000 | 05248nam a22003855i 4500 | ||
---|---|---|---|
001 | 301058 | ||
003 | MX-SnUAN | ||
005 | 20160429155655.0 | ||
007 | cr nn 008mamaa | ||
008 | 150903s2009 gw | o |||| 0|eng d | ||
020 |
_a9783642051975 _99783642051975 |
||
024 | 7 |
_a10.1007/9783642051975 _2doi |
|
035 | _avtls000354106 | ||
039 | 9 |
_a201509030534 _bVLOAD _c201405060330 _dVLOAD _y201402181010 _zstaff |
|
040 |
_aMX-SnUAN _bspa _cMX-SnUAN _erda |
||
050 | 4 | _aTK5105.5-5105.9 | |
100 | 1 |
_aFilipe, Joaquim. _eeditor. _9308097 |
|
245 | 1 | 0 |
_ae-Business and Telecommunications : _bInternational Conference, ICETE 2008, Porto, Portugal, July 26-29, 2008, Revised Selected Papers / _cedited by Joaquim Filipe, Mohammad S. Obaidat. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2009. |
|
300 | _brecurso en línea. | ||
336 |
_atexto _btxt _2rdacontent |
||
337 |
_acomputadora _bc _2rdamedia |
||
338 |
_arecurso en línea _bcr _2rdacarrier |
||
347 |
_aarchivo de texto _bPDF _2rda |
||
490 | 0 |
_aCommunications in Computer and Information Science, _x1865-0929 ; _v48 |
|
500 | _aSpringer eBooks | ||
505 | 0 | _aInvited Speakers -- e-Business Innovation: The Next Decade -- Development of the Next Generation CDMA Technology and Lessons We Learnt from the Past -- I ICE-B -- Method for Classification of Unstructured Data in Telecommunication Services -- Possible Determinants Affecting the Use of Mobile Tourism Services -- Towards a Version-Based Approach to Deal with Business Process Evolution -- Comparing Consumer Resistance to Mobile Banking in Finland and Portugal -- NPTool: Towards Scalability and Reliability of Business Process Management -- In Search of Search Engine Marketing Strategy Amongst SME’s in Ireland -- II SECRYPT -- Integrating Anomaly-Based Approach into Bayesian Network Classifiers -- Aggregation and Thresholding Schemes for Anomaly-Based Approaches -- A Memory Efficient Network Encryption Scheme -- Analyzing the Effectiveness of the Self-organized Public-Key Management System on MANETs under the Lack of Cooperation and the Impersonation Attacks -- Achieving Fast Self Healing in Wireless Sensor Networks Using Multi-generation Deployment Schemes -- Reducing Memory Requirements for Combinatorial Attacks on NTRU via Multiple Birthdays -- On the Design of Buyer-Seller Watermarking Protocols without a Watermark Authority -- RKRD: Runtime Kernel Rootkit Detection -- A New Narrow-Block Mode of Operation for Disk Encryption with Error Propagation -- Security Requirements Management in Software Product Line Engineering -- III SIGMAP -- On the Suitability of Suffix Arrays for Lempel-Ziv Data Compression -- Iteratively Detected MIMO-OFDM Twisted-Pair Transmission Schemes -- Whales Localization Using a Large Hydrophone Array: Performance Relative to Cramer-Rao Bounds and Confidence Regions -- Automatic Recognition of Isolated Vowels Using F0-Normalized Harmonic Features -- High-Speed Configurable VLSI Architecture of a General Purpose Lifting-Based Discrete Wavelet Processor -- Face Detection Using Discrete Gabor Jets and a Probabilistic Model of Colored Image Patches -- Geometric Distortion Resilient Watermarking Based on a Single Robust Feature for Still Images -- Optimized Two-Party Video Chat with Restored Eye Contact Using Graphics Hardware -- A New IMS Based Inter-working Solution -- Quality Evaluation of Reverberation in Audioband Speech Signals -- IV WINSYS -- Conservative Transmit Power Control Mechanism for 802.11 Mesh -- Multiple Mobile Sinks Deployment for Energy Efficiency in Large Scale Wireless Sensor Networks -- Using Vegetation Barriers to Improving Wireless Network Isolation and Security -- Throughput Maximization for Multiband-OFDM Ultra Wideband Systems with Adaptive Frame Length Control -- Evaluation of Multicast Scheduling and Clustering Schemes with Packet-Level Macro Diversity in High-Speed Cellular Networks -- The Service Distribution Protocol for MANETs - Criteria and Performance Analysis. | |
520 | _aThis book contains the best papers of the 5th International Conference on e-Business and Telecommunications, ICETE, which was held in July 2008, in Porto, Portugal. This conference reflects a continuing effort to increase the dissemination of recent research results among professionals who work in the areas of e-business and telecommunications. ICETE is a joint international conference integrating four major areas of knowledge that are divided into four corresponding conferences: ICE-B (International Conference on e-Business), SECRYPT (International Conference on Security and Cryptography), SIGMAP (International Conference on Signal Processing and Multimedia), and WINSYS (International Conferenceon Wireless Information Systems). | ||
590 | _aPara consulta fuera de la UANL se requiere clave de acceso remoto. | ||
700 | 1 |
_aObaidat, Mohammad S. _eeditor. _9326849 |
|
710 | 2 |
_aSpringerLink (Servicio en línea) _9299170 |
|
776 | 0 | 8 |
_iEdición impresa: _z9783642051968 |
856 | 4 | 0 |
_uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-3-642-05197-5 _zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL) |
942 | _c14 | ||
999 |
_c301058 _d301058 |