e-Business and Telecommunications International Conference, ICETE 2008, Porto, Portugal, July 26-29, 2008, Revised Selected Papers / edited by Joaquim Filipe, Mohammad S. Obaidat.

th This book contains the best papers of the 5 International Conference on e-Business and Telecommunications (ICETE), which was held in July 2008, in Porto, Portugal. This conference reflects a continuing effort to increase the dissemination of recent research results among professionals who work in...

Full description

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Filipe, Joaquim (Editor), Obaidat, Mohammad S. (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
Edition:1st ed. 2009.
Series:Communications in Computer and Information Science, 48
Springer eBook Collection.
Subjects:
Online Access:Click to view e-book
Holy Cross Note:Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.
Table of Contents:
  • Invited Speakers
  • e-Business Innovation: The Next Decade
  • Development of the Next Generation CDMA Technology and Lessons We Learnt from the Past
  • I ICE-B
  • Method for Classification of Unstructured Data in Telecommunication Services
  • Possible Determinants Affecting the Use of Mobile Tourism Services
  • Towards a Version-Based Approach to Deal with Business Process Evolution
  • Comparing Consumer Resistance to Mobile Banking in Finland and Portugal
  • NPTool: Towards Scalability and Reliability of Business Process Management
  • In Search of Search Engine Marketing Strategy Amongst SME’s in Ireland
  • II SECRYPT
  • Integrating Anomaly-Based Approach into Bayesian Network Classifiers
  • Aggregation and Thresholding Schemes for Anomaly-Based Approaches
  • A Memory Efficient Network Encryption Scheme
  • Analyzing the Effectiveness of the Self-organized Public-Key Management System on MANETs under the Lack of Cooperation and the Impersonation Attacks
  • Achieving Fast Self Healing in Wireless Sensor Networks Using Multi-generation Deployment Schemes
  • Reducing Memory Requirements for Combinatorial Attacks on NTRU via Multiple Birthdays
  • On the Design of Buyer-Seller Watermarking Protocols without a Watermark Authority
  • RKRD: Runtime Kernel Rootkit Detection
  • A New Narrow-Block Mode of Operation for Disk Encryption with Error Propagation
  • Security Requirements Management in Software Product Line Engineering
  • III SIGMAP
  • On the Suitability of Suffix Arrays for Lempel-Ziv Data Compression
  • Iteratively Detected MIMO-OFDM Twisted-Pair Transmission Schemes
  • Whales Localization Using a Large Hydrophone Array: Performance Relative to Cramer-Rao Bounds and Confidence Regions
  • Automatic Recognition of Isolated Vowels Using F0-Normalized Harmonic Features
  • High-Speed Configurable VLSI Architecture of a General Purpose Lifting-Based Discrete Wavelet Processor
  • Face Detection Using Discrete Gabor Jets and a Probabilistic Model of Colored Image Patches
  • Geometric Distortion Resilient Watermarking Based on a Single Robust Feature for Still Images
  • Optimized Two-Party Video Chat with Restored Eye Contact Using Graphics Hardware
  • A New IMS Based Inter-working Solution
  • Quality Evaluation of Reverberation in Audioband Speech Signals
  • IV WINSYS
  • Conservative Transmit Power Control Mechanism for 802.11 Mesh
  • Multiple Mobile Sinks Deployment for Energy Efficiency in Large Scale Wireless Sensor Networks
  • Using Vegetation Barriers to Improving Wireless Network Isolation and Security
  • Throughput Maximization for Multiband-OFDM Ultra Wideband Systems with Adaptive Frame Length Control
  • Evaluation of Multicast Scheduling and Clustering Schemes with Packet-Level Macro Diversity in High-Speed Cellular Networks
  • The Service Distribution Protocol for MANETs - Criteria and Performance Analysis.