000 06986nam a22006015i 4500
001 978-3-642-05151-7
003 DE-He213
005 20160624102137.0
007 cr nn 008mamaa
008 100301s2009 gw | s |||| 0|eng d
020 _a9783642051517
_9978-3-642-05151-7
024 7 _a10.1007/978-3-642-05151-7
_2doi
050 4 _aQA76.9.D3
072 7 _aUN
_2bicssc
072 7 _aUMT
_2bicssc
072 7 _aCOM021000
_2bisacsh
082 0 4 _a005.74
_223
245 1 0 _aOn the Move to Meaningful Internet Systems: OTM 2009
_h[electronic resource] :
_bConfederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part II /
_cedited by Robert Meersman, Tharam Dillon, Pilar Herrero.
260 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2009.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2009.
300 _aXXVI, 481 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v5871
505 0 _aIS 2009 Keynote -- Cloud Computing: Virtual Clusters, Data Security, and Disaster Recovery -- ODBASE 2009 Keynote -- Surviving the Glut: The Management of Event Streams in Cyberphysical Systems -- International Symposium on Information Security (IS) International Conference 2009 -- IS 2009 – PC Co-chairs’ Message -- Information Systems Security -- Moving from Requirements to Design Confronting Security Issues: A Case Study -- A Synergy between Static and Dynamic Analysis for the Detection of Software Security Vulnerabilities -- N±?: Reflecting Local Risk Assessment in LoA -- Privacy and Authentication -- A Secure Mobile-Based Authentication System for e-Banking -- Client-Server Password Recovery -- Enhancing of a Password-Based Authentication Scheme Using Smart Cards -- Security Policies and Verification -- Model-Driven Configuration of SELinux Policies -- Towards a Usage Control Policy Specification with Petri Nets -- Verification of CERT Secure Coding Rules: Case Studies -- Ontologies, DataBases, and Applications of Semantics (ODBASE) International Conference 2009 -- ODBASE 2009 – PC Co-chairs’ Message -- Managing Ontologies -- Ontology and Schema Evolution in Data Integration: Review and Assessment -- Detecting Inconsistencies in the Gene Ontology Using Ontology Databases with Not-gadgets -- How to Write and Use the Ontology Requirements Specification Document -- Achieving Maturity: The State of Practice in Ontology Engineering in 2009 -- Using Ontologies -- Ontology-Driven Provenance Management in eScience: An Application in Parasite Research -- Ontology-Based Retrieval of Spatially Related Objects for Location Based Services -- Incremental Generation of Mappings in an Ontology-Based Data Access Context -- Event Processing -- The Design of Stream Database Engine in Concurrent Environment -- “Same, Same but Different” A Survey on Duplicate Detection Methods for Situation Awareness -- Client-Side Event Processing for Personalized Web Advertisement -- Semantic Event Correlation Using Ontologies -- An Active Domain Node Architecture for the Semantic Web -- Dealing with Heterogeneity -- Merging Sets of Taxonomically Organized Data Using Concept Mappings under Uncertainty -- LinksB2N: Automatic Data Integration for the Semantic Web -- Learning Link-Based Naïve Bayes Classifiers from Ontology-Extended Distributed Data -- A Method and Tool for Fact Type Reuse in the DOGMA Ontology Framework -- Heterogeneity and Context in Semantic-Web-Enabled HCLS Systems -- XML-SIM: Structure and Content Semantic Similarity Detection Using Keys -- Partial Ontology Matching Using Instance Features -- Building Knowledge Bases -- DBpedia Live Extraction -- Semi-automatic Generation of a Patient Preoperative Knowledge-Base from a Legacy Clinical Database -- Exploring Wikipedia and DMoz as Knowledge Bases for Engineering a User Interests Hierarchy for Social Network Applications -- XML and XML Schema -- XML Schema Element Similarity Measures: A Schema Matching Context -- On the Performances of Checking XML Key and Functional Dependency Satisfactions.
520 _aThis two-volume set LNCS 5870/5871 constitutes the refereed proceedings of the four confederated international conferences on Cooperative Information Systems (CoopIS 2009), Distributed Objects and Applications (DOA 2009), Information Security (IS 2009), and Ontologies, Databases and Applications of Semantics (ODBASE 2009), held as OTM 2009 in Vilamoura, Portugal, in November 2009. The 83 revised full papers presented together with 4 keynote talks were carefully reviewed and selected from a total of 234 submissions. Corresponding to the four OTM 2009 main conferences CoopIS, DOA, IS, and ODBASE the papers are organized in topical sections on workflow; process models; ontology challenges; network complexity; modeling cooperation; information complexity; infrastructure; information; aspect-oriented approaches for distributed middleware; distributed algorithms and communication protocols; distributed infrastructures for cluster and Grid computing; object-based, component-based, resource-oriented, event-oriented, and service-oriented middleware; peer-to-peer and centralized infrastructures; performance analysis of distributed computing systems; reliability, fault tolerance, quality of service, and real time support; self* properties in distributed middleware; software engineering for distributed middleware systems; security and privacy in a connected world; ubiquitous and pervasive computing; information systems security; privacy and authentication; security policies and verification; managing ontologies; using ontologies; event processing; dealing with heterogeneity; building knowledge bases; and XML and XML schema.
650 0 _aComputer science.
650 0 _aComputer Communication Networks.
650 0 _aData protection.
650 0 _aDatabase management.
650 0 _aData mining.
650 0 _aInformation systems.
650 1 4 _aComputer Science.
650 2 4 _aDatabase Management.
650 2 4 _aData Mining and Knowledge Discovery.
650 2 4 _aInformation Systems Applications (incl.Internet).
650 2 4 _aComputer Communication Networks.
650 2 4 _aUser Interfaces and Human Computer Interaction.
650 2 4 _aSystems and Data Security.
700 1 _aMeersman, Robert.
_eeditor.
700 1 _aDillon, Tharam.
_eeditor.
700 1 _aHerrero, Pilar.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783642051500
786 _dSpringer
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v5871
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-642-05151-7
942 _2EBK8837
_cEBK
999 _c38131
_d38131