Availability: In Stock

e-Business and Telecommunication Networks

SKU: 9781402047602

Original price was: $75.00.Current price is: $18.00.

e-Business and Telecommunication Networks, Jaimy Szymanski, 9781402047602

Description

This book contains the best papers of the First International Conference on e-Business and Telecommunication Networks held in 2004. The book presents recent research on e-business and telecommunication networks. It includes analyses aspects of global communication information systems and services, and describes security and reliability problems and solutions in information systems and networks. Preface. Conference Committee. Invited papers. Data mining techniques for security of web services; M. Malek and F. Harmantzis. Towards an alternative way of verifying proxy objects in jini; N. Papamichail and L. Vasiu. An experimental performance analysis study of loss rate and jitter characteristics in wireless networks; M. S. Obaidat and Yulian Wang. On the survivability of wdm optical networks; Y. Luo et al. Sigma: a transport layer mobility management scheme for terrestrial and space networks; S. Fu and M. Atiquzzaman. PART 1 – Global Communication Information Systems and Services. A decentralized location service: Applying P2P technology for picking replicas on replicated services; L. Bernardo and P. Pinto. E-macsc: a novel dynamic cache tuning technique to maintain the hit ratio prescribed by the user in internet applications; R.S.L. Wu et al. Efficient information retrieval from handheld terminals with wireless digital phone interface: personalized information access on mobile phones and PDAs; H. Weghorn. Secure web browsing over long-delay broadband networks: recommendations for web browsers; D. Dillon et al. Experimental based tool calibration used for assessing the quality of e-commerce systems; A. Stefani et al. Gender differences in online shoppers’ decision-making styles; C. Yang and C.C. Wu. Design and evaluation of the home network systems using the service oriented architecture; H. Igaki et al. PART 2 – Security and reliability in information systems and networks. New non-adaptive distributed system-level diagnosis methods for computer networks; H. Masuyama and K. Watanabe. Gsm and gprs performance of ipsec data communication; G. Me et al. Practival auditability in trusted messaging systems; M. Reis et al. Towards an adaptive packet marking scheme for ip traceback; P. Yan and M.C. Lee. Baseline tohelp with network management; M.L. Proenca Jr. et al. Network-based intrusion detection systems evaluation through a short term experimental script; L.L. Fagundes and L.P. Gaspary. A single sign-on protocol for distributed web applications based on standard internet mechanisms; J. Gantner et al. PART 3 – Wireless communication systems and networks. Adjacent channel interference: impact on the capacity of wcdma/fdd networks; D. Figueiredo et al. Care-of-prefix routing for moving networks in mobile ip network; T. Suzuki et al. Service integration between wireless systems: a core-level approach to internetworking; P. Pinto et al. Spur: a secured protocol for umts registration; M. Abdelkader and N. Boudriga. Providing qos in 3g-wlan environment with rsvp and diffserv; E. Wallenius et al. Fast Mobile ipv6 approach for wireless lan based networks: link-layer triggering support for ieee 802.11; N. Jordan and A. Poropatich. Cdma2000 1x capacity decrease by power control error in high speed train environment; S. Shin et al. Ugsp: authentication based secure protocol for ad-hoc networks; N. Arora and R.K. Shyamasundar. PART 4 – Multimedia signal processing. Image authentication using hierarchical semi-fragile watermarks; Y-L Tang and C.-H. Chen. Deployment of live-video services based on streaming technology over an hfc network; D. Melendi et al. Hardware-oriented analysis of the arithmetic coding – comparative study of jpeg2000 and h.264/avc compression standards; G. Pastuszak. Audio watermarking quality evaluation; A.G. Acevedo. Compression of hyperspectral imagery via linear prediction; F. Rizzo et al. Bayer pattern compression by prediction errors; A. Buemi et al. Application level session hand-off management in a ubiquitous multimedia environment; L. Rong and I. Burnett. Author index.

Additional information

Publisher

ISBN

Date of Publishing

Author

Category

Page Number