Ebook: On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS: OTM Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and IS 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part II
Author: Pilar Herrero Daniel Katz María S. Pérez Domenico Talia (auth.) Robert Meersman Zahir Tari (eds.)
- Genre: Education // International Conferences and Symposiums
- Tags: Database Management, Data Mining and Knowledge Discovery, Information Systems Applications (incl.Internet), Computer Communication Networks, User Interfaces and Human Computer Interaction, Systems and Data Security
- Series: Lecture Notes in Computer Science 4804
- Year: 2007
- Publisher: Springer-Verlag Berlin Heidelberg
- Edition: 1
- Language: English
- pdf
This two-volume set LNCS 4803/4804 constitutes the refereed proceedings of the five confederated international conferences on Cooperative Information Systems (CoopIS 2007), Distributed Objects and Applications (DOA 2007), Ontologies, Databases and Applications of Semantics (ODBASE 2007), Grid computing, high performAnce and Distributed Applications (GADA 2007), and Information Security (IS 2007) held as OTM 2007 in Vilamoura, Portugal, in November 2007.
The 95 revised full and 21 revised short papers presented together with 5 keynote talks were carefully reviewed and selected from a total of 362 submissions. Corresponding with the five OTM 2007 main conferences CoopIS, ODBASE, GADA, and DOA, the papers are organized in topical sections on process analysis and semantics, process modeling, P2P, collaboration, business transactions, dependability and security, middleware and web services, aspects and development tools, mobility and distributed algorithms, frameworks, patterns, and testbeds, ontology mapping, semantic querying, ontology development, learning and text mining, annotation and metadata management, ontology applications, data and storage, networks, collaborative grid environment and scientific grid applications, scheduling, middleware, data analysis, scheduling and management, access control and authentication, intrusion detection, system and services security, network security, malicious code and code security, as well as trust and information management.