Logo - springer
Slogan - springer

Computer Science - Communication Networks | E-business and Telecommunications - 4th International Conference, ICETE 2007, Barcelona, Spain,

E-business and Telecommunications

4th International Conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected Papers

Filipe, Joaquim, Obaidat, Mohammad S. (Eds.)

2009, XVII, 398 p.

Available Formats:
eBook
Information

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.

 
$89.99

(net) price for USA

ISBN 978-3-540-88653-2

digitally watermarked, no DRM

Included Format: PDF

download immediately after purchase


learn more about Springer eBooks

add to marked items

Softcover
Information

Softcover (also known as softback) version.

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.

 
$119.00

(net) price for USA

ISBN 978-3-540-88652-5

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days


add to marked items

This book constitutes the best papers of the 4th International Conference on E-business and Telecommunication Networks, ICETE 2007, held in Barcelona, Spain, during July 28-31, 2007.

The 26 revised full papers presented together with 3 invited papers were carefully reviewed and selected from 418 submissions. The papers are organized in four parts according to their conferences: ICE-B, SECRYPT, SIGMAP and WINSYS.

Content Level » Research

Keywords » H.264 - Internet - algorithms - bidding - biometrics - complexity - data mining - e-commerce - e-government - e-shop - hash table - micropayment - mobile service provisioning - pragmatic computing - utility computing

Related subjects » Business Information Systems - Communication Networks - Information Systems and Applications - Security and Cryptology

Table of contents 

Invited Speakers.- Pragmatic Computing – A Semiotic Perspective to Web Services.- Utility Computing: Reality and Beyond.- A Novel Grid-Based Micropayment System for Heterogeneous Multi-party Accounting.- I: ICE-B.- Bidding Agents That Perpetrate Auction Fraud.- A Platform for Mobile Service Provisioning Based on SOA-Integration.- A Hybrid Data Mining Approach for Credit Card Usage Behavior Analysis.- Critical Success Factors of Internet Shopping: The Case of Japan.- An Adaptive Knowledge-Based Approach for Detecting Fraud across Different e-Government Domains.- II: SECRYPT.- Timing to Block Scanning Malwares by Using Combinatorics Proliferation Model.- Securing Biometric Templates Where Similarity Is Measured with Set Intersection.- Score Equalization in SVM Multimodal Fusion for Person Recognition.- Remote Algorithmic Complexity Attacks against Randomized Hash Tables.- Securing Real-Time Sessions in an IMS-Based Architecture.- IPSec Database Query Acceleration.- Detection of Spoofed MAC Addresses in 802.11 Wireless Networks.- K2 Stream Cipher.- Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols.- Reliable Intersection Computation within Malicious Environments.- A Security Hardening Language Based on Aspect-Orientation.- III: SIGMAP.- Facial Expression Synthesis and Analysis.- Multi-sequence H.264/AVC Rate Control Based on the Linear Model.- Non Parametric Stochastic Expectation Maximization for Data Clustering.- Mapping Phonetic Features for Voice-Driven Sound Synthesis.- The MiSPOT System: Personalized Publicity and Marketing over Interactive Digital TV.- Knowledge Engineering Aspects of Affective Bi-Modal Educational Applications.- IV: WINSYS.- Design of a Password-Based EAP Method.- Bit and Power Allocation Strategies for OFDM Systems over Time-Varying Channels.- Mobile Applications to a Pervasive World.- Multi-service Networks: A New Approach to End-to-End Topology Management.

Popular Content within this publication 

 

Articles

Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Computer Communication Networks.