default search action
4th ICETE 2007: Barcelona, Spain
- Joaquim Filipe, Mohammad S. Obaidat:
E-business and Telecommunications - 4th International Conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected Papers. Communications in Computer and Information Science 23, Springer 2009, ISBN 978-3-540-88652-5
Part 1 / Invited Speakers
- Kecheng Liu:
Pragmatic Computing - A Semiotic Perspective to Web Services. 3-15 - Ivan I. Ivanov:
Utility Computing: Reality and Beyond. 16-29 - Manel Abdelkader, Noureddine Boudriga, Mohammad S. Obaidat:
A Novel Grid-Based Micropayment System for Heterogeneous Multi-party Accounting. 30-54
Part 2 / Part I: ICE-B
- Jarrod Trevathan, Alan McCabe, Wayne Read:
Bidding Agents That Perpetrate Auction Fraud. 57-71 - Michael Decker, Rebecca Bulander:
A Platform for Mobile Service Provisioning Based on SOA-Integration. 72-84 - Chieh-Yuan Tsai:
A Hybrid Data Mining Approach for Credit Card Usage Behavior Analysis. 85-97 - Kanokwan Atchariyachanvanich, Hitoshi Okada, Noboru Sonehara:
Critical Success Factors of Internet Shopping: The Case of Japan. 98-109 - Panos Alexopoulos, Kostas Kafentzis, Nicholas Athanassiadis, Xanthi Benetou, Tassos Tagaris, Carol Jollie, Panos Georgolios:
An Adaptive Knowledge-Based Approach for Detecting Fraud across Different e-Government Domains. 110-121
Part 3 / Part II: SECRYPT
- Kazumasa Omote, Takeshi Shimoyama, Satoru Torii:
Timing to Block Scanning Malwares by Using Combinatorics Proliferation Model. 125-138 - Daniel Socek, Vladimir Bozovic, Dubravko Culibrk:
Securing Biometric Templates Where Similarity Is Measured with Set Intersection. 139-151 - Pascual Ejarque, Javier Hernando:
Score Equalization in SVM Multimodal Fusion for Person Recognition. 152-161 - Noa Bar-Yosef, Avishai Wool:
Remote Algorithmic Complexity Attacks against Randomized Hash Tables. 162-174 - Paolo Cennamo, Antonio Fresa, Maurizio Longo, Fabio Postiglione, Anton Luca Robustelli, Francesco Toro:
Securing Real-Time Sessions in an IMS-Based Architecture. 175-187 - Alberto Ferrante, Satish Chandra, Vincenzo Piuri:
IPSec Database Query Acceleration. 188-200 - Kai Tao, Jing Li, Srinivas Sampalli:
Detection of Spoofed MAC Addresses in 802.11 Wireless Networks. 201-213 - Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
K2 Stream Cipher. 214-226 - Konstantinos Chalkias, Foteini Baldimtsi, Dimitris Hristu-Varsakelis, George Stephanides:
Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols. 227-238 - Stefan Böttcher, Sebastian Obermeier:
Reliable Intersection Computation within Malicious Environments. 239-253 - Azzam Mourad, Marc-André Laverdière, Mourad Debbabi:
A Security Hardening Language Based on Aspect-Orientation. 254-266
Part 4 / Part III: SIGMAP
- Hao Wang:
Facial Expression Synthesis and Analysis. 269-283 - Grzegorz Pastuszak, Andrzej Pietrasiewicz:
Multi-sequence H.264/AVC Rate Control Based on the Linear Model. 284-292 - Gilles Bougenière, Claude Cariou, Kacem Chehdi, Alan Gay:
Non Parametric Stochastic Expectation Maximization for Data Clustering. 293-303 - Jordi Janer, Esteban Maestre:
Mapping Phonetic Features for Voice-Driven Sound Synthesis. 304-314 - Martín López Nores, José Juan Pazos-Arias, Yolanda Blanco-Fernández, Jorge García Duque, Ricardo Tubio-Pardavila, Marta Rey-López:
The MiSPOT System: Personalized Publicity and Marketing over Interactive Digital TV. 315-327 - Efthymios Alepis, Maria Virvou, Katerina Kabassi:
Knowledge Engineering Aspects of Affective Bi-Modal Educational Applications. 328-339
Part 5 / Part IV: WINSYS
- Andrea Manganaro, Mingyur Koblensky, Michele Loreti:
Design of a Password-Based EAP Method. 343-355 - Xiang Gao, Mort Naraghi-Pour:
Bit and Power Allocation Strategies for OFDM Systems over Time-Varying Channels. 356-370 - Hiata Anderson de Oliveira Coelho, Ricardo de Oliveira Anido:
Mobile Applications to a Pervasive World. 371-383 - Anne-Marie Bosneag, David Cleary:
Multi-service Networks: A New Approach to End-to-End Topology Management. 384-396
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.