Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.
You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.
After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.
missions in fact also treat an envisaged mutual impact among them. As for the 2002 edition in Irvine, the organizers wanted to stimulate this cross-pollination with a program of shared famous keynote speakers (this year we got Sycara, - ble, Soley and Mylopoulos!), and encouraged multiple attendance by providing authors with free access to another conference or workshop of their choice. We received an even larger number of submissions than last year for the three conferences (360 in total) and the workshops (170 in total). Not only can we therefore again claim a measurable success in attracting a representative volume of scienti?c papers, but such a harvest allowed the program committees of course to compose a high-quality cross-section of worldwide research in the areas covered. In spite of the increased number of submissions, the Program Chairs of the three main conferences decided to accept only approximately the same number of papers for presentation and publication as in 2002 (i. e. , around 1 paper out of every 4–5 submitted). For the workshops, the acceptance rate was about 1 in 2. Also for this reason, we decided to separate the proceedings into two volumes with their own titles, and we are grateful to Springer-Verlag for their collaboration in producing these two books. The reviewing process by the respective program committees was very professional and each paper in the main conferences was reviewed by at least three referees.
Content Level »Research
Keywords »Benchmarking - Internet - Memo - Semantic Web - TES - Web services - architectures - cooperative information systems - data security - distributed computing - distributed information systems - human-computer interaction - performance - relational database - security
Posters of the 2003 DOA (Distributed Objects and Applications) International Conference.- On Enhancing Component-Based Middleware with Transactions.- Online Consistency Checking for Replicated Objects.- Integrating Container Services with Pluggable System Extensions.- SGI-SAT Trillo: A Full Scope Simulator for Nuclear Power Plants.- MobJeX: A Declaratively Configurable Java Based Framework for Resource Aware Object Mobility.- Posters of the 2003 CoopIS (Cooperative Information Systems) International Conference.- Trading Freshness for Performance in a Cluster of Replicated Databases.- Regarding the Integration of Collaborative Applications into Virtual Worlds.- Workflow Reconfiguration Using Chains.- Posters of the 2003 ODBASE (Ontologies, Databases and Applications of Semantics) International Conference.- Modeling Semistructured Data by Using Graph-Based Constraints.- A Graph-Based Model for Semistructured Temporal Data.- A Formal Approach to Knowledge Base Comparison and Interoperability.- COVA: A Web-Based Learning System for Content-Based Lecture Retrieval.- An Ontology for Semantic Middleware: Extending DAML-S Beyond Web-Services.- A Formalism of Contextualized Predicate Calculus for Information Integration.- An Ontology Based Visual Tool for Query Formulation Support.- Industry Program Workshop (IPW).- Workshop PC Chairs’ Message.- Revaluation of a Large-Scale Thesaurus for Multi-media Indexing: An Experience Report.- On Storing and Querying XML Data within Network-Enabled Embedded Systems.- An Object-Oriented Invocation Layer for the Java Message Service.- Web Services-Based Transactional Workflows – Advanced Transaction Concepts.- MIDAS’s Routing and Scheduling Approach for the Australian Transport Industries.- An Approach to the Process Maps Based on Semantic Web Methodologies.- PEPt – A Minimal RPC Architecture.- Modelling Organic Adaptable Service-Oriented Enterprise Architectures.- Towards a Semantic Integration of Medical Relational Databases by Using Ontologies: A Case Study.- Workshop on Human Computer Interface for Semantic Web and Web Applications (HCI-SWWA).- HCISWWA 2003 PC Co-chairs’ Message.- Designing Ontology-Based Interactive Information Retrieval Interfaces.- Usability Issues Confronting Mobile Devices as Internet Interfaces for General Purpose Navigation.- Navigating through the RLATES Interface: A Web-Based Adaptive and Intelligent Educational System.- Searching with Semantics: An Interactive Visualization Technique for Exploring an Annotated Image Collection.- Ontology-Mediated Service Matching and Adaptation.- The Role of Vague Categories in Semantic and Adaptive Web Interfaces.- Two Layer Web User Interface Analysis Framework Using SNN and iFIN.- Usability Metrics for E-learning.- Creating a “DOGMAtic” Multilingual Ontology Infrastructure to Support a Semantic Portal.- Modeling Submit/Response Style Systems with Form Charts and Dialogue Constraints.- Semantic Web Services for Smart Devices in a “Global Understanding Environment”.- Construction of Generic Web-Based User Interfaces.- A Word Sense Disambiguation Algorithm for Information Retrieval Applications.- Workshop on Java Technologies for Real-Time and Embedded Systems (JTRES).- Workshop PC Chairs’ Message JTRES 2003 PC Co-Chairs’ Message.- Towards a High Integrity Real-Time Java Virtual Machine.- Aspect-Orientation of Control Application Code for Distributed Automation Systems: The TORERO Approach.- JOP: A Java Optimized Processor.- Processing Group Parameters in the Real-Time Specification for Java.- Doing Firm-Real-Time with J2SE APIs.- Container Model Based on RTSJ Services.- Reference Objects for RTSJ Memory Areas.- Deriving Java Virtual Machine Timing Models for Portable Worst-Case Execution Time Analysis.- Efficient Bytecode Verification Using Immediate Postdominators in Control Flow Graphs.- Computational Reflection for Embedded Java Systems.- Issues in the Design and Implementation of Efficient Interfaces between Hard and Soft Real-Time Java Components.- The Metronome: A Simpler Approach to Garbage Collection in Real-Time Systems.- Memory Management Design to the Concurrent Execution of RTSJ Applications.- Experiences in Adopting Real-Time Java for Flight-Like Software.- A Patterns Catalog for RTSJ Software Designs.- RTSJ Memory Areas and Their Affects on the Performance of a Flight-Like Attitude Control System.- Scheduling Policy Costs on a JAVA Microcontroller.- Experiences and Benchmarking with JTime.- Utilitiy Accrual Scheduling with Real-Time Java.- A C++ Native Interface for Interpreted JVMs.- Workshop on Regulatory Ontologies and the Modelling of Complaint Regulations (WORM CoRe).- WORM CoRe 2003 PC Co-chairs’ Message.- On the Ontology of Digital Identification.- Ontology-Based Customer Complaint Management.- Some Ontological Tools to Support Legal Regulatory Compliance, with a Case Study.- Regulatory Ontologies: An Intellectual Property Rights Approach.- Copyright Conflicts Resolution: A Method Based on Legal Ontologies in an Architecture Enabling Subsidiarity.- A Comparison of a Regulatory Ontology with Existing Legal Ontology Frameworks.- Representing Multilingual and Culture-Specific Knowledge in a VAT Regulatory Ontology: Support from the Termontography Method.- Ontology-Based Platform for Trusted Regulatory Compliance Services.- Business Contract Obligation Monitoring through Use of Multi Tier Contract Ontology.- Workshop on Metadata for Security (WMS).- WMS 2003 PC Co-chairs’ Message.- Efficient Processing of Secured XML Metadata.- Multimedia Access Control Using RDF Metadata.- Managing Identities via Interactions between Ontologies.- Implementing an Access Control System for SVG Documents.- Administration Model for Or-BAC.- Metadata Representation for Semantic-Based Multimedia Security and Management.- Comparing Logic-Based and XML-Based Rights Expression Languages.- Simplifying CORBA Security Service to Support Service Level Access Control.- The Role of Deontic Concepts and Commitment in the Policy Specification of Mobile Computing Environment.- Business to Consumer Markets on the Semantic Web.- Modeling Business Collaborations in Context.- Security Framework for Mobile Agent Platforms (SFMAP).- An Architecture for Software Agreements between Autonomous Agents.- Workshop on Reliable and Secure Middleware (WRSM).- WRSM 2003 PC Co-Chairs’ Message.- Fault-Tolerant Middleware.- Fairly Redistributing Failed Server Load in a Distributed System.- Aquarius: A Data-Centric Approach to CORBA Fault-Tolerance.- FT-Java: A Java-Based Framework for Fault-Tolerant Distributed Software.- Quality of Service.- Adaptive Message Packing for Group Communication Systems.- DADO: A Novel Programming Model for Distributed, Heterogenous, Late-Bound QoS Implementations.- Many Aspects of Reliabilities in a Distributed Mobile Messaging Middleware over JMS.- Enterprise Middleware Issues.- A Flexible Middleware Platform with Piped Workflow.- Using Web Services Technology for Inter-enterprise Integration of Digital Time Stamping.- A Lightweight Security Model for WBEM.- Agent-Based Middleware.- Security and Trust in Agent-Oriented Middleware.- A Conceptual Framework for Web Services Semantic Discovery.- A Holonic Multi-agent System for Robust, Flexible, and Reliable Medical Diagnosis.- Ph.D. Presentations.- Choosing Reputable Resources in Atomistic Peer-to-Peer Environments.- A Fast Group Communication Mechanism for Large Scale Distributed Objects.- Application of Catalogues to Integrate Heterogeneous Data Banks.- Certificate Validation in Untrusted Domains.