Atjaunināt sīkdatņu piekrišanu

E-grāmata: e-Business and Telecommunications: International Conference, ICETE 2008, Porto, Portugal, July 26-29, 2008, Revised Selected Papers

Edited by , Edited by
  • Formāts - PDF+DRM
  • Cena: 106,47 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

th This book contains the best papers of the 5 International Conference on e-Business and Telecommunications (ICETE), which was held in July 2008, in Porto, Portugal. This conference reflects a continuing effort to increase the dissemination of recent research results among professionals who work in the areas of e-business and te- communications. ICETE is a joint international conference integrating four major areas of knowledge that are divided into four corresponding conferences: ICE-B (- ternational Conf. on e-Business), SECRYPT (International Conf. on Security and Cryptography), SIGMAP (Int’l Conf. on Signal Processing and Multimedia) and WINSYS (International Conf. on Wireless Information Systems). The program of this joint conference included several outstanding keynote lectures presented by internationally renowned distinguished researchers who are experts in the various ICETE areas. Their keynote speeches have contributed to heightening the overall quality of the program and significance of the theme of the conference. The conference topic areas define a broad spectrum in the key areas of e-business and telecommunications. This wide-view reporting made ICETE appealing to a global au- ence of engineers, scientists, business practitioners and policy experts. The papers - cepted and presented at the conference demonstrated a number of new and innovative solutions for e-business and telecommunication networks and systems, showing that the technical problems in these closely related fields are challenging and worthwhile - proaching an interdisciplinary perspective such as that promoted by ICETE.
Invited Speakers.- e-Business Innovation: The Next Decade.- Development
of the Next Generation CDMA Technology and Lessons We Learnt from the Past.-
I ICE-B.- Method for Classification of Unstructured Data in Telecommunication
Services.- Possible Determinants Affecting the Use of Mobile Tourism
Services.- Towards a Version-Based Approach to Deal with Business Process
Evolution.- Comparing Consumer Resistance to Mobile Banking in Finland and
Portugal.- NPTool: Towards Scalability and Reliability of Business Process
Management.- In Search of Search Engine Marketing Strategy Amongst SMEs in
Ireland.- II SECRYPT.- Integrating Anomaly-Based Approach into Bayesian
Network Classifiers.- Aggregation and Thresholding Schemes for Anomaly-Based
Approaches.- A Memory Efficient Network Encryption Scheme.- Analyzing the
Effectiveness of the Self-organized Public-Key Management System on MANETs
under the Lack of Cooperation and the Impersonation Attacks.- Achieving Fast
Self Healing in Wireless Sensor Networks Using Multi-generation Deployment
Schemes.- Reducing Memory Requirements for Combinatorial Attacks on NTRU via
Multiple Birthdays.- On the Design of Buyer-Seller Watermarking Protocols
without a Watermark Authority.- RKRD: Runtime Kernel Rootkit Detection.- A
New Narrow-Block Mode of Operation for Disk Encryption with Error
Propagation.- Security Requirements Management in Software Product Line
Engineering.- III SIGMAP.- On the Suitability of Suffix Arrays for Lempel-Ziv
Data Compression.- Iteratively Detected MIMO-OFDM Twisted-Pair Transmission
Schemes.- Whales Localization Using a Large Hydrophone Array: Performance
Relative to Cramer-Rao Bounds and Confidence Regions.- Automatic Recognition
of Isolated Vowels Using F0-Normalized Harmonic Features.- High-Speed
ConfigurableVLSI Architecture of a General Purpose Lifting-Based Discrete
Wavelet Processor.- Face Detection Using Discrete Gabor Jets and a
Probabilistic Model of Colored Image Patches.- Geometric Distortion Resilient
Watermarking Based on a Single Robust Feature for Still Images.- Optimized
Two-Party Video Chat with Restored Eye Contact Using Graphics Hardware.- A
New IMS Based Inter-working Solution.- Quality Evaluation of Reverberation in
Audioband Speech Signals.- IV WINSYS.- Conservative Transmit Power Control
Mechanism for 802.11 Mesh.- Multiple Mobile Sinks Deployment for Energy
Efficiency in Large Scale Wireless Sensor Networks.- Using Vegetation
Barriers to Improving Wireless Network Isolation and Security.- Throughput
Maximization for Multiband-OFDM Ultra Wideband Systems with Adaptive Frame
Length Control.- Evaluation of Multicast Scheduling and Clustering Schemes
with Packet-Level Macro Diversity in High-Speed Cellular Networks.- The
Service Distribution Protocol for MANETs - Criteria and Performance Analysis.