Loading [MathJax]/extensions/MathZoom.js
Proceedings Workshop on Information Technology for Virtual Enterprises. ITVE 2001 - Conference Table of Contents | IEEE Xplore
Workshop on Information Technology for Virtual Enterprises (ITVE)

Proceedings Workshop on Information Technology for Virtual Enterprises. ITVE 2001

DOI: 10.1109/ITVE.2001

29-30 Jan. 2001

Proceedings Workshop on Information Technology for Virtual Enterprises. ITVE 2001

Publication Year: 2001,Page:i

Proceedings Workshop on Information Technology for Virtual Enterprises. ITVE 2001

Trust management is an important aspect of information security in an organisation. It involves the complexity of relationships among people, computers and the organisational system. It becomes even more complex in the virtual enterprise environment where cross-organisational activities are involved. The paper presents a new paradigm for establishing trust across multiple organisations for externa...Show More
A virtual enterprise seems to be a feasible solution which can flexibly reorganize virtual structure in order to cope with radically changing market. However, the virtual organization sometimes makes its personnel's fellowship and realistic feeling weaker than ordinary one. Even if the structure is virtual, the enterprise has connection to the real world, i.e., it is required to make products/serv...Show More

Workflow in different styles of Virtual Enterprise

R. Tagg

Publication Year: 2001,Page(s):21 - 28
Cited by: Papers (7) | Patents (1)
Because of the many forms a Virtual Enterprise (VE) can take, there is no single model of what type of approach to workflow management is most appropriate. This paper is based on an analysis of the different types of business practice that lead to the formation of VEs. A number of different workflow scenarios are depicted, and four specific issues are then discussed. The first is the recognition o...Show More
In this paper, we propose an idea of using XML-based active rules for deriving Web views and for defining access control by user access behaviors. The major objective of the proposed method is to reflect author (creator)'s intention about his/her Web data and its link structures. In our ActiveWeb, the view of a Web page including its hyperlinks is changed according to each user's browsing situatio...Show More
In this paper, we propose WISPA (Web Indicator by Sharing Personal Annotations) Framework, which aims at mining useful information from communities on the World Wide Web with sharing personal annotations. In WISPA, annotations assigned to web pages on WWW are highly respected, because personal annotations contain each users' opinions or impressions to web pages, and those annotations can be used a...Show More
XML is a de facto standard for structuring documents and their exchange in electronic forms. However it has many restrictions to represent various information from viewpoints of data-centered applications. Set and tuple constructors are useful for defining data structure, and identities and user views are indispensable for sharing common data, while XML, even with XML Schema, does not support such...Show More
A digital tag is defined to be attached to objects and there are the following two kinds of major functions; (1) tags are only accessible through base objects and there are constraints which should be satisfied to access a tag, (2) tags can be used as paper tags in the real world. In many cases, it cannot exist without objects to be attached. For each object we can define a real or virtual world l...Show More
This paper describes our implementation of a support infrastructure for electronic contracting-an important ingredient of Business-to-Business (B2B) e-commerce. The paper first explains the main benefits of the new generation of Microsoft technologies-Windows Distributed interNet Applications Architecture (DNA) and BizTalk. This is followed by a detailed description of how we take advantage of the...Show More
Dynamic e-business, as envisioned by several industry analysts and corporate leaders, involves the rapid teaming of companies with both familiar and new business partners in pursuit of specific market opportunities. For realizing this new generation business model, the ability to form, operate, and disband virtual enterprises will be the single-most important requirement. These short-lived, opport...Show More

A metamodel for virtual enterprises

I.T. Hawryszkiewycz

Publication Year: 2001,Page(s):91 - 97
Cited by: Papers (3) | Patents (1)
Virtual enterprises are characterized by their dynamic nature and transient work arrangements. This in turn requires computer support systems that go beyond workflow systems to provide support for process emergence and transient team members in such enterprises. Such support systems must be based on a metamodel that is sufficiently powerful to describe virtual work arrangements and present an inte...Show More
Non-hierarchical Regional Production Networks are the vision of a Virtual Enterprise (VE) model followed in a collaborative research project, that has been launched in January 2000 at the Chemnitz University of Technology. The aim of the project is to develop a model that makes small and medium sized enterprises in a region as competitive as large-scale companies. A cooperation of various compleme...Show More
The ubiquity of the WWW offers far reaching opportunities for emerging Web-based applications based on service invocations. Although network-centric technologies will make the diverse services easily accessible via the Web, the development of e-commerce services (e-services) and networked services which share existing e-services is still an ad-hoc, very demanding, and time consuming task. We propo...Show More

Extending support for contracts in ebXML

J. Cole;Z. Milosevic

Publication Year: 2001,Page(s):119 - 127
We describe our proposal for extending the current ebXML standard to provide more comprehensive support for electronic contracts. We first present the current status of major B2B initiatives, focusing on their support for electronic contracts. Having found the ebXML meta-model to provide a suitable contractual foundation, we examine the full extent of the requirements for supporting electronic con...Show More
Web mining can be classified into two categories, Web access log mining and Web structure mining. We performed association rule mining and sequence pattern mining against the access log which was accumulated at NTT Software Mobile Info Search portal site. The detailed Web log mining process and the rules we derived are reported. The parallel association rule mining is explored on a large scale PC ...Show More
This paper reports on asynchronous coordination of a virtual team in a virtual enterprise. It confronts two approaches: explicit coordination based on explicit process modeling, and implicit coordination, based on group awareness, to finally conclude that a good coordination is a subtle mixture of both approaches. For each approach and for the combination of both, requirements and design criteria ...Show More

Author index

Publication Year: 2001,Page(s):143 - 143