E-business and telecommunications International Joint Conference, ICETE 2011, Seville, Spain, July 18-21, 2011 : revised selected papers / Mohammad S. Obaidat, José L. Sevillano, Joaquim Filipe (eds.).
| Author/creator | International Conference on E-business and Telecommunication Networks |
| Other author | Obaidat, Mohammad S. (Mohammad Salameh), 1952- |
| Other author | Sevillano, José L. |
| Other author | Filipe, Joaquim. |
| Format | Electronic |
| Publication Info | Heidelberg ; New York : Springer, |
| Description | xvi, 536 p. : ill. ; 24 cm. |
| Supplemental Content | Full text available from Springer Nature - Springer Computer Science eBooks 2012 English International |
| Supplemental Content | Full text available from Springer Books |
| Subjects |
| Series | Communications in computer and information science ; 314. ^A791990 |
| Contents | Invited Speakers -- Biometric Privacy Protection: Guidelines and Technologies -- Face Recognition in Uncontrolled Environments, Experiments in an Airport -- Paradigms of Distributed Software Systems: Services, Processes and Self-organization -- Part I: Data Communication Networking -- A Wildfire Prediction Based on Fuzzy Inference System for Wireless Sensor Networks -- Evaluating Super Node Selection and Load Balancing in P2P VoIP Networks Using Stochastic Graph Transformation -- Shared Security: How Wireless Sensor Networks Can Benefit from Threshold Cryptography -- Part II: e-Business -- Selection of Information-Intensive Services: A Multi-criteria Decision Model -- Territorial Safety Networks -- Killer Applications for Fiber to the Home Networks: Market Potential, Time Horizons and User Groups -- To Bid or Not To Bid? Investigating Retail-Brand Keyword Performance in Sponsored Search Advertising -- |
| Contents | Client-Oriented Preferences Model for QoS Aggregation in Service-Based Applications -- An Answer to "Who Needs a Stylus?" on Handwriting Recognition on Mobile Devices -- Application of Metamorphic Testing to a Case Study in Web Services Compositions -- Part III: Optical Communication Systems -- Time Stretching of UWB Radio Signals Using a Photonic Analogue-to-Digital Converter System Based on Wavelength Division Multiplexing -- Part IV: Security and Cryptography -- Spam Filtering through Anomaly Detection -- On the Feasibility of Malware Attacks in Smartphone Platforms -- Revocation and Tracing Based on Ternary Tree: Towards Optimal Broadcast Encryption Scheme -- Accelerating Reduction for Enabling Fast Multiplication over Large Binary Fields -- A Related-Key Attack against Multiple Encryption Based on Fixed Points -- Byte Slicing Grøstl: Improved Intel AES-NI and Vector-Permute Implementations of the SHA-3 Finalist Grøstl -- |
| Contents | Security and Cryptography -- Attack Interference: A Path to Defending Security Protocols -- A Framework for Dynamic Optimization of Security and Performances -- Broadcast Authentication in a Low Speed Controller Area Network -- Part V: Signal Processing and Multimedia Applications -- Efficiently Managing Multimedia Hierarchical Data with the WINDSURF Library -- A Method of Real-Time Non-uniform Speech Stretching -- Decoding of LDPC-Based 2D-Barcodes Using a 2D-Hidden-Markov-Model -- A Comparative Evaluation of Gaussian Multiscale Aggregation for Hand Biometrics -- Touching Character Segmentation Method of Archaic Lanna Script -- Small and Large Vocabulary Speech Recognition of MP3 Data under Real-Word Conditions: Experimental Study -- |
| Contents | Weight Based Fast Mode Decision for H.264/AVC Video Coding Standard -- Investigation and Improved Configuration Settings for H.264 CGS/MGS Quality Scalable Coding -- Part VI: Wireless Information Networks and Systems -- Downlink Multiuser MIMO-OFDM Systems -- Experience in Deploying a Wireless Sensor Network in a Vineyard -- Experimental Detection and Synchronisation Validation for a TR-UWB System Based on the Time Delayed Sampling and Correletion Scheme -- Link Adaptation in Ad Hoc Networks Based on Interference Minimization -- Unidirectional Traffic Flow to Protect Wireless Sensor Networks against Byzantine Attacks -- Successive Interference Cancellation for Multi-user MIMO-OFDM Ad-Hoc Networks: A Performance-Complexity Tradeoff. |
| Bibliography note | Includes bibliographical references and author index. |
| Access restriction | Available only to authorized users. |
| Technical details | Mode of access: World Wide Web |
| Genre/form | Electronic books. |
| LCCN | 2012954173 |
| ISBN | 9783642357541 (pbk. : alk. paper) |
| ISBN | 3642357547 (pbk. : alk. paper) |