Atjaunināt sīkdatņu piekrišanu

e-Business and Telecommunications: 7th International Joint Conference, ICETE, Athens, Greece, July 26-28, 2010, Revised Selected Papers 2012 [Mīkstie vāki]

  • Formāts: Paperback / softback, 448 pages, height x width: 235x155 mm, weight: 703 g, XVI, 448 p., 1 Paperback / softback
  • Sērija : Communications in Computer and Information Science 222
  • Izdošanas datums: 16-Jan-2012
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642252052
  • ISBN-13: 9783642252051
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 448 pages, height x width: 235x155 mm, weight: 703 g, XVI, 448 p., 1 Paperback / softback
  • Sērija : Communications in Computer and Information Science 222
  • Izdošanas datums: 16-Jan-2012
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642252052
  • ISBN-13: 9783642252051
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Joint Conference on e-Business and Telecommunications, ICETE 2010, held in Athens, Greece, in July 2010. The 28 revised full papers presented together with 1 invited paper in this volume were carefully reviewed and selected from 422 initial submissions. They have passed two rounds of selection and improvement. According to the topics of the particular conference the papers are organized in thematical parts on data communication networking (DCNET), e-business (ICE-B), optical communication systems (OPTICS), security and cryptography (SECRYPT), signal processing and multimedia applications (SIGMAP), wireless information networks and systems (WINSYS).
Invited Paper
e-Business Challenges and Directions: Important Themes from the First ICE-B Workshop
3(36)
David Marca
Rebecca Bulander
Cornelia Kruslin
Boris Shishkov
Marten van Sinderen
Part I Data Communication Networking (DCNET)
Static Analysis of Routing and Firewall Policy Configurations
39(15)
Miroslav Sveda
Ondrej Rysavy
Gayan de Silva
Petr Matousek
Jaroslav Rob
Threshold Based Multipath Routing Algorithm in Mobile Adhoc and Sensor Networks
54(17)
Bayrem Triki
Slim Rekhis
Noureddine Boudriga
The Price of Security: A Detailed Comparison of the TLS Handshake Performance on Embedded Devices When Using Elliptic Curve Cryptography and RSA
71(13)
Manuel Koschuch
Matthias Hudler
Michael Kruger
Mobile Applications Middleware for File Swapping
84(13)
Mario A. Gomez-Rodriguez
Victor J. Sosa-Sosa
Ivan Lopez-Arevalo
Part II e-Business (ICE-B)
Optimization of a Handwriting Recognition Algorithm for a Mobile Enterprise Health Information System on the Basis of Real-Life Usability Research
97(15)
Andreas Holzinger
Martin Schlogl
Bernhard Peischl
Matjaz Debevc
A Social Location-Based Emergency Service to Eliminate the Bystander Effect
112(21)
Andreas Geyer-Schulz
Michael Ovelgonne
Andreas C. Sonnenbichler
Part III Optical Communication Systems (OPTICS)
Converged Optical Networks for Multimedia Distribution and Data Services in Hospitality Environments
133(14)
Inigo Artundo
David Garcia-Roger
Beatriz Ortega
Part IV Security and Cryptography (SECRYPT)
Differential Resynchronization Attacks on Reduced Round SNOW 3G
147(11)
Alex Biryukov
Deike Priemuth-Schmid
Bin Zhang
Modelling Uncertain and Time-Dependent Security Labels in MLS Systems
158(14)
John A. Clark
Juan E. Tapiador
John McDermid
Pau-Chen Cheng
Dakshi Agrawal
Natalie Ivanic
Dave Slogget
Sum Aggregation in Sensor Networks While Preserving Confidentiality and Integrity
172(16)
Keith B. Frikken
Yihua Zhang
Stream Cipher-Based Hash Function and Its Security
188(15)
Yuto Nakano
Jun Kurihara
Shinsaku Kiyomoto
Toshiaki Tanaka
Flexible Anonymous Subscription Schemes
203(17)
Maria Isabel Gonzalez Vasco
Somayeh Heidarvand
Jorge L. Villar
Proxiable Designated Verifier Signature
220(13)
Mebae Ushida
Yutaka Kawai
Kazuki Yoneyama
Kazuo Ohta
Adaptive and Composable Non-interactive String-Commitment Protocols
233(10)
Huafei Zhu
Tadashi Araragi
Takashi Nishide
Kouichi Sakurai
Dynamic Adaptation of Security and QoS in Energy-Harvesting Sensors Nodes
243(16)
Antonio Vincenzo Taddeo
Marcello Mura
Alberto Ferrante
Threshold Discernible Ring Signatures
259(15)
Swarun Kumar
Shivank Agrawal
Ramarathnam Venkatesan
Satyanarayana V. Lokam
C. Pandu Rangan
Universally Composable Non-committing Encryptions in the Presence of Adaptive Adversaries
274(15)
Huafei Zhu
Tadashi Araragi
Takashi Nishide
Kouichi Sakurai
Selectively Traceable Anonymous and Unlinkable Token-Based Transactions
289(15)
Daniel Slamanig
Stefan Rass
An Encryption Scheme for a Secure Policy Updating
304(15)
Luan Ibraimi
Muhammad Asim
Milan Petkovic
Machine Learning for the Detection of Spam in Twitter Networks
319(18)
Alex Hai Wang
Part V Signal Processing and Multimedia Applications (SIGMAP)
Deformable Multi-object Tracking Using Full Pixel Matching of Image
337(13)
Hisato Aota
Kazuhiro Ota
Yuichi Yaguchi
Ryuichi Oka
A Multi-sensor System for Monitoring the Performance of Elite Swimmers
350(13)
Tanya Le Sage
Axel Bindel
Paul Conway
Laura Justham
Sian Slawson
James Webster
Andrew West
Maximum a Posteriori Decoding of Arithmetic Codes in Joint Source-Channel Coding
363(15)
Trevor Spiteri
Victor Buttigieg
An Ensemble Approach to Improve Microaneurysm Candidate Extraction
378(17)
Balint Antal
Istvan Lazar
Andras Hajdu
Part VI Wireless Information Networks and Systems (WINSYS)
Modulation-Mode Assignment for SVD-Aided and BICM-Assisted Downlink Multiuser MIMO Transmission Schemes
395(15)
Andreas Ahrens
Cesar Benavente-Peces
Evaluation of the Performance of Polarization Diversity Estimated from Measurements at One Polarization
410(14)
Inigo Cuinas
Manuel Garcia Sanchez
Using the OTS/CafeOBJ Method to Formally Specify and Verify the Open Mobile Alliance License Choice Algorithm
424(15)
Nikolaos Triantafyllou
Iakovos Ouranos
Petros Stefaneas
Panayiotis Frangos
Extended Field Performance Evaluation of a Gbps FSO Link
439(8)
J.A.R. Pacheco de Carvalho
N. Marques
H. Veiga
C.F. Ribeiro Pacheco
A.D. Reis
Author Index 447