LEADER 14051nam 22009255 450 001 9910484456903321 005 20200629201612.0 010 $a3-319-26148-7 024 7 $a10.1007/978-3-319-26148-5 035 $a(CKB)4340000000001198 035 $a(SSID)ssj0001585385 035 $a(PQKBManifestationID)16263067 035 $a(PQKBTitleCode)TC0001585385 035 $a(PQKBWorkID)14865976 035 $a(PQKB)11758048 035 $a(DE-He213)978-3-319-26148-5 035 $a(MiAaPQ)EBC6297413 035 $a(MiAaPQ)EBC5610634 035 $a(Au-PeEL)EBL5610634 035 $a(OCoLC)1078998116 035 $a(PPN)190529415 035 $a(EXLCZ)994340000000001198 100 $a20151014d2015 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aOn the Move to Meaningful Internet Systems: OTM 2015 Conferences $eConfederated International Conferences: CoopIS, ODBASE, and C&TC 2015, Rhodes, Greece, October 26-30, 2015. Proceedings /$fedited by Christophe Debruyne, Hervé Panetto, Robert Meersman, Tharam Dillon, Georg Weichhart, Yuan An, Claudio Agostino Ardagna 205 $a1st ed. 2015. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2015. 215 $a1 online resource (XXV, 678 p. 236 illus. in color.) 225 1 $aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v9415 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-26147-9 327 $aIntro -- General Co-Chairs' Message for OnThe Move 2015,Rhodes, Greece -- Organization -- OnThe Move 2015 Keynotes -- Data Semantics in the Days of Big Data -- Reusable Coordination Components: A SilverBullet for Reliable Development of Cooperative Information Systems? -- Durable Modeling and Ever-Changing Implementation Technologies -- From (Security) Research to Innovation -- Contents -- CoopIS 2015 PC Co-Chairs' Message -- CoopIS 2015 PC Co-Chairs' Message -- Collaborative Autonomic Management of Distributed Component-Based Applications -- 1 Introduction -- 2 Autonomic Container for the Management of Component-Based Applications -- 2.1 Architectural Description of Component-Based Applications -- 2.2 Structure of the Autonomic Container -- The Proxy Component: -- The Monitoring Component: -- The Knowledge Component: -- The Analysis Component: -- The Planning Component: -- The Execution Component: -- 2.3 Covered Autonomic Loops -- Reactive Autonomic Loop: -- Deliberative Autonomic Loop: -- 3 Use Case Study -- 3.1 Reactive Loop Scenario -- 3.2 Deliberative Loop: Horizontal Collaboration Scenario -- 3.3 Deliberative Loop: Vertical Collaboration Scenario -- 4 Implementation -- 5 Evaluation -- 6 Related Work -- 7 Conclusion -- References -- An Efficient Optimization Algorithm of Autonomic Managers in Service-Based Applications -- 1 Introduction -- 2 Autonomic Management of Service-Based Applications -- 2.1 The MAPE-K Control Loop -- 2.2 Service-Based Application -- 2.3 SBA Graphs -- 2.4 Problem Statement -- 3 Algorithm for an Efficient Optimization of MAPE-K Loops in SBAs -- 3.1 Approach Overview -- 3.2 Predecessor Procedure -- 3.3 LowerBound Procedure -- 3.4 ServiceRelatedParallelSets Procedure -- 3.5 AutonomicLoopsAssignement Procedure -- 4 Experiments -- 4.1 Experiments on Architecture-Based Compositions -- Complexity. -- Quality. 327 $a4.2 Experiments on Behavior-Based Compositions -- Complexity. -- Quality. -- 5 Related Work -- 5.1 Autonomic Computing -- 5.2 Optimization of Cloud Resources -- 6 Conclusion and Future Work -- References -- TrustedMR: A Trusted MapReduce System Based on Tamper Resistance Hardware -- 1 Introduction -- 2 Related Works -- 2.1 Security in MapReduce -- 2.2 Security in Other Systems -- 3 Context of the Study -- 3.1 Architecture -- 3.2 Threat Model -- 4 Proposed Solutions -- 4.1 MapReduce Job Execution Phases -- 4.2 Proposed Solution -- 4.3 How Our Proposed Solution Meets the Requirements -- 5 Privacy Analysis -- 5.1 Security of Basic Encryption Schemes -- 5.2 Information Exposure with Coefficient -- 6 Performance Evaluation -- 6.1 Unit Test on Development Board -- 6.2 Experimental Setup -- 6.3 Scaling with Parallel Computing -- 6.4 Scaling Depth versu us Scaling Width -- 7 Conclusion -- References -- Similarity and Trust to Form Groups in Online Social Networks -- 1 Introduction -- 2 Trust, Similarity and Compactness -- 2.1 Similarity and Compactness -- 3 Associating Users and Groups -- 3.1 The Algorithms U2G and U2G-O -- 3.2 Algorithm G2U -- 4 Experimental Evaluation -- 5 Related Work -- 6 Conclusions and Future Work -- References -- Supporting Peer Help in Collaborative Learning Environments: A Discussion Based on Two Case Studies -- 1 Introduction -- 2 Background -- 2.1 Peer-Help Systems -- 2.2 Collaborative Learning Environments -- 3 User Studies -- 3.1 Case Study 1: Helping to Focus on the Questions -- 3.2 Case Study 2: Helping Focusing on the Pair Formation -- 4 Discussion -- 5 Conclusion -- References -- Finding Collective Decisions: Change Negotiation in Collaborative Business Processes -- 1 Introduction -- 2 Change Negotiation Scenarios and Motivating Example -- 2.1 Change Negotiation Scenarios -- 2.2 Motivating Example -- 3 Problem Formulation. 327 $a3.1 Process Changes -- 3.2 Goals and Preferences -- 4 Collective Decision -- 5 Implementation and Analysis -- 6 Related Work -- 7 Conclusion -- References -- Real-Time Relevance Matching of News and Tweets -- 1 Introduction -- Challenges. -- Present Work. -- Contributions. -- 2 Related Work -- Analysis of Twitter. -- News and Twitter. -- Potential of Twitter. -- 3 Problem Formulation -- Problem. -- 4 Existing Techniques -- 4.1 DAAT for Pub-Sub -- Approach. -- Algorithm. -- Example. -- 4.2 DAAT for Pub-Sub with Skipping -- Main Idea. -- Approach. -- 5 Proposed Method -- 5.1 Predicting Threshold -- Main Idea. -- Approach. -- Algorithm. -- Example. -- 5.2 Matching Method -- Main Idea. -- Algorithm. -- Example. -- 6 Experimental Evaluation -- Condition. -- Datasets. -- 6.1 Similarity Comparison -- Setup. -- Results and Discussion. -- 6.2 Accuracy -- Setup. -- Results and Discussion. -- 6.3 Update Time -- Setup. -- Results and Discussion. -- 6.4 Matching Time -- Setup. -- Results and Discussion. -- 7 Conclusion -- References -- Context-Aware Process Injection -- 1 Introduction -- 2 Backgrounds -- 3 Context-Aware Process Injection in a Nutshell -- 4 Components of Context-Aware Process Families -- 4.1 Extension Areas -- 4.2 Process Parameters -- 4.3 Contextual Situations -- 4.4 Injection Specifications -- 5 The Process of Context-aware Process Injection -- 5.1 The Modeling of Context-aware Process Families -- 5.2 The Execution of Context-Aware Process Families -- 6 Validation -- 6.1 Proof-of-Concept Prototype -- 6.2 Case Study -- 7 Related Work -- 8 Conclusion -- References -- A Multi-view Learning Approach to the Discovery of Deviant Process Instances -- 1 Introduction -- 2 Related Work -- 3 Preliminaries and Formal Framework -- 4 Problem Statement and Solution Approach -- 4.1 Target Deviance-Detection Model (HO-DDM) -- 4.2 Algorithm HO-DDM-mine. 327 $a4.3 Implementation -- 5 Experiments -- 5.1 Dataset -- 5.2 Evaluation Metrics -- 5.3 Parameter Settings -- 5.4 Test Results -- 6 Conclusion -- References -- A Genetic Algorithm for Automatic Business Process Test Case Selection -- 1 Introduction -- 2 Coverage Metrics -- 2.1 Optimal Coverage: Optimal Number of Test Cases per Node -- 2.2 Test Coverage Metrics: Coverage of all Enabled Test Cases -- 3 Genetic Selection Algorithm -- 4 Evaluation -- 5 Related Work -- 6 Conclusions -- References -- Discovering BPMN Models with Sub-Processes and Multi-instance Markers -- 1 Introduction -- 2 Preliminaries -- 3 Instance Tree and Hierarchy Tree -- 4 Procedure to Discover BPMN Models -- 5 Experimental Evaluation -- 5.1 Evaluation Based on Real-Life Logs -- 5.2 Evaluation Based o on Artificial Logs -- 6 Related Work -- 7 Conclusion -- References -- Information Quality in Dynamic Networked Business Process Management -- 1 Introduction -- 2 Research Approach -- 2.1 Development Phase -- 2.2 Evaluation Phase -- 3 Exploration of IQ Issues in DNBP -- 3.1 Characterization of Dynamism in Networked Business Processes -- 3.2 Characterization of Different Dimensions of IQ -- 3.3 Exploration of IQ Issues Resulting from DNBP -- 4 The Evaluation of the Practical Significance of the Explored IQ Issues -- 5 Related Work -- 6 Conclusion -- References -- Utilizing the Hive Mind -- How to Manage Knowledge in Fully Distributed Environments -- 1 Introduction -- 2 System Model and Problem Formulation -- 3 Confidence -- 3.1 Clustering -- 3.2 Cluster-Based Confidence -- 3.3 Discussion -- 4 Routing -- 4.1 Knowledge Aggregation Based Routing -- Routing a Query. -- 4.2 Query Learning Based Routing -- Routing a Query. -- Discussion. -- 5 Evaluation -- 5.1 Knowledge Aggregation Routing (KAR) -- 5.2 Query Learning Based Routing (QLR) -- 6 Related Work -- 7 Conclusion. 327 $a?u?u Multi-Tenanted Framework: Distributed Near Duplicate Detection for Big Data -- 1 Introduction -- 2 Background and Related Work -- 2.1 Near Duplicate Detection -- 2.2 In-Memory Data Grids -- 3 Solution Architecture -- 3.1 ?u?u Multi-tenanted Parallel Executions -- 3.2 Distributed Execution Framework -- 3.3 Near Duplicate Detection for Big Data -- 4 ?u?u Prototype -- 5 Evaluation -- 6 Conclusion and Future Work -- References -- Multilevel Mapping of Ecosystem Descriptions -- 1 Ecosystem Interoperability -- 2 The SLICER Relationship Framework -- 3 Lifecycle Management -- 4 Conclusion -- References -- Determining the Quality of Product Data Integration -- 1 Introduction -- 2 A Framework for Product Data Integration -- 2.1 Local and Global Product Ontology -- 2.2 Schema Concept Rules and Actions -- 2.3 Integration Set -- 2.4 Initial Integration -- 3 Requirements -- 4 Measuring the Quality of Product Data Integration -- 4.1 Local-to-Global Mapping -- 4.2 Global-to-Local Mapping -- 4.3 Reference Values -- 5 Proof-of-Concept Prototype -- 6 Case Study -- 7 Related Work -- 8 Summary and Outlook -- References -- Inference Control in Data Integration Systems -- 1 Introduction -- 2 Related Work -- 2.1 Formal Concept Analysis and Access Control -- 2.2 Views, Access Control and Inferences -- 2.3 Inference Problem -- 3 Example -- 4 Inference Detection: A Formal Concept Analysis Based Approach -- 4.1 Synthesizing the Global Schema, the Global Policy and the Global Functional Dependencies -- 4.2 Discovery Phase -- 4.3 Policy Healing -- 5 Experiments -- 6 Conclusion -- References -- Integrated Process Oriented Requirements Management -- 1 Introduction -- 2 Literature Review and Goals -- 3 Method -- 4 Industrial Application -- 5 Conclusion and Research Perspective -- References -- Supporting Structural Consistency Checking in Adaptive Case Management. 327 $a1 Introduction. 330 $aThis volume constitutes the refereed proceedings of the Confederated International Conferences: Cooperative Information Systems, CoopIS 2015, Ontologies, Databases, and Applications of Semantics, ODBASE 2015, and Cloud and Trusted Computing, C&TC, held as part of OTM 2015 in October 2015 in Rhodes, Greece. The 30 full papers presented together with 15 short papers were carefully reviewed and selected from 144 initial submissions. The OTM program every year covers data and Web semantics, distributed objects, Web services, databases, information systems, enterprise workflow and collaboration, ubiquity, interoperability, mobility, grid and high-performance computing. 410 0$aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v9415 606 $aApplication software 606 $aInformation storage and retrieval 606 $aSoftware engineering 606 $aArtificial intelligence 606 $aComputer security 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aInformation Storage and Retrieval$3https://scigraph.springernature.com/ontologies/product-market-codes/I18032 606 $aSoftware Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I14029 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Appl. in Administrative Data Processing$3https://scigraph.springernature.com/ontologies/product-market-codes/I2301X 615 0$aApplication software. 615 0$aInformation storage and retrieval. 615 0$aSoftware engineering. 615 0$aArtificial intelligence. 615 0$aComputer security. 615 14$aInformation Systems Applications (incl. Internet). 615 24$aInformation Storage and Retrieval. 615 24$aSoftware Engineering. 615 24$aArtificial Intelligence. 615 24$aSystems and Data Security. 615 24$aComputer Appl. in Administrative Data Processing. 676 $a005.758 702 $aDebruyne$b Christophe$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPanetto$b Hervé$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMeersman$b Robert$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDillon$b Tharam$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWeichhart$b Georg$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAn$b Yuan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aArdagna$b Claudio Agostino$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484456903321 996 $aOn the Move to Meaningful Internet Systems: OTM 2015 Conferences$92830821 997 $aUNINA