Online Library TheLib.net » E-business and Telecommunication Networks: Second International Conference, ICETE 2005, Reading, UK, October 3-7, 2005. Selected Papers
cover of the book E-business and Telecommunication Networks: Second International Conference, ICETE 2005, Reading, UK, October 3-7, 2005. Selected Papers

Ebook: E-business and Telecommunication Networks: Second International Conference, ICETE 2005, Reading, UK, October 3-7, 2005. Selected Papers

00
27.01.2024
0
0

This book contains the best papers of the Second International Conference on E-business and Telecommunication Networks (ICETE), which was held, in 2005, at the Microsoft Research Centre - Reading, in the UK. The conference was organized by INSTICC (Institute for Systems and Technologies of Information, Communication and Control) in collaboration with the University of Westminster/WITRC, UK. ICETE reflects a continuing effort to increase the exchange of expertise among professionals who work in the fields of e-business and telecommunication networks, including aspects related to security, wireless systems, signal processing, and all sorts of applications, who are bringing new services and technologies into the lives of ordinary consumers. The major goal of this conference was thus to bring together researchers and developers from academia and industry working in areas related to e-business to stimulate a debate with a special focus on telecommunication networks. Four simultaneous tracks were held, covering different aspects, namely: “Global Communication Information Systems and Services”, “Security and Reliability in Information Systems and Networks”, “Wireless Communication Systems and Networks” and “Multimedia Signal Processing”. Each of these tracks appealed to a global audience of engineers, scientists, business people and policy experts, interested in the research topics of ICETE. All tracks focused on specific topics of research and real world applications and relied on contributions from industry, with different solutions for end-user applications and enabling technologies, in a diversity of communication environments.




This book constitutes the refereed proceedings of the Second International Conference on E-business and Telecommunication Networks, ICETE 2005, held in Reading, UK, on October 3-7, 2005.

The 85 revised full papers presented were carefully reviewed and selected from 151 submissions. The papers are organized in topical sections on global communication information systems and services, security and reliability in information systems and networks, wireless communication systems and networks, and multimedia signal processing.




This book constitutes the refereed proceedings of the Second International Conference on E-business and Telecommunication Networks, ICETE 2005, held in Reading, UK, on October 3-7, 2005.

The 85 revised full papers presented were carefully reviewed and selected from 151 submissions. The papers are organized in topical sections on global communication information systems and services, security and reliability in information systems and networks, wireless communication systems and networks, and multimedia signal processing.


Content:
Front Matter....Pages -
Front Matter....Pages 1-1
Sharing Service Resource Information for Application Integration in a Virtual Enterprise – Modeling the Communication Protocol for Exchanging Service Resource Information....Pages 3-14
Advertising Via Mobile Terminals – Delivering Context Sensitive and Personalized Advertising While Guaranteeing Privacy....Pages 15-25
On Digital Cash-Like Payment Systems....Pages 26-38
In-Depth Analysis of Selected Topics Related to the Quality Assessment of E-Commerce Systems....Pages 39-48
A Novel Real-Time Self-similar Traffic Detector/Filter to Improve the Reliability of a TCP Based End-to-End Client/Server Interaction Path for Shorter Roundtrip Time....Pages 49-61
Strategies for Service Composition in P2P Networks....Pages 62-77
End to End Adaptation for the Web: Matching Content to Client Connections....Pages 78-90
Front Matter....Pages 91-91
Voice Biometrics Within the Family: Trust, Privacy and Personalisation....Pages 93-100
Secret Locking: Exploring New Approaches to Biometric Key Encapsulation....Pages 101-112
Adaptive Real-Time Network Monitoring System: Detecting Anomalous Activity with Evolving Connectionist System....Pages 113-125
Host Identity Protocol Proxy....Pages 126-138
Guaranteerring Security of Financial Transaction by Using Quantum Cryptography in Banking Environment....Pages 139-149
Optimal Trade-Off for Merkle Tree Traversal....Pages 150-162
Supporting the Cybercrime Investigation Process: Effective Discrimination of Source Code Authors Based on Byte-Level Information....Pages 163-173
Front Matter....Pages 175-175
Iterative MMSE Detection for MIMO/BLAST DS-CDMA Systems in Frequency Selective Fading Channels – Achieving High Performance in Fully Loaded Systems....Pages 177-186
Flooding Attack on the Binding Cache in Mobile IPv6....Pages 187-200
Performance of VoIP over IEEE 802.11G DSSS-OFDM Mode with IEEE 802.11E QOS Support....Pages 201-214
The Robustness of Blocking Probability in a Loss System with Repeated Customers....Pages 215-225
On the Evaluation of a Secure Solution to Access 802.11 Networks....Pages 226-235
Searching for Resources in MANETs – A Cluster Based Flooding Approach....Pages 236-245
Front Matter....Pages 175-175
A Comparative Study of IEEE 802.11 MAC Access Mechanisms for Different Traffic Types....Pages 246-256
An Automatic Blind Modulation Recognition Algorithm for M-PSK Signals Based on MSE Criterion....Pages 257-266
Front Matter....Pages 267-267
Properties of Dominant Color Temperature Descriptor....Pages 269-278
Test Environment for Performance Evaluation of an Internet Radio....Pages 279-292
Back Matter....Pages -


This book constitutes the refereed proceedings of the Second International Conference on E-business and Telecommunication Networks, ICETE 2005, held in Reading, UK, on October 3-7, 2005.

The 85 revised full papers presented were carefully reviewed and selected from 151 submissions. The papers are organized in topical sections on global communication information systems and services, security and reliability in information systems and networks, wireless communication systems and networks, and multimedia signal processing.


Content:
Front Matter....Pages -
Front Matter....Pages 1-1
Sharing Service Resource Information for Application Integration in a Virtual Enterprise – Modeling the Communication Protocol for Exchanging Service Resource Information....Pages 3-14
Advertising Via Mobile Terminals – Delivering Context Sensitive and Personalized Advertising While Guaranteeing Privacy....Pages 15-25
On Digital Cash-Like Payment Systems....Pages 26-38
In-Depth Analysis of Selected Topics Related to the Quality Assessment of E-Commerce Systems....Pages 39-48
A Novel Real-Time Self-similar Traffic Detector/Filter to Improve the Reliability of a TCP Based End-to-End Client/Server Interaction Path for Shorter Roundtrip Time....Pages 49-61
Strategies for Service Composition in P2P Networks....Pages 62-77
End to End Adaptation for the Web: Matching Content to Client Connections....Pages 78-90
Front Matter....Pages 91-91
Voice Biometrics Within the Family: Trust, Privacy and Personalisation....Pages 93-100
Secret Locking: Exploring New Approaches to Biometric Key Encapsulation....Pages 101-112
Adaptive Real-Time Network Monitoring System: Detecting Anomalous Activity with Evolving Connectionist System....Pages 113-125
Host Identity Protocol Proxy....Pages 126-138
Guaranteerring Security of Financial Transaction by Using Quantum Cryptography in Banking Environment....Pages 139-149
Optimal Trade-Off for Merkle Tree Traversal....Pages 150-162
Supporting the Cybercrime Investigation Process: Effective Discrimination of Source Code Authors Based on Byte-Level Information....Pages 163-173
Front Matter....Pages 175-175
Iterative MMSE Detection for MIMO/BLAST DS-CDMA Systems in Frequency Selective Fading Channels – Achieving High Performance in Fully Loaded Systems....Pages 177-186
Flooding Attack on the Binding Cache in Mobile IPv6....Pages 187-200
Performance of VoIP over IEEE 802.11G DSSS-OFDM Mode with IEEE 802.11E QOS Support....Pages 201-214
The Robustness of Blocking Probability in a Loss System with Repeated Customers....Pages 215-225
On the Evaluation of a Secure Solution to Access 802.11 Networks....Pages 226-235
Searching for Resources in MANETs – A Cluster Based Flooding Approach....Pages 236-245
Front Matter....Pages 175-175
A Comparative Study of IEEE 802.11 MAC Access Mechanisms for Different Traffic Types....Pages 246-256
An Automatic Blind Modulation Recognition Algorithm for M-PSK Signals Based on MSE Criterion....Pages 257-266
Front Matter....Pages 267-267
Properties of Dominant Color Temperature Descriptor....Pages 269-278
Test Environment for Performance Evaluation of an Internet Radio....Pages 279-292
Back Matter....Pages -
....
Download the book E-business and Telecommunication Networks: Second International Conference, ICETE 2005, Reading, UK, October 3-7, 2005. Selected Papers for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen