跳至内容
E-business and telecommunications : International Joint Conference, ICETE 2011, Seville, Spain, July 18-21, 2011, revised selected papers 線上預覽
關閉線上預覽
正在查...

E-business and telecommunications : International Joint Conference, ICETE 2011, Seville, Spain, July 18-21, 2011, revised selected papers

作者: Mohammad S Obaidat; Jose Luis Sevillano; Joaquim Filipe
出版商: Berlin ; New York : Springer, ©2012.
叢書: Communications in computer and information science, 314.
版本/格式:   電子書 : 文獻 : 會議刊物 : 英語所有版本和格式的總覽
資料庫:WorldCat
提要:
This book constitutes the refereed proceedings of the 8th International Joint Conference on E-Business and Telecommunications, ICETE 2011, held in Seville, Spain in July 2011. The 118 revised full papers presented were carefully reviewed and selected from 409 submissions. The topics covered are data communication networking, e-business, optical communication systems, security and cryptography, signal processing and  再讀一些...
評定級別:

(尚未評分) 0 附有評論 - 成爲第一個。

主題
更多類似這樣的

 

在線上查詢

與資料的連結

在圖書館查詢

&AllPage.SpinnerRetrieving; 正在查詢有此資料的圖書館...

詳細書目

類型/形式: Electronic books
Conference proceedings
Congresses
資料類型: 會議刊物, 文獻, 網際網路資源
文件類型: 網路資源, 電腦資料
所有的作者/貢獻者: Mohammad S Obaidat; Jose Luis Sevillano; Joaquim Filipe
ISBN: 9783642357558 3642357555
OCLC系統控制編碼: 822997138
描述: 1 online resource (xvi, 536 p.) : ill.
内容: Invited Speakers --
Biometric Privacy Protection: Guidelines and Technologies --
Face Recognition in Uncontrolled Environments, Experiments in an Airport --
Paradigms of Distributed Software Systems: Services, Processes and Self-organization --
Part I: Data Communication Networking --
A Wildfire Prediction Based on Fuzzy Inference System for Wireless Sensor Networks --
Evaluating Super Node Selection and Load Balancing in P2P VoIP Networks Using Stochastic Graph Transformation --
Shared Security: How Wireless Sensor Networks Can Benefit from Threshold Cryptography --
Part II: e-Business --
Selection of Information-Intensive Services: A Multi-criteria Decision Model --
Territorial Safety Networks --
Killer Applications for Fiber to the Home Networks: Market Potential, Time Horizons and User Groups --
To Bid or Not To Bid? Investigating Retail-Brand Keyword Performance in Sponsored Search Advertising --
Client-Oriented Preferences Model for QoS Aggregation in Service-Based Applications --
An Answer to "Who Needs a Stylus?" on Handwriting Recognition on Mobile Devices --
Application of Metamorphic Testing to a Case Study in Web Services Compositions --
Part III: Optical Communication Systems --
Time Stretching of UWB Radio Signals Using a Photonic Analogue-to-Digital Converter System Based on Wavelength Division Multiplexing --
Part IV: Security and Cryptography --
Spam Filtering through Anomaly Detection --
On the Feasibility of Malware Attacks in Smartphone Platforms --
Revocation and Tracing Based on Ternary Tree: Towards Optimal Broadcast Encryption Scheme --
Accelerating Reduction for Enabling Fast Multiplication over Large Binary Fields --
A Related-Key Attack against Multiple Encryption Based on Fixed Points --
Byte Slicing Grøstl: Improved Intel AES-NI and Vector-Permute Implementations of the SHA-3 Finalist Grøstl --
Security and Cryptography --
Attack Interference: A Path to Defending Security Protocols --
A Framework for Dynamic Optimization of Security and Performances --
Broadcast Authentication in a Low Speed Controller Area Network --
Part V: Signal Processing and Multimedia Applications --
Efficiently Managing Multimedia Hierarchical Data with the WINDSURF Library --
A Method of Real-Time Non-uniform Speech Stretching --
Decoding of LDPC-Based 2D-Barcodes Using a 2D-Hidden-Markov-Model --
A Comparative Evaluation of Gaussian Multiscale Aggregation for Hand Biometrics --
Touching Character Segmentation Method of Archaic Lanna Script --
Small and Large Vocabulary Speech Recognition of MP3 Data under Real-Word Conditions: Experimental Study --
Weight Based Fast Mode Decision for H.264/AVC Video Coding Standard --
Investigation and Improved Configuration Settings for H.264 CGS/MGS Quality Scalable Coding --
Part VI: Wireless Information Networks and Systems --
Downlink Multiuser MIMO-OFDM Systems --
Experience in Deploying a Wireless Sensor Network in a Vineyard --
Experimental Detection and Synchronisation Validation for a TR-UWB System Based on the Time Delayed Sampling and Correletion Scheme --
Link Adaptation in Ad Hoc Networks Based on Interference Minimization --
Unidirectional Traffic Flow to Protect Wireless Sensor Networks against Byzantine Attacks --
Successive Interference Cancellation for Multi-user MIMO-OFDM Ad-Hoc Networks: A Performance-Complexity Tradeoff.
叢書名: Communications in computer and information science, 314.
其他題名: ICETE 2011
責任: Mohammad S. Obaidat, José L. Sevillano, Joaquim Filipe (eds.).
更多資訊:

摘要:

This book constitutes the refereed proceedings of the 8th International Joint Conference on E-Business and Telecommunications, ICETE 2011, held in Seville, Spain in July 2011. The 118 revised full papers presented were carefully reviewed and selected from 409 submissions. The topics covered are data communication networking, e-business, optical communication systems, security and cryptography, signal processing and multimedia applications, and wireless networks and information systems. These are the main knowledge areas that define the six component conferences, namely: DCNET, ICE-B, OPTICS, SECRYPT, SIGMAP, and WINSYS which together form the ICETE joint conference.

評論

讀者提供的評論
正在擷取GoodReads評論...
正在擷取DOGObooks的評論

標籤

成爲第一個
確認申請

你可能已經申請過這份資料。若還是想申請,請選確認。

連結資料


<http://www.worldcat.org/oclc/822997138>
library:oclcnum"822997138"
library:placeOfPublication
library:placeOfPublication
library:placeOfPublication
rdf:typeschema:MediaObject
rdf:typeschema:Book
rdf:valueUnknown value: cnp
rdf:valueUnknown value: dct
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:alternateName"ICETE 2011"
schema:bookFormatschema:EBook
schema:contributor
schema:contributor
schema:contributor
<http://viaf.org/viaf/42084266>
rdf:typeschema:Person
schema:birthDate"1952"
schema:familyName"Obaidat"
schema:givenName"Mohammad S."
schema:name"Obaidat, Mohammad S. (Mohammad Salameh), 1952-"
schema:copyrightYear"2012"
schema:creator
schema:datePublished"2012"
schema:description"This book constitutes the refereed proceedings of the 8th International Joint Conference on E-Business and Telecommunications, ICETE 2011, held in Seville, Spain in July 2011. The 118 revised full papers presented were carefully reviewed and selected from 409 submissions. The topics covered are data communication networking, e-business, optical communication systems, security and cryptography, signal processing and multimedia applications, and wireless networks and information systems. These are the main knowledge areas that define the six component conferences, namely: DCNET, ICE-B, OPTICS, SECRYPT, SIGMAP, and WINSYS which together form the ICETE joint conference."
schema:exampleOfWork<http://worldcat.org/entity/work/id/1191792435>
schema:genre"Conference proceedings"
schema:genre"Electronic books"
schema:inLanguage"en"
schema:isPartOf
schema:name"E-business and telecommunications International Joint Conference, ICETE 2011, Seville, Spain, July 18-21, 2011, revised selected papers"
schema:numberOfPages"536"
schema:publication
schema:publisher
schema:url<http://dx.doi.org/10.1007/978-3-642-35755-8>
schema:workExample
wdrs:describedby

Content-negotiable representations

關閉視窗

請登入WorldCat 

没有帳號嗎?你可很容易的 建立免費的帳號.