|
|
|
|
LEADER |
07393nam a22005775i 4500 |
001 |
978-3-540-88873-4 |
003 |
DE-He213 |
005 |
20151204150012.0 |
007 |
cr nn 008mamaa |
008 |
100301s2008 gw | s |||| 0|eng d |
020 |
|
|
|a 9783540888734
|9 978-3-540-88873-4
|
024 |
7 |
|
|a 10.1007/978-3-540-88873-4
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.D3
|
072 |
|
7 |
|a UN
|2 bicssc
|
072 |
|
7 |
|a UMT
|2 bicssc
|
072 |
|
7 |
|a COM021000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.74
|2 23
|
245 |
1 |
0 |
|a On the Move to Meaningful Internet Systems: OTM 2008
|h [electronic resource] :
|b OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008, Proceedings, Part II /
|c edited by Robert Meersman, Zahir Tari.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg,
|c 2008.
|
300 |
|
|
|a XXXIII, 646 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 5332
|
505 |
0 |
|
|a Information Security (IS) 2008 International Conference -- IS 2008 PC Co-chairs’ Message -- Intrusion Detection -- Boosting Web Intrusion Detection Systems by Inferring Positive Signatures -- Principal Components of Port-Address Matrices in Port-Scan Analysis -- A Novel Worm Detection Model Based on Host Packet Behavior Ranking -- Information Hiding -- Anonymous Resolution of DNS Queries -- Steganography of VoIP Streams -- TrustMAS: Trusted Communication Platform for Multi-Agent Systems -- Data and Risk Management -- Computing Exact Outcomes of Multi-parameter Attack Trees -- Automatic Generation of Secure Multidimensional Code for Data Warehouses: An MDA Approach -- Trusted Reputation Management Service for Peer-to-Peer Collaboration -- Access Control -- A Model-Driven Approach for the Specification and Analysis of Access Control Policies -- PuRBAC: Purpose-Aware Role-Based Access Control -- Uncle-Share: Annotation-Based Access Control for Cooperative and Social Systems -- Evaluation and Implementation -- Verifying Extended Criteria for the Interoperability of Security Devices -- Generating a Large Prime Factor of p 4±p 2?+?1 in Polynomial Time -- Ontologies, Databases and Applications of Semantics (ODBASE) 2008 International Conference -- ODBASE 2008 PC Co–chairs’ Message -- Keynote -- Artifact-Centric Business Process Models: Brief Survey of Research Results and Challenges -- Invited Papers -- Ten Challenges for Ontology Matching -- Dynamic Labelling Scheme for XML Data Processing -- Real-Time Enterprise Ontology Evolution to Aid Effective Clinical Telemedicine with Text Mining and Automatic Semantic Aliasing Support -- Engineering OODA Systems: Architectures, Applications, and Research Areas -- Semantic Matching and Similarity Measuring -- Approximate Structure-Preserving Semantic Matching -- Ontology-Based Relevance Assessment: An Evaluation of Different Semantic Similarity Measures -- Equivalence of XSD Constructs and Its Exploitation in Similarity Evaluation -- Design, Implementation and Evaluation of a New Semantic Similarity Metric Combining Features and Intrinsic Information Content -- Semantic Searching -- Weighted Ontology for Semantic Search -- RDF Snippets for Semantic Web Search Engines -- Empirical Insights on a Value of Ontology Quality in Ontology-Driven Web Search -- Ontology Development -- Magic Rewritings for Efficiently Processing Reactivity on Web Ontologies -- Mediating and Analyzing Social Data -- Conceptual Synopses of Semantics in Social Networks Sharing Structured Data -- Ontology Maintanence and Evaluation -- Sequential Patterns for Maintaining Ontologies over Time -- Evaluating Automatically a Text Miner for Ontologies: A Catch-22 Situation? -- Conceptual and Lexical Prototypicality Gradients Dedicated to Ontology Personalisation -- Explanation in the DL-Lite Family of Description Logics -- Ontology Applications I -- Using Ontologies for an Intelligent Patient Modelling, Adaptation and Management System -- Context-Addressable Messaging Service with Ontology-Driven Addresses -- Towards a System for Ontology-Based Information Extraction from PDF Documents -- Ontology Applications II -- Detecting Dirty Queries during Iterative Development of OWL Based Applications -- Reusing the SIOC Ontology to Facilitate Semantic CWE Interoperability -- An Ontology-Based Approach for Discovering Semantic Relations between Agent Communication Protocols -- Semantic Query Processing -- Reference Fusion and Flexible Querying -- Mediation-Based XML Query Answerability -- Ontology Matching Supported by Query Answering in a P2P System -- Using the Ontology Maturing Process Model for Searching, Managing and Retrieving Resources with Semantic Technologies.
|
520 |
|
|
|a This two-volume set LNCS 5331/5332 constitutes the refereed proceedings of the five confederated international conferences on Cooperative Information Systems (CoopIS 2008), Distributed Objects and Applications (DOA 2008), Grid computing, high performAnce and Distributed Applications (GADA 2008), Information Security (IS 2008), and Ontologies, Databases and Applications of Semantics (ODBASE 2008), held as OTM 2008 in Monterrey, Mexico, in November 2008. The 86 revised full and 9 revised short papers presented together with 5 invited papers and 4 keynote talks were carefully reviewed and selected from a total of 292 submissions. Corresponding to the five OTM 2008 main conferences CoopIS, DOA, GADA, IS, and ODBASE the papers are organized in topical sections on Web service, business process technology, E-service management, distributed process management, schema matching, business process tracing, workflow and business applications, designing distributed systems, context in distributed systems, high availability, adaptive distributed systems, scheduling allocation, databases in grids, grid applications, data management and storage, new tendencies and approaches, intrusion detection, information hiding, data and risk management, access control, evaluation and implementation, semantic matching and similarity measuring, semantic searching, ontology development, ontology maintanence and evaluation, ontology applications, and semantic query processing.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Database management.
|
650 |
|
0 |
|a Data mining.
|
650 |
|
0 |
|a Information storage and retrieval.
|
650 |
|
0 |
|a User interfaces (Computer systems).
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Database Management.
|
650 |
2 |
4 |
|a User Interfaces and Human Computer Interaction.
|
650 |
2 |
4 |
|a Information Storage and Retrieval.
|
650 |
2 |
4 |
|a Data Mining and Knowledge Discovery.
|
650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
700 |
1 |
|
|a Meersman, Robert.
|e editor.
|
700 |
1 |
|
|a Tari, Zahir.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783540888727
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 5332
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-540-88873-4
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|