in or learn about subscription options.pp. 219-222
Papers
Implementing ERP in SMEs: Towards an Ontology Supporting Managerial DecisionsFull-text access may be available. Sign in or learn about subscription options.pp. 223-226
Papers
Proposition of a Method for the Development and Deployment of e-Government Systems that Emphasize Good GovernanceFull-text access may be available. Sign in or learn about subscription options.pp. 227-231
Papers
The Security Requirements Behavior Model for Trustworthy SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 235-238
Papers
Trust and Autonomic SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 239-242
Papers
SecurityViews: A Dynamic Security for View-Oriented ProgrammingFull-text access may be available. Sign in or learn about subscription options.pp. 243-246
Papers
Considerations of Service Assembly Based on the Analysis of Data Flows between ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 249-252
Papers
Behavioral Interface Conformance Checking for WS-BPEL ProcessesFull-text access may be available. Sign in or learn about subscription options.pp. 253-257
Papers
Practical Load Distribution Models for Web Services Based environmentsFull-text access may be available. Sign in or learn about subscription options.pp. 258-261
Papers
Author IndexFreely available from IEEE.pp. 262
Showing 40 out of 40