Logo - springer
Slogan - springer

Computer Science - Communication Networks | e-Business and Telecommunications - International Conference, ICETE 2008, Porto, Portugal, July

e-Business and Telecommunications

International Conference, ICETE 2008, Porto, Portugal, July 26-29, 2008, Revised Selected Papers

Filipe, Joaquim, Obaidat, Mohammad S. (Eds.)

2009, XVIII, 482 p.

Available Formats:
eBook
Information

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.

 
$119.00

(net) price for USA

ISBN 978-3-642-05197-5

digitally watermarked, no DRM

Included Format: PDF

download immediately after purchase


learn more about Springer eBooks

add to marked items

Softcover
Information

Softcover (also known as softback) version.

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.

 
$149.00

(net) price for USA

ISBN 978-3-642-05196-8

free shipping for individuals worldwide

online orders shipping within 2-3 days.


add to marked items

th This book contains the best papers of the 5 International Conference on e-Business and Telecommunications (ICETE), which was held in July 2008, in Porto, Portugal. This conference reflects a continuing effort to increase the dissemination of recent research results among professionals who work in the areas of e-business and te- communications. ICETE is a joint international conference integrating four major areas of knowledge that are divided into four corresponding conferences: ICE-B (- ternational Conf. on e-Business), SECRYPT (International Conf. on Security and Cryptography), SIGMAP (Int’l Conf. on Signal Processing and Multimedia) and WINSYS (International Conf. on Wireless Information Systems). The program of this joint conference included several outstanding keynote lectures presented by internationally renowned distinguished researchers who are experts in the various ICETE areas. Their keynote speeches have contributed to heightening the overall quality of the program and significance of the theme of the conference. The conference topic areas define a broad spectrum in the key areas of e-business and telecommunications. This wide-view reporting made ICETE appealing to a global au- ence of engineers, scientists, business practitioners and policy experts. The papers - cepted and presented at the conference demonstrated a number of new and innovative solutions for e-business and telecommunication networks and systems, showing that the technical problems in these closely related fields are challenging and worthwhile - proaching an interdisciplinary perspective such as that promoted by ICETE.

Content Level » Research

Keywords » E-Business - Wireless - communication - cryptography - information - multimedia - search engine marketing (SEM)

Related subjects » Business Information Systems - Communication Networks - Information Systems and Applications - Security and Cryptology - Theoretical Computer Science

Table of contents 

Invited Speakers.- e-Business Innovation: The Next Decade.- Development of the Next Generation CDMA Technology and Lessons We Learnt from the Past.- I ICE-B.- Method for Classification of Unstructured Data in Telecommunication Services.- Possible Determinants Affecting the Use of Mobile Tourism Services.- Towards a Version-Based Approach to Deal with Business Process Evolution.- Comparing Consumer Resistance to Mobile Banking in Finland and Portugal.- NPTool: Towards Scalability and Reliability of Business Process Management.- In Search of Search Engine Marketing Strategy Amongst SME’s in Ireland.- II SECRYPT.- Integrating Anomaly-Based Approach into Bayesian Network Classifiers.- Aggregation and Thresholding Schemes for Anomaly-Based Approaches.- A Memory Efficient Network Encryption Scheme.- Analyzing the Effectiveness of the Self-organized Public-Key Management System on MANETs under the Lack of Cooperation and the Impersonation Attacks.- Achieving Fast Self Healing in Wireless Sensor Networks Using Multi-generation Deployment Schemes.- Reducing Memory Requirements for Combinatorial Attacks on NTRU via Multiple Birthdays.- On the Design of Buyer-Seller Watermarking Protocols without a Watermark Authority.- RKRD: Runtime Kernel Rootkit Detection.- A New Narrow-Block Mode of Operation for Disk Encryption with Error Propagation.- Security Requirements Management in Software Product Line Engineering.- III SIGMAP.- On the Suitability of Suffix Arrays for Lempel-Ziv Data Compression.- Iteratively Detected MIMO-OFDM Twisted-Pair Transmission Schemes.- Whales Localization Using a Large Hydrophone Array: Performance Relative to Cramer-Rao Bounds and Confidence Regions.- Automatic Recognition of Isolated Vowels Using F0-Normalized Harmonic Features.- High-Speed Configurable VLSI Architecture of a General Purpose Lifting-Based Discrete Wavelet Processor.- Face Detection Using Discrete Gabor Jets and a Probabilistic Model of Colored Image Patches.- Geometric Distortion Resilient Watermarking Based on a Single Robust Feature for Still Images.- Optimized Two-Party Video Chat with Restored Eye Contact Using Graphics Hardware.- A New IMS Based Inter-working Solution.- Quality Evaluation of Reverberation in Audioband Speech Signals.- IV WINSYS.- Conservative Transmit Power Control Mechanism for 802.11 Mesh.- Multiple Mobile Sinks Deployment for Energy Efficiency in Large Scale Wireless Sensor Networks.- Using Vegetation Barriers to Improving Wireless Network Isolation and Security.- Throughput Maximization for Multiband-OFDM Ultra Wideband Systems with Adaptive Frame Length Control.- Evaluation of Multicast Scheduling and Clustering Schemes with Packet-Level Macro Diversity in High-Speed Cellular Networks.- The Service Distribution Protocol for MANETs - Criteria and Performance Analysis.

Popular Content within this publication 

 

Articles

Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Computer Communication Networks.