000 | 04055nam a22003855i 4500 | ||
---|---|---|---|
001 | 298872 | ||
003 | MX-SnUAN | ||
005 | 20160429155522.0 | ||
007 | cr nn 008mamaa | ||
008 | 150903s2009 gw | o |||| 0|eng d | ||
020 |
_a9783540886532 _99783540886532 |
||
024 | 7 |
_a10.1007/9783540886532 _2doi |
|
035 | _avtls000352399 | ||
039 | 9 |
_a201509030938 _bVLOAD _c201405060305 _dVLOAD _y201402171200 _zstaff |
|
040 |
_aMX-SnUAN _bspa _cMX-SnUAN _erda |
||
050 | 4 | _aHF5415.1265 | |
100 | 1 |
_aFilipe, Joaquim. _eeditor. _9308097 |
|
245 | 1 | 0 |
_aE-business and Telecommunications : _b4th International Conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected Papers / _cedited by Joaquim Filipe, Mohammad S. Obaidat. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2009. |
|
300 | _brecurso en línea. | ||
336 |
_atexto _btxt _2rdacontent |
||
337 |
_acomputadora _bc _2rdamedia |
||
338 |
_arecurso en línea _bcr _2rdacarrier |
||
347 |
_aarchivo de texto _bPDF _2rda |
||
490 | 0 |
_aCommunications in Computer and Information Science, _x1865-0929 ; _v23 |
|
500 | _aSpringer eBooks | ||
505 | 0 | _aInvited Speakers -- Pragmatic Computing – A Semiotic Perspective to Web Services -- Utility Computing: Reality and Beyond -- A Novel Grid-Based Micropayment System for Heterogeneous Multi-party Accounting -- I: ICE-B -- Bidding Agents That Perpetrate Auction Fraud -- A Platform for Mobile Service Provisioning Based on SOA-Integration -- A Hybrid Data Mining Approach for Credit Card Usage Behavior Analysis -- Critical Success Factors of Internet Shopping: The Case of Japan -- An Adaptive Knowledge-Based Approach for Detecting Fraud across Different e-Government Domains -- II: SECRYPT -- Timing to Block Scanning Malwares by Using Combinatorics Proliferation Model -- Securing Biometric Templates Where Similarity Is Measured with Set Intersection -- Score Equalization in SVM Multimodal Fusion for Person Recognition -- Remote Algorithmic Complexity Attacks against Randomized Hash Tables -- Securing Real-Time Sessions in an IMS-Based Architecture -- IPSec Database Query Acceleration -- Detection of Spoofed MAC Addresses in 802.11 Wireless Networks -- K2 Stream Cipher -- Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols -- Reliable Intersection Computation within Malicious Environments -- A Security Hardening Language Based on Aspect-Orientation -- III: SIGMAP -- Facial Expression Synthesis and Analysis -- Multi-sequence H.264/AVC Rate Control Based on the Linear Model -- Non Parametric Stochastic Expectation Maximization for Data Clustering -- Mapping Phonetic Features for Voice-Driven Sound Synthesis -- The MiSPOT System: Personalized Publicity and Marketing over Interactive Digital TV -- Knowledge Engineering Aspects of Affective Bi-Modal Educational Applications -- IV: WINSYS -- Design of a Password-Based EAP Method -- Bit and Power Allocation Strategies for OFDM Systems over Time-Varying Channels -- Mobile Applications to a Pervasive World -- Multi-service Networks: A New Approach to End-to-End Topology Management. | |
520 | _aThis book constitutes the best papers of the 4th International Conference on E-business and Telecommunication Networks, ICETE 2007, held in Barcelona, Spain, during July 28-31, 2007. The 26 revised full papers presented together with 3 invited papers were carefully reviewed and selected from 418 submissions. The papers are organized in four parts according to their conferences: ICE-B, SECRYPT, SIGMAP and WINSYS. | ||
590 | _aPara consulta fuera de la UANL se requiere clave de acceso remoto. | ||
700 | 1 |
_aObaidat, Mohammad S. _eeditor. _9326849 |
|
710 | 2 |
_aSpringerLink (Servicio en línea) _9299170 |
|
776 | 0 | 8 |
_iEdición impresa: _z9783540886525 |
856 | 4 | 0 |
_uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-3-540-88653-2 _zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL) |
942 | _c14 | ||
999 |
_c298872 _d298872 |