E-business and Telecommunications 4th International Conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected Papers /
This book constitutes the best papers of the 4th International Conference on E-business and Telecommunication Networks, ICETE 2007, held in Barcelona, Spain, during July 28-31, 2007. The 26 revised full papers presented together with 3 invited papers were carefully reviewed and selected from 418 sub...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2009.
|
Edición: | 1st ed. 2009. |
Colección: | Communications in Computer and Information Science,
23 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Invited Speakers
- Pragmatic Computing - A Semiotic Perspective to Web Services
- Utility Computing: Reality and Beyond
- A Novel Grid-Based Micropayment System for Heterogeneous Multi-party Accounting
- I: ICE-B
- Bidding Agents That Perpetrate Auction Fraud
- A Platform for Mobile Service Provisioning Based on SOA-Integration
- A Hybrid Data Mining Approach for Credit Card Usage Behavior Analysis
- Critical Success Factors of Internet Shopping: The Case of Japan
- An Adaptive Knowledge-Based Approach for Detecting Fraud across Different e-Government Domains
- II: SECRYPT
- Timing to Block Scanning Malwares by Using Combinatorics Proliferation Model
- Securing Biometric Templates Where Similarity Is Measured with Set Intersection
- Score Equalization in SVM Multimodal Fusion for Person Recognition
- Remote Algorithmic Complexity Attacks against Randomized Hash Tables
- Securing Real-Time Sessions in an IMS-Based Architecture
- IPSec Database Query Acceleration
- Detection of Spoofed MAC Addresses in 802.11 Wireless Networks
- K2 Stream Cipher
- Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols
- Reliable Intersection Computation within Malicious Environments
- A Security Hardening Language Based on Aspect-Orientation
- III: SIGMAP
- Facial Expression Synthesis and Analysis
- Multi-sequence H.264/AVC Rate Control Based on the Linear Model
- Non Parametric Stochastic Expectation Maximization for Data Clustering
- Mapping Phonetic Features for Voice-Driven Sound Synthesis
- The MiSPOT System: Personalized Publicity and Marketing over Interactive Digital TV
- Knowledge Engineering Aspects of Affective Bi-Modal Educational Applications
- IV: WINSYS
- Design of a Password-Based EAP Method
- Bit and Power Allocation Strategies for OFDM Systems over Time-Varying Channels
- Mobile Applications to a Pervasive World
- Multi-service Networks: A New Approach to End-to-End Topology Management.