LEADER 05720nam 2200565Ia 450 001 9910483351003321 005 20200520144314.0 010 $a3-642-16934-1 024 7 $a10.1007/978-3-642-16934-2 035 $a(CKB)2670000000056664 035 $a(SSID)ssj0000446671 035 $a(PQKBManifestationID)11312990 035 $a(PQKBTitleCode)TC0000446671 035 $a(PQKBWorkID)10496422 035 $a(PQKB)11534347 035 $a(DE-He213)978-3-642-16934-2 035 $a(MiAaPQ)EBC3066122 035 $a(PPN)149890516 035 $a(EXLCZ)992670000000056664 100 $a20100929d2010 uy 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 00$aOn the move to meaningful internet systems$b[electronic resource] $eOTM 2010 ; confederated international conferences: COOPIS, IS, DOA and ODBASE, Hersonissos, Crete, Greece, October 25-29, 2010, proceedings$hPart I /$fRobert Meersman, Tharam S. Dillon, Pilar Herrero (eds.) 205 $a1st ed. 2010. 210 $aBerlin ;$aNew York $cSpringer$d2010 215 $a1 online resource (XXII, 703 p. 230 illus.) 225 1 $aLecture notes in computer science ;$v6426 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-16933-3 320 $aIncludes bibliographical references and index. 327 $aOn the Move 2010 Keynotes -- OTM?10 Keynote -- OTM?10 Keynote -- COOPIS?10 Keynote -- Cooperative Information Systems (CoopIS) International Conference 2010 -- COOPIS?10 - PC Co-chairs Message -- Coopis Keynote Paper -- Configurable Services in the Cloud: Supporting Variability While Enabling Cross-Organizational Process Mining -- Process Models and Management -- A Process View Framework for Artifact-Centric Business Processes -- Monitoring Unmanaged Business Processes -- Fast Business Process Similarity Search with Feature-Based Similarity Estimation -- Quality Assessment of Business Process Models Based on Thresholds -- Merging Business Process Models -- Compliant Business Process Design Using Refinement Layers -- COMPRO: A Methodological Approach for Business Process Contextualisation -- Reducing Exception Handling Complexity in Business Process Modeling and Implementation: The WED-Flow Approach -- Modeling of Cooperation -- Continuous Monitoring in Evolving Business Networks -- Collaborative Coordination of Activities with Temporal Dependencies -- Generic Algorithms for Consistency Checking of Mutual-Exclusion and Binding Constraints in a Business Process Context -- Services Computing -- Collaborative Filtering Technique for Web Service Recommendation Based on User-Operation Combination -- Policy-Based Attestation of Service Behavior for Establishing Rigorous Trust -- Collecting, Annotating, and Classifying Public Web Services -- Managing Conflict of Interest in Service Composition -- Modelling and Automated Composition of User-Centric Services -- Coordinating Services for Accessing and Processing Data in Dynamic Environments -- Information Processing and Management -- The Roles of Reliability and Reputation in Competitive Multi Agent Systems -- Multilayer Superimposed Information for Collaborative Annotation in Wikis -- Supporting Complex Changes in Evolving Interrelated Web Databanks -- Workflow ART -- A Behavioral Similarity Measure between Labeled Petri Nets Based on Principal Transition Sequences -- Efficient and Accurate Retrieval of Business Process Models through Indexing -- The Biconnected Verification of Workflow Nets -- Business Process Scheduling with Resource Availability Constraints -- Achieving Recovery in Service Composition with Assurance Points and Integration Rules -- Business Protocol Adaptation for Flexible Chain Management -- Business Process Monitoring with BPath -- Human-Based Cooperative Systems -- CoMaP: A Cooperative Overlay-Based Mashup Platform -- Composing Near-Optimal Expert Teams: A Trade-Off between Skills and Connectivity -- Complementarity in Competence Management: Framework and Implementation -- Scalable XML Collaborative Editing with Undo -- A Cooperative Approach to View Selection and Placement in P2P Systems -- Ontology and Workflow Challenges -- Satisfaction and Coherence of Deadline Constraints in Inter-Organizational Workflows -- An Ontological Approach for Semantic Annotation of Supply Chain Process Models -- Defining Process Performance Indicators: An Ontological Approach -- Peer Rewiring in Semantic Overlay Networks under Churn -- International Symposium on Information Security (IS) International Conference 2010 -- IS?10 - PC Co-chairs Message -- Access Control, Authentication and Policies -- Mutual Preimage Authentication for Fast Handover in Enterprise Networks -- Supporting Role Based Provisioning with Rules Using OWL and F-Logic -- Using Real Option Thinking to Improve Decision Making in Security Investment -- Secure Architectures -- Context Sensitive Privacy Management in a Distributed Environment -- Semantic Attestation of Node Integrity in Overlays -- Applicability of Security Patterns -- Cryptography -- Leakage Quantification of Cryptographic Operations. 410 0$aLecture notes in computer science ;$v6426. 606 $aComputer networks$vCongresses 606 $aInternet$vCongresses 615 0$aComputer networks 615 0$aInternet 676 $a004.6 701 $aMeersman$b R$053963 701 $aDillon$b Tharam S.$f1943-$0968036 701 $aHerrero$b Pilar$f1959-$01750488 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483351003321 996 $aOn the move to meaningful internet systems$94185134 997 $aUNINA