On The Move To Meaningful Internet Systems 2007: Coopis, Doa, Odbase, Gada, And Is: Otm Confederated International Conferences, Coopis, Doa, Odbase, by Zahir TariOn The Move To Meaningful Internet Systems 2007: Coopis, Doa, Odbase, Gada, And Is: Otm Confederated International Conferences, Coopis, Doa, Odbase, by Zahir Tari

On The Move To Meaningful Internet Systems 2007: Coopis, Doa, Odbase, Gada, And Is: Otm…

byZahir Tari

Hardcover | November 16, 2007

Pricing and Purchase Info

$192.95 online 
$233.50 list price save 17%
Earn 965 plum® points

Prices and offers may vary in store


In stock online

Ships free on orders over $25

Not available in stores


This two-volume set LNCS 4803/4804 constitutes the refereed proceedings of the five confederated international conferences on Cooperative Information Systems (CoopIS 2007), Distributed Objects and Applications (DOA 2007), Ontologies, Databases and Applications of Semantics (ODBASE 2007), Grid computing, high performance and Distributed Applications (GADA 2007), and Information Security (IS 2007) held as OTM 2007 in Vilamoura, Portugal, in November 2007.

Title:On The Move To Meaningful Internet Systems 2007: Coopis, Doa, Odbase, Gada, And Is: Otm…Format:HardcoverDimensions:1860 pages, 23.5 × 15.5 × 0.01 inPublished:November 16, 2007Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3540768351

ISBN - 13:9783540768357

Look for similar items by category:


Table of Contents

GADA 2007 International Conference (Grid Computing, High-Performance and Distributed Applications).- GADA 2007 PC Co-chairs' Message.- Service Architectures for e-Science Grid Gateways: Opportunities and Challenges.- Access Control Management in Open Distributed Virtual Repositories and the Grid.- Transforming the Adaptive Irregular Out-of-Core Applications for Hiding Communication and Disk I/O.- Adaptive Data Block Placement Based on Deterministic Zones (AdaptiveZ).- Keyword Based Indexing and Searching over Storage Resource Broker.- eCube: Hypercube Event for Efficient Filtering in Content-Based Routing.- Combining Incomparable Public Session Keys and Certificateless Public Key Cryptography for Securing the Communication Between Grid Participants.- A Service-Oriented Platform for the Enhancement and Effectiveness of the Collaborative Learning Process in Distributed Environments.- Social Networking to Support Collaboration in Computational Grids.- A Policy Based Approach to Managing Shared Data in Dynamic Collaborations.- Grid Service Composition in BPEL for Scientific Applications.- Efficient Management of Grid Resources Using a Bi-level Decision-Making Architecture for "Processable" Bulk Data.- Towards an Open Grid Marketplace Framework for Resources Trade.- A Hybrid Algorithm for Scheduling Workflow Applications in Grid Environments (ICPDP).- Contention-Free Communication Scheduling for Group Communication in Data Parallelism.- SNMP-Based Monitoring Agents and Heuristic Scheduling for Large-Scale Grids.- HARC: The Highly-Available Resource Co-allocator.- Assessing a Distributed Market Infrastructure for Economics-Based Service Selection.- Grid Problem Solving Environment for Stereology Based Modeling.- Managing Dynamic Virtual Organizations to Get Effective Cooperation in Collaborative Grid Environments.- Sidera: A Cluster-Based Server for Online Analytical Processing.- Parallel Implementation of a Neural Net Training Application in a Heterogeneous Grid Environment.- Generalized Load Sharing for Distributed Operating Systems.- An Application-Level Service Control Mechanism for QoS-Based Grid Scheduling.- Fine Grained Access Control with Trust and Reputation Management for Globus.- Vega: A Service-Oriented Grid Workflow Management System.- Information Security (IS) 2007 International Symposium.- IS 2007 PC Co-chairs' Message.- Cryptography: Past, Present and Future.- E-Passport: Cracking Basic Access Control Keys.- Managing Risks in RBAC Employed Distributed Environments.- STARBAC: Spatiotemporal Role Based Access Control.- Authentication Architecture for eHealth Professionals.- On RSN-Oriented Wireless Intrusion Detection.- A Hybrid, Stateful and Cross-Protocol Intrusion Detection System for Converged Applications.- Toward Sound-Assisted Intrusion Detection Systems.- End-to-End Header Protection in Signed S/MIME.- Estimation of Behavior of Scanners Based on ISDAS Distributed Sensors.- A Multi-core Security Architecture Based on EFI.- Intelligent Home Network Authentication: Home Device Authentication Using Device Certification.- Bayesian Analysis of Secure P2P Sharing Protocols.- Network Coding Protocols for Secret Key Distribution.- 3-Party Approach for Fast Handover in EAP-Based Wireless Networks.- SWorD- A Simple Worm Detection Scheme.- Prevention of Cross-Site Scripting Attacks on Current Web Applications.- Compiler Assisted Elliptic Curve Cryptography.- Trust Management Model and Architecture for Context-Aware Service Platforms.- Mobile Agent Protection in E-Business Application A Dynamic Adaptability Based Approach.- Business Oriented Information Security Management - A Layered Approach.