default search action
ICETE 2016: Lisbon, Portugal
- Mohammad S. Obaidat:
E-Business and Telecommunications - 13th International Joint Conference, ICETE 2016, Lisbon, Portugal, July 26-28, 2016, Revised Selected Papers. Communications in Computer and Information Science 764, Springer 2017, ISBN 978-3-319-67875-7
Invited Paper
- Anastasios A. Economides:
User Perceptions of Internet of Things (IoT) Systems. 3-20
Data Communication Networking
- Bouacherine Abdelkader, Mustapha Réda Senouci, Billal Merabti:
Multipath Forwarding in Named Data Networking: Flow, Fairness, and Context-Awareness. 23-47 - Catherine Boileau, François Gagnon, Jérémie Poisson, Simon Frenette, Mohamed Mejri:
Towards Understanding the Role of Execution Context for Observing Malicious Behavior in Android Malware. 48-71
e-Business
- Basel Hasan, Jorge Marx Gómez:
Security Framework for Adopting Mobile Applications in Small and Medium Enterprises. 75-98 - Imen Ben Said, Mohamed Amine Chaâbane, Eric Andonoff, Rafik Bouaziz:
BPMN4V for Modeling and Handling Versions of BPMN Collaborations and Choreographies. 99-123 - Tatsuya Fujimoto, Keiichi Iwamura, Masaki Inamura:
Content Protection Scheme to Realize Edit Control Including Diversion Control and Composition Control. 124-138 - Alexander Richter, Rebecca Bulander, Bernhard Kölmel, Johanna Schoblik:
Product Service System Design and Implementation in a Customer Centric World - An Approach to a User Oriented PSS Framework. 139-157
Optical Communication Systems
- André Sandmann, Andreas Ahrens, Steffen Lochmann, Peter Bartmann:
Mode Excitation and Multiplexing for MIMO Systems Focusing on Digital Mirror Devices. 161-176
Security and Cryptography
- Sergei Volokitin, Gerben Geltink:
Hardware Implementation of HS1-SIV. 179-194 - Jelena Milosevic, Miroslaw Malek, Alberto Ferrante:
Runtime Classification of Mobile Malware for Resource-Constrained Devices. 195-215 - Dirk Achenbach, Anne Borcherding, Bernhard Löwe, Jörn Müller-Quade, Jochen Rill:
Towards Realising Oblivious Voting. 216-240 - Gerardo Canfora, Paolo Di Notte, Francesco Mercaldo, Corrado Aaron Visaggio:
A Methodology for Silent and Continuous Authentication in Mobile Environment. 241-265 - Jordi Cucurull, Sandra Guasch, David Galindo:
A Javascript Voting Client for Remote Online Voting. 266-290 - Andreas Put, Bart De Decker:
Attribute-Based Privacy-Friendly Access Control with Context. 291-315 - Asma Patel, Esther Palomar:
Protecting Smartphone Users' Private Locations Through Caching. 316-337
Signal Processing and Multimedia Applications
- Lukás Mateju, Petr Cerva, Jindrich Zdánský:
Investigation into the Use of WFSTs and DNNs for Speech Activity Detection in Broadcast Data Transcription. 341-358 - M. A. A. Rajput, Eugen Funk, Anko Börner, Olaf Hellwich:
Boundless Reconstruction Using Regularized 3D Fusion. 359-378
Wireless Networks and Mobile Systems
- Muawya Habib Sarnoub Eldaw, Mark Levene, George Roussos:
Social-DBSCAN: A Presence Analytics Approach for Mobile Users' Social Clustering. 381-400 - Marco Sousa, André Martins, Pedro Vieira:
Tracking Down High Interference and Low Coverage in 3G/4G Radio Networks Using Automatic RF Measurement Extraction. 401-425 - Tiago Pedro, André Martins, António Rodrigues, Pedro Vieira:
On the Use of Load Balancing for Saving Capacity in Dual Layer 3G Radio Access Networks. 426-449 - Armin Wulf, Lisa Underberg, Ramona Croonenbroeck, Rüdiger Kays:
Coverage Range Analysis and Performance Evaluation of Wireless Technologies in Industrial Channel Conditions. 450-473
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.