Cargando…

e-Business and Telecommunications International Conference, ICETE 2008, Porto, Portugal, July 26-29, 2008, Revised Selected Papers /

th This book contains the best papers of the 5 International Conference on e-Business and Telecommunications (ICETE), which was held in July 2008, in Porto, Portugal. This conference reflects a continuing effort to increase the dissemination of recent research results among professionals who work in...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Filipe, Joaquim (Editor ), Obaidat, Mohammad S. (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
Edición:1st ed. 2009.
Colección:Communications in Computer and Information Science, 48
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Invited Speakers
  • e-Business Innovation: The Next Decade
  • Development of the Next Generation CDMA Technology and Lessons We Learnt from the Past
  • I ICE-B
  • Method for Classification of Unstructured Data in Telecommunication Services
  • Possible Determinants Affecting the Use of Mobile Tourism Services
  • Towards a Version-Based Approach to Deal with Business Process Evolution
  • Comparing Consumer Resistance to Mobile Banking in Finland and Portugal
  • NPTool: Towards Scalability and Reliability of Business Process Management
  • In Search of Search Engine Marketing Strategy Amongst SME's in Ireland
  • II SECRYPT
  • Integrating Anomaly-Based Approach into Bayesian Network Classifiers
  • Aggregation and Thresholding Schemes for Anomaly-Based Approaches
  • A Memory Efficient Network Encryption Scheme
  • Analyzing the Effectiveness of the Self-organized Public-Key Management System on MANETs under the Lack of Cooperation and the Impersonation Attacks
  • Achieving Fast Self Healing in Wireless Sensor Networks Using Multi-generation Deployment Schemes
  • Reducing Memory Requirements for Combinatorial Attacks on NTRU via Multiple Birthdays
  • On the Design of Buyer-Seller Watermarking Protocols without a Watermark Authority
  • RKRD: Runtime Kernel Rootkit Detection
  • A New Narrow-Block Mode of Operation for Disk Encryption with Error Propagation
  • Security Requirements Management in Software Product Line Engineering
  • III SIGMAP
  • On the Suitability of Suffix Arrays for Lempel-Ziv Data Compression
  • Iteratively Detected MIMO-OFDM Twisted-Pair Transmission Schemes
  • Whales Localization Using a Large Hydrophone Array: Performance Relative to Cramer-Rao Bounds and Confidence Regions
  • Automatic Recognition of Isolated Vowels Using F0-Normalized Harmonic Features
  • High-Speed Configurable VLSI Architecture of a General Purpose Lifting-Based Discrete Wavelet Processor
  • Face Detection Using Discrete Gabor Jets and a Probabilistic Model of Colored Image Patches
  • Geometric Distortion Resilient Watermarking Based on a Single Robust Feature for Still Images
  • Optimized Two-Party Video Chat with Restored Eye Contact Using Graphics Hardware
  • A New IMS Based Inter-working Solution
  • Quality Evaluation of Reverberation in Audioband Speech Signals
  • IV WINSYS
  • Conservative Transmit Power Control Mechanism for 802.11 Mesh
  • Multiple Mobile Sinks Deployment for Energy Efficiency in Large Scale Wireless Sensor Networks
  • Using Vegetation Barriers to Improving Wireless Network Isolation and Security
  • Throughput Maximization for Multiband-OFDM Ultra Wideband Systems with Adaptive Frame Length Control
  • Evaluation of Multicast Scheduling and Clustering Schemes with Packet-Level Macro Diversity in High-Speed Cellular Networks
  • The Service Distribution Protocol for MANETs - Criteria and Performance Analysis.