e-Business and Telecommunications International Conference, ICETE 2008, Porto, Portugal, July 26-29, 2008, Revised Selected Papers /
th This book contains the best papers of the 5 International Conference on e-Business and Telecommunications (ICETE), which was held in July 2008, in Porto, Portugal. This conference reflects a continuing effort to increase the dissemination of recent research results among professionals who work in...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2009.
|
Σειρά: | Communications in Computer and Information Science,
48 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Invited Speakers
- e-Business Innovation: The Next Decade
- Development of the Next Generation CDMA Technology and Lessons We Learnt from the Past
- I ICE-B
- Method for Classification of Unstructured Data in Telecommunication Services
- Possible Determinants Affecting the Use of Mobile Tourism Services
- Towards a Version-Based Approach to Deal with Business Process Evolution
- Comparing Consumer Resistance to Mobile Banking in Finland and Portugal
- NPTool: Towards Scalability and Reliability of Business Process Management
- In Search of Search Engine Marketing Strategy Amongst SME’s in Ireland
- II SECRYPT
- Integrating Anomaly-Based Approach into Bayesian Network Classifiers
- Aggregation and Thresholding Schemes for Anomaly-Based Approaches
- A Memory Efficient Network Encryption Scheme
- Analyzing the Effectiveness of the Self-organized Public-Key Management System on MANETs under the Lack of Cooperation and the Impersonation Attacks
- Achieving Fast Self Healing in Wireless Sensor Networks Using Multi-generation Deployment Schemes
- Reducing Memory Requirements for Combinatorial Attacks on NTRU via Multiple Birthdays
- On the Design of Buyer-Seller Watermarking Protocols without a Watermark Authority
- RKRD: Runtime Kernel Rootkit Detection
- A New Narrow-Block Mode of Operation for Disk Encryption with Error Propagation
- Security Requirements Management in Software Product Line Engineering
- III SIGMAP
- On the Suitability of Suffix Arrays for Lempel-Ziv Data Compression
- Iteratively Detected MIMO-OFDM Twisted-Pair Transmission Schemes
- Whales Localization Using a Large Hydrophone Array: Performance Relative to Cramer-Rao Bounds and Confidence Regions
- Automatic Recognition of Isolated Vowels Using F0-Normalized Harmonic Features
- High-Speed Configurable VLSI Architecture of a General Purpose Lifting-Based Discrete Wavelet Processor
- Face Detection Using Discrete Gabor Jets and a Probabilistic Model of Colored Image Patches
- Geometric Distortion Resilient Watermarking Based on a Single Robust Feature for Still Images
- Optimized Two-Party Video Chat with Restored Eye Contact Using Graphics Hardware
- A New IMS Based Inter-working Solution
- Quality Evaluation of Reverberation in Audioband Speech Signals
- IV WINSYS
- Conservative Transmit Power Control Mechanism for 802.11 Mesh
- Multiple Mobile Sinks Deployment for Energy Efficiency in Large Scale Wireless Sensor Networks
- Using Vegetation Barriers to Improving Wireless Network Isolation and Security
- Throughput Maximization for Multiband-OFDM Ultra Wideband Systems with Adaptive Frame Length Control
- Evaluation of Multicast Scheduling and Clustering Schemes with Packet-Level Macro Diversity in High-Speed Cellular Networks
- The Service Distribution Protocol for MANETs - Criteria and Performance Analysis.