On the Move to Meaningful Internet Systems: OTM 2010 [recurso electrónico] : Confederated International Conferences: CoopIS, IS, DOA and ODBASE, Hersonissos, Crete, Greece, October 25-29, 2010, Proceedings, Part I / edited by Robert Meersman, Tharam Dillon, Pilar Herrero.

Por: Meersman, Robert [editor.]Colaborador(es): Dillon, Tharam [editor.] | Herrero, Pilar [editor.] | SpringerLink (Online service)Tipo de material: TextoTextoSeries Lecture Notes in Computer Science ; 6426Editor: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010Descripción: XXII, 703p. 230 illus. online resourceTipo de contenido: text Tipo de medio: computer Tipo de portador: online resourceISBN: 9783642169342Tema(s): Computer science | Computer Communication Networks | Software engineering | Computer software | Information systems | Artificial intelligence | Information Systems | Computer Science | Computer Communication Networks | Software Engineering | Information Systems Applications (incl.Internet) | Artificial Intelligence (incl. Robotics) | Algorithm Analysis and Problem Complexity | Management of Computing and Information SystemsFormatos físicos adicionales: Printed edition:: Sin títuloClasificación CDD: 004.6 Clasificación LoC:TK5105.5-5105.9Recursos en línea: Libro electrónicoTexto
Contenidos:
On the Move 2010 Keynotes -- OTM’10 Keynote -- OTM’10 Keynote -- COOPIS’10 Keynote -- Cooperative Information Systems (CoopIS) International Conference 2010 -- COOPIS’10 - PC Co-chairs Message -- Coopis Keynote Paper -- Configurable Services in the Cloud: Supporting Variability While Enabling Cross-Organizational Process Mining -- Process Models and Management -- A Process View Framework for Artifact-Centric Business Processes -- Monitoring Unmanaged Business Processes -- Fast Business Process Similarity Search with Feature-Based Similarity Estimation -- Quality Assessment of Business Process Models Based on Thresholds -- Merging Business Process Models -- Compliant Business Process Design Using Refinement Layers -- COMPRO: A Methodological Approach for Business Process Contextualisation -- Reducing Exception Handling Complexity in Business Process Modeling and Implementation: The WED-Flow Approach -- Modeling of Cooperation -- Continuous Monitoring in Evolving Business Networks -- Collaborative Coordination of Activities with Temporal Dependencies -- Generic Algorithms for Consistency Checking of Mutual-Exclusion and Binding Constraints in a Business Process Context -- Services Computing -- Collaborative Filtering Technique for Web Service Recommendation Based on User-Operation Combination -- Policy-Based Attestation of Service Behavior for Establishing Rigorous Trust -- Collecting, Annotating, and Classifying Public Web Services -- Managing Conflict of Interest in Service Composition -- Modelling and Automated Composition of User-Centric Services -- Coordinating Services for Accessing and Processing Data in Dynamic Environments -- Information Processing and Management -- The Roles of Reliability and Reputation in Competitive Multi Agent Systems -- Multilayer Superimposed Information for Collaborative Annotation in Wikis -- Supporting Complex Changes in Evolving Interrelated Web Databanks -- Workflow ART -- A Behavioral Similarity Measure between Labeled Petri Nets Based on Principal Transition Sequences -- Efficient and Accurate Retrieval of Business Process Models through Indexing -- The Biconnected Verification of Workflow Nets -- Business Process Scheduling with Resource Availability Constraints -- Achieving Recovery in Service Composition with Assurance Points and Integration Rules -- Business Protocol Adaptation for Flexible Chain Management -- Business Process Monitoring with BPath -- Human-Based Cooperative Systems -- CoMaP: A Cooperative Overlay-Based Mashup Platform -- Composing Near-Optimal Expert Teams: A Trade-Off between Skills and Connectivity -- Complementarity in Competence Management: Framework and Implementation -- Scalable XML Collaborative Editing with Undo -- A Cooperative Approach to View Selection and Placement in P2P Systems -- Ontology and Workflow Challenges -- Satisfaction and Coherence of Deadline Constraints in Inter-Organizational Workflows -- An Ontological Approach for Semantic Annotation of Supply Chain Process Models -- Defining Process Performance Indicators: An Ontological Approach -- Peer Rewiring in Semantic Overlay Networks under Churn -- International Symposium on Information Security (IS) International Conference 2010 -- IS’10 - PC Co-chairs Message -- Access Control, Authentication and Policies -- Mutual Preimage Authentication for Fast Handover in Enterprise Networks -- Supporting Role Based Provisioning with Rules Using OWL and F-Logic -- Using Real Option Thinking to Improve Decision Making in Security Investment -- Secure Architectures -- Context Sensitive Privacy Management in a Distributed Environment -- Semantic Attestation of Node Integrity in Overlays -- Applicability of Security Patterns -- Cryptography -- Leakage Quantification of Cryptographic Operations.
En: Springer eBooksResumen: and ontologies,and CoopIS(CooperativeInformationSystems,since 1993),c- ering the application of these technologies in an enterprise context through, for example,work?owsystemsandknowledgemanagement. In2007theISworkshop (Information Security) was added to try cover also the speci?c issues of security in complex Internet-based information systems. Each of the main conferences speci?cally seeks high-quality contributions and encourages researchers to treat their respective topics within a framework that incorporates jointly (a) theory, (b) conceptual design and development, and (c) applications, in particular case studies and industrial solutions. Following and expanding the model created in 2003, we again solicited and selected quality workshop proposals to complement the more“archival”nature of the main conferences with research results in a number of selected and more “avant-garde”areas related to the general topic of Web-based distributed c- puting. For instance, the so-called Semantic Web has given rise to several novel research areas combining linguistics, information systems technology and ar- ?cial intelligence, such as the modeling of (legal) regulatory systems and the ubiquitous nature of their usage. We were glad to see that seven of our s- cessful earlier workshops (ADI, EI2N, SWWS, ORM, OnToContent, MONET, ISDE) re-appearedin 2010 with, in some cases, a fourth or even ?fth edition, - ten in alliance with other older or newly emerging workshops,and that no fewer than four brand-new independent workshops could be selected from proposals and hosted: AVYTAT, DATAVIEW, P2PCDVE, SeDeS.
Star ratings
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca actual Colección Signatura Copia número Estado Fecha de vencimiento Código de barras
Libro Electrónico Biblioteca Electrónica
Colección de Libros Electrónicos TK5105.5 -5105.9 (Browse shelf(Abre debajo)) 1 No para préstamo 375428-2001

On the Move 2010 Keynotes -- OTM’10 Keynote -- OTM’10 Keynote -- COOPIS’10 Keynote -- Cooperative Information Systems (CoopIS) International Conference 2010 -- COOPIS’10 - PC Co-chairs Message -- Coopis Keynote Paper -- Configurable Services in the Cloud: Supporting Variability While Enabling Cross-Organizational Process Mining -- Process Models and Management -- A Process View Framework for Artifact-Centric Business Processes -- Monitoring Unmanaged Business Processes -- Fast Business Process Similarity Search with Feature-Based Similarity Estimation -- Quality Assessment of Business Process Models Based on Thresholds -- Merging Business Process Models -- Compliant Business Process Design Using Refinement Layers -- COMPRO: A Methodological Approach for Business Process Contextualisation -- Reducing Exception Handling Complexity in Business Process Modeling and Implementation: The WED-Flow Approach -- Modeling of Cooperation -- Continuous Monitoring in Evolving Business Networks -- Collaborative Coordination of Activities with Temporal Dependencies -- Generic Algorithms for Consistency Checking of Mutual-Exclusion and Binding Constraints in a Business Process Context -- Services Computing -- Collaborative Filtering Technique for Web Service Recommendation Based on User-Operation Combination -- Policy-Based Attestation of Service Behavior for Establishing Rigorous Trust -- Collecting, Annotating, and Classifying Public Web Services -- Managing Conflict of Interest in Service Composition -- Modelling and Automated Composition of User-Centric Services -- Coordinating Services for Accessing and Processing Data in Dynamic Environments -- Information Processing and Management -- The Roles of Reliability and Reputation in Competitive Multi Agent Systems -- Multilayer Superimposed Information for Collaborative Annotation in Wikis -- Supporting Complex Changes in Evolving Interrelated Web Databanks -- Workflow ART -- A Behavioral Similarity Measure between Labeled Petri Nets Based on Principal Transition Sequences -- Efficient and Accurate Retrieval of Business Process Models through Indexing -- The Biconnected Verification of Workflow Nets -- Business Process Scheduling with Resource Availability Constraints -- Achieving Recovery in Service Composition with Assurance Points and Integration Rules -- Business Protocol Adaptation for Flexible Chain Management -- Business Process Monitoring with BPath -- Human-Based Cooperative Systems -- CoMaP: A Cooperative Overlay-Based Mashup Platform -- Composing Near-Optimal Expert Teams: A Trade-Off between Skills and Connectivity -- Complementarity in Competence Management: Framework and Implementation -- Scalable XML Collaborative Editing with Undo -- A Cooperative Approach to View Selection and Placement in P2P Systems -- Ontology and Workflow Challenges -- Satisfaction and Coherence of Deadline Constraints in Inter-Organizational Workflows -- An Ontological Approach for Semantic Annotation of Supply Chain Process Models -- Defining Process Performance Indicators: An Ontological Approach -- Peer Rewiring in Semantic Overlay Networks under Churn -- International Symposium on Information Security (IS) International Conference 2010 -- IS’10 - PC Co-chairs Message -- Access Control, Authentication and Policies -- Mutual Preimage Authentication for Fast Handover in Enterprise Networks -- Supporting Role Based Provisioning with Rules Using OWL and F-Logic -- Using Real Option Thinking to Improve Decision Making in Security Investment -- Secure Architectures -- Context Sensitive Privacy Management in a Distributed Environment -- Semantic Attestation of Node Integrity in Overlays -- Applicability of Security Patterns -- Cryptography -- Leakage Quantification of Cryptographic Operations.

and ontologies,and CoopIS(CooperativeInformationSystems,since 1993),c- ering the application of these technologies in an enterprise context through, for example,work?owsystemsandknowledgemanagement. In2007theISworkshop (Information Security) was added to try cover also the speci?c issues of security in complex Internet-based information systems. Each of the main conferences speci?cally seeks high-quality contributions and encourages researchers to treat their respective topics within a framework that incorporates jointly (a) theory, (b) conceptual design and development, and (c) applications, in particular case studies and industrial solutions. Following and expanding the model created in 2003, we again solicited and selected quality workshop proposals to complement the more“archival”nature of the main conferences with research results in a number of selected and more “avant-garde”areas related to the general topic of Web-based distributed c- puting. For instance, the so-called Semantic Web has given rise to several novel research areas combining linguistics, information systems technology and ar- ?cial intelligence, such as the modeling of (legal) regulatory systems and the ubiquitous nature of their usage. We were glad to see that seven of our s- cessful earlier workshops (ADI, EI2N, SWWS, ORM, OnToContent, MONET, ISDE) re-appearedin 2010 with, in some cases, a fourth or even ?fth edition, - ten in alliance with other older or newly emerging workshops,and that no fewer than four brand-new independent workshops could be selected from proposals and hosted: AVYTAT, DATAVIEW, P2PCDVE, SeDeS.

19

Con tecnología Koha