default search action
5th ICETE 2008: Porto, Portugal
- Joaquim Filipe, Mohammad S. Obaidat:
e-Business and Telecommunications - International Conference, ICETE 2008, Porto, Portugal, July 26-29, 2008, Revised Selected Papers. Communications in Computer and Information Science 48, 2009, ISBN 978-3-642-05196-8
Part 1 / Invited Speakers
- David A. Marca:
e-Business Innovation: The Next Decade. 3-21 - Hsiao-Hwa Chen:
Development of the Next Generation CDMA Technology and Lessons We Learnt from the Past. 22-45
Part 2 / Part I ICE-B
- Motoi Iwashita, Ken Nishimatsu, Shinsuke Shimogawa:
Method for Classification of Unstructured Data in Telecommunication Services. 49-60 - Niklas Eriksson, Peter Strandvik:
Possible Determinants Affecting the Use of Mobile Tourism Services. 61-73 - Mohamed Amine Chaâbane, Eric Andonoff, Lotfi Bouzguenda, Rafik Bouaziz:
Towards a Version-Based Approach to Deal with Business Process Evolution. 74-88 - Tommi Laukkanen, Pedro Cruz:
Comparing Consumer Resistance to Mobile Banking in Finland and Portugal. 89-98 - Kelly Rosa Braghetto, João Eduardo Ferreira, Calton Pu:
NPTool: Towards Scalability and Reliability of Business Process Management. 99-112 - Chris Barry, Debbie Charleton:
In Search of Search Engine Marketing Strategy Amongst SME's in Ireland. 113-124
Part 3 / Part II SECRYPT
- Salem Benferhat, Karim Tabia:
Integrating Anomaly-Based Approach into Bayesian Network Classifiers. 127-139 - Salem Benferhat, Karim Tabia:
Aggregation and Thresholding Schemes for Anomaly-Based Approaches. 140-152 - Mohamed Abo El-Fotouh, Klaus Diepold:
A Memory Efficient Network Encryption Scheme. 153-165 - Eduardo da Silva, Aldri Luiz dos Santos, Michele Nogueira Lima, Luiz Carlos Pessoa Albini:
Analyzing the Effectiveness of the Self-organized Public-Key Management System on MANETs under the Lack of Cooperation and the Impersonation Attacks. 166-179 - Ömer Zekvan Yilmaz, Albert Levi, Erkay Savas:
Achieving Fast Self Healing in Wireless Sensor Networks Using Multi-generation Deployment Schemes. 180-198 - Raphael Overbeck:
Reducing Memory Requirements for Combinatorial Attacks on NTRU via Multiple Birthdays. 199-209 - Geong Sen Poh, Keith M. Martin:
On the Design of Buyer-Seller Watermarking Protocols without a Watermark Authority. 210-223 - Satyajit Grover, Hormuzd Khosravi, Divya Kolar, Samuel Moffat, Michael E. Kounavis:
RKRD: Runtime Kernel Rootkit Detection. 224-236 - Mohamed Abo El-Fotouh, Klaus Diepold:
A New Narrow-Block Mode of Operation for Disk Encryption with Error Propagation. 237-249 - Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:
Security Requirements Management in Software Product Line Engineering. 250-263
Part 4 / Part III SIGMAP
- Artur J. Ferreira, Arlindo L. Oliveira, Mário A. T. Figueiredo:
On the Suitability of Suffix Arrays for Lempel-Ziv Data Compression. 267-280 - Andreas Ahrens, Christoph Lange:
Iteratively Detected MIMO-OFDM Twisted-Pair Transmission Schemes. 281-293 - Frédéric Caudal, Hervé Glotin:
Whales Localization Using a Large Hydrophone Array: Performance Relative to Cramer-Rao Bounds and Confidence Regions. 294-306 - Aníbal J. S. Ferreira:
Automatic Recognition of Isolated Vowels Using F0-Normalized Harmonic Features. 307-317 - Andre Guntoro, Hans-Peter Keil, Manfred Glesner:
High-Speed Configurable VLSI Architecture of a General Purpose Lifting-Based Discrete Wavelet Processor. 318-330 - Ulrich Hoffmann, Jacek Naruniec, Ashkan Yazdani, Touradj Ebrahimi:
Face Detection Using Discrete Gabor Jets and a Probabilistic Model of Colored Image Patches. 331-344 - Michele Scagliola, Pietro Guccione:
Geometric Distortion Resilient Watermarking Based on a Single Robust Feature for Still Images. 345-357 - Maarten Dumont, Sammy Rogmans, Steven Maesen, Philippe Bekaert:
Optimized Two-Party Video Chat with Restored Eye Contact Using Graphics Hardware. 358-372 - Zhongwen Zhu, Richard Brunner:
A New IMS Based Inter-working Solution. 373-383 - Amaro A. de Lima, Sergio L. Netto, Luiz W. P. Biscainho, Fabio P. Freeland, Bruno C. Bispo, Rafael A. de Jesus, Ronald W. Schafer, Amir Said, Bowon Lee, Ton Kalker:
Quality Evaluation of Reverberation in Audioband Speech Signals. 384-396
Part 5 / Part IV WINSYS
- Karol Kowalik, Marek Bykowski, Brian Keegan, Mark Davis:
Conservative Transmit Power Control Mechanism for 802.11 Mesh. 399-411 - Ines Slama, Badii Jouaber, Djamal Zeghlache:
Multiple Mobile Sinks Deployment for Energy Efficiency in Large Scale Wireless Sensor Networks. 412-427 - Iñigo Cuiñas, Paula Gómez, Manuel García Sánchez, Ana Vázquez Alejos:
Using Vegetation Barriers to Improving Wireless Network Isolation and Security. 428-438 - Liaoyuan Zeng, Eduardo Cano, Sean McGrath, Michael Barry:
Throughput Maximization for Multiband-OFDM Ultra Wideband Systems with Adaptive Frame Length Control. 439-452 - Neila El Heni, Xavier Lagrange:
Evaluation of Multicast Scheduling and Clustering Schemes with Packet-Level Macro Diversity in High-Speed Cellular Networks. 453-466 - Mohamed Hamdy El-Eliemy, Birgitta König-Ries:
The Service Distribution Protocol for MANETs - Criteria and Performance Analysis. 467-479
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.