Atjaunināt sīkdatņu piekrišanu

E-grāmata: E-business and Telecommunications: 4th International Conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected Papers

Edited by , Edited by
  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book contains the best papers of the 4th International Conference on E-business and Telecommunications (ICETE), which was held during July 2831, 2007 in Barcelona, Spain. The conference reflects a continuing effort to increase the dissemination of recent research results among professionals who work in the areas of e-business and telecommunications. ICETE is a joint international conf- ence integrating four major areas of knowledge that are divided into four cor- sponding conferences: ICE-B (International Conference on e-Business), SECRYPT (International Conference on Security and Cryptography), WINSYS (International Conference on Wireless Information Systems) and SIGMAP (International Conf- ence on Signal Processing and Multimedia). The program of this joint conference included several outstanding keynote lectures presented by internationally renowned distinguished researchers who are experts in the various ICETE areas. Their keynote speeches contributed to the ov- all quality of the program and heightened the significance of the theme of the conference. The conference topic areas define a broad spectrum in the key areas of- business and telecommunications. This wide view has made it appealing to a global audience of engineers, scientists, business practitioners and policy experts. The papers accepted and presented at the conference demonstrated a number of new and innovative solutions for e-business and telecommunication networks and systems, showing that the technical problems in these fields are challenging, related and significant.
Invited Speakers
Pragmatic Computing - A Semiotic Perspective to Web Services
3(13)
Kecheng Liu
Utility Computing: Reality and Beyond
16(14)
Ivan I. Ivanov
A Novel Grid-Based Micropayment System for Heterogeneous Multi-party Accounting
30(27)
Manel Abdelkader Noureddine Boudriga
Mohammad S. Obaidat
Part I: ICE-B
Bidding Agents That Perpetrate Auction Fraud
57(15)
Jarrod Trevathan
Alan McCabe
Wayne Read
A Platform for Mobile Service Provisioning Based on SOA-Integration
72(13)
Michael Decker
Rebecca Bulander
A Hybrid Data Mining Approach for Credit Card Usage Behavior Analysis
85(13)
Chieh-Yuan Tsai
Critical Success Factors of Internet Shopping: The Case of Japan
98(12)
Kanokwan Atchariyachanvanich
Hitoshi Okada
Noboru Sonehara
An Adaptive Knowledge-Based Approach for Detecting Fraud across Different e-Government Domains
110(15)
Panes Alexopoulos
Kostas Kafentzis
Nicholas Athanassiadis
Xanthi Benetou
Tassos Tagaris
Carol Jollie
Panos Georgolios
Part II: SECRYPT
Timing to Block Scanning Malwares by Using Combinatorics Proliferation Model
125(14)
Kazumasa Omote
Takeshi Shimoyama
Satoru Torii
Securing Biometric Templates Where Similarity Is Measured with Set Intersection
139(13)
Daniel Socek
Vladimir Bozovic
Dubravko Culibrk
Score Equalization in SVM Multimodal Fusion for Person Recognition
152(10)
Pascual Ejarque
Javier Hernando
Remote Algorithmic Complexity Attacks against Randomized Hash Tables
162(13)
Noa Bar-Yosef
Avishai Wool
Securing Real-Time Sessions in an IMS-Based Architecture
175(13)
Paolo Cennamo
Antonio Fresa
Maurizio Longo
Fabio Postiglione
Anton Luca Robustelli
Francesco Toro
IPSec Database Query Acceleration
188(13)
Alberto Ferrante
Satish Chandra
Vincenzo Piuri
Detection of Spoofed MAC Addresses in 802.11 Wireless Networks
201(13)
Kai Tao
Jing Li
Srinivas Sampalli
K2 Stream Cipher
214(13)
Shinsaku Kiyomoto
Toshiaki Tanaka
Kouichi Sakurai
Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols
227(12)
K. Chalkias
F. Baldimtsi
D. Hristu-Varsakelis
G. Stephanides
Reliable Intersection Computation within Malicious Environments
239(15)
Stefan Bottcher
Sebastian Obermeier
A Security Hardening Language Based on Aspect-Orientation
254(15)
Azzam Mourad
Marc-Andre Laverdiere
Mourad Debbabi
Part III: SIGMAP
Facial Expression Synthesis and Analysis
269(15)
Hao Wang
Multi-sequence H.264/AVC Rate Control Based on the Linear Model
284(9)
Grzegorz Pastuszak
Andrzej Pietrasiewicz
Non Parametric Stochastic Expectation Maximization for Data Clustering
293(11)
Gilles Bougeniere
Claude Cariou
Kacem Chehdi
Alan Gay
Mapping Phonetic Features for Voice-Driven Sound Synthesis
304(11)
Jordi Janer
Esteban Maestre
The MiSPOT System: Personalized Publicity and Marketing over Interactive Digital TV
315(13)
Martin Lopez-Nores
Jose Juan Pazos-Arias
Yolanda Blanco-Fernandez
Jorge Garcia-Duque
Richardo Tubio-Pardavila
Marta Rey-Lopez
Knowledge Engineering Aspects of Affective Bi-Modal Educational Applications
328(15)
Efthymios Alepis
Maria Virvou
Katerina Kabassi
PART IV: WINSYS
Design of a Password-Based EAP Method
343(13)
Andrea Manganaro
Mingyur Koblensky
Michele Loreti
Bit and Power Allocation Strategies for OFDM Systems over Time-Varying Channels
356(15)
Xiang Gao
Mort Naraghi-Pour
Mobile Applications to a Pervasive World
371(13)
Hiata Anderson de Oliveira Coelho
Ricardo de Oliveira Anido
Multi-service Networks: A New Approach to End-to-End Topology Management
384(13)
Anne-Marie Bosneag
David Cleary
Author Index 397