
On the Move to Meaningful Internet Systems: OTM 2011
Beschreibung
Weitere Details
Weitere Ausgaben
Personen
Inhalt
- Title page
- General Co-chairs' Message for OnTheMove 2011
- Organization
- Computing for Human Experience: Semantics Empowered Cyber-Physical, Social and Ubiquitous Computing beyond the Web
- Privacy and the Cloud
- The Social Compute Unit
- GENI - Global Environment for Network Innovations
- Table of Contents
- Distributed Objects and Applications and Secure Virtual Infrastructures (DOA-SVI) 2011
- DOA-SVI 2011 PC Co-chairs' Message
- Performance Measurement and Optimization
- Optimizing Integrated Application Performance with Cache-Aware Metascheduling
- Introduction
- Integrated Avionics System Case Study
- Challenges of Analyzing and Optimizing Integrated Applications for Cache Effects
- Improving Cache Hit Rate via Cache-Aware Metascheduling
- Re-ordering Same-Rate Tasks with Cache-Aware Metascheduling
- Deciding between Multiple Metaschedules
- Using Cache-Half Life to Drive Cache-Aware Metascheduling
- Empirical Results
- Overview of the Hardware and Software Testbed
- Experiments: Determining the Impact of Cache-Aware Metascheduling on Cache Hit-Rate and Runtime Reductions
- Related Work
- Concluding Remarks
- References
- Dynamic Migration of Processing Elements for Optimized Query Execution in Event-Based Systems
- Introduction
- Related Work
- Event-Based Continuous Queries in WS-Aggregation
- Problem Formulation
- Optimization Target
- Elastic Scaling Using Cloud Computing
- Extension: Robustness by Redundancy
- Optimization Algorithm
- Search Neighborhoods
- Implementation
- Migration of Event Buffers and Subscriptions
- Evaluation
- Migration of Event Buffers and Subscriptions
- Evolution of Network Topology
- Performance Characteristics of Optimization Parameters
- Conclusions
- References
- A Survey on SLA and Performance Measurement in Cloud Computing
- Introduction
- Definition
- Service Level Agreements
- Performance Measurements Models
- Conclusions
- References
- Instrumentation, Monitoring, and Provisioning
- Experiences with Service-Oriented Middleware for Dynamic Instrumentation of Enterprise DRE Systems
- Introduction
- Case Study: The Unified SHIP Platform
- Experiences Applying OASIS to the Unified SHIP Platform
- Overview of OASIS
- Towards Using OASIS in Cloud Computing Environments
- Motivation and Challenges of Instrumentation in Cloud Computing Environments
- A Strategy for Bringing OASIS to the Cloud
- Related Work
- Concluding Remarks
- References
- Dynamic Event-Based Monitoring in a SOA Environment
- Introduction
- Monitoring System
- Management Agent
- Data Gathering Center
- Data Processing Center
- Experimental Evaluation
- Related Work
- Conclusion and Future Directions
- References
- A SIP-Based Network QoS Provisioning Framework for Cloud-Hosted DDS Applications
- Introduction
- Supporting DDS in Cloud Environments Using SIP/SDP
- Overview of Underlying Technologies
- SIP/SDP Enhancements for Cloud-Based DDS
- End-System Architecture
- Proxy SIP Signaling Mechanism
- SDP Extensions
- Semantics of SIP/SDP Extensions
- Integrating All the Pieces Together
- Realizing Cloud-Based DDS on DiffServ IP Networks
- Implementation Overview
- Signaling Procedure
- Session Management and QoS Setup for DDS on the Cloud Network
- Related Work
- Concluding Remarks
- References
- Quality of Service
- Continuous Access to Cloud Event Services with Event Pipe Queries
- Introduction
- Support Continuous Data Access Pattern
- Prior Art
- Our Solution
- Data Access Pattern of CDAO
- Operational Event Pipe
- Combination of Stream and Static Data Access
- On-Demand Query Evaluation
- Cloud Event Service Consumer
- Event Pipe Query
- EPQ Constructs
- EPQ Execution Pattern
- The Conceptual Model of EPQ
- Supporting Continuous EPQ
- Replace Table Scan by Stream Capture Function Execution
- Extend UDF Data Buffering Mechanism to Support Sliding Window Function
- Extend Query Engine to Support Request-and-Rewind
- Examples and Experiments
- A Data Retrieval Example
- EPQ Performance
- Conclusions
- References
- QoS-Enabled Distributed Mutual Exclusion in Public Clouds
- Introduction
- Distributed Mutual Exclusion in Public Clouds
- Building the Logical Spanning Tree
- Models and Algorithm for Distributed Mutual Exclusion
- QoS Properties of the PADME Algorithm
- Evaluating the PADME Algorithm
- Quantifying the Degree of QoS Differentiation
- Measuring Critical Section Throughput
- Related Work
- Concluding Remarks
- References
- Security and Privacy
- Towards Pattern-Based Reliability Certification of Services
- Introduction
- Using Patterns for Improving Reliability
- Certifying Services Built Using Reliability Patterns
- A Reliability Pattern Solution
- A Priori Validation of Reliability Patterns
- A Posteriori Validation of Service Reliability
- Machine Readable Certificates for Reliable Services
- An Architecture for Reliability Certificates Checking
- Related Work
- Conclusions
- References
- Direct Anonymous Attestation: Enhancing Cloud Service User Privacy
- Introduction
- Cloud Services
- Privacy Concerns
- Trusted Computing Background
- Contribution
- DAA Protocol Overview
- DAA Join Protocol
- DAA Sign Protocol
- Variable Anonymity
- Rogue Tagging
- A Privacy Flaw Involving Corrupt Administrators
- DAA-Based Cloud Service Architecture
- Service Login
- User-Controlled Linkablility
- Selecting a Basename
- Account Suspension/Closing
- Related Work
- Conclusion
- References
- Trust Management Languages and Complexity
- Introduction
- Related Work
- Trust Management Languages
- Motivating Example
- System Architecture
- Local Certification Authority
- Credential Graph
- Conclusions
- References
- Models and Methods
- Ontology-Based Matching of Security Attributes for Personal Data Access in e-Health
- Introduction and Motivation
- Related Work
- Background
- DOGMA Approach for Ontology Engineering
- XACML
- Requirements and Use Case
- Health Information Network Requirements
- Use Case: Federated Data Access
- Ontology-Based Attribute Matching for Access Control
- Ontology-Based Interoperation Service (OBIS)
- Security Attributes Mapping
- Access Control Policy Ontology
- Conclusion and Future Work
- References
- A Unified Ontology for the Virtualization Domain
- Introduction
- Application Field and Scope of the Ontology
- Description of the Ontology
- Logical Layer
- Virtual Layer
- Physical Layer
- Refinement of the Core Ontology
- Conclusion and Future Work
- References
- 2PSIM: Two Phase Service Identifying Method
- Introduction
- Related Work
- The Proposed Method
- Lunch Input
- Identification of Elementary Services
- Verification of the Elementary Services
- Storage of Elementary Services
- Identification of Business Aligned Services
- Verification of the Business Aligned Services
- Evaluation
- Conclusion and Future Work
- References
- Automated Statistical Approach for Memory Leak Detection: Case Studies
- Introduction
- Automated Statistical Approach for Memory Leak Detection
- Case Studies
- Case Study: Apache ActiveMQ
- Case study: eHealth Web Application
- Related Work
- Conclusions and Future Work
- References
- Ontologies, DataBases, and Applications of Semantics (ODBASE) 2011
- ODBASE 2011 PC Co-chairs' Message
- Acquisition of Semantic Information
- RDFa Based Annotation of Web Pages through Keyphrases Extraction
- Introduction
- Related Work
- Architecture of Reference
- Automatic Annotation of Web Pages
- Semantic Block Identification
- Keyphrase Extraction
- Keyword Search
- Annotation
- Experimental Results
- Efficiency Evaluation
- Effectiveness Evaluation
- Conclusion and Future Work
- References
- An Ontological and Terminological Resource for n-ary Relation Annotation in Web Data Tables
- Introduction
- Modeling of the Ontological and Terminological Resource (OTR)
- Conceptual Component of the OTR
- Terminological Component of the OTR
- Using the OTR to Annotate and Query Data Tables
- Conclusion
- References
- Inductive Learning of Disjointness Axioms
- Motivation
- Related Work
- Methods for Learning Disjointness
- Correlation
- Association Rule Mining
- Experiments
- Setting
- Handling Logical Inconsistency and Incoherence
- Creation of a Gold Standard
- Results and Discussion
- Conclusion and Outlook
- References
- Use of Semantic Information
- Breaking the Deadlock: Simultaneously Discovering Attribute Matching and Cluster Matching with Multi-Objective Simulated Annealing
- Introduction
- Background and Related Work
- The Multiobjective Optimization Problem and Pareto-Optimality
- Simulated Annealing in Multi-Objective Optimization
- The Schema Matching Problem
- The Cluster Matching Problem
- Method
- The Multi-Objective Simulated Annealing Framework
- Decision Variable
- Data Representation
- Objective Functions
- Generation of New Solution
- Experiment
- Synthetic Dataset
- Neuroscience Dataset
- Conclusion
- References
- To Cache or Not To Cache: The Effects of WarmingCache in Complex SPARQL Queries
- Introduction
- Related Work
- Motivating Example
- Star-Shaped Group Queries
- Experimental Study
- Performance of Star-Shaped Groups in Cold and Warm Cache
- Conclusions
- References
- Implementation of Updateable Object Views in the ODRA OODBMS
- Introduction
- Stack-Based Architecture
- Updateable Object Views
- Updateable Object Views and the ODRA Type System
- ODRA Type Control System
- First Approach to Views Implementation
- Modification of Views Implementation
- Virtual Pointer Objects
- Updateable Object Views and the ODRA Optimizer
- View Rewrite Procedure
- Future Development Ideas
- Summary
- References
- Reuse of Semantic Information
- Domain Expert Centered Ontology Reuse for Conceptual Models
- Introduction
- Related Work
- OWL Ontologies versus Conceptual Models
- Usage of Ontologies for Information Systems
- Natural Language Queries
- Verbalization
- Mapping from Controlled Natural Language to a Conceptual Model
- Summary of Related Work
- Verbalization and Transformation
- Verbalization
- Transformation and Reuse
- Selection
- Linguistic Instruments for Natural Language Queries
- Selection of Classes and Relationships
- Tests and Tool
- Tests of Tool Components
- Tool
- Conclusion and Future Work
- References
- Semantic Invalidation of Annotations Due to Ontology Evolution
- Introduction
- Semantic Changes and Their Automatic Detection
- Requirements for Explicit Dependency-Definitions
- Definition of Change-Dependencies
- Integrity Constraints on $Annotation Path$
- Integrity Constraints on $Dependency Definition Path$
- Detection of Semantic Changes
- Change-Log
- Implicit Changes
- Detection of Semantically Invalid Annotation Paths
- Proof of Concept Implementation
- Related Work
- Conclusion
- References
- The Role of Constraints in Linked Data
- Introduction
- An Informal Example
- A Formal Framework
- A Brief Review of Attributive Languages
- Extralite Ontologies
- Constraint Graphs
- Examples of Extralite Ontologies
- Open Fragments of Domain Ontologies
- Closed Fragments of Domain Ontologies
- Related Work
- Conclusions
- References
- ODBASE 2011 Short Papers
- A Generic Approach for Combining Linguistic and Context Profile Metrics in Ontology Matching
- Introduction
- Feature Extraction and Similarity Metrics
- Similarity Metrics for Terminological Features
- Similarity Metrics for Context Profile Features
- Combining Similarity Metrics with Decision Tree Model
- Experiments and Evaluations
- Selection of Metrics and Training Data
- Experimental Evaluations
- Conclusion and Future Work
- References
- ADERIS: An Adaptive Query Processor for Joining Federated SPARQL Endpoints
- Introduction
- Related Work
- The ADERIS Query Processor
- Retrieving Data from SPARQL Endpoints
- Optimisation
- Performance
- Conclusions and Future Work
- References
- Asynchronous Replication for Evolutionary Database Development: A Design for the Experimental Assessment of a Novel Approach
- Introduction
- Related Work
- The Asynchronous Replication Approach
- Proposed Experimental Assessment
- System Description and Experiment Hypotheses
- The Laboratory Environment
- Scenarios
- Future Works
- References
- Improving the Accuracy of Ontology Alignment through Ensemble Fuzzy Clustering
- Introduction
- Related Works
- Methodology
- Case Studies
- Bibliographic Text Ontologies
- Family Ontologies
- Results
- Conclusion
- References
- Author Index
Systemvoraussetzungen
Dateiformat: PDF
Kopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
- Computer (Windows; MacOS X; Linux): Verwenden Sie zum Lesen die kostenlose Software Adobe Reader, Adobe Digital Editions oder einen anderen PDF-Viewer Ihrer Wahl (siehe E-Book Hilfe).
- Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions oder die App PocketBook (siehe E-Book Hilfe).
- E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m.
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.