Cargando…

E-business and Telecommunications 4th International Conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected Papers /

This book constitutes the best papers of the 4th International Conference on E-business and Telecommunication Networks, ICETE 2007, held in Barcelona, Spain, during July 28-31, 2007. The 26 revised full papers presented together with 3 invited papers were carefully reviewed and selected from 418 sub...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Filipe, Joaquim (Editor ), Obaidat, Mohammad S. (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
Edición:1st ed. 2009.
Colección:Communications in Computer and Information Science, 23
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Invited Speakers
  • Pragmatic Computing - A Semiotic Perspective to Web Services
  • Utility Computing: Reality and Beyond
  • A Novel Grid-Based Micropayment System for Heterogeneous Multi-party Accounting
  • I: ICE-B
  • Bidding Agents That Perpetrate Auction Fraud
  • A Platform for Mobile Service Provisioning Based on SOA-Integration
  • A Hybrid Data Mining Approach for Credit Card Usage Behavior Analysis
  • Critical Success Factors of Internet Shopping: The Case of Japan
  • An Adaptive Knowledge-Based Approach for Detecting Fraud across Different e-Government Domains
  • II: SECRYPT
  • Timing to Block Scanning Malwares by Using Combinatorics Proliferation Model
  • Securing Biometric Templates Where Similarity Is Measured with Set Intersection
  • Score Equalization in SVM Multimodal Fusion for Person Recognition
  • Remote Algorithmic Complexity Attacks against Randomized Hash Tables
  • Securing Real-Time Sessions in an IMS-Based Architecture
  • IPSec Database Query Acceleration
  • Detection of Spoofed MAC Addresses in 802.11 Wireless Networks
  • K2 Stream Cipher
  • Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols
  • Reliable Intersection Computation within Malicious Environments
  • A Security Hardening Language Based on Aspect-Orientation
  • III: SIGMAP
  • Facial Expression Synthesis and Analysis
  • Multi-sequence H.264/AVC Rate Control Based on the Linear Model
  • Non Parametric Stochastic Expectation Maximization for Data Clustering
  • Mapping Phonetic Features for Voice-Driven Sound Synthesis
  • The MiSPOT System: Personalized Publicity and Marketing over Interactive Digital TV
  • Knowledge Engineering Aspects of Affective Bi-Modal Educational Applications
  • IV: WINSYS
  • Design of a Password-Based EAP Method
  • Bit and Power Allocation Strategies for OFDM Systems over Time-Varying Channels
  • Mobile Applications to a Pervasive World
  • Multi-service Networks: A New Approach to End-to-End Topology Management.