On the Move to Meaningful Internet Systems: OTM 2010 : Confederated International Conferences: CoopIS, IS, DOA and ODBASE, Hersonissos, Crete, Greece, October 25-29, 2010, Proceedings, Part I
Uloženo v:
Další autoři: | |
---|---|
Korporace: | |
Médium: | E-kniha |
Jazyk: | angličtina |
Vydáno: |
Berlin ; Heidelberg :
Springer Berlin Heidelberg,
2010
|
Edice: | Lecture Notes in Computer Science
|
Žánr/forma: | elektronické knihy |
ISBN: | 978-3-642-16934-2 9783642169335 |
Témata: | |
On-line přístup: | Plný text |
Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo otaguje tento záznam!
|
Obsah:
- On the Move 2010 Keynotes
- OTM’10 Keynote
- OTM’10 Keynote
- COOPIS’10 Keynote
- Cooperative Information Systems (CoopIS) International Conference 2010
- COOPIS’10 - PC Co-chairs Message
- Coopis Keynote Paper
- Configurable Services in the Cloud: Supporting Variability While Enabling Cross-Organizational Process Mining
- Process Models and Management
- A Process View Framework for Artifact-Centric Business Processes
- Monitoring Unmanaged Business Processes
- Fast Business Process Similarity Search with Feature-Based Similarity Estimation
- Quality Assessment of Business Process Models Based on Thresholds
- Merging Business Process Models
- Compliant Business Process Design Using Refinement Layers
- COMPRO: A Methodological Approach for Business Process Contextualisation
- Reducing Exception Handling Complexity in Business Process Modeling and Implementation: The WED-Flow Approach
- Modeling of Cooperation
- -
- ^^
- Continuous Monitoring in Evolving Business Networks
- Collaborative Coordination of Activities with Temporal Dependencies
- Generic Algorithms for Consistency Checking of Mutual-Exclusion and Binding Constraints in a Business Process Context
- Services Computing
- Collaborative Filtering Technique for Web Service Recommendation Based on User-Operation Combination
- Policy-Based Attestation of Service Behavior for Establishing Rigorous Trust
- Collecting, Annotating, and Classifying Public Web Services
- Managing Conflict of Interest in Service Composition
- Modelling and Automated Composition of User-Centric Services
- Coordinating Services for Accessing and Processing Data in Dynamic Environments
- Information Processing and Management
- The Roles of Reliability and Reputation in Competitive Multi Agent Systems
- Multilayer Superimposed Information for Collaborative Annotation in Wikis
- Supporting Complex Changes in Evolving Interrelated Web Databanks
- Workflow ART
- -
- ^^
- A Behavioral Similarity Measure between Labeled Petri Nets Based on Principal Transition Sequences
- Efficient and Accurate Retrieval of Business Process Models through Indexing
- The Biconnected Verification of Workflow Nets
- Business Process Scheduling with Resource Availability Constraints
- Achieving Recovery in Service Composition with Assurance Points and Integration Rules
- Business Protocol Adaptation for Flexible Chain Management
- Business Process Monitoring with BPath
- Human-Based Cooperative Systems
- CoMaP: A Cooperative Overlay-Based Mashup Platform
- Composing Near-Optimal Expert Teams: A Trade-Off between Skills and Connectivity
- Complementarity in Competence Management: Framework and Implementation
- Scalable XML Collaborative Editing with Undo
- A Cooperative Approach to View Selection and Placement in P2P Systems
- Ontology and Workflow Challenges
- Satisfaction and Coherence of Deadline Constraints in Inter-Organizational Workflows
- -
- ^^
- An Ontological Approach for Semantic Annotation of Supply Chain Process Models
- Defining Process Performance Indicators: An Ontological Approach
- Peer Rewiring in Semantic Overlay Networks under Churn
- International Symposium on Information Security (IS) International Conference 2010
- IS’10 - PC Co-chairs Message
- Access Control, Authentication and Policies
- Mutual Preimage Authentication for Fast Handover in Enterprise Networks
- Supporting Role Based Provisioning with Rules Using OWL and F-Logic
- Using Real Option Thinking to Improve Decision Making in Security Investment
- Secure Architectures
- Context Sensitive Privacy Management in a Distributed Environment
- Semantic Attestation of Node Integrity in Overlays
- Applicability of Security Patterns
- Cryptography
- Leakage Quantification of Cryptographic Operations