On the Move to Meaningful Internet Systems: OTM 2008 : OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008, Proceedings, Part II

This two-volume set LNCS 5331/5332 constitutes the refereed proceedings of the five confederated international conferences on Cooperative Information Systems (CoopIS 2008), Distributed Objects and Applications (DOA 2008), Grid computing, high performAnce and Distributed Applications (GADA 2008), Inf...

Celý popis

Uloženo v:
Podrobná bibliografie
Další autoři: Meersman, Robert (Editor)
Tari, Zahir (Editor)
Korporace: SpringerLink (online služba)  
Médium: E-kniha
Jazyk:angličtina
Vydáno: Berlin ; Heidelberg : Springer Berlin Heidelberg, 2008
Edice:Lecture Notes in Computer Science
Žánr/forma:elektronické knihy
ISBN:978-3-540-88873-4
9783540888727
Témata:
On-line přístup:Plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo otaguje tento záznam!
Obálka
Obsah:
  • Information Security (IS) 2008 International Conference
  • IS 2008 PC Co-chairs’ Message
  • Intrusion Detection
  • Boosting Web Intrusion Detection Systems by Inferring Positive Signatures
  • Principal Components of Port-Address Matrices in Port-Scan Analysis
  • A Novel Worm Detection Model Based on Host Packet Behavior Ranking
  • Information Hiding
  • Anonymous Resolution of DNS Queries
  • Steganography of VoIP Streams
  • TrustMAS: Trusted Communication Platform for Multi-Agent Systems
  • Data and Risk Management
  • Computing Exact Outcomes of Multi-parameter Attack Trees
  • Automatic Generation of Secure Multidimensional Code for Data Warehouses: An MDA Approach
  • Trusted Reputation Management Service for Peer-to-Peer Collaboration
  • Access Control
  • A Model-Driven Approach for the Specification and Analysis of Access Control Policies
  • PuRBAC: Purpose-Aware Role-Based Access Control
  • Uncle-Share: Annotation-Based Access Control for Cooperative and Social Systems
  • ^^
  • Evaluation and Implementation
  • Verifying Extended Criteria for the Interoperability of Security Devices
  • Generating a Large Prime Factor of p 4±p 2?+?1 in Polynomial Time
  • Ontologies, Databases and Applications of Semantics (ODBASE) 2008 International Conference
  • ODBASE 2008 PC Co-chairs’ Message
  • Keynote
  • Artifact-Centric Business Process Models: Brief Survey of Research Results and Challenges
  • Invited Papers
  • Ten Challenges for Ontology Matching
  • Dynamic Labelling Scheme for XML Data Processing
  • Real-Time Enterprise Ontology Evolution to Aid Effective Clinical Telemedicine with Text Mining and Automatic Semantic Aliasing Support
  • Engineering OODA Systems: Architectures, Applications, and Research Areas
  • Semantic Matching and Similarity Measuring
  • Approximate Structure-Preserving Semantic Matching
  • Ontology-Based Relevance Assessment: An Evaluation of Different Semantic Similarity Measures
  • ^^
  • Equivalence of XSD Constructs and Its Exploitation in Similarity Evaluation
  • Design, Implementation and Evaluation of a New Semantic Similarity Metric Combining Features and Intrinsic Information Content
  • Semantic Searching
  • Weighted Ontology for Semantic Search
  • RDF Snippets for Semantic Web Search Engines
  • Empirical Insights on a Value of Ontology Quality in Ontology-Driven Web Search
  • Ontology Development
  • Magic Rewritings for Efficiently Processing Reactivity on Web Ontologies
  • Mediating and Analyzing Social Data
  • Conceptual Synopses of Semantics in Social Networks Sharing Structured Data
  • Ontology Maintanence and Evaluation
  • Sequential Patterns for Maintaining Ontologies over Time
  • Evaluating Automatically a Text Miner for Ontologies: A Catch-22 Situation?
  • Conceptual and Lexical Prototypicality Gradients Dedicated to Ontology Personalisation
  • Explanation in the DL-Lite Family of Description Logics
  • Ontology Applications I
  • ^^
  • Using Ontologies for an Intelligent Patient Modelling, Adaptation and Management System
  • Context-Addressable Messaging Service with Ontology-Driven Addresses
  • Towards a System for Ontology-Based Information Extraction from PDF Documents
  • Ontology Applications II
  • Detecting Dirty Queries during Iterative Development of OWL Based Applications
  • Reusing the SIOC Ontology to Facilitate Semantic CWE Interoperability
  • An Ontology-Based Approach for Discovering Semantic Relations between Agent Communication Protocols
  • Semantic Query Processing
  • Reference Fusion and Flexible Querying
  • Mediation-Based XML Query Answerability
  • Ontology Matching Supported by Query Answering in a P2P System
  • Using the Ontology Maturing Process Model for Searching, Managing and Retrieving Resources with Semantic Technologies