E-business and Telecommunications 4th International Conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected Papers /

This book constitutes the best papers of the 4th International Conference on E-business and Telecommunication Networks, ICETE 2007, held in Barcelona, Spain, during July 28-31, 2007. The 26 revised full papers presented together with 3 invited papers were carefully reviewed and selected from 418 sub...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Filipe, Joaquim (Επιμελητής έκδοσης), Obaidat, Mohammad S. (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
Σειρά:Communications in Computer and Information Science, 23
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Invited Speakers
  • Pragmatic Computing – A Semiotic Perspective to Web Services
  • Utility Computing: Reality and Beyond
  • A Novel Grid-Based Micropayment System for Heterogeneous Multi-party Accounting
  • I: ICE-B
  • Bidding Agents That Perpetrate Auction Fraud
  • A Platform for Mobile Service Provisioning Based on SOA-Integration
  • A Hybrid Data Mining Approach for Credit Card Usage Behavior Analysis
  • Critical Success Factors of Internet Shopping: The Case of Japan
  • An Adaptive Knowledge-Based Approach for Detecting Fraud across Different e-Government Domains
  • II: SECRYPT
  • Timing to Block Scanning Malwares by Using Combinatorics Proliferation Model
  • Securing Biometric Templates Where Similarity Is Measured with Set Intersection
  • Score Equalization in SVM Multimodal Fusion for Person Recognition
  • Remote Algorithmic Complexity Attacks against Randomized Hash Tables
  • Securing Real-Time Sessions in an IMS-Based Architecture
  • IPSec Database Query Acceleration
  • Detection of Spoofed MAC Addresses in 802.11 Wireless Networks
  • K2 Stream Cipher
  • Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols
  • Reliable Intersection Computation within Malicious Environments
  • A Security Hardening Language Based on Aspect-Orientation
  • III: SIGMAP
  • Facial Expression Synthesis and Analysis
  • Multi-sequence H.264/AVC Rate Control Based on the Linear Model
  • Non Parametric Stochastic Expectation Maximization for Data Clustering
  • Mapping Phonetic Features for Voice-Driven Sound Synthesis
  • The MiSPOT System: Personalized Publicity and Marketing over Interactive Digital TV
  • Knowledge Engineering Aspects of Affective Bi-Modal Educational Applications
  • IV: WINSYS
  • Design of a Password-Based EAP Method
  • Bit and Power Allocation Strategies for OFDM Systems over Time-Varying Channels
  • Mobile Applications to a Pervasive World
  • Multi-service Networks: A New Approach to End-to-End Topology Management.