|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-642-05201-9 |
003 |
DE-He213 |
005 |
20220117040128.0 |
007 |
cr nn 008mamaa |
008 |
100301s2009 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642052019
|9 978-3-642-05201-9
|
024 |
7 |
|
|a 10.1007/978-3-642-05201-9
|2 doi
|
050 |
|
4 |
|a QA76.758
|
072 |
|
7 |
|a UMZ
|2 bicssc
|
072 |
|
7 |
|a COM051230
|2 bisacsh
|
072 |
|
7 |
|a UMZ
|2 thema
|
082 |
0 |
4 |
|a 005.1
|2 23
|
245 |
1 |
0 |
|a Software and Data Technolgoies
|h [electronic resource] :
|b Third International Conference, ICSOFT 2008, Porto, Portugal, July 22-24, 2008 /
|c edited by José Cordeiro, Boris Shishkov, AlpeshKumar Ranchordas, Markus Helfert.
|
250 |
|
|
|a 1st ed. 2009.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2009.
|
300 |
|
|
|a XII, 231 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Communications in Computer and Information Science,
|x 1865-0937 ;
|v 47
|
505 |
0 |
|
|a Invited Speakers -- User Defined Geo-referenced Information -- I: Programming Languages -- Extending the SSCLI to Support Dynamic Inheritance -- Scala Roles: Reusable Object Collaborations in a Library -- II: Software Engineering -- Common Criteria Based Security Scenario Verification -- A Software Infrastructure for User-Guided Quality-of-Service Tradeoffs -- On the Multiplicity Semantics of the Extend Relationship in Use Case Models -- Secure Mobile Phone Access to Remote Personal Computers: A Case Study -- III: Distributed and Parallel Systems -- Understanding and Evaluating Replication in Service Oriented Multi-tier Architectures -- Applying Optimal Stopping for Optimizing Queries to External Semantic Web Resources -- An Efficient Pipelined Parallel Join Algorithm on Heterogeneous Distributed Architectures -- IV: Information Systems and Data Management -- Declarative Business Process Modelling and the Generation of ERP Systems -- Single Vector Large Data Cardinality Structure to Handle Compressed Database in a Distributed Environment -- Relaxed Approaches for Correct DB-Replication with SI Replicas -- Measuring the Usability of Augmented Reality e-Learning Systems: A User-Centered Evaluation Approach -- Supporting the Process Assessment through a Flexible Software Environment -- V: Knowledge Engineering -- Increasing Data Set Incompleteness May Improve Rule Set Quality -- Anomaly Detection Using Behavioral Approaches.
|
520 |
|
|
|a This book contains the best papers of the Third International Conference on Software and Data Technologies (ICSOFT 2008), held in Porto, Portugal, which was organized by the Institute for Systems and Technologies of Information, Communication and Control (INSTICC), co-sponsored by the Workflow Management Coalition (WfMC), in cooperation with the Interdisciplinary Institute for Collaboration and Research on Enterprise Systems and Technology (IICREST). The purpose of ICSOFT 2008 was to bring together researchers, engineers and practitioners interested in information technology and software development. The conference tracks were "Software Engineering", "Information Systems and Data Management", "Programming Languages", "Distributed and Parallel Systems" and "Knowledge Engineering". Being crucial for the development of information systems, software and data te- nologies encompass a large number of research topics and applications: from imp- mentation-related issues to more abstract theoretical aspects of software engineering; from databases and data-warehouses to management information systems and kno- edge-base systems; next to that, distributed systems, pervasive computing, data qu- ity and other related topics are included in the scope of this conference.
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Data mining.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Computers, Special purpose.
|
650 |
1 |
4 |
|a Software Engineering.
|
650 |
2 |
4 |
|a Data Mining and Knowledge Discovery.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Special Purpose and Application-Based Systems.
|
700 |
1 |
|
|a Cordeiro, José.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Shishkov, Boris.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Ranchordas, AlpeshKumar.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Helfert, Markus.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642052064
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642052002
|
830 |
|
0 |
|a Communications in Computer and Information Science,
|x 1865-0937 ;
|v 47
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-642-05201-9
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|