Normal view MARC view ISBD view

On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS [electronic resource] : OTM Confederated International Conferences, CoopIS, DOA, ODBASE, GADA, and IS 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part II / edited by Zahir Tari.

Contributor(s): Tari, Zahir [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Information Systems and Applications, incl. Internet/Web, and HCI: 4804Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2007Edition: 1st ed. 2007.Description: XXIX, 1860 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783540768432.Subject(s): Data structures (Computer science) | Information theory | Database management | Data mining | Application software | Computer networks  | User interfaces (Computer systems) | Human-computer interaction | Data Structures and Information Theory | Database Management | Data Mining and Knowledge Discovery | Computer and Information Systems Applications | Computer Communication Networks | User Interfaces and Human Computer InteractionAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.73 | 003.54 Online resources: Click here to access online
Contents:
GADA 2007 International Conference (Grid Computing, High-Performance and Distributed Applications) -- GADA 2007 PC Co-chairs' Message -- Service Architectures for e-Science Grid Gateways: Opportunities and Challenges -- Access Control Management in Open Distributed Virtual Repositories and the Grid -- Transforming the Adaptive Irregular Out-of-Core Applications for Hiding Communication and Disk I/O -- Adaptive Data Block Placement Based on Deterministic Zones (AdaptiveZ) -- Keyword Based Indexing and Searching over Storage Resource Broker -- eCube: Hypercube Event for Efficient Filtering in Content-Based Routing -- Combining Incomparable Public Session Keys and Certificateless Public Key Cryptography for Securing the Communication Between Grid Participants -- A Service-Oriented Platform for the Enhancement and Effectiveness of the Collaborative Learning Process in Distributed Environments -- Social Networking to Support Collaboration in Computational Grids -- A Policy Based Approach to Managing Shared Data in Dynamic Collaborations -- Grid Service Composition in BPEL for Scientific Applications -- Efficient Management of Grid Resources Using a Bi-level Decision-Making Architecture for "Processable" Bulk Data -- Towards an Open Grid Marketplace Framework for Resources Trade -- A Hybrid Algorithm for Scheduling Workflow Applications in Grid Environments (ICPDP) -- Contention-Free Communication Scheduling for Group Communication in Data Parallelism -- SNMP-Based Monitoring Agents and Heuristic Scheduling for Large-Scale Grids -- HARC: The Highly-Available Resource Co-allocator -- Assessing a Distributed Market Infrastructure for Economics-Based Service Selection -- Grid Problem Solving Environment for Stereology Based Modeling -- Managing Dynamic Virtual Organizations to Get EffectiveCooperation in Collaborative Grid Environments -- Sidera: A Cluster-Based Server for Online Analytical Processing -- Parallel Implementation of a Neural Net Training Application in a Heterogeneous Grid Environment -- Generalized Load Sharing for Distributed Operating Systems -- An Application-Level Service Control Mechanism for QoS-Based Grid Scheduling -- Fine Grained Access Control with Trust and Reputation Management for Globus -- Vega: A Service-Oriented Grid Workflow Management System -- Information Security (IS) 2007 International Symposium -- IS 2007 PC Co-chairs' Message -- Cryptography: Past, Present and Future -- E-Passport: Cracking Basic Access Control Keys -- Managing Risks in RBAC Employed Distributed Environments -- STARBAC: Spatiotemporal Role Based Access Control -- Authentication Architecture for eHealth Professionals -- On RSN-Oriented Wireless Intrusion Detection -- A Hybrid, Stateful and Cross-Protocol Intrusion Detection System for Converged Applications -- Toward Sound-Assisted Intrusion Detection Systems -- End-to-End Header Protection in Signed S/MIME -- Estimation of Behavior of Scanners Based on ISDAS Distributed Sensors -- A Multi-core Security Architecture Based on EFI -- Intelligent Home Network Authentication: Home Device Authentication Using Device Certification -- Bayesian Analysis of Secure P2P Sharing Protocols -- Network Coding Protocols for Secret Key Distribution -- 3-Party Approach for Fast Handover in EAP-Based Wireless Networks -- SWorD- A Simple Worm Detection Scheme -- Prevention of Cross-Site Scripting Attacks on Current Web Applications -- Compiler Assisted Elliptic Curve Cryptography -- Trust Management Model and Architecture for Context-Aware Service Platforms -- Mobile Agent Protection in E-Business Application A Dynamic Adaptability BasedApproach -- Business Oriented Information Security Management - A Layered Approach.
In: Springer Nature eBook
    average rating: 0.0 (0 votes)
No physical items for this record

GADA 2007 International Conference (Grid Computing, High-Performance and Distributed Applications) -- GADA 2007 PC Co-chairs' Message -- Service Architectures for e-Science Grid Gateways: Opportunities and Challenges -- Access Control Management in Open Distributed Virtual Repositories and the Grid -- Transforming the Adaptive Irregular Out-of-Core Applications for Hiding Communication and Disk I/O -- Adaptive Data Block Placement Based on Deterministic Zones (AdaptiveZ) -- Keyword Based Indexing and Searching over Storage Resource Broker -- eCube: Hypercube Event for Efficient Filtering in Content-Based Routing -- Combining Incomparable Public Session Keys and Certificateless Public Key Cryptography for Securing the Communication Between Grid Participants -- A Service-Oriented Platform for the Enhancement and Effectiveness of the Collaborative Learning Process in Distributed Environments -- Social Networking to Support Collaboration in Computational Grids -- A Policy Based Approach to Managing Shared Data in Dynamic Collaborations -- Grid Service Composition in BPEL for Scientific Applications -- Efficient Management of Grid Resources Using a Bi-level Decision-Making Architecture for "Processable" Bulk Data -- Towards an Open Grid Marketplace Framework for Resources Trade -- A Hybrid Algorithm for Scheduling Workflow Applications in Grid Environments (ICPDP) -- Contention-Free Communication Scheduling for Group Communication in Data Parallelism -- SNMP-Based Monitoring Agents and Heuristic Scheduling for Large-Scale Grids -- HARC: The Highly-Available Resource Co-allocator -- Assessing a Distributed Market Infrastructure for Economics-Based Service Selection -- Grid Problem Solving Environment for Stereology Based Modeling -- Managing Dynamic Virtual Organizations to Get EffectiveCooperation in Collaborative Grid Environments -- Sidera: A Cluster-Based Server for Online Analytical Processing -- Parallel Implementation of a Neural Net Training Application in a Heterogeneous Grid Environment -- Generalized Load Sharing for Distributed Operating Systems -- An Application-Level Service Control Mechanism for QoS-Based Grid Scheduling -- Fine Grained Access Control with Trust and Reputation Management for Globus -- Vega: A Service-Oriented Grid Workflow Management System -- Information Security (IS) 2007 International Symposium -- IS 2007 PC Co-chairs' Message -- Cryptography: Past, Present and Future -- E-Passport: Cracking Basic Access Control Keys -- Managing Risks in RBAC Employed Distributed Environments -- STARBAC: Spatiotemporal Role Based Access Control -- Authentication Architecture for eHealth Professionals -- On RSN-Oriented Wireless Intrusion Detection -- A Hybrid, Stateful and Cross-Protocol Intrusion Detection System for Converged Applications -- Toward Sound-Assisted Intrusion Detection Systems -- End-to-End Header Protection in Signed S/MIME -- Estimation of Behavior of Scanners Based on ISDAS Distributed Sensors -- A Multi-core Security Architecture Based on EFI -- Intelligent Home Network Authentication: Home Device Authentication Using Device Certification -- Bayesian Analysis of Secure P2P Sharing Protocols -- Network Coding Protocols for Secret Key Distribution -- 3-Party Approach for Fast Handover in EAP-Based Wireless Networks -- SWorD- A Simple Worm Detection Scheme -- Prevention of Cross-Site Scripting Attacks on Current Web Applications -- Compiler Assisted Elliptic Curve Cryptography -- Trust Management Model and Architecture for Context-Aware Service Platforms -- Mobile Agent Protection in E-Business Application A Dynamic Adaptability BasedApproach -- Business Oriented Information Security Management - A Layered Approach.

There are no comments for this item.

Log in to your account to post a comment.