E-business and telecommunications [electronic resource] : International Joint Conference, ICETE 2011, Seville, Spain, July 18-21, 2011, revised selected papers / Mohammad S. Obaidat, José L. Sevillano, Joaquim Filipe (eds.)
This book constitutes the refereed proceedings of the 8th International Joint Conference on E-Business and Telecommunications, ICETE 2011, held in Seville, Spain in July 2011. The 118 revised full papers presented were carefully reviewed and selected from 409 submissions. The topics covered are data...
Saved in:
Online Access: |
Full Text (via Springer) |
---|---|
Corporate Author: | |
Other Authors: | , , |
Other title: | ICETE 2011. |
Format: | Electronic Conference Proceeding eBook |
Language: | English |
Published: |
Berlin ; New York :
Springer,
©2012.
|
Series: | Communications in computer and information science ;
314. |
Subjects: |
MARC
LEADER | 00000cam a2200000xa 4500 | ||
---|---|---|---|
001 | b7276168 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 121228s2012 gw a ob 101 0 eng d | ||
005 | 20240418144429.2 | ||
020 | |a 9783642357558 |q (electronic bk.) | ||
020 | |a 3642357555 |q (electronic bk.) | ||
020 | |z 9783642357541 | ||
035 | |a (OCoLC)spr822997138 | ||
035 | |a (OCoLC)822997138 | ||
037 | |a spr10.1007/978-3-642-35755-8 | ||
040 | |a GW5XE |b eng |e pn |c GW5XE |d GZM |d YDXCP |d COO |d ZMC |d UKMGB |d NUI |d OCLCF |d BEDGE |d OCLCO |d OCLCA |d OCLCQ |d OCL |d OCLCO |d OCLCQ | ||
049 | |a GWRE | ||
050 | 4 | |a TK5105.5 |b .I58 2011 | |
111 | 2 | |a ICETE (Conference) |d (2011 : |c Seville, Spain) | |
245 | 1 | 0 | |a E-business and telecommunications |h [electronic resource] : |b International Joint Conference, ICETE 2011, Seville, Spain, July 18-21, 2011, revised selected papers / |c Mohammad S. Obaidat, José L. Sevillano, Joaquim Filipe (eds.) |
246 | 3 | |a ICETE 2011. | |
260 | |a Berlin ; |a New York : |b Springer, |c ©2012. | ||
300 | |a 1 online resource (xvi, 536 pages) : |b illustrations. | ||
336 | |a text |b txt |2 rdacontent. | ||
337 | |a computer |b c |2 rdamedia. | ||
338 | |a online resource |b cr |2 rdacarrier. | ||
490 | 1 | |a Communications in computer and information science, |x 1865-0929 ; |v 314. | |
505 | 0 | 0 | |t Invited Speakers -- |t Biometric Privacy Protection: Guidelines and Technologies -- |t Face Recognition in Uncontrolled Environments, Experiments in an Airport -- |t Paradigms of Distributed Software Systems: Services, Processes and Self-organization -- |g Part I: |t Data Communication Networking --A |t Wildfire Prediction Based on Fuzzy Inference System for Wireless Sensor Networks -- |t Evaluating Super Node Selection and Load Balancing in P2P VoIP Networks Using Stochastic Graph Transformation -- |t Shared Security: How Wireless Sensor Networks Can Benefit from Threshold Cryptography -- |g Part II: |t e-Business -- |t Selection of Information-Intensive Services: A Multi-criteria Decision Model -- |t Territorial Safety Networks -- |t Killer Applications for Fiber to the Home Networks: Market Potential, Time Horizons and User Groups -- |t To Bid or Not To Bid? Investigating Retail-Brand Keyword Performance in Sponsored Search Advertising. |
505 | 8 | 0 | |t Client-Oriented Preferences Model for QoS Aggregation in Service-Based Applications --An |t Answer to "Who Needs a Stylus?" on Handwriting Recognition on Mobile Devices -- |t Application of Metamorphic Testing to a Case Study in Web Services Compositions -- |g Part III: |t Optical Communication Systems -- |t Time Stretching of UWB Radio Signals Using a Photonic Analogue-to-Digital Converter System Based on Wavelength Division Multiplexing -- |g Part IV: |t Security and Cryptography -- |t Spam Filtering through Anomaly Detection -- |t On the Feasibility of Malware Attacks in Smartphone Platforms -- |t Revocation and Tracing Based on Ternary Tree: Towards Optimal Broadcast Encryption Scheme -- |t Accelerating Reduction for Enabling Fast Multiplication over Large Binary Fields --A |t Related-Key Attack against Multiple Encryption Based on Fixed Points -- |t Byte Slicing Grøstl: Improved Intel AES-NI and Vector-Permute Implementations of the SHA-3 Finalist Grøstl. |
505 | 8 | 0 | |t Security and Cryptography -- |t Attack Interference: A Path to Defending Security Protocols -- |t A Framework for Dynamic Optimization of Security and Performances -- |t Broadcast Authentication in a Low Speed Controller Area Network -- |g Part V: |t Signal Processing and Multimedia Applications -- |t Efficiently Managing Multimedia Hierarchical Data with the WINDSURF Library -- |t A Method of Real-Time Non-uniform Speech Stretching -- |t Decoding of LDPC-Based 2D-Barcodes Using a 2D-Hidden-Markov-Model -- |t A Comparative Evaluation of Gaussian Multiscale Aggregation for Hand Biometrics -- |t Touching Character Segmentation Method of Archaic Lanna Script -- |t Small and Large Vocabulary Speech Recognition of MP3 Data under Real-Word Conditions: Experimental Study. |
505 | 8 | 0 | |t Weight Based Fast Mode Decision for H.264/AVC Video Coding Standard -- |t Investigation and Improved Configuration Settings for H.264 CGS/MGS Quality Scalable Coding -- |g Part VI: |t Wireless Information Networks and Systems -- |t Downlink Multiuser MIMO-OFDM Systems -- |t Experience in Deploying a Wireless Sensor Network in a Vineyard -- |t Experimental Detection and Synchronisation Validation for a TR-UWB System Based on the Time Delayed Sampling and Correletion Scheme -- |t Link Adaptation in Ad Hoc Networks Based on Interference Minimization -- |t Unidirectional Traffic Flow to Protect Wireless Sensor Networks against Byzantine Attacks -- |t Successive Interference Cancellation for Multi-user MIMO-OFDM Ad-Hoc Networks: A Performance-Complexity Tradeoff. |
504 | |a Includes bibliographical references and author index. | ||
520 | |a This book constitutes the refereed proceedings of the 8th International Joint Conference on E-Business and Telecommunications, ICETE 2011, held in Seville, Spain in July 2011. The 118 revised full papers presented were carefully reviewed and selected from 409 submissions. The topics covered are data communication networking, e-business, optical communication systems, security and cryptography, signal processing and multimedia applications, and wireless networks and information systems. These are the main knowledge areas that define the six component conferences, namely: DCNET, ICE-B, OPTICS, SECRYPT, SIGMAP, and WINSYS which together form the ICETE joint conference. | ||
650 | 0 | |a Computer networks |v Congresses. |0 http://id.loc.gov/authorities/subjects/sh2008101222. | |
650 | 0 | |a Telecommunication systems |v Congresses. |0 http://id.loc.gov/authorities/subjects/sh2008112722. | |
650 | 0 | |a Electronic commerce |v Congresses. |0 http://id.loc.gov/authorities/subjects/sh2008102590. | |
650 | 0 | |a Business |x Data processing |v Congresses. |0 http://id.loc.gov/authorities/subjects/sh2007102245. | |
650 | 7 | |a Business |x Data processing. |2 fast |0 (OCoLC)fst00842293. | |
650 | 7 | |a Computer networks. |2 fast |0 (OCoLC)fst00872297. | |
650 | 7 | |a Electronic commerce. |2 fast |0 (OCoLC)fst00906906. | |
650 | 7 | |a Telecommunication systems. |2 fast |0 (OCoLC)fst01146038. | |
655 | 7 | |a Conference papers and proceedings. |2 fast |0 (OCoLC)fst01423772. | |
700 | 1 | |a Obaidat, Mohammad S. |q (Mohammad Salameh), |d 1952- |0 http://id.loc.gov/authorities/names/no00064332 |1 http://isni.org/isni/0000000108920117. | |
700 | 1 | |a Sevillano, Jose Luis. |0 http://id.loc.gov/authorities/names/no2011197945. | |
700 | 1 | |a Filipe, Joaquim. |0 http://id.loc.gov/authorities/names/n00002995 |1 http://isni.org/isni/0000000115997825. | |
830 | 0 | |a Communications in computer and information science ; |v 314. |0 http://id.loc.gov/authorities/names/no2008037797. | |
856 | 4 | 0 | |u https://colorado.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-642-35755-8 |z Full Text (via Springer) |
907 | |a .b72761684 |b 03-17-21 |c 01-30-13 | ||
998 | |a web |b 05-01-17 |c g |d b |e - |f eng |g gw |h 0 |i 1 | ||
907 | |a .b72761684 |b 07-02-19 |c 01-30-13 | ||
944 | |a MARS - RDA ENRICHED | ||
907 | |a .b72761684 |b 07-06-17 |c 01-30-13 | ||
907 | |a .b72761684 |b 05-23-17 |c 01-30-13 | ||
915 | |a I | ||
956 | |a Springer e-books | ||
956 | |b Springer Nature - Springer Computer Science eBooks 2012 English International | ||
956 | |b Springer Nature - Springer Computer Science eBooks 2012 English International | ||
999 | f | f | |i f8609b26-6c17-5198-80ec-c8519fcea2df |s 34372c99-6bad-5625-be4e-840aae2d11fd |
952 | f | f | |p Can circulate |a University of Colorado Boulder |b Online |c Online |d Online |e TK5105.5 .I58 2011 |h Library of Congress classification |i Ebooks, Prospector |n 1 |