000 04055nam a22003855i 4500
001 298872
003 MX-SnUAN
005 20160429155522.0
007 cr nn 008mamaa
008 150903s2009 gw | o |||| 0|eng d
020 _a9783540886532
_99783540886532
024 7 _a10.1007/9783540886532
_2doi
035 _avtls000352399
039 9 _a201509030938
_bVLOAD
_c201405060305
_dVLOAD
_y201402171200
_zstaff
040 _aMX-SnUAN
_bspa
_cMX-SnUAN
_erda
050 4 _aHF5415.1265
100 1 _aFilipe, Joaquim.
_eeditor.
_9308097
245 1 0 _aE-business and Telecommunications :
_b4th International Conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected Papers /
_cedited by Joaquim Filipe, Mohammad S. Obaidat.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2009.
300 _brecurso en línea.
336 _atexto
_btxt
_2rdacontent
337 _acomputadora
_bc
_2rdamedia
338 _arecurso en línea
_bcr
_2rdacarrier
347 _aarchivo de texto
_bPDF
_2rda
490 0 _aCommunications in Computer and Information Science,
_x1865-0929 ;
_v23
500 _aSpringer eBooks
505 0 _aInvited Speakers -- Pragmatic Computing – A Semiotic Perspective to Web Services -- Utility Computing: Reality and Beyond -- A Novel Grid-Based Micropayment System for Heterogeneous Multi-party Accounting -- I: ICE-B -- Bidding Agents That Perpetrate Auction Fraud -- A Platform for Mobile Service Provisioning Based on SOA-Integration -- A Hybrid Data Mining Approach for Credit Card Usage Behavior Analysis -- Critical Success Factors of Internet Shopping: The Case of Japan -- An Adaptive Knowledge-Based Approach for Detecting Fraud across Different e-Government Domains -- II: SECRYPT -- Timing to Block Scanning Malwares by Using Combinatorics Proliferation Model -- Securing Biometric Templates Where Similarity Is Measured with Set Intersection -- Score Equalization in SVM Multimodal Fusion for Person Recognition -- Remote Algorithmic Complexity Attacks against Randomized Hash Tables -- Securing Real-Time Sessions in an IMS-Based Architecture -- IPSec Database Query Acceleration -- Detection of Spoofed MAC Addresses in 802.11 Wireless Networks -- K2 Stream Cipher -- Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols -- Reliable Intersection Computation within Malicious Environments -- A Security Hardening Language Based on Aspect-Orientation -- III: SIGMAP -- Facial Expression Synthesis and Analysis -- Multi-sequence H.264/AVC Rate Control Based on the Linear Model -- Non Parametric Stochastic Expectation Maximization for Data Clustering -- Mapping Phonetic Features for Voice-Driven Sound Synthesis -- The MiSPOT System: Personalized Publicity and Marketing over Interactive Digital TV -- Knowledge Engineering Aspects of Affective Bi-Modal Educational Applications -- IV: WINSYS -- Design of a Password-Based EAP Method -- Bit and Power Allocation Strategies for OFDM Systems over Time-Varying Channels -- Mobile Applications to a Pervasive World -- Multi-service Networks: A New Approach to End-to-End Topology Management.
520 _aThis book constitutes the best papers of the 4th International Conference on E-business and Telecommunication Networks, ICETE 2007, held in Barcelona, Spain, during July 28-31, 2007. The 26 revised full papers presented together with 3 invited papers were carefully reviewed and selected from 418 submissions. The papers are organized in four parts according to their conferences: ICE-B, SECRYPT, SIGMAP and WINSYS.
590 _aPara consulta fuera de la UANL se requiere clave de acceso remoto.
700 1 _aObaidat, Mohammad S.
_eeditor.
_9326849
710 2 _aSpringerLink (Servicio en línea)
_9299170
776 0 8 _iEdición impresa:
_z9783540886525
856 4 0 _uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-3-540-88653-2
_zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL)
942 _c14
999 _c298872
_d298872