Narrow your search

Library

ULB (28)

KU Leuven (27)

ULiège (26)

UCLouvain (11)

UGent (3)

Hogeschool Gent (2)

LUCA School of Arts (2)

VUB (2)

UAntwerpen (1)


Resource type

book (29)


Language

English (29)


Year
From To Submit

2002 (29)

Listing 1 - 10 of 29 << page
of 3
>>
Sort by
ECSCW 2001 : proceedings of the Seventh European Conference on Computer Supported Cooperative Work, 16-20 September 2001, Bonn, Germany
Authors: ---
ISBN: 0306480190 0792371623 Year: 2002 Publisher: New York : Kluwer Academic Publishers,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Schmidt and Bannon (1992) introduced the concept of common information space by contrasting it with technical conceptions of shared information: Cooperative work is not facilitated simply by the provisioning of a shared database, but rather requires the active construction by the participants of a common information space where the meanings of the shared objects are debated and resolved, at least locally and temporarily. (Schmidt and Bannon, p. 22) A CIS, then, encompasses not only the information but also the practices by which actors establish its meaning for their collective work. These negotiated understandings of the information are as important as the availability of the information itself: The actors must attempt to jointly construct a common information space which goes beyond their individual personal information spaces. . . . The common information space is negotiated and established by the actors involved. (Schmidt and Bannon, p. 28) This is not to suggest that actors’ understandings of the information are identical; they are simply “common” enough to coordinate the work. People understand how the information is relevant for their own work. Therefore, individuals engaged in different activities will have different perspectives on the same information. The work of maintaining the common information space is the work that it takes to balance and accommodate these different perspectives. A “bug” report in software development is a simple example. Software developers and quality assurance personnel have access to the same bug report information. However, access to information is not sufficient to coordinate their work.

Cyber_ reader : critical writings for the digital era.
Author:
ISBN: 0714840718 Year: 2002 Publisher: London Phaidon

Software quality-ECSQ 2002 : quality connection--7th European Conference, Helsinki, Finland, June 9-13, 2002 : proceedings
Authors: --- ---
ISBN: 3540479848 3540437495 Year: 2002 Publisher: Berlin, Germany ; New York, New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Software professionals and companies live in a new world today. Increasingly complex systems need to be built faster and cheaper. While many of the est- lished approaches in software quality are still valid, the software quality c- munity is going through a paradigm shift that requires a re-assessment of our current method and tool portfolio, as well as creating new and more e?ective solutions. We have selected two themes for this conference to highlight this paradigm shift. Our ?rst theme, “production of attractive and reliable software at Internet speed” sums up the dilemma many software organisations face. In order to be competitive, software should contain advanced features and run reliably – yet it should be developed quickly and cost e?ectively for the right market window. Finding the right balance between these objectives is a critical question that will determine business success in the years to come. Our second theme, “production of software with a dynamic partnership n- work” highlights the current trend of using partnerships and subcontractors as integral players in the software development process. Partnerships sometimes need to be created quickly to respond to a market opportunity, yet the costs and speed of cooperation must be competitive. Di?erent companies have di?erent processes, quality tools and cultures, yet they should cooperate seamlessly for the best result.

Product Focused Software Process Improvement : 4th International Conference, PROFES 2002 Rovaniemi, Finland, December 9-11, 2002, Proceedings
Authors: --- ---
ISBN: 3540362096 3540002340 Year: 2002 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

On behalf of the PROFES organizing committee we would like to welcome you to the 4th International Conference on Product Focused Software Process Improvement (PROFES 2002) in Rovaniemi, Finland. The conference was held on the Arctic Circle in exotic Lapland under the Northern Lights just before Christmas time, when Kaamos (the polar night is known in Finnish as ”Kaamos”) shows its best characteristics. PROFES has established itself as one of the recognized international process improvement conferences. Despite the current economic downturn, PROFES has attracted a record number of submissions. A total of 70 full papers were submitted and the program committee had a difficult task in selecting the best papers to be presented at the conference. The main theme of PROFES is professional software process improvement (SPI) motivated by product and service quality needs. SPI is facilitated by software process assessment, software measurement, process modeling, and technology transfer. It has become a practical tool for quality software engineering and management. The conference addresses both the solutions found in practice and the relevant research results from academia.

Global networks linked cities
Author:
ISBN: 0415931630 0415931622 9780415931625 9780415931632 Year: 2002 Publisher: New York (N.Y.) : Routledge,

Uncanny Networks : Dialogues with the Virtual Intelligentsia
Author:
ISBN: 0262122510 9780262621878 Year: 2002 Publisher: Cambridge MIT

Loading...
Export citation

Choose an application

Bookmark

Abstract

For Geert Lovink, interviews are imaginative texts that can help to create global, networked discourses not only among different professions but also among different cultures and social groups. Conducting interviews online, over a period of weeks or months, allows the participants to compose documents of depth and breadth, rather than simply snapshots of timely references.The interviews collected in this book are with artists, critics, and theorists who are intimately involved in building the content, interfaces, and architectures of new media. The topics discussed include digital aesthetics, sound art, navigating deep audio space, European media philosophy, the Internet in Eastern Europe, the mixing of old and new in India, critical media studies in the Asia-Pacific region, Japanese techno tribes, hybrid identities, the storage of social movements, theory of the virtual class, virtual and urban spaces, corporate takeover of the Internet, and the role of cyberspace in the rise of nongovernmental organizations.Interviewees included Norbert Bolz, Paulina Borsook, Luchezar Boyadjiev, Kuan-Hsing Chen, Cãlin Dan, Mike Davis, Mark Dery, Kodwo Eshun, Susan George, Boris Groys, Frank Hartmann, Michael Heim, Dietmar Kamper, Zina Kaye, Tom Keenan, Arthur Kroker, Bruno Latour, Marita Liulia, Rafael Lozano-Hemmer, Peter Lunenfeld, Lev Manovich, Mongrel, Edi Muka, Jonathan Peizer, Saskia Sassen, Herbert Schiller, Gayatri Spivak, János Sugár, Ravi Sundaram, Toshiya Ueno, Tjebbe van Tijen, McKenzie Wark, Hartmut Winkler, and Slavoj Zizek.

Keywords

Computer networks --- Computers and civilization. --- Cyberspace. --- Information society. --- Information technology --- Internet --- Social aspects. --- Geert Lovink --- grafische vormgeving --- computers --- websites --- webdesign --- communicatie --- kunst en technologie --- digitale communicatie --- nieuwe media --- internet --- interfaces --- digitale esthetica --- kunsttheorie --- esthetica --- Oost-Europa --- Indië --- India --- Japan --- techno --- virtual reality --- virtuele realiteit --- cyberspace --- Kamper Dietmar --- Bolz Norbert --- Heim Michael --- Zizek Slavoj --- Kroker Arthur --- Bulgarije --- Boyadjiev Luchezar --- Spivak Gayatri --- Manovich Lev --- van Tijen Tjebbe --- Sassen Saskia --- Dery Mark --- Schiller Herbert I. --- Chen Kuan-Hsing --- Peizer Jonathan --- Latour Bruno --- Muka Eduard --- Winkler Hartmut --- Davis Mike --- Finland --- GSM --- themaparken --- Liulia Marita --- Keenan Thomas --- lichamelijkheid --- Groys Boris --- Ueno Toshiya --- Sugar Janos --- George Susan --- Hartmann Frank --- relationele architectuur --- relational architecture --- Lozano-Hemmer Rafael --- Wark McKenzie --- Dan Calin --- Borsook Paulina --- Eshun Kodwo --- 791.5 --- 766.01 --- 7.01 --- 130.2 --- Computers and civilization --- Cyberspace --- Information society --- Schiller Herbert I --- Sociology --- Information superhighway --- Space and time --- Computers --- Telematics --- Civilization and computers --- Civilization --- Social aspects --- Intelligence artificielle --- Sociologie de la communication --- Sociologie de la culture --- Cybernétique

Recent Advances in Intrusion Detection : 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings
Authors: --- --- ---
ISSN: 03029743 ISBN: 3540000208 9783540000204 3540360840 Year: 2002 Volume: 2516 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

On behalf of the program committee, it is our pleasure to present to you the proceedings of the Fifth Symposium on Recent Advances in Intrusion Detection (RAID). Since its ?rst edition in 1998, RAID has established itself as the main annual intrusion detection event, attracting researchers, practitioners, and v- dors from all over the world. The RAID 2002 program committee received 81 submissions (64 full papers and 17 extended abstracts) from 20 countries. This is about 50% more than last year. All submissions were carefully reviewed by at least three program comm- tee members or additional intrusion-detection experts according to the criteria ofscienti?cnovelty,importancetothe?eld,andtechnicalquality.Finalselection took place at a meeting held on May 15–16, 2002, in Oakland, USA. Sixteen full papers were selected for presentation and publication in the conference proc- dings. In addition, three extended abstracts of work in progress were selected for presentation. The program included both fundamental research and practical issues. The seven sessions were devoted to the following topics: anomaly detection, steppi- stonedetection,correlationofintrusion-detectionalarms,assessmentofintrusi- detectionsystems,intrusiontolerance,legalaspects,adaptiveintrusion-detection systems, and intrusion-detection analysis. RAID 2002 also hosted a panel on “Cybercrime,” a topic of major concern for both security experts and the public. Marcus J. Ranum, the founder of Network Flight Recorder, Inc., delivered a keynote speech entitled “Challenges for the Future of Intrusion Detection”.

Keywords

Ordinateurs --- Sécurité informatique --- Accès --- Contrôle --- Computer security --- Computers --- Computer Science --- Engineering & Applied Sciences --- Access control --- Physics. --- Computer science. --- Computer communication systems. --- Operating systems (Computers). --- Data encryption (Computer science). --- Computers and civilization. --- System safety. --- Security Science and Technology. --- Computer Science, general. --- Computer Communication Networks. --- Operating Systems. --- Data Encryption. --- Computers and Society. --- Cryptology. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer operating systems --- Disk operating systems --- Systems software --- Informatics --- Science --- Operating systems --- Civilization and computers --- Civilization --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Safety, System --- Safety of systems --- Systems safety --- Accidents --- Industrial safety --- Systems engineering --- Distributed processing --- Prevention --- Ordinateurs - Accès - Contrôle - Congrès --- Sécurité informatique - Congrès

Security and privacy in digital rights management : ACM CCS-8 workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001 : revised papers
Authors: ---
ISBN: 3540478701 3540436774 Year: 2002 Publisher: Berlin, Heidelberg : Springer-Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The ACM Workshop on Security and Privacy in Digital Rights Management is the ?rst scienti?c workshop with refereed proceedings devoted solely to this topic. The workshop was held in conjunction with the Eighth ACM Conference on Computer and Communications Security (CCS-8) in Philadelphia, USA on November 5, 2001. Digital Rights Management technology is meant to provide end-to-end so- tions for the digital distribution of electronic goods. Sound security and privacy features are among the key requirements for such systems. Fifty papers were submitted to the workshop, quite a success for a ?rst-time workshop. From these 50 submissions, the program committee selected 15 papers for presentation at the workshop. They cover a broad area of relevant techniques, including cryptography, system architecture, and cryptanalysis of existing DRM systems. Three accepted papers are about software tamper resistance, an area about which few scienti?c articles have been published before. Another paper addresses renewability of security measures. Renewability is another important security technique for DRM systems, and I hope we will see more publications about this in the future. I am particularly glad that three papers cover economic and legal aspects of digital distribution of electronic goods. Technical security measures do not exist in a vacuum and their e?ectiveness interacts in a number of ways with the environment for legal enforcement. Deploying security and an- piracy measures adequately requires furthermore a good understanding of the business models that they are designed to support.

Keywords

Computer security --- Privacy, Right of --- Data protection --- Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer security. --- Data encryption (Computer science). --- Computers and civilization. --- Computers. --- Law and legislation. --- Management information systems. --- Computer engineering. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Computer Engineering. --- Legal Aspects of Computing. --- Management of Computing and Information Systems. --- Computers and Society. --- Computers --- Information Systems. --- Cryptology. --- Informatics --- Science --- Cyberspace --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Law and legislation --- Protection --- Security measures --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Civilization and computers --- Civilization --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Design and construction --- Communication systems

Management Technologies for E-Commerce and E-Business Applications : 13th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2002, Montreal, Canada, October 21-23, 2002, Proceedings
Authors: --- --- ---
ISBN: 3540361103 3540000801 Year: 2002 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Electronic data processing --- Electronic commerce --- Computer Science --- Engineering & Applied Sciences --- Distributed processing --- Management --- Computer programs --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Computer science. --- Computer communication systems. --- Operating systems (Computers). --- Computers and civilization. --- Management information systems. --- E-commerce. --- Computer Science. --- e-Commerce/e-business. --- Popular Computer Science. --- Computer Communication Networks. --- Operating Systems. --- Computers and Society. --- Management of Computing and Information Systems. --- Commerce --- Information superhighway --- Information Systems. --- Informatics --- Science --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Operating systems --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Civilization and computers --- Civilization --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Communication systems

Information Security and Privacy : 7th Australian Conference, ACISP 2002 Melbourne, Australia, July 3-5, 2002 Proceedings
Authors: --- ---
ISSN: 03029743 ISBN: 3540438610 9783540438618 3540454500 Year: 2002 Volume: 2384 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Seventh Australasian Conference in Information Security and Privacy (ACISP) was held in Melbourne, 3–5July, 2002. The conference was sponsored by Deakin University and iCORE, Alberta, Canada and the Australian Com- ter Society. The aims of the annual ACISP conferences have been to bring together people working in di?erent areas of computer, communication, and information security from universities, industry, and government institutions. The conferences give the participants the opportunity to discuss the latest developments in the rapidly growing area of information security and privacy. The reviewing process took six weeks and we heartily thank all the m- bers of the program committee and the external referees for the many hours of valuable time given to the conference. The program committee accepted 36 papers from the 94 submitted. From those papers accepted 10 papers were from Australia, 5each from Korea and USA, 4 each from Singapore and Germany, 2 from Japan, and 1 each from The Netherlands, UK, Spain, Bulgaria, and India. The authors of every paper, whether accepted or not, made a valued contribution to the conference. In addition to the contributed papers, we were delighted to have presen- tions from the Victorian Privacy Commissioner, Paul Chadwick, and eminent researchers Professor Hugh Williams, Calgary, Canada, Professor Bimal Roy, ISI, Kolkota, India (whose invited talk was formally referred and accepted by the program committee), and Dr Hank Wolfe from Otago, New Zealand.

Keywords

Computer security --- Data protection --- Privacy, Right of --- Computer science. --- Computer communication systems. --- Operating systems (Computers). --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Management of Computing and Information Systems. --- Operating Systems. --- Computer Communication Networks. --- Algorithm Analysis and Problem Complexity. --- Computers and Society. --- Information Systems. --- Computer software. --- Cryptology. --- Informatics --- Science --- Software, Computer --- Computer systems --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Operating systems --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Foundations --- Distributed processing --- Communication systems --- Computer security - Congresses --- Data protection - Congresses --- Privacy, Right of - Congresses

Listing 1 - 10 of 29 << page
of 3
>>
Sort by