e-Business and Telecommunication Networks (eBook)
XIV, 278 Seiten
Springer Netherland (Verlag)
978-1-4020-4761-9 (ISBN)
This book contains the best papers of the First International Conference on e-Business and Telecommunication Networks held in 2004. The book presents recent research on e-business and telecommunication networks. It includes analyses aspects of global communication information systems and services, and describes security and reliability problems and solutions in information systems and networks.
This book contains the best papers of the First International Conference on E-business and Telecommunication Networks (ICETE 2004), held in Setubal (Portugal) and organized by INSTICC (Institute for Systems and Technologies of Information, Communication and Control ) in collaboration with the School of Business of the Polytechnic Institute of Setubal, who hosted the event. This conference represents a major initiative to increase the technical exchanges among professionals, who work on the e-Business and Telecommunication Networks fields, and who are deploying new services and technologies into the lives of ordinary consumers. The major goal of this conference is to bring together researchers and developers from academia a and industry working in areas related to e-business, with a special focus on Telecommunication Networks. This year, four simultaneous tracks were held, covering different aspects, including: "e;Global Communication Information Systems and Services"e;, "e;Security and Reliability in Information Systems and Networks"e;, "e;Wireless Communication Systems and Networks"e; and "e;Multimedia Signal Processing g"e;. The sections of this book reflect the conference tracks. ICETE 2004 received 202 paper submissions from 43 different countries, from all continents. 110 papers were published and orally presented as full papers, i.e. completed work, and 44 papers were accepted for poster presentation. The full paper acceptance ratio confirms our confidence that ICETE 2004 has achieved a high quality standard that we will strive to keep and enhance in order to ensure the success of the next year ICETE edition.
Preface. Conference Committee. Invited papers. Data mining techniques for security of web services; M. Malek and F. Harmantzis. Towards an alternative way of verifying proxy objects in jini; N. Papamichail and L. Vasiu. An experimental performance analysis study of loss rate and jitter characteristics in wireless networks; M. S. Obaidat and Yulian Wang. On the survivability of wdm optical networks; Y. Luo et al. Sigma: a transport layer mobility management scheme for terrestrial and space networks; S. Fu and M. Atiquzzaman. PART 1 - Global Communication Information Systems and Services. A decentralized location service: Applying P2P technology for picking replicas on replicated services; L. Bernardo and P. Pinto. E-macsc: a novel dynamic cache tuning technique to maintain the hit ratio prescribed by the user in internet applications; R.S.L. Wu et al. Efficient information retrieval from handheld terminals with wireless digital phone interface: personalized information access on mobile phones and PDAs; H. Weghorn. Secure web browsing over long-delay broadband networks: recommendations for web browsers; D. Dillon et al. Experimental based tool calibration used for assessing the quality of e-commerce systems; A. Stefani et al. Gender differences in online shoppers’ decision-making styles; C. Yang and C.C. Wu. Design and evaluation of the home network systems using the service oriented architecture; H. Igaki et al. PART 2 – Security and reliability in information systems and networks. New non-adaptive distributed system-level diagnosis methods for computer networks; H. Masuyama and K. Watanabe. Gsm and gprs performance of ipsec data communication; G. Me et al. Practival auditability in trusted messaging systems; M. Reis et al. Towards an adaptive packet marking scheme for ip traceback; P. Yan and M.C. Lee. Baseline tohelp with network management; M.L. Proenca Jr. et al. Network-based intrusion detection systems evaluation through a short term experimental script; L.L. Fagundes and L.P. Gaspary. A single sign-on protocol for distributed web applications based on standard internet mechanisms; J. Gantner et al. PART 3 – Wireless communication systems and networks. Adjacent channel interference: impact on the capacity of wcdma/fdd networks; D. Figueiredo et al. Care-of-prefix routing for moving networks in mobile ip network; T. Suzuki et al. Service integration between wireless systems: a core-level approach to internetworking; P. Pinto et al. Spur: a secured protocol for umts registration; M. Abdelkader and N. Boudriga. Providing qos in 3g-wlan environment with rsvp and diffserv; E. Wallenius et al. Fast Mobile ipv6 approach for wireless lan based networks: link-layer triggering support for ieee 802.11; N. Jordan and A. Poropatich. Cdma2000 1x capacity decrease by power control error in high speed train environment; S. Shin et al. Ugsp: authentication based secure protocol for ad-hoc networks; N. Arora and R.K. Shyamasundar. PART 4 – Multimedia signal processing. Image authentication using hierarchical semi-fragile watermarks; Y-L Tang and C.-H. Chen. Deployment of live-video services based on streaming technology over an hfc network; D. Melendi et al. Hardware-oriented analysis of the arithmetic coding – comparative study of jpeg2000 and h.264/avc compression standards; G. Pastuszak. Audio watermarking quality evaluation; A.G. Acevedo. Compression of hyperspectral imagery via linear prediction; F. Rizzo et al. Bayer pattern compression by prediction errors; A. Buemi et al. Application level session hand-off management in a ubiquitous multimedia environment; L. Rong and I. Burnett. Author index.
Erscheint lt. Verlag | 18.8.2006 |
---|---|
Zusatzinfo | XIV, 278 p. |
Verlagsort | Dordrecht |
Sprache | englisch |
Themenwelt | Informatik ► Office Programme ► Outlook |
Wirtschaft ► Allgemeines / Lexika | |
Wirtschaft ► Betriebswirtschaft / Management ► Marketing / Vertrieb | |
Schlagworte | Audio • Distributed Systems • DJ • E-Business • E-Commerce • Host • Management • Multimedia • Performance • Routing • search engine marketing (SEM) • session • Video • Web Services • Wireless LAN |
ISBN-10 | 1-4020-4761-4 / 1402047614 |
ISBN-13 | 978-1-4020-4761-9 / 9781402047619 |
Haben Sie eine Frage zum Produkt? |
Größe: 12,7 MB
DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasserzeichen und ist damit für Sie personalisiert. Bei einer missbräuchlichen Weitergabe des eBooks an Dritte ist eine Rückverfolgung an die Quelle möglich.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich