|
|
|
|
LEADER |
06875nam a22005775i 4500 |
001 |
978-3-642-05151-7 |
003 |
DE-He213 |
005 |
20151204180515.0 |
007 |
cr nn 008mamaa |
008 |
100301s2009 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642051517
|9 978-3-642-05151-7
|
024 |
7 |
|
|a 10.1007/978-3-642-05151-7
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a TK5105.5-5105.9
|
072 |
|
7 |
|a UKN
|2 bicssc
|
072 |
|
7 |
|a COM075000
|2 bisacsh
|
082 |
0 |
4 |
|a 004.6
|2 23
|
245 |
1 |
0 |
|a On the Move to Meaningful Internet Systems: OTM 2009
|h [electronic resource] :
|b Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part II /
|c edited by Robert Meersman, Tharam Dillon, Pilar Herrero.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg,
|c 2009.
|
300 |
|
|
|a XXVI, 481 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 5871
|
505 |
0 |
|
|a IS 2009 Keynote -- Cloud Computing: Virtual Clusters, Data Security, and Disaster Recovery -- ODBASE 2009 Keynote -- Surviving the Glut: The Management of Event Streams in Cyberphysical Systems -- International Symposium on Information Security (IS) International Conference 2009 -- IS 2009 – PC Co-chairs’ Message -- Information Systems Security -- Moving from Requirements to Design Confronting Security Issues: A Case Study -- A Synergy between Static and Dynamic Analysis for the Detection of Software Security Vulnerabilities -- N±?: Reflecting Local Risk Assessment in LoA -- Privacy and Authentication -- A Secure Mobile-Based Authentication System for e-Banking -- Client-Server Password Recovery -- Enhancing of a Password-Based Authentication Scheme Using Smart Cards -- Security Policies and Verification -- Model-Driven Configuration of SELinux Policies -- Towards a Usage Control Policy Specification with Petri Nets -- Verification of CERT Secure Coding Rules: Case Studies -- Ontologies, DataBases, and Applications of Semantics (ODBASE) International Conference 2009 -- ODBASE 2009 – PC Co-chairs’ Message -- Managing Ontologies -- Ontology and Schema Evolution in Data Integration: Review and Assessment -- Detecting Inconsistencies in the Gene Ontology Using Ontology Databases with Not-gadgets -- How to Write and Use the Ontology Requirements Specification Document -- Achieving Maturity: The State of Practice in Ontology Engineering in 2009 -- Using Ontologies -- Ontology-Driven Provenance Management in eScience: An Application in Parasite Research -- Ontology-Based Retrieval of Spatially Related Objects for Location Based Services -- Incremental Generation of Mappings in an Ontology-Based Data Access Context -- Event Processing -- The Design of Stream Database Engine in Concurrent Environment -- “Same, Same but Different” A Survey on Duplicate Detection Methods for Situation Awareness -- Client-Side Event Processing for Personalized Web Advertisement -- Semantic Event Correlation Using Ontologies -- An Active Domain Node Architecture for the Semantic Web -- Dealing with Heterogeneity -- Merging Sets of Taxonomically Organized Data Using Concept Mappings under Uncertainty -- LinksB2N: Automatic Data Integration for the Semantic Web -- Learning Link-Based Naïve Bayes Classifiers from Ontology-Extended Distributed Data -- A Method and Tool for Fact Type Reuse in the DOGMA Ontology Framework -- Heterogeneity and Context in Semantic-Web-Enabled HCLS Systems -- XML-SIM: Structure and Content Semantic Similarity Detection Using Keys -- Partial Ontology Matching Using Instance Features -- Building Knowledge Bases -- DBpedia Live Extraction -- Semi-automatic Generation of a Patient Preoperative Knowledge-Base from a Legacy Clinical Database -- Exploring Wikipedia and DMoz as Knowledge Bases for Engineering a User Interests Hierarchy for Social Network Applications -- XML and XML Schema -- XML Schema Element Similarity Measures: A Schema Matching Context -- On the Performances of Checking XML Key and Functional Dependency Satisfactions.
|
520 |
|
|
|a This two-volume set LNCS 5870/5871 constitutes the refereed proceedings of the four confederated international conferences on Cooperative Information Systems (CoopIS 2009), Distributed Objects and Applications (DOA 2009), Information Security (IS 2009), and Ontologies, Databases and Applications of Semantics (ODBASE 2009), held as OTM 2009 in Vilamoura, Portugal, in November 2009. The 83 revised full papers presented together with 4 keynote talks were carefully reviewed and selected from a total of 234 submissions. Corresponding to the four OTM 2009 main conferences CoopIS, DOA, IS, and ODBASE the papers are organized in topical sections on workflow; process models; ontology challenges; network complexity; modeling cooperation; information complexity; infrastructure; information; aspect-oriented approaches for distributed middleware; distributed algorithms and communication protocols; distributed infrastructures for cluster and Grid computing; object-based, component-based, resource-oriented, event-oriented, and service-oriented middleware; peer-to-peer and centralized infrastructures; performance analysis of distributed computing systems; reliability, fault tolerance, quality of service, and real time support; self* properties in distributed middleware; software engineering for distributed middleware systems; security and privacy in a connected world; ubiquitous and pervasive computing; information systems security; privacy and authentication; security policies and verification; managing ontologies; using ontologies; event processing; dealing with heterogeneity; building knowledge bases; and XML and XML schema.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a Database management.
|
650 |
|
0 |
|a Data mining.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Theory of Computation.
|
650 |
2 |
4 |
|a Database Management.
|
650 |
2 |
4 |
|a Data Mining and Knowledge Discovery.
|
650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|
700 |
1 |
|
|a Meersman, Robert.
|e editor.
|
700 |
1 |
|
|a Dillon, Tharam.
|e editor.
|
700 |
1 |
|
|a Herrero, Pilar.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642051500
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 5871
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-05151-7
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|