Vai al contenuto principale della pagina

On the Move to Meaningful Internet Systems: OTM 2015 Conferences [[electronic resource] ] : Confederated International Conferences: CoopIS, ODBASE, and C&TC 2015, Rhodes, Greece, October 26-30, 2015. Proceedings / / edited by Christophe Debruyne, Hervé Panetto, Robert Meersman, Tharam Dillon, Georg Weichhart, Yuan An, Claudio Agostino Ardagna



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: On the Move to Meaningful Internet Systems: OTM 2015 Conferences [[electronic resource] ] : Confederated International Conferences: CoopIS, ODBASE, and C&TC 2015, Rhodes, Greece, October 26-30, 2015. Proceedings / / edited by Christophe Debruyne, Hervé Panetto, Robert Meersman, Tharam Dillon, Georg Weichhart, Yuan An, Claudio Agostino Ardagna Visualizza cluster
Pubblicazione: Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Edizione: 1st ed. 2015.
Descrizione fisica: 1 online resource (XXV, 678 p. 236 illus. in color.)
Disciplina: 005.758
Soggetto topico: Application software
Information storage and retrieval
Software engineering
Artificial intelligence
Computer security
Information Systems Applications (incl. Internet)
Information Storage and Retrieval
Software Engineering
Artificial Intelligence
Systems and Data Security
Computer Appl. in Administrative Data Processing
Persona (resp. second.): DebruyneChristophe
PanettoHervé
MeersmanRobert
DillonTharam
WeichhartGeorg
AnYuan
ArdagnaClaudio Agostino
Note generali: Bibliographic Level Mode of Issuance: Monograph
Nota di contenuto: Intro -- General Co-Chairs' Message for OnThe Move 2015,Rhodes, Greece -- Organization -- OnThe Move 2015 Keynotes -- Data Semantics in the Days of Big Data -- Reusable Coordination Components: A SilverBullet for Reliable Development of Cooperative Information Systems? -- Durable Modeling and Ever-Changing Implementation Technologies -- From (Security) Research to Innovation -- Contents -- CoopIS 2015 PC Co-Chairs' Message -- CoopIS 2015 PC Co-Chairs' Message -- Collaborative Autonomic Management of Distributed Component-Based Applications -- 1 Introduction -- 2 Autonomic Container for the Management of Component-Based Applications -- 2.1 Architectural Description of Component-Based Applications -- 2.2 Structure of the Autonomic Container -- The Proxy Component: -- The Monitoring Component: -- The Knowledge Component: -- The Analysis Component: -- The Planning Component: -- The Execution Component: -- 2.3 Covered Autonomic Loops -- Reactive Autonomic Loop: -- Deliberative Autonomic Loop: -- 3 Use Case Study -- 3.1 Reactive Loop Scenario -- 3.2 Deliberative Loop: Horizontal Collaboration Scenario -- 3.3 Deliberative Loop: Vertical Collaboration Scenario -- 4 Implementation -- 5 Evaluation -- 6 Related Work -- 7 Conclusion -- References -- An Efficient Optimization Algorithm of Autonomic Managers in Service-Based Applications -- 1 Introduction -- 2 Autonomic Management of Service-Based Applications -- 2.1 The MAPE-K Control Loop -- 2.2 Service-Based Application -- 2.3 SBA Graphs -- 2.4 Problem Statement -- 3 Algorithm for an Efficient Optimization of MAPE-K Loops in SBAs -- 3.1 Approach Overview -- 3.2 Predecessor Procedure -- 3.3 LowerBound Procedure -- 3.4 ServiceRelatedParallelSets Procedure -- 3.5 AutonomicLoopsAssignement Procedure -- 4 Experiments -- 4.1 Experiments on Architecture-Based Compositions -- Complexity. -- Quality.
4.2 Experiments on Behavior-Based Compositions -- Complexity. -- Quality. -- 5 Related Work -- 5.1 Autonomic Computing -- 5.2 Optimization of Cloud Resources -- 6 Conclusion and Future Work -- References -- TrustedMR: A Trusted MapReduce System Based on Tamper Resistance Hardware -- 1 Introduction -- 2 Related Works -- 2.1 Security in MapReduce -- 2.2 Security in Other Systems -- 3 Context of the Study -- 3.1 Architecture -- 3.2 Threat Model -- 4 Proposed Solutions -- 4.1 MapReduce Job Execution Phases -- 4.2 Proposed Solution -- 4.3 How Our Proposed Solution Meets the Requirements -- 5 Privacy Analysis -- 5.1 Security of Basic Encryption Schemes -- 5.2 Information Exposure with Coefficient -- 6 Performance Evaluation -- 6.1 Unit Test on Development Board -- 6.2 Experimental Setup -- 6.3 Scaling with Parallel Computing -- 6.4 Scaling Depth versu us Scaling Width -- 7 Conclusion -- References -- Similarity and Trust to Form Groups in Online Social Networks -- 1 Introduction -- 2 Trust, Similarity and Compactness -- 2.1 Similarity and Compactness -- 3 Associating Users and Groups -- 3.1 The Algorithms U2G and U2G-O -- 3.2 Algorithm G2U -- 4 Experimental Evaluation -- 5 Related Work -- 6 Conclusions and Future Work -- References -- Supporting Peer Help in Collaborative Learning Environments: A Discussion Based on Two Case Studies -- 1 Introduction -- 2 Background -- 2.1 Peer-Help Systems -- 2.2 Collaborative Learning Environments -- 3 User Studies -- 3.1 Case Study 1: Helping to Focus on the Questions -- 3.2 Case Study 2: Helping Focusing on the Pair Formation -- 4 Discussion -- 5 Conclusion -- References -- Finding Collective Decisions: Change Negotiation in Collaborative Business Processes -- 1 Introduction -- 2 Change Negotiation Scenarios and Motivating Example -- 2.1 Change Negotiation Scenarios -- 2.2 Motivating Example -- 3 Problem Formulation.
3.1 Process Changes -- 3.2 Goals and Preferences -- 4 Collective Decision -- 5 Implementation and Analysis -- 6 Related Work -- 7 Conclusion -- References -- Real-Time Relevance Matching of News and Tweets -- 1 Introduction -- Challenges. -- Present Work. -- Contributions. -- 2 Related Work -- Analysis of Twitter. -- News and Twitter. -- Potential of Twitter. -- 3 Problem Formulation -- Problem. -- 4 Existing Techniques -- 4.1 DAAT for Pub-Sub -- Approach. -- Algorithm. -- Example. -- 4.2 DAAT for Pub-Sub with Skipping -- Main Idea. -- Approach. -- 5 Proposed Method -- 5.1 Predicting Threshold -- Main Idea. -- Approach. -- Algorithm. -- Example. -- 5.2 Matching Method -- Main Idea. -- Algorithm. -- Example. -- 6 Experimental Evaluation -- Condition. -- Datasets. -- 6.1 Similarity Comparison -- Setup. -- Results and Discussion. -- 6.2 Accuracy -- Setup. -- Results and Discussion. -- 6.3 Update Time -- Setup. -- Results and Discussion. -- 6.4 Matching Time -- Setup. -- Results and Discussion. -- 7 Conclusion -- References -- Context-Aware Process Injection -- 1 Introduction -- 2 Backgrounds -- 3 Context-Aware Process Injection in a Nutshell -- 4 Components of Context-Aware Process Families -- 4.1 Extension Areas -- 4.2 Process Parameters -- 4.3 Contextual Situations -- 4.4 Injection Specifications -- 5 The Process of Context-aware Process Injection -- 5.1 The Modeling of Context-aware Process Families -- 5.2 The Execution of Context-Aware Process Families -- 6 Validation -- 6.1 Proof-of-Concept Prototype -- 6.2 Case Study -- 7 Related Work -- 8 Conclusion -- References -- A Multi-view Learning Approach to the Discovery of Deviant Process Instances -- 1 Introduction -- 2 Related Work -- 3 Preliminaries and Formal Framework -- 4 Problem Statement and Solution Approach -- 4.1 Target Deviance-Detection Model (HO-DDM) -- 4.2 Algorithm HO-DDM-mine.
4.3 Implementation -- 5 Experiments -- 5.1 Dataset -- 5.2 Evaluation Metrics -- 5.3 Parameter Settings -- 5.4 Test Results -- 6 Conclusion -- References -- A Genetic Algorithm for Automatic Business Process Test Case Selection -- 1 Introduction -- 2 Coverage Metrics -- 2.1 Optimal Coverage: Optimal Number of Test Cases per Node -- 2.2 Test Coverage Metrics: Coverage of all Enabled Test Cases -- 3 Genetic Selection Algorithm -- 4 Evaluation -- 5 Related Work -- 6 Conclusions -- References -- Discovering BPMN Models with Sub-Processes and Multi-instance Markers -- 1 Introduction -- 2 Preliminaries -- 3 Instance Tree and Hierarchy Tree -- 4 Procedure to Discover BPMN Models -- 5 Experimental Evaluation -- 5.1 Evaluation Based on Real-Life Logs -- 5.2 Evaluation Based o on Artificial Logs -- 6 Related Work -- 7 Conclusion -- References -- Information Quality in Dynamic Networked Business Process Management -- 1 Introduction -- 2 Research Approach -- 2.1 Development Phase -- 2.2 Evaluation Phase -- 3 Exploration of IQ Issues in DNBP -- 3.1 Characterization of Dynamism in Networked Business Processes -- 3.2 Characterization of Different Dimensions of IQ -- 3.3 Exploration of IQ Issues Resulting from DNBP -- 4 The Evaluation of the Practical Significance of the Explored IQ Issues -- 5 Related Work -- 6 Conclusion -- References -- Utilizing the Hive Mind -- How to Manage Knowledge in Fully Distributed Environments -- 1 Introduction -- 2 System Model and Problem Formulation -- 3 Confidence -- 3.1 Clustering -- 3.2 Cluster-Based Confidence -- 3.3 Discussion -- 4 Routing -- 4.1 Knowledge Aggregation Based Routing -- Routing a Query. -- 4.2 Query Learning Based Routing -- Routing a Query. -- Discussion. -- 5 Evaluation -- 5.1 Knowledge Aggregation Routing (KAR) -- 5.2 Query Learning Based Routing (QLR) -- 6 Related Work -- 7 Conclusion.
∂u∂u Multi-Tenanted Framework: Distributed Near Duplicate Detection for Big Data -- 1 Introduction -- 2 Background and Related Work -- 2.1 Near Duplicate Detection -- 2.2 In-Memory Data Grids -- 3 Solution Architecture -- 3.1 ∂u∂u Multi-tenanted Parallel Executions -- 3.2 Distributed Execution Framework -- 3.3 Near Duplicate Detection for Big Data -- 4 ∂u∂u Prototype -- 5 Evaluation -- 6 Conclusion and Future Work -- References -- Multilevel Mapping of Ecosystem Descriptions -- 1 Ecosystem Interoperability -- 2 The SLICER Relationship Framework -- 3 Lifecycle Management -- 4 Conclusion -- References -- Determining the Quality of Product Data Integration -- 1 Introduction -- 2 A Framework for Product Data Integration -- 2.1 Local and Global Product Ontology -- 2.2 Schema Concept Rules and Actions -- 2.3 Integration Set -- 2.4 Initial Integration -- 3 Requirements -- 4 Measuring the Quality of Product Data Integration -- 4.1 Local-to-Global Mapping -- 4.2 Global-to-Local Mapping -- 4.3 Reference Values -- 5 Proof-of-Concept Prototype -- 6 Case Study -- 7 Related Work -- 8 Summary and Outlook -- References -- Inference Control in Data Integration Systems -- 1 Introduction -- 2 Related Work -- 2.1 Formal Concept Analysis and Access Control -- 2.2 Views, Access Control and Inferences -- 2.3 Inference Problem -- 3 Example -- 4 Inference Detection: A Formal Concept Analysis Based Approach -- 4.1 Synthesizing the Global Schema, the Global Policy and the Global Functional Dependencies -- 4.2 Discovery Phase -- 4.3 Policy Healing -- 5 Experiments -- 6 Conclusion -- References -- Integrated Process Oriented Requirements Management -- 1 Introduction -- 2 Literature Review and Goals -- 3 Method -- 4 Industrial Application -- 5 Conclusion and Research Perspective -- References -- Supporting Structural Consistency Checking in Adaptive Case Management.
1 Introduction.
Sommario/riassunto: This volume constitutes the refereed proceedings of the Confederated International Conferences: Cooperative Information Systems, CoopIS 2015, Ontologies, Databases, and Applications of Semantics, ODBASE 2015, and Cloud and Trusted Computing, C&TC, held as part of OTM 2015 in October 2015 in Rhodes, Greece. The 30 full papers presented together with 15 short papers were carefully reviewed and selected from 144 initial submissions. The OTM program every year covers data and Web semantics, distributed objects, Web services, databases, information systems, enterprise workflow and collaboration, ubiquity, interoperability, mobility, grid and high-performance computing.
Titolo autorizzato: On the Move to Meaningful Internet Systems: OTM 2015 Conferences  Visualizza cluster
ISBN: 3-319-26148-7
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 996466443203316
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Serie: Information Systems and Applications, incl. Internet/Web, and HCI ; ; 9415