Buch, Englisch, Band 3, 293 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 470 g
Second International Conference, ICETE 2005, Reading, UK, October 3-7, 2005. Selected Papers
Buch, Englisch, Band 3, 293 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 470 g
Reihe: Communications in Computer and Information Science
ISBN: 978-3-540-75992-8
Verlag: Springer Berlin Heidelberg
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Technische Informatik Netzwerk-Hardware
- Mathematik | Informatik EDV | Informatik Technische Informatik Systemverwaltung & Management
- Mathematik | Informatik EDV | Informatik Technische Informatik Externe Speicher & Peripheriegeräte
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Zeichen- und Zahlendarstellungen
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
- Wirtschaftswissenschaften Betriebswirtschaft Bereichsspezifisches Management E-Commerce, E-Business, E-Marketing
- Mathematik | Informatik EDV | Informatik Angewandte Informatik Wirtschaftsinformatik
- Wirtschaftswissenschaften Betriebswirtschaft Wirtschaftsmathematik und -statistik
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Informationstheorie, Kodierungstheorie
Weitere Infos & Material
I: Global Communication Information Systems and Services.- Sharing Service Resource Information for Application Integration in a Virtual Enterprise – Modeling the Communication Protocol for Exchanging Service Resource Information.- Advertising Via Mobile Terminals – Delivering Context Sensitive and Personalized Advertising While Guaranteeing Privacy.- On Digital Cash-Like Payment Systems.- In-Depth Analysis of Selected Topics Related to the Quality Assessment of E-Commerce Systems.- A Novel Real-Time Self-similar Traffic Detector/Filter to Improve the Reliability of a TCP Based End-to-End Client/Server Interaction Path for Shorter Roundtrip Time.- Strategies for Service Composition in P2P Networks.- End to End Adaptation for the Web: Matching Content to Client Connections.- II: Security and Reliability in Information Systems and Networks.- Voice Biometrics Within the Family: Trust, Privacy and Personalisation.- Secret Locking: Exploring New Approaches to Biometric Key Encapsulation.- Adaptive Real-Time Network Monitoring System: Detecting Anomalous Activity with Evolving Connectionist System.- Host Identity Protocol Proxy.- Guaranteerring Security of Financial Transaction by Using Quantum Cryptography in Banking Environment.- Optimal Trade-Off for Merkle Tree Traversal.- Supporting the Cybercrime Investigation Process: Effective Discrimination of Source Code Authors Based on Byte-Level Information.- III: Wireless Communication Systems and Networks.- Iterative MMSE Detection for MIMO/BLAST DS-CDMA Systems in Frequency Selective Fading Channels – Achieving High Performance in Fully Loaded Systems.- Flooding Attack on the Binding Cache in Mobile IPv6.- Performance of VoIP over IEEE 802.11G DSSS-OFDM Mode with IEEE 802.11E QOS Support.- The Robustness of BlockingProbability in a Loss System with Repeated Customers.- On the Evaluation of a Secure Solution to Access 802.11 Networks.- Searching for Resources in MANETs – A Cluster Based Flooding Approach.- A Comparative Study of IEEE 802.11 MAC Access Mechanisms for Different Traffic Types.- An Automatic Blind Modulation Recognition Algorithm for M-PSK Signals Based on MSE Criterion.- IV: Multimedia Signal Processing.- Properties of Dominant Color Temperature Descriptor.- Test Environment for Performance Evaluation of an Internet Radio.