Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.

e-Business and Telecommunications

International Conference, ICETE 2008, Porto, Portugal, July 26-29, 2008, Revised Selected Papers
Sofort lieferbar | Lieferzeit: Sofort lieferbar I
ISBN-13:
9783642051975
Veröffentl:
2009
Seiten:
482
Autor:
Joaquim Filipe
Serie:
48, Communications in Computer and Information Science
eBook Typ:
PDF
eBook Format:
EPUB
Kopierschutz:
1 - PDF Watermark
Sprache:
Englisch
Beschreibung:

th This book contains the best papers of the 5 International Conference on e-Business and Telecommunications (ICETE), which was held in July 2008, in Porto, Portugal. This conference reflects a continuing effort to increase the dissemination of recent research results among professionals who work in the areas of e-business and te- communications. ICETE is a joint international conference integrating four major areas of knowledge that are divided into four corresponding conferences: ICE-B (- ternational Conf. on e-Business), SECRYPT (International Conf. on Security and Cryptography), SIGMAP (Int'l Conf. on Signal Processing and Multimedia) and WINSYS (International Conf. on Wireless Information Systems). The program of this joint conference included several outstanding keynote lectures presented by internationally renowned distinguished researchers who are experts in the various ICETE areas. Their keynote speeches have contributed to heightening the overall quality of the program and significance of the theme of the conference. The conference topic areas define a broad spectrum in the key areas of e-business and telecommunications. This wide-view reporting made ICETE appealing to a global au- ence of engineers, scientists, business practitioners and policy experts. The papers - cepted and presented at the conference demonstrated a number of new and innovative solutions for e-business and telecommunication networks and systems, showing that the technical problems in these closely related fields are challenging and worthwhile - proaching an interdisciplinary perspective such as that promoted by ICETE.
"This book contains the best papers of the 5th International Conference on e-Business and Telecommunications, ICETE, which was held in July 2008, in Porto, Portugal. This conference reflects a continuing effort to increase the dissemination of recent research results among professionals who work in the areas of e-business and telecommunications.ICETE is a joint international conference integrating four major areas of knowledge that are divided into four corresponding conferences: ICE-B (International Conference on e-Business), SECRYPT (International Conference on Security and Cryptography), SIGMAP (International Conference on Signal Processing and Multimedia), and WINSYS (International Conferenceon Wireless Information Systems)."
Invited Speakers.- e-Business Innovation: The Next Decade.- Development of the Next Generation CDMA Technology and Lessons We Learnt from the Past.- I ICE-B.- Method for Classification of Unstructured Data in Telecommunication Services.- Possible Determinants Affecting the Use of Mobile Tourism Services.- Towards a Version-Based Approach to Deal with Business Process Evolution.- Comparing Consumer Resistance to Mobile Banking in Finland and Portugal.- NPTool: Towards Scalability and Reliability of Business Process Management.- In Search of Search Engine Marketing Strategy Amongst SME's in Ireland.- II SECRYPT.- Integrating Anomaly-Based Approach into Bayesian Network Classifiers.- Aggregation and Thresholding Schemes for Anomaly-Based Approaches.- A Memory Efficient Network Encryption Scheme.- Analyzing the Effectiveness of the Self-organized Public-Key Management System on MANETs under the Lack of Cooperation and the Impersonation Attacks.- Achieving Fast Self Healing in Wireless Sensor Networks Using Multi-generation Deployment Schemes.- Reducing Memory Requirements for Combinatorial Attacks on NTRU via Multiple Birthdays.- On the Design of Buyer-Seller Watermarking Protocols without a Watermark Authority.- RKRD: Runtime Kernel Rootkit Detection.- A New Narrow-Block Mode of Operation for Disk Encryption with Error Propagation.- Security Requirements Management in Software Product Line Engineering.- III SIGMAP.- On the Suitability of Suffix Arrays for Lempel-Ziv Data Compression.- Iteratively Detected MIMO-OFDM Twisted-Pair Transmission Schemes.- Whales Localization Using a Large Hydrophone Array: Performance Relative to Cramer-Rao Bounds and Confidence Regions.- Automatic Recognition of Isolated Vowels Using F0-Normalized Harmonic Features.- High-Speed ConfigurableVLSI Architecture of a General Purpose Lifting-Based Discrete Wavelet Processor.- Face Detection Using Discrete Gabor Jets and a Probabilistic Model of Colored Image Patches.- Geometric Distortion Resilient Watermarking Based on a Single Robust Feature for Still Images.- Optimized Two-Party Video Chat with Restored Eye Contact Using Graphics Hardware.- A New IMS Based Inter-working Solution.- Quality Evaluation of Reverberation in Audioband Speech Signals.- IV WINSYS.- Conservative Transmit Power Control Mechanism for 802.11 Mesh.- Multiple Mobile Sinks Deployment for Energy Efficiency in Large Scale Wireless Sensor Networks.- Using Vegetation Barriers to Improving Wireless Network Isolation and Security.- Throughput Maximization for Multiband-OFDM Ultra Wideband Systems with Adaptive Frame Length Control.- Evaluation of Multicast Scheduling and Clustering Schemes with Packet-Level Macro Diversity in High-Speed Cellular Networks.- The Service Distribution Protocol for MANETs - Criteria and Performance Analysis.

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.

Google Plus
Powered by Inooga