000 05248nam a22003855i 4500
001 301058
003 MX-SnUAN
005 20160429155655.0
007 cr nn 008mamaa
008 150903s2009 gw | o |||| 0|eng d
020 _a9783642051975
_99783642051975
024 7 _a10.1007/9783642051975
_2doi
035 _avtls000354106
039 9 _a201509030534
_bVLOAD
_c201405060330
_dVLOAD
_y201402181010
_zstaff
040 _aMX-SnUAN
_bspa
_cMX-SnUAN
_erda
050 4 _aTK5105.5-5105.9
100 1 _aFilipe, Joaquim.
_eeditor.
_9308097
245 1 0 _ae-Business and Telecommunications :
_bInternational Conference, ICETE 2008, Porto, Portugal, July 26-29, 2008, Revised Selected Papers /
_cedited by Joaquim Filipe, Mohammad S. Obaidat.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2009.
300 _brecurso en línea.
336 _atexto
_btxt
_2rdacontent
337 _acomputadora
_bc
_2rdamedia
338 _arecurso en línea
_bcr
_2rdacarrier
347 _aarchivo de texto
_bPDF
_2rda
490 0 _aCommunications in Computer and Information Science,
_x1865-0929 ;
_v48
500 _aSpringer eBooks
505 0 _aInvited Speakers -- e-Business Innovation: The Next Decade -- Development of the Next Generation CDMA Technology and Lessons We Learnt from the Past -- I ICE-B -- Method for Classification of Unstructured Data in Telecommunication Services -- Possible Determinants Affecting the Use of Mobile Tourism Services -- Towards a Version-Based Approach to Deal with Business Process Evolution -- Comparing Consumer Resistance to Mobile Banking in Finland and Portugal -- NPTool: Towards Scalability and Reliability of Business Process Management -- In Search of Search Engine Marketing Strategy Amongst SME’s in Ireland -- II SECRYPT -- Integrating Anomaly-Based Approach into Bayesian Network Classifiers -- Aggregation and Thresholding Schemes for Anomaly-Based Approaches -- A Memory Efficient Network Encryption Scheme -- Analyzing the Effectiveness of the Self-organized Public-Key Management System on MANETs under the Lack of Cooperation and the Impersonation Attacks -- Achieving Fast Self Healing in Wireless Sensor Networks Using Multi-generation Deployment Schemes -- Reducing Memory Requirements for Combinatorial Attacks on NTRU via Multiple Birthdays -- On the Design of Buyer-Seller Watermarking Protocols without a Watermark Authority -- RKRD: Runtime Kernel Rootkit Detection -- A New Narrow-Block Mode of Operation for Disk Encryption with Error Propagation -- Security Requirements Management in Software Product Line Engineering -- III SIGMAP -- On the Suitability of Suffix Arrays for Lempel-Ziv Data Compression -- Iteratively Detected MIMO-OFDM Twisted-Pair Transmission Schemes -- Whales Localization Using a Large Hydrophone Array: Performance Relative to Cramer-Rao Bounds and Confidence Regions -- Automatic Recognition of Isolated Vowels Using F0-Normalized Harmonic Features -- High-Speed Configurable VLSI Architecture of a General Purpose Lifting-Based Discrete Wavelet Processor -- Face Detection Using Discrete Gabor Jets and a Probabilistic Model of Colored Image Patches -- Geometric Distortion Resilient Watermarking Based on a Single Robust Feature for Still Images -- Optimized Two-Party Video Chat with Restored Eye Contact Using Graphics Hardware -- A New IMS Based Inter-working Solution -- Quality Evaluation of Reverberation in Audioband Speech Signals -- IV WINSYS -- Conservative Transmit Power Control Mechanism for 802.11 Mesh -- Multiple Mobile Sinks Deployment for Energy Efficiency in Large Scale Wireless Sensor Networks -- Using Vegetation Barriers to Improving Wireless Network Isolation and Security -- Throughput Maximization for Multiband-OFDM Ultra Wideband Systems with Adaptive Frame Length Control -- Evaluation of Multicast Scheduling and Clustering Schemes with Packet-Level Macro Diversity in High-Speed Cellular Networks -- The Service Distribution Protocol for MANETs - Criteria and Performance Analysis.
520 _aThis book contains the best papers of the 5th International Conference on e-Business and Telecommunications, ICETE, which was held in July 2008, in Porto, Portugal. This conference reflects a continuing effort to increase the dissemination of recent research results among professionals who work in the areas of e-business and telecommunications. ICETE is a joint international conference integrating four major areas of knowledge that are divided into four corresponding conferences: ICE-B (International Conference on e-Business), SECRYPT (International Conference on Security and Cryptography), SIGMAP (International Conference on Signal Processing and Multimedia), and WINSYS (International Conferenceon Wireless Information Systems).
590 _aPara consulta fuera de la UANL se requiere clave de acceso remoto.
700 1 _aObaidat, Mohammad S.
_eeditor.
_9326849
710 2 _aSpringerLink (Servicio en línea)
_9299170
776 0 8 _iEdición impresa:
_z9783642051968
856 4 0 _uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-3-642-05197-5
_zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL)
942 _c14
999 _c301058
_d301058