E-business and Telecommunications [electronic resource] : 4th International Conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected Papers / edited by Joaquim Filipe, Mohammad S. Obaidat.

Contributor(s): Filipe, Joaquim [editor.] | Obaidat, Mohammad S [editor.] | SpringerLink (Online service)Material type: TextTextSeries: Communications in Computer and Information Science ; 23Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2009Description: XVII, 398 p. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783540886532Subject(s): Computer science | Computer communication systems | Computer security | Data structures (Computer science) | Data encryption (Computer science) | Application software | E-commerce | Computer Science | Computer Communication Networks | e-Commerce/e-business | Systems and Data Security | Data Encryption | Computer Appl. in Administrative Data Processing | Data Structures, Cryptology and Information TheoryAdditional physical formats: Printed edition:: No titleDDC classification: 004.6 LOC classification: TK5105.5-5105.9Online resources: Click here to access online
Contents:
Invited Speakers -- Pragmatic Computing – A Semiotic Perspective to Web Services -- Utility Computing: Reality and Beyond -- A Novel Grid-Based Micropayment System for Heterogeneous Multi-party Accounting -- I: ICE-B -- Bidding Agents That Perpetrate Auction Fraud -- A Platform for Mobile Service Provisioning Based on SOA-Integration -- A Hybrid Data Mining Approach for Credit Card Usage Behavior Analysis -- Critical Success Factors of Internet Shopping: The Case of Japan -- An Adaptive Knowledge-Based Approach for Detecting Fraud across Different e-Government Domains -- II: SECRYPT -- Timing to Block Scanning Malwares by Using Combinatorics Proliferation Model -- Securing Biometric Templates Where Similarity Is Measured with Set Intersection -- Score Equalization in SVM Multimodal Fusion for Person Recognition -- Remote Algorithmic Complexity Attacks against Randomized Hash Tables -- Securing Real-Time Sessions in an IMS-Based Architecture -- IPSec Database Query Acceleration -- Detection of Spoofed MAC Addresses in 802.11 Wireless Networks -- K2 Stream Cipher -- Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols -- Reliable Intersection Computation within Malicious Environments -- A Security Hardening Language Based on Aspect-Orientation -- III: SIGMAP -- Facial Expression Synthesis and Analysis -- Multi-sequence H.264/AVC Rate Control Based on the Linear Model -- Non Parametric Stochastic Expectation Maximization for Data Clustering -- Mapping Phonetic Features for Voice-Driven Sound Synthesis -- The MiSPOT System: Personalized Publicity and Marketing over Interactive Digital TV -- Knowledge Engineering Aspects of Affective Bi-Modal Educational Applications -- IV: WINSYS -- Design of a Password-Based EAP Method -- Bit and Power Allocation Strategies for OFDM Systems over Time-Varying Channels -- Mobile Applications to a Pervasive World -- Multi-service Networks: A New Approach to End-to-End Topology Management.
In: Springer eBooksSummary: This book constitutes the best papers of the 4th International Conference on E-business and Telecommunication Networks, ICETE 2007, held in Barcelona, Spain, during July 28-31, 2007. The 26 revised full papers presented together with 3 invited papers were carefully reviewed and selected from 418 submissions. The papers are organized in four parts according to their conferences: ICE-B, SECRYPT, SIGMAP and WINSYS.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Invited Speakers -- Pragmatic Computing – A Semiotic Perspective to Web Services -- Utility Computing: Reality and Beyond -- A Novel Grid-Based Micropayment System for Heterogeneous Multi-party Accounting -- I: ICE-B -- Bidding Agents That Perpetrate Auction Fraud -- A Platform for Mobile Service Provisioning Based on SOA-Integration -- A Hybrid Data Mining Approach for Credit Card Usage Behavior Analysis -- Critical Success Factors of Internet Shopping: The Case of Japan -- An Adaptive Knowledge-Based Approach for Detecting Fraud across Different e-Government Domains -- II: SECRYPT -- Timing to Block Scanning Malwares by Using Combinatorics Proliferation Model -- Securing Biometric Templates Where Similarity Is Measured with Set Intersection -- Score Equalization in SVM Multimodal Fusion for Person Recognition -- Remote Algorithmic Complexity Attacks against Randomized Hash Tables -- Securing Real-Time Sessions in an IMS-Based Architecture -- IPSec Database Query Acceleration -- Detection of Spoofed MAC Addresses in 802.11 Wireless Networks -- K2 Stream Cipher -- Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols -- Reliable Intersection Computation within Malicious Environments -- A Security Hardening Language Based on Aspect-Orientation -- III: SIGMAP -- Facial Expression Synthesis and Analysis -- Multi-sequence H.264/AVC Rate Control Based on the Linear Model -- Non Parametric Stochastic Expectation Maximization for Data Clustering -- Mapping Phonetic Features for Voice-Driven Sound Synthesis -- The MiSPOT System: Personalized Publicity and Marketing over Interactive Digital TV -- Knowledge Engineering Aspects of Affective Bi-Modal Educational Applications -- IV: WINSYS -- Design of a Password-Based EAP Method -- Bit and Power Allocation Strategies for OFDM Systems over Time-Varying Channels -- Mobile Applications to a Pervasive World -- Multi-service Networks: A New Approach to End-to-End Topology Management.

This book constitutes the best papers of the 4th International Conference on E-business and Telecommunication Networks, ICETE 2007, held in Barcelona, Spain, during July 28-31, 2007. The 26 revised full papers presented together with 3 invited papers were carefully reviewed and selected from 418 submissions. The papers are organized in four parts according to their conferences: ICE-B, SECRYPT, SIGMAP and WINSYS.

There are no comments on this title.

to post a comment.

Powered by Koha