On the Move to Meaningful Internet Systems: OTM 2008: OTM Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008 Proceedings, Part II

Author:   Zahir Tari ,  Zahir Tari
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2008 ed.
Volume:   5332
ISBN:  

9783540888727


Pages:   646
Publication Date:   23 October 2008
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $314.16 Quantity:  
Add to Cart

Share |

On the Move to Meaningful Internet Systems: OTM 2008: OTM Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008 Proceedings, Part II


Add your own review!

Overview

Full Product Details

Author:   Zahir Tari ,  Zahir Tari
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2008 ed.
Volume:   5332
Dimensions:   Width: 15.50cm , Height: 3.40cm , Length: 23.50cm
Weight:   1.027kg
ISBN:  

9783540888727


ISBN 10:   3540888721
Pages:   646
Publication Date:   23 October 2008
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Information Security (IS) 2008 International Conference.- IS 2008 PC Co-chairs’ Message.- Intrusion Detection.- Boosting Web Intrusion Detection Systems by Inferring Positive Signatures.- Principal Components of Port-Address Matrices in Port-Scan Analysis.- A Novel Worm Detection Model Based on Host Packet Behavior Ranking.- Information Hiding.- Anonymous Resolution of DNS Queries.- Steganography of VoIP Streams.- TrustMAS: Trusted Communication Platform for Multi-Agent Systems.- Data and Risk Management.- Computing Exact Outcomes of Multi-parameter Attack Trees.- Automatic Generation of Secure Multidimensional Code for Data Warehouses: An MDA Approach.- Trusted Reputation Management Service for Peer-to-Peer Collaboration.- Access Control.- A Model-Driven Approach for the Specification and Analysis of Access Control Policies.- PuRBAC: Purpose-Aware Role-Based Access Control.- Uncle-Share: Annotation-Based Access Control for Cooperative and Social Systems.- Evaluation and Implementation.- Verifying Extended Criteria for the Interoperability of Security Devices.- Generating a Large Prime Factor of p 4±p 2?+?1 in Polynomial Time.- Ontologies, Databases and Applications of Semantics (ODBASE) 2008 International Conference.- ODBASE 2008 PC Co–chairs’ Message.- Keynote.- Artifact-Centric Business Process Models: Brief Survey of Research Results and Challenges.- Invited Papers.- Ten Challenges for Ontology Matching.- Dynamic Labelling Scheme for XML Data Processing.- Real-Time Enterprise Ontology Evolution to Aid Effective Clinical Telemedicine with Text Mining and Automatic Semantic Aliasing Support.- Engineering OODA Systems: Architectures, Applications, and Research Areas.- Semantic Matching and Similarity Measuring.- Approximate Structure-Preserving SemanticMatching.- Ontology-Based Relevance Assessment: An Evaluation of Different Semantic Similarity Measures.- Equivalence of XSD Constructs and Its Exploitation in Similarity Evaluation.- Design, Implementation and Evaluation of a New Semantic Similarity Metric Combining Features and Intrinsic Information Content.- Semantic Searching.- Weighted Ontology for Semantic Search.- RDF Snippets for Semantic Web Search Engines.- Empirical Insights on a Value of Ontology Quality in Ontology-Driven Web Search.- Ontology Development.- Magic Rewritings for Efficiently Processing Reactivity on Web Ontologies.- Mediating and Analyzing Social Data.- Conceptual Synopses of Semantics in Social Networks Sharing Structured Data.- Ontology Maintanence and Evaluation.- Sequential Patterns for Maintaining Ontologies over Time.- Evaluating Automatically a Text Miner for Ontologies: A Catch-22 Situation?.- Conceptual and Lexical Prototypicality Gradients Dedicated to Ontology Personalisation.- Explanation in the DL-Lite Family of Description Logics.- Ontology Applications I.- Using Ontologies for an Intelligent Patient Modelling, Adaptation and Management System.- Context-Addressable Messaging Service with Ontology-Driven Addresses.- Towards a System for Ontology-Based Information Extraction from PDF Documents.- Ontology Applications II.- Detecting Dirty Queries during Iterative Development of OWL Based Applications.- Reusing the SIOC Ontology to Facilitate Semantic CWE Interoperability.- An Ontology-Based Approach for Discovering Semantic Relations between Agent Communication Protocols.- Semantic Query Processing.- Reference Fusion and Flexible Querying.- Mediation-Based XML Query Answerability.- Ontology Matching Supported by Query Answering in a P2P System.- Using the Ontology Maturing ProcessModel for Searching, Managing and Retrieving Resources with Semantic Technologies.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List