Cargando…

On the Move to Meaningful Internet Systems, OTM 2010 Confederated International Conferences: CoopIS, IS, DOA and ODBASE, Hersonissos, Greece, October 25-29, 2010, Proceedings, Part I /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Dillon, Tharam (Editor ), Herrero, Pilar (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Edición:1st ed. 2010.
Colección:Information Systems and Applications, incl. Internet/Web, and HCI ; 6426
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • On the Move 2010 Keynotes
  • OTM'10 Keynote
  • OTM'10 Keynote
  • COOPIS'10 Keynote
  • Cooperative Information Systems (CoopIS) International Conference 2010
  • COOPIS'10 - PC Co-chairs Message
  • Coopis Keynote Paper
  • Configurable Services in the Cloud: Supporting Variability While Enabling Cross-Organizational Process Mining
  • Process Models and Management
  • A Process View Framework for Artifact-Centric Business Processes
  • Monitoring Unmanaged Business Processes
  • Fast Business Process Similarity Search with Feature-Based Similarity Estimation
  • Quality Assessment of Business Process Models Based on Thresholds
  • Merging Business Process Models
  • Compliant Business Process Design Using Refinement Layers
  • COMPRO: A Methodological Approach for Business Process Contextualisation
  • Reducing Exception Handling Complexity in Business Process Modeling and Implementation: The WED-Flow Approach
  • Modeling of Cooperation
  • Continuous Monitoring in Evolving Business Networks
  • Collaborative Coordination of Activities with Temporal Dependencies
  • Generic Algorithms for Consistency Checking of Mutual-Exclusion and Binding Constraints in a Business Process Context
  • Services Computing
  • Collaborative Filtering Technique for Web Service Recommendation Based on User-Operation Combination
  • Policy-Based Attestation of Service Behavior for Establishing Rigorous Trust
  • Collecting, Annotating, and Classifying Public Web Services
  • Managing Conflict of Interest in Service Composition
  • Modelling and Automated Composition of User-Centric Services
  • Coordinating Services for Accessing and Processing Data in Dynamic Environments
  • Information Processing and Management
  • The Roles of Reliability and Reputation in Competitive Multi Agent Systems
  • Multilayer Superimposed Information for Collaborative Annotation in Wikis
  • Supporting Complex Changes in Evolving Interrelated Web Databanks
  • Workflow ART
  • A Behavioral Similarity Measure between Labeled Petri Nets Based on Principal Transition Sequences
  • Efficient and Accurate Retrieval of Business Process Models through Indexing
  • The Biconnected Verification of Workflow Nets
  • Business Process Scheduling with Resource Availability Constraints
  • Achieving Recovery in Service Composition with Assurance Points and Integration Rules
  • Business Protocol Adaptation for Flexible Chain Management
  • Business Process Monitoring with BPath
  • Human-Based Cooperative Systems
  • CoMaP: A Cooperative Overlay-Based Mashup Platform
  • Composing Near-Optimal Expert Teams: A Trade-Off between Skills and Connectivity
  • Complementarity in Competence Management: Framework and Implementation
  • Scalable XML Collaborative Editing with Undo
  • A Cooperative Approach to View Selection and Placement in P2P Systems
  • Ontology and Workflow Challenges
  • Satisfaction and Coherence of Deadline Constraints in Inter-Organizational Workflows
  • An Ontological Approach for Semantic Annotation of Supply Chain Process Models
  • Defining Process Performance Indicators: An Ontological Approach
  • Peer Rewiring in Semantic Overlay Networks under Churn
  • International Symposium on Information Security (IS) International Conference 2010
  • IS'10 - PC Co-chairs Message
  • Access Control, Authentication and Policies
  • Mutual Preimage Authentication for Fast Handover in Enterprise Networks
  • Supporting Role Based Provisioning with Rules Using OWL and F-Logic
  • Using Real Option Thinking to Improve Decision Making in Security Investment
  • Secure Architectures
  • Context Sensitive Privacy Management in a Distributed Environment
  • Semantic Attestation of Node Integrity in Overlays
  • Applicability of Security Patterns
  • Cryptography
  • Leakage Quantification of Cryptographic Operations.