07092nam 22007335 450 99646567540331620200706050331.03-642-16934-110.1007/978-3-642-16934-2(CKB)2670000000056664(SSID)ssj0000446671(PQKBManifestationID)11312990(PQKBTitleCode)TC0000446671(PQKBWorkID)10496422(PQKB)11534347(DE-He213)978-3-642-16934-2(MiAaPQ)EBC3066122(PPN)149890516(EXLCZ)99267000000005666420101105d2010 u| 0engurnn#008mamaatxtccrOn the Move to Meaningful Internet Systems, OTM 2010[electronic resource] Confederated International Conferences: CoopIS, IS, DOA and ODBASE, Hersonissos, Greece, October 25-29, 2010, Proceedings, Part I /edited by Tharam Dillon, Pilar Herrero1st ed. 2010.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2010.1 online resource (XXII, 703 p. 230 illus.)Information Systems and Applications, incl. Internet/Web, and HCI ;6426Bibliographic Level Mode of Issuance: Monograph3-642-16933-3 Includes bibliographical references and index.On the Move 2010 Keynotes -- OTM’10 Keynote -- OTM’10 Keynote -- COOPIS’10 Keynote -- Cooperative Information Systems (CoopIS) International Conference 2010 -- COOPIS’10 - PC Co-chairs Message -- Coopis Keynote Paper -- Configurable Services in the Cloud: Supporting Variability While Enabling Cross-Organizational Process Mining -- Process Models and Management -- A Process View Framework for Artifact-Centric Business Processes -- Monitoring Unmanaged Business Processes -- Fast Business Process Similarity Search with Feature-Based Similarity Estimation -- Quality Assessment of Business Process Models Based on Thresholds -- Merging Business Process Models -- Compliant Business Process Design Using Refinement Layers -- COMPRO: A Methodological Approach for Business Process Contextualisation -- Reducing Exception Handling Complexity in Business Process Modeling and Implementation: The WED-Flow Approach -- Modeling of Cooperation -- Continuous Monitoring in Evolving Business Networks -- Collaborative Coordination of Activities with Temporal Dependencies -- Generic Algorithms for Consistency Checking of Mutual-Exclusion and Binding Constraints in a Business Process Context -- Services Computing -- Collaborative Filtering Technique for Web Service Recommendation Based on User-Operation Combination -- Policy-Based Attestation of Service Behavior for Establishing Rigorous Trust -- Collecting, Annotating, and Classifying Public Web Services -- Managing Conflict of Interest in Service Composition -- Modelling and Automated Composition of User-Centric Services -- Coordinating Services for Accessing and Processing Data in Dynamic Environments -- Information Processing and Management -- The Roles of Reliability and Reputation in Competitive Multi Agent Systems -- Multilayer Superimposed Information for Collaborative Annotation in Wikis -- Supporting Complex Changes in Evolving Interrelated Web Databanks -- Workflow ART -- A Behavioral Similarity Measure between Labeled Petri Nets Based on Principal Transition Sequences -- Efficient and Accurate Retrieval of Business Process Models through Indexing -- The Biconnected Verification of Workflow Nets -- Business Process Scheduling with Resource Availability Constraints -- Achieving Recovery in Service Composition with Assurance Points and Integration Rules -- Business Protocol Adaptation for Flexible Chain Management -- Business Process Monitoring with BPath -- Human-Based Cooperative Systems -- CoMaP: A Cooperative Overlay-Based Mashup Platform -- Composing Near-Optimal Expert Teams: A Trade-Off between Skills and Connectivity -- Complementarity in Competence Management: Framework and Implementation -- Scalable XML Collaborative Editing with Undo -- A Cooperative Approach to View Selection and Placement in P2P Systems -- Ontology and Workflow Challenges -- Satisfaction and Coherence of Deadline Constraints in Inter-Organizational Workflows -- An Ontological Approach for Semantic Annotation of Supply Chain Process Models -- Defining Process Performance Indicators: An Ontological Approach -- Peer Rewiring in Semantic Overlay Networks under Churn -- International Symposium on Information Security (IS) International Conference 2010 -- IS’10 - PC Co-chairs Message -- Access Control, Authentication and Policies -- Mutual Preimage Authentication for Fast Handover in Enterprise Networks -- Supporting Role Based Provisioning with Rules Using OWL and F-Logic -- Using Real Option Thinking to Improve Decision Making in Security Investment -- Secure Architectures -- Context Sensitive Privacy Management in a Distributed Environment -- Semantic Attestation of Node Integrity in Overlays -- Applicability of Security Patterns -- Cryptography -- Leakage Quantification of Cryptographic Operations.Information Systems and Applications, incl. Internet/Web, and HCI ;6426Computer communication systemsSoftware engineeringComputer programmingApplication softwareArtificial intelligenceComputer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Software Engineering/Programming and Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14002Programming Techniqueshttps://scigraph.springernature.com/ontologies/product-market-codes/I14010Software Engineeringhttps://scigraph.springernature.com/ontologies/product-market-codes/I14029Information Systems Applications (incl. Internet)https://scigraph.springernature.com/ontologies/product-market-codes/I18040Artificial Intelligencehttps://scigraph.springernature.com/ontologies/product-market-codes/I21000Computer communication systems.Software engineering.Computer programming.Application software.Artificial intelligence.Computer Communication Networks.Software Engineering/Programming and Operating Systems.Programming Techniques.Software Engineering.Information Systems Applications (incl. Internet).Artificial Intelligence.004.6Dillon Tharamedthttp://id.loc.gov/vocabulary/relators/edtHerrero Pilaredthttp://id.loc.gov/vocabulary/relators/edtBOOK996465675403316On the Move to Meaningful Internet Systems, OTM 20102589230UNISA