Filipe / Coelhas / Saramago | E-business and Telecommunication Networks | E-Book | www.sack.de
E-Book

E-Book, Englisch, Band 3, 293 Seiten, eBook

Reihe: Communications in Computer and Information Science

Filipe / Coelhas / Saramago E-business and Telecommunication Networks

Second International Conference, ICETE 2005, Reading, UK, October 3-7, 2005. Selected Papers
2007
ISBN: 978-3-540-75993-5
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark

Second International Conference, ICETE 2005, Reading, UK, October 3-7, 2005. Selected Papers

E-Book, Englisch, Band 3, 293 Seiten, eBook

Reihe: Communications in Computer and Information Science

ISBN: 978-3-540-75993-5
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark



This book constitutes the refereed proceedings of the Second International Conference on E-business and Telecommunication Networks, ICETE 2005. The 85 revised full papers presented were carefully reviewed and selected from 151 submissions. The papers are organized in topical sections on global communication information systems and services, security and reliability in information systems and networks, wireless communication systems and networks, and multimedia signal processing.

Filipe / Coelhas / Saramago E-business and Telecommunication Networks jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


I: Global Communication Information Systems and Services.- Sharing Service Resource Information for Application Integration in a Virtual Enterprise – Modeling the Communication Protocol for Exchanging Service Resource Information.- Advertising Via Mobile Terminals – Delivering Context Sensitive and Personalized Advertising While Guaranteeing Privacy.- On Digital Cash-Like Payment Systems.- In-Depth Analysis of Selected Topics Related to the Quality Assessment of E-Commerce Systems.- A Novel Real-Time Self-similar Traffic Detector/Filter to Improve the Reliability of a TCP Based End-to-End Client/Server Interaction Path for Shorter Roundtrip Time.- Strategies for Service Composition in P2P Networks.- End to End Adaptation for the Web: Matching Content to Client Connections.- II: Security and Reliability in Information Systems and Networks.- Voice Biometrics Within the Family: Trust, Privacy and Personalisation.- Secret Locking: Exploring New Approaches to Biometric Key Encapsulation.- Adaptive Real-Time Network Monitoring System: Detecting Anomalous Activity with Evolving Connectionist System.- Host Identity Protocol Proxy.- Guaranteerring Security of Financial Transaction by Using Quantum Cryptography in Banking Environment.- Optimal Trade-Off for Merkle Tree Traversal.- Supporting the Cybercrime Investigation Process: Effective Discrimination of Source Code Authors Based on Byte-Level Information.- III: Wireless Communication Systems and Networks.- Iterative MMSE Detection for MIMO/BLAST DS-CDMA Systems in Frequency Selective Fading Channels – Achieving High Performance in Fully Loaded Systems.- Flooding Attack on the Binding Cache in Mobile IPv6.- Performance of VoIP over IEEE 802.11G DSSS-OFDM Mode with IEEE 802.11E QOS Support.- The Robustness of Blocking Probability in a Loss System with Repeated Customers.- On the Evaluation of a Secure Solution to Access 802.11 Networks.- Searching for Resources in MANETs – A Cluster Based Flooding Approach.- A Comparative Study of IEEE 802.11 MAC Access Mechanisms for Different Traffic Types.- An Automatic Blind Modulation Recognition Algorithm for M-PSK Signals Based on MSE Criterion.- IV: Multimedia Signal Processing.- Properties of Dominant Color Temperature Descriptor.- Test Environment for Performance Evaluation of an Internet Radio.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.