E-business and Telecommunication Networks Second International Conference, ICETE 2005, Reading, UK, October 3-7, 2005. Selected Papers /
This book contains the best papers of the Second International Conference on E-business and Telecommunication Networks (ICETE), which was held, in 2005, at the Microsoft Research Centre - Reading, in the UK. The conference was organized by INSTICC (Institute for Systems and Technologies of Informati...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2007.
|
Edición: | 1st ed. 2007. |
Colección: | Communications in Computer and Information Science,
3 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- I: Global Communication Information Systems and Services
- Sharing Service Resource Information for Application Integration in a Virtual Enterprise - Modeling the Communication Protocol for Exchanging Service Resource Information
- Advertising Via Mobile Terminals - Delivering Context Sensitive and Personalized Advertising While Guaranteeing Privacy
- On Digital Cash-Like Payment Systems
- In-Depth Analysis of Selected Topics Related to the Quality Assessment of E-Commerce Systems
- A Novel Real-Time Self-similar Traffic Detector/Filter to Improve the Reliability of a TCP Based End-to-End Client/Server Interaction Path for Shorter Roundtrip Time
- Strategies for Service Composition in P2P Networks
- End to End Adaptation for the Web: Matching Content to Client Connections
- II: Security and Reliability in Information Systems and Networks
- Voice Biometrics Within the Family: Trust, Privacy and Personalisation
- Secret Locking: Exploring New Approaches to Biometric Key Encapsulation
- Adaptive Real-Time Network Monitoring System: Detecting Anomalous Activity with Evolving Connectionist System
- Host Identity Protocol Proxy
- Guaranteerring Security of Financial Transaction by Using Quantum Cryptography in Banking Environment
- Optimal Trade-Off for Merkle Tree Traversal
- Supporting the Cybercrime Investigation Process: Effective Discrimination of Source Code Authors Based on Byte-Level Information
- III: Wireless Communication Systems and Networks
- Iterative MMSE Detection for MIMO/BLAST DS-CDMA Systems in Frequency Selective Fading Channels - Achieving High Performance in Fully Loaded Systems
- Flooding Attack on the Binding Cache in Mobile IPv6
- Performance of VoIP over IEEE 802.11G DSSS-OFDM Mode with IEEE 802.11E QOS Support
- The Robustness of Blocking Probability in a Loss System with Repeated Customers
- On the Evaluation of a Secure Solution to Access 802.11 Networks
- Searching for Resources in MANETs - A Cluster Based Flooding Approach
- A Comparative Study of IEEE 802.11 MAC Access Mechanisms for Different Traffic Types
- An Automatic Blind Modulation Recognition Algorithm for M-PSK Signals Based on MSE Criterion
- IV: Multimedia Signal Processing
- Properties of Dominant Color Temperature Descriptor
- Test Environment for Performance Evaluation of an Internet Radio.