On the Move to Meaningful Internet Systems: OTM 2010 Confederated International Conferences: CoopIS, IS, DOA and ODBASE, Hersonissos, Crete, Greece, October 25-29, 2010, Proceedings, Part I /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Meersman, Robert (Επιμελητής έκδοσης), Dillon, Tharam (Επιμελητής έκδοσης), Herrero, Pilar (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010.
Σειρά:Lecture Notes in Computer Science, 6426
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • On the Move 2010 Keynotes
  • OTM’10 Keynote
  • OTM’10 Keynote
  • COOPIS’10 Keynote
  • Cooperative Information Systems (CoopIS) International Conference 2010
  • COOPIS’10 - PC Co-chairs Message
  • Coopis Keynote Paper
  • Configurable Services in the Cloud: Supporting Variability While Enabling Cross-Organizational Process Mining
  • Process Models and Management
  • A Process View Framework for Artifact-Centric Business Processes
  • Monitoring Unmanaged Business Processes
  • Fast Business Process Similarity Search with Feature-Based Similarity Estimation
  • Quality Assessment of Business Process Models Based on Thresholds
  • Merging Business Process Models
  • Compliant Business Process Design Using Refinement Layers
  • COMPRO: A Methodological Approach for Business Process Contextualisation
  • Reducing Exception Handling Complexity in Business Process Modeling and Implementation: The WED-Flow Approach
  • Modeling of Cooperation
  • Continuous Monitoring in Evolving Business Networks
  • Collaborative Coordination of Activities with Temporal Dependencies
  • Generic Algorithms for Consistency Checking of Mutual-Exclusion and Binding Constraints in a Business Process Context
  • Services Computing
  • Collaborative Filtering Technique for Web Service Recommendation Based on User-Operation Combination
  • Policy-Based Attestation of Service Behavior for Establishing Rigorous Trust
  • Collecting, Annotating, and Classifying Public Web Services
  • Managing Conflict of Interest in Service Composition
  • Modelling and Automated Composition of User-Centric Services
  • Coordinating Services for Accessing and Processing Data in Dynamic Environments
  • Information Processing and Management
  • The Roles of Reliability and Reputation in Competitive Multi Agent Systems
  • Multilayer Superimposed Information for Collaborative Annotation in Wikis
  • Supporting Complex Changes in Evolving Interrelated Web Databanks
  • Workflow ART
  • A Behavioral Similarity Measure between Labeled Petri Nets Based on Principal Transition Sequences
  • Efficient and Accurate Retrieval of Business Process Models through Indexing
  • The Biconnected Verification of Workflow Nets
  • Business Process Scheduling with Resource Availability Constraints
  • Achieving Recovery in Service Composition with Assurance Points and Integration Rules
  • Business Protocol Adaptation for Flexible Chain Management
  • Business Process Monitoring with BPath
  • Human-Based Cooperative Systems
  • CoMaP: A Cooperative Overlay-Based Mashup Platform
  • Composing Near-Optimal Expert Teams: A Trade-Off between Skills and Connectivity
  • Complementarity in Competence Management: Framework and Implementation
  • Scalable XML Collaborative Editing with Undo
  • A Cooperative Approach to View Selection and Placement in P2P Systems
  • Ontology and Workflow Challenges
  • Satisfaction and Coherence of Deadline Constraints in Inter-Organizational Workflows
  • An Ontological Approach for Semantic Annotation of Supply Chain Process Models
  • Defining Process Performance Indicators: An Ontological Approach
  • Peer Rewiring in Semantic Overlay Networks under Churn
  • International Symposium on Information Security (IS) International Conference 2010
  • IS’10 - PC Co-chairs Message
  • Access Control, Authentication and Policies
  • Mutual Preimage Authentication for Fast Handover in Enterprise Networks
  • Supporting Role Based Provisioning with Rules Using OWL and F-Logic
  • Using Real Option Thinking to Improve Decision Making in Security Investment
  • Secure Architectures
  • Context Sensitive Privacy Management in a Distributed Environment
  • Semantic Attestation of Node Integrity in Overlays
  • Applicability of Security Patterns
  • Cryptography
  • Leakage Quantification of Cryptographic Operations.