Atjaunināt sīkdatņu piekrišanu

e-Business and Telecommunications: International Conference, ICETE 2008, Porto, Portugal, July 26-29, 2008, Revised Selected Papers 2009 ed. [Mīkstie vāki]

Edited by , Edited by
  • Formāts: Paperback / softback, 482 pages, height x width: 235x155 mm, weight: 765 g, XVIII, 482 p., 1 Paperback / softback
  • Sērija : Communications in Computer and Information Science 48
  • Izdošanas datums: 28-Oct-2009
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642051960
  • ISBN-13: 9783642051968
  • Mīkstie vāki
  • Cena: 91,53 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 107,69 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 482 pages, height x width: 235x155 mm, weight: 765 g, XVIII, 482 p., 1 Paperback / softback
  • Sērija : Communications in Computer and Information Science 48
  • Izdošanas datums: 28-Oct-2009
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642051960
  • ISBN-13: 9783642051968
th This book contains the best papers of the 5 International Conference on e-Business and Telecommunications (ICETE), which was held in July 2008, in Porto, Portugal. This conference reflects a continuing effort to increase the dissemination of recent research results among professionals who work in the areas of e-business and te- communications. ICETE is a joint international conference integrating four major areas of knowledge that are divided into four corresponding conferences: ICE-B (- ternational Conf. on e-Business), SECRYPT (International Conf. on Security and Cryptography), SIGMAP (Int’l Conf. on Signal Processing and Multimedia) and WINSYS (International Conf. on Wireless Information Systems). The program of this joint conference included several outstanding keynote lectures presented by internationally renowned distinguished researchers who are experts in the various ICETE areas. Their keynote speeches have contributed to heightening the overall quality of the program and significance of the theme of the conference. The conference topic areas define a broad spectrum in the key areas of e-business and telecommunications. This wide-view reporting made ICETE appealing to a global au- ence of engineers, scientists, business practitioners and policy experts. The papers - cepted and presented at the conference demonstrated a number of new and innovative solutions for e-business and telecommunication networks and systems, showing that the technical problems in these closely related fields are challenging and worthwhile - proaching an interdisciplinary perspective such as that promoted by ICETE.
Invited Speakers.- e-Business Innovation: The Next Decade.- Development
of the Next Generation CDMA Technology and Lessons We Learnt from the Past.-
I ICE-B.- Method for Classification of Unstructured Data in Telecommunication
Services.- Possible Determinants Affecting the Use of Mobile Tourism
Services.- Towards a Version-Based Approach to Deal with Business Process
Evolution.- Comparing Consumer Resistance to Mobile Banking in Finland and
Portugal.- NPTool: Towards Scalability and Reliability of Business Process
Management.- In Search of Search Engine Marketing Strategy Amongst SMEs in
Ireland.- II SECRYPT.- Integrating Anomaly-Based Approach into Bayesian
Network Classifiers.- Aggregation and Thresholding Schemes for Anomaly-Based
Approaches.- A Memory Efficient Network Encryption Scheme.- Analyzing the
Effectiveness of the Self-organized Public-Key Management System on MANETs
under the Lack of Cooperation and the Impersonation Attacks.- Achieving Fast
Self Healing in Wireless Sensor Networks Using Multi-generation Deployment
Schemes.- Reducing Memory Requirements for Combinatorial Attacks on NTRU via
Multiple Birthdays.- On the Design of Buyer-Seller Watermarking Protocols
without a Watermark Authority.- RKRD: Runtime Kernel Rootkit Detection.- A
New Narrow-Block Mode of Operation for Disk Encryption with Error
Propagation.- Security Requirements Management in Software Product Line
Engineering.- III SIGMAP.- On the Suitability of Suffix Arrays for Lempel-Ziv
Data Compression.- Iteratively Detected MIMO-OFDM Twisted-Pair Transmission
Schemes.- Whales Localization Using a Large Hydrophone Array: Performance
Relative to Cramer-Rao Bounds and Confidence Regions.- Automatic Recognition
of Isolated Vowels Using F0-Normalized Harmonic Features.- High-Speed
ConfigurableVLSI Architecture of a General Purpose Lifting-Based Discrete
Wavelet Processor.- Face Detection Using Discrete Gabor Jets and a
Probabilistic Model of Colored Image Patches.- Geometric Distortion Resilient
Watermarking Based on a Single Robust Feature for Still Images.- Optimized
Two-Party Video Chat with Restored Eye Contact Using Graphics Hardware.- A
New IMS Based Inter-working Solution.- Quality Evaluation of Reverberation in
Audioband Speech Signals.- IV WINSYS.- Conservative Transmit Power Control
Mechanism for 802.11 Mesh.- Multiple Mobile Sinks Deployment for Energy
Efficiency in Large Scale Wireless Sensor Networks.- Using Vegetation
Barriers to Improving Wireless Network Isolation and Security.- Throughput
Maximization for Multiband-OFDM Ultra Wideband Systems with Adaptive Frame
Length Control.- Evaluation of Multicast Scheduling and Clustering Schemes
with Packet-Level Macro Diversity in High-Speed Cellular Networks.- The
Service Distribution Protocol for MANETs - Criteria and Performance Analysis.