Imagen de Google Jackets

On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS [electronic resource] : OTM Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and IS 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part II / edited by Robert Meersman, Zahir Tari.

Por: Colaborador(es): Tipo de material: TextoTextoSeries Lecture Notes in Computer Science ; 4804 | Lecture Notes in Computer Science ; 4804Editor: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007Descripción: XXIX, 1860 p. online resourceTipo de contenido:
  • text
Tipo de medio:
  • computer
Tipo de soporte:
  • online resource
ISBN:
  • 9783540768432
Trabajos contenidos:
  • SpringerLink (Online service)
Tema(s): Formatos físicos adicionales: Sin títuloClasificación CDD:
  • 005.74 23
Clasificación LoC:
  • QA76.9.D3
Recursos en línea:
Contenidos:
Springer eBooks
Etiquetas de esta biblioteca: No hay etiquetas de esta biblioteca para este título. Ingresar para agregar etiquetas.
Valoración
    Valoración media: 0.0 (0 votos)
No hay ítems correspondientes a este registro

GADA 2007 International Conference (Grid Computing, High-Performance and Distributed Applications) -- GADA 2007 PC Co-chairs Message -- Service Architectures for e-Science Grid Gateways: Opportunities and Challenges -- Access Control Management in Open Distributed Virtual Repositories and the Grid -- Transforming the Adaptive Irregular Out-of-Core Applications for Hiding Communication and Disk I/O -- Adaptive Data Block Placement Based on Deterministic Zones (AdaptiveZ) -- Keyword Based Indexing and Searching over Storage Resource Broker -- eCube: Hypercube Event for Efficient Filtering in Content-Based Routing -- Combining Incomparable Public Session Keys and Certificateless Public Key Cryptography for Securing the Communication Between Grid Participants -- A Service-Oriented Platform for the Enhancement and Effectiveness of the Collaborative Learning Process in Distributed Environments -- Social Networking to Support Collaboration in Computational Grids -- A Policy Based Approach to Managing Shared Data in Dynamic Collaborations -- Grid Service Composition in BPEL for Scientific Applications -- Efficient Management of Grid Resources Using a Bi-level Decision-Making Architecture for ǣProcessableǥ Bulk Data -- Towards an Open Grid Marketplace Framework for Resources Trade -- A Hybrid Algorithm for Scheduling Workflow Applications in Grid Environments (ICPDP) -- Contention-Free Communication Scheduling for Group Communication in Data Parallelism -- SNMP-Based Monitoring Agents and Heuristic Scheduling for Large-Scale Grids -- HARC: The Highly-Available Resource Co-allocator -- Assessing a Distributed Market Infrastructure for Economics-Based Service Selection -- Grid Problem Solving Environment for Stereology Based Modeling -- Managing Dynamic Virtual Organizations to Get Effective Cooperation in Collaborative Grid Environments -- Sidera: A Cluster-Based Server for Online Analytical Processing -- Parallel Implementation of a Neural Net Training Application in a Heterogeneous Grid Environment -- Generalized Load Sharing for Distributed Operating Systems -- An Application-Level Service Control Mechanism for QoS-Based Grid Scheduling -- Fine Grained Access Control with Trust and Reputation Management for Globus -- Vega: A Service-Oriented Grid Workflow Management System -- Information Security (IS) 2007 International Symposium -- IS 2007 PC Co-chairs Message -- Cryptography: Past, Present and Future -- E-Passport: Cracking Basic Access Control Keys -- Managing Risks in RBAC Employed Distributed Environments -- STARBAC: Spatiotemporal Role Based Access Control -- Authentication Architecture for eHealth Professionals -- On RSN-Oriented Wireless Intrusion Detection -- A Hybrid, Stateful and Cross-Protocol Intrusion Detection System for Converged Applications -- Toward Sound-Assisted Intrusion Detection Systems -- End-to-End Header Protection in Signed S/MIME -- Estimation of Behavior of Scanners Based on ISDAS Distributed Sensors -- A Multi-core Security Architecture Based on EFI -- Intelligent Home Network Authentication: Home Device Authentication Using Device Certification -- Bayesian Analysis of Secure P2P Sharing Protocols -- Network Coding Protocols for Secret Key Distribution -- 3-Party Approach for Fast Handover in EAP-Based Wireless Networks -- SWorD A Simple Worm Detection Scheme -- Prevention of Cross-Site Scripting Attacks on Current Web Applications -- Compiler Assisted Elliptic Curve Cryptography -- Trust Management Model and Architecture for Context-Aware Service Platforms -- Mobile Agent Protection in E-Business Application A Dynamic Adaptability Based Approach -- Business Oriented Information Security Management A Layered Approach.

ZDB-2-SCS

ZDB-2-LNC

No hay comentarios en este titulo.

para colocar un comentario.