000 | 06986nam a22006015i 4500 | ||
---|---|---|---|
001 | 978-3-642-05151-7 | ||
003 | DE-He213 | ||
005 | 20160624102137.0 | ||
007 | cr nn 008mamaa | ||
008 | 100301s2009 gw | s |||| 0|eng d | ||
020 |
_a9783642051517 _9978-3-642-05151-7 |
||
024 | 7 |
_a10.1007/978-3-642-05151-7 _2doi |
|
050 | 4 | _aQA76.9.D3 | |
072 | 7 |
_aUN _2bicssc |
|
072 | 7 |
_aUMT _2bicssc |
|
072 | 7 |
_aCOM021000 _2bisacsh |
|
082 | 0 | 4 |
_a005.74 _223 |
245 | 1 | 0 |
_aOn the Move to Meaningful Internet Systems: OTM 2009 _h[electronic resource] : _bConfederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part II / _cedited by Robert Meersman, Tharam Dillon, Pilar Herrero. |
260 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2009. |
|
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2009. |
|
300 |
_aXXVI, 481 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v5871 |
|
505 | 0 | _aIS 2009 Keynote -- Cloud Computing: Virtual Clusters, Data Security, and Disaster Recovery -- ODBASE 2009 Keynote -- Surviving the Glut: The Management of Event Streams in Cyberphysical Systems -- International Symposium on Information Security (IS) International Conference 2009 -- IS 2009 – PC Co-chairs’ Message -- Information Systems Security -- Moving from Requirements to Design Confronting Security Issues: A Case Study -- A Synergy between Static and Dynamic Analysis for the Detection of Software Security Vulnerabilities -- N±?: Reflecting Local Risk Assessment in LoA -- Privacy and Authentication -- A Secure Mobile-Based Authentication System for e-Banking -- Client-Server Password Recovery -- Enhancing of a Password-Based Authentication Scheme Using Smart Cards -- Security Policies and Verification -- Model-Driven Configuration of SELinux Policies -- Towards a Usage Control Policy Specification with Petri Nets -- Verification of CERT Secure Coding Rules: Case Studies -- Ontologies, DataBases, and Applications of Semantics (ODBASE) International Conference 2009 -- ODBASE 2009 – PC Co-chairs’ Message -- Managing Ontologies -- Ontology and Schema Evolution in Data Integration: Review and Assessment -- Detecting Inconsistencies in the Gene Ontology Using Ontology Databases with Not-gadgets -- How to Write and Use the Ontology Requirements Specification Document -- Achieving Maturity: The State of Practice in Ontology Engineering in 2009 -- Using Ontologies -- Ontology-Driven Provenance Management in eScience: An Application in Parasite Research -- Ontology-Based Retrieval of Spatially Related Objects for Location Based Services -- Incremental Generation of Mappings in an Ontology-Based Data Access Context -- Event Processing -- The Design of Stream Database Engine in Concurrent Environment -- “Same, Same but Different” A Survey on Duplicate Detection Methods for Situation Awareness -- Client-Side Event Processing for Personalized Web Advertisement -- Semantic Event Correlation Using Ontologies -- An Active Domain Node Architecture for the Semantic Web -- Dealing with Heterogeneity -- Merging Sets of Taxonomically Organized Data Using Concept Mappings under Uncertainty -- LinksB2N: Automatic Data Integration for the Semantic Web -- Learning Link-Based Naïve Bayes Classifiers from Ontology-Extended Distributed Data -- A Method and Tool for Fact Type Reuse in the DOGMA Ontology Framework -- Heterogeneity and Context in Semantic-Web-Enabled HCLS Systems -- XML-SIM: Structure and Content Semantic Similarity Detection Using Keys -- Partial Ontology Matching Using Instance Features -- Building Knowledge Bases -- DBpedia Live Extraction -- Semi-automatic Generation of a Patient Preoperative Knowledge-Base from a Legacy Clinical Database -- Exploring Wikipedia and DMoz as Knowledge Bases for Engineering a User Interests Hierarchy for Social Network Applications -- XML and XML Schema -- XML Schema Element Similarity Measures: A Schema Matching Context -- On the Performances of Checking XML Key and Functional Dependency Satisfactions. | |
520 | _aThis two-volume set LNCS 5870/5871 constitutes the refereed proceedings of the four confederated international conferences on Cooperative Information Systems (CoopIS 2009), Distributed Objects and Applications (DOA 2009), Information Security (IS 2009), and Ontologies, Databases and Applications of Semantics (ODBASE 2009), held as OTM 2009 in Vilamoura, Portugal, in November 2009. The 83 revised full papers presented together with 4 keynote talks were carefully reviewed and selected from a total of 234 submissions. Corresponding to the four OTM 2009 main conferences CoopIS, DOA, IS, and ODBASE the papers are organized in topical sections on workflow; process models; ontology challenges; network complexity; modeling cooperation; information complexity; infrastructure; information; aspect-oriented approaches for distributed middleware; distributed algorithms and communication protocols; distributed infrastructures for cluster and Grid computing; object-based, component-based, resource-oriented, event-oriented, and service-oriented middleware; peer-to-peer and centralized infrastructures; performance analysis of distributed computing systems; reliability, fault tolerance, quality of service, and real time support; self* properties in distributed middleware; software engineering for distributed middleware systems; security and privacy in a connected world; ubiquitous and pervasive computing; information systems security; privacy and authentication; security policies and verification; managing ontologies; using ontologies; event processing; dealing with heterogeneity; building knowledge bases; and XML and XML schema. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer Communication Networks. | |
650 | 0 | _aData protection. | |
650 | 0 | _aDatabase management. | |
650 | 0 | _aData mining. | |
650 | 0 | _aInformation systems. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aDatabase Management. |
650 | 2 | 4 | _aData Mining and Knowledge Discovery. |
650 | 2 | 4 | _aInformation Systems Applications (incl.Internet). |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aUser Interfaces and Human Computer Interaction. |
650 | 2 | 4 | _aSystems and Data Security. |
700 | 1 |
_aMeersman, Robert. _eeditor. |
|
700 | 1 |
_aDillon, Tharam. _eeditor. |
|
700 | 1 |
_aHerrero, Pilar. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783642051500 |
786 | _dSpringer | ||
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v5871 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-05151-7 |
942 |
_2EBK8837 _cEBK |
||
999 |
_c38131 _d38131 |