|  |  |  |  | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|      |  |  |  | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| 
 
 PRELIMINARY PROGRAM CONFERENCE HOTEL 
 Mercure Lisboa ComputationWorld 2010 CLOUD COMPUTING 2010 / ADAPTIVE 2010 / PATTERNS 2010 / COMPUTATION TOOLS 2010 / SERVICE COMPUTATION 2010 / CONTENT 2010/ FUTURE COMPUTING 2010 / COGNITIVE 2010 
 Sunday, November 21 
 Monday, November 22 
 Tuesday, November 23 
 Wednesday, November 24 
 Thursday, November 25 
 Friday, November 26 
 
 DETAILED PROGRAM 
 ADAPTIVE 2010, The Second International Conference on Adaptive and Self-Adaptive Systems and Applications ADAPTIVE 1: Metrics for adaptive systems, Adaptive entities SERSCIS-Ont: A Formal Metrics Model for Adaptive Service Oriented   Frameworks. Attainable Capacity Aware Routing Metric for Wireless Mesh   Networks Ocean Vessel Trajectory Estimation and Prediction Based on Extended Kalman   Filter Adaptive Cooperative Multi-hop Transmission in Ad Hoc Networks ADAPTIVE 2: Self-adaptation Equilibrium Strategies for Interference Free Channel Access in Cognitive   Radio based WRANs A Model-Based Approach to the Autonomic Management of Mobile Robot   Resources An Overall Process for Self-Adaptive Pervasive Systems Towards a Resilient Message Oriented Middleware for Mission Critical   Applications ADAPTIVE 3: Adaptive applications Hidden State Observation for Adaptive Process Controls Employing Semantically Driven Adaptation for Amalgamating Software Quality   Assurance with Process Management Self-Adaptation in Geotracking Applications: Challenges, Opportunities and   Models Bee Inspired Online Vehicle Routing in Large Traffic Systems ADAPTIVE 4: Adaptive mechanisms I Laser Measurement System based maneuvering Target tracking formulated by   Adaptive Competitive Neural Networks Adaptive Immunity through Differential Elasticity Implementation Architectures for Adaptive Workflow Management Interactive Access Rule Learning: Generating Adapted Access Rule   Sets ADAPTIVE 5: Adaptive mechanisms II Incremental Online Evolution and Adaptation of Neural Networks for Robot   Control in Dynamic Environments Replica Voting based Data Collection in Hostile Environments: Adaptive   Protocols and Case Studies Improving Robustness to Environmental Fluctuations - Dynamical Hierarchies   Included ADAPTIVE 6: Fundamentals and design of adaptive systems I A QoI-aware Framework for Adaptive Monitoring Tracing Structural Changes of Adaptive Systems Quantifying Adaptability Adaptability Support in Time- and Space-Partitioned Aerospace   Systems ADAPTIVE 7: Fundamentals and design of adaptive systems II An Adaptive Look-Ahead Strategy-Based Algorithm for the Circular Open   Dimension Problem Platform Adaptation of Mashup UI Components Adapting Abstract Component Applications Using Adaptation   Patterns The Use of “Canaries” for Adaptive Health Management of Electronic   Systems ADAPTIVE 8: Fundamentals and design of adaptive systems III ESPranto: a Framework for Developing Applications for Adaptive   Hardware Kind Parsing: An Adaptive Parsing Technique Efficiency Testing of Self-adapting Systems by Learning of Event   Sequences 
 CLOUD COMPUTING 2010, The First International Conference on Cloud Computing, GRIDs, and Virtualization CLOUD COMPUTING 1: GRID GUISET LogOn: Design and Implementation of GUISET-driven Authorization   Framework Parallelization Programming Techniques: Benefits and Drawbacks A Generalized MapReduce Approach for Efficient mining of Large data Sets in   the GRID Approach to Business-Policy based Job-Scheduling in HPC An Efficient Job Scheduling Technique in Trusted Clusters for Load   Balancing CLOUD COMPUTING 2: VIRTUALIZATION Live Migration-based Resource Managers for Virtualized Environments: A   Survey CrossBit: A Multi-Sources and Multi-Targets DBT ViMo (Virtualization for Mobile) : A Virtual Machine Monitor Supporting Full   Virtualization For ARM Mobile Systems Probabilistic Virtual Machine Assignment CLOUD COMPUTING 3: Cloud Computing I Handling confidential Data on the Untrusted Cloud: An Agent-based   Approach The Limitation of MapReduce: A Probing Case and a Lightweight   Solution The Business Model of Cloud Storage An Active DBMS Style Activity Service for Cloud Environments CLOUD COMPUTING 4: Platforms, Infrastructures and Applications I Introducing a Dynamic Federation Model for RESTful Cloud Storage Open Architecture for Developing Multitenant Software-as-a-Service   Applications Behaviour-inspired Data Management in the Cloud Semantic Resource Allocation with Historical Data Based   Predictions CLOUD COMPUTING 5: Challenging features Storage QoS Aspects in Distributed Virtualized Environments Self-scaling the Cloud to meet Service Level Agreements Exploitation of Vulnerabilities in Cloud Storage Towards a Security Management Reference Model for Vertical and Horizontal   Collaborative Clouds CLOUD COMPUTING 6: Cloud computing II C2TP: A Service Model for Cloud Sociology View on Cloud Computing Value: Actor Network Theory   Perspective Cloud Credential Vault Model-Based Migration of Legacy Software Systems to Scalable and   Resource-Efficient Cloud-Based Applications: The CloudMIG Approach CLOUD COMPUTING 7: Platforms, Infrastructures and Applications II Understanding the Relationship Between SDP and the Cloud Financial Business Cloud for High-Frequency Trading Cloud Computing for Online Visualization of GIS Applications in Ubiquitous   City Middleware for a CLEVER Use of Virtual Resources in Federated   Clouds 
 COGNITIVE 2010, The Second International Conference on Advanced Cognitive Technologies and Applications COGNITIVE 1: BRAIN Gestalt and Computational Perceptual Approach: Brain responses tendencies   given by visual and auditory basic stimuli Functional Segregation of Semantic Memory and Processing in Ventral Inferior   Frontal Gyrus Towards a Cognitive Handoff for the Future Internet: Model-driven Methodology   and Taxonomy of Scenarios Agent and Swarm Views of Cognition in Swarm-Array Computing COGNITIVE 2: APPLICATIONS and AGENTS The Significance of Verbal and Spatial Attentional Resources on Mental   Workload and Performance Guided Local Search in High Performance Detectors for MIMO   Systems Towards a Cognitive Handoff for the Future Internet: A Holistic   Vision Complexity and Chaos Analysis of a Predator-Prey Ecosystem   Simulation COGNITIVE 3: COGNITION I A Knowledge Development Conception and its Implementation: Knowledge   Ontology, Rule System and Application Scenarios URBANO: A Tour-Guide Robot Learning to Make Better Speeches Graphical Modelling in Mental Health Risk Assessments A Tool for Experimenting with a Theorem Prover COGNITIVE 4: COGNITON II Algorithm to Solve Web Service Complex Request Using Automatic Composition of   Semantic Web Service Recognition and Understanding Situations and Activities with Description   Logicsfor Safe Human-Robot Cooperation An Estimation of Distribution Algorithm using the LZW Compression   Algorithm Learning Approaches to Visual Control of Robotic Manipulators A Perspective on Machine Consciousness 
 COMPUTATION TOOLS 2010, The First International Conference on Computational Logics, Algebras, Programming, Tools, and Benchmarking COMPUTATION TOOLS 1: Tools and Techniques Analysing  the dynamic behavior of a Business Process and the  related Business Continuity  Process  with mcrl2 Debugging PVS specifications of control logics via event-driven   simulation  JClassic(default and  exception): Reasoning tool based on Defaults and Exceptions description     logic Application to dynamic access control Sharing Ballistics Data Across The European Union COMPUTATION TOOLS 2: Specialized programming languages Euclides - A JavaScript to PostScript Translator PS-NET - A Predictable Typed Coordination Language for Stream Processing in   Resource-Constrained Environments An Application of a Domain-Specific Language Facilitating Abstraction and   Secure Access to a Crime and Ballistic Data Sharing Platform 
 CONTENT 2010, The Second International Conference on Creative Content Technologies CONTENT 1: BASICS, DATA, IMAGE Classifying Content Mode of Organizational Texts Using Simple Neural and   Neuro-Fuzzy Approaches Using Virtual Agents to Cue Observer Attention The Community Network Game Project: Enriching Online Gamers Experience with   User Generated Content Internet Business Intelligence Drafting 2D Characters with Primitive Shape Scaffolds CONTENT 2: Web content, SOCIAL, AUDIO, SPEECH Non-Linear Video Constraints in Course Design Using Web 2.0 Tools: A Croatian   Case A System-On-Chip Platform for HRTF-Based Realtime Spatial Audio   Rendering Classification of Emotional Speech in Anime Films by Using Automatic Temporal   Segmentation 
 FUTURE COMPUTING 2010, The Second International Conference on Future Computational Technologies and Applications FUTURE COMPUTING 1: Computing technologies Knowledge-based Tool for Software Process Assessment and   Improvement Implementing a VoIP SIP Server and User Agent on a Bare PC A Dendritic Cell Inspired Security System in Wireless Sensor   Networks FUTURE COMPUTING 2: Computational intelligence strategies Study on the Improved D-S Evidence Theory and its Application on Gas Outburst   Prediction An Optimal Resource Assignment Problem in Smart Grid An Integrated VLE to Enhance Social Interaction for User-centred Active   Learning 
 PATTERNS 2010, The Second International Conferences on Pervasive Patterns and Applications PATTERNS 1: Software patterns A Formal Language of Pattern Compositions PLOP: A Pattern for Learning Objects for Programming Pattern Catalog for Capability Diagnostics and Improvement of   Service-oriented Enterprise Architectures Towards A Taxonomy of Dynamic Invariants in Software Behaviour PATTERNS 2: Basics on patterns I Towards a Common Pattern Language for Ubicomp Application Design Detection of Generic Micro-architectures on Models A Benchmark Platform for Design Pattern Detection Tissue Classification from CT of Liver Volumetric Dataset Using 3D Relational   Features PATTERNS 3: Basics on patterns II and Security patterns Highlighting the Essentials of the Behaviour of Reactive Systems in Test   Descriptions Using the Behavioural Atomic Element CUX Patterns Approach: Towards Contextual User Experience   Patterns A new pattern template to support the design of security   architectures A Pattern Collection for Privacy Enhancing Technology PATTERNS 4: Patterns at work Multiple Pattern Matching Definition and Reuse of Analysis Patterns for Real-Time   Applications 
 SERVICE COMPUTATION 2010, The Second International Conferences on Advanced Service Computing SERVICE COMPUTATION 1: Web Services I Generation of choreography skeletons from web service   definitions R-Event: A RESTfulWeb Service Framework for Building Event-Driven   Web Code Contracts for Windows Communication Foundation (WCF) Automated Service Evolution SERVICE COMPUTATION 2: Web services II An Architecture to Measure QoS Compliance in SOA   Infrastructures Nontechnical SPAM Detection Paradigmin in Unified Communications   Systems Formalisation of Mediation Protocol for Web Services Composition with   ACME/ARMANI ADL SERVICE COMPUTATION 3: Web Services III WEB Services for Ubiquitous Mobile Device Applications Development of Web 2.0 Applications using WebComposition/Data Grid   Service Business Protocol Monitoring SERVICE COMPUTATION 4: Service innovation, evaluation and delivery   I  Threshod-Based  QoS Algorithms in Real-time Multimedia Services Service Planning in Multi-Layer Networks Considering Physical   Constraints Using QoS for Relevance Feedback in Service Discovery: A Preliminary   Empirical Investigation Implementation of the Information System of the Telecom Operators Using the   ITIL V3 Methodology for the Service Design Phase Online Service Similarities and Reputation-based Selection SERVICE COMPUTATION 5: Service innovation, evaluation and delivery   II Collaborative Digital Library Services in a Cloud Security Service for the Rollout of Security Credentials in Ubiquitous   Industrial Automation Environments Integrated e-Services in Public Sector Information and Knowledge Sharing: Involving Customers in Developing   Services SERVICE COMPUTATION 6: Service innovation, evaluation and delivery   III Data Mining Governance for Service Oriented Architecture Generic Function Schema for Operations on Multiple Network QoS   Parameters A Domain-driven Approach for Designing Management Services Studying in Web 2.0 – Virtual University as Virtual Community SERVICE COMPUTATION 7: Service innovation, evaluation and delivery   IV Archer: An Architectural Monitoring Tool A Hybrid Instance Migration Approach for Composite Service   Evolution Distributed and Passive Web services discovery middleware for Pervasive   services at the edges of Internet Federated Authentication Mechanism with Efficient ID management SERVICE COMPUTATION 8: Society and business services MBPR: A Business Process Repository Supporting Multi-Granularity Process   Model Retrieval Critical Information Infrastructures Management System and Security   Issues A Synergistic System of Institutional Repository and Researcher   Database Estimation of Telecommunication Technologies, Services and Costs to Support   Public Transport Information System Requirements SERVICE COMPUTATION 9: Ubiquitous and pervasive services Streaming Cloud Service Concept by Peer-to-Peer Distributed   Technology Evaluation of the Applicability of the OSGi Service Platform to Future   In-Vehicle Embedded Systems Reliable Authentication and Anti-replay Security Protocol for Wireless Sensor   Networks Adaptive Trust Management Protocol Based on Fault Detection for Wireless   Sensor Networks |  | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|  | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|  | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|  | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|  |  | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|  | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|  | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|  |  | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|  |  | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Copyright (c) 2006-2010, IARIA