Atjaunināt sīkdatņu piekrišanu

E-grāmata: e-Business and Telecommunications: 6th International Joint Conference, ICETE 2009, Milan, Italy, July 7-10, 2009. Revised Selected Papers

Edited by , Edited by
  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the refereed proceedings of the 6th International Joint Conference on e-Business and Telecommunications, ICETE 2009, held in Milan, Italy, in July 2009. The 34 revised full papers presented together with 4 invited papers in this volume were carefully reviewed and selected from 300 submissions. They have passed two rounds of selection and improvement. The papers are organized in topical sections on e-business; security and cryptography; signal processing and multimedia applications; wireless information networks and systems.
Invited Papers
Stochastic Modeling and Statistical Inferences of Adaptive Antennas in Wireless Communications
3(17)
Blagovest Shishkov
Protecting Information Privacy in the Electronic Society
20(17)
Sabrina De Capitani di Vimercati
Sara Foresti
Pierangela Samarati
The Three Fundamental e-Business Models
37(16)
David A. Marca
Web 2.0: From a Buzzword to Mainstream Web Reality
53(18)
Gottfried Vossen
Part I e-Business
Exploring Price Elasticity to Optimize Posted Prices in e-Commerce
71(11)
Burkhardt Funk
Designing Digital Marketplaces for Competitiveness of SMEs in Developing Countries
82(12)
Valentina Ndou
Pasquale Del Vecchio
Laura Schina
Strategic Planning, Environmental Dynamicity and Their Impact on Business Model Design: The Case of a Mobile Middleware Technology Provider
94(16)
Antonio Ghezzi
Andrea Rangone
Raffaello Balocco
Collaboration Strategies in Turbulent Periods: Effects of Perception of Relational Risk-on Enterprise Alliances
110(16)
Marco Remondino
Marco Pironti
Paola Pisano
A Classification Schema for Mobile-Internet 2.0 Applications
126(13)
Marcelo Cortimiglia
Filippo Renga
Andrea Rangone
Plug and Play Transport Chain Management: Agent-Based Support to the Planning and Execution of Transports
139(20)
Paul Davidsson
Johan Holmgren
Jan A. Persson
Andreas Jacobsson
Part II Security and Cryptography
Exploiting Crosstalk Effects in FPGAs for Generating True Random Numbers
159(15)
Octavian Cret
Radu Tudoran
Alin Suciu
Tamas Gyorfi
Offline Peer-to-Peer Broadcast with Anonymity
174(12)
Shinsaku Kiyomoto
Kazuhide Fukushima
Keith M. Martin
Wireless Authentication and Transaction-Confirmation Token
186(13)
Daniel V. Bailey
John Brainard
Sebastian Rohde
Christof Paar
Optimizations for High-Performance IPsec Execution
199(13)
Michael G. Iatrou
Artemios G. Voyiatzis
Dimitrios N. Serpanos
An Efficient Protocol for Authenticated Group Key Agreement in Heterogeneous Networks
212(12)
Mounita Saha
Dipanwita Roy Chowdhury
Privacy Enhancements for Hardware-Based Security Modules
224(13)
Vijayakrishnan Pasupathinathan
Josef Pieprzyk
Huaxiong Wang
Flexible and Time-Based Anonymous Access Restrictions
237(16)
Kristof Verslype
Bart De Decker
Part III Signal Processing and Multimedia Applications
Robust Numeric Set Watermarking: Numbers Don't Lie
253(13)
Gaurav Gupta
Josef Pieprzyk
Mohan Kankanhalli
Corrupting Noise Estimation Based on Rapid Adaptation and Recursive Smoothing
266(12)
Francois Xavier Nsabimana
Vignesh Subbaraman
Udo Zolzer
Recommender System: A Personalized TV Guide System
278(13)
Paulo Muniz de Avila
Sergio Donizetti Zorzo
An Enhanced Concept of a Digital Radio Incorporating a Multimodal Interface and Searchable Spoken Content
291(16)
Gunther Schatter
Andreas Eiselt
Part IV Wireless Information Networks and Systems
Modulation-Mode Assignment in Iteratively Detected and SVD-Assisted Broadband MIMO Schemes
307(13)
Andreas Ahrens
Cesar Benavente-Peces
Wireless Sensor Resource Usage Optimisation Using Embedded State Predictors
320(12)
David Lowe
Steve Murray
Xiaoying Kong
A Self-configuring Middleware Solution for Context Management
332(14)
Tudor Cioara
Ionut Anghel
Ioan Salomie
Device Whispering: An Approach for Directory-Less WLAN Positioning
346(13)
Karl-Heinz Krempels
Sebastian Patzak
Janno von Stulpnagel
Christoph Terwelp
Author Index 359