|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Joaquim Filipe , Helder Coelhas , Monica SaramagoPublisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K Edition: 2007 ed. Volume: 3 Dimensions: Width: 15.50cm , Height: 1.80cm , Length: 23.50cm Weight: 0.474kg ISBN: 9783540759928ISBN 10: 3540759921 Pages: 293 Publication Date: 12 November 2007 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Out of stock ![]() The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available. Table of ContentsI: Global Communication Information Systems and Services.- Sharing Service Resource Information for Application Integration in a Virtual Enterprise - Modeling the Communication Protocol for Exchanging Service Resource Information.- Advertising Via Mobile Terminals - Delivering Context Sensitive and Personalized Advertising While Guaranteeing Privacy.- On Digital Cash-Like Payment Systems.- In-Depth Analysis of Selected Topics Related to the Quality Assessment of E-Commerce Systems.- A Novel Real-Time Self-similar Traffic Detector/Filter to Improve the Reliability of a TCP Based End-to-End Client/Server Interaction Path for Shorter Roundtrip Time.- Strategies for Service Composition in P2P Networks.- End to End Adaptation for the Web: Matching Content to Client Connections.- II: Security and Reliability in Information Systems and Networks.- Voice Biometrics Within the Family: Trust, Privacy and Personalisation.- Secret Locking: Exploring New Approaches to Biometric Key Encapsulation.- Adaptive Real-Time Network Monitoring System: Detecting Anomalous Activity with Evolving Connectionist System.- Host Identity Protocol Proxy.- Guaranteerring Security of Financial Transaction by Using Quantum Cryptography in Banking Environment.- Optimal Trade-Off for Merkle Tree Traversal.- Supporting the Cybercrime Investigation Process: Effective Discrimination of Source Code Authors Based on Byte-Level Information.- III: Wireless Communication Systems and Networks.- Iterative MMSE Detection for MIMO/BLAST DS-CDMA Systems in Frequency Selective Fading Channels - Achieving High Performance in Fully Loaded Systems.- Flooding Attack on the Binding Cache in Mobile IPv6.- Performance of VoIP over IEEE 802.11G DSSS-OFDM Mode with IEEE 802.11E QOS Support.- The Robustness of Blocking Probability in a Loss System with Repeated Customers.- On the Evaluation of a Secure Solution to Access 802.11 Networks.- Searching for Resources in MANETs - A Cluster Based Flooding Approach.- A Comparative Study of IEEE 802.11 MAC Access Mechanisms for Different Traffic Types.- An Automatic Blind Modulation Recognition Algorithm for M-PSK Signals Based on MSE Criterion.- IV: Multimedia Signal Processing.- Properties of Dominant Color Temperature Descriptor.- Test Environment for Performance Evaluation of an Internet Radio.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |