Atjaunināt sīkdatņu piekrišanu

E-grāmata: E-Business and Telecommunications: 12th International Joint Conference, ICETE 2015, Colmar, France, July 20-22, 2015, Revised Selected Papers

Edited by , Edited by
  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the refereed proceedings of the 12th International Joint Conference on E-Business and Telecommunications, ICETE 2015, held in Colmar, France, in July 2015. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding conferences: International Conference on Data Communication Networking, DCNET; International Conference on E-Business, ICE-B; International Conference on Optical Communication Systems, OPTICS; International Conference on Security and Cryptography, SECRYPT; International Conference on Wireless Information Systems, WINSYS; and International Conference on Signal Processing and Multimedia, SIGMAP.





The 23 full papers presented together with an invited paper in this volume were carefully reviewed and selected from 218 submissions. The papers cover the following key areas of e-business and telecommunications: data communication networking; e-business; optical communication systems; security and cryptography; signal processing and multimedia applications; wireless information networks and systems.
Invited Paper
Integrating Retail and e-Commerce Using Web Analytics and Intelligent Sensors
3(36)
A.C. Boucouvalas
C. Aivalis
K. Gatziolis
Data Communication Networking
High Level Policies in SDN
39(19)
Libor Polcak
Leo Caldarola
Amine Choukir
Davide Cuda
Marco Dondero
Domenico Ficara
Barbora Frankova
Martin Holkovic
Roberto Muccifora
Antonio Trifilo
What a Difference a Year Makes: Long Term Evaluation of TLS Cipher Suite Compatibility
58(23)
Stefan Prinz
Silvie Schmidt
Manuel Koschuch
Alexander Glaser
Taro Fruhwirth
Matthias Hudler
e-Business
ARM: Architecture for Recruitment Matchmaking
81(19)
Bruno Coelho
Fernando Costa
Gil M. Goncalves
Understanding Local mGovernment Applications: A Business Model Approach to the Case of Brussels
100(24)
Nils Walravens
Understanding the Use of Location Sharing Services on Social Networking Platforms in China
124(13)
Shang Gao
Xuemei Zhang
Large Scale Evaluation of an Adaptive E-Advertising User Model
137(24)
Alaa A. Qaffas
Alexandra I. Cristea
Optical Communication Systems
How Do the Multiple Tunable Receivers Per Node Affect the Efficiency of a WDM LAN? A Performance Analytical Study
161(18)
Peristera A. Baziana
Security and Cryptography
A Scalable Honeynet Architecture for Industrial Control Systems
179(22)
Alexandru Vlad Serbanescu
Sebastian Obermeier
Der-Yeuan Yu
Evaluating Op-Code Frequency Histograms in Malware and Third-Party Mobile Applications
201(22)
Gerardo Canfora
Francesco Mercaldo
Corrado Aaron Visaggio
Automated Verification of e-Cash Protocols
223(22)
Jannik Dreier
Ali Kassem
Pascal Lafourcade
Theoretical Foundation for Code Obfuscation Security: A Kolmogorov Complexity Approach
245(25)
Rabih Mohsen
Alexandre Miranda Pinto
The Entity Labeling Pattern for Modeling Operating Systems Access Control
270(23)
Peter Amthor
Execution Path Classification for Vulnerability Analysis and Detection
293(25)
George Stergiopoulos
Panagiotis Katsaros
Dimitris Gritzalis
A Privacy-Sensitive Collaborative Approach to Business Process Development
318(25)
Hassaan Irshad
Basit Shafiq
Jaideep Vaidya
Muhammad Ahmed Bashir
Hafiz Salman Asif
Sameera Ghayyur
Shafay Shamail
Adam Nabil
Using OWL Reasoning for Evaluating XACML Policies
343(21)
Fabio Marfia
Mario Arrigoni Neri
Filippo Pellegrini
Marco Colombetti
Partial Key Exposure Attacks on RSA with Exponent Blinding
364(22)
Stelvio Cimato
Silvia Mella
Ruggero Susella
A Generalized Authentication Scheme for Mobile Phones Using Gait Signals
386(25)
Huan Nguyen
Huy H. Nguyen
Thang Hoang
Deokjai Choi
Thuc D. Nguyen
Signal Processing and Multimedia Applications
Signal Modelling for the Digital Reconstruction of Gramophone Noise
411(22)
Christoph F. Stallmann
Andries P. Engelbrecht
Beat Analysis of Dimensionality Reduced Perspective Streams from Electrocardiogram Signal Data
433(21)
Avi Bleiweiss
Traffic Signs Detection Using Tracking with Prediction
454(14)
Pavel Yakimov
A Passive Acoustic Technique to Enhance Lung Diseases Diagnostic
468(22)
Fatma Ayari
Ali Alouani
Mekki Ksouri
Vessel Segmentation for Noisy CT Data with Quality Measure Based on Single-Point Contrast-to-Noise Ratio
490(21)
A. Nikonorov
A. Kolsanov
M. Petrov
Y. Yuzifovich
E. Prilepin
S. Chaplygin
P. Zelter
K. Bychenkov
Wireless Information Networks and Systems
Scheduling Strategies to Improve Reliability and Fairness for Priority Based Smart Rural Contention Based Applications Over Low-Cost Wireless Mesh Backbone Networks
511(22)
Sajid M. Sheikh
Riaan Wolhuter
Herman A. Engelbrecht
Author Index 533