LEADER 09880nam 22008895 450 001 9910483672703321 005 20251226202956.0 010 $a3-642-05148-0 024 7 $a10.1007/978-3-642-05148-7 035 $a(CKB)1000000000804444 035 $a(SSID)ssj0000355576 035 $a(PQKBManifestationID)12100665 035 $a(PQKBTitleCode)TC0000355576 035 $a(PQKBWorkID)10340754 035 $a(PQKB)10699424 035 $a(SSID)ssj0000355575 035 $a(PQKBManifestationID)11266151 035 $a(PQKBTitleCode)TC0000355575 035 $a(PQKBWorkID)10320386 035 $a(PQKB)10892640 035 $a(DE-He213)978-3-642-05148-7 035 $a(MiAaPQ)EBC3064797 035 $a(PPN)139962387 035 $a(EXLCZ)991000000000804444 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aOn the Move to Meaningful Internet Systems: OTM 2009 $eConfederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part I /$fedited by Robert Meersman, Tharam Dillon, Pilar Herrero 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (XXVI, 793 p.) 225 1 $aInformation Systems and Applications, incl. Internet/Web, and HCI,$x2946-1642 ;$v5870 300 $aSelected conference papers. 311 08$a3-642-05147-2 320 $aIncludes bibliographical references and index. 327 $aCoopIS 2009 Keynote -- Developing Collaborative Working Environments and What Can We Learn from Web 2.0 -- DOA 2009 Keynote -- Third Party Services for Enabling Business-to-Business Interactions -- Cooperative Information Systems (CoopIS) International Conference 2009 -- CoopIS 2009 ? PC Co-chairs? Message -- Workflow -- Resolution of Compliance Violation in Business Process Models: A Planning-Based Approach -- A Two-Stage Probabilistic Approach to Manage Personal Worklist in Workflow Management Systems -- Flaws in the Flow: The Weakness of Unstructured Business Process Modeling Languages Dealing with Data -- Process Models -- Maintaining Compliance in Customizable Process Models -- Measuring the Compliance of Processes with Reference Models -- Ontology Challenges -- Formalized Conflicts Detection Based on the Analysis of Multiple Emails: An Approach Combining Statistics and Ontologies -- Semantic Annotations and Querying of Web Data Sources -- An Extended Petri-Net Based Approach for Supply Chain Process Enactment in Resource-Centric Web Service Environment -- Network Complexity 1 -- Anonymity and Censorship Resistance in Unstructured Overlay Networks -- An Information Brokering Service Provider (IBSP) for Virtual Clusters -- Efficient Hierarchical Quorums in Unstructured Peer-to-Peer Networks -- Network Complexity 2 -- Load-Aware Dynamic Replication Management in a Data Grid -- Resource Planning for Massive Number of Process Instances -- Assessment of Service Protocols Adaptability Using a Novel Path Computation Technique -- Modeling Cooperation -- Enhancing Business Process Automation by Integrating RFID Data and Events -- An Integrated Approach to Managing Business Process Risk Using Rich Organizational Models -- Revisiting the Behavior of Fault and Compensation Handlers in WS-BPEL.-Information Complexity -- Understanding User Preferences and Awareness: Privacy Mechanisms in Location-Based Services -- Information Sharing Modalities for Mobile Ad-Hoc Networks -- Unveiling Hidden Unstructured Regions in Process Models -- Infrastructure -- Cafe: A Generic Configurable Customizable Composite Cloud Application Framework -- Implementing Isolation for Service-Based Applications -- An Executable Calculus for Service Choreography -- The Influence of an External Transaction on a BPEL Scope -- Cooperating SQL Dataflow Processes for In-DB Analytics -- Information -- Process Fragments -- Complex Schema Match Discovery and Validation through Collaboration -- Trust- and Location-Based Recommendations for Tourism -- Collaborative Ad-Hoc Information Sharing in Cross-Media Information Environments -- Distributed Objects and Applications (DOA) International Conference 2009 -- DOA 2009 ? PC Co-chairs? Message -- Aspect-Oriented Approaches for Distributed Middleware -- Aspect-Oriented Space Containers for Efficient Publish/Subscribe Scenarios in Intelligent Transportation Systems -- Distributed Algorithms and Communication Protocols -- Parallel Interconnection of Broadcast Systems with Multiple FIFO Channels -- Distributed Databases and Transactional Systems -- Revising 1-Copy Equivalence in Replicated Databases with Snapshot Isolation -- TMBean: Optimistic Concurrency in Application Servers Using Transactional Memory -- Distributed Infrastructures for Cluster and Grid Computing -- Optimizing Data Management in Grid Environments -- Object-Based, Component-Based, Resource-Oriented, Event-Oriented and Service-Oriented Middleware -- CA3M: A Runtime Model and a Middleware for Dynamic Context Management -- Engineering Distributed Shared Memory Middleware for Java -- Peer to Peer and DecentralizedInfrastructures -- CLON: Overlay Networks and Gossip Protocols for Cloud Environments -- A Solution to Resource Underutilization for Web Services Hosted in the Cloud -- Performance Analysis of Distributed Computing Systems -- On the Cost of Prioritized Atomic Multicast Protocols -- Evaluating Throughput Stability of Protocols for Distributed Middleware -- Evaluating Transport Protocols for Real-Time Event Stream Processing Middleware and Applications -- Reliability, Fault Tolerance, Quality of Service, and Real Time Support -- Reliable Communication Infrastructure for Adaptive Data Replication -- FT-OSGi: Fault Tolerant Extensions to the OSGi Service Platform -- A Component Assignment Framework for Improved Capacity and Assured Performance in Web Portals -- A Stability Criteria Membership Protocol for Ad Hoc Networks -- Proactive Byzantine Quorum Systems -- Self* Properties in Distributed Middleware -- Model-Driven Development of Adaptive Applications with Self-Adaptive Mobile Processes -- Software Engineering for Distributed Middleware Systems -- An Architecture Independent Approach to Emulating Computation Intensive Workload for Early Integration Testing of Enterprise DRE Systems -- Security and Privacy in a Connected World -- Managing Reputation in Contract-Based Distributed Systems -- Ubiquitous and Pervasive Computing -- A Distributed Approach to Local Adaptation Decision Making for Sequential Applications in Pervasive Environments. 330 $aThis two-volume set LNCS 5870/5871 constitutes the refereed proceedings of the four confederated international conferences on Cooperative Information Systems (CoopIS 2009), Distributed Objects and Applications (DOA 2009), Information Security (IS 2009), and Ontologies, Databases and Applications of Semantics (ODBASE 2009), held as OTM 2009 in Vilamoura, Portugal, in November 2009. The 83 revised full papers presented together with 4 keynote talks were carefully reviewed and selected from a total of 234 submissions. Corresponding to the four OTM 2009 main conferences CoopIS, DOA, IS, and ODBASE the papers are organized in topical sections on workflow; process models; ontology challenges; network complexity; modeling cooperation; information complexity; infrastructure; information; aspect-oriented approaches for distributed middleware; distributed algorithms and communication protocols; distributed infrastructures for cluster and Grid computing; object-based, component-based, resource-oriented, event-oriented, and service-oriented middleware; peer-to-peer and centralized infrastructures; performance analysis of distributed computing systems; reliability, fault tolerance, quality of service, and real time support; self* properties in distributed middleware; software engineering for distributed middleware systems; security and privacy in a connected world; ubiquitous and pervasive computing; information systems security; privacy and authentication; security policies and verification; managing ontologies; using ontologies; event processing; dealing with heterogeneity; building knowledge bases; and XML and XML schema. 410 0$aInformation Systems and Applications, incl. Internet/Web, and HCI,$x2946-1642 ;$v5870 606 $aComputer networks 606 $aData protection 606 $aComputer science 606 $aDatabase management 606 $aData mining 606 $aApplication software 606 $aComputer Communication Networks 606 $aData and Information Security 606 $aTheory of Computation 606 $aDatabase Management 606 $aData Mining and Knowledge Discovery 606 $aComputer and Information Systems Applications 615 0$aComputer networks. 615 0$aData protection. 615 0$aComputer science. 615 0$aDatabase management. 615 0$aData mining. 615 0$aApplication software. 615 14$aComputer Communication Networks. 615 24$aData and Information Security. 615 24$aTheory of Computation. 615 24$aDatabase Management. 615 24$aData Mining and Knowledge Discovery. 615 24$aComputer and Information Systems Applications. 676 $a005.75/8 701 $aMeersman$b R$053963 701 $aDillon$b Tharam S.$f1943-$0968036 701 $aHerrero$b Pilar$g(Herrero Martin)$0739388 712 12$aOTM Confederated International Conferences 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483672703321 996 $aOn the move to meaningful Internet systems - OTM 2009$94197030 997 $aUNINA