On the Move to Meaningful Internet Systems: OTM 2009: Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part I

Overview

This two-volume set LNCS 5870/5871 constitutes the refereed proceedings of the four confederated international conferences on Cooperative Information Systems (CoopIS 2009), Distributed Objects and Applications (DOA 2009), Information Security (IS 2009), and Ontologies, Databases and Applications of Semantics (ODBASE 2009), held as OTM 2009 in Vilamoura, Portugal, in November 2009.

The 83 revised full papers presented together with 4 keynote talks were carefully reviewed and ...

See more details below
Paperback (2009)
$177.75
BN.com price
(Save 5%)$189.00 List Price
Other sellers (Paperback)
  • All (11) from $106.16   
  • New (7) from $106.16   
  • Used (4) from $110.46   
Sending request ...

Overview

This two-volume set LNCS 5870/5871 constitutes the refereed proceedings of the four confederated international conferences on Cooperative Information Systems (CoopIS 2009), Distributed Objects and Applications (DOA 2009), Information Security (IS 2009), and Ontologies, Databases and Applications of Semantics (ODBASE 2009), held as OTM 2009 in Vilamoura, Portugal, in November 2009.

The 83 revised full papers presented together with 4 keynote talks were carefully reviewed and selected from a total of 234 submissions. Corresponding to the four OTM 2009 main conferences CoopIS, DOA, IS, and ODBASE the papers are organized in topical sections on workflow; process models; ontology challenges; network complexity; modeling cooperation; information complexity; infrastructure; information; aspect-oriented approaches for distributed middleware; distributed algorithms and communication prools; distributed infrastructures for cluster and Grid computing; object-based, component-based, resource-oriented, event-oriented, and service-oriented middleware; peer-to-peer and centralized infrastructures; performance analysis of distributed computing systems; reliability, fault tolerance, quality of service, and real time support; self* properties in distributed middleware; software engineering for distributed middleware systems; security and privacy in a connected world; ubiquitous and pervasive computing; information systems security; privacy and authentication; security policies and verification; managing ontologies; using ontologies; event processing; dealing with heterogeneity; building knowledge bases; and XML and XML schema.

Read More Show Less

Product Details

Table of Contents

CoopIS 2009 Keynote.- Developing Collaborative Working Environments and What Can We Learn from Web 2.0.- DOA 2009 Keynote.- Third Party Services for Enabling Business-to-Business Interactions.- Cooperative Information Systems (CoopIS) International Conference 2009.- CoopIS 2009 – PC Co-chairs’ Message.- Workflow.- Resolution of Compliance Violation in Business Process Models: A Planning-Based Approach.- A Two-Stage Probabilistic Approach to Manage Personal Worklist in Workflow Management Systems.- Flaws in the Flow: The Weakness of Unstructured Business Process Modeling Languages Dealing with Data.- Process Models.- Maintaining Compliance in Customizable Process Models.- Measuring the Compliance of Processes with Reference Models.- Ontology Challenges.- Formalized Conflicts Detection Based on the Analysis of Multiple Emails: An Approach Combining Statistics and Ontologies.- Semantic Annotations and Querying of Web Data Sources.- An Extended Petri-Net Based Approach for Supply Chain Process Enactment in Resource-Centric Web Service Environment.- Network Complexity 1.- Anonymity and Censorship Resistance in Unstructured Overlay Networks.- An Information Brokering Service Provider (IBSP) for Virtual Clusters.- Efficient Hierarchical Quorums in Unstructured Peer-to-Peer Networks.- Network Complexity 2.- Load-Aware Dynamic Replication Management in a Data Grid.- Resource Planning for Massive Number of Process Instances.- Assessment of Service Prools Adaptability Using a Novel Path Computation Technique.- Modeling Cooperation.- Enhancing Business Process Automation by Integrating RFID Data and Events.- An Integrated Approach to Managing Business Process Risk Using Rich Organizational Models.- Revisiting the Behavior of Fault and Compensation Handlers in WS-BPEL.- Information Complexity.- Understanding User Preferences and Awareness: Privacy Mechanisms in Location-Based Services.- Information Sharing Modalities for Mobile Ad-Hoc Networks.- Unveiling Hidden Unstructured Regions in Process Models.- Infrastructure.- Cafe: A Generic Configurable Customizable Composite Cloud Application Framework.- Implementing Isolation for Service-Based Applications.- An Executable Calculus for Service Choreography.- The Influence of an External Transaction on a BPEL Scope.- Cooperating SQL Dataflow Processes for In-DB Analytics.- Information.- Process Fragments.- Complex Schema Match Discovery and Validation through Collaboration.- Trust- and Location-Based Recommendations for Tourism.- Collaborative Ad-Hoc Information Sharing in Cross-Media Information Environments.- Distributed Objects and Applications (DOA) International Conference 2009.- DOA 2009 – PC Co-chairs’ Message.- Aspect-Oriented Approaches for Distributed Middleware.- Aspect-Oriented Space Containers for Efficient Publish/Subscribe Scenarios in Intelligent Transportation Systems.- Distributed Algorithms and Communication Prools.- Parallel Interconnection of Broadcast Systems with Multiple FIFO Channels.- Distributed Databases and Transactional Systems.- Revising 1-Copy Equivalence in Replicated Databases with Snapshot Isolation.- TMBean: Optimistic Concurrency in Application Servers Using Transactional Memory.- Distributed Infrastructures for Cluster and Grid Computing.- Optimizing Data Management in Grid Environments.- Object-Based, Component-Based, Resource-Oriented, Event-Oriented and Service-Oriented Middleware.- CA3M: A Runtime Model and a Middleware for Dynamic Context Management.- Engineering Distributed Shared Memory Middleware for Java.- Peer to Peer and Decentralized Infrastructures.- CLON: Overlay Networks and Gossip Prools for Cloud Environments.- A Solution to Resource Underutilization for Web Services Hosted in the Cloud.- Performance Analysis of Distributed Computing Systems.- On the Cost of Prioritized Atomic Multicast Prools.- Evaluating Throughput Stability of Prools for Distributed Middleware.- Evaluating Transport Prools for Real-Time Event Stream Processing Middleware and Applications.- Reliability, Fault Tolerance, Quality of Service, and Real Time Support.- Reliable Communication Infrastructure for Adaptive Data Replication.- FT-OSGi: Fault Tolerant Extensions to the OSGi Service Platform.- A Component Assignment Framework for Improved Capacity and Assured Performance in Web Portals.- A Stability Criteria Membership Prool for Ad Hoc Networks.- Proactive Byzantine Quorum Systems.- Self* Properties in Distributed Middleware.- Model-Driven Development of Adaptive Applications with Self-Adaptive Mobile Processes.- Software Engineering for Distributed Middleware Systems.- An Architecture Independent Approach to Emulating Computation Intensive Workload for Early Integration Testing of Enterprise DRE Systems.- Security and Privacy in a Connected World.- Managing Reputation in Contract-Based Distributed Systems.- Ubiquitous and Pervasive Computing.- A Distributed Approach to Local Adaptation Decision Making for Sequential Applications in Pervasive Environments.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)