Cargando…

E-business and Telecommunication Networks Second International Conference, ICETE 2005, Reading, UK, October 3-7, 2005. Selected Papers /

This book contains the best papers of the Second International Conference on E-business and Telecommunication Networks (ICETE), which was held, in 2005, at the Microsoft Research Centre - Reading, in the UK. The conference was organized by INSTICC (Institute for Systems and Technologies of Informati...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Filipe, Joaquim (Editor ), Coelhas, Helder (Editor ), Saramago, Monica (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2007.
Edición:1st ed. 2007.
Colección:Communications in Computer and Information Science, 3
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • I: Global Communication Information Systems and Services
  • Sharing Service Resource Information for Application Integration in a Virtual Enterprise - Modeling the Communication Protocol for Exchanging Service Resource Information
  • Advertising Via Mobile Terminals - Delivering Context Sensitive and Personalized Advertising While Guaranteeing Privacy
  • On Digital Cash-Like Payment Systems
  • In-Depth Analysis of Selected Topics Related to the Quality Assessment of E-Commerce Systems
  • A Novel Real-Time Self-similar Traffic Detector/Filter to Improve the Reliability of a TCP Based End-to-End Client/Server Interaction Path for Shorter Roundtrip Time
  • Strategies for Service Composition in P2P Networks
  • End to End Adaptation for the Web: Matching Content to Client Connections
  • II: Security and Reliability in Information Systems and Networks
  • Voice Biometrics Within the Family: Trust, Privacy and Personalisation
  • Secret Locking: Exploring New Approaches to Biometric Key Encapsulation
  • Adaptive Real-Time Network Monitoring System: Detecting Anomalous Activity with Evolving Connectionist System
  • Host Identity Protocol Proxy
  • Guaranteerring Security of Financial Transaction by Using Quantum Cryptography in Banking Environment
  • Optimal Trade-Off for Merkle Tree Traversal
  • Supporting the Cybercrime Investigation Process: Effective Discrimination of Source Code Authors Based on Byte-Level Information
  • III: Wireless Communication Systems and Networks
  • Iterative MMSE Detection for MIMO/BLAST DS-CDMA Systems in Frequency Selective Fading Channels - Achieving High Performance in Fully Loaded Systems
  • Flooding Attack on the Binding Cache in Mobile IPv6
  • Performance of VoIP over IEEE 802.11G DSSS-OFDM Mode with IEEE 802.11E QOS Support
  • The Robustness of Blocking Probability in a Loss System with Repeated Customers
  • On the Evaluation of a Secure Solution to Access 802.11 Networks
  • Searching for Resources in MANETs - A Cluster Based Flooding Approach
  • A Comparative Study of IEEE 802.11 MAC Access Mechanisms for Different Traffic Types
  • An Automatic Blind Modulation Recognition Algorithm for M-PSK Signals Based on MSE Criterion
  • IV: Multimedia Signal Processing
  • Properties of Dominant Color Temperature Descriptor
  • Test Environment for Performance Evaluation of an Internet Radio.