logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

E-Business and Telecommunication Networks: Second International Conference, Icete 2005, Reading, Uk, October 3-7, 2005. Selected Papers

E-Business and Telecommunication Networks: Second International Conference, Icete 2005, Reading, Uk, October 3-7, 2005. Selected Papers (Paperback, 2007)

Filipe (지은이)
  |  
Springer-Verlag New York Inc
2007-11-12
  |  
90,600원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
알라딘 74,290원 -18% 0원 3,720원 70,570원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
로딩중

e-Book

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

해외직구

책 이미지

E-Business and Telecommunication Networks: Second International Conference, Icete 2005, Reading, Uk, October 3-7, 2005. Selected Papers

책 정보

· 제목 : E-Business and Telecommunication Networks: Second International Conference, Icete 2005, Reading, Uk, October 3-7, 2005. Selected Papers (Paperback, 2007) 
· 분류 : 외국도서 > 컴퓨터 > 전자상거래(E-Commerce)
· ISBN : 9783540759928
· 쪽수 : 293쪽

목차

I: Global Communication Information Systems and Services.- Sharing Service Resource Information for Application Integration in a Virtual Enterprise - Modeling the Communication Protocol for Exchanging Service Resource Information.- Advertising Via Mobile Terminals - Delivering Context Sensitive and Personalized Advertising While Guaranteeing Privacy.- On Digital Cash-Like Payment Systems.- In-Depth Analysis of Selected Topics Related to the Quality Assessment of E-Commerce Systems.- A Novel Real-Time Self-similar Traffic Detector/Filter to Improve the Reliability of a TCP Based End-to-End Client/Server Interaction Path for Shorter Roundtrip Time.- Strategies for Service Composition in P2P Networks.- End to End Adaptation for the Web: Matching Content to Client Connections.- II: Security and Reliability in Information Systems and Networks.- Voice Biometrics Within the Family: Trust, Privacy and Personalisation.- Secret Locking: Exploring New Approaches to Biometric Key Encapsulation.- Adaptive Real-Time Network Monitoring System: Detecting Anomalous Activity with Evolving Connectionist System.- Host Identity Protocol Proxy.- Guaranteerring Security of Financial Transaction by Using Quantum Cryptography in Banking Environment.- Optimal Trade-Off for Merkle Tree Traversal.- Supporting the Cybercrime Investigation Process: Effective Discrimination of Source Code Authors Based on Byte-Level Information.- III: Wireless Communication Systems and Networks.- Iterative MMSE Detection for MIMO/BLAST DS-CDMA Systems in Frequency Selective Fading Channels - Achieving High Performance in Fully Loaded Systems.- Flooding Attack on the Binding Cache in Mobile IPv6.- Performance of VoIP over IEEE 802.11G DSSS-OFDM Mode with IEEE 802.11E QOS Support.- The Robustness of Blocking Probability in a Loss System with Repeated Customers.- On the Evaluation of a Secure Solution to Access 802.11 Networks.- Searching for Resources in MANETs - A Cluster Based Flooding Approach.- A Comparative Study of IEEE 802.11 MAC Access Mechanisms for Different Traffic Types.- An Automatic Blind Modulation Recognition Algorithm for M-PSK Signals Based on MSE Criterion.- IV: Multimedia Signal Processing.- Properties of Dominant Color Temperature Descriptor.- Test Environment for Performance Evaluation of an Internet Radio.

저자소개

Filipe (지은이)    정보 더보기
펼치기
이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책