000 | 07748nam a22006255i 4500 | ||
---|---|---|---|
001 | 978-3-540-88873-4 | ||
003 | DE-He213 | ||
005 | 20240730190523.0 | ||
007 | cr nn 008mamaa | ||
008 | 100301s2008 gw | s |||| 0|eng d | ||
020 |
_a9783540888734 _9978-3-540-88873-4 |
||
024 | 7 |
_a10.1007/978-3-540-88873-4 _2doi |
|
050 | 4 | _aQA76.9.D3 | |
072 | 7 |
_aUN _2bicssc |
|
072 | 7 |
_aCOM021000 _2bisacsh |
|
072 | 7 |
_aUN _2thema |
|
082 | 0 | 4 |
_a005.74 _223 |
245 | 1 | 0 |
_aOn the Move to Meaningful Internet Systems: OTM 2008 _h[electronic resource] : _bOTM Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008 Proceedings, Part II / _cedited by Zahir Tari. |
250 | _a1st ed. 2008. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2008. |
|
300 |
_aXXXIII, 646 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aInformation Systems and Applications, incl. Internet/Web, and HCI, _x2946-1642 ; _v5332 |
|
505 | 0 | _aInformation Security (IS) 2008 International Conference -- IS 2008 PC Co-chairs' Message -- Intrusion Detection -- Boosting Web Intrusion Detection Systems by Inferring Positive Signatures -- Principal Components of Port-Address Matrices in Port-Scan Analysis -- A Novel Worm Detection Model Based on Host Packet Behavior Ranking -- Information Hiding -- Anonymous Resolution of DNS Queries -- Steganography of VoIP Streams -- TrustMAS: Trusted Communication Platform for Multi-Agent Systems -- Data and Risk Management -- Computing Exact Outcomes of Multi-parameter Attack Trees -- Automatic Generation of Secure Multidimensional Code for Data Warehouses: An MDA Approach -- Trusted Reputation Management Service for Peer-to-Peer Collaboration -- Access Control -- A Model-Driven Approach for the Specification and Analysis of Access Control Policies -- PuRBAC: Purpose-Aware Role-Based Access Control -- Uncle-Share: Annotation-Based Access Control for Cooperative and Social Systems -- Evaluation and Implementation -- Verifying Extended Criteria for the Interoperability of Security Devices -- Generating a Large Prime Factor of p 4±p 2?+?1 in Polynomial Time -- Ontologies, Databases and Applications of Semantics (ODBASE) 2008 International Conference -- ODBASE 2008 PC Co-chairs' Message -- Keynote -- Artifact-Centric Business Process Models: Brief Survey of Research Results and Challenges -- Invited Papers -- Ten Challenges for Ontology Matching -- Dynamic Labelling Scheme for XML Data Processing -- Real-Time Enterprise Ontology Evolution to Aid Effective Clinical Telemedicine with Text Mining and Automatic Semantic Aliasing Support -- Engineering OODA Systems: Architectures, Applications, and Research Areas -- Semantic Matching and Similarity Measuring -- Approximate Structure-Preserving SemanticMatching -- Ontology-Based Relevance Assessment: An Evaluation of Different Semantic Similarity Measures -- Equivalence of XSD Constructs and Its Exploitation in Similarity Evaluation -- Design, Implementation and Evaluation of a New Semantic Similarity Metric Combining Features and Intrinsic Information Content -- Semantic Searching -- Weighted Ontology for Semantic Search -- RDF Snippets for Semantic Web Search Engines -- Empirical Insights on a Value of Ontology Quality in Ontology-Driven Web Search -- Ontology Development -- Magic Rewritings for Efficiently Processing Reactivity on Web Ontologies -- Mediating and Analyzing Social Data -- Conceptual Synopses of Semantics in Social Networks Sharing Structured Data -- Ontology Maintanence and Evaluation -- Sequential Patterns for Maintaining Ontologies over Time -- Evaluating Automatically a Text Miner for Ontologies: A Catch-22 Situation? -- Conceptual and Lexical Prototypicality Gradients Dedicated to Ontology Personalisation -- Explanation in the DL-Lite Family of Description Logics -- Ontology Applications I -- Using Ontologies for an Intelligent Patient Modelling, Adaptation and Management System -- Context-Addressable Messaging Service with Ontology-Driven Addresses -- Towards a System for Ontology-Based Information Extraction from PDF Documents -- Ontology Applications II -- Detecting Dirty Queries during Iterative Development of OWL Based Applications -- Reusing the SIOC Ontology to Facilitate Semantic CWE Interoperability -- An Ontology-Based Approach for Discovering Semantic Relations between Agent Communication Protocols -- Semantic Query Processing -- Reference Fusion and Flexible Querying -- Mediation-Based XML Query Answerability -- Ontology Matching Supported by Query Answering in a P2P System -- Using the Ontology Maturing ProcessModel for Searching, Managing and Retrieving Resources with Semantic Technologies. | |
520 | _aThis two-volume set LNCS 5331/5332 constitutes the refereed proceedings of the five confederated international conferences on Cooperative Information Systems (CoopIS 2008), Distributed Objects and Applications (DOA 2008), Grid computing, high performAnce and Distributed Applications (GADA 2008), Information Security (IS 2008), and Ontologies, Databases and Applications of Semantics (ODBASE 2008), held as OTM 2008 in Monterrey, Mexico, in November 2008. The 86 revised full and 9 revised short papers presented together with 5 invited papers and 4 keynote talks were carefully reviewed and selected from a total of 292 submissions. Corresponding to the five OTM 2008 main conferences CoopIS, DOA, GADA, IS, and ODBASE the papers are organized in topical sections on Web service, business process technology, E-service management, distributed process management, schema matching, business process tracing, workflow and business applications, designing distributed systems, context in distributed systems, high availability, adaptive distributed systems, scheduling allocation, databases in grids, grid applications, data management and storage, new tendencies and approaches, intrusion detection, information hiding, data and risk management, access control, evaluation and implementation, semantic matching and similarity measuring, semantic searching, ontology development, ontology maintanence and evaluation, ontology applications, and semantic query processing. | ||
650 | 0 |
_aDatabase management. _93157 |
|
650 | 0 |
_aUser interfaces (Computer systems). _911681 |
|
650 | 0 |
_aHuman-computer interaction. _96196 |
|
650 | 0 |
_aInformation storage and retrieval systems. _922213 |
|
650 | 0 |
_aData mining. _93907 |
|
650 | 0 |
_aApplication software. _9142815 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 1 | 4 |
_aDatabase Management. _93157 |
650 | 2 | 4 |
_aUser Interfaces and Human Computer Interaction. _931632 |
650 | 2 | 4 |
_aInformation Storage and Retrieval. _923927 |
650 | 2 | 4 |
_aData Mining and Knowledge Discovery. _9142816 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _9142817 |
650 | 2 | 4 |
_aComputer Communication Networks. _9142818 |
700 | 1 |
_aTari, Zahir. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _922737 |
|
710 | 2 |
_aSpringerLink (Online service) _9142819 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783540888727 |
776 | 0 | 8 |
_iPrinted edition: _z9783540891499 |
830 | 0 |
_aInformation Systems and Applications, incl. Internet/Web, and HCI, _x2946-1642 ; _v5332 _9142820 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-540-88873-4 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c93298 _d93298 |