On the Move to Meaningful Internet Systems: OTM 2010 Confederated International Conferences: CoopIS, IS, DOA and ODBASE, Hersonissos, Crete, Greece, October 25-29, 2010, Proceedings, Part I /
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2010.
|
Σειρά: | Lecture Notes in Computer Science,
6426 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- On the Move 2010 Keynotes
- OTM’10 Keynote
- OTM’10 Keynote
- COOPIS’10 Keynote
- Cooperative Information Systems (CoopIS) International Conference 2010
- COOPIS’10 - PC Co-chairs Message
- Coopis Keynote Paper
- Configurable Services in the Cloud: Supporting Variability While Enabling Cross-Organizational Process Mining
- Process Models and Management
- A Process View Framework for Artifact-Centric Business Processes
- Monitoring Unmanaged Business Processes
- Fast Business Process Similarity Search with Feature-Based Similarity Estimation
- Quality Assessment of Business Process Models Based on Thresholds
- Merging Business Process Models
- Compliant Business Process Design Using Refinement Layers
- COMPRO: A Methodological Approach for Business Process Contextualisation
- Reducing Exception Handling Complexity in Business Process Modeling and Implementation: The WED-Flow Approach
- Modeling of Cooperation
- Continuous Monitoring in Evolving Business Networks
- Collaborative Coordination of Activities with Temporal Dependencies
- Generic Algorithms for Consistency Checking of Mutual-Exclusion and Binding Constraints in a Business Process Context
- Services Computing
- Collaborative Filtering Technique for Web Service Recommendation Based on User-Operation Combination
- Policy-Based Attestation of Service Behavior for Establishing Rigorous Trust
- Collecting, Annotating, and Classifying Public Web Services
- Managing Conflict of Interest in Service Composition
- Modelling and Automated Composition of User-Centric Services
- Coordinating Services for Accessing and Processing Data in Dynamic Environments
- Information Processing and Management
- The Roles of Reliability and Reputation in Competitive Multi Agent Systems
- Multilayer Superimposed Information for Collaborative Annotation in Wikis
- Supporting Complex Changes in Evolving Interrelated Web Databanks
- Workflow ART
- A Behavioral Similarity Measure between Labeled Petri Nets Based on Principal Transition Sequences
- Efficient and Accurate Retrieval of Business Process Models through Indexing
- The Biconnected Verification of Workflow Nets
- Business Process Scheduling with Resource Availability Constraints
- Achieving Recovery in Service Composition with Assurance Points and Integration Rules
- Business Protocol Adaptation for Flexible Chain Management
- Business Process Monitoring with BPath
- Human-Based Cooperative Systems
- CoMaP: A Cooperative Overlay-Based Mashup Platform
- Composing Near-Optimal Expert Teams: A Trade-Off between Skills and Connectivity
- Complementarity in Competence Management: Framework and Implementation
- Scalable XML Collaborative Editing with Undo
- A Cooperative Approach to View Selection and Placement in P2P Systems
- Ontology and Workflow Challenges
- Satisfaction and Coherence of Deadline Constraints in Inter-Organizational Workflows
- An Ontological Approach for Semantic Annotation of Supply Chain Process Models
- Defining Process Performance Indicators: An Ontological Approach
- Peer Rewiring in Semantic Overlay Networks under Churn
- International Symposium on Information Security (IS) International Conference 2010
- IS’10 - PC Co-chairs Message
- Access Control, Authentication and Policies
- Mutual Preimage Authentication for Fast Handover in Enterprise Networks
- Supporting Role Based Provisioning with Rules Using OWL and F-Logic
- Using Real Option Thinking to Improve Decision Making in Security Investment
- Secure Architectures
- Context Sensitive Privacy Management in a Distributed Environment
- Semantic Attestation of Node Integrity in Overlays
- Applicability of Security Patterns
- Cryptography
- Leakage Quantification of Cryptographic Operations.