000 06139nam a22005895i 4500
001 978-3-642-16934-2
003 DE-He213
005 20240423125712.0
007 cr nn 008mamaa
008 101105s2010 gw | s |||| 0|eng d
020 _a9783642169342
_9978-3-642-16934-2
024 7 _a10.1007/978-3-642-16934-2
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM043000
_2bisacsh
072 7 _aUKN
_2thema
082 0 4 _a004.6
_223
245 1 0 _aOn the Move to Meaningful Internet Systems, OTM 2010
_h[electronic resource] :
_bConfederated International Conferences: CoopIS, IS, DOA and ODBASE, Hersonissos, Greece, October 25-29, 2010, Proceedings, Part I /
_cedited by Tharam Dillon, Pilar Herrero.
250 _a1st ed. 2010.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2010.
300 _aXXII, 703 p. 230 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aInformation Systems and Applications, incl. Internet/Web, and HCI,
_x2946-1642 ;
_v6426
505 0 _aOn the Move 2010 Keynotes -- OTM’10 Keynote -- OTM’10 Keynote -- COOPIS’10 Keynote -- Cooperative Information Systems (CoopIS) International Conference 2010 -- COOPIS’10 - PC Co-chairs Message -- Coopis Keynote Paper -- Configurable Services in the Cloud: Supporting Variability While Enabling Cross-Organizational Process Mining -- Process Models and Management -- A Process View Framework for Artifact-Centric Business Processes -- Monitoring Unmanaged Business Processes -- Fast Business Process Similarity Search with Feature-Based Similarity Estimation -- Quality Assessment of Business Process Models Based on Thresholds -- Merging Business Process Models -- Compliant Business Process Design Using Refinement Layers -- COMPRO: A Methodological Approach for Business Process Contextualisation -- Reducing Exception Handling Complexity in Business Process Modeling and Implementation: The WED-Flow Approach -- Modeling of Cooperation -- Continuous Monitoring in Evolving Business Networks -- Collaborative Coordination of Activities with Temporal Dependencies -- Generic Algorithms for Consistency Checking of Mutual-Exclusion and Binding Constraints in a Business Process Context -- Services Computing -- Collaborative Filtering Technique for Web Service Recommendation Based on User-Operation Combination -- Policy-Based Attestation of Service Behavior for Establishing Rigorous Trust -- Collecting, Annotating, and Classifying Public Web Services -- Managing Conflict of Interest in Service Composition -- Modelling and Automated Composition of User-Centric Services -- Coordinating Services for Accessing and Processing Data in Dynamic Environments -- Information Processing and Management -- The Roles of Reliability and Reputation in Competitive Multi Agent Systems -- Multilayer Superimposed Information forCollaborative Annotation in Wikis -- Supporting Complex Changes in Evolving Interrelated Web Databanks -- Workflow ART -- A Behavioral Similarity Measure between Labeled Petri Nets Based on Principal Transition Sequences -- Efficient and Accurate Retrieval of Business Process Models through Indexing -- The Biconnected Verification of Workflow Nets -- Business Process Scheduling with Resource Availability Constraints -- Achieving Recovery in Service Composition with Assurance Points and Integration Rules -- Business Protocol Adaptation for Flexible Chain Management -- Business Process Monitoring with BPath -- Human-Based Cooperative Systems -- CoMaP: A Cooperative Overlay-Based Mashup Platform -- Composing Near-Optimal Expert Teams: A Trade-Off between Skills and Connectivity -- Complementarity in Competence Management: Framework and Implementation -- Scalable XML Collaborative Editing with Undo -- A Cooperative Approach to View Selection and Placement in P2P Systems -- Ontology and Workflow Challenges -- Satisfaction and Coherence of Deadline Constraints in Inter-Organizational Workflows -- An Ontological Approach for Semantic Annotation of Supply Chain Process Models -- Defining Process Performance Indicators: An Ontological Approach -- Peer Rewiring in Semantic Overlay Networks under Churn -- International Symposium on Information Security (IS) International Conference 2010 -- IS’10 - PC Co-chairs Message -- Access Control, Authentication and Policies -- Mutual Preimage Authentication for Fast Handover in Enterprise Networks -- Supporting Role Based Provisioning with Rules Using OWL and F-Logic -- Using Real Option Thinking to Improve Decision Making in Security Investment -- Secure Architectures -- Context Sensitive Privacy Management in a Distributed Environment -- Semantic Attestation ofNode Integrity in Overlays -- Applicability of Security Patterns -- Cryptography -- Leakage Quantification of Cryptographic Operations.
650 0 _aComputer networks .
650 0 _aSoftware engineering.
650 0 _aComputer programming.
650 0 _aApplication software.
650 0 _aArtificial intelligence.
650 1 4 _aComputer Communication Networks.
650 2 4 _aSoftware Engineering.
650 2 4 _aProgramming Techniques.
650 2 4 _aComputer and Information Systems Applications.
650 2 4 _aArtificial Intelligence.
700 1 _aDillon, Tharam.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aHerrero, Pilar.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783642169335
776 0 8 _iPrinted edition:
_z9783642169359
830 0 _aInformation Systems and Applications, incl. Internet/Web, and HCI,
_x2946-1642 ;
_v6426
856 4 0 _uhttps://doi.org/10.1007/978-3-642-16934-2
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cSPRINGER
999 _c180801
_d180801