Internet-based information systems, the second covering the large-scale in- gration of heterogeneous computing systems and data resources with the aim of providing a global computing space. Eachofthesefourconferencesencouragesresearcherstotreattheirrespective topics within a framework that incorporates jointly (a) theory, (b) conceptual design and development, and (c) applications, in particular case studies and industrial solutions. Following and expanding the model created in 2003, we again solicited and selected quality workshop proposals to complement the more "archival" nature of the main…mehr
Internet-based information systems, the second covering the large-scale in- gration of heterogeneous computing systems and data resources with the aim of providing a global computing space. Eachofthesefourconferencesencouragesresearcherstotreattheirrespective topics within a framework that incorporates jointly (a) theory, (b) conceptual design and development, and (c) applications, in particular case studies and industrial solutions. Following and expanding the model created in 2003, we again solicited and selected quality workshop proposals to complement the more "archival" nature of the main conferences with research results in a number of selected and more "avant-garde" areas related to the general topic of Web-based distributed c- puting. For instance, the so-called Semantic Web has given rise to several novel research areas combining linguistics, information systems technology, and ar- ?cial intelligence, such as the modeling of (legal) regulatory systems and the ubiquitous nature of their usage. We were glad to see that ten of our earlier s- cessful workshops (ADI, CAMS, EI2N, SWWS, ORM, OnToContent, MONET, SEMELS, COMBEK, IWSSA) re-appeared in 2008 with a second, third or even ?fth edition, sometimes by alliance with other newly emerging workshops, and that no fewer than three brand-new independent workshops could be selected from proposals and hosted: ISDE, ODIS and Beyond SAWSDL. Workshop - diences productively mingled with each other and with those of the main c- ferences, and there was considerable overlap in authors.
Die Herstellerinformationen sind derzeit nicht verfügbar.
Inhaltsangabe
IS 2009 Keynote.- Cloud Computing: Virtual Clusters, Data Security, and Disaster Recovery.- ODBASE 2009 Keynote.- Surviving the Glut: The Management of Event Streams in Cyberphysical Systems.- International Symposium on Information Security (IS) International Conference 2009.- IS 2009 - PC Co-chairs' Message.- Information Systems Security.- Moving from Requirements to Design Confronting Security Issues: A Case Study.- A Synergy between Static and Dynamic Analysis for the Detection of Software Security Vulnerabilities.- N±?: Reflecting Local Risk Assessment in LoA.- Privacy and Authentication.- A Secure Mobile-Based Authentication System for e-Banking.- Client-Server Password Recovery.- Enhancing of a Password-Based Authentication Scheme Using Smart Cards.- Security Policies and Verification.- Model-Driven Configuration of SELinux Policies.- Towards a Usage Control Policy Specification with Petri Nets.- Verification of CERT Secure Coding Rules: Case Studies.- Ontologies, DataBases, and Applications of Semantics (ODBASE) International Conference 2009.- ODBASE 2009 - PC Co-chairs' Message.- Managing Ontologies.- Ontology and Schema Evolution in Data Integration: Review and Assessment.- Detecting Inconsistencies in the Gene Ontology Using Ontology Databases with Not-gadgets.- How to Write and Use the Ontology Requirements Specification Document.- Achieving Maturity: The State of Practice in Ontology Engineering in 2009.- Using Ontologies.- Ontology-Driven Provenance Management in eScience: An Application in Parasite Research.- Ontology-Based Retrieval of Spatially Related Objects for Location Based Services.- Incremental Generation of Mappings in an Ontology-Based Data Access Context.- Event Processing.- The Design of Stream Database Engine in ConcurrentEnvironment.- "Same, Same but Different" A Survey on Duplicate Detection Methods for Situation Awareness.- Client-Side Event Processing for Personalized Web Advertisement.- Semantic Event Correlation Using Ontologies.- An Active Domain Node Architecture for the Semantic Web.- Dealing with Heterogeneity.- Merging Sets of Taxonomically Organized Data Using Concept Mappings under Uncertainty.- LinksB2N: Automatic Data Integration for the Semantic Web.- Learning Link-Based Naïve Bayes Classifiers from Ontology-Extended Distributed Data.- A Method and Tool for Fact Type Reuse in the DOGMA Ontology Framework.- Heterogeneity and Context in Semantic-Web-Enabled HCLS Systems.- XML-SIM: Structure and Content Semantic Similarity Detection Using Keys.- Partial Ontology Matching Using Instance Features.- Building Knowledge Bases.- DBpedia Live Extraction.- Semi-automatic Generation of a Patient Preoperative Knowledge-Base from a Legacy Clinical Database.- Exploring Wikipedia and DMoz as Knowledge Bases for Engineering a User Interests Hierarchy for Social Network Applications.- XML and XML Schema.- XML Schema Element Similarity Measures: A Schema Matching Context.- On the Performances of Checking XML Key and Functional Dependency Satisfactions.
IS 2009 Keynote.- Cloud Computing: Virtual Clusters, Data Security, and Disaster Recovery.- ODBASE 2009 Keynote.- Surviving the Glut: The Management of Event Streams in Cyberphysical Systems.- International Symposium on Information Security (IS) International Conference 2009.- IS 2009 - PC Co-chairs' Message.- Information Systems Security.- Moving from Requirements to Design Confronting Security Issues: A Case Study.- A Synergy between Static and Dynamic Analysis for the Detection of Software Security Vulnerabilities.- N±?: Reflecting Local Risk Assessment in LoA.- Privacy and Authentication.- A Secure Mobile-Based Authentication System for e-Banking.- Client-Server Password Recovery.- Enhancing of a Password-Based Authentication Scheme Using Smart Cards.- Security Policies and Verification.- Model-Driven Configuration of SELinux Policies.- Towards a Usage Control Policy Specification with Petri Nets.- Verification of CERT Secure Coding Rules: Case Studies.- Ontologies, DataBases, and Applications of Semantics (ODBASE) International Conference 2009.- ODBASE 2009 - PC Co-chairs' Message.- Managing Ontologies.- Ontology and Schema Evolution in Data Integration: Review and Assessment.- Detecting Inconsistencies in the Gene Ontology Using Ontology Databases with Not-gadgets.- How to Write and Use the Ontology Requirements Specification Document.- Achieving Maturity: The State of Practice in Ontology Engineering in 2009.- Using Ontologies.- Ontology-Driven Provenance Management in eScience: An Application in Parasite Research.- Ontology-Based Retrieval of Spatially Related Objects for Location Based Services.- Incremental Generation of Mappings in an Ontology-Based Data Access Context.- Event Processing.- The Design of Stream Database Engine in ConcurrentEnvironment.- "Same, Same but Different" A Survey on Duplicate Detection Methods for Situation Awareness.- Client-Side Event Processing for Personalized Web Advertisement.- Semantic Event Correlation Using Ontologies.- An Active Domain Node Architecture for the Semantic Web.- Dealing with Heterogeneity.- Merging Sets of Taxonomically Organized Data Using Concept Mappings under Uncertainty.- LinksB2N: Automatic Data Integration for the Semantic Web.- Learning Link-Based Naïve Bayes Classifiers from Ontology-Extended Distributed Data.- A Method and Tool for Fact Type Reuse in the DOGMA Ontology Framework.- Heterogeneity and Context in Semantic-Web-Enabled HCLS Systems.- XML-SIM: Structure and Content Semantic Similarity Detection Using Keys.- Partial Ontology Matching Using Instance Features.- Building Knowledge Bases.- DBpedia Live Extraction.- Semi-automatic Generation of a Patient Preoperative Knowledge-Base from a Legacy Clinical Database.- Exploring Wikipedia and DMoz as Knowledge Bases for Engineering a User Interests Hierarchy for Social Network Applications.- XML and XML Schema.- XML Schema Element Similarity Measures: A Schema Matching Context.- On the Performances of Checking XML Key and Functional Dependency Satisfactions.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826