E-business and Telecommunications (eBook, PDF)
4th International Conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected Papers
Redaktion: Filipe, Joaquim; Obaidat, Mohammad S.
40,95 €
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
40,95 €
Als Download kaufen
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
20 °P sammeln
E-business and Telecommunications (eBook, PDF)
4th International Conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected Papers
Redaktion: Filipe, Joaquim; Obaidat, Mohammad S.
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the best papers of the 4th International Conference on E-business and Telecommunication Networks, ICETE 2007, held in Barcelona, Spain, during July 28-31, 2007.
The 26 revised full papers presented together with 3 invited papers were carefully reviewed and selected from 418 submissions. The papers are organized in four parts according to their conferences: ICE-B, SECRYPT, SIGMAP and WINSYS.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 17.95MB
Andere Kunden interessierten sich auch für
- -23%11Grid Economics and Business Models (eBook, PDF)40,95 €
- Ubiquitous Networking (eBook, PDF)40,95 €
- Smart Grid and Innovative Frontiers in Telecommunications (eBook, PDF)40,95 €
- E-Business and Telecommunications (eBook, PDF)40,95 €
- Grid Economics and Business Models (eBook, PDF)40,95 €
- Wireless and Satellite Systems (eBook, PDF)40,95 €
- Grid Economics and Business Models (eBook, PDF)40,95 €
- -37%11
-
-
This book constitutes the best papers of the 4th International Conference on E-business and Telecommunication Networks, ICETE 2007, held in Barcelona, Spain, during July 28-31, 2007.
The 26 revised full papers presented together with 3 invited papers were carefully reviewed and selected from 418 submissions. The papers are organized in four parts according to their conferences: ICE-B, SECRYPT, SIGMAP and WINSYS.
The 26 revised full papers presented together with 3 invited papers were carefully reviewed and selected from 418 submissions. The papers are organized in four parts according to their conferences: ICE-B, SECRYPT, SIGMAP and WINSYS.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer Berlin Heidelberg
- Seitenzahl: 398
- Erscheinungstermin: 2. November 2008
- Englisch
- ISBN-13: 9783540886532
- Artikelnr.: 44130721
- Verlag: Springer Berlin Heidelberg
- Seitenzahl: 398
- Erscheinungstermin: 2. November 2008
- Englisch
- ISBN-13: 9783540886532
- Artikelnr.: 44130721
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Invited Speakers.- Pragmatic Computing - A Semiotic Perspective to Web Services.- Utility Computing: Reality and Beyond.- A Novel Grid-Based Micropayment System for Heterogeneous Multi-party Accounting.- I: ICE-B.- Bidding Agents That Perpetrate Auction Fraud.- A Platform for Mobile Service Provisioning Based on SOA-Integration.- A Hybrid Data Mining Approach for Credit Card Usage Behavior Analysis.- Critical Success Factors of Internet Shopping: The Case of Japan.- An Adaptive Knowledge-Based Approach for Detecting Fraud across Different e-Government Domains.- II: SECRYPT.- Timing to Block Scanning Malwares by Using Combinatorics Proliferation Model.- Securing Biometric Templates Where Similarity Is Measured with Set Intersection.- Score Equalization in SVM Multimodal Fusion for Person Recognition.- Remote Algorithmic Complexity Attacks against Randomized Hash Tables.- Securing Real-Time Sessions in an IMS-Based Architecture.- IPSec Database Query Acceleration.- Detection of Spoofed MAC Addresses in 802.11 Wireless Networks.- K2 Stream Cipher.- Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols.- Reliable Intersection Computation within Malicious Environments.- A Security Hardening Language Based on Aspect-Orientation.- III: SIGMAP.- Facial Expression Synthesis and Analysis.- Multi-sequence H.264/AVC Rate Control Based on the Linear Model.- Non Parametric Stochastic Expectation Maximization for Data Clustering.- Mapping Phonetic Features for Voice-Driven Sound Synthesis.- The MiSPOT System: Personalized Publicity and Marketing over Interactive Digital TV.- Knowledge Engineering Aspects of Affective Bi-Modal Educational Applications.- IV: WINSYS.- Design of a Password-Based EAP Method.- Bit and Power Allocation Strategiesfor OFDM Systems over Time-Varying Channels.- Mobile Applications to a Pervasive World.- Multi-service Networks: A New Approach to End-to-End Topology Management.
Invited Speakers.- Pragmatic Computing - A Semiotic Perspective to Web Services.- Utility Computing: Reality and Beyond.- A Novel Grid-Based Micropayment System for Heterogeneous Multi-party Accounting.- I: ICE-B.- Bidding Agents That Perpetrate Auction Fraud.- A Platform for Mobile Service Provisioning Based on SOA-Integration.- A Hybrid Data Mining Approach for Credit Card Usage Behavior Analysis.- Critical Success Factors of Internet Shopping: The Case of Japan.- An Adaptive Knowledge-Based Approach for Detecting Fraud across Different e-Government Domains.- II: SECRYPT.- Timing to Block Scanning Malwares by Using Combinatorics Proliferation Model.- Securing Biometric Templates Where Similarity Is Measured with Set Intersection.- Score Equalization in SVM Multimodal Fusion for Person Recognition.- Remote Algorithmic Complexity Attacks against Randomized Hash Tables.- Securing Real-Time Sessions in an IMS-Based Architecture.- IPSec Database Query Acceleration.- Detection of Spoofed MAC Addresses in 802.11 Wireless Networks.- K2 Stream Cipher.- Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols.- Reliable Intersection Computation within Malicious Environments.- A Security Hardening Language Based on Aspect-Orientation.- III: SIGMAP.- Facial Expression Synthesis and Analysis.- Multi-sequence H.264/AVC Rate Control Based on the Linear Model.- Non Parametric Stochastic Expectation Maximization for Data Clustering.- Mapping Phonetic Features for Voice-Driven Sound Synthesis.- The MiSPOT System: Personalized Publicity and Marketing over Interactive Digital TV.- Knowledge Engineering Aspects of Affective Bi-Modal Educational Applications.- IV: WINSYS.- Design of a Password-Based EAP Method.- Bit and Power Allocation Strategiesfor OFDM Systems over Time-Varying Channels.- Mobile Applications to a Pervasive World.- Multi-service Networks: A New Approach to End-to-End Topology Management.