e-Business and Telecommunications

International Conference, ICETE 2008, Porto, Portugal, July 26-29, 2008, Revised Selected Papers
Buch | Softcover
XVIII, 482 Seiten
2009 | 2009
Springer Berlin (Verlag)
978-3-642-05196-8 (ISBN)
106,99 inkl. MwSt
th This book contains the best papers of the 5 International Conference on e-Business and Telecommunications (ICETE), which was held in July 2008, in Porto, Portugal. This conference reflects a continuing effort to increase the dissemination of recent research results among professionals who work in the areas of e-business and te- communications. ICETE is a joint international conference integrating four major areas of knowledge that are divided into four corresponding conferences: ICE-B (- ternational Conf. on e-Business), SECRYPT (International Conf. on Security and Cryptography), SIGMAP (Int'l Conf. on Signal Processing and Multimedia) and WINSYS (International Conf. on Wireless Information Systems). The program of this joint conference included several outstanding keynote lectures presented by internationally renowned distinguished researchers who are experts in the various ICETE areas. Their keynote speeches have contributed to heightening the overall quality of the program and significance of the theme of the conference. The conference topic areas define a broad spectrum in the key areas of e-business and telecommunications. This wide-view reporting made ICETE appealing to a global au- ence of engineers, scientists, business practitioners and policy experts. The papers - cepted and presented at the conference demonstrated a number of new and innovative solutions for e-business and telecommunication networks and systems, showing that the technical problems in these closely related fields are challenging and worthwhile - proaching an interdisciplinary perspective such as that promoted by ICETE.

Invited Speakers.- e-Business Innovation: The Next Decade.- Development of the Next Generation CDMA Technology and Lessons We Learnt from the Past.- I ICE-B.- Method for Classification of Unstructured Data in Telecommunication Services.- Possible Determinants Affecting the Use of Mobile Tourism Services.- Towards a Version-Based Approach to Deal with Business Process Evolution.- Comparing Consumer Resistance to Mobile Banking in Finland and Portugal.- NPTool: Towards Scalability and Reliability of Business Process Management.- In Search of Search Engine Marketing Strategy Amongst SME's in Ireland.- II SECRYPT.- Integrating Anomaly-Based Approach into Bayesian Network Classifiers.- Aggregation and Thresholding Schemes for Anomaly-Based Approaches.- A Memory Efficient Network Encryption Scheme.- Analyzing the Effectiveness of the Self-organized Public-Key Management System on MANETs under the Lack of Cooperation and the Impersonation Attacks.- Achieving Fast Self Healing in Wireless Sensor Networks Using Multi-generation Deployment Schemes.- Reducing Memory Requirements for Combinatorial Attacks on NTRU via Multiple Birthdays.- On the Design of Buyer-Seller Watermarking Protocols without a Watermark Authority.- RKRD: Runtime Kernel Rootkit Detection.- A New Narrow-Block Mode of Operation for Disk Encryption with Error Propagation.- Security Requirements Management in Software Product Line Engineering.- III SIGMAP.- On the Suitability of Suffix Arrays for Lempel-Ziv Data Compression.- Iteratively Detected MIMO-OFDM Twisted-Pair Transmission Schemes.- Whales Localization Using a Large Hydrophone Array: Performance Relative to Cramer-Rao Bounds and Confidence Regions.- Automatic Recognition of Isolated Vowels Using F0-Normalized Harmonic Features.- High-Speed ConfigurableVLSI Architecture of a General Purpose Lifting-Based Discrete Wavelet Processor.- Face Detection Using Discrete Gabor Jets and a Probabilistic Model of Colored Image Patches.- Geometric Distortion Resilient Watermarking Based on a Single Robust Feature for Still Images.- Optimized Two-Party Video Chat with Restored Eye Contact Using Graphics Hardware.- A New IMS Based Inter-working Solution.- Quality Evaluation of Reverberation in Audioband Speech Signals.- IV WINSYS.- Conservative Transmit Power Control Mechanism for 802.11 Mesh.- Multiple Mobile Sinks Deployment for Energy Efficiency in Large Scale Wireless Sensor Networks.- Using Vegetation Barriers to Improving Wireless Network Isolation and Security.- Throughput Maximization for Multiband-OFDM Ultra Wideband Systems with Adaptive Frame Length Control.- Evaluation of Multicast Scheduling and Clustering Schemes with Packet-Level Macro Diversity in High-Speed Cellular Networks.- The Service Distribution Protocol for MANETs - Criteria and Performance Analysis.

Erscheint lt. Verlag 28.10.2009
Reihe/Serie Communications in Computer and Information Science
Zusatzinfo XVIII, 482 p.
Verlagsort Berlin
Sprache englisch
Maße 155 x 235 mm
Themenwelt Mathematik / Informatik Informatik Netzwerke
Schlagworte 802.11 • authentication • Bayesian networks • cellular networks • Communication • cryptography • discrete gabor jets • E-Banking • E-Business • Encryption • Hardcover, Softcover / Informatik, EDV/Datenkommunikation, Netzwerke • Information • Lempel-Ziv • location based • Manet • Multimedia • search engine marketing (SEM) • watermark • Wavelets • Wireless • wireless sensor networks
ISBN-10 3-642-05196-0 / 3642051960
ISBN-13 978-3-642-05196-8 / 9783642051968
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
das umfassende Handbuch für den Einstieg in die Netzwerktechnik

von Martin Linten; Axel Schemberg; Kai Surendorf

Buch | Hardcover (2023)
Rheinwerk (Verlag)
29,90
das Praxisbuch für Admins und DevOps-Teams

von Michael Kofler

Buch | Hardcover (2023)
Rheinwerk (Verlag)
39,90