logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

E-Business and Telecommunications: 4th International Conference, Icete 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected Papers

E-Business and Telecommunications: 4th International Conference, Icete 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected Papers (Paperback, 2009)

Joaquim Filipe, Mohammad S. Obaidat (지은이)
Springer-Verlag New York Inc
102,470원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
84,020원 -18% 0원
4,210원
79,810원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

E-Business and Telecommunications: 4th International Conference, Icete 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected Papers
eBook 미리보기

책 정보

· 제목 : E-Business and Telecommunications: 4th International Conference, Icete 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected Papers (Paperback, 2009) 
· 분류 : 외국도서 > 컴퓨터 > 보안 > 암호
· ISBN : 9783540886525
· 쪽수 : 398쪽
· 출판일 : 2008-11-06

목차

Invited Speakers.- Pragmatic Computing - A Semiotic Perspective to Web Services.- Utility Computing: Reality and Beyond.- A Novel Grid-Based Micropayment System for Heterogeneous Multi-party Accounting.- I: ICE-B.- Bidding Agents That Perpetrate Auction Fraud.- A Platform for Mobile Service Provisioning Based on SOA-Integration.- A Hybrid Data Mining Approach for Credit Card Usage Behavior Analysis.- Critical Success Factors of Internet Shopping: The Case of Japan.- An Adaptive Knowledge-Based Approach for Detecting Fraud across Different e-Government Domains.- II: SECRYPT.- Timing to Block Scanning Malwares by Using Combinatorics Proliferation Model.- Securing Biometric Templates Where Similarity Is Measured with Set Intersection.- Score Equalization in SVM Multimodal Fusion for Person Recognition.- Remote Algorithmic Complexity Attacks against Randomized Hash Tables.- Securing Real-Time Sessions in an IMS-Based Architecture.- IPSec Database Query Acceleration.- Detection of Spoofed MAC Addresses in 802.11 Wireless Networks.- K2 Stream Cipher.- Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols.- Reliable Intersection Computation within Malicious Environments.- A Security Hardening Language Based on Aspect-Orientation.- III: SIGMAP.- Facial Expression Synthesis and Analysis.- Multi-sequence H.264/AVC Rate Control Based on the Linear Model.- Non Parametric Stochastic Expectation Maximization for Data Clustering.- Mapping Phonetic Features for Voice-Driven Sound Synthesis.- The MiSPOT System: Personalized Publicity and Marketing over Interactive Digital TV.- Knowledge Engineering Aspects of Affective Bi-Modal Educational Applications.- IV: WINSYS.- Design of a Password-Based EAP Method.- Bit and Power Allocation Strategies for OFDM Systems over Time-Varying Channels.- Mobile Applications to a Pervasive World.- Multi-service Networks: A New Approach to End-to-End Topology Management.

저자소개

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책