| 000 | 07405nam a22005895i 4500 | ||
|---|---|---|---|
| 001 | 978-3-642-16934-2 | ||
| 003 | DE-He213 | ||
| 005 | 20140220084550.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 101105s2010 gw | s |||| 0|eng d | ||
| 020 |
_a9783642169342 _9978-3-642-16934-2 |
||
| 024 | 7 |
_a10.1007/978-3-642-16934-2 _2doi |
|
| 050 | 4 | _aTK5105.5-5105.9 | |
| 072 | 7 |
_aUKN _2bicssc |
|
| 072 | 7 |
_aCOM075000 _2bisacsh |
|
| 082 | 0 | 4 |
_a004.6 _223 |
| 100 | 1 |
_aMeersman, Robert. _eeditor. |
|
| 245 | 1 | 0 |
_aOn the Move to Meaningful Internet Systems: OTM 2010 _h[electronic resource] : _bConfederated International Conferences: CoopIS, IS, DOA and ODBASE, Hersonissos, Crete, Greece, October 25-29, 2010, Proceedings, Part I / _cedited by Robert Meersman, Tharam Dillon, Pilar Herrero. |
| 264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2010. |
|
| 300 |
_aXXII, 703p. 230 illus. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v6426 |
|
| 505 | 0 | _aOn the Move 2010 Keynotes -- OTM’10 Keynote -- OTM’10 Keynote -- COOPIS’10 Keynote -- Cooperative Information Systems (CoopIS) International Conference 2010 -- COOPIS’10 - PC Co-chairs Message -- Coopis Keynote Paper -- Configurable Services in the Cloud: Supporting Variability While Enabling Cross-Organizational Process Mining -- Process Models and Management -- A Process View Framework for Artifact-Centric Business Processes -- Monitoring Unmanaged Business Processes -- Fast Business Process Similarity Search with Feature-Based Similarity Estimation -- Quality Assessment of Business Process Models Based on Thresholds -- Merging Business Process Models -- Compliant Business Process Design Using Refinement Layers -- COMPRO: A Methodological Approach for Business Process Contextualisation -- Reducing Exception Handling Complexity in Business Process Modeling and Implementation: The WED-Flow Approach -- Modeling of Cooperation -- Continuous Monitoring in Evolving Business Networks -- Collaborative Coordination of Activities with Temporal Dependencies -- Generic Algorithms for Consistency Checking of Mutual-Exclusion and Binding Constraints in a Business Process Context -- Services Computing -- Collaborative Filtering Technique for Web Service Recommendation Based on User-Operation Combination -- Policy-Based Attestation of Service Behavior for Establishing Rigorous Trust -- Collecting, Annotating, and Classifying Public Web Services -- Managing Conflict of Interest in Service Composition -- Modelling and Automated Composition of User-Centric Services -- Coordinating Services for Accessing and Processing Data in Dynamic Environments -- Information Processing and Management -- The Roles of Reliability and Reputation in Competitive Multi Agent Systems -- Multilayer Superimposed Information for Collaborative Annotation in Wikis -- Supporting Complex Changes in Evolving Interrelated Web Databanks -- Workflow ART -- A Behavioral Similarity Measure between Labeled Petri Nets Based on Principal Transition Sequences -- Efficient and Accurate Retrieval of Business Process Models through Indexing -- The Biconnected Verification of Workflow Nets -- Business Process Scheduling with Resource Availability Constraints -- Achieving Recovery in Service Composition with Assurance Points and Integration Rules -- Business Protocol Adaptation for Flexible Chain Management -- Business Process Monitoring with BPath -- Human-Based Cooperative Systems -- CoMaP: A Cooperative Overlay-Based Mashup Platform -- Composing Near-Optimal Expert Teams: A Trade-Off between Skills and Connectivity -- Complementarity in Competence Management: Framework and Implementation -- Scalable XML Collaborative Editing with Undo -- A Cooperative Approach to View Selection and Placement in P2P Systems -- Ontology and Workflow Challenges -- Satisfaction and Coherence of Deadline Constraints in Inter-Organizational Workflows -- An Ontological Approach for Semantic Annotation of Supply Chain Process Models -- Defining Process Performance Indicators: An Ontological Approach -- Peer Rewiring in Semantic Overlay Networks under Churn -- International Symposium on Information Security (IS) International Conference 2010 -- IS’10 - PC Co-chairs Message -- Access Control, Authentication and Policies -- Mutual Preimage Authentication for Fast Handover in Enterprise Networks -- Supporting Role Based Provisioning with Rules Using OWL and F-Logic -- Using Real Option Thinking to Improve Decision Making in Security Investment -- Secure Architectures -- Context Sensitive Privacy Management in a Distributed Environment -- Semantic Attestation of Node Integrity in Overlays -- Applicability of Security Patterns -- Cryptography -- Leakage Quantification of Cryptographic Operations. | |
| 520 | _aThe two-volume set of LNCS 6426/6427 constitutes the refereed proceedings of 3 confederated international conferences on CoopIS (Cooperative Information Systems), DOA (Distributed Objects and Applications) and ODBASE (Ontologies, DataBases and Applications of SEmantics). These conferences were held in October 2009 in Greece, in Hersonissos on the island of Crete. CoopIS is covering the applications of technologies in an enterprise context as workflow systems and knowledge management. DOA is covering the relevant infrastructure-enabling technologies and finally, OSBASe is covering WEB semantics, XML databases and ontologies. The 83 revised full papers presented together with 3 keynote talks were carefully reviewed and selected from a total of 223 submissions. Corresponding to the OTM main conferences the papers are organized in topical sections on process models and management, modeling of cooperation, services computing, information processing and management, human-based cooperative systems, ontology and workflow challenges, access control, authentication and policies, secure architectures, cryptography, data storage and processing, transaction and event management, virtualization performance, risk and scalability, cloud and distributed system security, reactivity and semantic data, ontology mapping and semantic similarity, domain specific ontologies. | ||
| 650 | 0 | _aComputer science. | |
| 650 | 0 | _aComputer Communication Networks. | |
| 650 | 0 | _aSoftware engineering. | |
| 650 | 0 | _aComputer software. | |
| 650 | 0 | _aInformation systems. | |
| 650 | 0 | _aArtificial intelligence. | |
| 650 | 0 | _aInformation Systems. | |
| 650 | 1 | 4 | _aComputer Science. |
| 650 | 2 | 4 | _aComputer Communication Networks. |
| 650 | 2 | 4 | _aSoftware Engineering. |
| 650 | 2 | 4 | _aInformation Systems Applications (incl.Internet). |
| 650 | 2 | 4 | _aArtificial Intelligence (incl. Robotics). |
| 650 | 2 | 4 | _aAlgorithm Analysis and Problem Complexity. |
| 650 | 2 | 4 | _aManagement of Computing and Information Systems. |
| 700 | 1 |
_aDillon, Tharam. _eeditor. |
|
| 700 | 1 |
_aHerrero, Pilar. _eeditor. |
|
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9783642169335 |
| 830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v6426 |
|
| 856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-16934-2 |
| 912 | _aZDB-2-SCS | ||
| 912 | _aZDB-2-LNC | ||
| 999 |
_c112880 _d112880 |
||