E-Book, Englisch, Band 6426, 703 Seiten, eBook
Dillon / Herrero On the Move to Meaningful Internet Systems, OTM 2010
Erscheinungsjahr 2010
ISBN: 978-3-642-16934-2
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Confederated International Conferences: CoopIS, IS, DOA and ODBASE, Hersonissos, Greece, October 25-29, 2010, Proceedings, Part I
E-Book, Englisch, Band 6426, 703 Seiten, eBook
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-642-16934-2
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Professional/practitioner
Autoren/Hrsg.
Weitere Infos & Material
On the Move 2010 Keynotes.- OTM’10 Keynote.- OTM’10 Keynote.- COOPIS’10 Keynote.- Cooperative Information Systems (CoopIS) International Conference 2010.- COOPIS’10 - PC Co-chairs Message.- Coopis Keynote Paper.- Configurable Services in the Cloud: Supporting Variability While Enabling Cross-Organizational Process Mining.- Process Models and Management.- A Process View Framework for Artifact-Centric Business Processes.- Monitoring Unmanaged Business Processes.- Fast Business Process Similarity Search with Feature-Based Similarity Estimation.- Quality Assessment of Business Process Models Based on Thresholds.- Merging Business Process Models.- Compliant Business Process Design Using Refinement Layers.- COMPRO: A Methodological Approach for Business Process Contextualisation.- Reducing Exception Handling Complexity in Business Process Modeling and Implementation: The WED-Flow Approach.- Modeling of Cooperation.- Continuous Monitoring in Evolving Business Networks.- Collaborative Coordination of Activities with Temporal Dependencies.- Generic Algorithms for Consistency Checking of Mutual-Exclusion and Binding Constraints in a Business Process Context.- Services Computing.- Collaborative Filtering Technique for Web Service Recommendation Based on User-Operation Combination.- Policy-Based Attestation of Service Behavior for Establishing Rigorous Trust.- Collecting, Annotating, and Classifying Public Web Services.- Managing Conflict of Interest in Service Composition.- Modelling and Automated Composition of User-Centric Services.- Coordinating Services for Accessing and Processing Data in Dynamic Environments.- Information Processing and Management.- The Roles of Reliability and Reputation in Competitive Multi Agent Systems.- Multilayer Superimposed Information forCollaborative Annotation in Wikis.- Supporting Complex Changes in Evolving Interrelated Web Databanks.- Workflow ART.- A Behavioral Similarity Measure between Labeled Petri Nets Based on Principal Transition Sequences.- Efficient and Accurate Retrieval of Business Process Models through Indexing.- The Biconnected Verification of Workflow Nets.- Business Process Scheduling with Resource Availability Constraints.- Achieving Recovery in Service Composition with Assurance Points and Integration Rules.- Business Protocol Adaptation for Flexible Chain Management.- Business Process Monitoring with BPath.- Human-Based Cooperative Systems.- CoMaP: A Cooperative Overlay-Based Mashup Platform.- Composing Near-Optimal Expert Teams: A Trade-Off between Skills and Connectivity.- Complementarity in Competence Management: Framework and Implementation.- Scalable XML Collaborative Editing with Undo.- A Cooperative Approach to View Selection and Placement in P2P Systems.- Ontology and Workflow Challenges.- Satisfaction and Coherence of Deadline Constraints in Inter-Organizational Workflows.- An Ontological Approach for Semantic Annotation of Supply Chain Process Models.- Defining Process Performance Indicators: An Ontological Approach.- Peer Rewiring in Semantic Overlay Networks under Churn.- International Symposium on Information Security (IS) International Conference 2010.- IS’10 - PC Co-chairs Message.- Access Control, Authentication and Policies.- Mutual Preimage Authentication for Fast Handover in Enterprise Networks.- Supporting Role Based Provisioning with Rules Using OWL and F-Logic.- Using Real Option Thinking to Improve Decision Making in Security Investment.- Secure Architectures.- Context Sensitive Privacy Management in a Distributed Environment.- Semantic Attestation ofNode Integrity in Overlays.- Applicability of Security Patterns.- Cryptography.- Leakage Quantification of Cryptographic Operations.