Department of Computer Science and Technology

2004

 
Alan S. Abrahams, David M. Eyers, and Jean M. Bacon. An event-based paradigm for e-commerce application specification and execution. In Proceedings of the 7th International Conference on Electronic Commerce Research (ICECR7), pages 181-192, Dallas, Texas, June 2004. [ bib | www: | .pdf ]
 
Alan S. Abrahams, David M. Eyers, and Jean M. Bacon. Regulating Web-based Communities. In Proceedings of the IADIS International Conference on Web Based Communities (WBC2004), Lisbon, Portugal, March 2004. [ bib | .pdf ]
 
Alan S. Abrahams, David M. Eyers, and Jean M. Bacon. Towards a benchmark for e-contract checking and monitoring. In Proceedings of the 7th International Conference on Electronic Commerce Research (ICECR7), pages 246-252, Dallas, Texas, June 2004. [ bib | www: | .pdf ]
 
Alan S. Abrahams, Firass Hathout, Balaji Padmanabhan, and Andreas Staubli. Profit-Optimal Model and Target Size Selection with Variable Marginal Costs. Working Paper Series 04-02-02, Wharton Business School, Philadelphia, Pennsylvania, February 2004. [ bib | .pdf ]
 
A. Beugnard, L. Fiege, R. Filman, E. Jul, S. Sadou, and Eiko Yoneki. Communication Abstractions for Distributed Systems. In Journal of Object-Oriented Technology, Workshop Reader ECOOP'2004, Oslo, Norway, LNCS, Springer-Verlag, October 2004. [ bib ]
 
Daniel Cvrcek. Dynamics of reputation. In Proceedings of the 9th Nordic Workshop on Secure IT-systems (NordSec 2004), Helsinki, Finland, November 2004. [ bib | .pdf ]
 
Daniel Cvrcek and Vashek Matyas. Privacy - what do you mean? In Proceedings of the Ubicomp Privacy Workshop, Nottingham, UK, September 2004. [ bib ]
 
Daniel Cvrcek and Vashek Matyas. Pseudonymity in the light of evidence-based trust. In Proceedings of the Security Protocols Workshop, Cambridge, UK, May 2004. [ bib | .pdf ]
 
Nathan Dimmock, András Belokosztolszki, David Eyers, Jean Bacon, and Ken Moody. Using trust and risk in role-based access control policies. In Proceedings of Symposium on Access Control Models and Technologies, pages 156-162. ACM, ACM, June 2004. [ bib | .ps.gz | .pdf ]
 
Nathan Dimmock and Ian Maddison. Peer-to-peer collaborative spam detection. ACM Crossroads, 11(2), December 2004. [ bib ]
 
J. Newman, H. Lowe, S. Neely, X. Gong, D. Eyers, and J. Bacon. A tutorial task and tertiary courseware model for collaborative learning communities. Electronic Journal on E-Learning, 2(1):159-166, March 2004. [ bib | http ]
 
Peter R Pietzuch, Brian Shand, and Jean Bacon. Composite event detection as a generic middleware extension. IEEE Network, 18(1):44-55, February 2004. [ bib | .pdf ]
 
Jean-Marc Seigneur, Nathan Dimmock, Ciará Bryce, and Christian Damsgaard Jensen. Combating Spam with TEA, Trustworthy Email Addresses. In Proceedings of the Second Annual Conference on Privacy, Security and Trust (PST'04), Fredericton, New Brunswick, Canada, October 2004. [ bib ]
 
Brian Shand, Nathan Dimmock, and Jean Bacon. Trust for ubiquitous, transparent collaboration. Wireless Networks, 10(6):711-721, 2004. [ bib | http ]
 
Eiko Yoneki and Jean Bacon. An Adaptive Approach to Content-Based Subscription in Mobile Ad Hoc Networks. In Proc. 2nd IEEE International Conference on Pervasive Computing and Communications, Workshop on Mobile Peer-to-Peer Computing, pages 92-97, Orlando, USA, March 2004. [ bib | .pdf ]
 
Eiko Yoneki and Jean Bacon. Content Based Routing with On-Demand Multicast. In Proc. 24th IEEE International Conference on Distributed Computing Systems, Workshop on Wireless Ad Hoc Networking (ICDCS - WWAN 2004), pages 788-793, Tokyo, Japan, March 2004. [ bib | .pdf ]
 
Eiko Yoneki and Jean Bacon. Event Order with Interval Timestamp in Event Correlation Service over Wireless Ad Hoc Networks. In Companion Proc. 5th ACM/IFIP/USENIX International Conference on Middleware, page 331, Toronto, Canada, October 2004. [ bib | .pdf ]
 
Eiko Yoneki and Jean Bacon. Towards a Peer-to-Peer Event Broker Grid in a Hybrid Network Environment. In International Symposium on Distributed Objects and Applications, Workshop on Grid Computing and its Application to Data Analysis, LNCS 3292, pages 198-210, Cyprus, October 2004. [ bib | .pdf ]

This file has been generated by bibtex2html 1.87.