Muutke küpsiste eelistusi

E-Business and Telecommunications: International Joint Conference, ICETE 2013, Reykjavik, Iceland, July 29-31, 2013, Revised Selected Papers 2014 ed. [Pehme köide]

Edited by , Edited by
  • Formaat: Paperback / softback, 419 pages, kõrgus x laius: 235x155 mm, kaal: 6613 g, 189 Illustrations, black and white; XVII, 419 p. 189 illus., 1 Paperback / softback
  • Sari: Communications in Computer and Information Science 456
  • Ilmumisaeg: 13-Oct-2014
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3662447878
  • ISBN-13: 9783662447871
  • Pehme köide
  • Hind: 48,70 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 57,29 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 419 pages, kõrgus x laius: 235x155 mm, kaal: 6613 g, 189 Illustrations, black and white; XVII, 419 p. 189 illus., 1 Paperback / softback
  • Sari: Communications in Computer and Information Science 456
  • Ilmumisaeg: 13-Oct-2014
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3662447878
  • ISBN-13: 9783662447871
This book constitutes the refereed proceedings of the 10th International Joint Conference on E-Business and Telecommunications, ICETE 2013, held in Reykjavik, Iceland, in July 2013. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding conferences: International Conference on Data Communication Networking, DCNET; International Conference on E-Business, ICE-B; International Conference on Optical Communication Systems, OPTICS; International Conference on Security and Cryptography, SECRYPT; International Conference on Wireless Information Systems, WINSYS; and International Conference on Signal Processing and Multimedia, SIGMAP. The 24 full papers presented were carefully reviewed and selected from 341 submissions. The papers cover the following key areas of e-business and telecommunications: data communication networking, e-business, optical communication systems, security and cryptography, signal processing and multimedia applications, wireless information networks and systems.
Invited Speakers
QoS and QoE in the Next Generation Networks and Wireless Networks
3(14)
Pascal Lorenz
Practical Instantaneous Frequency Analysis Experiments
17(20)
Roman Korkikian
David Naccache
Guilherme Ozari de Almeida
Rodrigo Portella do Canto
Data Communication Networking
The Impact of Initial Delays in OSPF Routing
37(21)
Anne Bouillard
Claude Jard
Aurore Junier
Managing Virtual Entities in MMOGs: A Voronoi-Based Approach
58(16)
Laura Ricci
Luca Genovali
Barbara Guidi
Host Identity Detection in IPv6 Networks
74(19)
Libor Polcak
Martin Holkovic
Petr Matousek
e-Business
The Use of Twitter by Local Government in Northern Ireland
93(14)
Tiago Picao
Fiona McMahon
Valerie Purchase
Maurice Mulvenna
Multi-channel Attribution Modeling on User Journeys
107(19)
Florian Nottorf
When Loyalty Points Become Virtual Currencies: Transforming Business Models for Online Platforms
126(16)
Uschi Buchinger
Heritiana Ranaivoson
Pieter Ballon
Digital Cities Web Marketing Strategies in Italy: The Path Towards Citizen Empowerment
142(18)
Elena Bellio
Luca Buccoliero
Estimating the Effort in the Development of Distance Learning Paths
160(23)
Milena Casagranda
Luigi Colazzo
Andrea Molinari
Optical Communication Systems
Modal and Chromatic Dispersion Analysis Within a Measured 1,4 km MIMO Multimode Channel
183(14)
Andreas Ahrens
Steffen Schroder
Steffen Lochmann
Long-Reach PONs Employing Directly Modulated Lasers for Provisioning of OFDM-UWB Radio Signals in Sparse Geographical Areas
197(12)
Tiago M.F. Alves
Adolfo V.T. Cartaxo
Security and Cryptography
InCC: Evading Interception and Inspection by Mimicking Traffic in Network Flows
209(17)
Luis Campo Giralte
Isaac Martin de Diego
Cristina Conde
Enrique Cabello
A Trust Management Framework for Secure Cloud Data Storage Using Cryptographic Role-Based Access Control
226(26)
Lan Zhou
Vijay Varadharajan
Michael Hitchens
IPv6 Network Attack Detection with HoneydV6
252(18)
Sven Schindler
Bettina Schnor
Simon Kiertscher
Thomas Scheffler
Eldad Zack
Youtube User and Usage Profiling: Stories of Political Horror and Security Success
270(20)
Miltiadis Kandias
Lilian Mitrou
Vasilis Stavrou
Dimitris Gritzalis
Determining Cryptographic Distinguishes for eStream and SHA-3 Candidate Functions with Evolutionary Circuits
290(16)
Petr Svenda
Martin Ukrop
Vashek Matyas
Self-contained Data Protection Scheme Based on CP-ABE
306(16)
Bo Lang
Runhua Xu
Yawei Duan
An Efficient Framework for Evaluating the Risk of Zero-Day Vulnerabilities
322(21)
Massimiliano Albanese
Sushil Jajodia
Anoop Singhal
Lingyu Wang
Signal Processing and Multimedia Applications
Optimal Distribution of Computational Power in Free Viewpoint Interpolation by Depth Hypothesis Density Adaptation in Plane Sweeping
343(16)
Patrik Goorts
Steven Maesen
Maarten Dumont
Sammy Rogmans
Philippe Bekaert
Effect of the Front-End Processing on Speaker Verification Performance Using PCA and Scores Level Fusion
359(10)
Nassim Asbai
Messaoud Bengherabi
Farid Harizi
Abderrahmane Amrouche
Automatic Geographic Enrichment by Multi-modal Bike Sensing
369(18)
Steven Verstockt
Viktor Slavkovikj
Pieterjan De Potter
Olivier Janssens
Jurgen Slowack
Rik Van de Walle
Wireless Information Networks and Systems Reliability of Cooperative Vehicular Applications on Real Scenarios
Over an IEEE 802.11p Communications Architecture
387(15)
Unai Hernandez-Jayo
Idoia De-la-Iglesia
Transmitter-Side Antennas Correlation in SVD-assisted MIMO Systems
402(17)
Andreas Ahrens
Francisco Cano-Broncano
Cesar Benavente-Peces
Author Index 419