Poznań

 

 
 

TWÓJ KOSZYK

Koszyk jest pusty
 
ksiazka tytuł: e-Business and Telecommunications autor:
DOSTAWA WYŁĄCZNIE NA TERYTORIUM POLSKI

FORMY I KOSZTY DOSTAWY
  • 0,00 zł
  • 0,00 zł
  • 9,50 zł
  • 12,50 zł
  • 0,00 zł
  • Od 9,90 zł
  • Od 11,00 zł
  • 0,00 zł
  • Od 6,90
  • Od 9,90

e-Business and Telecommunications

International Conference, ICETE 2008, Porto, Portugal, July 26-29, 2008, Revised Selected Papers
Wersja papierowa
Redakcja: Filipe Joaquim
Wydawnictwo: Springer Nature B.V.
ISBN: 978-36-420-5196-8
Format: 15.6x23.4cm
Liczba stron: 504
Oprawa: Miękka
Wydanie: 2009 r.
Język: angielski

Dostępność: dostępny
440,80 zł

Invited Speakers.- e-Business Innovation: The Next Decade.- Development of the Next Generation CDMA Technology and Lessons We Learnt from the Past.- I ICE-B.- Method for Classification of Unstructured Data in Telecommunication Services.- Possible Determinants Affecting the Use of Mobile Tourism Services.- Towards a Version-Based Approach to Deal with Business Process Evolution.- Comparing Consumer Resistance to Mobile Banking in Finland and Portugal.- NPTool: Towards Scalability and Reliability of Business Process Management.- In Search of Search Engine Marketing Strategy Amongst SME's in Ireland.- II SECRYPT.- Integrating Anomaly-Based Approach into Bayesian Network Classifiers.- Aggregation and Thresholding Schemes for Anomaly-Based Approaches.- A Memory Efficient Network Encryption Scheme.- Analyzing the Effectiveness of the Self-organized Public-Key Management System on MANETs under the Lack of Cooperation and the Impersonation Attacks.- Achieving Fast Self Healing in Wireless Sensor Networks Using Multi-generation Deployment Schemes.- Reducing Memory Requirements for Combinatorial Attacks on NTRU via Multiple Birthdays.- On the Design of Buyer-Seller Watermarking Protocols without a Watermark Authority.- RKRD: Runtime Kernel Rootkit Detection.- A New Narrow-Block Mode of Operation for Disk Encryption with Error Propagation.- Security Requirements Management in Software Product Line Engineering.- III SIGMAP.- On the Suitability of Suffix Arrays for Lempel-Ziv Data Compression.- Iteratively Detected MIMO-OFDM Twisted-Pair Transmission Schemes.- Whales Localization Using a Large Hydrophone Array: Performance Relative to Cramer-Rao Bounds and Confidence Regions.- Automatic Recognition of Isolated Vowels Using F0-Normalized Harmonic Features.- High-Speed Configurable VLSI Architecture of a General Purpose Lifting-Based Discrete Wavelet Processor.- Face Detection Using Discrete Gabor Jets and a Probabilistic Model of Colored Image Patches.- Geometric Distortion Resilient Watermarking Based on a Single Robust Feature for Still Images.- Optimized Two-Party Video Chat with Restored Eye Contact Using Graphics Hardware.- A New IMS Based Inter-working Solution.- Quality Evaluation of Reverberation in Audioband Speech Signals.- IV WINSYS.- Conservative Transmit Power Control Mechanism for 802.11 Mesh.- Multiple Mobile Sinks Deployment for Energy Efficiency in Large Scale Wireless Sensor Networks.- Using Vegetation Barriers to Improving Wireless Network Isolation and Security.- Throughput Maximization for Multiband-OFDM Ultra Wideband Systems with Adaptive Frame Length Control.- Evaluation of Multicast Scheduling and Clustering Schemes with Packet-Level Macro Diversity in High-Speed Cellular Networks.- The Service Distribution Protocol for MANETs - Criteria and Performance Analysis.

 

Newsletter

Newsletter
Zapisz Wypisz

Klikając "Zapisz" zgadzasz się na przesyłanie na udostępniony adres e-mail informacji handlowych, tj. zwłaszcza o ofertach, promocjach w formie dedykowanego newslettera.

Płatności

Kanały płatności

Księgarnia PWN Poznań akceptuje płatności:

  • płatność elektroniczna eCard (karta płatnicza, ePrzelew)
  • za pobraniem - przy odbiorze przesyłki należność pobiera listonosz lub kurier