Prix bas
CHF100.00
L'exemplaire sera recherché pour vous.
Pas de droit de retour !
This book contains the best papers of the Third International Conference on E-business and Telecommunications (ICETE), which was held in 2006 in Portugal. This conference reflects a continuing effort to increase the dissemination of recent research results among professionals who work in the e-business field. ICETE is a joint international conference integrating four major areas of knowledge that are divided into four cor- sponding conferences: ICE-B (Int'l Conf. on e-Business), SECRYPT (Int'l Conf. on Security and Cryptography), WINSYS (Int'l Conf. on Wireless Information Systems) and SIGMAP (Int'l Conf. on Signal Processing and Multimedia). The program of this joint conference included seven outstanding keynote lectures presented by internationally renowned distinguished researchers who are experts in the various ICETE areas. Their keynote speeches contributed to heightening the ov- all quality of the program and significance of the theme of the conference. The conference topic areas define a broad spectrum in the key areas of e-Business and telecommunications. This wide view has made it appealing to a global audience of engineers, scientists, business practitioners and policy experts. The papers - cepted and presented at the conference demonstrated a number of new and innovative solutions for e-business and telecommunication networks, showing that the technical problems in both fields are challenging, related and significant.
Texte du rabat
This book constitutes the best papers of the Third International Conference on E-business and Telecommunication Networks, ICETE 2006, held in Setúbal, Portugal, August 7-10, 2006.
The 29 revised full papers presented were carefully reviewed and selected from 326 submissions. The papers are organized in four parts according to their conferences: ICE-B, SECRYPT, SIGMAP and WINSYS.
Contenu
ICE-B.- Towards Automated Service Trading.- SAGA: An Adaptive Infrastructure for Secure Available GRID on Ad-Hoc Networks.- Variable Quantity Market Clearing Algorithms.- Modeling the Dynamics of Social Networks.- Reputation Management Service for Peer-to-Peer Enterprise Architectures.- A New Approach for the Trust Calculation in Social Networks.- SECRYPT.- Spoofed ARP Packets Detection in Switched LAN Networks.- Efficient All-or-Nothing Encryption Using CTR Mode.- Proposals for Iterated Hash Functions.- Secure Online English Auctions.- Using Microsoft Office InfoPath to Generate XACML Policies.- Least Privilege in Separation Kernels.- Inter-node Relationship Labeling: A Fine-Grained XML Access Control Implementation Using Generic Security Labels.- SIGMAP.- Using Placeholder Slices and MPEG-21 BSDL for ROI Extraction in H.264/AVC FMO-Encoded Bitstreams.- Design and Implementation of Video on Demand Services over a Peer-to-Peer Multioverlay Network.- Traffic Trunk Parameters for Voice Transport over MPLS.- On-the-Fly Time Scaling for Compressed Audio Streams.- Improving Multiscale Recurrent Pattern Image Coding with Deblocking Filtering.- A Network Scheduler for an Adaptive VoD Server.- Enhanced Interaction for Streaming Media.- An E-Librarian Service That Yields Pertinent Resources from a Multimedia Knowledge Base.- WINSYS.- A Transceiver Concept Based on a Software Defined Radio Approach.- Evaluation of an Orthogonal SFBC Channel Estimation Scheme for MIMO OFDM Wireless Systems.- A New Signal Detection Method for TR-UWB: By Time Delayed Sampling and Correlation (TDSC).- Image Transmission with Adaptive Power and Rate Allocation over Flat Fading Channels Using Joint Source Channel Coding.- Directional Spectrum Modelling in Inhomogeneous Forests at 20 and 62.4 GHz.- Use of AGPS Call Data Records for Non-GPS Terminal Positioning in Cellular Networks.- A Telephony Application for Manets: Voice over a MANET-Extended JXTA Virtual Overlay Network.- A Context-Aware Architecture for Mobile Knowledge Management.
Prix bas
Prix bas